CN102609495A - Method for deleting file and system - Google Patents

Method for deleting file and system Download PDF

Info

Publication number
CN102609495A
CN102609495A CN2012100204438A CN201210020443A CN102609495A CN 102609495 A CN102609495 A CN 102609495A CN 2012100204438 A CN2012100204438 A CN 2012100204438A CN 201210020443 A CN201210020443 A CN 201210020443A CN 102609495 A CN102609495 A CN 102609495A
Authority
CN
China
Prior art keywords
file
delete
characteristic
unsuppressible
suppression
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100204438A
Other languages
Chinese (zh)
Other versions
CN102609495B (en
Inventor
邹贵强
谢重阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qizhi Software Beijing Co Ltd filed Critical Qizhi Software Beijing Co Ltd
Priority to CN201410184562.6A priority Critical patent/CN104090903B/en
Priority to CN201210020443.8A priority patent/CN102609495B/en
Priority to CN201410184577.2A priority patent/CN103995842B/en
Publication of CN102609495A publication Critical patent/CN102609495A/en
Application granted granted Critical
Publication of CN102609495B publication Critical patent/CN102609495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method for deleting a file. The method includes steps: intersecting calling of an original function for deleting the file from an operating system; obtaining file characteristics of the target file to be deleted from the intersected calling, judging whether the file characteristics are in a stored range of non-deletable file characteristics or not, stopping the calling and giving out reminding information of the file characteristics are in the stored range, and carrying out a next step if the file characteristics are not in the stored range; and releasing the intersected calling of the original function for deleting the file from the operating system. The invention further provides a system for deleting the file. By the aid of the method for deleting the file and the system for deleting the file, a user can be correspondingly prompted when deleting the file, and mistaken deletion of files in the operating system is avoided.

Description

The file delete method and system
Technical field
The application relates to the microcomputer data processing field, particularly relates to a kind of file delete method and system.
Background technology
The user needs the file in the deletion disk usually when the file of management in the computer.General user's deletion action all is that the delete function through operating system self realizes.
But, be not that each user is familiar with each file in the operating system, do not know the purposes of some file yet, if so the user when manual deleted file without recourse to the professional, delete just be easy to occur mistake.For example, system file or special directory name etc. should deleted files, if deleted, then possibly cause the unstable of system or produce other harmful effects.
Summary of the invention
The application provides a kind of file delete method and system, can solve the problem that the operating system file is deleted by mistake.
In order to address the above problem, the application discloses a kind of file delete method, may further comprise the steps:
Interception operating system is to realizing original function calls of file delete;
From the calling of said interception, obtain the file characteristic of file destination to be deleted, and judge said file characteristic whether in the unsuppressible-suppression file characteristic scope that prestores, if, then end said calling, and provide prompting message, otherwise, then carry out next step;
The said operating system of being tackled of letting pass is to realizing original function calls of file delete.
Further, said file characteristic is the file path of said file destination, saidly judges whether said file characteristic comprises in the unsuppressible-suppression file characteristic scope that prestores:
Said file path and the unsuppressible-suppression file path that prestores are mated, if can mate, then said file characteristic is in the unsuppressible-suppression file characteristic scope that prestores, otherwise then said file characteristic is not in the unsuppressible-suppression file characteristic scope that prestores.
Further, said file characteristic is the MD5 value of said file destination, saidly judges whether said file characteristic comprises in the unsuppressible-suppression file characteristic scope that prestores:
The MD5 value of said MD5 value with the unsuppressible-suppression file that prestores compared, if identical, then said file characteristic is in the unsuppressible-suppression file characteristic scope that prestores, otherwise then said file characteristic is not in the unsuppressible-suppression file characteristic scope that prestores.
Further, said interception operating system adopts following mode to realize to the original function calls that realizes file delete:
The file process of interception operating system.
Further, said interception operating system comprises the original function calls that realizes file delete:
Original function address of realizing file delete in the operating system is redirected to the interception function address.
Further, the said operating system of being tackled of clearance comprises the original function calls that realizes file delete:
Adopt the interception function to continue to realize in the call operation system original function of file delete.
Further, said method also comprises:
Read the unsuppressible-suppression file characteristic that prestores from the Cloud Server end.
Further, said method also comprises:
Receive the operating result that operating system is returned, if processing scheme is then returned in the deletion failure.
Further, said processing scheme comprise following one or more:
Prompting message, delete said file destination, close and use file or pulverize file with other instruments.
Further, before returning processing scheme, also comprise the file type of judging file destination to be deleted, if system file then provides prompting message; If alternative document then provides following one or more processing schemes:
Delete said file destination, close and use file or pulverize file with other instruments.
In order to address the above problem, disclosed herein as well is a kind of file deleting system, comprising:
Blocking module is used to tackle operating system to realizing original function calls of file delete;
Judge module is used for obtaining from calling of said interception the file characteristic of file destination to be deleted, and judges said file characteristic whether in the unsuppressible-suppression file characteristic scope that prestores, and carries out subsequent operation according to judged result;
The clearance module, the said operating system of being tackled that is used to let pass is to realizing original function calls of file delete.
Further, said judge module comprises:
The file path acquiring unit is used to obtain the file path of said file destination;
The file path matching unit is used for said file path and the unsuppressible-suppression file path that prestores are mated.
Further, said judge module comprises:
File path MD5 value acquiring unit is used to obtain the MD5 value of said file destination;
MD5 value comparing unit is used for the MD5 value of said MD5 value with the unsuppressible-suppression file that prestores compared.
Further, said blocking module comprises:
File carries out interception unit, is used to tackle the file process of operating system.
Further, said blocking module comprises:
Be redirected the unit, be used for operating system is realized that original function address of file delete is redirected to the interception function address.
Further, said clearance module comprises:
Call unit is used for adopting the interception function to continue original function that the call operation system realizes file delete.
Further, said system also comprises:
Unsuppressible-suppression file characteristic read module is used for reading said unsuppressible-suppression file characteristic from Cloud Server.
Further, said system also comprises:
The result treatment module is used to receive the operating result that operating system is returned, if processing scheme is then returned in the deletion failure.
Further, said result treatment module comprises that processing scheme confirms the unit, is used to provide processing scheme, said processing scheme comprise following one or more:
Prompting message, delete said file destination, close and use file or pulverize file with other instruments.
Further, said result treatment module also comprises:
The file type judging unit is used to judge the file type of file destination to be deleted;
Processing scheme is chosen the unit, if file destination to be deleted is a system file, then provides prompting message; If alternative document then provides following one or more processing schemes: delete said file destination, close and use file or pulverize file with other instruments.
Compared with prior art, the application comprises following advantage:
The application's file delete method and system is tackled the mode that operating system is called original function of realizing file delete through increasing blocking module, makes operating system call newly-increased interception function automatically.The interception function can judge that whether the file destination of this deletion belongs to deletable file, lets pass for deletable calling according to predefined database.Compare because increased professional database, can avoid deleting the file that should not delete because of being ignorant of perhaps maloperation of user.
After operating system is carried out deletion action; The result follows the tracks of further to deletion; Provide the processing scheme of specialty further for the file that does not have successfully deletion; Instruct the appearance of the situation such as system's instability that can avoid simultaneously causing because of faulty operation thereby can provide more accurately file delete.
Certainly, arbitrary scheme of enforcement the application not necessarily need reach above-described all advantages simultaneously.
Description of drawings
Fig. 1 is the process flow diagram of the application's file delete method embodiment one;
Fig. 2 is the process flow diagram of the application's file delete method embodiment two;
Fig. 3 is the structural representation of the application's file deleting system embodiment one;
Fig. 4 is the structural representation of the application's file deleting system embodiment two.
Embodiment
For above-mentioned purpose, the feature and advantage that make the application can be more obviously understandable, the application is done further detailed explanation below in conjunction with accompanying drawing and embodiment.
File delete in the operating system, the file delete of particularly being unfamiliar with, being of little use are not a nothing the matter for domestic consumer, and a lot of users tend to deleting system file unintentionally system gone wrong.Or a lot of users also can run into file that needs deletion and situation about can't successfully delete.If can provide guiding suggestion to the file delete operation of domestic consumer, can well guarantee that system file is not deleted by mistake, the demand that can satisfy user's deleted file simultaneously seems particularly important.But deleted file is again an operation of marching into the arena in user's regular job and can carry out, and becomes complicated if because providing professional guidance the user is operated, and this obviously can't meet consumers' demand.Therefore, how seem particularly important not changing user's custom or do not increase under the prerequisite of complicated operation degree the user instructed.
The application assists and carries out file delete operation through the file delete device is set in operating system; Mainly be through resetting a new function; Interception operating system is to original function calls; Operating system is obtained file path to the mode that original function calls is redirected to new function, and judge, provide then and remind or tutorial message based on the database that prestores.For the user, its deletion action need not to take place any change, just after clicking deletion, can receive corresponding feedback, and carries out corresponding operating according to feedback, thereby guarantees the accuracy and the validity of deletion action.
With reference to Fig. 1, a kind of file delete method embodiment one of the application is shown, may further comprise the steps:
Step 101, interception operating system is to realizing original function calls of file delete.
The user can send to operating system with the deletion request of deletion file destination when carrying out file delete, operating system then can be called respective function and carry out deletion action.
The mode of interception has multiple, can realize through the modes such as file operation process of interception operating system also can tackling through filter Driver on FSD the interception of deletion request.For example: function address is redirected, that is, operating system in the internal memory is realized original function address of deletion action points to the interception function address that the application provides.
With Windows operating system is example; The original function of the system that Windows operating system is called when deleted file is SHFileOperation; Interception function in the application's the file delete device is MySHFileOperation, through the interception that function MySHFileOperation can realize the request of deleting is pointed in the address of original function S HFileOperation.
Step 102 is obtained the file characteristic of file destination to be deleted from the calling of said interception, and judges that said file characteristic is whether in the unsuppressible-suppression file characteristic scope that prestores; If then end said calling, and provide prompting message; Otherwise, then carry out step 103.
The user sends meeting include file characteristic in the deletion request to operating system, so that operating system is chosen the function that needs call according to request, realizes corresponding operation.After the function call that interception operating system is sent, the file delete device can read file characteristic wherein automatically.
The unsuppressible-suppression file characteristic is for preestablishing and add up, and is stored in the file; Perhaps wait other modes to store with tabulation; Perhaps be stored in server end, when comparing, can directly from file, can read in the tabulation; Perhaps obtain the file characteristic after the real-time update, thereby compare from server end.Be appreciated that the unsuppressible-suppression file characteristic that obtains through the server from high in the clouds has more ageing.
The unsuppressible-suppression file characteristic can comprise any characteristic that can a file of unique identification, for example file path, MD5 value or the like.
With the file path is example, and the unsuppressible-suppression file path is pre-set.Wherein, setting the unsuppressible-suppression file path sets according to the rule of depositing of various files in the operating system.For example, crucial system file is unsuppressible file, windows directory, and the boot.ini under Windows place dish (generally the being the C dish) root directory, ntldr, bootmgr etc. behind these file deletes, can cause the system start-up mistake.In addition, because user Windows possibly be installed in other dish, preferably, the unsuppressible-suppression file path that presets does not comprise drive, need change the back at user environment and use.For example, the unsuppressible-suppression file path that presets is Windows, if user's Windows is installed in D dish, actual path of using be Windows.
Behind the file path that gets access to file destination, compare with the unsuppressible-suppression file path that prestores, can compare according to the complete trails of ignorecase here.For example; NTLDR with ntldr be identical; But windows with ntldr different, if file path is identical, explain that then file destination belongs to the unsuppressible-suppression file; Then need end original function calls this moment, and corresponding prompting message is returned to the user realization file delete in the operating system.Otherwise, but explain that then file destination belongs to deleted file, at this moment, then can proceed deletion action.
When file characteristic is the MD5 value, then can if the MD5 value of file destination to be deleted and comparing of prestoring identical, be explained that then file destination belongs to the unsuppressible-suppression file, otherwise, but explain that then file destination belongs to deleted file.
Equally, when file characteristic is other characteristics, also can adopt aforementioned similar method to judge that the application repeats no more to this.
Step 103, said the calling of being tackled of letting pass.
Concrete clearance process is: original function of call operation system realization deletion action is treated the file destination of deletion and is deleted.
Preferably, in the process of tackling, when being redirected function address, keep original function address, when letting pass, then can directly carry out original function calls through the original function address that keeps.
With reference to Fig. 2, the application's file delete method embodiment two is shown, further comprising the steps of on the basis of embodiment one:
Step 201 receives the operating result that operating system is returned, if processing scheme is then returned in the deletion failure.
Wherein, processing scheme comprises: prompting message, call other instruments and delete said file destination, close and use file or pulverize file or the like.
Operating system realizes that the function of deletion action can return to the user with operating result; Through operating result is tackled, if the deletion failure to the user (for example then provides other instruments that can realize file delete; File crushing machine or the like), thus being convenient to the user carries out follow-up deletion.
Preferably, also comprise before giving the user returning processing scheme: judge the file type of file destination to be deleted, and choose the corresponding processing scheme according to file type.Specifically comprise: if file is a system file, then provide prompting message, if alternative document is then deleted said file destination, closed and use file or pulverize file or the like with other instruments.Wherein, whether file belongs to system file and also can judge based on file path.
With reference to Fig. 3, a kind of file deleting system embodiment one of the application is shown, comprise blocking module 10, judge module 20 and clearance module 30.
Blocking module 10 is used to tackle operating system to realizing original function calls of file delete.Preferably, blocking module 10 comprises that file carries out interception unit, is used to tackle the file process of operating system.Concrete, blocking module 10 comprises redirected unit, is used for operating system is realized that original function address of file delete is redirected to the interception function address.
Judge module 20 obtains the file characteristic of file destination to be deleted from the calling of said interception, and judges said file characteristic whether in the unsuppressible-suppression file characteristic scope that prestores,, and carry out subsequent operation according to judged result.Specifically comprise, in the unsuppressible-suppression file path scope that prestores, then end to call, and provide prompting message as if file path, otherwise, then the result is sent to clearance module 30.Wherein, file characteristic comprises file path, MD5 value or the like.
Clearance module 30, the said operating system of being tackled that is used to let pass is to realizing original function calls of file delete.Preferably, clearance module 30 comprises call unit, is used for adopting the interception function to continue original function that the call operation system realizes file delete.
With reference to Fig. 4, the application's file deleting system embodiment two is shown, on the basis of embodiment one, also comprise result treatment module 40, be used to receive the operating result that operating system is returned, if processing scheme is then returned in the deletion failure.
Preferably, result treatment module 40 comprises that processing scheme confirms the unit, is used to provide following one or more processing schemes: prompting message, delete said file destination, close and use file or pulverize file with other instruments.
Preferably result treatment module 40 comprises that also file type judging unit and processing scheme choose the unit.The file type judging unit is used to judge the file type of file destination to be deleted.Processing scheme is chosen the unit, if file destination to be deleted is a system file, then provides prompting message; If alternative document then provides following one or more processing schemes: delete said file destination, close and use file or pulverize file with other instruments.
Below, in conjunction with concrete be that the instance of characteristic carries out detailed explanation to preceding method with the file path.With pagefile.sys this file be example, this is the physical file of Windows virtual memory, more than 1G, the user who has feels to take up space usually, just think the deletion.When explorer.exe started, preset file delete device promptly can be redirected the address of the original function HFileOperation of operating system, replaces with the address of new function MySHFileOperation.
When user (filesselected is directly deleted by delete key or right-click menu) through the time like explorer deletion this document; Explorer.exe (explorer process) can call the SHFileOperation function; But because this function address is redirected, so actual what call is the MySHFileOperation function.
The unsuppressible-suppression file path that the MySHFileOperation function then can combine to prestore judge this document path pagefile.sys whether be system file.Concrete deterministic process does, from the file path that obtains, takes out that a part of path of removing drive, i.e. pagefile.sys, and mate with filename in the system file list of file names that presets, if can mate, pagefile.sys is arranged promptly.Preset file delete device then can be confirmed system disk according to file placement situation.If confirming the custom system dish is the c dish, so can with the drive of c dish c: be added on the filename of coupling, promptly obtain pagefile.sys.The fullpath that adds drive that obtain inquiry this moment again compares with the fullpath that gets access to, and confirms that the path is identical, then point out the user this be system file, should not delete.
If user deletion be pagefile.exe; At this moment; If inquiry is less than the path of coupling from the system file list of file names that presets, then the MySHFileOperation function can continue to call original SHFileOperation function, and receives the result that the SHFileOperation function returns.
If SHFileOperation returns success, prompting is deleted successfully, does not perhaps do any prompting; If failure, the deletion instrument that just can point out the user to use the comminutor class.
The application's file delete method and system are tackled the mode that operating system is called original function of realizing file delete through increasing blocking module, make operating system call newly-increased interception function automatically.The interception function can judge that whether the file destination of this deletion belongs to deletable file, lets pass for deletable calling according to predefined database.Compare because increased professional database, can avoid deleting the file that should not delete because of being ignorant of perhaps maloperation of user.
After operating system is carried out deletion action; The result follows the tracks of further to deletion; Provide the processing scheme of specialty further for the file that does not have successfully deletion; Instruct the appearance of the situation such as system's instability that can avoid simultaneously causing because of faulty operation thereby can provide more accurately file delete.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed all is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.For system embodiment, because it is similar basically with method embodiment, so description is fairly simple, relevant part gets final product referring to the part explanation of method embodiment.
More than the file delete method and system that the application provided have been carried out detailed introduction; Used concrete example among this paper the application's principle and embodiment are set forth, the explanation of above embodiment just is used to help to understand the application's method and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to the application's thought, the part that on embodiment and range of application, all can change, in sum, this description should not be construed as the restriction to the application.

Claims (20)

1. a file delete method is characterized in that, may further comprise the steps:
Interception operating system is to realizing original function calls of file delete;
From the calling of said interception, obtain the file characteristic of file destination to be deleted, and judge said file characteristic whether in the unsuppressible-suppression file characteristic scope that prestores, if, then end said calling, and provide prompting message, otherwise, then carry out next step;
The said operating system of being tackled of letting pass is to realizing original function calls of file delete.
2. file delete method as claimed in claim 1 is characterized in that, said file characteristic is the file path of said file destination, saidly judges whether said file characteristic comprises in the unsuppressible-suppression file characteristic scope that prestores:
Said file path and the unsuppressible-suppression file path that prestores are mated, if can mate, then said file characteristic is in the unsuppressible-suppression file characteristic scope that prestores, otherwise then said file characteristic is not in the unsuppressible-suppression file characteristic scope that prestores.
3. file delete method as claimed in claim 1 is characterized in that, said file characteristic is the MD5 value of said file destination, saidly judges whether said file characteristic comprises in the unsuppressible-suppression file characteristic scope that prestores:
The MD5 value of said MD5 value with the unsuppressible-suppression file that prestores compared, if identical, then said file characteristic is in the unsuppressible-suppression file characteristic scope that prestores, otherwise then said file characteristic is not in the unsuppressible-suppression file characteristic scope that prestores.
4. file delete method as claimed in claim 1 is characterized in that, said interception operating system adopts following mode to realize to the original function calls that realizes file delete:
The file process of interception operating system.
5. file delete method as claimed in claim 1 is characterized in that, said interception operating system comprises the original function calls that realizes file delete:
Original function address of realizing file delete in the operating system is redirected to the interception function address.
6. file delete method as claimed in claim 5 is characterized in that, the said operating system of being tackled of letting pass comprises the original function calls that realizes file delete:
Adopt the interception function to continue to realize in the call operation system original function of file delete.
7. file delete method as claimed in claim 1 is characterized in that, said method also comprises:
Read the unsuppressible-suppression file characteristic that prestores from the Cloud Server end.
8. like each described file delete method of claim 1 to 7, it is characterized in that said method also comprises:
Receive the operating result that operating system is returned, if processing scheme is then returned in the deletion failure.
9. file delete method as claimed in claim 8 is characterized in that, said processing scheme comprise following one or more:
Prompting message, delete said file destination, close and use file or pulverize file with other instruments.
10. file delete method as claimed in claim 9 is characterized in that, before returning processing scheme, also comprises the file type of judging file destination to be deleted, if system file then provides prompting message; If alternative document then provides following one or more processing schemes:
Delete said file destination, close and use file or pulverize file with other instruments.
11. a file deleting system is characterized in that, comprising:
Blocking module is used to tackle operating system to realizing original function calls of file delete;
Judge module is used for obtaining from calling of said interception the file characteristic of file destination to be deleted, and judges said file characteristic whether in the unsuppressible-suppression file characteristic scope that prestores, and carries out subsequent operation according to judged result;
The clearance module, the said operating system of being tackled that is used to let pass is to realizing original function calls of file delete.
12. file deleting system as claimed in claim 11 is characterized in that, said judge module comprises:
The file path acquiring unit is used to obtain the file path of said file destination;
The file path matching unit is used for said file path and the unsuppressible-suppression file path that prestores are mated.
13. file deleting system as claimed in claim 11 is characterized in that, said judge module comprises:
File path MD5 value acquiring unit is used to obtain the MD5 value of said file destination;
MD5 value comparing unit is used for the MD5 value of said MD5 value with the unsuppressible-suppression file that prestores compared.
14. file deleting system as claimed in claim 11 is characterized in that, said blocking module comprises:
File carries out interception unit, is used to tackle the file process of operating system.
15. file deleting system as claimed in claim 11 is characterized in that, said blocking module comprises:
Be redirected the unit, be used for operating system is realized that original function address of file delete is redirected to the interception function address.
16. want 15 described file deleting systems, it is characterized in that said clearance module comprises like right:
Call unit is used for adopting the interception function to continue original function that the call operation system realizes file delete.
17. file deleting system as claimed in claim 11 is characterized in that, said system also comprises:
Unsuppressible-suppression file characteristic read module is used for reading said unsuppressible-suppression file characteristic from Cloud Server.
18., it is characterized in that said system also comprises like each described file deleting system of claim 11 to 17:
The result treatment module is used to receive the operating result that operating system is returned, if processing scheme is then returned in the deletion failure.
19. file deleting system as claimed in claim 18 is characterized in that, said result treatment module comprises that processing scheme confirms the unit, is used to provide processing scheme, said processing scheme comprise following one or more:
Prompting message, delete said file destination, close and use file or pulverize file with other instruments.
20. file deleting system as claimed in claim 19 is characterized in that, said result treatment module also comprises:
The file type judging unit is used to judge the file type of file destination to be deleted;
Processing scheme is chosen the unit, if file destination to be deleted is a system file, then provides prompting message; If alternative document then provides following one or more processing schemes: delete said file destination, close and use file or pulverize file with other instruments.
CN201210020443.8A 2012-01-29 2012-01-29 Method for deleting file and system Active CN102609495B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201410184562.6A CN104090903B (en) 2012-01-29 2012-01-29 Document handling method
CN201210020443.8A CN102609495B (en) 2012-01-29 2012-01-29 Method for deleting file and system
CN201410184577.2A CN103995842B (en) 2012-01-29 2012-01-29 File deletion method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210020443.8A CN102609495B (en) 2012-01-29 2012-01-29 Method for deleting file and system

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN201410184577.2A Division CN103995842B (en) 2012-01-29 2012-01-29 File deletion method and system
CN201410184562.6A Division CN104090903B (en) 2012-01-29 2012-01-29 Document handling method

Publications (2)

Publication Number Publication Date
CN102609495A true CN102609495A (en) 2012-07-25
CN102609495B CN102609495B (en) 2014-06-25

Family

ID=46526867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210020443.8A Active CN102609495B (en) 2012-01-29 2012-01-29 Method for deleting file and system

Country Status (1)

Country Link
CN (1) CN102609495B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880714A (en) * 2012-09-29 2013-01-16 北京奇虎科技有限公司 File deleting method and file deleting device
WO2014100956A1 (en) * 2012-12-24 2014-07-03 东莞宇龙通信科技有限公司 Terminal and specified content deletion method
CN103955421A (en) * 2014-05-06 2014-07-30 珠海市君天电子科技有限公司 Method and system for file deletion
CN104008343A (en) * 2014-05-14 2014-08-27 北京奇虎科技有限公司 Data shattering method and device
CN104143069A (en) * 2014-08-04 2014-11-12 上海斐讯数据通信技术有限公司 Method and system for protecting system file
CN104750869A (en) * 2015-04-20 2015-07-01 安一恒通(北京)科技有限公司 File management method and device
CN104866510A (en) * 2014-02-26 2015-08-26 北京金山安全软件有限公司 Method and device for removing residual file and method and device for establishing feature library of residual file
CN106484245A (en) * 2016-10-19 2017-03-08 珠海格力电器股份有限公司 Information processing method, device and electronic equipment
CN106648720A (en) * 2015-11-02 2017-05-10 北京金山安全软件有限公司 Method, device and terminal for determining cleaning type of residual directory
CN107491482A (en) * 2017-07-12 2017-12-19 维沃移动通信有限公司 A kind of reminding method and mobile terminal
CN107766549A (en) * 2017-10-31 2018-03-06 珠海市魅族科技有限公司 Text delet method and device, terminal installation and readable storage medium storing program for executing
CN107807985A (en) * 2017-10-31 2018-03-16 珠海市魅族科技有限公司 Multimedia control method and device, terminal installation and computer-readable recording medium
CN110443040A (en) * 2019-08-13 2019-11-12 杭州安恒信息技术股份有限公司 A kind of real-time method and device for capturing of file based on filter Driver on FSD frame
CN111723016A (en) * 2020-06-24 2020-09-29 湖南国科微电子股份有限公司 File closing method and device, electronic equipment and storage medium
CN112328327A (en) * 2020-11-20 2021-02-05 杭州迪普科技股份有限公司 Configuration partition sorting method and device
CN113688000A (en) * 2021-07-22 2021-11-23 成都鲁易科技有限公司 Method and device for displaying use information of magnetic disk, storage medium and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598764A (en) * 2003-09-15 2005-03-23 联想(北京)有限公司 Computer file protection method
CN101414327A (en) * 2007-10-15 2009-04-22 北京瑞星国际软件有限公司 Method for file protection
CN101556608A (en) * 2009-02-27 2009-10-14 浙大网新科技股份有限公司 File system operation intercepting method based on event monitoring mechanism
CN102194079A (en) * 2011-03-18 2011-09-21 北京思创银联科技股份有限公司 File access filtering method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598764A (en) * 2003-09-15 2005-03-23 联想(北京)有限公司 Computer file protection method
CN101414327A (en) * 2007-10-15 2009-04-22 北京瑞星国际软件有限公司 Method for file protection
CN101556608A (en) * 2009-02-27 2009-10-14 浙大网新科技股份有限公司 File system operation intercepting method based on event monitoring mechanism
CN102194079A (en) * 2011-03-18 2011-09-21 北京思创银联科技股份有限公司 File access filtering method

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880714B (en) * 2012-09-29 2016-08-24 北京奇虎科技有限公司 File clean-up method and device
CN102880714A (en) * 2012-09-29 2013-01-16 北京奇虎科技有限公司 File deleting method and file deleting device
WO2014100956A1 (en) * 2012-12-24 2014-07-03 东莞宇龙通信科技有限公司 Terminal and specified content deletion method
US9736293B2 (en) 2012-12-24 2017-08-15 Dongguan Yulong Telecommunication Tech Co., Ltd. Terminal and specified content deletion method
CN104866510A (en) * 2014-02-26 2015-08-26 北京金山安全软件有限公司 Method and device for removing residual file and method and device for establishing feature library of residual file
CN104866510B (en) * 2014-02-26 2019-02-19 北京金山安全软件有限公司 Method and device for removing residual file and method and device for establishing feature library of residual file
CN103955421A (en) * 2014-05-06 2014-07-30 珠海市君天电子科技有限公司 Method and system for file deletion
CN104008343A (en) * 2014-05-14 2014-08-27 北京奇虎科技有限公司 Data shattering method and device
CN104143069B (en) * 2014-08-04 2017-09-29 上海斐讯数据通信技术有限公司 A kind of method and system of protection system file
CN104143069A (en) * 2014-08-04 2014-11-12 上海斐讯数据通信技术有限公司 Method and system for protecting system file
CN104750869A (en) * 2015-04-20 2015-07-01 安一恒通(北京)科技有限公司 File management method and device
WO2016169212A1 (en) * 2015-04-20 2016-10-27 安一恒通(北京)科技有限公司 File management method and device
CN106648720A (en) * 2015-11-02 2017-05-10 北京金山安全软件有限公司 Method, device and terminal for determining cleaning type of residual directory
CN106484245A (en) * 2016-10-19 2017-03-08 珠海格力电器股份有限公司 Information processing method, device and electronic equipment
CN106484245B (en) * 2016-10-19 2019-08-23 珠海格力电器股份有限公司 Information processing method, device and electronic equipment
CN107491482A (en) * 2017-07-12 2017-12-19 维沃移动通信有限公司 A kind of reminding method and mobile terminal
CN107766549A (en) * 2017-10-31 2018-03-06 珠海市魅族科技有限公司 Text delet method and device, terminal installation and readable storage medium storing program for executing
CN107807985A (en) * 2017-10-31 2018-03-16 珠海市魅族科技有限公司 Multimedia control method and device, terminal installation and computer-readable recording medium
CN110443040A (en) * 2019-08-13 2019-11-12 杭州安恒信息技术股份有限公司 A kind of real-time method and device for capturing of file based on filter Driver on FSD frame
CN111723016A (en) * 2020-06-24 2020-09-29 湖南国科微电子股份有限公司 File closing method and device, electronic equipment and storage medium
CN112328327A (en) * 2020-11-20 2021-02-05 杭州迪普科技股份有限公司 Configuration partition sorting method and device
CN112328327B (en) * 2020-11-20 2023-10-27 杭州迪普科技股份有限公司 Configuration partition arrangement method and device
CN113688000A (en) * 2021-07-22 2021-11-23 成都鲁易科技有限公司 Method and device for displaying use information of magnetic disk, storage medium and computer equipment

Also Published As

Publication number Publication date
CN102609495B (en) 2014-06-25

Similar Documents

Publication Publication Date Title
CN102609495B (en) Method for deleting file and system
JP6013594B2 (en) Locally assisted cloud-based storage
AU2013202553B2 (en) Information management of mobile device data
CN104699423B (en) The method and apparatus that drive is bound in linux system
US9069444B1 (en) Methods for synchronizing large files with a cloud network
US9864736B2 (en) Information processing apparatus, control method, and recording medium
US10917466B1 (en) Methods for synchronizing files in a cloud network
MX2014005401A (en) Cross-store electronic discovery.
WO2017087274A1 (en) Systems, methods, and media for graphical task creation
CN109033313B (en) Method and terminal equipment for realizing full-disk scanning function by using USN
CN114629921A (en) Cloud platform and bucket management method of object storage service provided by cloud platform
CN114428951B (en) Method and device for controlling access authority of network file system
KR101666064B1 (en) Apparatus for managing data by using url information in a distributed file system and method thereof
US8438133B2 (en) Information processing apparatus, file management system, information processing method and computer readable medium
CN103995842A (en) File deleting method and system
Saint-Andre Blocking Command
CN111552671B (en) File directory authority setting method, device, equipment and storage medium
US10055407B2 (en) Maintaining access control lists in non-identity-preserving replicated data repositories
CN104090903A (en) Method for processing file
JP2015028744A (en) Apparatus, method, and non-transitory computer readable storage medium thereof for controlling access of resource
JP2013250762A (en) Document management server, computer program, and document management method
US9002933B1 (en) User interaction-based data sharing via cloud-based remote servers
JP2010079444A (en) File management method and system by metadata
US20150100888A1 (en) Providing a common interface for accessing and presenting component configuration settings
CN103870603A (en) Directory management method and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: QIZHI SOFTWARE (BEIJING) CO., LTD.

Effective date: 20121026

Owner name: BEIJING QIHU TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: QIZHI SOFTWARE (BEIJING) CO., LTD.

Effective date: 20121026

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100016 CHAOYANG, BEIJING TO: 100088 XICHENG, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20121026

Address after: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Applicant after: Qizhi software (Beijing) Co.,Ltd.

Address before: The 4 layer 100016 unit of Beijing city Chaoyang District Jiuxianqiao Road No. 14 Building C

Applicant before: Qizhi software (Beijing) Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220729

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right