CN106021367B - Method and terminal for searching backup data - Google Patents
Method and terminal for searching backup data Download PDFInfo
- Publication number
- CN106021367B CN106021367B CN201610307389.3A CN201610307389A CN106021367B CN 106021367 B CN106021367 B CN 106021367B CN 201610307389 A CN201610307389 A CN 201610307389A CN 106021367 B CN106021367 B CN 106021367B
- Authority
- CN
- China
- Prior art keywords
- target
- plug
- backup data
- compatible
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000004891 communication Methods 0.000 claims description 29
- 238000012545 processing Methods 0.000 claims description 21
- 238000012795 verification Methods 0.000 claims description 19
- 238000001514 detection method Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 230000008859 change Effects 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008054 signal transmission Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/144—Query formulation
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention discloses a method and a terminal for searching backup data; wherein the method comprises the following steps: determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in the target application program; acquiring plug-in identification information and compatible feature information corresponding to the target plug-in; obtaining a target characteristic value of the target plug-in based on plug-in identification information and compatible characteristic information corresponding to the target plug-in; and searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
Description
Technical Field
The present invention relates to data processing technologies, and in particular, to a method and a terminal for searching backup data.
Background
Along with the high-speed development of electronic equipment hardware and the rapid popularization of intelligent terminals, in order to reduce the size of an application program (APP) installation package, more and more functional components are issued in a plug-in mode, and meanwhile, backup files corresponding to the plug-in are stored to the intelligent terminals so as to be reused.
However, after the APP is upgraded, once the plug-in is updated or data is lost, the old version backup file corresponding to the plug-in before updating, which is stored in the electronic device, cannot be reused, so that even if the old version backup file is available, the old version backup file cannot be reused, but is directly deleted, and the backup file corresponding to the updated plug-in is downloaded again, thereby reducing user experience.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide a method and a terminal for searching backup data, which can at least solve the above problems in the prior art.
The technical scheme of the embodiment of the invention is realized as follows:
a first aspect of an embodiment of the present invention provides a method for searching backup data, including:
determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
acquiring plug-in identification information and compatible feature information corresponding to the target plug-in;
obtaining a target characteristic value of the target plug-in based on plug-in identification information and compatible characteristic information corresponding to the target plug-in;
and searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
A second aspect of an embodiment of the present invention provides a terminal, including:
a determining unit for determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
the information acquisition unit is used for acquiring the plug-in identification information and the compatible characteristic information corresponding to the target plug-in;
the characteristic value generating unit is used for obtaining a target characteristic value of the target plug-in based on the plug-in identification information and the compatible characteristic information corresponding to the target plug-in;
and the data processing unit is used for searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
According to the method and the terminal for searching backup data, when the target plug-in is updated or the data is lost, the backup data corresponding to the target plug-in before updating does not need to be directly deleted, whether the available target backup data exists in the backup data corresponding to the target plug-in before updating is firstly searched, and whether the stored backup data is reused or not is further determined according to the searching result, so that the multiplexing capability of the backup data is improved, repeated downloading of the backup data by a user is avoided to the greatest extent, the user experience is improved, and meanwhile, a foundation is laid for saving the data flow of the user.
Compared with the existing plug-in mechanism which simply judges whether the backup data is available through file name verification and further determines whether the backup data is compatible after the backup data is available, the embodiment of the invention can find out the target backup data which is available for the target plug-in and compatible with the target plug-in through one-time searching process, thereby reducing the searching flow, enabling the searching process to be rapid, improving the searching efficiency and further improving the user experience.
Drawings
FIG. 1 is a schematic diagram illustrating an implementation flow of a method for searching backup data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an application framework according to an embodiment of the present invention;
3-1 and 3-2 are schematic diagrams of user interfaces according to embodiments of the present invention;
FIG. 4 is a diagram illustrating a backup data before and after naming according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating a specific implementation of a method for searching backup data according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a user interface in one embodiment of the present invention;
fig. 7 is a first schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and aspects of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
Example one
The embodiment of the invention provides a method for searching backup data; the method is applied to the terminal; specifically, fig. 1 is a schematic diagram of an implementation flow of a method for searching backup data according to an embodiment of the present invention; FIG. 2 is a schematic diagram of an application framework according to an embodiment of the present invention; in practical applications, as shown in fig. 2, the terminal may access the network through the signal transmission tower and further access the application server, for example, the terminal accesses the network through WIreless Fidelity (Wi-Fi) and then accesses the application server; or, the terminal can also access the network through the base station, and then access the application server, so as to run the target application program on the terminal; here, the application server stores a target application and various functional components corresponding to the target application, i.e., plug-ins and the like. Based on the application framework shown in fig. 2, the method of this embodiment includes:
step 101: determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
in this embodiment, the change of the data characteristic may specifically indicate a change such as data update or data loss. For example, after the target application program is updated, the plug-in corresponding to the target application program is also updated correspondingly, or part of data is lost without updating correspondingly, so that the plug-in cannot operate normally, and at this time, the plug-in which cannot operate normally due to updating or data loss is taken as the target plug-in.
Step 102: acquiring plug-in identification information and compatible feature information corresponding to the target plug-in;
in practical application, the plug-in identification information corresponding to the target plug-in may specifically be a file name of the target plug-in; the compatible feature information may be a compatible Identification (ID), i.e. a file compatibility characteristic, written in the program of the target plug-in. Here, the terminal may determine whether the backup data is compatible with the target plug-in through the compatibility identifier; for example, when the compatible identifier of the target plug-in represented by the compatible feature information is the same as the compatible identifier in the backup data, it indicates that the backup data is compatible with the target plug-in; otherwise, it indicates that the backup data is incompatible with the target plug-in.
Step 103: obtaining a target characteristic value of the target plug-in based on plug-in identification information and compatible characteristic information corresponding to the target plug-in;
step 104: and searching whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
In practical applications, the target feature value may specifically be a Message Digest Algorithm fifth version (MD 5, Message Digest Algorithm 5) value; that is to say, the terminal determines the MD5 value corresponding to the target plug-in according to the plug-in identification information and the compatible feature information corresponding to the target plug-in. Here, since the MD5 value is determined based on the plug-in identification information and compatible feature information corresponding to the target plug-in, that is, the MD5 value corresponding to the target plug-in can represent both the identification information and the compatible feature of the target plug-in; therefore, when the terminal finds out the target backup data matched with the MD5 value corresponding to the target plug-in from the stored backup data corresponding to the target plug-in, the target backup data is the backup data available and compatible to the target plug-in.
In an embodiment, in order to facilitate the terminal to determine the backup data corresponding to the target plug-in, the terminal further needs to obtain location information of the backup data corresponding to the target plug-in, for example, determine a directory where the backup data corresponding to the target plug-in is located, and then search, by using the location information, whether there is target backup data matching the target characteristic value from the stored backup data corresponding to the target plug-in.
In a specific application, when a search result represents that target backup data matched with the target characteristic value exists, verifying the target backup data, and further determining whether to operate the target plug-in by using the target backup data based on a verification result; specifically, when the data characteristics of the target backup data represented by the verification result do not change, the target backup data is multiplexed to operate the target plug-in by using the target backup data; and when the verification result represents that the data characteristics of the target backup data are changed, generating prompt information to prompt a user to download the target backup data again.
Or when the search result represents that the target backup data matched with the target characteristic value does not exist, generating prompt information to prompt a user to download the target backup data again. Here, the verification may specifically be signature verification; for example, a check is made according to the format of the signature to determine whether the target backup data is modified by the format of the signature.
Specifically, as shown in fig. 3, after the target application program of the terminal is upgraded, the target plug-in is also upgraded correspondingly, at this time, if the user uses the function corresponding to the target plug-in advance, the terminal needs to acquire the backup data corresponding to the target plug-in so as to operate the target plug-in, where the specific acquisition process is as follows:
the terminal acquires the file name and the compatible identification of the target plug-in, the MD5 value of the target plug-in is determined according to the file name and the compatible identification of the target plug-in and a preset calculation rule, then the MD5 value of the target plug-in is utilized to search whether target backup data with the same MD5 value as the target plug-in exists in backup data corresponding to the target plug-in stored in the terminal, and at the moment, a display interface of the terminal presents prompt information of 'searching for the target backup data' so as to inform a user of waiting for a search result; further, as shown in fig. 3-1, after the terminal finds the target backup data having the same MD5 value as the target plug-in, the terminal prompts the user to confirm whether to immediately run the target backup data, such as decompressing the target backup data, and then run the target plug-in; or, as shown in fig. 3-2, when the terminal does not find the target backup data with the same MD5 value as the target plug-in, the terminal prompts the user to "find no target backup data", and simultaneously prompts the user to "whether to download the target backup data".
Therefore, compared with the mode that the existing plug-in mechanism only simply judges whether the backup data is available through file name verification, and further determines whether the backup data is compatible after the backup data is determined to be available, the method provided by the embodiment of the invention can find out the target backup data which is available for the target plug-in and compatible with the target plug-in through one-time searching process, so that the searching process is reduced, the searching process is enabled to be fast, the searching efficiency is improved, and the user experience is further improved.
Moreover, according to the method provided by the embodiment of the invention, when the target plug-in is updated or the data is lost, the backup data corresponding to the target plug-in before updating does not need to be directly deleted, whether the available target backup data exists in the backup data corresponding to the target plug-in before updating is firstly searched, the next operation is determined according to the searching result, for example, when the target backup data exists, the target backup data is multiplexed, the target plug-in is further operated, and when the target backup data is not searched, the user is informed to download the target backup data.
Example two
Based on the method described in the first embodiment, in order to ensure that the terminal can find the target backup data matched with the target characteristic value in the backup data corresponding to the target plug-in stored in the terminal based on the target characteristic value of the target plug-in, such as the MD5 value; in this embodiment, before step 104, the method for searching backup data further includes:
step A: obtaining backup data of at least one plug-in corresponding to the target application program;
and B: acquiring plug-in identification information and compatible feature information of at least one plug-in corresponding to the target application program;
and C: generating a characteristic value of at least one plug-in according to plug-in identification information and compatible characteristic information of the at least one plug-in corresponding to the target application program;
the characteristic value described in this embodiment is also specifically an MD5 value, for example, the terminal determines, according to a preset calculation rule, an MD5 value corresponding to each plug-in according to the plug-in identification information and the compatible characteristic information of each plug-in, that is, according to the file name and the compatible identification of each plug-in, renames the backup data corresponding to each plug-in according to the MD5 value, and further causes the terminal to store the backup data according to the renamed file name. Therefore, a foundation is laid for the terminal to quickly search the target backup data corresponding to the target plug-in, and meanwhile, a foundation is laid for reusing the backup data.
Step D: obtaining backup identification information of backup data corresponding to the at least one plug-in based on the characteristic value of the at least one plug-in;
step E: and storing the backup data corresponding to the at least one plug-in by using the backup identification information.
In this embodiment, when the terminal stores the backup data of the plug-in corresponding to the target application, the terminal may set backup identification information for each backup data according to the plug-in identification information and the compatible feature information, and set a file name of the backup data according to the plug-in identification information and the compatible feature information, so that whether the backup data is the target backup data corresponding to the target plug-in may be determined according to the stored file name of each backup data, and meanwhile, whether the backup data is the target backup data compatible with the target plug-in may also be determined.
Here, in practical applications, the backup data obtained in step a usually exists in the form of compressed packets, for example, Zip packets; as shown in fig. 4, it is assumed that a file name of backup data corresponding to a plug-in acquired by a terminal is a first file name, where the first file name only represents a corresponding relationship between the backup data and the plug-in and cannot represent a compatible feature of the backup data, the terminal acquires plug-in identification information corresponding to the plug-in, such as a file name of the plug-in, and compatible feature information, such as a compatible identifier of the plug-in, and then the terminal renames the backup data corresponding to the plug-in by using the file name and the compatible identifier of the plug-in, such as naming the second file name, where the second file name can represent both the corresponding relationship between the plug-in and the compatible feature, and thus, a foundation is laid for the terminal to quickly search for target backup data corresponding to a target plug-in.
Here, when the terminal names backup data corresponding to all plug-ins of its own target application program based on the naming rule, the named backup data is stored in a corresponding directory, and then, when the target application program of the terminal is upgraded, the target plug-ins are also upgraded correspondingly, or part of data is lost without corresponding update, so that the target plug-ins cannot run normally, the terminal may determine a target characteristic value by obtaining plug-in identification information and compatible characteristic information corresponding to the target plug-ins, and then search for whether to store the target backup data matched with the target plug-ins according to the target characteristic value; specifically, fig. 5 is a schematic flowchart of a specific implementation of a method for searching backup data according to an embodiment of the present invention; as shown in figure 5 of the drawings,
step 501: the plug-in module after the target APP version is upgraded or the target APP is decompressed has data loss, and at the moment, the plug-in module with the data loss serves as the target plug-in module;
step 502: the terminal searches a target directory where the backup file corresponding to the target plug-in is located from a database corresponding to the terminal;
step 503: the terminal obtains the file name and the compatible identification of the target plug-in, and obtains a target MD5 value according to the file name and the compatible identification of the target plug-in;
here, the execution order of steps 502 and 503 may be reversed.
Step 504: searching whether target backup data matched with the target MD5 value exists in the target directory; if yes, go to step 505; otherwise, go to step 507;
here, the terminal stores the backup data in the form of Zip compressed packets.
Step 505: the terminal performs signature verification on the Zip packet of the target backup data to determine whether the target backup data is tampered; when it is determined to be tampered, performing step 507; otherwise, go to step 506;
step 506: and the terminal decompresses the Zip packet of the target backup data and multiplexes the target backup data to operate the target plug-in.
Step 507: and the terminal generates prompt information to prompt the user to download the target backup data again or prompt the user of an error.
EXAMPLE III
Based on the method described in the first embodiment or the second embodiment, the present embodiment provides a specific application scenario; specifically, the method comprises the following steps:
the application scene one:
the terminal may also detect whether it is able to access the target communication network, e.g., whether it is able to access Wi-Fi; when the target communication network is not accessed, the terminal searches whether target backup data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in.
Therefore, a foundation is laid for the terminal to be capable of quickly operating the target plug-in, a foundation is laid for multiplexing backup data, and a foundation is laid for improving user experience.
Further, when the terminal fails to access a target communication network, such as Wi-Fi, and when the search result indicates that no target backup data matching the target feature value exists, the terminal may generate a prompt message as shown in fig. 6, prompt the user that the user is not currently in Wi-Fi but in a mobile network, and further select to immediately download or cancel downloading the target backup data according to the user requirement. Therefore, target backup data can be prevented from being downloaded directly, a foundation is laid for the user to save the flow, and the user experience is improved.
Further, when the terminal can access the target communication network, for example, can access Wi-Fi, and when the search result indicates that there is no target backup data matching the target characteristic value, for example, no target backup data having the backup identification information identical to the MD5 value of the target plug-in is found from the backup data corresponding to the target plug-in, the terminal may download the target backup data using the target communication network, so that a user is prevented from downloading the target backup data using mobile data, traffic is saved for the user, and user experience is improved.
Application scenario two:
the terminal firstly executes processing according to the sequence from step 101 to step 104; when step 104 is executed, the method specifically includes:
searching whether target backup data matched with the target characteristic value exist in stored backup data corresponding to the target plug-in;
when the search result represents that the target backup data matched with the target characteristic value exists, the terminal does not need to detect whether the terminal can be accessed to a target communication network;
when the search result indicates that the target backup data matched with the target characteristic value does not exist, the terminal detects whether the target communication network can be accessed, and then when the terminal can be accessed to the target communication network, such as Wi-Fi can be accessed, the target communication network is used for downloading the target backup data; when the target communication network cannot be accessed, such as Wi-Fi, the prompt message shown in fig. 6 is generated, or the prompt message shown in fig. 3-2 is generated, that is, "target backup data is not found, and whether the target backup data is downloaded or not".
Therefore, the method of the embodiment of the invention can combine the process of determining whether the data are compatible with the process of searching the target backup data into a whole, quickly locate the available and compatible target backup data, reduce the Input/Output (I/O) operation at the terminal and shorten the operation time; moreover, the backup data stored by the terminal is fully utilized, the reuse rate of the backup data is improved, the waiting time of a user is further reduced, and the user experience is improved.
Example four
An embodiment of the present invention provides a terminal, as shown in fig. 2, where the terminal according to the embodiment of the present invention may access a network through a signal transmission tower, and then access an application server, for example, the terminal accesses the network through a WIreless Fidelity (Wi-Fi) and then accesses the application server; or, the base station is accessed into the network, and then is accessed into the application program server, so as to run the target application program at the terminal; here, the application server stores a target application and various functional components corresponding to the target application, i.e., plug-ins and the like. Based on the application framework shown in fig. 2, as shown in fig. 7, the terminal includes:
a determination unit 71 for determining a target plug-in; the target plug-in is a plug-in with changed data characteristics in a target application program;
an information obtaining unit 72, configured to obtain plug-in identification information and compatible feature information corresponding to the target plug-in;
a feature value generating unit 73, configured to obtain a target feature value of the target plug-in based on the plug-in identification information and the compatible feature information corresponding to the target plug-in;
and the data processing unit 74 is configured to search, from the stored backup data corresponding to the target plug-in, whether there is target backup data matching the target characteristic value.
In this embodiment, the change of the data characteristic may specifically indicate a change such as data update or data loss. For example, after the target application program is updated, the plug-in corresponding to the target application program is also updated correspondingly, or part of data is lost without updating correspondingly, so that the plug-in cannot operate normally, and at this time, the determining unit takes the plug-in which cannot operate normally due to updating or data loss as the target plug-in.
In practical application, the plug-in identification information corresponding to the target plug-in may specifically be a file name of the target plug-in; the compatible feature information may be a compatible Identification (ID), i.e. a file compatibility characteristic, written in the program of the target plug-in. Here, the terminal may determine whether the backup data is compatible with the target plug-in through the compatibility identifier; for example, when the compatible identifier of the target plug-in represented by the compatible feature information is the same as the compatible identifier in the backup data, it indicates that the backup data is compatible with the target plug-in; otherwise, it indicates that the backup data is incompatible with the target plug-in.
In practical applications, the target feature value may specifically be a Message Digest Algorithm fifth version (MD 5, Message Digest Algorithm 5) value; that is, the feature value generation unit determines the MD5 value corresponding to the target plug-in according to the plug-in identification information and the compatible feature information corresponding to the target plug-in. Here, since the MD5 value is determined based on the plug-in identification information and compatible feature information corresponding to the target plug-in, that is, the MD5 value corresponding to the target plug-in can represent both the identification information and the compatible feature of the target plug-in; therefore, when the data processing unit finds out the target backup data matched with the MD5 value corresponding to the target plug-in from the stored backup data corresponding to the target plug-in, the target backup data is the backup data that is available and compatible for the target plug-in.
In an embodiment, in order to facilitate the terminal to determine the backup data corresponding to the target plug-in, the terminal further needs to obtain location information of the backup data corresponding to the target plug-in, for example, determine a directory where the backup data corresponding to the target plug-in is located, and then search, by using the location information, whether there is target backup data matching the target characteristic value from the stored backup data corresponding to the target plug-in.
In this embodiment, in order to ensure that the terminal can find, based on a target characteristic value of the target plug-in, such as an MD5 value, target backup data that matches the target characteristic value from among backup data that is stored in the terminal and corresponds to the target plug-in; as shown in fig. 8, the terminal further includes: a storage unit 75; wherein,
the information obtaining unit 72 is further configured to obtain backup data, plug-in identification information, and compatible feature information of at least one plug-in corresponding to the target application;
the feature value generating unit 73 is further configured to generate a feature value of at least one plug-in according to the plug-in identification information and the compatible feature information of the at least one plug-in corresponding to the target application program, and obtain backup identification information of backup data corresponding to the at least one plug-in based on the feature value of the at least one plug-in;
the storage unit 75 is configured to store backup data corresponding to the at least one plug-in by using the backup identification information.
Here, the characteristic value is also specifically an MD5 value, for example, the characteristic value generating unit determines an MD5 value corresponding to each plug-in according to the plug-in identification information and the compatible characteristic information of each plug-in, that is, according to the file name and the compatible identification of each plug-in, and renames the backup data corresponding to each plug-in according to the MD5 value, so that the storage unit stores the backup data according to the renamed file name. Therefore, a foundation is laid for the terminal to quickly search the target backup data corresponding to the target plug-in, and meanwhile, a foundation is laid for reusing the backup data.
In this embodiment, when the terminal stores the backup data of the plug-in corresponding to the target application, the terminal may set backup identification information for each backup data according to the plug-in identification information and the compatible feature information, and set a file name of the backup data according to the plug-in identification information and the compatible feature information, so that whether the backup data is the target backup data corresponding to the target plug-in may be determined according to the stored file name of each backup data, and meanwhile, whether the backup data is the target backup data compatible with the target plug-in may also be determined.
In practical applications, the backup data acquired by the information acquisition unit usually exists in the form of compressed packets, for example, Zip packets; as shown in fig. 4, it is assumed that the file name of the backup data corresponding to the plug-in acquired by the information acquisition unit is a first file name, where the first file name only represents the corresponding relationship between the backup data and the plug-in and cannot represent the compatible feature of the backup data, the information acquisition unit acquires plug-in identification information corresponding to the plug-in, such as the file name of the plug-in, and compatible feature information, such as the compatible identifier of the plug-in, and then the feature value generation unit renames the backup data corresponding to the plug-in by using the file name and the compatible identifier of the plug-in, such as naming the second file name, at this time, the second file name represents both the corresponding relationship between the plug-in and the compatible feature, so as to lay a foundation for the terminal to quickly search for the target backup data corresponding to the target plug-in.
Here, after the feature value generating unit names backup data corresponding to all plug-ins of its own target application program based on the naming rule, the named backup data is stored in a corresponding directory by the storage unit, and then, after the target application program of the terminal is upgraded, the target plug-ins are also upgraded correspondingly, or part of data is lost without corresponding update, so that the target plug-ins cannot run normally, the terminal may determine a target feature value by using the plug-in identification information and the compatible feature information corresponding to the target plug-ins, and then search for whether to store the target backup data matched with the target plug-ins according to the target feature value; specifically, the implementation process may be shown in fig. 5, and is not described here again.
In a specific application, the data processing unit is further configured to perform verification processing on the target backup data when the search result represents that the target backup data matched with the target characteristic value exists; and determining whether to operate the target plug-in by using the target backup data based on the verification result. Specifically, the method is further configured to run the target plug-in by using the target backup data when the verification result indicates that the data characteristics of the target backup data do not change; or when the verification result represents that the data characteristics of the target backup data change, generating prompt information to prompt a user to download the target backup data again. Here, the verification may specifically be signature verification; for example, a check is made according to the format of the signature to determine whether the target backup data is modified by the format of the signature.
As shown in fig. 3, after the target application program of the terminal is upgraded, the target plug-in is also upgraded correspondingly, at this time, if the user uses the function corresponding to the target plug-in advance, the terminal needs to acquire the backup data corresponding to the target plug-in so as to operate the target plug-in, and the specific acquisition process is as follows:
the information acquisition unit acquires a file name and a compatible identifier of the target plugin, the characteristic value generation unit determines an MD5 value of the target plugin according to the file name and the compatible identifier of the target plugin and a preset calculation rule, the data processing unit searches whether target backup data with the same MD5 value as the target plugin exists in backup data corresponding to the target plugin stored in the terminal by using the MD5 value of the target plugin, and at the moment, a display interface of the terminal presents prompt information of 'target backup data is being searched', so that a user is informed of waiting for a search result; further, as shown in fig. 3-1, after the data processing unit finds out target backup data having the same MD5 value as the target plug-in, the data processing unit prompts the user to confirm whether to immediately run the target backup data, such as decompressing the target backup data, and then run the target plug-in; or, as shown in fig. 3-2, when the data processing unit does not find the target backup data with the same MD5 value as the target plug-in, the data processing unit prompts the user to "find no target backup data", and simultaneously prompts the user to "whether to download the target backup data".
In this embodiment, as shown in fig. 8, the terminal further includes: a detection unit 76; wherein,
the detecting unit 76 is configured to detect whether the target communication network can be accessed;
the data processing unit 74 is further configured to, when the target communication network is not accessed, search whether target backup data matching the target characteristic value exists in the stored backup data corresponding to the target plug-in.
Specifically, the method comprises the following steps:
the application scene one:
the detection unit can also detect whether the target communication network can be accessed by the detection unit, for example, whether the target communication network can be accessed by the detection unit, and when the target communication network cannot be accessed, the data processing unit can search the stored backup data corresponding to the target plug-in unit for whether the target backup data matched with the target characteristic value exists, so that a foundation is laid for the terminal to be capable of quickly operating the target plug-in unit, a foundation is laid for multiplexing the backup data, and a foundation is laid for improving user experience.
Further, when the terminal fails to access a target communication network, such as Wi-Fi, and when the search result indicates that no target backup data matched with the target feature value exists, the terminal may generate a prompt message as shown in fig. 6 to prompt that the user is not currently located in Wi-Fi but in a mobile network, and then immediately download is selected according to the user requirement, or download of the target backup data is cancelled, so that direct download of the target backup data is avoided, a foundation is laid for saving traffic of the user, and user experience is improved.
Further, when the detection unit determines that the terminal can access the target communication network, such as can access Wi-Fi, and when the search result indicates that target backup data matching the target characteristic value does not exist, such as target backup data having backup identification information identical to the MD5 value of the target plug-in is not found from backup data corresponding to the target plug-in, the data processing unit may download the target backup data using the target communication network, so that a user is prevented from downloading the target backup data using mobile data, traffic is saved for the user, and user experience is improved.
Application scenario two:
the terminal searches whether target backup data matched with the target characteristic value exist in stored backup data corresponding to the target plug-in; when the search result represents that the target backup data matched with the target characteristic value exists, the detection unit does not need to detect whether the target communication network can be accessed or not; when the search result indicates that the target backup data matched with the target characteristic value does not exist, the detection unit detects whether the target communication network can be accessed, and then when the target communication network can be accessed, such as Wi-Fi can be accessed, the target communication network is used for downloading the target backup data; when the target communication network cannot be accessed, such as Wi-Fi, the prompt message shown in fig. 6 is generated, or the prompt message shown in fig. 3-2 is generated, that is, "target backup data is not found, and whether the target backup data is downloaded or not".
Therefore, compared with the mode that the existing plug-in mechanism only simply checks the file name to judge whether the backup data is available or not and further determines whether the backup data is compatible or not after the backup data is determined to be available, the embodiment of the invention can find out the target backup data which is available for the target plug-in and compatible with the target plug-in through one-time searching process, thereby reducing the searching flow, enabling the searching process to be fast, improving the searching efficiency and further improving the user experience.
Moreover, when the target plug-in is updated or the data is lost, the terminal according to the embodiment of the present invention does not need to directly delete the backup data corresponding to the target plug-in before updating, and first searches whether the available target backup data exists in the backup data corresponding to the target plug-in before updating, and then determines the next operation according to the search result, for example, when the target backup data exists, the target backup data is multiplexed, and then the target plug-in is operated, and when the target backup data is not found, the user is informed to download the target backup data.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (10)
1. A method for searching backup data, the method comprising:
obtaining backup data of at least one plug-in corresponding to a target application program, plug-in identification information and compatible feature information of the at least one plug-in;
generating a feature value of the at least one plug-in based on the plug-in identification information and the compatible feature information of the at least one plug-in;
obtaining backup identification information of backup data corresponding to the at least one plug-in based on the characteristic value of the at least one plug-in;
storing backup data corresponding to the at least one plug-in by using the backup identification information;
after the target application program is updated, determining a target plug-in; the target plug-in is a plug-in which can not normally run due to updating or data loss;
acquiring plug-in identification information and compatible feature information corresponding to the target plug-in;
obtaining a target characteristic value of the target plug-in based on the plug-in identification information and the compatible characteristic information, wherein the target characteristic value is an MD5 value of a fifth version of a target message digest algorithm;
the compatible feature information is used for determining whether the backup data is compatible with the target plug-in, and when the compatible feature information of the target plug-in is the same as the compatible feature information in the backup data, the backup data is indicated to be compatible with the target plug-in;
searching whether target backup data matched with the target MD5 value exist in stored backup data corresponding to the target plug-in before updating;
when target backup data matched with the target MD5 value exist, multiplexing the target backup data to run the target plug-in;
when the target backup data matched with the target MD5 value does not exist, prompt information is generated, and the prompt information is used for prompting the user to download the target backup data again.
2. The method of claim 1, wherein the multiplexing the target backup data to run the target plug-in comprises:
checking the target backup data;
and when the data characteristics of the target backup data are not changed according to the verification result, operating the target plug-in by using the target backup data.
3. The method of claim 2, further comprising:
and when the verification result represents that the data characteristics of the target backup data are changed, generating prompt information to prompt a user to download the target backup data again.
4. The method of claim 1, further comprising:
detecting whether a target communication network can be accessed;
correspondingly, the searching whether target backup data matched with the target MD5 value exists in the stored backup data corresponding to the target plug-in before updating includes:
and when the target communication network is not accessed, searching whether target backup data matched with the value of the target MD5 exists in the stored backup data corresponding to the target plug-in before updating.
5. A terminal, characterized in that the terminal comprises:
the information acquisition unit is used for acquiring backup data of at least one plug-in corresponding to a target application program, plug-in identification information of the at least one plug-in and compatible feature information;
generating a feature value of the at least one plug-in based on the plug-in identification information and the compatible feature information of the at least one plug-in;
the characteristic value generating unit is used for obtaining backup identification information of backup data corresponding to the at least one plug-in based on the characteristic value of the at least one plug-in;
the storage unit is used for storing backup data corresponding to the at least one plug-in by using the backup identification information;
the determining unit is used for determining the target plug-in after the target application program is updated; the target plug-in is a plug-in which can not normally run due to updating or data loss;
the information acquisition unit is also used for acquiring the plug-in identification information and the compatible characteristic information corresponding to the target plug-in;
the characteristic value generating unit is further configured to obtain a target characteristic value of the target plug-in based on the plug-in identification information and the compatible characteristic information corresponding to the target plug-in, where the target characteristic value is a target MD5 value;
the compatible feature information is used for determining whether the backup data is compatible with the target plug-in, and when the compatible feature information of the target plug-in is the same as the compatible feature information in the backup data, the backup data is indicated to be compatible with the target plug-in;
the data processing unit is used for searching whether target MD5 data matched with the target characteristic value exists in the stored backup data corresponding to the target plug-in before updating;
when target backup data matched with the target MD5 value exist, multiplexing the target backup data to run the target plug-in;
when the target backup data matched with the target MD5 value does not exist, prompt information is generated, and the prompt information is used for prompting the user to download the target backup data again.
6. The terminal according to claim 5, wherein the data processing unit is further configured to perform verification processing on the target backup data; and when the data characteristics of the target backup data are not changed according to the verification result, operating the target plug-in by using the target backup data.
7. The terminal according to claim 6, wherein the data processing unit is further configured to generate a prompt message to prompt a user to re-download the target backup data when the verification result indicates that the data characteristics of the target backup data have changed.
8. The terminal of claim 5, further comprising: a detection unit; wherein,
the detection unit is used for detecting whether the target communication network can be accessed;
the data processing unit is further configured to, when the target communication network is not accessed, search whether target backup data matching the target MD5 value exists in the stored backup data corresponding to the target plug-in before updating.
9. A computer device, comprising:
a memory for storing executable instructions;
a processor, configured to execute the executable instructions stored in the memory to implement the method for searching backup data according to any one of claims 1 to 4.
10. A computer-readable storage medium storing executable instructions for implementing the method for searching backup data according to any one of claims 1 to 4 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610307389.3A CN106021367B (en) | 2016-05-10 | 2016-05-10 | Method and terminal for searching backup data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610307389.3A CN106021367B (en) | 2016-05-10 | 2016-05-10 | Method and terminal for searching backup data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106021367A CN106021367A (en) | 2016-10-12 |
CN106021367B true CN106021367B (en) | 2021-10-15 |
Family
ID=57100398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610307389.3A Active CN106021367B (en) | 2016-05-10 | 2016-05-10 | Method and terminal for searching backup data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106021367B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360321A (en) * | 2011-09-30 | 2012-02-22 | 奇智软件(北京)有限公司 | Terminal program quick backup and recovery method based on cloud architecture |
CN102495772A (en) * | 2011-09-30 | 2012-06-13 | 奇智软件(北京)有限公司 | Characteristic-based terminal program cloud backup and recovery methods |
CN104717301A (en) * | 2015-03-27 | 2015-06-17 | 北京奇虎科技有限公司 | Plug-in download method and device |
US9158781B1 (en) * | 2005-10-31 | 2015-10-13 | Symantec Operating Corporation | Version mapped incremental backups with version creation condition |
WO2015167603A1 (en) * | 2014-04-29 | 2015-11-05 | Hewlett-Packard Development Company, L.P. | Maintaining files in a retained file system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9582598B2 (en) * | 2011-07-05 | 2017-02-28 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
CN102929920B (en) * | 2012-09-19 | 2016-04-20 | 北京奇虎科技有限公司 | The method for supervising of the software update information of sing on web information extraction and device |
CN104731623B (en) * | 2015-03-27 | 2016-11-16 | 北京奇虎科技有限公司 | Mastery routine starts the method and device of plug-in unit |
CN105554137B (en) * | 2015-12-23 | 2019-11-26 | 北京奇虎科技有限公司 | A kind of standby system and method |
-
2016
- 2016-05-10 CN CN201610307389.3A patent/CN106021367B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9158781B1 (en) * | 2005-10-31 | 2015-10-13 | Symantec Operating Corporation | Version mapped incremental backups with version creation condition |
CN102360321A (en) * | 2011-09-30 | 2012-02-22 | 奇智软件(北京)有限公司 | Terminal program quick backup and recovery method based on cloud architecture |
CN102495772A (en) * | 2011-09-30 | 2012-06-13 | 奇智软件(北京)有限公司 | Characteristic-based terminal program cloud backup and recovery methods |
WO2015167603A1 (en) * | 2014-04-29 | 2015-11-05 | Hewlett-Packard Development Company, L.P. | Maintaining files in a retained file system |
CN104717301A (en) * | 2015-03-27 | 2015-06-17 | 北京奇虎科技有限公司 | Plug-in download method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106021367A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7401065B2 (en) | System for downloading contents, and client terminal for downloading contents from contents server | |
CN107786504B (en) | ELF file release method, ELF file verification method, server and terminal | |
US8719810B2 (en) | Program upgrade system and method for over the air-capable mobile terminal | |
US20150112798A1 (en) | Advertisement processing method and apparatus | |
CN105389177A (en) | Software version confirmation method, device and system | |
CN106095458A (en) | The management method of plug-in unit and device in a kind of application program | |
CN102982258A (en) | System for conducting original-edition check to mobile application program | |
CN104052818A (en) | Version upgrade method and device for mobile terminal | |
US20210349710A1 (en) | Software update agent device and software patching method through the same | |
CN105550252A (en) | File positioning method and device and electronic equipment | |
CN108491715B (en) | Terminal fingerprint database generation method and device and server | |
CN107797818A (en) | Application program updating method and device | |
CN109391673A (en) | A kind of method, system and the terminal device of management update file | |
CN104426924A (en) | Method, apparatus, client, server and system for updating application software | |
CN107239299B (en) | Plug-in upgrading method and device | |
CN106843947B (en) | Method and device for processing code defects | |
CN112632009A (en) | Electronic file processing method and device, storage medium and electronic equipment | |
CN113961226B (en) | Software development kit repairing method, terminal, server and equipment | |
CN110413292B (en) | Light application installation method of application program, mobile terminal and storage medium | |
CN106354832B (en) | Data publishing method, device and system | |
CN104699509A (en) | Method and device for downloading application software | |
CN105740298A (en) | File processing method and apparatus, and server-side equipment | |
CN113986296A (en) | Firmware upgrading method and device, electronic equipment and storage medium | |
CN111417927A (en) | Resource authority processing method and device, storage medium and chip | |
CN112882743A (en) | Software upgrading method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |