CN107391308A - Data processing method and device, terminal and computer-readable recording medium - Google Patents
Data processing method and device, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107391308A CN107391308A CN201710626375.2A CN201710626375A CN107391308A CN 107391308 A CN107391308 A CN 107391308A CN 201710626375 A CN201710626375 A CN 201710626375A CN 107391308 A CN107391308 A CN 107391308A
- Authority
- CN
- China
- Prior art keywords
- data
- instruction
- deleted
- delete
- deletion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/122—File system administration, e.g. details of archiving or snapshots using management policies
- G06F16/125—File system administration, e.g. details of archiving or snapshots using management policies characterised by the use of retention policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0647—Migration mechanisms
- G06F3/0649—Lifecycle management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of data processing method, the data processing method includes:Receive data and delete instruction;It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, and is hidden the data in original display location according to the mark.The invention also discloses a kind of data processing equipment, terminal and computer-readable recording medium.The present invention can miss deletion to data and protect, avoid data from deleting the data loss problem brought by mistake in data deletion action.
Description
Technical field
The present invention relates to field of terminal technology, and in particular to a kind of data processing method and device, terminal and computer can
Read storage medium.
Background technology
When using terminals such as mobile phone, flat boards, because Insufficient disk space or daily data preparation need, it is usually directed to
Acted to data deletion.When user is deleting data mistake delete originally be not desired to delete data, now unless with
The data backup that family will delete by mistake in advance is into remote server, and otherwise not effective method is by data recovery.However,
It is not that each user can do data backup during actual use, if not often led to data backup after deleting data by mistake
Loss of data, used for user and bring unnecessary trouble.
In the prior art, except that by data backup, can also be avoided in advance by recycle bin in computer and server
Data loss problem data are deleted by mistake caused by.The data that will first delete are stored in recycle bin, but this can be related to
File and a large amount of of resource frequently carry, therefore the operation that largely can be read and write in disk, for mobile phone, flat board etc.
For take this approach the service life of the storage medium that can have a strong impact on terminal.
The content of the invention
, can be with consideration of it, be necessary to provide a kind of data processing method and device, terminal and computer-readable recording medium
In data deletion action, deletion is missed to data and protected, avoids data from deleting the data loss problem brought by mistake.
On the one hand the embodiment of the present invention provides a kind of data processing method, methods described includes:
Receive data and delete instruction;
It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, will according to the mark
The data are hidden in original display location.
In alternatively possible implementation, the data processing method also includes:
Judge that the data delete whether instruction meets preparatory condition;
If the data, which delete instruction, meets preparatory condition, perform the mark data and delete what instruction instruction was deleted
Data are recoverable weak deletion data, the operation for being hidden the data in original display location according to the mark.
In alternatively possible implementation, the data delete instruction and meet that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
In alternatively possible implementation, the data processing method also includes:
If receiving the data recovery instruction for recovering the data, safety certification is carried out;
If through safety certification, the data recovery is included in the original display location according to the mark.
In alternatively possible implementation, the data processing method also includes:
When the remaining disk space of the terminal is less than target capacity, the disk space by the data from the terminal
Upper removal.
In alternatively possible implementation, the data processing method also includes:
After the data are hidden in the original display location, update and show the surplus of the original display location
Remaining memory capacity.
It is described to update and show the remaining memory capacity of the original display location in alternatively possible implementation
Including:
The current remaining memory capacity in the original display location is added to the size of the data, obtained described original
Display location renewal after remaining memory capacity;
Show the remaining memory capacity after the original display location renewal.
On the other hand the embodiment of the present invention additionally provides a kind of data processing equipment, described device includes:
Receiving module, instruction is deleted for receiving data;
Data processing module, the data that instruction instruction deletion is deleted for identifying the data are recoverable weak deletion number
According to the data are hidden in original display location according to the mark.
In alternatively possible implementation, described device also includes:
Judge module, for judging that the data delete whether instruction meets preparatory condition;
Trigger module, if deleting instruction for the data meets preparatory condition, trigger the data processing module mark
It is recoverable weak deletion data that the data, which delete the data that instruction instruction is deleted, according to the mark by the data in original
The display location come hides.
In alternatively possible implementation, the data delete instruction and meet that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
In alternatively possible implementation, described device also includes:
Security authentication module, if recovering the data recovery instruction of the data for receiving, carry out safety certification;
Recovery module, if for through safety certification, being included the data recovery in the original according to the mark
The display location come.
In alternatively possible implementation, described device also includes:
Remove module, for when the remaining disk space of the terminal is less than target capacity, by the data from described
Removed on the disk space of terminal.
In alternatively possible implementation, described device also includes:
Update module, for after the data are hidden in the original display location, updating and showing described original
Display location remaining memory capacity.
In alternatively possible implementation, the update module is specifically used for:
After the data are hidden in the original display location, the current residue in the original display location is deposited
The size that capacity adds the data is stored up, obtains the remaining memory capacity after the original display location renewal;
Show the remaining memory capacity after the original display location renewal.
Another further aspect of the embodiment of the present invention also provides a kind of terminal, and the terminal includes processor, and the processor is used for
The step of above-mentioned data processing method being realized when performing the computer program stored in memory.
The another aspect of the embodiment of the present invention also provides a kind of computer-readable recording medium, is stored thereon with computer and refers to
Order, the step of computer instruction realizes above-mentioned data processing method when being executed by processor.
By above technical scheme, in of the invention, electronic equipment can receive data and delete instruction;Further, electronics is set
Indicate that the data of deletion are recoverable weak deletion data for the data deletion instruction can be identified, identified according to described by institute
Data are stated to hide in original display location.The data that instruction instruction deletion is deleted due to data are hidden in original display location
Hide, therefore the data of deletion are can't see in original display location user so that user thinks that the data have been deleted.Meanwhile
Because the data for not deleting data deletion instruction instruction are mobile or removed from disk, only by data deletion instruction instruction
The data of deletion are marked, so data can't lose, can be retrieved, meanwhile, data are marked without
The disk space of terminal carries out excessive read-write operation, effectively protects the service life of disk.To sum up, the present invention can be in number
During according to deletion action, deletion is missed to data and protected, avoids data from deleting the data loss problem brought by mistake.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of data processing method provided in an embodiment of the present invention.
Fig. 2 is a kind of flow chart for data processing method that another embodiment of the present invention provides.
Fig. 3 is a kind of flow chart for data processing method that further embodiment of this invention provides.
Fig. 4 is the functional block diagram of data processing equipment provided in an embodiment of the present invention.
Fig. 5 is the functional block diagram for the data processing equipment that another embodiment of the present invention provides.
Fig. 6 is the functional block diagram for the data processing equipment that further embodiment of this invention provides.
Fig. 7 is the schematic diagram of terminal provided in an embodiment of the present invention.
Following embodiment will combine above-mentioned accompanying drawing and further illustrate the present invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Applying example, the present invention will be described in detail.It should be noted that in the case where not conflicting, embodiments herein and embodiment
In feature can be mutually combined.
Elaborate many details in the following description to facilitate a thorough understanding of the present invention, described embodiment only
Only it is part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill
The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention
The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment
Fig. 1 is the schematic flow diagram of data processing method provided in an embodiment of the present invention.As shown in figure 1, data processing side
Method may include following steps:
S101:Receive data and delete instruction.
Data processing method of the present invention can be applied to terminal, and the terminal can be mobile phone, tablet personal computer, intelligence
The electronic equipments such as wrist-watch.
It is to delete the instruction of the specified data in terminal that above-mentioned data, which delete instruction,.Data are deleted may include to delete in instruction
The data address and data content removed.
Above-mentioned data are deleted instruction and can sent by user.For example, user chooses the file to be deleted, then click on deletion and press
Button, if terminal detects the operation, it is determined that user have issued data and delete instruction.
Above-mentioned data are deleted instruction and can also be when default deletion condition meets, the data of terminal triggering delete instruction.
For example, when the access frequency of certain data is less than predetermined threshold value, trigger data deletes instruction and the data such as deletes.Specifically
Default deletion condition can be set as needed.
S102:It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, according to described
Mark hides the data in original display location.
It is to send the data to be deleted of sender that data delete instruction that above-mentioned data, which delete the data that instruction instruction is deleted,.
It is that recoverable weak deletion data are to the number to be deleted that above-mentioned mark data, which deletes the data that instruction instruction is deleted,
According to being marked.Specifically, can be that the data to be deleted add flag attributes, and it be the attribute assignment.Assigning what value can be with
Preset as needed.For example, the flag property values for the data that will be deleted are set to 0, it is for the data to be deleted of expression
Recoverable weak deletion data.
Refer to the data have been carried out to delete mark and the data if data are identified as recoverable weak deletion data
It can be resumed.
Meanwhile when the data that data are deleted with instruction instruction deletion are identified, the size of the data can be deleted
The relevant informations such as time are all identified or recorded.The information of mark can also be preserved with single database.
By above step S101 and S102, when receiving data deletion instruction, the data to be deleted can't be direct
Remove from the disk space of terminal, only marked, still can be recovered.And the present invention is not to former number
According to any modification and mobile operation is carried out, so as to reduce the read-write of disk, disk is protected.
During specific implementation, the flow that delete data can also be adjusted, when receiving data deletion instruction, only first
Perform above-mentioned steps S101 and S102 data are identified, when user herein by the data complete deletion when, just by data
Thoroughly removed from the disk space of terminal.
Meanwhile after being identified to the data to be deleted, the data that will be deleted according to mark are in original display position
Put hiding.Wherein, hidden in original display location and refer to all see in the various interfaces such as the file browser of terminal
Or access the data to be deleted.
After the data that will be deleted are hidden in original display location, user can not be from original display location intuitively
See the data, give user a kind of visual experience for having completed to delete, otherwise user can think that data are not deleted, and then repeat
Perform and either produce puzzlement.
Can be in the mode that original display location hides by data according to mark specifically, in display data, if
Data Identification is recoverable weak deletion data, then is not shown the data.
The embodiment of the present invention deletes instruction by receiving data;Identifying the data that the data deletion instruction instruction is deleted is
Recoverable weak deletion data, the data are hidden in original display location according to the mark.Deleted and referred to due to data
The data that order instruction is deleted are hidden in original display location, therefore can't see the number of deletion in original display location user
According to so that user thinks that the data have been deleted.Simultaneously as the data that data are not deleted to instruction instruction deletion move
Or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so data can't lose, can
To be retrieved, meanwhile, data are marked and carry out excessive read-write operation without the disk space in terminal, are effectively protected
The service life of disk.To sum up, the present invention can miss deletion to data and protect, avoid data in data deletion action
The data loss problem brought is deleted by mistake.
Embodiment
Fig. 2 is the schematic flow diagram for the data processing method that another embodiment of the present invention provides.As shown in Fig. 2 at data
Reason method may include following steps:
S201:Receive data and delete instruction.
Step S201 is consistent with step S101 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment
Rapid S101 associated description, is not repeated herein.
S202:Judge that the data delete whether instruction meets preparatory condition.
In the present embodiment, after receiving data and deleting instruction, instruction can be deleted to data and judged, specifically judged
The data delete whether instruction meets preparatory condition.
Above-mentioned preparatory condition can be set as needed.For example, judge whether the sender that the data delete instruction is pre-
If sender, it can verify that data delete the sender of instruction by carrying out the modes such as fingerprint authentication or cipher authentication.If data
The sender for deleting instruction is not default sender, then data is not removed completely when deleting, i.e., data are incomplete
Removed from the disk space of terminal, it is recoverable weak deletion that data described in terminal iidentification, which delete the data that instruction instruction is deleted,
Data, the data are hidden in original display location according to the mark, to prevent other users from deleting terminal owner
The data preserved in terminal.
S203:If the data, which delete instruction, meets preparatory condition, identify the data and delete the number that instruction instruction is deleted
According to for recoverable weak deletion data, the data are hidden in original display location according to the mark.
Explanation about step S203 can be found in the description of step S102 in previous embodiment, in the present embodiment described in mark
It is recoverable weak deletion data that data, which delete the data that instruction instruction is deleted, according to the mark by the data original
Display location hides consistent with previous embodiment step S102.
When data, which delete instruction, meets preparatory condition, step S203 operation is just performed, data deletion can carried out
When the different data in terminal are carried out with the deletions of different modes.
Further, above-mentioned data deletion instruction meets that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
The weak deletion instruction that above-mentioned data delete instruction to recover data, i.e., can have at least two in terminal
Kind data delete instruction.Such as it is strong delete instruction and weak delete instructs, it is above-mentioned it is strong delete instruction be used for the data that will delete from
Removed completely on the disk space of terminal, the above-mentioned weak Data Identification for deleting instruction for that will delete is recoverable weak deletion
Data.When the deletion instruction of above-mentioned data is only weak deletion instruction, just performs the data deletion instruction instruction of above-mentioned mark and delete
The data removed are recoverable weak deletion data, the step for being hidden the data in original display location according to the mark
Suddenly.Specifically, user can provide a variety of deletion action buttons in operation, specifically carry out which kind of deletion is grasped for user's selection
Make.It can also give tacit consent to when user deletes and select weak deletion, user, can voluntarily select to delete by force whenever necessary.Meanwhile
The methods of font color can also be passed through, reminds the consequence brought that user deletes by force, for example the font of weak deletion is arranged into green
Color, the font deleted by force is arranged to red, the data that prompting user deletes by force when user selects strong delete can be completely from end
Removed on the disk space at end, it is irrecoverable.
Above-mentioned specified type is can to include but is not limited to mp4 with data type set in advance, such as specified type
The data type of form, the data type of pdf forms, data type of jpg forms etc..When data delete what instruction instruction was deleted
When data are the data of instruction type, it is recoverable just to perform the above-mentioned mark data and delete the data that instruction instruction is deleted
Weak deletion data, the step for being hidden the data in original display location according to the mark.Refer to if data delete instruction
The data for showing deletion are the other kinds of data beyond instruction type, then can use other data-erasure methods or direct
Data are removed from the disk space of terminal.
For example, due to when system upgrade or application renewal when, legacy version (such as number of apk forms of these application files
According to) delete and usually not delete necessity of protection by mistake, and the file or file (such as jpg lattice edited of user that user downloads
The data of formula, data of word forms etc.) it is generally just critically important.Therefore it is jpg and word lattice by the data setting of specified type
Formula data.It is when the data that data delete instruction instruction deletion are the data either data of word forms of jpg forms, then right
The data are identified, and are hidden the data in original display location according to mark.When data delete the number of instruction deletion
During according to data for apk forms, then it is directly removed from the disk space of terminal.
Above-mentioned assigned catalogue is can be with the storing directory of data set in advance, when data delete the number of instruction instruction deletion
During according to being the data being stored under the catalogue specified, just performing the above-mentioned mark data and delete the data that instruction instruction is deleted and be
Recoverable weak deletion data, the step for being hidden the data in original display location according to the mark.If data are deleted
Except instructing the data that instruction is deleted to be the data under other catalogues in addition to being stored in assigned catalogue, then other data can be used
Delet method directly removes data from the disk space of terminal.For example, generally the photo of camera shooting and bluetooth connect
The file of receipts may be important, and the photo of camera shooting is commonly stored under entitled camera catalogue, and bluetooth receives
Data be commonly stored under entitled bluetooth catalogue, therefore specified storing directory can be defined as entitled
The catalogue of camera catalogue and entitled bluetooth.
Above-mentioned designated storage area is can be with the storage address of data set in advance, such as designated storage area is Sdcard.
When the data that data delete instruction instruction deletion are the data being stored in Sdcard, just perform the above-mentioned mark data and delete
Except the data that instruction instruction is deleted are recoverable weak deletion data, according to the mark by the data in original display position
Put hiding step.It is the number being stored in other memory blocks beyond Sdcard that if data, which delete the data that instruction instruction is deleted,
According to can then use and other data-erasure methods or directly remove data from the disk space of terminal.
It is understood that when judging whether data deletion instruction meets preparatory condition, can be by judging data
The no weak deletion data for that can be recovered to data, judge that data delete whether the data that instruction instruction is deleted are specified type
Data, judge that data delete whether the data that instruction instruction is deleted are data under assigned catalogue, judge that data delete instruction
Whether the data for indicating to delete are that any of the data of designated storage area this several determination methods or at least two combine
Row judges, to determine that data delete whether instruction meets preparatory condition, carries out performing corresponding deletion action.
S204:After the data are hidden in original display location, update and show the original display location
Remaining memory capacity.
If certain data markers is weak deletion data, and invisible in original display location, the number will can be originally shown
According to the remaining memory capacity of memory space be updated.
Further, update and show that the remaining memory capacity of the original display location includes:
The current remaining memory capacity in the original display location is added to the size of the data, obtained described original
Display location renewal after remaining memory capacity;
Show the remaining memory capacity after the original display location renewal.
The size for the data being marked will not be included in the size of remaining memory capacity, then the storage that user sees is empty
Between become big really, user is not produced doubt when deleting data, the consistent of interface display and deletion action can be kept
Property.
Due to being identified as the data of weak deletion and non-fully being removed from the disk of terminal, therefore the actual magnetic used
Disk space can be thought more than user.After if actual disk space has been expired, it is still necessary to the magnetic by partial data from terminal
Removed completely on disk, to preserve new data.
In another embodiment of the present invention, data processing method of the present invention also includes:
When the remaining disk space of the terminal is less than target capacity, the disk space by the data from the terminal
Upper removal.
The remaining disk space of above-mentioned terminal is remaining available disk space in terminal.
The size of above-mentioned target capacity can be the fixed value pre-set.Such as the size of target capacity is 20M, then when
When the size of the target capacity of remaining disk space is less than 20M, the disk by the identified data for weak deletion data from terminal
Spatially remove.
The size of above-mentioned target capacity can also be the value of the behaviour in service dynamic change according to terminal.Such as present terminal
The size for the voice data for needing to preserve is 10M, it is determined that the big I of target capacity is 10M.If the now remanence of terminal
When disk space is less than 10M, the identified data for weak deletion data are removed from the disk space of terminal.
Specifically when by being removed on disk space of the data from terminal, interface can be deleted with display data, be selected for user
The data which has been labeled as weak deletion data to are taken to delete.
It can also be and deleted data according to certain priority according to other pre-defined rules.For example, according to wound
The sequencing for building time or last access time is deleted, and is first deleted and is created earliest data or access time earliest number
According to;Either deleted according to the size of data, first delete the data of maximum;Or entered according to the backup instances of data
Row is deleted, and the data for having done backup operation are deleted, and further to improve security when data are deleted, avoids counting
According to loss;It can also be and deleted according to the history access times of data, the minimum data of first deleting history access times.
The method deleted of data for being identified as weak deletion data be not limited to it is above-mentioned several, can be with root
The rule do not mentioned according to other is deleted or random deleted etc..When deleting data, deletion
Size the remaining disk space of terminal can be defined after deletion more than preset capacity, and specific preset capacity can be as needed
Set or and depending on the actual use situation of terminal is random.
The embodiment of the present invention is by after receiving data and deleting instruction, deleting instruction to data and judging, in data
When deletion instruction meets preparatory condition, it is recoverable weak deletion number just to identify the data and delete the data that instruction instruction is deleted
According to the data are hidden in original display location according to the mark.Can be by the data in terminal with different data
Deletion mode is deleted, and the data in terminal is deleted mode more diversification.The anti-error data deleted of needs can be protected,
To not needing the anti-error data deleted to carry out the deletion of other forms, such as directly remove, it is possible to reduce the redundancy of data in terminal.
Hidden simultaneously as data delete the data that instruction instruction is deleted in original display location, therefore in original display location
User can't see the data of deletion so that user thinks that the data have been deleted.And due to data deletion instruction not being referred to
To show the data movement of deletion or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so
Data can't lose, and can be retrieved, and therefore, can miss deletion to data and protect, avoid data from deleting what is brought by mistake
Data loss problem.And data processing method provided by the invention only data is marked without the disk space in terminal
Excessive read-write operation is carried out, effectively protects the service life of disk, deletion is missed to data and protected, avoids data from deleting by mistake
Except the data loss problem brought.
Embodiment
Fig. 3 is the schematic flow diagram for the data processing method that further embodiment of this invention provides.As shown in figure 3, at data
Reason method may include following steps:
S301:Receive data and delete instruction.
Step S301 is consistent with step S101 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment
Rapid S101 associated description, is not repeated herein.
S302:It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, according to described
Mark hides the data in original display location.
Step S302 is consistent with step S102 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment
Rapid S102 associated description, is not repeated herein.
S303:If receiving the data recovery instruction for recovering the data, safety certification is carried out.
Above-mentioned data recovery instruction can be sent by user.It can specifically be shown on human-computer interaction interface for data
The interface of recovery, and shown data recovery according to the selection of user.Specifically, due to hidden by identifying the data that will be deleted
Hide, therefore when recovering to show, can also be recovered the data to be deleted before by the way that the mark is removed.
For example, user by an interface have access to it is foregoing preserve mark database, and then by retrieval find it is desired
The data of recovery, or by one delete list find want recovery data, find want recovery data after lead to
Cross and remove the mark of the data to recover the data.
When recovering to data, in order to ensure that the security of data, such as possible user are not intended to other users and seen
To these data, or recover these data.Therefore can be in safety certification by rear, just by the data recovery.
Above-mentioned safety certification can include carrying out user finger print identifying, cipher authentication, iris authentication etc. by user
It is identified to be authenticated.
Above-mentioned safety certification, which can also be, judges whether the place to use of terminal is the modes such as common site to carry out safety
Certification.
S304:If through safety certification, the data recovery is included in the original display according to the mark
Position.
If through safety certification, it will include labeled as the data recovery of weak deletion in original display location.I.e. in number
After recovery, the data of recovery can be checked under original Display directory, while can also be at the interface for being currently used in data recovery
List in directly display the data to be recovered.
Meanwhile certification not by when, can not perform according to it is described deletion information by the data recovery include in institute
The operation of original display location is stated, prompting message can also be sent to the terminal that user binds, remind user there are other users
Safety certification has been carried out to attempt to access or recover data.Through safety certification, the data preserved in terminal can further be improved
Security.
The embodiment of the present invention is deleted data after deleting instruction by receiving data, and extensive receiving data
Data are recovered after multiple instruction.If during so that there is data mistake deletion, it can be instructed and be given for change by data recovery, realized
The purpose protected is deleted by mistake to data, avoids data from deleting the data loss problem brought by mistake.Meanwhile carried out in data extensive
When multiple, safety certification is first carried out, protects the security of data in terminal.
Above is the detailed description carried out to method provided by the present invention.According to different demands, in shown flow chart
The execution sequence of square can change, and some squares can omit, and data processing method can also be in above-mentioned data processing method
Middle selective is applied in combination, or is applied in combination with other above-mentioned NM data processing methods.Below to institute of the present invention
The device of offer is described.
Embodiment
Fig. 4 is the structure chart of data processing equipment provided in an embodiment of the present invention, as shown in figure 4, data processing equipment can
With including:Receiving module 410 and data processing module 420.
Receiving module 410, instruction is deleted for receiving data.
Data processing equipment of the present invention can be applied to terminal, and the terminal can be mobile phone, tablet personal computer, intelligence
The electronic equipments such as wrist-watch.
It is to delete the instruction of the specified data in terminal that above-mentioned data, which delete instruction,.Data are deleted may include to delete in instruction
The data address and data content removed.
Above-mentioned data are deleted instruction and can sent by user.For example, user chooses the file to be deleted, then click on deletion and press
Button, if terminal detects the operation, it is determined that user have issued data and delete instruction.
Above-mentioned data delete instruction can also be when default deletion condition meets, the data of triggering terminal delete instruction.Example
Such as, when the access frequency of certain data is less than predetermined threshold value, trigger data deletes instruction and the data such as deletes.It is specific pre-
If the condition of deletion can be set as needed.
Data processing module 420, data that instruction instruction deletes are deleted for identifying the data and weak are deleted to be recoverable
Except data, the data are hidden in original display location according to the mark.
It is to send the data to be deleted of sender that data delete instruction that above-mentioned data, which delete the data that instruction instruction is deleted,.
It is that recoverable weak deletion data are to the number to be deleted that above-mentioned mark data, which deletes the data that instruction instruction is deleted,
According to being marked.Specifically, can be that the data to be deleted add flag attributes, and it be the attribute assignment.Assigning what value can be with
Preset as needed.For example, the flag property values for the data that will be deleted are set to 0, it is for the data to be deleted of expression
Recoverable weak deletion data.
Refer to the data have been carried out to delete mark and the data if data are identified as recoverable weak deletion data
It can be resumed.
Meanwhile when the data that data are deleted with instruction instruction deletion are identified, the size of the data can be deleted
The relevant informations such as time are all identified or recorded.The information of mark can also be preserved with single database.
Then when receiving data deletion instruction, the data to be deleted can't be removed directly from the disk of terminal, only
Marked, still can be recovered.And the present invention does not carry out any modification and mobile behaviour to former data
Make, so as to reduce the read-write of disk, protect disk.
During specific implementation, when receiving data deletion instruction, can only it first pass through at above-mentioned receiving module 410 and data
Module 420 is managed by data markers, when user herein by the data complete deletion when, just by other removing modules by data
Thoroughly removed from the disk space of terminal.
Meanwhile data processing module 420 is to the data to be deleted after being identified, the number that will be deleted always according to mark
Hidden according in original display location.Wherein, original display location hide refer to it is various in the file browser of terminal etc.
It can not all see in interface or access the data to be deleted.
After the data that will be deleted are hidden in original display location, user can not be from original display location intuitively
See the data, give user a kind of visual experience for having completed to delete, otherwise user can think that data are not deleted, and then repeat
Perform and either produce puzzlement.
Can be in the mode that original display location hides by data according to mark specifically, in display data, if
Data Identification is recoverable weak deletion data, then is not shown the data.
The embodiment of the present invention deletes instruction by receiving data;Identifying the data that the data deletion instruction instruction is deleted is
Recoverable weak deletion data, the data are hidden in original display location according to the mark.Deleted and referred to due to data
The data that order instruction is deleted are hidden in original display location, therefore can't see the number of deletion in original display location user
According to so that user thinks that the data have been deleted.Simultaneously as the data that data are not deleted to instruction instruction deletion move
Or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so data can't lose, can
To be retrieved, meanwhile, data are marked and carry out excessive read-write operation without the disk space in terminal, are effectively protected
The service life of disk.To sum up, the present invention can miss deletion to data and protect, avoid data in data deletion action
The data loss problem brought is deleted by mistake.
Embodiment
Fig. 5 is the structure chart for the data processing equipment that another embodiment of the present invention provides, as shown in figure 5, data processing fills
Putting to include:Receiving module 410, data processing module 420, judge module 430, trigger module 440, the and of update module 450
Remove module 460.
Receiving module 410, instruction is deleted for receiving data.
Receiving module 410 is consistent with receiving module 410 in previous embodiment in the present embodiment, referring specifically to foregoing implementation
The associated description of receiving module 410, is not repeated herein in example.
Judge module 430, for judging that the data delete whether instruction meets preparatory condition.
In the present embodiment, after receiving data and deleting instruction, instruction can be deleted to data by judge module 430 and carried out
Judge, specifically judge that the data delete whether instruction meets preparatory condition.
Above-mentioned preparatory condition can be set as needed.For example, judge whether the sender that the data delete instruction is pre-
If sender, it can verify that data delete the sender of instruction by carrying out the modes such as fingerprint authentication or cipher authentication.If data
The sender for deleting instruction is not default sender, then data is not removed completely when deleting, i.e., data are incomplete
Removed from the disk space of terminal, it is recoverable weak deletion that data described in terminal iidentification, which delete the data that instruction instruction is deleted,
Data, the data are hidden in original display location according to the mark, to prevent other users from deleting terminal owner
The data preserved in terminal.
Trigger module 440, if deleting instruction for the data meets preparatory condition, trigger the data processing module mark
It is recoverable weak deletion data to know the data to delete the data that instruction instruction is deleted, and the data are existed according to the mark
Display location originally hides.
When data, which delete instruction, meets preparatory condition, the trigger data processing module 420 of trigger module 440 performs operation,
When carrying out data deletion the different data in terminal can be carried out with the deletion of different modes.
Data processing module 420, data that instruction instruction deletes are deleted for identifying the data and weak are deleted to be recoverable
Except data, the data are hidden in original display location according to the mark.
Data processing module 420 is consistent with data processing module 420 in previous embodiment in the present embodiment, referring specifically to
The associated description of data processing module 420, is not repeated herein in previous embodiment.
Further, above-mentioned data deletion instruction meets that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
Relevant data delete instruction and meet that the detailed description of preparatory condition can be found in preceding method embodiment, relevant data
The description that instruction meets preparatory condition is deleted, is not discussed here.
In the present embodiment, the remaining memory capacity that can also be shown by update module 450 to disk space is carried out more
Newly.
Update module 450, for after the data are hidden in the original display location, updating and showing the original
The remaining memory capacity for the display location come.
If certain data markers is weak deletion data, and invisible in original display location, the number will can be originally shown
According to the remaining memory capacity of memory space be updated.
Further, the update module 450 is specifically used for:
After the data are hidden in the original display location, the current residue in the original display location is deposited
The size that capacity adds the data is stored up, obtains the remaining memory capacity after the original display location renewal;
Show the remaining memory capacity after the original display location renewal.
The size for the data being marked will not be included in the size of remaining memory capacity, then the storage that user sees is empty
Between become big really, user is not produced doubt when deleting data, the consistent of interface display and deletion action can be kept
Property.
Due to being identified as the data of weak deletion and non-fully being removed from the disk of terminal, therefore the actual magnetic used
Disk space can be thought more than user.After if actual disk space has been expired, it is still necessary to the magnetic by partial data from terminal
Removed completely on disk, to preserve new data.
In the present embodiment, the data preserved on disk space can also be cleared up by remove module 460.
Remove module 460, for when the remaining disk space of the terminal is less than target capacity, by the data from institute
State and removed on the disk space of terminal.
The remaining disk space of above-mentioned terminal is remaining available disk space in terminal.
The size of above-mentioned target capacity can be the fixed value pre-set.Such as the size of target capacity is 20M, then when
When the size of the target capacity of remaining disk space is less than 20M, the disk by the identified data for weak deletion data from terminal
Spatially remove.
The size of above-mentioned target capacity can also be the value of the behaviour in service dynamic change according to terminal.Such as present terminal
The size for the voice data for needing to preserve is 10M, it is determined that the big I of target capacity is 10M.If the now remanence of terminal
When disk space is less than 10M, the identified data for weak deletion data are removed from the disk space of terminal.
Specifically when by being removed on disk space of the data from terminal, interface can be deleted with display data, be selected for user
The data which has been labeled as weak deletion data to are taken to delete.
It can also be and deleted data according to certain priority according to other pre-defined rules.For example, according to wound
The sequencing for building time or last access time is deleted, and is first deleted and is created earliest data or access time earliest number
According to;Either deleted according to the size of data, first delete the data of maximum;Or entered according to the backup instances of data
Row is deleted, and the data for having done backup operation are deleted, and further to improve security when data are deleted, avoids counting
According to loss;It can also be and deleted according to the history access times of data, the minimum data of first deleting history access times.
The method deleted of data for being identified as weak deletion data be not limited to it is above-mentioned several, can be with root
The rule do not mentioned according to other is deleted or random deleted etc..When deleting data, deletion
Size the remaining disk space of terminal can be defined after deletion more than preset capacity, and specific preset capacity can be as needed
Set or and depending on the actual use situation of terminal is random.
The embodiment of the present invention is by after receiving data and deleting instruction, deleting instruction to data and judging, in data
When deletion instruction meets preparatory condition, it is recoverable weak deletion number just to identify the data and delete the data that instruction instruction is deleted
According to the data are hidden in original display location according to the mark.Can be by the data in terminal with different data
Deletion mode is deleted, and the data in terminal is deleted mode more diversification.The anti-error data deleted of needs can be protected,
To not needing the anti-error data deleted to carry out the deletion of other forms, such as directly remove, it is possible to reduce the redundancy of data in terminal.
Hidden simultaneously as data delete the data that instruction instruction is deleted in original display location, therefore in original display location
User can't see the data of deletion so that user thinks that the data have been deleted.And due to data deletion instruction not being referred to
To show the data movement of deletion or removed from disk, the data that data are only deleted to instruction instruction deletion are marked, so
Data can't lose, and can be retrieved, and therefore, can miss deletion to data and protect, avoid data from deleting what is brought by mistake
Data loss problem.And data processing method provided by the invention only data is marked without the disk space in terminal
Excessive read-write operation is carried out, effectively protects the service life of disk, deletion is missed to data and protected, avoids data from deleting by mistake
Except the data loss problem brought.
Embodiment
Fig. 6 is the structure chart for the data processing equipment that further embodiment of this invention provides, as shown in figure 4, data processing fills
Putting to include:Receiving module 410 and data processing module 420.
Receiving module 410, instruction is deleted for receiving data.
Step S301 is consistent with step S101 in previous embodiment in the present embodiment, referring specifically to being walked in previous embodiment
Rapid S101 associated description, is not repeated herein.
Data processing module 420, data that instruction instruction deletes are deleted for identifying the data and weak are deleted to be recoverable
Except data, the data are hidden in original display location according to the mark.
Data processing module 420 is consistent with data processing module 420 in previous embodiment in the present embodiment, referring specifically to
The associated description of data processing module 420 in previous embodiment, here is omitted.
Security authentication module 470, if recovering the data recovery instruction of the data for receiving, carry out safety certification.
Above-mentioned data recovery instruction can be sent by user.It can specifically be shown on human-computer interaction interface for data
The interface of recovery, and shown data recovery according to the selection of user.Specifically, due to hidden by identifying the data that will be deleted
Hide, therefore when recovering to show, can also be recovered the data to be deleted before by the way that the mark is removed.
For example, user by an interface have access to it is foregoing preserve mark database, and then by retrieval find it is desired
The data of recovery, or by one delete list find want recovery data, find want recovery data after lead to
Cross and remove the mark of the data to recover the data.
When recovering to data, in order to ensure that the security of data, such as possible user are not intended to other users and seen
To these data, or recover these data.Therefore can be in safety certification by rear, just by the data recovery.
Above-mentioned safety certification can include carrying out user finger print identifying, cipher authentication, iris authentication etc. by user
It is identified to be authenticated.
Above-mentioned safety certification, which can also be, judges whether the place to use of terminal is the modes such as common site to carry out safety
Certification.
Recovery module 480:If through safety certification, the data recovery is included described original according to the mark
Display location.
If through safety certification, it will include labeled as the data recovery of weak deletion in original display location.I.e. in number
After recovery, the data of recovery can be checked under original Display directory, while can also be at the interface for being currently used in data recovery
List in directly display the data to be recovered.
Meanwhile certification not by when, can not perform according to it is described deletion information by the data recovery include in institute
The operation of original display location is stated, prompting message can also be sent to the terminal that user binds, remind user there are other users
Safety certification has been carried out to attempt to access or recover data.Through safety certification, the data preserved in terminal can further be improved
Security.
The embodiment of the present invention is deleted data after deleting instruction by receiving data, and extensive receiving data
Data are recovered after multiple instruction.If during so that there is data mistake deletion, it can be instructed and be given for change by data recovery, realized
The purpose protected is deleted by mistake to data, avoids data from deleting the data loss problem brought by mistake.Meanwhile carried out in data extensive
When multiple, safety certification is first carried out, protects the security of data in terminal.
Embodiment
Fig. 7 is refer to, Fig. 7 is the schematic diagram of terminal 1 provided in an embodiment of the present invention.The terminal 1 include memory 20,
Processor 30 and the computer program 40 that can be run in the memory 20 and on the processor 30 is stored in, such as counted
According to processing routine.The processor 30 realizes the step in above-mentioned data processing method embodiment when performing the computer program 40
Suddenly, step S101~S102 such as shown in Fig. 1, step S201~S204 shown in Fig. 2, step S301 shown in Fig. 3~
S304.Or the processor 30 realizes each module/unit in said apparatus embodiment when performing the computer program 40
Function, such as module 410~420, or module 410~460, or module 410~420 and module 470~480.
Exemplary, the computer program 40 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 20, and are performed by the processor 30, to complete the present invention.Described one
Individual or multiple module/units can be the series of computation machine programmed instruction section that can complete specific function, and the instruction segment is used for
Implementation procedure of the computer program 40 in the terminal 1 is described.For example, the computer program 40 can be divided into
Receiving module 410, data processing module 420 in Fig. 4, each module concrete function is referring to previous embodiment.
The terminal 1 can be that the computers such as desktop PC, notebook computer, palm PC and cloud server are set
It is standby.It will be understood by those skilled in the art that the schematic diagram 7 is only the restriction of the example, not structure paired terminal 1 of terminal 1,
It can include than illustrating more or less parts, either combine some parts or different parts, such as the terminal 1
Input-output equipment, network access equipment, bus etc. can also be included.
Alleged processor 30 can be CPU (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor 30 can also be any conventional processor
Deng the processor 30 is the control centre of the terminal 1, utilizes various interfaces and each portion of the whole terminal 1 of connection
Point.
The memory 20 can be used for storing the computer program 40 and/or module/unit, and the processor 30 passes through
Operation performs the computer program and/or module/unit being stored in the memory 20, and calls and be stored in memory
Data in 20, realize the various functions of the terminal 1.The memory 20 can mainly include storing program area and data storage
Area, wherein, storing program area can storage program area, needed at least one function application program (such as sound-playing function,
Image player function etc.) etc.;Storage data field can store uses created data (such as voice data, electricity according to terminal 1
Script for story-telling etc.) etc..In addition, memory 20 can include high-speed random access memory, nonvolatile memory, example can also be included
Such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are consolidated
State memory device.
If the integrated module/unit of the terminal 1 is realized in the form of SFU software functional unit and is used as independent product
Sale in use, can be stored in a computer read/write memory medium.It is of the invention to realize based on such understanding
All or part of flow in embodiment method is stated, by computer program the hardware of correlation can also be instructed to complete, institute
The computer program stated can be stored in a computer-readable recording medium, and the computer program, can when being executed by processor
The step of realizing above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, the computer
Program code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer can
Reading medium can include:Any entity or device of the computer program code, recording medium, USB flash disk, mobile hard can be carried
Disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory
(RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..Need what is illustrated
It is that the content that the computer-readable medium includes can be fitted according to legislation in jurisdiction and the requirement of patent practice
When increase and decrease, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium, which does not include electric carrier wave, to be believed
Number and telecommunication signal.
In several embodiments provided by the present invention, it should be understood that disclosed method and apparatus, can also pass through
Other modes are realized.For example, device embodiment described above is only schematical, for example, the division of the module,
Only a kind of division of logic function, can there is other dividing mode when actually realizing.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.This
Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Device can also be realized by same device or system by software or hardware.The first, the second grade word is used for representing name
Claim, and be not offered as any specific order.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although reference
The present invention is described in detail for preferred embodiment, it will be understood by those within the art that, can be to the present invention's
Technical scheme is modified or equivalent substitution, without departing from the spirit and scope of technical solution of the present invention.
Claims (10)
1. a kind of data processing method, applied to terminal, it is characterised in that methods described includes:
Receive data and delete instruction;
It is recoverable weak deletion data to identify the data and delete the data that instruction instruction is deleted, according to the mark by described in
Data are hidden in original display location.
2. the method as described in claim 1, it is characterised in that methods described also includes:
Judge that the data delete whether instruction meets preparatory condition;
If the data, which delete instruction, meets preparatory condition, perform the mark data and delete the data that instruction instruction is deleted
For recoverable weak deletion data, the operation for being hidden the data in original display location according to the mark.
3. method as claimed in claim 2, it is characterised in that the data delete instruction and meet that preparatory condition includes:
The weak deletion instruction that the data delete instruction to recover data;And/or
The data delete the data that the data that instruction instruction is deleted are specified type;And/or
It is the data under assigned catalogue that the data, which delete the data that instruction instruction is deleted,;And/or
The data delete the data that the data that instruction instruction is deleted are designated storage area.
4. method as claimed any one in claims 1 to 3, it is characterised in that methods described also includes:
If receiving the data recovery instruction for recovering the data, safety certification is carried out;
If through safety certification, the data recovery is included in the original display location according to the mark.
5. method as claimed any one in claims 1 to 3, it is characterised in that methods described also includes:
After the data are hidden in the original display location, update and show that the residue of the original display location is deposited
Store up capacity.
6. method as claimed in claim 5, it is characterised in that described to update and show the residue of the original display location
Memory capacity includes:
The current remaining memory capacity in the original display location is added to the size of the data, obtains described original show
Show the remaining memory capacity after location updating;
Show the remaining memory capacity after the original display location renewal.
7. a kind of data processing equipment, it is characterised in that described device includes:
Receiving module, instruction is deleted for receiving data;
Data processing module, the data that instruction instruction deletion is deleted for identifying the data are recoverable weak deletion data,
The data are hidden in original display location according to the mark.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Update module, for after the data are hidden in the original display location, updating and showing described original show
Show the remaining memory capacity of position.
9. a kind of terminal, it is characterised in that the terminal includes processor, and the processor is used to perform what is stored in memory
The step of any one methods described in such as claim 1-6 is realized during computer program.
10. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that:The computer instruction
The step of any one methods described in such as claim 1-6 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710626375.2A CN107391308A (en) | 2017-07-27 | 2017-07-27 | Data processing method and device, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710626375.2A CN107391308A (en) | 2017-07-27 | 2017-07-27 | Data processing method and device, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107391308A true CN107391308A (en) | 2017-11-24 |
Family
ID=60342602
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710626375.2A Pending CN107391308A (en) | 2017-07-27 | 2017-07-27 | Data processing method and device, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107391308A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108200263A (en) * | 2017-12-28 | 2018-06-22 | 维沃移动通信有限公司 | A kind of information processing method and device |
CN108984114A (en) * | 2018-06-08 | 2018-12-11 | 深圳大普微电子科技有限公司 | Data processing method and solid state hard disk |
CN110381121A (en) * | 2019-06-26 | 2019-10-25 | 苏州浪潮智能科技有限公司 | A kind of data processing method and device |
CN110874377A (en) * | 2018-08-08 | 2020-03-10 | 青岛海信移动通信技术股份有限公司 | Data processing method and system |
CN111046435A (en) * | 2019-12-20 | 2020-04-21 | 山东广电信通网络运营有限公司 | Method, device, terminal and storage medium for protecting content of dark visit video |
CN112698771A (en) * | 2020-12-29 | 2021-04-23 | 维沃移动通信(杭州)有限公司 | Display control method, display control device, electronic equipment and storage medium |
CN115309766A (en) * | 2022-10-12 | 2022-11-08 | 北京奥星贝斯科技有限公司 | Method and device for executing database service |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139264A (en) * | 2011-12-01 | 2013-06-05 | 比亚迪股份有限公司 | Processing method and processing system of deleted data |
CN105208071A (en) * | 2014-11-26 | 2015-12-30 | 维沃移动通信有限公司 | Mobile terminal data deletion method and mobile terminal |
CN106599115A (en) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | Data protection method and device and terminal |
-
2017
- 2017-07-27 CN CN201710626375.2A patent/CN107391308A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139264A (en) * | 2011-12-01 | 2013-06-05 | 比亚迪股份有限公司 | Processing method and processing system of deleted data |
CN105208071A (en) * | 2014-11-26 | 2015-12-30 | 维沃移动通信有限公司 | Mobile terminal data deletion method and mobile terminal |
CN106599115A (en) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | Data protection method and device and terminal |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108200263A (en) * | 2017-12-28 | 2018-06-22 | 维沃移动通信有限公司 | A kind of information processing method and device |
CN108200263B (en) * | 2017-12-28 | 2020-10-27 | 维沃移动通信有限公司 | Information processing method and device |
CN108984114A (en) * | 2018-06-08 | 2018-12-11 | 深圳大普微电子科技有限公司 | Data processing method and solid state hard disk |
CN110874377A (en) * | 2018-08-08 | 2020-03-10 | 青岛海信移动通信技术股份有限公司 | Data processing method and system |
CN110381121A (en) * | 2019-06-26 | 2019-10-25 | 苏州浪潮智能科技有限公司 | A kind of data processing method and device |
CN110381121B (en) * | 2019-06-26 | 2022-03-22 | 苏州浪潮智能科技有限公司 | Data processing method and device |
CN111046435A (en) * | 2019-12-20 | 2020-04-21 | 山东广电信通网络运营有限公司 | Method, device, terminal and storage medium for protecting content of dark visit video |
CN112698771A (en) * | 2020-12-29 | 2021-04-23 | 维沃移动通信(杭州)有限公司 | Display control method, display control device, electronic equipment and storage medium |
CN115309766A (en) * | 2022-10-12 | 2022-11-08 | 北京奥星贝斯科技有限公司 | Method and device for executing database service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107391308A (en) | Data processing method and device, terminal and computer-readable recording medium | |
CN104156414B (en) | A kind of method for cleaning of garbage files, device and terminal | |
CN104699423B (en) | The method and apparatus that drive is bound in linux system | |
CN106155596B (en) | Data writing method and device | |
CN105493054A (en) | Fast data protection using dual file systems | |
CN106776908B (en) | Data cleaning method and device and terminal | |
CN106022101A (en) | Application management method and terminal | |
CN111125688B (en) | Process control method and device, electronic equipment and storage medium | |
CN107563192A (en) | A kind of means of defence for extorting software, device, electronic equipment and storage medium | |
CN104991716A (en) | Mobile terminal unlocking method and apparatus | |
CN104572348A (en) | Terminal | |
CN108733797A (en) | Document handling method and relevant apparatus | |
CN106599115B (en) | Data protection method, device and terminal | |
CN109033313B (en) | Method and terminal equipment for realizing full-disk scanning function by using USN | |
CN102156574A (en) | System and method for touch-control display by simulating mouse key through fingerprint identification | |
CN109597707A (en) | Clone volume data copying method, device and computer readable storage medium | |
CN106503080A (en) | Information issuing method and device | |
CN110401869A (en) | A kind of net cast method, system and electronic equipment and storage medium | |
CN202067243U (en) | Touch display system for imitating mouse button by fingerprint identification | |
CN105847516A (en) | Method and device for managing contact person information | |
CN106131805A (en) | The method of a kind of information transmission and terminal | |
CN113901001B (en) | File identification processing method and device | |
CN107368738A (en) | A kind of anti-Root method and devices of smart machine | |
CN108763357A (en) | Document handling method and relevant apparatus | |
CN105700971A (en) | Data backup method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171124 |