CN106021367B - Method and terminal for searching backup data - Google Patents

Method and terminal for searching backup data Download PDF

Info

Publication number
CN106021367B
CN106021367B CN201610307389.3A CN201610307389A CN106021367B CN 106021367 B CN106021367 B CN 106021367B CN 201610307389 A CN201610307389 A CN 201610307389A CN 106021367 B CN106021367 B CN 106021367B
Authority
CN
China
Prior art keywords
target
plug
backup data
compatible
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610307389.3A
Other languages
Chinese (zh)
Other versions
CN106021367A (en
Inventor
韩山骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610307389.3A priority Critical patent/CN106021367B/en
Publication of CN106021367A publication Critical patent/CN106021367A/en
Application granted granted Critical
Publication of CN106021367B publication Critical patent/CN106021367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/144Query formulation

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a method and a terminal for searching backup data; wherein the method comprises the following steps: determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in the target application program; acquiring plug-in identification information and compatible feature information corresponding to the target plug-in; obtaining a target characteristic value of the target plug-in based on plug-in identification information and compatible characteristic information corresponding to the target plug-in; and searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.

Description

Method and terminal for searching backup data
Technical Field
The present invention relates to data processing technologies, and in particular, to a method and a terminal for searching backup data.
Background
Along with the high-speed development of electronic equipment hardware and the rapid popularization of intelligent terminals, in order to reduce the size of an application program (APP) installation package, more and more functional components are issued in a plug-in mode, and meanwhile, backup files corresponding to the plug-in are stored to the intelligent terminals so as to be reused.
However, after the APP is upgraded, once the plug-in is updated or data is lost, the old version backup file corresponding to the plug-in before updating, which is stored in the electronic device, cannot be reused, so that even if the old version backup file is available, the old version backup file cannot be reused, but is directly deleted, and the backup file corresponding to the updated plug-in is downloaded again, thereby reducing user experience.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide a method and a terminal for searching backup data, which can at least solve the above problems in the prior art.
The technical scheme of the embodiment of the invention is realized as follows:
a first aspect of an embodiment of the present invention provides a method for searching backup data, including:
determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
acquiring plug-in identification information and compatible feature information corresponding to the target plug-in;
obtaining a target characteristic value of the target plug-in based on plug-in identification information and compatible characteristic information corresponding to the target plug-in;
and searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
A second aspect of an embodiment of the present invention provides a terminal, including:
a determining unit for determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
the information acquisition unit is used for acquiring the plug-in identification information and the compatible characteristic information corresponding to the target plug-in;
the characteristic value generating unit is used for obtaining a target characteristic value of the target plug-in based on the plug-in identification information and the compatible characteristic information corresponding to the target plug-in;
and the data processing unit is used for searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
According to the method and the terminal for searching backup data, when the target plug-in is updated or the data is lost, the backup data corresponding to the target plug-in before updating does not need to be directly deleted, whether the available target backup data exists in the backup data corresponding to the target plug-in before updating is firstly searched, and whether the stored backup data is reused or not is further determined according to the searching result, so that the multiplexing capability of the backup data is improved, repeated downloading of the backup data by a user is avoided to the greatest extent, the user experience is improved, and meanwhile, a foundation is laid for saving the data flow of the user.
Compared with the existing plug-in mechanism which simply judges whether the backup data is available through file name verification and further determines whether the backup data is compatible after the backup data is available, the embodiment of the invention can find out the target backup data which is available for the target plug-in and compatible with the target plug-in through one-time searching process, thereby reducing the searching flow, enabling the searching process to be rapid, improving the searching efficiency and further improving the user experience.
Drawings
FIG. 1 is a schematic diagram illustrating an implementation flow of a method for searching backup data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an application framework according to an embodiment of the present invention;
3-1 and 3-2 are schematic diagrams of user interfaces according to embodiments of the present invention;
FIG. 4 is a diagram illustrating a backup data before and after naming according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating a specific implementation of a method for searching backup data according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a user interface in one embodiment of the present invention;
fig. 7 is a first schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and aspects of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
Example one
The embodiment of the invention provides a method for searching backup data; the method is applied to the terminal; specifically, fig. 1 is a schematic diagram of an implementation flow of a method for searching backup data according to an embodiment of the present invention; FIG. 2 is a schematic diagram of an application framework according to an embodiment of the present invention; in practical applications, as shown in fig. 2, the terminal may access the network through the signal transmission tower and further access the application server, for example, the terminal accesses the network through WIreless Fidelity (Wi-Fi) and then accesses the application server; or, the terminal can also access the network through the base station, and then access the application server, so as to run the target application program on the terminal; here, the application server stores a target application and various functional components corresponding to the target application, i.e., plug-ins and the like. Based on the application framework shown in fig. 2, the method of this embodiment includes:
step 101: determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
in this embodiment, the change of the data characteristic may specifically indicate a change such as data update or data loss. For example, after the target application program is updated, the plug-in corresponding to the target application program is also updated correspondingly, or part of data is lost without updating correspondingly, so that the plug-in cannot operate normally, and at this time, the plug-in which cannot operate normally due to updating or data loss is taken as the target plug-in.
Step 102: acquiring plug-in identification information and compatible feature information corresponding to the target plug-in;
in practical application, the plug-in identification information corresponding to the target plug-in may specifically be a file name of the target plug-in; the compatible feature information may be a compatible Identification (ID), i.e. a file compatibility characteristic, written in the program of the target plug-in. Here, the terminal may determine whether the backup data is compatible with the target plug-in through the compatibility identifier; for example, when the compatible identifier of the target plug-in represented by the compatible feature information is the same as the compatible identifier in the backup data, it indicates that the backup data is compatible with the target plug-in; otherwise, it indicates that the backup data is incompatible with the target plug-in.
Step 103: obtaining a target characteristic value of the target plug-in based on plug-in identification information and compatible characteristic information corresponding to the target plug-in;
step 104: and searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
In practical applications, the target feature value may specifically be a Message Digest Algorithm fifth version (MD 5, Message Digest Algorithm 5) value; that is to say, the terminal determines the MD5 value corresponding to the target plug-in according to the plug-in identification information and the compatible feature information corresponding to the target plug-in. Here, since the MD5 value is determined based on the plug-in identification information and compatible feature information corresponding to the target plug-in, that is, the MD5 value corresponding to the target plug-in can represent both the identification information and the compatible feature of the target plug-in; therefore, when the terminal finds out the target backup data matched with the MD5 value corresponding to the target plug-in from the stored backup data corresponding to the target plug-in, the target backup data is the backup data available and compatible to the target plug-in.
In an embodiment, in order to facilitate the terminal to determine the backup data corresponding to the target plug-in, the terminal further needs to obtain location information of the backup data corresponding to the target plug-in, for example, determine a directory where the backup data corresponding to the target plug-in is located, and then search, by using the location information, whether there is target backup data matching the target characteristic value from the stored backup data corresponding to the target plug-in.
In a specific application, when a search result represents that target backup data matched with the target characteristic value exists, verifying the target backup data, and further determining whether to operate the target plug-in by using the target backup data based on a verification result; specifically, when the data characteristics of the target backup data represented by the verification result do not change, the target backup data is multiplexed to operate the target plug-in by using the target backup data; and when the verification result represents that the data characteristics of the target backup data are changed, generating prompt information to prompt a user to download the target backup data again.
Or when the search result represents that the target backup data matched with the target characteristic value does not exist, generating prompt information to prompt a user to download the target backup data again. Here, the verification may specifically be signature verification; for example, a check is made according to the format of the signature to determine whether the target backup data is modified by the format of the signature.
Specifically, as shown in fig. 3, after the target application program of the terminal is upgraded, the target plug-in is also upgraded correspondingly, at this time, if the user uses the function corresponding to the target plug-in advance, the terminal needs to acquire the backup data corresponding to the target plug-in so as to operate the target plug-in, where the specific acquisition process is as follows:
the terminal acquires the file name and the compatible identification of the target plug-in, the MD5 value of the target plug-in is determined according to the file name and the compatible identification of the target plug-in and a preset calculation rule, then the MD5 value of the target plug-in is utilized to search whether target backup data with the same MD5 value as the target plug-in exists in backup data corresponding to the target plug-in stored in the terminal, and at the moment, a display interface of the terminal presents prompt information of 'searching for the target backup data' so as to inform a user of waiting for a search result; further, as shown in fig. 3-1, after the terminal finds the target backup data having the same MD5 value as the target plug-in, the terminal prompts the user to confirm whether to immediately run the target backup data, such as decompressing the target backup data, and then run the target plug-in; or, as shown in fig. 3-2, when the terminal does not find the target backup data with the same MD5 value as the target plug-in, the terminal prompts the user to "find no target backup data", and simultaneously prompts the user to "whether to download the target backup data".
Therefore, compared with the mode that the existing plug-in mechanism only simply judges whether the backup data is available through file name verification, and further determines whether the backup data is compatible after the backup data is determined to be available, the method provided by the embodiment of the invention can find out the target backup data which is available for the target plug-in and compatible with the target plug-in through one-time searching process, so that the searching process is reduced, the searching process is enabled to be fast, the searching efficiency is improved, and the user experience is further improved.
Moreover, according to the method provided by the embodiment of the invention, when the target plug-in is updated or the data is lost, the backup data corresponding to the target plug-in before updating does not need to be directly deleted, whether the available target backup data exists in the backup data corresponding to the target plug-in before updating is firstly searched, the next operation is determined according to the searching result, for example, when the target backup data exists, the target backup data is multiplexed, the target plug-in is further operated, and when the target backup data is not searched, the user is informed to download the target backup data.
Example two
Based on the method described in the first embodiment, in order to ensure that the terminal can find the target backup data matched with the target characteristic value in the backup data corresponding to the target plug-in stored in the terminal based on the target characteristic value of the target plug-in, such as the MD5 value; in this embodiment, before step 104, the method for searching backup data further includes:
step A: obtaining backup data of at least one plug-in corresponding to the target application program;
and B: acquiring plug-in identification information and compatible feature information of at least one plug-in corresponding to the target application program;
and C: generating a characteristic value of at least one plug-in according to plug-in identification information and compatible characteristic information of the at least one plug-in corresponding to the target application program;
the characteristic value described in this embodiment is also specifically an MD5 value, for example, the terminal determines, according to a preset calculation rule, an MD5 value corresponding to each plug-in according to the plug-in identification information and the compatible characteristic information of each plug-in, that is, according to the file name and the compatible identification of each plug-in, renames the backup data corresponding to each plug-in according to the MD5 value, and further causes the terminal to store the backup data according to the renamed file name. Therefore, a foundation is laid for the terminal to quickly search the target backup data corresponding to the target plug-in, and meanwhile, a foundation is laid for reusing the backup data.
Step D: obtaining backup identification information of backup data corresponding to the at least one plug-in based on the characteristic value of the at least one plug-in;
step E: and storing the backup data corresponding to the at least one plug-in by using the backup identification information.
In this embodiment, when the terminal stores the backup data of the plug-in corresponding to the target application, the terminal may set backup identification information for each backup data according to the plug-in identification information and the compatible feature information, and set a file name of the backup data according to the plug-in identification information and the compatible feature information, so that whether the backup data is the target backup data corresponding to the target plug-in may be determined according to the stored file name of each backup data, and meanwhile, whether the backup data is the target backup data compatible with the target plug-in may also be determined.
Here, in practical applications, the backup data obtained in step a usually exists in the form of compressed packets, for example, Zip packets; as shown in fig. 4, it is assumed that a file name of backup data corresponding to a plug-in acquired by a terminal is a first file name, where the first file name only represents a corresponding relationship between the backup data and the plug-in and cannot represent a compatible feature of the backup data, the terminal acquires plug-in identification information corresponding to the plug-in, such as a file name of the plug-in, and compatible feature information, such as a compatible identifier of the plug-in, and then the terminal renames the backup data corresponding to the plug-in by using the file name and the compatible identifier of the plug-in, such as naming the second file name, where the second file name can represent both the corresponding relationship between the plug-in and the compatible feature, and thus, a foundation is laid for the terminal to quickly search for target backup data corresponding to a target plug-in.
Here, when the terminal names backup data corresponding to all plug-ins of its own target application program based on the naming rule, the named backup data is stored in a corresponding directory, and then, when the target application program of the terminal is upgraded, the target plug-ins are also upgraded correspondingly, or part of data is lost without corresponding update, so that the target plug-ins cannot run normally, the terminal may determine a target characteristic value by obtaining plug-in identification information and compatible characteristic information corresponding to the target plug-ins, and then search for whether to store the target backup data matched with the target plug-ins according to the target characteristic value; specifically, fig. 5 is a schematic flowchart of a specific implementation of a method for searching backup data according to an embodiment of the present invention; as shown in figure 5 of the drawings,
step 501: the plug-in module after the target APP version is upgraded or the target APP is decompressed has data loss, and at the moment, the plug-in module with the data loss serves as the target plug-in module;
step 502: the terminal searches a target directory where the backup file corresponding to the target plug-in is located from a database corresponding to the terminal;
step 503: the terminal obtains the file name and the compatible identification of the target plug-in, and obtains a target MD5 value according to the file name and the compatible identification of the target plug-in;
here, the execution order of steps 502 and 503 may be reversed.
Step 504: searching whether target backup data matched with the target MD5 value exists in the target directory; if yes, go to step 505; otherwise, go to step 507;
here, the terminal stores the backup data in the form of Zip compressed packets.
Step 505: the terminal performs signature verification on the Zip packet of the target backup data to determine whether the target backup data is tampered; when it is determined to be tampered, performing step 507; otherwise, go to step 506;
step 506: and the terminal decompresses the Zip packet of the target backup data and multiplexes the target backup data to operate the target plug-in.
Step 507: and the terminal generates prompt information to prompt the user to download the target backup data again or prompt the user of an error.
EXAMPLE III
Based on the method described in the first embodiment or the second embodiment, the present embodiment provides a specific application scenario; specifically, the method comprises the following steps:
the application scene one:
the terminal may also detect whether it is able to access the target communication network, e.g., whether it is able to access Wi-Fi; when the target communication network is not accessed, the terminal searches whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
Therefore, a foundation is laid for the terminal to be capable of quickly operating the target plug-in, a foundation is laid for multiplexing backup data, and a foundation is laid for improving user experience.
Further, when the terminal fails to access a target communication network, such as Wi-Fi, and when the search result indicates that no target backup data matching the target feature value exists, the terminal may generate a prompt message as shown in fig. 6, prompt the user that the user is not currently in Wi-Fi but in a mobile network, and further select to immediately download or cancel downloading the target backup data according to the user requirement. Therefore, target backup data can be prevented from being downloaded directly, a foundation is laid for the user to save the flow, and the user experience is improved.
Further, when the terminal can access the target communication network, for example, can access Wi-Fi, and when the search result indicates that there is no target backup data matching the target characteristic value, for example, no target backup data having the backup identification information identical to the MD5 value of the target plug-in is found from the backup data corresponding to the target plug-in, the terminal may download the target backup data using the target communication network, so that a user is prevented from downloading the target backup data using mobile data, traffic is saved for the user, and user experience is improved.
Application scenario two:
the terminal firstly executes processing according to the sequence from step 101 to step 104; when step 104 is executed, the method specifically includes:
searching whether target backup data matched with the target characteristic value exist in stored backup data corresponding to the target plug-in;
when the search result represents that the target backup data matched with the target characteristic value exists, the terminal does not need to detect whether the terminal can be accessed to a target communication network;
when the search result indicates that the target backup data matched with the target characteristic value does not exist, the terminal detects whether the target communication network can be accessed, and then when the terminal can be accessed to the target communication network, such as Wi-Fi can be accessed, the target communication network is used for downloading the target backup data; when the target communication network cannot be accessed, such as Wi-Fi, the prompt message shown in fig. 6 is generated, or the prompt message shown in fig. 3-2 is generated, that is, "target backup data is not found, and whether the target backup data is downloaded or not".
Therefore, the method of the embodiment of the invention can combine the process of determining whether the data are compatible with the process of searching the target backup data into a whole, quickly locate the available and compatible target backup data, reduce the Input/Output (I/O) operation at the terminal and shorten the operation time; moreover, the backup data stored by the terminal is fully utilized, the reuse rate of the backup data is improved, the waiting time of a user is further reduced, and the user experience is improved.
Example four
An embodiment of the present invention provides a terminal, as shown in fig. 2, where the terminal according to the embodiment of the present invention may access a network through a signal transmission tower, and then access an application server, for example, the terminal accesses the network through a WIreless Fidelity (Wi-Fi) and then accesses the application server; or, the base station is accessed into the network, and then is accessed into the application program server, so as to run the target application program at the terminal; here, the application server stores a target application and various functional components corresponding to the target application, i.e., plug-ins and the like. Based on the application framework shown in fig. 2, as shown in fig. 7, the terminal includes:
a determination unit 71 for determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
an information obtaining unit 72, configured to obtain plug-in identification information and compatible feature information corresponding to the target plug-in;
a feature value generating unit 73, configured to obtain a target feature value of the target plug-in based on the plug-in identification information and the compatible feature information corresponding to the target plug-in;
and the data processing unit 74 is configured to search, from the stored backup data corresponding to the target plug-in, whether there is target backup data matching the target characteristic value.
In this embodiment, the change of the data characteristic may specifically indicate a change such as data update or data loss. For example, after the target application program is updated, the plug-in corresponding to the target application program is also updated correspondingly, or part of data is lost without updating correspondingly, so that the plug-in cannot operate normally, and at this time, the determining unit takes the plug-in which cannot operate normally due to updating or data loss as the target plug-in.
In practical application, the plug-in identification information corresponding to the target plug-in may specifically be a file name of the target plug-in; the compatible feature information may be a compatible Identification (ID), i.e. a file compatibility characteristic, written in the program of the target plug-in. Here, the terminal may determine whether the backup data is compatible with the target plug-in through the compatibility identifier; for example, when the compatible identifier of the target plug-in represented by the compatible feature information is the same as the compatible identifier in the backup data, it indicates that the backup data is compatible with the target plug-in; otherwise, it indicates that the backup data is incompatible with the target plug-in.
In practical applications, the target feature value may specifically be a Message Digest Algorithm fifth version (MD 5, Message Digest Algorithm 5) value; that is, the feature value generation unit determines the MD5 value corresponding to the target plug-in according to the plug-in identification information and the compatible feature information corresponding to the target plug-in. Here, since the MD5 value is determined based on the plug-in identification information and compatible feature information corresponding to the target plug-in, that is, the MD5 value corresponding to the target plug-in can represent both the identification information and the compatible feature of the target plug-in; therefore, when the data processing unit finds out the target backup data matched with the MD5 value corresponding to the target plug-in from the stored backup data corresponding to the target plug-in, the target backup data is the backup data that is available and compatible for the target plug-in.
In an embodiment, in order to facilitate the terminal to determine the backup data corresponding to the target plug-in, the terminal further needs to obtain location information of the backup data corresponding to the target plug-in, for example, determine a directory where the backup data corresponding to the target plug-in is located, and then search, by using the location information, whether there is target backup data matching the target characteristic value from the stored backup data corresponding to the target plug-in.
In this embodiment, in order to ensure that the terminal can find, based on a target characteristic value of the target plug-in, such as an MD5 value, target backup data that matches the target characteristic value from among backup data that is stored in the terminal and corresponds to the target plug-in; as shown in fig. 8, the terminal further includes: a storage unit 75; wherein,
the information obtaining unit 72 is further configured to obtain backup data, plug-in identification information, and compatible feature information of at least one plug-in corresponding to the target application;
the feature value generating unit 73 is further configured to generate a feature value of at least one plug-in according to the plug-in identification information and the compatible feature information of the at least one plug-in corresponding to the target application program, and obtain backup identification information of backup data corresponding to the at least one plug-in based on the feature value of the at least one plug-in;
the storage unit 75 is configured to store backup data corresponding to the at least one plug-in by using the backup identification information.
Here, the characteristic value is also specifically an MD5 value, for example, the characteristic value generating unit determines an MD5 value corresponding to each plug-in according to the plug-in identification information and the compatible characteristic information of each plug-in, that is, according to the file name and the compatible identification of each plug-in, and renames the backup data corresponding to each plug-in according to the MD5 value, so that the storage unit stores the backup data according to the renamed file name. Therefore, a foundation is laid for the terminal to quickly search the target backup data corresponding to the target plug-in, and meanwhile, a foundation is laid for reusing the backup data.
In this embodiment, when the terminal stores the backup data of the plug-in corresponding to the target application, the terminal may set backup identification information for each backup data according to the plug-in identification information and the compatible feature information, and set a file name of the backup data according to the plug-in identification information and the compatible feature information, so that whether the backup data is the target backup data corresponding to the target plug-in may be determined according to the stored file name of each backup data, and meanwhile, whether the backup data is the target backup data compatible with the target plug-in may also be determined.
In practical applications, the backup data acquired by the information acquisition unit usually exists in the form of compressed packets, for example, Zip packets; as shown in fig. 4, it is assumed that the file name of the backup data corresponding to the plug-in acquired by the information acquisition unit is a first file name, where the first file name only represents the corresponding relationship between the backup data and the plug-in and cannot represent the compatible feature of the backup data, the information acquisition unit acquires plug-in identification information corresponding to the plug-in, such as the file name of the plug-in, and compatible feature information, such as the compatible identifier of the plug-in, and then the feature value generation unit renames the backup data corresponding to the plug-in by using the file name and the compatible identifier of the plug-in, such as naming the second file name, at this time, the second file name represents both the corresponding relationship between the plug-in and the compatible feature, so as to lay a foundation for the terminal to quickly search for the target backup data corresponding to the target plug-in.
Here, after the feature value generating unit names backup data corresponding to all plug-ins of its own target application program based on the naming rule, the named backup data is stored in a corresponding directory by the storage unit, and then, after the target application program of the terminal is upgraded, the target plug-ins are also upgraded correspondingly, or part of data is lost without corresponding update, so that the target plug-ins cannot run normally, the terminal may determine a target feature value by using the plug-in identification information and the compatible feature information corresponding to the target plug-ins, and then search for whether to store the target backup data matched with the target plug-ins according to the target feature value; specifically, the implementation process may be shown in fig. 5, and is not described here again.
In a specific application, the data processing unit is further configured to perform verification processing on the target backup data when the search result represents that the target backup data matched with the target characteristic value exists; and determining whether to operate the target plug-in by using the target backup data based on the verification result. Specifically, the method is further configured to run the target plug-in by using the target backup data when the verification result indicates that the data characteristics of the target backup data do not change; or when the verification result represents that the data characteristics of the target backup data change, generating prompt information to prompt a user to download the target backup data again. Here, the verification may specifically be signature verification; for example, a check is made according to the format of the signature to determine whether the target backup data is modified by the format of the signature.
As shown in fig. 3, after the target application program of the terminal is upgraded, the target plug-in is also upgraded correspondingly, at this time, if the user uses the function corresponding to the target plug-in advance, the terminal needs to acquire the backup data corresponding to the target plug-in so as to operate the target plug-in, and the specific acquisition process is as follows:
the information acquisition unit acquires a file name and a compatible identifier of the target plugin, the characteristic value generation unit determines an MD5 value of the target plugin according to the file name and the compatible identifier of the target plugin and a preset calculation rule, the data processing unit searches whether target backup data with the same MD5 value as the target plugin exists in backup data corresponding to the target plugin stored in the terminal by using the MD5 value of the target plugin, and at the moment, a display interface of the terminal presents prompt information of 'target backup data is being searched', so that a user is informed of waiting for a search result; further, as shown in fig. 3-1, after the data processing unit finds out target backup data having the same MD5 value as the target plug-in, the data processing unit prompts the user to confirm whether to immediately run the target backup data, such as decompressing the target backup data, and then run the target plug-in; or, as shown in fig. 3-2, when the data processing unit does not find the target backup data with the same MD5 value as the target plug-in, the data processing unit prompts the user to "find no target backup data", and simultaneously prompts the user to "whether to download the target backup data".
In this embodiment, as shown in fig. 8, the terminal further includes: a detection unit 76; wherein,
the detecting unit 76 is configured to detect whether the target communication network can be accessed;
the data processing unit 74 is further configured to, when the target communication network is not accessed, search whether target backup data matching the target characteristic value exists in the stored backup data corresponding to the target plug-in.
Specifically, the method comprises the following steps:
the application scene one:
the detection unit can also detect whether the target communication network can be accessed by the detection unit, for example, whether the target communication network can be accessed by the detection unit, and when the target communication network cannot be accessed, the data processing unit can search the stored backup data corresponding to the target plug-in unit for whether the target backup data matched with the target characteristic value exists, so that a foundation is laid for the terminal to be capable of quickly operating the target plug-in unit, a foundation is laid for multiplexing the backup data, and a foundation is laid for improving user experience.
Further, when the terminal fails to access a target communication network, such as Wi-Fi, and when the search result indicates that no target backup data matched with the target feature value exists, the terminal may generate a prompt message as shown in fig. 6 to prompt that the user is not currently located in Wi-Fi but in a mobile network, and then immediately download is selected according to the user requirement, or download of the target backup data is cancelled, so that direct download of the target backup data is avoided, a foundation is laid for saving traffic of the user, and user experience is improved.
Further, when the detection unit determines that the terminal can access the target communication network, such as can access Wi-Fi, and when the search result indicates that target backup data matching the target characteristic value does not exist, such as target backup data having backup identification information identical to the MD5 value of the target plug-in is not found from backup data corresponding to the target plug-in, the data processing unit may download the target backup data using the target communication network, so that a user is prevented from downloading the target backup data using mobile data, traffic is saved for the user, and user experience is improved.
Application scenario two:
the terminal searches whether target backup data matched with the target characteristic value exist in stored backup data corresponding to the target plug-in; when the search result represents that the target backup data matched with the target characteristic value exists, the detection unit does not need to detect whether the target communication network can be accessed or not; when the search result indicates that the target backup data matched with the target characteristic value does not exist, the detection unit detects whether the target communication network can be accessed, and then when the target communication network can be accessed, such as Wi-Fi can be accessed, the target communication network is used for downloading the target backup data; when the target communication network cannot be accessed, such as Wi-Fi, the prompt message shown in fig. 6 is generated, or the prompt message shown in fig. 3-2 is generated, that is, "target backup data is not found, and whether the target backup data is downloaded or not".
Therefore, compared with the mode that the existing plug-in mechanism only simply checks the file name to judge whether the backup data is available or not and further determines whether the backup data is compatible or not after the backup data is determined to be available, the embodiment of the invention can find out the target backup data which is available for the target plug-in and compatible with the target plug-in through one-time searching process, thereby reducing the searching flow, enabling the searching process to be fast, improving the searching efficiency and further improving the user experience.
Moreover, when the target plug-in is updated or the data is lost, the terminal according to the embodiment of the present invention does not need to directly delete the backup data corresponding to the target plug-in before updating, and first searches whether the available target backup data exists in the backup data corresponding to the target plug-in before updating, and then determines the next operation according to the search result, for example, when the target backup data exists, the target backup data is multiplexed, and then the target plug-in is operated, and when the target backup data is not found, the user is informed to download the target backup data.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A method for searching backup data, the method comprising:
obtaining backup data of at least one plug-in corresponding to a target application program, plug-in identification information and compatible feature information of the at least one plug-in;
generating a feature value of the at least one plug-in based on the plug-in identification information and the compatible feature information of the at least one plug-in;
obtaining backup identification information of backup data corresponding to the at least one plug-in based on the characteristic value of the at least one plug-in;
storing backup data corresponding to the at least one plug-in by using the backup identification information;
after the target application program is updated, determining a target plug-in; the target plug-in is a plug-in which can not normally run due to updating or data loss;
acquiring plug-in identification information and compatible feature information corresponding to the target plug-in;
obtaining a target characteristic value of the target plug-in based on the plug-in identification information and the compatible characteristic information, wherein the target characteristic value is an MD5 value of a fifth version of a target message digest algorithm;
the compatible feature information is used for determining whether the backup data is compatible with the target plug-in, and when the compatible feature information of the target plug-in is the same as the compatible feature information in the backup data, the backup data is indicated to be compatible with the target plug-in;
searching whether target backup data matched with the target MD5 value exist in stored backup data corresponding to the target plug-in before updating;
when target backup data matched with the target MD5 value exist, multiplexing the target backup data to run the target plug-in;
when the target backup data matched with the target MD5 value does not exist, prompt information is generated, and the prompt information is used for prompting the user to download the target backup data again.
2. The method of claim 1, wherein the multiplexing the target backup data to run the target plug-in comprises:
checking the target backup data;
and when the data characteristics of the target backup data are not changed according to the verification result, operating the target plug-in by using the target backup data.
3. The method of claim 2, further comprising:
and when the verification result represents that the data characteristics of the target backup data are changed, generating prompt information to prompt a user to download the target backup data again.
4. The method of claim 1, further comprising:
detecting whether a target communication network can be accessed;
correspondingly, the searching whether target backup data matched with the target MD5 value exists in the stored backup data corresponding to the target plug-in before updating includes:
and when the target communication network is not accessed, searching whether target backup data matched with the value of the target MD5 exists in the stored backup data corresponding to the target plug-in before updating.
5. A terminal, characterized in that the terminal comprises:
the information acquisition unit is used for acquiring backup data of at least one plug-in corresponding to a target application program, plug-in identification information of the at least one plug-in and compatible feature information;
generating a feature value of the at least one plug-in based on the plug-in identification information and the compatible feature information of the at least one plug-in;
the characteristic value generating unit is used for obtaining backup identification information of backup data corresponding to the at least one plug-in based on the characteristic value of the at least one plug-in;
the storage unit is used for storing backup data corresponding to the at least one plug-in by using the backup identification information;
the determining unit is used for determining the target plug-in after the target application program is updated; the target plug-in is a plug-in which can not normally run due to updating or data loss;
the information acquisition unit is also used for acquiring the plug-in identification information and the compatible characteristic information corresponding to the target plug-in;
the characteristic value generating unit is further configured to obtain a target characteristic value of the target plug-in based on the plug-in identification information and the compatible characteristic information corresponding to the target plug-in, where the target characteristic value is a target MD5 value;
the compatible feature information is used for determining whether the backup data is compatible with the target plug-in, and when the compatible feature information of the target plug-in is the same as the compatible feature information in the backup data, the backup data is indicated to be compatible with the target plug-in;
the data processing unit is used for searching whether target MD5 data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in before updating;
when target backup data matched with the target MD5 value exist, multiplexing the target backup data to run the target plug-in;
when the target backup data matched with the target MD5 value does not exist, prompt information is generated, and the prompt information is used for prompting the user to download the target backup data again.
6. The terminal according to claim 5, wherein the data processing unit is further configured to perform verification processing on the target backup data; and when the data characteristics of the target backup data are not changed according to the verification result, operating the target plug-in by using the target backup data.
7. The terminal according to claim 6, wherein the data processing unit is further configured to generate a prompt message to prompt a user to re-download the target backup data when the verification result indicates that the data characteristics of the target backup data have changed.
8. The terminal of claim 5, further comprising: a detection unit; wherein,
the detection unit is used for detecting whether the target communication network can be accessed;
the data processing unit is further configured to, when the target communication network is not accessed, search whether target backup data matching the target MD5 value exists in the stored backup data corresponding to the target plug-in before updating.
9. A computer device, comprising:
a memory for storing executable instructions;
a processor, configured to execute the executable instructions stored in the memory to implement the method for searching backup data according to any one of claims 1 to 4.
10. A computer-readable storage medium storing executable instructions for implementing the method for searching backup data according to any one of claims 1 to 4 when executed by a processor.
CN201610307389.3A 2016-05-10 2016-05-10 Method and terminal for searching backup data Active CN106021367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610307389.3A CN106021367B (en) 2016-05-10 2016-05-10 Method and terminal for searching backup data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610307389.3A CN106021367B (en) 2016-05-10 2016-05-10 Method and terminal for searching backup data

Publications (2)

Publication Number Publication Date
CN106021367A CN106021367A (en) 2016-10-12
CN106021367B true CN106021367B (en) 2021-10-15

Family

ID=57100398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610307389.3A Active CN106021367B (en) 2016-05-10 2016-05-10 Method and terminal for searching backup data

Country Status (1)

Country Link
CN (1) CN106021367B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360321A (en) * 2011-09-30 2012-02-22 奇智软件(北京)有限公司 Terminal program quick backup and recovery method based on cloud architecture
CN102495772A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Characteristic-based terminal program cloud backup and recovery methods
CN104717301A (en) * 2015-03-27 2015-06-17 北京奇虎科技有限公司 Plug-in download method and device
US9158781B1 (en) * 2005-10-31 2015-10-13 Symantec Operating Corporation Version mapped incremental backups with version creation condition
WO2015167603A1 (en) * 2014-04-29 2015-11-05 Hewlett-Packard Development Company, L.P. Maintaining files in a retained file system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9582598B2 (en) * 2011-07-05 2017-02-28 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
CN102929920B (en) * 2012-09-19 2016-04-20 北京奇虎科技有限公司 The method for supervising of the software update information of sing on web information extraction and device
CN104731623B (en) * 2015-03-27 2016-11-16 北京奇虎科技有限公司 Mastery routine starts the method and device of plug-in unit
CN105554137B (en) * 2015-12-23 2019-11-26 北京奇虎科技有限公司 A kind of standby system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9158781B1 (en) * 2005-10-31 2015-10-13 Symantec Operating Corporation Version mapped incremental backups with version creation condition
CN102360321A (en) * 2011-09-30 2012-02-22 奇智软件(北京)有限公司 Terminal program quick backup and recovery method based on cloud architecture
CN102495772A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Characteristic-based terminal program cloud backup and recovery methods
WO2015167603A1 (en) * 2014-04-29 2015-11-05 Hewlett-Packard Development Company, L.P. Maintaining files in a retained file system
CN104717301A (en) * 2015-03-27 2015-06-17 北京奇虎科技有限公司 Plug-in download method and device

Also Published As

Publication number Publication date
CN106021367A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
US7401065B2 (en) System for downloading contents, and client terminal for downloading contents from contents server
CN107786504B (en) ELF file release method, ELF file verification method, server and terminal
US8719810B2 (en) Program upgrade system and method for over the air-capable mobile terminal
US20150112798A1 (en) Advertisement processing method and apparatus
CN105389177A (en) Software version confirmation method, device and system
CN106095458A (en) The management method of plug-in unit and device in a kind of application program
CN102982258A (en) System for conducting original-edition check to mobile application program
CN104052818A (en) Version upgrade method and device for mobile terminal
US20210349710A1 (en) Software update agent device and software patching method through the same
CN105550252A (en) File positioning method and device and electronic equipment
CN108491715B (en) Terminal fingerprint database generation method and device and server
CN107797818A (en) Application program updating method and device
CN109391673A (en) A kind of method, system and the terminal device of management update file
CN104426924A (en) Method, apparatus, client, server and system for updating application software
CN107239299B (en) Plug-in upgrading method and device
CN106843947B (en) Method and device for processing code defects
CN112632009A (en) Electronic file processing method and device, storage medium and electronic equipment
CN113961226B (en) Software development kit repairing method, terminal, server and equipment
CN110413292B (en) Light application installation method of application program, mobile terminal and storage medium
CN106354832B (en) Data publishing method, device and system
CN104699509A (en) Method and device for downloading application software
CN105740298A (en) File processing method and apparatus, and server-side equipment
CN113986296A (en) Firmware upgrading method and device, electronic equipment and storage medium
CN111417927A (en) Resource authority processing method and device, storage medium and chip
CN112882743A (en) Software upgrading method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant