CN103838601B - Junk data cleaning method and device - Google Patents
Junk data cleaning method and device Download PDFInfo
- Publication number
- CN103838601B CN103838601B CN201310629926.2A CN201310629926A CN103838601B CN 103838601 B CN103838601 B CN 103838601B CN 201310629926 A CN201310629926 A CN 201310629926A CN 103838601 B CN103838601 B CN 103838601B
- Authority
- CN
- China
- Prior art keywords
- data
- file
- monitoring
- cleaning
- registry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000004140 cleaning Methods 0.000 title claims abstract description 253
- 238000000034 method Methods 0.000 title claims abstract description 78
- 238000012544 monitoring process Methods 0.000 claims abstract description 326
- 238000012986 modification Methods 0.000 claims abstract description 216
- 230000004048 modification Effects 0.000 claims abstract description 215
- 238000009434 installation Methods 0.000 claims abstract description 48
- 238000012217 deletion Methods 0.000 claims description 16
- 230000037430 deletion Effects 0.000 claims description 16
- 230000008859 change Effects 0.000 claims description 10
- 238000005201 scrubbing Methods 0.000 claims description 5
- 241001269238 Data Species 0.000 claims description 4
- 230000008569 process Effects 0.000 description 38
- 239000000284 extract Substances 0.000 description 19
- 230000006870 function Effects 0.000 description 12
- 230000009471 action Effects 0.000 description 8
- 238000004458 analytical method Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000001914 filtration Methods 0.000 description 4
- 238000011900 installation process Methods 0.000 description 3
- 230000008439 repair process Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Landscapes
- Stored Programmes (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a junk data cleaning method and device which are used for cleaning junk data generated by application installation. The junk data cleaning method includes the steps of obtaining first monitoring data, second monitoring data and third monitoring data, wherein the first monitoring data comprise modification information of a system after application installation, the second monitoring data comprise modification information of the system after junk data cleaning is carried out on an application through a cleaning tool, and the third monitoring data comprise modification information preset according to the application in a preset library file of the cleaning tool; extracting related records from the first monitoring data, the second monitoring data and the third monitoring data to conduct comparison between any two kinds of data to obtain comparison results; modifying the cleaning tool according to the comparison results; conducting junk data cleaning with the modified cleaning tool. By means of the junk data cleaning method and device, the cleaning tool can be rapidly evaluated, the library file can be conveniently and rapidly maintained and perfected, and the cleaning function of the cleaning tool can be improved.
Description
Technical field
The present invention relates to technical field of data processing, and in particular to a kind of garbage data cleaning method, and a kind of rubbish
Data scrubbing device.
Background technology
Many softwares when mounted, first have to the installation file of itself to be decompressed to a temp directory and then carry out again
Install.If software design has, carelessness or system are problematic, and after installation terminates, these temporary files will become not
" interim ", becomes the hurrock in hard disk, takes hard drive space.
Can with manual cleanup software installation when the garbage files that produce, but be not easy which file distinguished during deletion
It is garbage files, which file is normal vital document, if delete incorrect may result in when some softwares are repaired occurred
Unexpected problem, even results in software unavailable.Therefore, some software cleaning tools arise at the historic moment, but software cleaning tool is cleared up
File also not necessarily accurately, accuracy evaluation for software cleaning tool and improve software cleaning tool according to assessment result
Become the direction of industry effort.
At present some softwares track installation by carrying out single pass and snapshot (Snapshot) to system or unload soft
The relevant change that system is arranged during hardware, including file, ini file, registration table key assignments etc..It is clear by system snapshot comparison software
Difference before and after reason, and the result of different pieces of information is analyzed, confirm that software clears up the correctness of file.But difference is carried out by snapshot
During the contrast of data, comparing result data volume is larger, and the later stage also needs to manual analyses, assessment accuracy it is not high and it is time-consuming compared with
It is long.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on
State a kind of garbage data cleaning method and a kind of corresponding garbage data cleaning device of problem.
According to one aspect of the present invention, there is provided a kind of garbage data cleaning method, install for cleaning application and produced
Raw junk data, described method includes:
The first monitoring data, the second monitoring data and the 3rd monitoring data are obtained, first monitoring data includes should
With the modification information of system after installation, second monitoring data carries out garbage data cleaning including cleaning tool to the application
The modification information of system afterwards, the 3rd monitoring data includes advance for the application in the default library file of cleaning tool
The modification information of setting;First monitoring data, the second monitoring data and the 3rd monitoring data are according to predefined file
Path field and/or registry entry identification field are organized;
According to identical file path field and/or registry entry identification field respectively from first monitoring data, second
Relative recording is extracted in monitoring data and the 3rd monitoring data to be compared two-by-two, obtains comparison result;
The cleaning tool is changed according to the comparison result;
The cleaning of junk data is carried out using the cleaning tool of the modification.
Alternatively, methods described also includes:
The library file of the cleaning tool is updated according to the comparison result.
Alternatively, the step of the first monitoring data of the acquisition includes:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file of system before and after the application is installed
Modification data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain first of system before and after the application is installed
Registration modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registration table
Monitoring data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
Alternatively, the first file modification data include newly-increased file and newly-increased file;First note
Volume modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
Alternatively, the step of the second monitoring data of the acquisition includes:
Obtain cleaning tool carries out clearing up the second file modification data for obtaining and the to the junk data of the application
Two Registry Modifications data, the second file modification data include file path field, the second Registry Modifications data
Including registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registration table
Monitoring data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
Alternatively, the second file modification data include the file of the file and deletion deleted;Second note
Volume table modification data include the registry key deleted, the registration table key assignments deleted, the registration table key assignments of modification.
Alternatively, the step of three monitoring data of the acquisition includes:
From the default library file of cleaning tool obtain for it is described using the 3rd file modification data set in advance and
3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications number
According to including registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registration table
Monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
Alternatively, the comparison result includes the first comparison result, the second comparison result and the 3rd comparison result, described
According to identical file path field and/or registry entry identification field respectively from first monitoring data, the second monitoring data
And the 3rd extract relative recording in monitoring data and compared two-by-two, include the step of obtain comparison result:
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described
Second monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first prison
The first cleaning redundant data in the first installation redundant data, and the second monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described
3rd monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first prison
The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data with it is described
3rd monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second prison
The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in control data.
Alternatively, it is described the cleaning tool is updated according to the comparison result library file the step of include:
Increase in the library file of the cleaning tool in first monitoring data second installation redundant data and
The second cleaning redundant data in second monitoring data;
Delete in the library file of the cleaning tool in the 3rd monitoring data first cleaning redundant data and
The second cleaning redundant data in 3rd monitoring data.
According to another aspect of the present invention, there is provided a kind of garbage data cleaning device, install for cleaning application and produced
Raw junk data, described device includes:
Monitoring data acquisition module, is suitable to obtain the first monitoring data, the second monitoring data and the 3rd monitoring data, institute
Stating the first monitoring data includes applying the modification information of system after installation, second monitoring data to include cleaning tool to described
Using the modification information for carrying out system after garbage data cleaning, the 3rd monitoring data includes the default library text in cleaning tool
For described using modification information set in advance in part;First monitoring data, the second monitoring data and the 3rd monitoring
Data are organized according to predefined file path field and/or registry entry identification field;
Comparison result acquisition module, be suitable to according to identical file path field and/or registry entry identification field respectively from
Relative recording is extracted in first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is obtained
Comparison result;
Cleaning tool modified module, is suitable to change the cleaning tool according to the comparison result;
Data scrubbing module, being suitable for use with the cleaning tool of the modification carries out the cleaning of junk data.
Alternatively, described device also includes:
Library file update module, is suitable to update the library file of the cleaning tool according to the comparison result.
Alternatively, the monitoring data acquisition module is further adapted for:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file of system before and after the application is installed
Modification data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain first of system before and after the application is installed
Registration modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registration table
Monitoring data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
Alternatively, the first file modification data include newly-increased file and newly-increased file;First note
Volume modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
Alternatively, the monitoring data acquisition module is further adapted for:
Obtain cleaning tool carries out clearing up the second file modification data for obtaining and the to the junk data of the application
Two Registry Modifications data, the second file modification data include file path field, the second Registry Modifications data
Including registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registration table
Monitoring data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
Alternatively, the second file modification data include the file of the file and deletion deleted;Second note
Volume table modification data include the registry key deleted, the registration table key assignments deleted, the registration table key assignments of modification.
Alternatively, the monitoring data acquisition module is further adapted for:
From the default library file of cleaning tool obtain for it is described using the 3rd file modification data set in advance and
3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications number
According to including registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registration table
Monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
Alternatively, the comparison result includes the first comparison result, the second comparison result and the 3rd comparison result, described
Comparison result acquisition module is further adapted for:
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described
Second monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first prison
The first cleaning redundant data in the first installation redundant data, and the second monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described
3rd monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first prison
The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data with it is described
3rd monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second prison
The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in control data.
Alternatively, the library file update module is further adapted for:
Increase in the library file of the cleaning tool in first monitoring data second installation redundant data and
The second cleaning redundant data in second monitoring data;
Delete in the library file of the cleaning tool in the 3rd monitoring data first cleaning redundant data and
The second cleaning redundant data in 3rd monitoring data.
Compared with background technology, the present invention has the advantages that:
In the present invention, the file and registry operations involved by the installation applied by analysis and scale removal process, will
Cleaning tool be actually needed cleaning data (the first monitoring data), it is default cleaning data (the 3rd monitoring data), monitor
To cleaning data (the second monitoring data) three between compared obtained comparison result two-by-two, realize to application cleaning knot
The contrast in all directions of fruit, realizes the measurement in all directions to software clearing function, so as to judge cleaning tool scale removal process
Whether operation is correct and thorough, and more quickly the clearing function of cleaning tool is estimated, in practice it has proved that, with manpower comparing pair
Effect compare with efficiency, contrast correctness that the present invention is improved to the clearing function of cleaning tool and efficiency are more than 95%.
In addition, the present invention is analyzed by showing comparison result for scientific research personnel or operation maintenance personnel, can also more easily tie up
Protect and improve library file, and the clearing function for improving cleaning tool accordingly.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit is common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
The step of Fig. 1 shows a kind of garbage data cleaning method embodiment of present invention flow chart;
Fig. 2 shows the schematic diagram of the application installation example in a kind of garbage data cleaning method embodiment of the present invention;
Fig. 3 is shown in a kind of garbage data cleaning method embodiment of the invention using file and registration table before and after installing
Modification data display example schematic diagram;
Fig. 4 shows that process monitoring instrument arranges showing for example in a kind of garbage data cleaning method embodiment of the invention
It is intended to;
Fig. 5 shows the signal of cleaning tool setting example in a kind of garbage data cleaning method embodiment of the invention
Figure;
Fig. 6 shows that cleaning tool cleaning result shows example in a kind of garbage data cleaning method embodiment of the invention
Schematic diagram;
Fig. 7 shows the monitored results exhibition of process monitoring instrument in a kind of garbage data cleaning method embodiment of the invention
The schematic diagram of example;
Fig. 8 shows the signal of comparison result displaying example one in a kind of garbage data cleaning method embodiment of the invention
Figure;
Fig. 9 shows the signal of comparison result displaying example two in a kind of garbage data cleaning method embodiment of the invention
Figure;
Figure 10 shows that comparison result shows showing for example three in a kind of garbage data cleaning method embodiment of the invention
It is intended to;
Figure 11 shows a kind of structured flowchart of garbage data cleaning device embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here
Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
With reference to Fig. 1, flow chart the step of show a kind of garbage data cleaning method embodiment of the present invention, the rubbish
Data clearing method is used for cleaning application and installs produced junk data, and the embodiment of the present invention may include steps of:
Step 101, obtains the first monitoring data, the second monitoring data and the 3rd monitoring data;
The embodiment of the present invention is applied to, first monitoring data includes the modification information using system after installing, described
Second monitoring data includes that cleaning tool carries out the modification information of system after garbage data cleaning, the 3rd prison to the application
Control data are included in the default library file of cleaning tool for described using modification information set in advance;Also, described
One monitoring data, the second monitoring data and the 3rd monitoring data are according to predefined file path field and/or registry entry
Identification field is organized.
In implementing, the acquisition process of first monitoring data, the second monitoring data and the 3rd monitoring data
Can be respectively:
(1) in one preferred embodiment of the invention, the step of the first monitoring data of the acquisition can include as follows
Sub-step:
Sub-step S11, obtains first file data and the first registry data of system before the application is installed;
Sub-step S12, obtains second file data and the second registry data of system after the application is installed;
Sub-step S13, comparison first file data and the second file data, obtain system before and after the application is installed
The first file modification data, the first file modification data include file path field;
As a kind of preferred exemplary of the present embodiment, the first file modification data can include newly-increased file and
Newly-increased file;The first registration modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key
Value.
Sub-step S14, comparison first registry data and the second registry data, before and after obtaining the application installation
First registration modification data of system, the first Registry Modifications data include registry entry identification field;
Sub-step S15, extracts the data in the first file modification data under file path field as the first file
Monitoring data;
Sub-step S16, extracts the data conduct under the registry entry identification field in the first Registry Modifications data
First registry monitoring data;
The first file monitor data and the first registry monitoring data are organized into the first monitoring by sub-step S17
Data.
In practice, can start using monitoring tools are installed to monitor the installation process of application, wherein, the application is
Application to be installed.Specifically, before application is installed, first start application and the first number of files that monitoring tools obtain system is installed
According to the first registry data (application install before file data and registry data), the installation then applied,
After using installation, reuse using the second file data and the (application of the second registry data for installing monitoring tools acquisition system
File data and registry data after installation), by relatively more described first file data and the second file data, and ratio
First registry data and the second registry data, obtain the first file modification number of system before and after the application is installed
According to this and first registration modification data.
Using the change for installing file and registration table before and after monitoring tools are installed by contrast application, obtain the first file and repair
After changing data and the first registration modification data, the first file modification data and the first registration modification data can be led
Go out, save as file (for example, saving as " xx is installed and applied the-the first file modification data .txt ").
The first file modification data in the embodiment of the present invention and the first registration modification data can using array,
Any data structure of chained list, list, queue etc. is realized.Time (Time), process name can be included in derived file
(Process Name), process ID (PID), operation (Operation), path (Path), installation results (result), data are detailed
Feelings (Detail) etc. field information, in order to improve the efficiency of follow-up comparison, can extract the partial words in above-mentioned field information
Section (if in above-mentioned field information is to two fields) obtains the first file monitor data and the first registry monitoring data,
Carry out carrying out follow-up contrast using the first file monitor data and the first registry monitoring data, for example, for
The file increased newly in one file modification data and newly-increased file, can be by the data under its path field (for example:C:\
Program Files\FolderName;C:Program Files FolderName FileName.png) extract, it is raw
Into the first file monitor data (fileList 1);For the first Registry Modifications data, can be by the registration table of newly-increased modification
Data under item identification field are extracted, and generate the first registry monitoring data (regList1).Repair with first file
Change data and first registration modification data it is identical, the fileList 1 and regList1 can also using array, chained list,
Any data structure of list, queue etc. is realized, and the fileList 1 and regList1 constitutes the first monitoring data.
(2) in one preferred embodiment of the invention, the step of the second monitoring data of the acquisition can include as follows
Sub-step:
Sub-step S21, obtain cleaning tool carries out clearing up the second file modification for obtaining to the junk data of the application
Data and the second Registry Modifications data, the second file modification data include file path field, second registration
Table modification data include registry entry identification field;
As a kind of preferred exemplary of the present embodiment, the second file modification data can include the file deleted and
The file of deletion;The second Registry Modifications data include the registry key, the registration table key assignments of deletion, modification deleted
Registration table key assignments.
Sub-step S22, extracts the data in the second file modification data under file path field as the second file
Monitoring data;
Sub-step S23, extracts the data conduct under the registry entry identification field in the second Registry Modifications data
Second registry monitoring data;
The second file monitor data and the second registry monitoring data are organized into the second monitoring by sub-step S24
Data.
Specifically, junk data of the cleaning tool to the application of the installation can be monitored with launching process monitoring tools
Scale removal process.Specifically, while launching process monitoring tools, the monitoring filtering of the process monitoring instrument can be selected
Condition, the monitoring filtering condition can include one or more of following content:
a)Process Name:Process xxx.exe is specified in xxx.exe monitoring
b)Operation:Set Disposition Information File monitor file deletion action
c)Operation:RegDelete Key monitor the deletion action of registry key
d)Operation:RegDelete Value monitor the deletion action of registration table key assignments
e)Operation:The modification operation of RegSet Value monitoring registration table key assignments
After setting the monitoring filtering condition of process monitoring instrument, cleaning tool is opened, select clear in cleaning tool
The application of reason is cleared up, now, the cleaning operation of process monitoring instrument monitor in real time cleaning tool, when cleaning tool is to selecting
Application cleaning after the completion of, process monitoring instrument obtains monitored results, wherein, the monitored results can be repaiied including the second file
Change data and the second Registry Modifications data.With the first file modification data and the first Registry Modifications data phase
Seemingly, the second file modification data and the second registration modification data can be appointed using array, chained list, list, queue etc.
What data structure realization, can include time (Time), process name (Process Name), process ID (PID), operation
(Operation), path (Path), installation results (result), data details (Detail) etc. field information, described second
Registry Modifications data can also include registry entry identification field.
In order to improve the efficiency of follow-up comparison and ensure the concordance of contrast, above-mentioned second file modification number can be extracted
Part field according to this and in the field information of the second registration modification data is (if in above-mentioned field information is to two words
Section) the second file monitor data and the second registry monitoring data are obtained, using the second file monitor data and the second note
Volume table monitoring data carries out carrying out follow-up contrast, for example, if the extraction of the first file modification data is under path field
Data, then the second file modification data also extract the data under path field, generate the second file monitor data (fileList
2);What if the first Registry Modifications data were extracted be increase newly, the data under the registry entry identification field changed, described second
Registry Modifications data also extract the data under identical registry entry identification field, generate the second registry monitoring data
(regList2), the fileList 2 and regList2 constitutes the second monitoring data.And the fileList 2 and
RegList2 can also be realized using any data structure of array, chained list, list, queue etc..
It should be noted that the embodiment of the present invention can also first open cleaning tool, the application to be cleared up is selected, then opened
Process monitoring instrument is monitored, and the present invention need not be any limitation as to cleaning tool with the opening sequence of process monitoring instrument.
(3) in one preferred embodiment of the invention, the step of three monitoring data of the acquisition can include as follows
Sub-step:
Sub-step S31, obtains from the default library file of cleaning tool and is repaiied using the 3rd file set in advance for described
Change data and the 3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd note
Volume table modification data include registry entry identification field;
Sub-step S32, extracts the data in the 3rd file modification data under file path field as the 3rd file
Monitoring data;
Sub-step S33, extracts the data conduct under the registry entry identification field in the 3rd Registry Modifications data
3rd registry monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into the 3rd by sub-step S34
Monitoring data.
Specifically, cleaning tool safeguards in the server a library file, and the library file is an ini configuration text
Part, it recites the application for installing set in advance needs the 3rd file modification data and the 3rd registration table of cleaning to repair
Change the information such as data.
It is similar to the first file modification data and the first Registry Modifications data, the 3rd file modification data
And the 3rd registration modification data can be realized using any data structure of array, chained list, list, queue etc., can include
Time (Time), process name (Process Name), process ID (PID), operation (Operation), path (Path), installation knot
Really (result), data details (Detail) etc. field information, the 3rd Registry Modifications data can also include registration
List item identification field.
In order to improve the efficiency of follow-up comparison and ensure the concordance of contrast, above-mentioned 3rd file modification number can be extracted
Part field according to this and in the field information of the 3rd registration modification data is (if in above-mentioned field information is to two words
Section) the 3rd file monitor data and the 3rd registry monitoring data are obtained, using the 3rd file monitor data and the 3rd note
Volume table monitoring data carries out carrying out follow-up contrast, for example, if the extraction of the first file modification data is under path field
Data, then the 3rd file modification data also extract the data under path field, generate the 3rd file monitor data (fileList
3);What if the first Registry Modifications data were extracted be increase newly, the data under the registry entry identification field changed, the described 3rd
Registry Modifications data also extract the data under identical registry entry identification field, generate the 3rd registry monitoring data
(regList3), the fileList 3 and regList3 constitutes the 3rd monitoring data.And the fileList 3 and
RegList3 can also be realized using any data structure of array, chained list, list, queue etc..
Step 102, according to identical file path field and/or registry entry identification field respectively from the described first monitoring number
Compared two-by-two according to relative recording is extracted in, the second monitoring data and the 3rd monitoring data, obtained comparison result;
In one preferred embodiment of the invention, the comparison result can include that the first comparison result, second compare
As a result and the 3rd comparison result, the step 102 can include following sub-step:
Sub-step S41, according to identical file path field and/or registry entry identification field respectively from the described first monitoring
Data are extracted relative recording and are compared with second monitoring data, obtain the first comparison result, first comparison result
Including the first cleaning redundant data in the first installation redundant data, and the second monitoring data in the first monitoring data;
Specifically, extract the record traversal fileList2 per bar of the fileList1 and extract described
The record traversal regList2 per bar of regList1, draws and applies the file for increasing when installing or changing and registration table and answer
With cleaning when the file being deleted or modified and registration table between the first comparison result, wherein, first comparison result can
To include using the data of needs cleaning when installing than actual redundant data (i.e. first in the first monitoring data for clearing up data
Installation redundant data), and the data of the actual cleaning of application are than redundant data (i.e. second monitoring of the data of installation needs cleaning
The first cleaning redundant data in data).
Sub-step S42, according to identical file path field and/or registry entry identification field respectively from the described first monitoring
Data are extracted relative recording and are compared with the 3rd monitoring data, obtain the second comparison result, second comparison result
Including the first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in the first monitoring data;
Specifically, extract the record traversal fileList3 per bar of the fileList1 and extract described
The record traversal regList3 per bar of regList1, the file for increasing when drawing installation or changing and registration table and fettler
The second comparison result between the library file of tool, wherein, second comparison result can include applying needs cleaning when installing
Data than presetting the redundant data (i.e. in the first monitoring data second installation redundant data) of the data for needing cleaning, and
The default data for needing cleaning are than redundant data (first in the 3rd monitoring data using the data that cleaning is needed when installing
Cleaning redundant data).
Sub-step S43, according to identical file path field and/or registry entry identification field respectively from the described second monitoring
Data are extracted relative recording and are compared with the 3rd monitoring data, obtain the 3rd comparison result, the 3rd comparison result
Including the second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in the second monitoring data.
Specifically, extract the record traversal fileList3 per bar of the fileList2 and extract described
The record traversal regList3 per bar of regList2, deletion when showing that the library file of cleaning tool is cleared up with cleaning tool
Or the 3rd comparison result between the file and registration table of modification, wherein, the 3rd comparison result can include actual cleaning
Data than presetting the redundant data (i.e. in the second monitoring data second cleaning redundant data) of the data for needing cleaning, and in advance
If needing the data of cleaning than the redundant data (i.e. the second cleaning redundant data in the 3rd monitoring data) of actual cleaning data.
Step 103, according to the comparison result cleaning tool is changed;
In implementing, after comparison result is obtained, the comparison result can be generated html file and be shown.Fortune
Dimension personnel or research staff see after the comparison result that the corresponding problem of analysis can be done in many ways according to the comparison result
The application or improvement in face.
In one preferred embodiment of the invention, the cleaning tool can be changed according to the comparison result.
Specifically, cleaning tool is actually needed the cleaning result that the result (the first monitoring data) of cleaning and monitoring are obtained
(the second monitoring data) is often inconsistent, such as the file applied in installation process generation having, cleaning tool
Itself and its lower All Files can be disposed, if other guide (such as chat record file) is also placed on this document by the application
Will be deleted together under folder, at this moment monitoring the cleaning result for obtaining can show this difference, now then can be for cleaning
Instrument is improved, in case here class is deleted by mistake.
In another preferred embodiment of the invention, the storehouse of the cleaning tool can be updated according to the comparison result
File.It is specifically as follows:The second installation increased in the library file of the cleaning tool in first monitoring data is unnecessary
The second cleaning redundant data in data and second monitoring data;Delete in the library file of the cleaning tool described
The second cleaning redundant data in the first cleaning redundant data and the 3rd monitoring data in 3rd monitoring data.
Specifically, it is default in the cleaning result (the second monitoring data) that obtains of monitoring and library file to clear up data (the
Three monitoring datas) it is also usually inconsistent, by default cleaning data in the monitored results and library file of process monitoring instrument
During contrast, it can be found that some files for monitoring should be deleted, and library file does not include these files, now then should be by
These files are added in library file, to improve library file.In brief, i.e., according to the comparison result of each relative analyses,
The data that the data or monitoring for being actually needed cleaning are obtained add library file, removing for the data that need not be cleared up in library file
Go, dynamically to safeguard the library file.
Step 104, using the cleaning tool of the modification cleaning of junk data is carried out.
Specifically, after to being improved after cleaning tool improvement or to the library file of cleaning tool, then using described clear
Science and engineering tool carries out the cleaning of junk data, can improve the efficiency and accuracy of garbage data cleaning.
In order that those skilled in the art is better understood when the present invention, below by way of an instantiation to the present invention
Principle be illustrated:
In this example, to broadcast software soon, it is Total that monitoring tools are installed in the application for the application to be installed
Uninstall, the process monitoring instrument is Process Monitor, and the cleaning tool is that the software of 360 security guards is clear
Reason function.This example can include following process:
A, opens Total Uninstall, and the installation process of software is broadcast soon in monitoring:
A1, starts Total Uninstall, installs broadcast software (as shown in Figure 2) soon manually;
A2, after installation, the first file modification data and the first Registry Modifications data before and after being installed are (as schemed
Shown in 3);
A3, by the first file modification data and the first Registry Modifications data export, saves as and " broadcasts installation journey soon
Sequence-modification .txt ", and analyze file modification information fileList1 therein and registry cleaner information regList1.
B, obtains the cleaning library file for broadcasting software soon in 360 security guard's softwares cleaning library file, analyzes it
In file clean-up information fileList3 and registry cleaner information regList3.
C, monitors the file and registry operations of 360 security guard's software clearing functions:
C1, opens process monitoring instrument Process Monitor, selects monitoring filtering condition (as shown in Figure 4):
f)Process Name:Process 360safe.exe is specified in 360safe.exe monitoring
g)Operation:Set Disposition Information File monitor file deletion action
h)Operation:RegDelete Key monitor the deletion action of registry key
i)Operation:RegDelete Value monitor the deletion action of registration table key assignments
j)Operation:The modification operation of RegSet Value monitoring registration table key assignments
C2, opens 360 security guard's software clearing functions, chooses the software to be cleared up to be cleared up (such as Fig. 5 and Fig. 6 institutes
Show);
C3, obtains the monitored results of Process Monitor, analyzes file operation information fileList2 and registration table
Operation information regList2 (as shown in Figure 7).
D, contrasts three kinds of results
D1, fileList1/fileList2, regList1/regList2, the file for increasing when drawing installation or changing and
The first comparison result between the file being deleted or modified and registration table when registration table and cleaning;
D2, fileList1/fileList3, regList1/regList3, the file for increasing when drawing installation or changing and
The second comparison result between registration table and the library file of bodyguard's software cleaning;
D3, fileList2/fileList3, regList2/regList3, draw bodyguard's software clear up library file with it is clear
The 3rd comparison result between the file being deleted or modified and registration table during reason.
E, shows three kinds of comparing results, analyzes corresponding problem (as shown in Fig. 8, Fig. 9 and Figure 10).
It should be noted that examples detailed above is a kind of example of the present invention, for explaining the present invention, but can not explain
For limitation of the present invention.
In the present invention, the file and registry operations involved by the installation applied by analysis and scale removal process, will
Cleaning tool be actually needed cleaning data (the first monitoring data), it is default cleaning data (the 3rd monitoring data), monitor
To cleaning data (the second monitoring data) three between compared obtained comparison result two-by-two, realize to application cleaning knot
The contrast in all directions of fruit, realizes the measurement in all directions to software clearing function, so as to judge cleaning tool scale removal process
Whether operation is correct and thorough, and more quickly the clearing function of cleaning tool is estimated, in practice it has proved that, with manpower comparing pair
Effect compare with efficiency, contrast correctness that the present invention is improved to the clearing function of cleaning tool and efficiency are more than 95%.
In addition, the present invention is analyzed by showing comparison result for scientific research personnel or operation maintenance personnel, can also more easily tie up
Protect and improve library file, and the clearing function for improving cleaning tool accordingly.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but this area
Technical staff should know that the present invention is not limited by described sequence of movement, because according to the present invention, some steps can
With using other order or while carry out.Secondly, those skilled in the art also should know, enforcement described in this description
Example belongs to preferred embodiment, and involved action and the module not necessarily present invention is necessary.
With reference to Figure 11, a kind of structured flowchart of garbage data cleaning device embodiment of the present invention, the rubbish are shown
Data scrubbing device is used for cleaning application and installs produced junk data, and the embodiment of the present invention can be included such as lower module:
Monitoring data acquisition module 201, is suitable to obtain the first monitoring data, the second monitoring data and the 3rd monitoring number
According to first monitoring data includes the modification information using system after installing, and second monitoring data includes cleaning tool
The modification information of system after garbage data cleaning is carried out to the application, the 3rd monitoring data is included in the pre- of cleaning tool
If for described using modification information set in advance in library file;First monitoring data, the second monitoring data and
Three monitoring datas are organized according to predefined file path field and/or registry entry identification field;
Comparison result acquisition module 202, is suitable to distinguish according to identical file path field and/or registry entry identification field
Relative recording is extracted from first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is obtained
Obtain comparison result;
Cleaning tool modified module 203, is suitable to change the cleaning tool according to the comparison result;
Data scrubbing module 204, being suitable for use with the cleaning tool of the modification carries out the cleaning of junk data.
In one preferred embodiment of the invention, described device can also include:
Library file update module, is suitable to update the library file of the cleaning tool according to the comparison result.
In one preferred embodiment of the invention, the monitoring data acquisition module 201 is further adapted for:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file of system before and after the application is installed
Modification data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain first of system before and after the application is installed
Registration modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registration table
Monitoring data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
Wherein, the first file modification data include newly-increased file and newly-increased file;First registration
Modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
In one preferred embodiment of the invention, the monitoring data acquisition module 201 is further adapted for:
Obtain cleaning tool carries out clearing up the second file modification data for obtaining and the to the junk data of the application
Two Registry Modifications data, the second file modification data include file path field, the second Registry Modifications data
Including registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registration table
Monitoring data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
Wherein, the second file modification data include the file of the file and deletion deleted;Second registration
Table modification data include the registry key deleted, the registration table key assignments deleted, the registration table key assignments of modification.
In one preferred embodiment of the invention, the monitoring data acquisition module 201 is further adapted for:
From the default library file of cleaning tool obtain for it is described using the 3rd file modification data set in advance and
3rd Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications number
According to including registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registration table
Monitoring data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
In one preferred embodiment of the invention, the comparison result includes the first comparison result, the second comparison result
And the 3rd comparison result, the comparison result acquisition module 202 is further adapted for:
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described
Second monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first prison
The first cleaning redundant data in the first installation redundant data, and the second monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data with it is described
3rd monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first prison
The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data in control data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data with it is described
3rd monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second prison
The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data in control data.
In one preferred embodiment of the invention, the library file update module is further adapted for:
Increase in the library file of the cleaning tool in first monitoring data second installation redundant data and
The second cleaning redundant data in second monitoring data;
Delete in the library file of the cleaning tool in the 3rd monitoring data first cleaning redundant data and
The second cleaning redundant data in 3rd monitoring data.
For the device embodiment of Figure 11, due to its embodiment of the method basic simlarity with Fig. 1, so the ratio of description
Relatively simple, related part is illustrated referring to the part of embodiment of the method.
Provided herein algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment.
Various general-purpose systems can also be used together based on teaching in this.As described above, construct required by this kind of system
Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use it is various
Programming language realizes the content of invention described herein, and the description done to language-specific above is to disclose this
Bright preferred forms.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The more features of feature that the application claims ratio of shield is expressly recited in each claim.More precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Unit or component organization into a module or unit or component, and can be divided in addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any
Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Profit is required, summary and accompanying drawing) disclosed in each feature can it is identical by offers, be equal to or the alternative features of similar purpose carry out generation
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint
One of meaning can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation
Software module realize, or with combinations thereof realization.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) to realize garbage data cleaning equipment according to embodiments of the present invention in one
The some or all functions of a little or whole parts.The present invention is also implemented as performing method as described herein
Some or all equipment or program of device (for example, computer program and computer program).Such realization
The program of the present invention can be stored on a computer-readable medium, or can have the form of one or more signal.This
The signal of sample can be downloaded from internet website and obtained, or be provided on carrier signal, or be carried in any other form
For.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability
Field technique personnel can design without departing from the scope of the appended claims alternative embodiment.In the claims,
Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer
It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame
Claim.
Claims (18)
1. a kind of garbage data cleaning method, for cleaning application produced junk data is installed, and described method includes:
The first monitoring data, the second monitoring data and the 3rd monitoring data are obtained, first monitoring data is included using peace
The modification information of system after dress, second monitoring data application is carried out including cleaning tool be after garbage data cleaning
The modification information of system, the 3rd monitoring data includes being preset for the application in the default library file of cleaning tool
Modification information;First monitoring data, the second monitoring data and the 3rd monitoring data are according to predefined file path
Field and/or registry entry identification field are organized;
According to identical file path field and/or registry entry identification field respectively from first monitoring data, the second monitoring
Relative recording is extracted in data and the 3rd monitoring data to be compared two-by-two, obtains comparison result;
The cleaning tool is changed according to the comparison result;
The cleaning of junk data is carried out using the cleaning tool of the modification.
2. the method for claim 1, it is characterised in that also include:
The library file of the cleaning tool is updated according to the comparison result.
3. method as claimed in claim 1 or 2, it is characterised in that include the step of first monitoring data of acquisition:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file modification of system before and after the application is installed
Data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain the first registration of system before and after the application is installed
Modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registry monitoring
Data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
4. method as claimed in claim 3, it is characterised in that the first file modification data include newly-increased file and
Newly-increased file;The first registration modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key
Value.
5. method as claimed in claim 1 or 2, it is characterised in that include the step of second monitoring data of acquisition:
Obtain cleaning tool carries out clearing up the second file modification data and the second note that obtain to the junk data of the application
Volume table modification data, the second file modification data include file path field, and the second Registry Modifications data include
Registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registry monitoring
Data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
6. method as claimed in claim 5, it is characterised in that the second file modification data include the file deleted and
The file of deletion;The second Registry Modifications data include the registry key, the registration table key assignments of deletion, modification deleted
Registration table key assignments.
7. method as claimed in claim 1 or 2, it is characterised in that include the step of three monitoring data of the acquisition:
Obtain for described using the 3rd file modification data set in advance and the 3rd from the default library file of cleaning tool
Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications packet
Include registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registry monitoring
Data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
8. method as claimed in claim 2, it is characterised in that the comparison result includes that the first comparison result, second compare
As a result and the 3rd comparison result, it is described according to identical file path field and/or registry entry identification field respectively from described
Relative recording is extracted in first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is compared
As a result the step of, includes:
According to identical file path field and/or registry entry identification field respectively from first monitoring data and described second
Monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first monitoring number
The first cleaning redundant data in the first installation redundant data, and the second monitoring data according in;First monitoring data
In the first installation redundant data be using the data of cleaning are needed when installing than the redundant data of actual cleaning data;Described
The first cleaning redundant data in two monitoring datas is than installing the unnecessary of the data for needing cleaning using the data of actual cleaning
Data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data and the described 3rd
Monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first monitoring number
The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data according in;First monitoring data
In second installation redundant data be using install when need cleaning data than preset need cleaning data redundant data;
The first cleaning redundant data in 3rd monitoring data is to need cleaning when the data ratio application of default needs cleaning is installed
Data redundant data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data and the described 3rd
Monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second monitoring number
The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data according in;Second monitoring data
In the second cleaning redundant data be actual cleaning data than presetting the redundant data of the data that needs are cleared up;3rd monitoring
The second cleaning redundant data in data is the default data for needing cleaning than the redundant data of actual cleaning data.
9. method as claimed in claim 8, it is characterised in that described to update the cleaning tool according to the comparison result
The step of library file, includes:
Increase the second installation redundant data and described in first monitoring data in the library file of the cleaning tool
The second cleaning redundant data in second monitoring data;
The first cleaning redundant data and described in the 3rd monitoring data is deleted in the library file of the cleaning tool
The second cleaning redundant data in 3rd monitoring data.
10. a kind of garbage data cleaning device, for cleaning application produced junk data is installed, and described device includes:
Monitoring data acquisition module, is suitable to obtain the first monitoring data, the second monitoring data and the 3rd monitoring data, and described the
One monitoring data includes the modification information using system after installing, and second monitoring data includes cleaning tool to the application
The modification information of system after garbage data cleaning is carried out, the 3rd monitoring data is included in the default library file of cleaning tool
For described using modification information set in advance;First monitoring data, the second monitoring data and the 3rd monitoring data
Organized according to predefined file path field and/or registry entry identification field;
Comparison result acquisition module, is suitable to according to identical file path field and/or registry entry identification field respectively from described
Relative recording is extracted in first monitoring data, the second monitoring data and the 3rd monitoring data to be compared two-by-two, is compared
As a result;
Cleaning tool modified module, is suitable to change the cleaning tool according to the comparison result;
Data scrubbing module, being suitable for use with the cleaning tool of the modification carries out the cleaning of junk data.
11. devices as claimed in claim 10, also include:
Library file update module, is suitable to update the library file of the cleaning tool according to the comparison result.
12. devices as described in claim 10 or 11, the monitoring data acquisition module is further adapted for:
Obtain first file data and the first registry data of system before the application is installed;
Obtain second file data and the second registry data of system after the application is installed;
Comparison first file data and the second file data, obtain the first file modification of system before and after the application is installed
Data, the first file modification data include file path field;
Comparison first registry data and the second registry data, obtain the first registration of system before and after the application is installed
Modification data, the first Registry Modifications data include registry entry identification field;
The data in the first file modification data under file path field are extracted as the first file monitor data;
The data under the registry entry identification field in the first Registry Modifications data are extracted as the first registry monitoring
Data;
The first file monitor data and the first registry monitoring data are organized into into the first monitoring data.
13. devices as claimed in claim 12, the first file modification data include newly-increased file and newly-increased text
Part is pressed from both sides;The first registration modification data include the newly-increased key of registration table, registration table newly-increased key assignments, Registry Modifications key assignments.
14. devices as described in claim 10 or 11, the monitoring data acquisition module is further adapted for:
Obtain cleaning tool carries out clearing up the second file modification data and the second note that obtain to the junk data of the application
Volume table modification data, the second file modification data include file path field, and the second Registry Modifications data include
Registry entry identification field;
The data in the second file modification data under file path field are extracted as the second file monitor data;
The data under the registry entry identification field in the second Registry Modifications data are extracted as the second registry monitoring
Data;
The second file monitor data and the second registry monitoring data are organized into into the second monitoring data.
15. devices as claimed in claim 14, the second file modification data include the text of the file and deletion deleted
Part is pressed from both sides;The second Registry Modifications data include the registry key deleted, the registration table key assignments deleted, the registry key of modification
Value.
16. devices as described in claim 10 or 11, the monitoring data acquisition module is further adapted for:
Obtain for described using the 3rd file modification data set in advance and the 3rd from the default library file of cleaning tool
Registry Modifications data, the 3rd file modification data include file path field, the 3rd Registry Modifications packet
Include registry entry identification field;
The data in the 3rd file modification data under file path field are extracted as the 3rd file monitor data;
The data under the registry entry identification field in the 3rd Registry Modifications data are extracted as the 3rd registry monitoring
Data;
The 3rd file monitor data and the 3rd registry monitoring data are organized into into the 3rd monitoring data.
17. devices as claimed in claim 11, the comparison result includes the first comparison result, the second comparison result and the
Three comparison results, the comparison result acquisition module is further adapted for:
According to identical file path field and/or registry entry identification field respectively from first monitoring data and described second
Monitoring data is extracted relative recording and is compared, and obtains the first comparison result, and first comparison result includes the first monitoring number
The first cleaning redundant data in the first installation redundant data, and the second monitoring data according in;First monitoring data
In the first installation redundant data be using the data of cleaning are needed when installing than the redundant data of actual cleaning data;Described
The first cleaning redundant data in two monitoring datas is than installing the unnecessary of the data for needing cleaning using the data of actual cleaning
Data;
According to identical file path field and/or registry entry identification field respectively from first monitoring data and the described 3rd
Monitoring data is extracted relative recording and is compared, and obtains the second comparison result, and second comparison result includes the first monitoring number
The first cleaning redundant data in the second installation redundant data, and the 3rd monitoring data according in;First monitoring data
In second installation redundant data be using install when need cleaning data than preset need cleaning data redundant data;
The first cleaning redundant data in 3rd monitoring data is to need cleaning when the data ratio application of default needs cleaning is installed
Data redundant data;
According to identical file path field and/or registry entry identification field respectively from second monitoring data and the described 3rd
Monitoring data is extracted relative recording and is compared, and obtains the 3rd comparison result, and the 3rd comparison result includes the second monitoring number
The second cleaning redundant data in the second cleaning redundant data, and the 3rd monitoring data according in;Second monitoring data
In the second cleaning redundant data be actual cleaning data than presetting the redundant data of the data that needs are cleared up;3rd monitoring
The second cleaning redundant data in data is the default data for needing cleaning than the redundant data of actual cleaning data.
18. devices as claimed in claim 17, the library file update module is further adapted for:
Increase the second installation redundant data and described in first monitoring data in the library file of the cleaning tool
The second cleaning redundant data in second monitoring data;
The first cleaning redundant data and described in the 3rd monitoring data is deleted in the library file of the cleaning tool
The second cleaning redundant data in 3rd monitoring data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310629926.2A CN103838601B (en) | 2013-11-29 | 2013-11-29 | Junk data cleaning method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310629926.2A CN103838601B (en) | 2013-11-29 | 2013-11-29 | Junk data cleaning method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103838601A CN103838601A (en) | 2014-06-04 |
CN103838601B true CN103838601B (en) | 2017-04-19 |
Family
ID=50802134
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310629926.2A Expired - Fee Related CN103838601B (en) | 2013-11-29 | 2013-11-29 | Junk data cleaning method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103838601B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104699513B (en) * | 2015-03-31 | 2018-11-09 | 联想(北京)有限公司 | A kind of document handling method and device |
CN105260438A (en) * | 2015-09-30 | 2016-01-20 | 联想(北京)有限公司 | File management method and electronic device |
CN107832155B (en) * | 2017-11-14 | 2020-01-14 | Oppo广东移动通信有限公司 | Method and device for replacing algorithm, storage medium and electronic equipment |
CN109800022B (en) * | 2019-01-25 | 2022-07-08 | 郑州云海信息技术有限公司 | Method, system, terminal and storage medium for automatically comparing BIOS information difference |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043655A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Method and system for carrying out advanced uninstall on software |
CN102495772A (en) * | 2011-09-30 | 2012-06-13 | 奇智软件(北京)有限公司 | Characteristic-based terminal program cloud backup and recovery methods |
CN102915353A (en) * | 2012-09-28 | 2013-02-06 | 浙江图讯科技有限公司 | Method for cleaning junk data |
CN102937990A (en) * | 2012-10-30 | 2013-02-20 | 北京小米科技有限责任公司 | Method and device for cleaning files |
CN103092938A (en) * | 2013-01-07 | 2013-05-08 | 浙江鸿程计算机系统有限公司 | Method for intelligently cleaning garbage file of secure digital (SD) card of Android mobile phone |
CN103176828A (en) * | 2013-03-29 | 2013-06-26 | 北京奇虎科技有限公司 | Method and device of deleting application program residual files |
CN103345411A (en) * | 2013-07-09 | 2013-10-09 | 北京奇虎科技有限公司 | Method and device for uninstalling application program |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100426298B9 (en) * | 2006-08-28 | 2016-10-26 | 华为技术有限公司 | A kind of cleaning garbage files method and system |
CN101876914A (en) * | 2010-04-23 | 2010-11-03 | 中兴通讯股份有限公司 | Method for deleting files and mobile terminal |
CN102654872A (en) * | 2011-03-03 | 2012-09-05 | 腾讯科技(深圳)有限公司 | Method and device for cleaning junk files generated by application programs |
-
2013
- 2013-11-29 CN CN201310629926.2A patent/CN103838601B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043655A (en) * | 2011-01-04 | 2011-05-04 | 奇智软件(北京)有限公司 | Method and system for carrying out advanced uninstall on software |
CN102495772A (en) * | 2011-09-30 | 2012-06-13 | 奇智软件(北京)有限公司 | Characteristic-based terminal program cloud backup and recovery methods |
CN102915353A (en) * | 2012-09-28 | 2013-02-06 | 浙江图讯科技有限公司 | Method for cleaning junk data |
CN102937990A (en) * | 2012-10-30 | 2013-02-20 | 北京小米科技有限责任公司 | Method and device for cleaning files |
CN103092938A (en) * | 2013-01-07 | 2013-05-08 | 浙江鸿程计算机系统有限公司 | Method for intelligently cleaning garbage file of secure digital (SD) card of Android mobile phone |
CN103176828A (en) * | 2013-03-29 | 2013-06-26 | 北京奇虎科技有限公司 | Method and device of deleting application program residual files |
CN103345411A (en) * | 2013-07-09 | 2013-10-09 | 北京奇虎科技有限公司 | Method and device for uninstalling application program |
Also Published As
Publication number | Publication date |
---|---|
CN103838601A (en) | 2014-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150242431A1 (en) | Computer system log file analysis based on field type identification | |
CN103838601B (en) | Junk data cleaning method and device | |
US9038029B2 (en) | Three-dimensional GUI object stores in automation test tools | |
US10423474B2 (en) | Performing diagnostic tracing of an executing application to identify suspicious pointer values | |
US8930761B2 (en) | Test case result processing | |
GB2521364A (en) | Recording GUI data | |
CN106446685A (en) | Methods and devices for detecting malicious documents | |
US20140149924A1 (en) | Logged event frequency visualization | |
KR101266930B1 (en) | A visualization system for Forensics audit data | |
US8225298B2 (en) | Tool for analyzing Siebel escripts | |
CN106886417A (en) | A kind of universal parallel method for digging of linear temporal specification | |
CN107038117A (en) | It is a kind of based on the web automated testing methods that reference is defined between event handling function | |
JP2010122959A (en) | Test support system, method, and program | |
US9852048B2 (en) | Simulating process variable changes during process runtime | |
AfzaliSeresht et al. | An explainable intelligence model for security event analysis | |
US8249848B2 (en) | Verifying a processor design using a processor simulation model | |
DeMott et al. | Towards an automatic exploit pipeline | |
Silva et al. | In situ data steering on sedimentation simulation with provenance data | |
Patri et al. | Data mining with shapelets for predicting valve failures in gas compressors | |
US20130325382A1 (en) | Side-channel analysis apparatus and method based on profile | |
JP5962779B2 (en) | Flag access defect inspection device, flag access defect inspection method, flag access defect inspection program | |
CN102982292B (en) | Obtain method and apparatus and the system of trusted file digital signature | |
US9665454B2 (en) | Extracting test model from textual test suite | |
Ravi et al. | Unsupervised time series data analysis for error pattern extraction for predictive maintenance | |
Viggiato et al. | On the investigation of domain-sensitive bad smells in information systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170419 Termination date: 20211129 |