CN107391308A - Data processing method and device, terminal and computer-readable recording medium - Google Patents

Data processing method and device, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107391308A
CN107391308A CN201710626375.2A CN201710626375A CN107391308A CN 107391308 A CN107391308 A CN 107391308A CN 201710626375 A CN201710626375 A CN 201710626375A CN 107391308 A CN107391308 A CN 107391308A
Authority
CN
China
Prior art keywords
data
instruction
deleted
delete
deletion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710626375.2A
Other languages
Chinese (zh)
Inventor
吴章金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201710626375.2A priority Critical patent/CN107391308A/en
Publication of CN107391308A publication Critical patent/CN107391308A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • G06F16/125File system administration, e.g. details of archiving or snapshots using management policies characterised by the use of retention policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • G06F3/0649Lifecycle management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of data processing method, the data processing method includes:Receive data and delete instruction;It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, and is hidden the data in original display location according to the mark.The invention also discloses a kind of data processing equipment, terminal and computer-readable recording medium.The present invention can miss deletion to data and protect, avoid data from deleting the data loss problem brought by mistake in data deletion action.

Description

Data processing method and device, terminal and computer-readable recording medium
Technical field
The present invention relates to field of terminal technology, and in particular to a kind of data processing method and device, terminal and computer can Read storage medium.
Background technology
When using terminals such as mobile phone, flat boards, because Insufficient disk space or daily data preparation need, it is usually directed to Acted to data deletion.When user is deleting data mistake delete originally be not desired to delete data, now unless with The data backup that family will delete by mistake in advance is into remote server, and otherwise not effective method is by data recovery.However, It is not that each user can do data backup during actual use, if not often led to data backup after deleting data by mistake Loss of data, used for user and bring unnecessary trouble.
In the prior art, except that by data backup, can also be avoided in advance by recycle bin in computer and server Data loss problem data are deleted by mistake caused by.The data that will first delete are stored in recycle bin, but this can be related to File and a large amount of of resource frequently carry, therefore the operation that largely can be read and write in disk, for mobile phone, flat board etc. For take this approach the service life of the storage medium that can have a strong impact on terminal.
The content of the invention
, can be with consideration of it, be necessary to provide a kind of data processing method and device, terminal and computer-readable recording medium In data deletion action, deletion is missed to data and protected, avoids data from deleting the data loss problem brought by mistake.
On the one hand the embodiment of the present invention provides a kind of data processing method, methods described includes:
Receive data and delete instruction;
It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, will according to the mark The data are hidden in original display location.
In alternatively possible implementation, the data processing method also includes:
Judge that the data delete whether instruction meets preparatory condition;
If the data, which delete instruction, meets preparatory condition, perform the mark data and delete what instruction instruction was deleted Data are recoverable weak deletion data, the operation for being hidden the data in original display location according to the mark.
In alternatively possible implementation, the data delete instruction and meet that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
In alternatively possible implementation, the data processing method also includes:
If receiving the data recovery instruction for recovering the data, safety certification is carried out;
If through safety certification, the data recovery is included in the original display location according to the mark.
In alternatively possible implementation, the data processing method also includes:
When the remaining disk space of the terminal is less than target capacity, the disk space by the data from the terminal Upper removal.
In alternatively possible implementation, the data processing method also includes:
After the data are hidden in the original display location, update and show the surplus of the original display location Remaining memory capacity.
It is described to update and show the remaining memory capacity of the original display location in alternatively possible implementation Including:
The current remaining memory capacity in the original display location is added to the size of the data, obtained described original Display location renewal after remaining memory capacity;
Show the remaining memory capacity after the original display location renewal.
On the other hand the embodiment of the present invention additionally provides a kind of data processing equipment, described device includes:
Receiving module, instruction is deleted for receiving data;
Data processing module, the data that instruction instruction deletion is deleted for identifying the data are recoverable weak deletion number According to the data are hidden in original display location according to the mark.
In alternatively possible implementation, described device also includes:
Judge module, for judging that the data delete whether instruction meets preparatory condition;
Trigger module, if deleting instruction for the data meets preparatory condition, trigger the data processing module mark It is recoverable weak deletion data that the data, which delete the data that instruction instruction is deleted, according to the mark by the data in original The display location come hides.
In alternatively possible implementation, the data delete instruction and meet that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
In alternatively possible implementation, described device also includes:
Security authentication module, if recovering the data recovery instruction of the data for receiving, carry out safety certification;
Recovery module, if for through safety certification, being included the data recovery in the original according to the mark The display location come.
In alternatively possible implementation, described device also includes:
Remove module, for when the remaining disk space of the terminal is less than target capacity, by the data from described Removed on the disk space of terminal.
In alternatively possible implementation, described device also includes:
Update module, for after the data are hidden in the original display location, updating and showing described original Display location remaining memory capacity.
In alternatively possible implementation, the update module is specifically used for:
After the data are hidden in the original display location, the current residue in the original display location is deposited The size that capacity adds the data is stored up, obtains the remaining memory capacity after the original display location renewal;
Show the remaining memory capacity after the original display location renewal.
Another further aspect of the embodiment of the present invention also provides a kind of terminal, and the terminal includes processor, and the processor is used for The step of above-mentioned data processing method being realized when performing the computer program stored in memory.
The another aspect of the embodiment of the present invention also provides a kind of computer-readable recording medium, is stored thereon with computer and refers to Order, the step of computer instruction realizes above-mentioned data processing method when being executed by processor.
By above technical scheme, in of the invention, electronic equipment can receive data and delete instruction;Further, electronics is set Indicate that the data of deletion are recoverable weak deletion data for the data deletion instruction can be identified, identified according to described by institute Data are stated to hide in original display location.The data that instruction instruction deletion is deleted due to data are hidden in original display location Hide, therefore the data of deletion are can't see in original display location user so that user thinks that the data have been deleted.Meanwhile Because the data for not deleting data deletion instruction instruction are mobile or removed from disk, only by data deletion instruction instruction The data of deletion are marked, so data can't lose, can be retrieved, meanwhile, data are marked without The disk space of terminal carries out excessive read-write operation, effectively protects the service life of disk.To sum up, the present invention can be in number During according to deletion action, deletion is missed to data and protected, avoids data from deleting the data loss problem brought by mistake.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of data processing method provided in an embodiment of the present invention.
Fig. 2 is a kind of flow chart for data processing method that another embodiment of the present invention provides.
Fig. 3 is a kind of flow chart for data processing method that further embodiment of this invention provides.
Fig. 4 is the functional block diagram of data processing equipment provided in an embodiment of the present invention.
Fig. 5 is the functional block diagram for the data processing equipment that another embodiment of the present invention provides.
Fig. 6 is the functional block diagram for the data processing equipment that further embodiment of this invention provides.
Fig. 7 is the schematic diagram of terminal provided in an embodiment of the present invention.
Following embodiment will combine above-mentioned accompanying drawing and further illustrate the present invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying example, the present invention will be described in detail.It should be noted that in the case where not conflicting, embodiments herein and embodiment In feature can be mutually combined.
Elaborate many details in the following description to facilitate a thorough understanding of the present invention, described embodiment only Only it is part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment
Fig. 1 is the schematic flow diagram of data processing method provided in an embodiment of the present invention.As shown in figure 1, data processing side Method may include following steps:
S101:Receive data and delete instruction.
Data processing method of the present invention can be applied to terminal, and the terminal can be mobile phone, tablet personal computer, intelligence The electronic equipments such as wrist-watch.
It is to delete the instruction of the specified data in terminal that above-mentioned data, which delete instruction,.Data are deleted may include to delete in instruction The data address and data content removed.
Above-mentioned data are deleted instruction and can sent by user.For example, user chooses the file to be deleted, then click on deletion and press Button, if terminal detects the operation, it is determined that user have issued data and delete instruction.
Above-mentioned data are deleted instruction and can also be when default deletion condition meets, the data of terminal triggering delete instruction. For example, when the access frequency of certain data is less than predetermined threshold value, trigger data deletes instruction and the data such as deletes.Specifically Default deletion condition can be set as needed.
S102:It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, according to described Mark hides the data in original display location.
It is to send the data to be deleted of sender that data delete instruction that above-mentioned data, which delete the data that instruction instruction is deleted,.
It is that recoverable weak deletion data are to the number to be deleted that above-mentioned mark data, which deletes the data that instruction instruction is deleted, According to being marked.Specifically, can be that the data to be deleted add flag attributes, and it be the attribute assignment.Assigning what value can be with Preset as needed.For example, the flag property values for the data that will be deleted are set to 0, it is for the data to be deleted of expression Recoverable weak deletion data.
Refer to the data have been carried out to delete mark and the data if data are identified as recoverable weak deletion data It can be resumed.
Meanwhile when the data that data are deleted with instruction instruction deletion are identified, the size of the data can be deleted The relevant informations such as time are all identified or recorded.The information of mark can also be preserved with single database.
By above step S101 and S102, when receiving data deletion instruction, the data to be deleted can't be direct Remove from the disk space of terminal, only marked, still can be recovered.And the present invention is not to former number According to any modification and mobile operation is carried out, so as to reduce the read-write of disk, disk is protected.
During specific implementation, the flow that delete data can also be adjusted, when receiving data deletion instruction, only first Perform above-mentioned steps S101 and S102 data are identified, when user herein by the data complete deletion when, just by data Thoroughly removed from the disk space of terminal.
Meanwhile after being identified to the data to be deleted, the data that will be deleted according to mark are in original display position Put hiding.Wherein, hidden in original display location and refer to all see in the various interfaces such as the file browser of terminal Or access the data to be deleted.
After the data that will be deleted are hidden in original display location, user can not be from original display location intuitively See the data, give user a kind of visual experience for having completed to delete, otherwise user can think that data are not deleted, and then repeat Perform and either produce puzzlement.
Can be in the mode that original display location hides by data according to mark specifically, in display data, if Data Identification is recoverable weak deletion data, then is not shown the data.
The embodiment of the present invention deletes instruction by receiving data;Identifying the data that the data deletion instruction instruction is deleted is Recoverable weak deletion data, the data are hidden in original display location according to the mark.Deleted and referred to due to data The data that order instruction is deleted are hidden in original display location, therefore can't see the number of deletion in original display location user According to so that user thinks that the data have been deleted.Simultaneously as the data that data are not deleted to instruction instruction deletion move Or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so data can't lose, can To be retrieved, meanwhile, data are marked and carry out excessive read-write operation without the disk space in terminal, are effectively protected The service life of disk.To sum up, the present invention can miss deletion to data and protect, avoid data in data deletion action The data loss problem brought is deleted by mistake.
Embodiment
Fig. 2 is the schematic flow diagram for the data processing method that another embodiment of the present invention provides.As shown in Fig. 2 at data Reason method may include following steps:
S201:Receive data and delete instruction.
Step S201 is consistent with step S101 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment Rapid S101 associated description, is not repeated herein.
S202:Judge that the data delete whether instruction meets preparatory condition.
In the present embodiment, after receiving data and deleting instruction, instruction can be deleted to data and judged, specifically judged The data delete whether instruction meets preparatory condition.
Above-mentioned preparatory condition can be set as needed.For example, judge whether the sender that the data delete instruction is pre- If sender, it can verify that data delete the sender of instruction by carrying out the modes such as fingerprint authentication or cipher authentication.If data The sender for deleting instruction is not default sender, then data is not removed completely when deleting, i.e., data are incomplete Removed from the disk space of terminal, it is recoverable weak deletion that data described in terminal iidentification, which delete the data that instruction instruction is deleted, Data, the data are hidden in original display location according to the mark, to prevent other users from deleting terminal owner The data preserved in terminal.
S203:If the data, which delete instruction, meets preparatory condition, identify the data and delete the number that instruction instruction is deleted According to for recoverable weak deletion data, the data are hidden in original display location according to the mark.
Explanation about step S203 can be found in the description of step S102 in previous embodiment, in the present embodiment described in mark It is recoverable weak deletion data that data, which delete the data that instruction instruction is deleted, according to the mark by the data original Display location hides consistent with previous embodiment step S102.
When data, which delete instruction, meets preparatory condition, step S203 operation is just performed, data deletion can carried out When the different data in terminal are carried out with the deletions of different modes.
Further, above-mentioned data deletion instruction meets that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
The weak deletion instruction that above-mentioned data delete instruction to recover data, i.e., can have at least two in terminal Kind data delete instruction.Such as it is strong delete instruction and weak delete instructs, it is above-mentioned it is strong delete instruction be used for the data that will delete from Removed completely on the disk space of terminal, the above-mentioned weak Data Identification for deleting instruction for that will delete is recoverable weak deletion Data.When the deletion instruction of above-mentioned data is only weak deletion instruction, just performs the data deletion instruction instruction of above-mentioned mark and delete The data removed are recoverable weak deletion data, the step for being hidden the data in original display location according to the mark Suddenly.Specifically, user can provide a variety of deletion action buttons in operation, specifically carry out which kind of deletion is grasped for user's selection Make.It can also give tacit consent to when user deletes and select weak deletion, user, can voluntarily select to delete by force whenever necessary.Meanwhile The methods of font color can also be passed through, reminds the consequence brought that user deletes by force, for example the font of weak deletion is arranged into green Color, the font deleted by force is arranged to red, the data that prompting user deletes by force when user selects strong delete can be completely from end Removed on the disk space at end, it is irrecoverable.
Above-mentioned specified type is can to include but is not limited to mp4 with data type set in advance, such as specified type The data type of form, the data type of pdf forms, data type of jpg forms etc..When data delete what instruction instruction was deleted When data are the data of instruction type, it is recoverable just to perform the above-mentioned mark data and delete the data that instruction instruction is deleted Weak deletion data, the step for being hidden the data in original display location according to the mark.Refer to if data delete instruction The data for showing deletion are the other kinds of data beyond instruction type, then can use other data-erasure methods or direct Data are removed from the disk space of terminal.
For example, due to when system upgrade or application renewal when, legacy version (such as number of apk forms of these application files According to) delete and usually not delete necessity of protection by mistake, and the file or file (such as jpg lattice edited of user that user downloads The data of formula, data of word forms etc.) it is generally just critically important.Therefore it is jpg and word lattice by the data setting of specified type Formula data.It is when the data that data delete instruction instruction deletion are the data either data of word forms of jpg forms, then right The data are identified, and are hidden the data in original display location according to mark.When data delete the number of instruction deletion During according to data for apk forms, then it is directly removed from the disk space of terminal.
Above-mentioned assigned catalogue is can be with the storing directory of data set in advance, when data delete the number of instruction instruction deletion During according to being the data being stored under the catalogue specified, just performing the above-mentioned mark data and delete the data that instruction instruction is deleted and be Recoverable weak deletion data, the step for being hidden the data in original display location according to the mark.If data are deleted Except instructing the data that instruction is deleted to be the data under other catalogues in addition to being stored in assigned catalogue, then other data can be used Delet method directly removes data from the disk space of terminal.For example, generally the photo of camera shooting and bluetooth connect The file of receipts may be important, and the photo of camera shooting is commonly stored under entitled camera catalogue, and bluetooth receives Data be commonly stored under entitled bluetooth catalogue, therefore specified storing directory can be defined as entitled The catalogue of camera catalogue and entitled bluetooth.
Above-mentioned designated storage area is can be with the storage address of data set in advance, such as designated storage area is Sdcard. When the data that data delete instruction instruction deletion are the data being stored in Sdcard, just perform the above-mentioned mark data and delete Except the data that instruction instruction is deleted are recoverable weak deletion data, according to the mark by the data in original display position Put hiding step.It is the number being stored in other memory blocks beyond Sdcard that if data, which delete the data that instruction instruction is deleted, According to can then use and other data-erasure methods or directly remove data from the disk space of terminal.
It is understood that when judging whether data deletion instruction meets preparatory condition, can be by judging data The no weak deletion data for that can be recovered to data, judge that data delete whether the data that instruction instruction is deleted are specified type Data, judge that data delete whether the data that instruction instruction is deleted are data under assigned catalogue, judge that data delete instruction Whether the data for indicating to delete are that any of the data of designated storage area this several determination methods or at least two combine Row judges, to determine that data delete whether instruction meets preparatory condition, carries out performing corresponding deletion action.
S204:After the data are hidden in original display location, update and show the original display location Remaining memory capacity.
If certain data markers is weak deletion data, and invisible in original display location, the number will can be originally shown According to the remaining memory capacity of memory space be updated.
Further, update and show that the remaining memory capacity of the original display location includes:
The current remaining memory capacity in the original display location is added to the size of the data, obtained described original Display location renewal after remaining memory capacity;
Show the remaining memory capacity after the original display location renewal.
The size for the data being marked will not be included in the size of remaining memory capacity, then the storage that user sees is empty Between become big really, user is not produced doubt when deleting data, the consistent of interface display and deletion action can be kept Property.
Due to being identified as the data of weak deletion and non-fully being removed from the disk of terminal, therefore the actual magnetic used Disk space can be thought more than user.After if actual disk space has been expired, it is still necessary to the magnetic by partial data from terminal Removed completely on disk, to preserve new data.
In another embodiment of the present invention, data processing method of the present invention also includes:
When the remaining disk space of the terminal is less than target capacity, the disk space by the data from the terminal Upper removal.
The remaining disk space of above-mentioned terminal is remaining available disk space in terminal.
The size of above-mentioned target capacity can be the fixed value pre-set.Such as the size of target capacity is 20M, then when When the size of the target capacity of remaining disk space is less than 20M, the disk by the identified data for weak deletion data from terminal Spatially remove.
The size of above-mentioned target capacity can also be the value of the behaviour in service dynamic change according to terminal.Such as present terminal The size for the voice data for needing to preserve is 10M, it is determined that the big I of target capacity is 10M.If the now remanence of terminal When disk space is less than 10M, the identified data for weak deletion data are removed from the disk space of terminal.
Specifically when by being removed on disk space of the data from terminal, interface can be deleted with display data, be selected for user The data which has been labeled as weak deletion data to are taken to delete.
It can also be and deleted data according to certain priority according to other pre-defined rules.For example, according to wound The sequencing for building time or last access time is deleted, and is first deleted and is created earliest data or access time earliest number According to;Either deleted according to the size of data, first delete the data of maximum;Or entered according to the backup instances of data Row is deleted, and the data for having done backup operation are deleted, and further to improve security when data are deleted, avoids counting According to loss;It can also be and deleted according to the history access times of data, the minimum data of first deleting history access times.
The method deleted of data for being identified as weak deletion data be not limited to it is above-mentioned several, can be with root The rule do not mentioned according to other is deleted or random deleted etc..When deleting data, deletion Size the remaining disk space of terminal can be defined after deletion more than preset capacity, and specific preset capacity can be as needed Set or and depending on the actual use situation of terminal is random.
The embodiment of the present invention is by after receiving data and deleting instruction, deleting instruction to data and judging, in data When deletion instruction meets preparatory condition, it is recoverable weak deletion number just to identify the data and delete the data that instruction instruction is deleted According to the data are hidden in original display location according to the mark.Can be by the data in terminal with different data Deletion mode is deleted, and the data in terminal is deleted mode more diversification.The anti-error data deleted of needs can be protected, To not needing the anti-error data deleted to carry out the deletion of other forms, such as directly remove, it is possible to reduce the redundancy of data in terminal. Hidden simultaneously as data delete the data that instruction instruction is deleted in original display location, therefore in original display location User can't see the data of deletion so that user thinks that the data have been deleted.And due to data deletion instruction not being referred to To show the data movement of deletion or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so Data can't lose, and can be retrieved, and therefore, can miss deletion to data and protect, avoid data from deleting what is brought by mistake Data loss problem.And data processing method provided by the invention only data is marked without the disk space in terminal Excessive read-write operation is carried out, effectively protects the service life of disk, deletion is missed to data and protected, avoids data from deleting by mistake Except the data loss problem brought.
Embodiment
Fig. 3 is the schematic flow diagram for the data processing method that further embodiment of this invention provides.As shown in figure 3, at data Reason method may include following steps:
S301:Receive data and delete instruction.
Step S301 is consistent with step S101 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment Rapid S101 associated description, is not repeated herein.
S302:It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, according to described Mark hides the data in original display location.
Step S302 is consistent with step S102 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment Rapid S102 associated description, is not repeated herein.
S303:If receiving the data recovery instruction for recovering the data, safety certification is carried out.
Above-mentioned data recovery instruction can be sent by user.It can specifically be shown on human-computer interaction interface for data The interface of recovery, and shown data recovery according to the selection of user.Specifically, due to hidden by identifying the data that will be deleted Hide, therefore when recovering to show, can also be recovered the data to be deleted before by the way that the mark is removed.
For example, user by an interface have access to it is foregoing preserve mark database, and then by retrieval find it is desired The data of recovery, or by one delete list find want recovery data, find want recovery data after lead to Cross and remove the mark of the data to recover the data.
When recovering to data, in order to ensure that the security of data, such as possible user are not intended to other users and seen To these data, or recover these data.Therefore can be in safety certification by rear, just by the data recovery.
Above-mentioned safety certification can include carrying out user finger print identifying, cipher authentication, iris authentication etc. by user It is identified to be authenticated.
Above-mentioned safety certification, which can also be, judges whether the place to use of terminal is the modes such as common site to carry out safety Certification.
S304:If through safety certification, the data recovery is included in the original display according to the mark Position.
If through safety certification, it will include labeled as the data recovery of weak deletion in original display location.I.e. in number After recovery, the data of recovery can be checked under original Display directory, while can also be at the interface for being currently used in data recovery List in directly display the data to be recovered.
Meanwhile certification not by when, can not perform according to it is described deletion information by the data recovery include in institute The operation of original display location is stated, prompting message can also be sent to the terminal that user binds, remind user there are other users Safety certification has been carried out to attempt to access or recover data.Through safety certification, the data preserved in terminal can further be improved Security.
The embodiment of the present invention is deleted data after deleting instruction by receiving data, and extensive receiving data Data are recovered after multiple instruction.If during so that there is data mistake deletion, it can be instructed and be given for change by data recovery, realized The purpose protected is deleted by mistake to data, avoids data from deleting the data loss problem brought by mistake.Meanwhile carried out in data extensive When multiple, safety certification is first carried out, protects the security of data in terminal.
Above is the detailed description carried out to method provided by the present invention.According to different demands, in shown flow chart The execution sequence of square can change, and some squares can omit, and data processing method can also be in above-mentioned data processing method Middle selective is applied in combination, or is applied in combination with other above-mentioned NM data processing methods.Below to institute of the present invention The device of offer is described.
Embodiment
Fig. 4 is the structure chart of data processing equipment provided in an embodiment of the present invention, as shown in figure 4, data processing equipment can With including:Receiving module 410 and data processing module 420.
Receiving module 410, instruction is deleted for receiving data.
Data processing equipment of the present invention can be applied to terminal, and the terminal can be mobile phone, tablet personal computer, intelligence The electronic equipments such as wrist-watch.
It is to delete the instruction of the specified data in terminal that above-mentioned data, which delete instruction,.Data are deleted may include to delete in instruction The data address and data content removed.
Above-mentioned data are deleted instruction and can sent by user.For example, user chooses the file to be deleted, then click on deletion and press Button, if terminal detects the operation, it is determined that user have issued data and delete instruction.
Above-mentioned data delete instruction can also be when default deletion condition meets, the data of triggering terminal delete instruction.Example Such as, when the access frequency of certain data is less than predetermined threshold value, trigger data deletes instruction and the data such as deletes.It is specific pre- If the condition of deletion can be set as needed.
Data processing module 420, data that instruction instruction deletes are deleted for identifying the data and weak are deleted to be recoverable Except data, the data are hidden in original display location according to the mark.
It is to send the data to be deleted of sender that data delete instruction that above-mentioned data, which delete the data that instruction instruction is deleted,.
It is that recoverable weak deletion data are to the number to be deleted that above-mentioned mark data, which deletes the data that instruction instruction is deleted, According to being marked.Specifically, can be that the data to be deleted add flag attributes, and it be the attribute assignment.Assigning what value can be with Preset as needed.For example, the flag property values for the data that will be deleted are set to 0, it is for the data to be deleted of expression Recoverable weak deletion data.
Refer to the data have been carried out to delete mark and the data if data are identified as recoverable weak deletion data It can be resumed.
Meanwhile when the data that data are deleted with instruction instruction deletion are identified, the size of the data can be deleted The relevant informations such as time are all identified or recorded.The information of mark can also be preserved with single database.
Then when receiving data deletion instruction, the data to be deleted can't be removed directly from the disk of terminal, only Marked, still can be recovered.And the present invention does not carry out any modification and mobile behaviour to former data Make, so as to reduce the read-write of disk, protect disk.
During specific implementation, when receiving data deletion instruction, can only it first pass through at above-mentioned receiving module 410 and data Module 420 is managed by data markers, when user herein by the data complete deletion when, just by other removing modules by data Thoroughly removed from the disk space of terminal.
Meanwhile data processing module 420 is to the data to be deleted after being identified, the number that will be deleted always according to mark Hidden according in original display location.Wherein, original display location hide refer to it is various in the file browser of terminal etc. It can not all see in interface or access the data to be deleted.
After the data that will be deleted are hidden in original display location, user can not be from original display location intuitively See the data, give user a kind of visual experience for having completed to delete, otherwise user can think that data are not deleted, and then repeat Perform and either produce puzzlement.
Can be in the mode that original display location hides by data according to mark specifically, in display data, if Data Identification is recoverable weak deletion data, then is not shown the data.
The embodiment of the present invention deletes instruction by receiving data;Identifying the data that the data deletion instruction instruction is deleted is Recoverable weak deletion data, the data are hidden in original display location according to the mark.Deleted and referred to due to data The data that order instruction is deleted are hidden in original display location, therefore can't see the number of deletion in original display location user According to so that user thinks that the data have been deleted.Simultaneously as the data that data are not deleted to instruction instruction deletion move Or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so data can't lose, can To be retrieved, meanwhile, data are marked and carry out excessive read-write operation without the disk space in terminal, are effectively protected The service life of disk.To sum up, the present invention can miss deletion to data and protect, avoid data in data deletion action The data loss problem brought is deleted by mistake.
Embodiment
Fig. 5 is the structure chart for the data processing equipment that another embodiment of the present invention provides, as shown in figure 5, data processing fills Putting to include:Receiving module 410, data processing module 420, judge module 430, trigger module 440, the and of update module 450 Remove module 460.
Receiving module 410, instruction is deleted for receiving data.
Receiving module 410 is consistent with receiving module 410 in previous embodiment in the present embodiment, referring specifically to foregoing implementation The associated description of receiving module 410, is not repeated herein in example.
Judge module 430, for judging that the data delete whether instruction meets preparatory condition.
In the present embodiment, after receiving data and deleting instruction, instruction can be deleted to data by judge module 430 and carried out Judge, specifically judge that the data delete whether instruction meets preparatory condition.
Above-mentioned preparatory condition can be set as needed.For example, judge whether the sender that the data delete instruction is pre- If sender, it can verify that data delete the sender of instruction by carrying out the modes such as fingerprint authentication or cipher authentication.If data The sender for deleting instruction is not default sender, then data is not removed completely when deleting, i.e., data are incomplete Removed from the disk space of terminal, it is recoverable weak deletion that data described in terminal iidentification, which delete the data that instruction instruction is deleted, Data, the data are hidden in original display location according to the mark, to prevent other users from deleting terminal owner The data preserved in terminal.
Trigger module 440, if deleting instruction for the data meets preparatory condition, trigger the data processing module mark It is recoverable weak deletion data to know the data to delete the data that instruction instruction is deleted, and the data are existed according to the mark Display location originally hides.
When data, which delete instruction, meets preparatory condition, the trigger data processing module 420 of trigger module 440 performs operation, When carrying out data deletion the different data in terminal can be carried out with the deletion of different modes.
Data processing module 420, data that instruction instruction deletes are deleted for identifying the data and weak are deleted to be recoverable Except data, the data are hidden in original display location according to the mark.
Data processing module 420 is consistent with data processing module 420 in previous embodiment in the present embodiment, referring specifically to The associated description of data processing module 420, is not repeated herein in previous embodiment.
Further, above-mentioned data deletion instruction meets that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
Relevant data delete instruction and meet that the detailed description of preparatory condition can be found in preceding method embodiment, relevant data The description that instruction meets preparatory condition is deleted, is not discussed here.
In the present embodiment, the remaining memory capacity that can also be shown by update module 450 to disk space is carried out more Newly.
Update module 450, for after the data are hidden in the original display location, updating and showing the original The remaining memory capacity for the display location come.
If certain data markers is weak deletion data, and invisible in original display location, the number will can be originally shown According to the remaining memory capacity of memory space be updated.
Further, the update module 450 is specifically used for:
After the data are hidden in the original display location, the current residue in the original display location is deposited The size that capacity adds the data is stored up, obtains the remaining memory capacity after the original display location renewal;
Show the remaining memory capacity after the original display location renewal.
The size for the data being marked will not be included in the size of remaining memory capacity, then the storage that user sees is empty Between become big really, user is not produced doubt when deleting data, the consistent of interface display and deletion action can be kept Property.
Due to being identified as the data of weak deletion and non-fully being removed from the disk of terminal, therefore the actual magnetic used Disk space can be thought more than user.After if actual disk space has been expired, it is still necessary to the magnetic by partial data from terminal Removed completely on disk, to preserve new data.
In the present embodiment, the data preserved on disk space can also be cleared up by remove module 460.
Remove module 460, for when the remaining disk space of the terminal is less than target capacity, by the data from institute State and removed on the disk space of terminal.
The remaining disk space of above-mentioned terminal is remaining available disk space in terminal.
The size of above-mentioned target capacity can be the fixed value pre-set.Such as the size of target capacity is 20M, then when When the size of the target capacity of remaining disk space is less than 20M, the disk by the identified data for weak deletion data from terminal Spatially remove.
The size of above-mentioned target capacity can also be the value of the behaviour in service dynamic change according to terminal.Such as present terminal The size for the voice data for needing to preserve is 10M, it is determined that the big I of target capacity is 10M.If the now remanence of terminal When disk space is less than 10M, the identified data for weak deletion data are removed from the disk space of terminal.
Specifically when by being removed on disk space of the data from terminal, interface can be deleted with display data, be selected for user The data which has been labeled as weak deletion data to are taken to delete.
It can also be and deleted data according to certain priority according to other pre-defined rules.For example, according to wound The sequencing for building time or last access time is deleted, and is first deleted and is created earliest data or access time earliest number According to;Either deleted according to the size of data, first delete the data of maximum;Or entered according to the backup instances of data Row is deleted, and the data for having done backup operation are deleted, and further to improve security when data are deleted, avoids counting According to loss;It can also be and deleted according to the history access times of data, the minimum data of first deleting history access times.
The method deleted of data for being identified as weak deletion data be not limited to it is above-mentioned several, can be with root The rule do not mentioned according to other is deleted or random deleted etc..When deleting data, deletion Size the remaining disk space of terminal can be defined after deletion more than preset capacity, and specific preset capacity can be as needed Set or and depending on the actual use situation of terminal is random.
The embodiment of the present invention is by after receiving data and deleting instruction, deleting instruction to data and judging, in data When deletion instruction meets preparatory condition, it is recoverable weak deletion number just to identify the data and delete the data that instruction instruction is deleted According to the data are hidden in original display location according to the mark.Can be by the data in terminal with different data Deletion mode is deleted, and the data in terminal is deleted mode more diversification.The anti-error data deleted of needs can be protected, To not needing the anti-error data deleted to carry out the deletion of other forms, such as directly remove, it is possible to reduce the redundancy of data in terminal. Hidden simultaneously as data delete the data that instruction instruction is deleted in original display location, therefore in original display location User can't see the data of deletion so that user thinks that the data have been deleted.And due to data deletion instruction not being referred to To show the data movement of deletion or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so Data can't lose, and can be retrieved, and therefore, can miss deletion to data and protect, avoid data from deleting what is brought by mistake Data loss problem.And data processing method provided by the invention only data is marked without the disk space in terminal Excessive read-write operation is carried out, effectively protects the service life of disk, deletion is missed to data and protected, avoids data from deleting by mistake Except the data loss problem brought.
Embodiment
Fig. 6 is the structure chart for the data processing equipment that further embodiment of this invention provides, as shown in figure 4, data processing fills Putting to include:Receiving module 410 and data processing module 420.
Receiving module 410, instruction is deleted for receiving data.
Step S301 is consistent with step S101 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment Rapid S101 associated description, is not repeated herein.
Data processing module 420, data that instruction instruction deletes are deleted for identifying the data and weak are deleted to be recoverable Except data, the data are hidden in original display location according to the mark.
Data processing module 420 is consistent with data processing module 420 in previous embodiment in the present embodiment, referring specifically to The associated description of data processing module 420 in previous embodiment, here is omitted.
Security authentication module 470, if recovering the data recovery instruction of the data for receiving, carry out safety certification.
Above-mentioned data recovery instruction can be sent by user.It can specifically be shown on human-computer interaction interface for data The interface of recovery, and shown data recovery according to the selection of user.Specifically, due to hidden by identifying the data that will be deleted Hide, therefore when recovering to show, can also be recovered the data to be deleted before by the way that the mark is removed.
For example, user by an interface have access to it is foregoing preserve mark database, and then by retrieval find it is desired The data of recovery, or by one delete list find want recovery data, find want recovery data after lead to Cross and remove the mark of the data to recover the data.
When recovering to data, in order to ensure that the security of data, such as possible user are not intended to other users and seen To these data, or recover these data.Therefore can be in safety certification by rear, just by the data recovery.
Above-mentioned safety certification can include carrying out user finger print identifying, cipher authentication, iris authentication etc. by user It is identified to be authenticated.
Above-mentioned safety certification, which can also be, judges whether the place to use of terminal is the modes such as common site to carry out safety Certification.
Recovery module 480:If through safety certification, the data recovery is included described original according to the mark Display location.
If through safety certification, it will include labeled as the data recovery of weak deletion in original display location.I.e. in number After recovery, the data of recovery can be checked under original Display directory, while can also be at the interface for being currently used in data recovery List in directly display the data to be recovered.
Meanwhile certification not by when, can not perform according to it is described deletion information by the data recovery include in institute The operation of original display location is stated, prompting message can also be sent to the terminal that user binds, remind user there are other users Safety certification has been carried out to attempt to access or recover data.Through safety certification, the data preserved in terminal can further be improved Security.
The embodiment of the present invention is deleted data after deleting instruction by receiving data, and extensive receiving data Data are recovered after multiple instruction.If during so that there is data mistake deletion, it can be instructed and be given for change by data recovery, realized The purpose protected is deleted by mistake to data, avoids data from deleting the data loss problem brought by mistake.Meanwhile carried out in data extensive When multiple, safety certification is first carried out, protects the security of data in terminal.
Embodiment
Fig. 7 is refer to, Fig. 7 is the schematic diagram of terminal 1 provided in an embodiment of the present invention.The terminal 1 include memory 20, Processor 30 and the computer program 40 that can be run in the memory 20 and on the processor 30 is stored in, such as counted According to processing routine.The processor 30 realizes the step in above-mentioned data processing method embodiment when performing the computer program 40 Suddenly, step S101~S102 such as shown in Fig. 1, step S201~S204 shown in Fig. 2, step S301 shown in Fig. 3~ S304.Or the processor 30 realizes each module/unit in said apparatus embodiment when performing the computer program 40 Function, such as module 410~420, or module 410~460, or module 410~420 and module 470~480.
Exemplary, the computer program 40 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 20, and are performed by the processor 30, to complete the present invention.Described one Individual or multiple module/units can be the series of computation machine programmed instruction section that can complete specific function, and the instruction segment is used for Implementation procedure of the computer program 40 in the terminal 1 is described.For example, the computer program 40 can be divided into Receiving module 410, data processing module 420 in Fig. 4, each module concrete function is referring to previous embodiment.
The terminal 1 can be that the computers such as desktop PC, notebook computer, palm PC and cloud server are set It is standby.It will be understood by those skilled in the art that the schematic diagram 7 is only the restriction of the example, not structure paired terminal 1 of terminal 1, It can include than illustrating more or less parts, either combine some parts or different parts, such as the terminal 1 Input-output equipment, network access equipment, bus etc. can also be included.
Alleged processor 30 can be CPU (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor 30 can also be any conventional processor Deng the processor 30 is the control centre of the terminal 1, utilizes various interfaces and each portion of the whole terminal 1 of connection Point.
The memory 20 can be used for storing the computer program 40 and/or module/unit, and the processor 30 passes through Operation performs the computer program and/or module/unit being stored in the memory 20, and calls and be stored in memory Data in 20, realize the various functions of the terminal 1.The memory 20 can mainly include storing program area and data storage Area, wherein, storing program area can storage program area, needed at least one function application program (such as sound-playing function, Image player function etc.) etc.;Storage data field can store uses created data (such as voice data, electricity according to terminal 1 Script for story-telling etc.) etc..In addition, memory 20 can include high-speed random access memory, nonvolatile memory, example can also be included Such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are consolidated State memory device.
If the integrated module/unit of the terminal 1 is realized in the form of SFU software functional unit and is used as independent product Sale in use, can be stored in a computer read/write memory medium.It is of the invention to realize based on such understanding All or part of flow in embodiment method is stated, by computer program the hardware of correlation can also be instructed to complete, institute The computer program stated can be stored in a computer-readable recording medium, and the computer program, can when being executed by processor The step of realizing above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, the computer Program code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer can Reading medium can include:Any entity or device of the computer program code, recording medium, USB flash disk, mobile hard can be carried Disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..Need what is illustrated It is that the content that the computer-readable medium includes can be fitted according to legislation in jurisdiction and the requirement of patent practice When increase and decrease, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium, which does not include electric carrier wave, to be believed Number and telecommunication signal.
In several embodiments provided by the present invention, it should be understood that disclosed method and apparatus, can also pass through Other modes are realized.For example, device embodiment described above is only schematical, for example, the division of the module, Only a kind of division of logic function, can there is other dividing mode when actually realizing.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.This Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Device can also be realized by same device or system by software or hardware.The first, the second grade word is used for representing name Claim, and be not offered as any specific order.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although reference The present invention is described in detail for preferred embodiment, it will be understood by those within the art that, can be to the present invention's Technical scheme is modified or equivalent substitution, without departing from the spirit and scope of technical solution of the present invention.

Claims (10)

1. a kind of data processing method, applied to terminal, it is characterised in that methods described includes:
Receive data and delete instruction;
It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, according to the mark by described in Data are hidden in original display location.
2. the method as described in claim 1, it is characterised in that methods described also includes:
Judge that the data delete whether instruction meets preparatory condition;
If the data, which delete instruction, meets preparatory condition, perform the mark data and delete the data that instruction instruction is deleted For recoverable weak deletion data, the operation for being hidden the data in original display location according to the mark.
3. method as claimed in claim 2, it is characterised in that the data delete instruction and meet that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
4. method as claimed any one in claims 1 to 3, it is characterised in that methods described also includes:
If receiving the data recovery instruction for recovering the data, safety certification is carried out;
If through safety certification, the data recovery is included in the original display location according to the mark.
5. method as claimed any one in claims 1 to 3, it is characterised in that methods described also includes:
After the data are hidden in the original display location, update and show that the residue of the original display location is deposited Store up capacity.
6. method as claimed in claim 5, it is characterised in that described to update and show the residue of the original display location Memory capacity includes:
The current remaining memory capacity in the original display location is added to the size of the data, obtains described original show Show the remaining memory capacity after location updating;
Show the remaining memory capacity after the original display location renewal.
7. a kind of data processing equipment, it is characterised in that described device includes:
Receiving module, instruction is deleted for receiving data;
Data processing module, the data that instruction instruction deletion is deleted for identifying the data are recoverable weak deletion data, The data are hidden in original display location according to the mark.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Update module, for after the data are hidden in the original display location, updating and showing described original show Show the remaining memory capacity of position.
9. a kind of terminal, it is characterised in that the terminal includes processor, and the processor is used to perform what is stored in memory The step of any one methods described in such as claim 1-6 is realized during computer program.
10. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that:The computer instruction The step of any one methods described in such as claim 1-6 is realized when being executed by processor.
CN201710626375.2A 2017-07-27 2017-07-27 Data processing method and device, terminal and computer-readable recording medium Pending CN107391308A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710626375.2A CN107391308A (en) 2017-07-27 2017-07-27 Data processing method and device, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710626375.2A CN107391308A (en) 2017-07-27 2017-07-27 Data processing method and device, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107391308A true CN107391308A (en) 2017-11-24

Family

ID=60342602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710626375.2A Pending CN107391308A (en) 2017-07-27 2017-07-27 Data processing method and device, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107391308A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200263A (en) * 2017-12-28 2018-06-22 维沃移动通信有限公司 A kind of information processing method and device
CN108984114A (en) * 2018-06-08 2018-12-11 深圳大普微电子科技有限公司 Data processing method and solid state hard disk
CN110381121A (en) * 2019-06-26 2019-10-25 苏州浪潮智能科技有限公司 A kind of data processing method and device
CN110874377A (en) * 2018-08-08 2020-03-10 青岛海信移动通信技术股份有限公司 Data processing method and system
CN111046435A (en) * 2019-12-20 2020-04-21 山东广电信通网络运营有限公司 Method, device, terminal and storage medium for protecting content of dark visit video
CN112698771A (en) * 2020-12-29 2021-04-23 维沃移动通信(杭州)有限公司 Display control method, display control device, electronic equipment and storage medium
CN115309766A (en) * 2022-10-12 2022-11-08 北京奥星贝斯科技有限公司 Method and device for executing database service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139264A (en) * 2011-12-01 2013-06-05 比亚迪股份有限公司 Processing method and processing system of deleted data
CN105208071A (en) * 2014-11-26 2015-12-30 维沃移动通信有限公司 Mobile terminal data deletion method and mobile terminal
CN106599115A (en) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 Data protection method and device and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139264A (en) * 2011-12-01 2013-06-05 比亚迪股份有限公司 Processing method and processing system of deleted data
CN105208071A (en) * 2014-11-26 2015-12-30 维沃移动通信有限公司 Mobile terminal data deletion method and mobile terminal
CN106599115A (en) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 Data protection method and device and terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200263A (en) * 2017-12-28 2018-06-22 维沃移动通信有限公司 A kind of information processing method and device
CN108200263B (en) * 2017-12-28 2020-10-27 维沃移动通信有限公司 Information processing method and device
CN108984114A (en) * 2018-06-08 2018-12-11 深圳大普微电子科技有限公司 Data processing method and solid state hard disk
CN110874377A (en) * 2018-08-08 2020-03-10 青岛海信移动通信技术股份有限公司 Data processing method and system
CN110381121A (en) * 2019-06-26 2019-10-25 苏州浪潮智能科技有限公司 A kind of data processing method and device
CN110381121B (en) * 2019-06-26 2022-03-22 苏州浪潮智能科技有限公司 Data processing method and device
CN111046435A (en) * 2019-12-20 2020-04-21 山东广电信通网络运营有限公司 Method, device, terminal and storage medium for protecting content of dark visit video
CN112698771A (en) * 2020-12-29 2021-04-23 维沃移动通信(杭州)有限公司 Display control method, display control device, electronic equipment and storage medium
CN115309766A (en) * 2022-10-12 2022-11-08 北京奥星贝斯科技有限公司 Method and device for executing database service

Similar Documents

Publication Publication Date Title
CN107391308A (en) Data processing method and device, terminal and computer-readable recording medium
CN104156414B (en) A kind of method for cleaning of garbage files, device and terminal
CN104699423B (en) The method and apparatus that drive is bound in linux system
CN106155596B (en) Data writing method and device
CN105493054A (en) Fast data protection using dual file systems
CN106776908B (en) Data cleaning method and device and terminal
CN106022101A (en) Application management method and terminal
CN111125688B (en) Process control method and device, electronic equipment and storage medium
CN107563192A (en) A kind of means of defence for extorting software, device, electronic equipment and storage medium
CN104991716A (en) Mobile terminal unlocking method and apparatus
CN104572348A (en) Terminal
CN108733797A (en) Document handling method and relevant apparatus
CN106599115B (en) Data protection method, device and terminal
CN109033313B (en) Method and terminal equipment for realizing full-disk scanning function by using USN
CN102156574A (en) System and method for touch-control display by simulating mouse key through fingerprint identification
CN109597707A (en) Clone volume data copying method, device and computer readable storage medium
CN106503080A (en) Information issuing method and device
CN110401869A (en) A kind of net cast method, system and electronic equipment and storage medium
CN202067243U (en) Touch display system for imitating mouse button by fingerprint identification
CN105847516A (en) Method and device for managing contact person information
CN106131805A (en) The method of a kind of information transmission and terminal
CN113901001B (en) File identification processing method and device
CN107368738A (en) A kind of anti-Root method and devices of smart machine
CN108763357A (en) Document handling method and relevant apparatus
CN105700971A (en) Data backup method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124