CN104268184B - File delet method and terminal in a kind of mobile terminal - Google Patents
File delet method and terminal in a kind of mobile terminal Download PDFInfo
- Publication number
- CN104268184B CN104268184B CN201410472987.7A CN201410472987A CN104268184B CN 104268184 B CN104268184 B CN 104268184B CN 201410472987 A CN201410472987 A CN 201410472987A CN 104268184 B CN104268184 B CN 104268184B
- Authority
- CN
- China
- Prior art keywords
- memory space
- file
- overlapping operation
- deleted
- shared
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention discloses the file delet method in a kind of mobile terminal and terminal, it is related to data processing field, file erasing time can be saved on the basis of assuring data security.In the embodiment of the present invention, the memory space shared by file to be deleted is determined;Overlapping operation is carried out to the memory space of part in the memory space, wherein, the memory space for having carried out overlapping operation is distributed in whole memory spaces shared by file to be deleted;On the basis of it ensure that Information Security, file erasing time is effectively saved.
Description
Technical field
The present invention relates to the file delet method in data processing field, more particularly to a kind of mobile terminal and terminal.
Background technology
With the popularization of the smart machines such as computer, mobile phone, tablet personal computer, the Information Security of smart machine also gradually into
For an important topic.Data on smart machine are typically stored in the memory space inside or outside smart machine, if thinking
The data in memory space are deleted, then the file delet method for needing to use smart machine to provide.Current file delet method
Can not be really by data from physically deleting, but be marked to storing the memory space shared by the data,
For informing that smart machine can write other data in above-mentioned memory space again.When smart machine is not above-mentioned marked
When new data are write in the memory space gone out, not deleted initial data is still preserved in above-mentioned memory space.Hacker can be with
Above-mentioned not deleted initial data is collected, and the initial data is reduced, it is seen then that this file delet method is made in the prior art
Into the hidden danger of data safety.
Another file delet method is additionally provided in the prior art, by by MFT (the Master File of file
Table, MFT) index is emptied, and each byte of the memory space shared by the file that will need to delete is reset one by one,
The memory space shared by file that will need to delete has carried out covering and rewritten, so as to realize the purpose for deleting this document.It is right
, can be with quickly deleting file, but for larger file, to file institute using this file delet method in less file
Whole memory spaces of occupancy, which carry out covering rewriting one by one, to be needed to consume the substantial amounts of time.
It can be seen that lacking a kind of file delet method in the prior art, can be saved on the basis of assuring data security
File erasing time.
The content of the invention
The embodiment of the present invention provides file delet method and terminal in a kind of mobile terminal, effectively to prevent file
While maliciously recovery, file erasing time is saved.
The embodiment of the present invention provides the file delet method in a kind of mobile terminal, and this method includes:
Determine the memory space shared by file to be deleted;
Overlapping operation is carried out to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole storages shared by file to be deleted
In space.
The embodiment of the present invention provides a kind of mobile terminal, and the terminal includes:
Determining unit, for determining the memory space shared by file to be deleted;
Capping unit, for carrying out overlapping operation to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole storages shared by file to be deleted
In space.
From such scheme as can be seen that the part memory space that overlapping operation is carried out in the embodiment of the present invention is point at interval
Cloth in whole memory spaces shared by this document, can be it is evenly spaced or unevenly spaced, therefore,
After the part memory space shared by file to be deleted has carried out overlapping operation, these capped memory spaces are deposited in original
Store up in space and breakdown point one by one formed to original, due to breakdown point be spaced apart and distribution it is extensive, can recognize
It is distributed for these breakdown points relatively uniform and enough, then file is just substantially reduced by recoverable possibility, and the present invention utilizes
This mode realizes the complete deletion of file, so as to ensure that the Information Security of user;Simultaneously as the embodiment of the present invention
Only need the memory space of part to carry out overlapping operation, shorten and the progress overlapping operation of whole memory spaces is reached in the prior art
The time consumed to complete deletion file, so as to shorten the time for needing to wait when user selects to delete some file, lifting
User experience.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these accompanying drawings
His accompanying drawing.
Fig. 1 is the schematic flow sheet of the file delet method in a kind of mobile terminal provided in an embodiment of the present invention;
Fig. 2 is to be deleted using the embodiment of the present invention compared with the structural representation after small documents;
Fig. 3 is that the structural representation after larger file is deleted using the embodiment of the present invention;
Fig. 4 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, the present invention is made below in conjunction with accompanying drawing into
One step it is described in detail, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole implementation
Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
The embodiment of the present invention is applied to the various smart machines for possessing storage device, such as mobile phone, tablet personal computer and desk-top meter
Calculation machine etc. equipment.But in actual applications, due to the memory space of mobile terminal (such as mobile phone, tablet personal computer equipment) and interior
Deposit relatively small, be generally loaded with multiple application programs, when user selects to delete the larger text stored in mobile terminal
During part, in existing file deleting mechanism, the mode for all covering or filling in can undoubtedly make user wait longer time, even
User is needed to exit some application programs, pending file is deleted completely, and the mode being only marked in memory space can not
Ensure the completeness that file is deleted, recoverable leak be present, this generally carries the important pass of user to current mobile terminal
It is a kind of very big potential safety hazard for the situation of the private data in terms of the person or property.Therefore, the embodiment of the present invention
Mobile terminal is more suitable for, be particularly suitable for use in various smart mobile phones, tablet personal computer.
The part memory space that overlapping operation is carried out in the embodiment of the present invention is that being distributed in for interval is complete shared by this document
Can be evenly spaced or unevenly spaced, therefore, when shared by file to be deleted in portion's memory space
Part memory space carried out overlapping operation after, these capped memory spaces are in former memory space to original shape
Into breakdown point one by one, due to breakdown point be spaced apart and distribution it is extensive, it is believed that these breakdown points are distributed phase
To uniform and enough, then file is just substantially reduced by recoverable possibility;After the above step, the embodiment of the present invention is also
Thread can be set up another the memory space of the remainder in addition to overlapping operation has been carried out is subjected to overlapping operation, realize text
The complete deletion of part, so as to ensure that the Information Security of user;Simultaneously as the embodiment of the present invention set up another thread perform it is above-mentioned
Operation, user are not felt by file deletion process and still carried out, and user can utilize other functions of mobile phone screen continuation mobile phone
Use, the whole deletion process without being absorbed in pending file is finished, and wait required for deleting file is shortened for user
Time, improve Consumer's Experience.On the other hand, because the embodiment of the present invention only needs the memory space of part to carry out covering behaviour
Make, shorten the time that in the prior art whole memory spaces are carried out with overlapping operation consumption, deleted so as to shorten user's selection
The time waited is needed during except some file, improves user experience.
The embodiment of the present invention is specifically described below.
Fig. 1 shows the schematic flow sheet of the file delet method in a kind of mobile terminal provided in an embodiment of the present invention,
As shown in figure 1, this method includes:
Step 11:Determine the memory space shared by file to be deleted.
During specific implementation, the memory space shared by this document is determined, the size of this document, i.e. this document can also be determined
The total bytes of shared memory space.
Step 12:Overlapping operation is carried out to the memory space of part in the memory space;Wherein, overlapping operation has been carried out
Memory space is distributed in whole memory spaces shared by file to be deleted.
During specific implementation, using 1st byte of the file in memory space as starting point, with file in memory space most
1 byte is terminal afterwards, with N1Individual byte is interval, selects N2Individual byte carries out overlapping operation.Wherein, N1And N2It is adjustable
Default positive integer, and N1、N2Total bytes respectively less than shared by file.That is, certain data point is chosen hereof
Overlapping operation is carried out, can be fixed intervals between these data points, for example covering rewriting is carried out every the byte of fixed number,
The byte number to be spaced can also be randomly generated, for the capped point of whole file, between there is no strict regularity,
But capped point (breakdown point) is also relatively uniform as a whole.
It should be noted that N can be adjusted according to actual conditions1And N2Numerical value, due to N1And N2Numerical value difference, lead
Cause file coverage rate different, the part being capped in the memory space of as above-mentioned file is not very identical, in the embodiment of the present invention
In, file coverage rate (file destroyed rate can also be referred to as) ≈ N2/(N1+N2).For example, N is worked as1=12, N2=4, now
File coverage rate ≈ 4/16=1/4=25%, it is believed that every 12 bytes, 4 successive bytes are just covered, until last
1 byte, due to the integral multiple of the size not necessarily 16 of memory space shared by file, therefore file coverage rate herein is about
Equal to 25%.
Optionally, after above-mentioned steps 11, in addition to:Judge whether is storage size shared by file to be deleted
Less than predetermined threshold value;Above-mentioned steps 12 are specially:When the memory space shared by file to be deleted is less than predetermined threshold value, to institute
The memory space for stating part in memory space carries out overlapping operation;When the memory space shared by file to be deleted is not less than default
During threshold value, for the N on head of the file in memory spaceaThe N of individual byte and afterbodybThe memory space of part enters in individual byte
Row overlapping operation;Or overlapping operation is carried out to the memory space of part in the memory space.
During specific implementation, it is default can also to determine whether the storage size shared by file to be deleted is less than
Threshold value;Wherein, above-mentioned predetermined threshold value is adjustable positive integer.
When the memory space shared by file to be deleted is less than predetermined threshold value, can be carried out by performing above-mentioned steps 12
Overlapping operation (i.e. file is deleted).
When the memory space shared by file to be deleted is not less than predetermined threshold value, for head of the file in memory space
The N in portionaThe N of individual byte and afterbodybIndividual byte, overlapping operation can be carried out by performing above-mentioned steps 12 (i.e. file is deleted);Or
Person,
When the memory space shared by file to be deleted is not less than predetermined threshold value, can be entered by performing above-mentioned steps 12
Row overlapping operation carries out overlapping operation (i.e. file is deleted).
It should be noted that N can be adjusted according to actual conditions1And N2Numerical value, due to N1And N2Numerical value difference, lead
Cause file coverage rate different, the part being capped in the memory space of as above-mentioned file is not very identical.In the embodiment of the present invention
In, when the memory space shared by file to be deleted is not less than predetermined threshold value, for head of the file in memory space
NaThe N of individual byte and afterbodybIndividual byte, overlapping operation can be carried out by performing above-mentioned steps 12 (i.e. file is deleted);Wherein,
NaAnd NbIt is adjustable default positive integer, and Na+NbLess than the total bytes shared by file.Generally, in each file
File header and tail of file are stored with the vital document information related to this document, such as coded system, file type, this hair
Bright embodiment is for larger file, its most important fileinfo of the destruction to stand in the breach, it is ensured that the file header of this document and
Expendable overlapping operation has been carried out in afterbody, and whether reselection needs not covered the centre of this document afterwards
The memory space of operation carries out overlapping operation, so as to guarantee more thoroughly to destroy the integrality of file to be deleted, reaches
Delete file and the purpose for making the file of deletion to be resumed.For example, can be by text for the file larger to one
Each 4K (in general, it can also be provided that each 2K sizes) of part head and the tail carries out overlapping operation by performing above-mentioned steps 12.
Above step is completed by the main thread of program, after above-mentioned steps have been performed, you can is completed file and is deleted
Flow.It can be seen that file delet method provided in an embodiment of the present invention is without carrying out covering weight to each memory space in file
Write, it is only necessary to overlapping operation is carried out to the memory space of part, especially when file to be deleted is larger, shortens and deletes file consumption
Time, system effectiveness is improved, improve Consumer's Experience.
Optionally, in the N on the head for file in memory spaceaThe N of individual byte and afterbodybIndividual byte, is covered
After operation, the memory space that file is not carried out to overlapping operation in memory space is labeled as memory space to be covered;Wherein,
NaAnd NbIt is default positive integer, and Na+NbLess than the total bytes shared by the file.
Optionally, overlapping operation is carried out to part memory space in the memory space using first thread;By described in
The memory space that file does not carry out overlapping operation in memory space is labeled as after memory space to be covered, uses the second thread
Overlapping operation is carried out to the memory space that mark is;Wherein, second thread is after the first thread terminates
Start and in running background.
During specific implementation, after the memory space to not carrying out overlapping operation marks, it can also be built again outside main thread
A new thread is found, for carrying out overlapping operation, this mistake to the part memory space for not carrying out overlapping operation among this document
Journey is performed in the thread outside main thread, will not increase the erasing time of file.Due to new thread (i.e. the second thread)
The silent mode deleted can be used to be covered the part memory space for not carrying out overlapping operation among this document on backstage
Operation, such user are not felt by the second thread and perform the file deletion consumed time, meanwhile, main thread (i.e. first thread)
It can continue to perform other operations according to the instruction of user, therefore the time that user's pending file is deleted shortens, and improves use
Experience at family.
Optionally, before above-mentioned steps 11, or, after above-mentioned steps 12, it can also include:Will using random number
The filename of file to be deleted carries out renaming operation;And/or delete the file suffixes name of file to be deleted.
During specific implementation, by the filename of file to be deleted random letters renaming, and remove the suffix name of this document.
In such manner, it is possible to effectively prevent hacker from guesing out file type from filename and suffix name, the security of data is further ensured.Than
Such as, this file of vital document .doc can be represented with X, removed suffix and completed renaming.This step is not implementation of the present invention
The core procedure of example, first step can be placed on and performed, final step execution can also be placed on.
It should be noted that the embodiment of the present invention can use random number to carry out overlapping operation, it can also use to reset and move
Make (writing zero) and carry out overlapping operation;When being acted using clearing, if laws of use interval carries out overlapping operation simultaneously, easy quilt
Hacker finds out regularity, therefore, if being acted with clearing and (being write zero) when carrying out overlapping operation, it is preferred to use randomly generate interval
The mode of byte number is filled in.
For example, Fig. 2 is shown is deleted compared with the structural representation after small documents using the embodiment of the present invention, such as Fig. 2 institutes
Show, 10K file is less than for file size, performs following operation successively from top of file:Producing 4 bytes, (INT is whole
Number) random number, override preceding 4 bytes of file, 12 bytes of then jumping backward (i.e. 12 bytes of sky, 3 INT.This
Place's citing is the data point of fixed intervals), then 4 byte random numbers are produced, 4 current bytes are covered, the like, until
Tail of file.So amount to and destroyed 25% (because thering is a number to be written in interval 12 bytes, that is, four numbers,
Therefore destructive rate is a quarter) file because breakdown point is uniform enough, file has become irrecoverable, can be considered and thoroughly deletes
Except.
For example, Fig. 3 shows the structural representation deleted using the embodiment of the present invention after larger file, such as Fig. 2 institutes
Show, 10K file is more than or equal to for file size, (in general, the head and tail of a file leads to by each 4K of file head and the tail
The important information of file is often included, so preferentially this data at two is destroyed, and head and tail information is generally not too large,
Therefore it can also be provided that each 2K sizes) by performing the progress overlapping operation of above-mentioned steps 12.
It can be seen from the above technical proposal that the part memory space that overlapping operation is carried out in the embodiment of the present invention is interval
Be distributed in whole memory spaces shared by this document, can be it is evenly spaced or unevenly spaced, because
This, after the part memory space shared by file to be deleted has carried out overlapping operation, these capped memory spaces exist
Breakdown point one by one is formed to original in former memory space, due to breakdown point be spaced apart and distribution it is extensive, can
To think that the distribution of these breakdown points is relatively uniform and enough, then file is just substantially reduced by recoverable possibility, the present invention
The complete deletion of file is realized by means of which, so as to ensure that the Information Security of user;Meanwhile the embodiment of the present invention
Overlapping operation only is carried out to the memory space of part, overlapping operation is carried out to whole memory spaces in the prior art so as to shorten
Reach the time of complete deletion file consumption;The embodiment of the present invention can also be deleted according to file size is different using different files
Except rule, therefore, there is the upper limit for larger file erasing time, rather than with file size linear increase;Further,
The memory space for not carrying out overlapping operation in memory space can also be labeled as memory space to be covered by the embodiment of the present invention, be used
Subsequently to carry out overlapping operation to having been labeled as memory space to be covered, so as to realize the purpose of complete deletion file.
Based on identical technical concept, the embodiment of the present invention additionally provides a kind of mobile terminal, and Fig. 4 shows of the invention real
The structural representation of the mobile terminal of example offer is applied, as shown in figure 4, the terminal includes:
Determining unit 41, for determining the memory space shared by file to be deleted;
Capping unit 42, for carrying out overlapping operation to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole storages shared by file to be deleted
In space.
Optionally, the capping unit 42 is specifically used for:Using 1st byte of the file in memory space as rise
Point, using last 1 byte of the file in memory space as terminal, with N1Individual byte is interval, selects N2Individual byte is carried out
Overlapping operation;Wherein, N1And N2It is default positive integer, and N1、N2Total bytes shared by respectively less than described file.
Optionally, the terminal also includes:Judging unit, for it is determined that memory space shared by file to be deleted it
Afterwards, before the memory space progress overlapping operation to part in the memory space, judge shared by the file to be deleted
Whether storage size is less than predetermined threshold value;The capping unit 42 is specifically used for:When shared by the file to be deleted
When memory space is less than predetermined threshold value, overlapping operation is carried out to the memory space of part in the memory space;Wait to delete when described
When being not less than predetermined threshold value except the memory space shared by file, by the N on head of the file in memory spaceaIndividual byte
With the N of afterbodybIndividual byte is identified as needing the memory space for carrying out overlapping operation, needs to carry out overlapping operation to described
The memory space of part carries out overlapping operation in memory space;
Wherein, the NaAnd NbIt is default positive integer, and Na+NbLess than the total bytes shared by the file.
Optionally, the terminal also includes:Indexing unit, for it is described need carry out overlapping operation memory space in
After partial memory space carries out overlapping operation, the file is not carried out to the memory space of overlapping operation in memory space
Labeled as memory space to be covered.
Optionally, the capping unit 42 is covered using first thread to part memory space in the memory space
Operation;The terminal also includes:Unit is deleted, for empty in the storage that the file is not carried out to overlapping operation in memory space
Between be labeled as memory space to be covered after, using the second thread to mark be memory space carry out overlapping operation;
Wherein, second thread starts and in running background after the first thread terminates.
Optionally, the capping unit 42 is additionally operable to:The filename of the file to be deleted is subjected to weight using random number
Naming operation;And/or delete the file suffixes name of the file to be deleted.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
Instruct the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices so that
A stream in flow chart can be achieved by the instruction of the computing device of the computer or other programmable data processing devices
The function of being specified in journey or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices, which provides, to be used to realize the flow or multiple flows and/or block diagram in flow chart
A square frame or multiple square frames in specify function the step of.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (12)
1. the file delet method in a kind of mobile terminal, it is characterised in that this method includes:
Determine the memory space shared by file to be deleted;
Judge whether the storage size shared by the file to be deleted is less than predetermined threshold value;
Overlapping operation is carried out to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole memory spaces shared by file to be deleted
In;
The memory space to part in the memory space carries out overlapping operation, specifically includes:
When the memory space shared by the file to be deleted is not less than predetermined threshold value, by the file in memory space
The N on headaThe N of individual byte and afterbodybIndividual byte is identified as needing the memory space for carrying out overlapping operation, to the needs
The memory space for carrying out part in the memory space of overlapping operation carries out overlapping operation;Wherein, the NaAnd NbIt is default just whole
Number, and Na+NbLess than the total bytes shared by the file.
2. the method as described in claim 1, it is characterised in that the memory space to part in the memory space is carried out
Overlapping operation, specifically include:
Using last 1 word of 1st byte of the file in memory space as starting point, with the file in memory space
Save as terminal, with N1Individual byte is interval, selects N2Individual byte carries out overlapping operation;
Wherein, the N1And N2It is default positive integer, and N1、N2Total bytes shared by respectively less than described file.
3. method as claimed in claim 2, it is characterised in that the memory space to part in the memory space is carried out
Overlapping operation, in addition to:
When the memory space shared by the file to be deleted is less than predetermined threshold value, the storage to part in the memory space
Space carries out overlapping operation.
4. method as claimed in claim 3, it is characterised in that need to carry out in the middle part of the memory space of overlapping operation to described
After the memory space divided carries out overlapping operation, further comprise:
The memory space that the file is not carried out to overlapping operation in memory space is labeled as memory space to be covered.
5. method as claimed in claim 4, it is characterised in that using first thread to partly storage is empty in the memory space
Between carry out overlapping operation;Deposited in the memory space that the file is not carried out to overlapping operation in memory space labeled as to be covered
After storing up space, further comprise:
Overlapping operation is carried out to the memory space that mark is using the second thread;
Wherein, second thread starts and in running background after the first thread terminates.
6. such as the method any one of claim 1-5, it is characterised in that this method also includes:
The filename of the file to be deleted is subjected to renaming operation using random number;And/or
Delete the file suffixes name of the file to be deleted.
7. a kind of mobile terminal, it is characterised in that the terminal includes:
Determining unit, for determining the memory space shared by file to be deleted;
Judging unit, for judging whether the storage size shared by the file to be deleted is less than predetermined threshold value;
Capping unit, for carrying out overlapping operation to the memory space of part in the memory space;
Wherein, the memory space for having carried out overlapping operation is distributed in whole memory spaces shared by file to be deleted
In;
The capping unit, specifically for when the memory space shared by the file to be deleted is not less than predetermined threshold value, inciting somebody to action
The N on head of the file in memory spaceaThe N of individual byte and afterbodybIndividual byte is identified as needing to carry out overlapping operation
Memory space, to it is described need carry out overlapping operation memory space in part memory space carry out overlapping operation;Wherein,
The NaAnd NbIt is default positive integer, and Na+NbLess than the total bytes shared by the file.
8. terminal as claimed in claim 7, it is characterised in that the capping unit is specifically used for:
Using last 1 word of 1st byte of the file in memory space as starting point, with the file in memory space
Save as terminal, with N1Individual byte is interval, selects N2Individual byte carries out overlapping operation;
Wherein, the N1And N2It is default positive integer, and N1、N2Total bytes shared by respectively less than described file.
9. terminal as claimed in claim 8, it is characterised in that the capping unit, be additionally operable to work as the file institute to be deleted
When the memory space of occupancy is less than predetermined threshold value, overlapping operation is carried out to the memory space of part in the memory space.
10. terminal as claimed in claim 9, it is characterised in that the terminal also includes:
Indexing unit, in the memory space for needing to carry out overlapping operation the memory space of part carry out covering behaviour
After work, the memory space that the file is not carried out to overlapping operation in memory space is labeled as memory space to be covered.
11. terminal as claimed in claim 10, it is characterised in that the capping unit is empty to the storage using first thread
Between middle part memory space carry out overlapping operation;The terminal also includes:
Unit is deleted, for the file not carried out to the memory space of overlapping operation in memory space labeled as to be covered
After memory space, overlapping operation is carried out to the memory space that mark is using the second thread;
Wherein, second thread starts and in running background after the first thread terminates.
12. such as the terminal any one of claim 7-11, it is characterised in that the capping unit is additionally operable to:
The filename of the file to be deleted is subjected to renaming operation using random number;And/or delete the file to be deleted
File suffixes name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410472987.7A CN104268184B (en) | 2014-09-16 | 2014-09-16 | File delet method and terminal in a kind of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410472987.7A CN104268184B (en) | 2014-09-16 | 2014-09-16 | File delet method and terminal in a kind of mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104268184A CN104268184A (en) | 2015-01-07 |
CN104268184B true CN104268184B (en) | 2017-11-21 |
Family
ID=52159706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410472987.7A Active CN104268184B (en) | 2014-09-16 | 2014-09-16 | File delet method and terminal in a kind of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104268184B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107943804A (en) * | 2016-10-12 | 2018-04-20 | 中标软件有限公司 | The system and method for data is periodically deleted on mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1532706A (en) * | 2003-03-24 | 2004-09-29 | ��ʿͨ��ʽ���� | Task processor and data managing method in said device |
CN1698130A (en) * | 2003-02-04 | 2005-11-16 | 松下电器产业株式会社 | Semiconductor memory card and computer readable program |
CN101051317A (en) * | 2007-05-11 | 2007-10-10 | 北京中星微电子有限公司 | FAT file system and its processing method |
CN103608866A (en) * | 2013-03-15 | 2014-02-26 | 华为技术有限公司 | Data wiping method and device for flash memory |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8438139B2 (en) * | 2010-12-01 | 2013-05-07 | International Business Machines Corporation | Dynamic rewrite of files within deduplication system |
-
2014
- 2014-09-16 CN CN201410472987.7A patent/CN104268184B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1698130A (en) * | 2003-02-04 | 2005-11-16 | 松下电器产业株式会社 | Semiconductor memory card and computer readable program |
CN1532706A (en) * | 2003-03-24 | 2004-09-29 | ��ʿͨ��ʽ���� | Task processor and data managing method in said device |
CN101051317A (en) * | 2007-05-11 | 2007-10-10 | 北京中星微电子有限公司 | FAT file system and its processing method |
CN103608866A (en) * | 2013-03-15 | 2014-02-26 | 华为技术有限公司 | Data wiping method and device for flash memory |
Also Published As
Publication number | Publication date |
---|---|
CN104268184A (en) | 2015-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150317246A1 (en) | Memory Reclamation Method and Apparatus | |
CN103677977B (en) | Method and device for cleaning temporary files in mobile terminal and the mobile terminal | |
CN105204781B (en) | Compression method, device and equipment | |
CN105718272B (en) | A kind of method and terminal of terminal factory reset | |
JP2008112445A (en) | Apparatus and method for managing nonvolatile memory | |
CN106897141A (en) | The processing method and processing device of information | |
CN105956035A (en) | File storage method and device | |
EP3196767B1 (en) | Method for writing data into flash memory device, flash memory device and storage system | |
CN103984743B (en) | A kind of method and device of managing internal memory resource | |
WO2020233046A1 (en) | Cache file management method and apparatus, computer device, and storage medium | |
CN107590144A (en) | A kind of file memory method and terminal | |
CN106649146A (en) | Memory release method and apparatus | |
CN105260674A (en) | Screen capture processing method and apparatus and intelligent terminal | |
CN106126731A (en) | A kind of method and device obtaining Elasticsearch paged data | |
CN104268184B (en) | File delet method and terminal in a kind of mobile terminal | |
TW201617940A (en) | Compression of cascading style sheet files | |
CN106598508A (en) | Solid-state hard disc and write-in arbitrating method and system thereof | |
CN105068718A (en) | Information processing method and electronic device | |
CN105487939A (en) | Flash memory file data recovery method and apparatus | |
CN106569683A (en) | Method and equipment for performing batch processing of applications on mobile terminal | |
CN107912063A (en) | A kind of method for recovering internal storage and device | |
CN105302485B (en) | A kind of safe method for deleting and device | |
CN103544302B (en) | The partition maintenance method and device of database | |
CN106896990A (en) | The discharging method and device of a kind of application program | |
CN103246426B (en) | It is a kind of to realize the method and device handled multiple icons |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |