CN106227744A - Terminal document managing device, terminal and terminal document management method - Google Patents
Terminal document managing device, terminal and terminal document management method Download PDFInfo
- Publication number
- CN106227744A CN106227744A CN201610548394.3A CN201610548394A CN106227744A CN 106227744 A CN106227744 A CN 106227744A CN 201610548394 A CN201610548394 A CN 201610548394A CN 106227744 A CN106227744 A CN 106227744A
- Authority
- CN
- China
- Prior art keywords
- file
- files
- junk
- terminal
- attribute value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 47
- 238000012217 deletion Methods 0.000 claims abstract description 50
- 230000037430 deletion Effects 0.000 claims abstract description 50
- 238000000034 method Methods 0.000 claims abstract description 48
- 238000004364 calculation method Methods 0.000 claims abstract description 20
- 238000004140 cleaning Methods 0.000 claims description 24
- 238000012216 screening Methods 0.000 claims description 18
- 238000001914 filtration Methods 0.000 claims description 3
- 238000002372 labelling Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 24
- 230000006870 function Effects 0.000 description 21
- 238000004891 communication Methods 0.000 description 20
- 238000004422 calculation algorithm Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of terminal document managing device, terminal and terminal document management method, the method includes: according to unused time and the size of data of file, the rubbish property value of calculation document, rubbish property value belongs to the probability of garbage files for characterizing file;By described rubbish property value more than the file of default rubbish threshold value, it is labeled as garbage files.The present invention can realize whether the file in terminal is that garbage files is managed, it is garbage files by the file mark meeting condition, and then during satisfied deletion condition, garbage files can be displayed and select to delete for user, i.e. by the enforcement of the present invention, can the garbage files in labelling terminal automatically, select garbage files to delete one by one without user, solve the problem that prior art carries out needing user to select to clear up object one by one during file clean-up, enhance the experience of user.
Description
Technical Field
The present invention relates to the field of terminal file management, and in particular, to a terminal file management apparatus, a terminal, and a terminal file management method.
Background
A large number of files exist in the terminal, and a large part of files are not used after being used once or for several times by a terminal user, such as downloaded movies and the like, and the files occupy a large amount of storage space of the terminal; in order to make the terminal have more sufficient space and operate more smoothly, the unused files need to be timely and reasonably removed.
The existing terminal cleaning mode requires a user to select files one by one as cleaning objects for cleaning, is low in efficiency, occupies more time of the user, and influences the use experience of the user.
Disclosure of Invention
The invention mainly aims to provide a terminal file management device, a terminal and a terminal file management method, and aims to solve the problem that a user needs to select cleaning objects one by one in the prior art.
In order to achieve the above object, the present invention provides a terminal file management apparatus, which includes:
the calculation module is used for calculating the junk attribute value of the file according to the unused time and the data size of the file, wherein the junk attribute value is used for representing the probability that the file belongs to the junk file;
and the marking module is used for marking the file with the junk attribute value larger than the preset junk threshold value as a junk file.
Optionally, the terminal file management apparatus further includes a screening module, configured to screen all files in the terminal according to the white list, determine a target file that does not belong to the white list, and transmit the target file to the computing module to compute the spam attribute value of the target file. The terminal file management device also comprises a deleting module used for deleting the file marked as the junk file when the deleting condition is met.
Optionally, the terminal file management apparatus further includes a display module, configured to display the file marked as the junk file, and notify the deletion module of the cleaning object in the file marked as the junk file according to the received selection operation instruction, where the deletion module is configured to delete the junk file corresponding to the cleaning object.
Optionally, the calculating module is configured to calculate a garbage attribute value of the file according to y ═ x/a + m/b, where y is the garbage attribute value of the file, x is unused time of the file, m is the data size of the file, and a and b are constants.
The invention also provides a terminal which comprises the terminal file management device provided by the embodiment of the invention.
The invention also provides a terminal file management method, which comprises the following steps:
according to the unused time and the data size of the file, calculating a junk attribute value of the file, wherein the junk attribute value is used for representing the probability that the file belongs to the junk file;
and marking the file with the junk attribute value larger than a preset junk threshold value as a junk file.
In some embodiments, before said calculating the garbage attribute value of the file, further comprises:
setting a white list;
screening all files in the terminal according to the white list, and determining target files which do not belong to the white list;
acquiring unused time and data size of a target file;
the calculating the garbage attribute value of the file comprises the following steps: and calculating the garbage attribute value of the target file.
In some embodiments, before the calculating the garbage attribute value of the target file, the method further includes:
setting a time length threshold value for calculating the rubbish attribute value;
screening the target files according to the time length threshold, and recording the target files with the unused time length larger than the time length threshold as files to be marked;
the calculating the garbage attribute value of the target file comprises the following steps: the garbage attribute value of the file to be marked is periodically calculated.
In some embodiments, the method further comprises:
setting a deleting condition for deleting the junk files;
and deleting the files marked as the junk files when the deletion condition is detected to be met.
In some embodiments, before deleting the file marked as garbage file, further comprising:
displaying the file marked as the junk file;
determining a cleaning object in the file marked as the junk file according to the received selection operation instruction;
the deleting the file marked as the junk file comprises: and deleting the junk files corresponding to the cleaning objects.
The method comprises the steps of calculating a junk attribute value of a file by acquiring parameters such as unused time and data size of the file according to the unused time and the data size of the file, wherein the junk attribute value is used for representing the probability that the file belongs to a junk file, and when the junk attribute value of the file is larger than a junk threshold value, marking the corresponding file as the junk file; therefore, whether the files in the terminal are junk files or not can be managed, the files meeting the conditions are marked as the junk files, and the junk files can be displayed for a user to select to delete when the deletion conditions are met.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an alternative mobile terminal for implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
FIG. 3 is a schematic structural diagram of a terminal file management apparatus according to the present invention;
fig. 4 is a schematic structural diagram of the terminal of the present invention;
FIG. 5 is a flowchart of a terminal file management method according to a first embodiment of the present invention;
FIG. 6 is a flowchart illustrating a second embodiment of a method for managing files in a terminal according to the present invention;
FIG. 7 is a diagram of a first configuration interface for a whitelist according to an embodiment of the present invention;
FIG. 8 is a diagram of a second configuration interface for a whitelist according to an embodiment of the present invention;
FIG. 9 is a diagram of a first display interface of a delete interface according to an embodiment of the present invention;
fig. 10 is a second display interface diagram of a deletion interface according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation device, and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention.
The mobile terminal 100 may include a wireless communication unit 110, a user input unit 120, an output unit 130, a memory 140, a controller 150, and a power supply unit 160, etc. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented, and that more or fewer components may instead be implemented, the elements of the mobile terminal being described in detail below.
The wireless communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network to download applications and the like. For example, the wireless communication unit may include at least one of a mobile communication module 111 and a wireless internet module 112.
The mobile communication module 111 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 112 supports wireless internet access of the mobile terminal. The module may be internally or externally coupled to the terminal. The wireless internet access technology to which the module relates may include WLAN (wireless LAN) (Wi-Fi), Wibro (wireless broadband), Wimax (worldwide interoperability for microwave access), HSDPA (high speed downlink packet access), and the like.
The user input unit 120 may generate key input data to control various operations of the mobile terminal according to a command input by a user. The user input unit 120 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display module 131 in the form of a layer, a touch screen may be formed.
The output unit 130 may include a display module 131 and the like. The display module 131 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display module 131 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display module 131 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display module 131 and the touch panel are stacked on each other in the form of layers to form a touch screen, the display module 131 may function as an input device and an output device. The display module 131 may include at least one of a Liquid Crystal Display (LCD), a thin film transistor LCD (TFT-LCD), an Organic Light Emitting Diode (OLED) display, a flexible display, a three-dimensional (3D) display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a TOLED (transparent organic light emitting diode) display or the like. The mobile terminal 100 may include two or more display modules (or other display devices) according to a particular desired implementation, for example, the mobile terminal may include an external display module (not shown) and an internal display module (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The memory 140 may store software programs or the like that control the processing and control operations performed by the controller 150, or may temporarily store data that has been or is to be output (e.g., a list of junk files, a list of system files/encrypted files, a list of whitelisted objects, etc.). Also, the memory 140 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The memory 140 may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and so on. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 140 through a network connection.
The controller 150 generally controls the overall operation of the mobile terminal. For example, the controller 150 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 150 may include a multimedia module 151 for reproducing (or playing back) multimedia data, and the multimedia module 151 may be constructed within the controller 150 or may be constructed separately from the controller 150. The controller 150 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image. In the present invention, the controller 150 may implement the functions of the calculation module 31, the marking module 32, the filtering module 33, the deleting module 34 and the displaying module 35.
The power supply unit 160 receives external power or internal power and provides appropriate power required to operate the respective elements and components under the control of the controller 150.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 150. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in memory 140 and executed by controller 150.
Up to this point, mobile terminals have been described in terms of their functionality. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication system includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global system for mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of mobile terminals 100, a plurality of Base Stations (BSs) 270, Base Station Controllers (BSCs) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz,5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each sector of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT)295 transmits a broadcast signal to the mobile terminal 100 operating within the system. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The GPS module 115 as shown in fig. 1 is generally configured to cooperate with satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, the present invention provides various embodiments of the method.
As shown in fig. 3, based on the above-mentioned mobile terminal hardware structure and communication system, an embodiment of the terminal file management apparatus of the present invention is proposed, and specifically, the terminal file management apparatus provided by the present invention includes:
the calculating module 31 is configured to calculate a garbage attribute value of the file according to the unused time and the data size of the file, where the garbage attribute value is used to represent a probability that the file belongs to a garbage file;
and the marking module 32 is configured to mark the file with the spam attribute value greater than the preset spam threshold as a spam file.
In practical applications, the files refer to all files in the terminal, and may also refer to only the target file and the file to be marked related to the present invention, and specific contents of these 3 types of files will be described in detail below.
In practical applications, the use of a file includes operations of being viewed, played, copied, moved, read, write, and edited, and the corresponding file is not used includes operations of not being viewed, played, copied, moved, read, write, and edited.
In practical applications, the unused time of the file includes the time length from the last use of the file after downloading to the current time, for example, 11:11 of the last use time of 2016/6/1 and 23:11 of the current time of 2016/6/15, so that the unused time of the file 1 is 14 days and 12 hours, which can be converted into 11.5 days.
In practical applications, the data size of a file may refer to the size of the file itself, for example, if the size of a video file a downloaded by a user is 500M, the data size of the file a is 500M; correspondingly, a plurality of files related to each other may be taken as a whole, for example, a PPT (PowerPoint, presentation) file and music, video, documents and the like introduced by the PPT file are taken as a whole, the size of the whole is calculated, and the whole is taken as the data size of the PPT file, for example, if a user makes a PPT, the size of the PPT file is 1M, 100 music files are cited as background/commentary and the like, the total size of the music files is 500M, 100 documents such as references and the like are also cited as certification files of the PPT, the total size of the documents is 200M, and 3 video files are cited for rest adjustment and use, the total size of the 3 video files is 200M, because the files are related to each other, separate calculation obviously does not conform to the application scenario, the invention calculates the whole, thus, the data size of the PPT file is 901M.
As can be seen from the above description, for some files, such as a viewed video file, a used PPT file, etc., the end user will not use the file for a long time and occupy a large storage space, and these files are files that can be deleted, and the occupied storage space of the terminal can be reduced after deletion.
In order to reasonably determine which files are spam files, the present invention provides an algorithm for spam attribute values of files. Specifically, the calculation module 31 assigns a value to a file in the terminal through an algorithm, where the value is a garbage attribute value and is used to represent the probability that the file belongs to the garbage file, and when the garbage attribute value of a certain file exceeds a preset garbage threshold, such as a certain fixed value, which is commonly used as 1, the garbage attribute value is defined as a garbage file, and waits for cleaning, where the specific algorithm is:
y=x/a+m/b;
wherein y is a garbage attribute value; x is a variable and can be a decimal corresponding to the unused time of the file; m is the data size of the file and the unit is M; and a and b are constants which can be directly configured by a user, can also be life experience values, and can also be corrected by calculating junk files of all files after the terminal is set by the user for the user to judge whether the calculation is correct.
The mode that a and b are directly configured by a user is simple, and the user can set the mode directly through a man-machine exchange interface and components, such as a display screen, and the detailed description is omitted.
In the method of configuring a and b with a life experience value for a terminal, a habit can be formed by repeating 21 days of actions according to life experiences, so that if one file is not used for 21 days, the file can be recognized as a junk file, and a file larger than 10M is a large file such as an APK, a compressed packet, a video and the like, and the file is not used for many times by users, so that the file is set as a junk file when the value of a is 21 and the value of b is 10, and the file is regarded as a junk file when the value of y is larger than or equal to 1.
For the method of correcting a and b by the terminal, the terminal may perform primary configuration, for example, let a be 10 and b be 5, and calculate the junk files in all files, so that a lot of junk files are obtained by calculation, which may include some video files that are just downloaded by the user, and the user determines that the calculation is wrong, and perform secondary configuration, for example, let a be 15 and b be 8, and recalculate the junk files in all files, and sequentially loop until reasonable values of a and b are obtained.
When the calculated junk attribute value of a certain file is larger than a preset junk threshold value, marking the file as a junk file; specifically, the marking module 32 may mark the files as garbage files by adding fields, setting garbage file identifiers, and the like.
In practical applications, the calculation module 31 and its calculation function, the marking module 32 and its marking function may be implemented by the controller 150, and at this time, the controller 150 may obtain the unused time and the data size of each file in the terminal, and then according to an algorithm formula: and when the garbage attribute value of a certain file is greater than 1, marking the file as a garbage file.
As shown in fig. 3, the terminal file management apparatus further includes a screening module 33, where the screening module 33 is configured to screen all files in the terminal according to the white list, determine a target file that does not belong to the white list, transmit the target file to the calculation module to calculate a spam attribute value of the target file, and also may be configured to set a time length threshold for calculating the spam attribute value, screen the target file according to the time length threshold, mark the target file whose unused time length is greater than the time length threshold as a file to be marked, and periodically calculate the spam attribute value of the file to be marked.
The screening module provided by the embodiment of the invention is used for avoiding mistakenly marking some files, such as favorite files of a user or system files/encrypted files, as junk files, and also can avoid directly marking some large files which are just downloaded as junk files.
In practical application, even if some files in the terminal are not used for a long time, a user does not want to delete the files, such as some pictures, music and the like, and in order to avoid marking the files as junk files, the invention provides a white list mechanism. That is, in practical applications, the manner of setting the white list includes: adding the system file and the encrypted file to a management white list; and/or adding the preference file selected by the user to the management white list.
Specifically, as shown in fig. 7, in the configuration interface diagram, the terminal directly adds the system file and the encrypted file into the white list, so as to avoid system crash caused by mistaken deletion of the user.
Specifically, as shown in fig. 8, in the configuration interface diagram, a user may select all files under a certain application to directly add to a white list, or may only add some favorite files to the white list, so as to avoid marking the favorite files of the user as junk files.
In practical application, for some large video files just downloaded by a user, if the algorithm is directly adopted for calculation, the large video files are directly regarded as junk files, and user experience is affected, for this reason, the parameter of the time length threshold is provided, for example, 10 days, the parameter is assumed that when a certain file is not used for more than 10 days in a mobile phone terminal power-on state, the algorithm is started to calculate the junk attribute value, for example, when the file size is about 100K, the parameter is substituted into the formula to calculate that the file needs 21 days, similarly, when the file size is 1M, the number of days is calculated to be 19 days, when the file size is more than or equal to 10M, the number of days is calculated to be 10 days (here, ten days are 10 days of waiting), and 10 days are enough for the user to watch the corresponding video, and if the files are liked, the files can be added into a white list.
In practical applications, if a user reuses a file already marked as a junk file at a certain time, it is necessary to restore the file to an original state (a state in which the file is not marked with the junk file), and recalculate the junk attribute value.
The function and the implementation principle of the screening module 33 are briefly described above, in practical application, the screening module 33 and the marking function thereof may be implemented by the controller 150, at this time, the controller 150 may display a white list setting interface and a time length threshold through the display module 131, receive user setting operation, complete setting of the white list and the time length threshold, then screen all files in the terminal according to the white list and the time length threshold, all files refer to any file (including files 1 to 20) of the terminal, then screen out target files according to the white list, that is, screen out user preference files (file 1) and system files/encrypted files (files 2 and 3) in all files, the remaining files are target files (including files 4 to 20), count unused time for the target files, when the unused time of some files (files 5-9) is larger than the time length threshold value, the files are taken as files to be marked (including files 5-9), and the garbage attribute values of the files to be marked (files 5-9) are respectively calculated.
As shown in fig. 3, the terminal file management apparatus further includes a deleting module 34 configured to delete a file marked as a junk file when a deleting condition is satisfied.
The terminal file management device may further include a display module 35, configured to display the file marked as the junk file, and notify the deletion module of the cleaning object in the file marked as the junk file according to the received selection operation instruction, where the deletion module is configured to delete the junk file corresponding to the cleaning object.
In practical application, the terminal can set various deleting conditions according to user operation, and if the storage space of the terminal is lower than 15%, a process of deleting the junk files is started; or, periodically starting a process of deleting the junk files; or, when the terminal storage space can not store the files required to be downloaded by the user, starting a process of deleting the junk files; or, when receiving a command that the user needs to delete the junk file, starting a process of deleting the junk file, and the like. The terminal can set and activate a deletion condition, and can also set and activate all deletion conditions so as to ensure that the storage space of the terminal is cleaned to the maximum extent.
When the terminal meets the deletion condition, a process of deleting the junk files is started, wherein the deletion process can directly delete all files marked as the junk files, can delete a preset number of files marked as the junk files with the junk attribute values ranked in the front, and can display the junk files to a user for the user to select.
In practical application, the scheme of directly deleting all the files marked as garbage files can be realized simply and is not described any further.
In practical application, deleting a predetermined number of files marked as junk files with junk attribute values ranked first requires calculating and updating the junk attribute values of the junk files all the time, and performing sequencing updating.
In practical application, deleting a predetermined number of files marked as junk files before the time of marking as junk files, the time of marking as junk files of each file is required to be recorded, and the files are sorted, and the earlier marked as junk files, the more likely the file is not used any more by a user, the more likely the file is deleted, and the conventional use requirements of the user are met.
In practical application, the way of displaying the junk files to the user for the user to select is most in accordance with the use requirements of the user, so that the favorite files of the user can be prevented from being deleted, meanwhile, the terminal files are too many, and the user is difficult to add all the favorite files to a white list, the junk files corresponding to the deletion do not need to be selected from all the files of the terminal one by one, and only simple selection needs to be performed on a deletion interface.
As shown in fig. 9, the deletion interface displays all junk files in a list manner, and the user may select the junk files.
As shown in fig. 10, the deletion interface displays all junk files in a list manner, and also displays parameters such as acquisition date/source of the corresponding file, so that the user can refer to the parameters when selecting the junk files, and determine whether the junk files are junk files without opening the files.
In practical application, the deleting module 34 and the deleting function thereof may be implemented by the controller 150, and the displaying module 35 and the displaying function thereof may be implemented by the display module 131, at this time, the controller 150 may detect whether a deleting condition is satisfied, if so, the display module 131 displays a garbage file list for a user to select a file to be deleted, receives a user setting operation, completes selection of a deleted object, and then deletes the file.
According to the terminal file management device provided by the embodiment, the garbage attribute value of the file is calculated according to the unused time and the data size of the file by acquiring the parameters of the unused time, the data size and the like of the file, the garbage attribute value is used for representing the probability that the file belongs to the garbage file, and when the garbage attribute value of the file is larger than a garbage threshold value, the corresponding file is marked as the garbage file; therefore, whether the files in the terminal are junk files or not can be managed, the files meeting the conditions are marked as the junk files, and the junk files can be displayed for a user to select to delete when the deletion conditions are met.
In an embodiment of the present invention, the controller 150 in fig. 1 may include all functions of the calculating module 31, the marking module 32, the filtering module 33 and the deleting module 34 in the embodiment shown in fig. 3, and the display module 131 realizes the man-machine exchanging function and the displaying module 35. In this case, the above embodiment may be:
first, the controller 150 displays a human-computer exchange screen, mainly setting a white list, a duration threshold and a deletion condition, through the display module 131, and receives a user operation through the display module 131 to complete configuration.
Thirdly, the controller 150 filters all files of the terminal according to the white list, and determines a target file, i.e., a file that can be marked as a junk file.
Then, the controller 150 detects whether the unused time of the target file is greater than a duration threshold, and if the unused time of the target file is greater than the duration threshold, the target file is used as a file to be marked, and an algorithm is used for calculating a junk attribute value of the target file.
Thereafter, the controller 150 marks a file as junk when it calculates that the junk attribute value of the file is greater than the junk threshold.
After that, the controller 150 detects that the deletion condition is satisfied, and if the storage space of the terminal is lower than 15%, the deletion process is triggered.
Then, the controller 150 displays the garbage file list through the display module 131, so that the user can select a file to be deleted, receive a user selection operation, delete the file selected by the user, and clear up the storage space of the terminal.
The embodiment provides the terminal, whether the files in the terminal are junk files or not is managed by automatically calculating the junk attribute values of the terminal files, the files meeting the conditions are marked as the junk files, and the junk files can be displayed for a user to select to delete when the deletion conditions are met.
Fig. 4 is a schematic structural diagram of the terminal of the present invention, and as shown in fig. 4, the terminal provided in this embodiment at least includes: an Input Output (IO) bus 41, a processor 42, a RAM43, a memory 44, and a handwriting screen 45. Wherein,
an input/output (IO) bus 41 is connected to other components (the processor 42, the memory 43, the memory 44, and the display device 45) of the terminal to which it belongs, and provides a transmission line for the other components.
The processor 42 typically controls the overall operation of the server to which it belongs. For example, processor 42 performs computations, validation, etc. The processor 42 may be a Central Processing Unit (CPU), among others. In this embodiment, the processor 42 at least needs to have the following functions: calculating a garbage attribute value of the file according to the unused time and the data size of the file, and marking the corresponding file as a garbage file when the garbage attribute value of the file is greater than a garbage threshold value; setting a management white list, screening all files in the terminal according to the management white list, and determining target files which do not belong to the management white list; setting a time length threshold value for calculating the junk attribute value, screening target files according to the time length threshold value, and recording the target files with unused time length greater than the time length threshold value as files to be marked; setting a deleting condition for deleting the junk files, and deleting the files marked as the junk files when the deleting condition is detected to be met; and displaying the files marked as the junk files, and determining cleaning objects in all the files marked as the junk files according to the received selection operation.
The RAM43 stores processor-readable, processor-executable software code containing instructions for controlling the processor 42 to perform the functions described herein (i.e., software execution functions). In the present embodiment, the RAM43 needs to store at least the programs necessary for implementing the functions described above by the processor 42.
In the terminal file management apparatus provided by the present invention, the software codes for implementing the functions of the calculation module 31, the marking module 32, the screening module 33, the deleting module 34 and the displaying module 35 may be stored in the memory 43, and executed by the processor 42 or compiled and then executed.
The memory 44, which is typically a semiconductor memory unit, includes Random Access Memory (RAM), Read Only Memory (ROM), and CACHE memory (CACHE), of which RAM is the most important. The memory 44 is one of the important components in the computer, and is a bridge for communicating with the CPU, and the operation of all programs in the computer is performed in the memory, and is used for temporarily storing the operation data in the CPU and the data exchanged with an external storage such as a hard disk, and the CPU transfers the data to be operated to the memory for operation as long as the computer is in operation, and the CPU transmits the result after the operation is completed, and the operation of the memory also determines the stable operation of the computer.
The display screen 45, which typically includes one or more components, allows the processing results of the processor 42, such as an updated desktop, to be displayed, and also requires the user's clicking operations on the handwriting screen to be detected and transmitted to the processor 42.
On the basis of the terminal member shown in fig. 4, the terminal provided by the present embodiment can operate as follows:
the processor 42 displays a man-machine exchange picture through the display screen 45, mainly setting a white list, a duration threshold and a deleting condition, and receives user operation through the display screen 45 to complete configuration;
the processor 42 filters all files of the terminal according to the white list, and determines a target file, namely a file which can be marked as a junk file;
the processor 42 detects whether the unused time of the target file is greater than a time length threshold value, if so, the unused time of the target file is taken as a file to be marked, and an algorithm is used for calculating the junk attribute value of the file to be marked;
when the processor 42 calculates that the garbage attribute value of a certain file is greater than the garbage threshold value, the certain file is marked as a garbage file;
the processor 42 detects that the deletion condition is satisfied, for example, the storage space of the terminal is lower than 15%, and executes the deletion process;
the processor 42 displays the garbage file list through the display screen 45, so that the user can select the files to be deleted, the user selection operation is received, the files selected by the user are deleted, and the storage space of the terminal is cleaned.
The terminal provided by the embodiment manages whether the files in the terminal are junk files or not by automatically calculating the junk attribute values of the terminal files, marks the files meeting the conditions as the junk files, and can display the junk files for the user to select to delete when the deletion conditions are met.
As shown in fig. 5, a first embodiment of the terminal file management method of the present invention is provided, in which the terminal file management method includes the following steps:
s501: and calculating the junk attribute value of the file according to the unused time and the data size of the file, wherein the junk attribute value is used for representing the probability that the file belongs to the junk file.
In practical applications, the files refer to all files in the terminal, and may also refer to only the target file and the file to be marked related to the present invention, and specific contents of these 3 types of files will be described in detail below. The use of a file includes operations of being viewed, played, copied, moved, read, written, edited, etc., and the non-use of the corresponding file includes operations of not being viewed, played, copied, moved, read, written, edited, etc. The unused time of the file includes the time length from the last use of the file after downloading to the current time, for example, 11:11 when the last use of the file 1 is 2016/6/1 and 23:11 when the current time is 2016/6/15, then the unused time of the file 1 is 14 days and 12 hours, and it is anticipated that this can be converted to 11.5 days. The data size of the file may refer to the size of the file itself, for example, if the size of the video file a downloaded by the user is 500M, the data size of the file a is 500M; correspondingly, a plurality of files related to each other may be taken as a whole, for example, a PPT (PowerPoint, presentation) file and music, video, documents and the like introduced by the PPT file are taken as a whole, the size of the whole is calculated, and the whole is taken as the data size of the PPT file, for example, if a user makes a PPT, the size of the PPT file is 1M, 100 music files are cited as background/commentary and the like, the total size of the music files is 500M, 100 documents such as references and the like are also cited as certification files of the PPT, the total size of the documents is 200M, and 3 video files are cited for rest adjustment and use, the total size of the 3 video files is 200M, because the files are related to each other, separate calculation obviously does not conform to the application scenario, the invention calculates the whole, thus, the data size of the PPT file is 901M.
As can be seen from the above description, for some files, such as a viewed video file, a used PPT file, etc., the end user will not use the file for a long time and occupy a large storage space, and these files are files that can be deleted, and the occupied storage space of the terminal can be reduced after deletion.
In order to reasonably determine which files are spam files, the present invention provides an algorithm for spam attribute values of files. Specifically, the calculation module 31 assigns a value to a file in the terminal through an algorithm, where the value is a garbage attribute value and is used to represent a probability that the file belongs to a garbage file, and when the garbage attribute value of a certain file exceeds a garbage threshold, such as a certain fixed value, which is commonly used as 1, the garbage file is defined as a garbage file, and waits for cleaning, where the specific algorithm is: y is x/a + m/b; wherein y is a garbage attribute value; x is a variable and can be a decimal corresponding to the unused time of the file; m is the size of the file and the unit is M; and a and b are constants which can be directly configured by a user, can also be life experience values, and can also be corrected by calculating junk files of all files after the terminal is set by the user for the user to judge whether the calculation is correct.
The mode that a and b are directly configured by a user is simple, and the user can set the mode directly through a man-machine exchange interface and components, such as a display screen, and the detailed description is omitted.
In the method of configuring a and b with a life experience value for a terminal, a habit can be formed by repeating 21 days of actions according to life experiences, so that if one file is not used for 21 days, the file can be recognized as a junk file, and a file larger than 10M is a large file such as an APK, a compressed packet, a video and the like, and the file is not used for many times by users, so that the file is set as a junk file when the value of a is 21 and the value of b is 10, and the file is regarded as a junk file when the value of y is larger than or equal to 1.
For the method of correcting a and b by the terminal, the terminal may perform primary configuration, for example, let a be 10 and b be 5, and calculate the junk files in all files, so that a lot of junk files are obtained by calculation, which may include some video files that are just downloaded by the user, and the user determines that the calculation is wrong, and perform secondary configuration, for example, let a be 15 and b be 8, and recalculate the junk files in all files, and sequentially loop until reasonable values of a and b are obtained.
In order to avoid some special files, such as user favorite files, system files, etc. from being incorrectly marked as garbage files, before calculating the garbage attribute value of the file, the method further comprises:
setting a white list;
screening all files in the terminal according to the white list, and determining target files which do not belong to the white list;
acquiring unused time and data size of a target file;
calculating the garbage attribute value of the file comprises: and calculating the junk attribute value of the target file.
In order to avoid that some oversized files are marked as garbage files directly after downloading, before calculating the garbage attribute value of the target file, the method further includes:
setting a time length threshold value for calculating the rubbish attribute value;
screening target files according to the time length threshold value, and recording the target files with the unused time length larger than the time length threshold value as files to be marked;
calculating the garbage attribute value of the target file comprises the following steps: the garbage attribute value of the file to be marked is periodically calculated.
In practical application, even if some files in the terminal are not used for a long time, a user does not want to delete the files, such as some pictures, music and the like, and in order to avoid marking the files as junk files, the invention provides a white list mechanism, and at the moment, the user can set a white list to be added to prevent mistaken deletion, and system files and encrypted files cannot be deleted, and the system files and the encrypted files which cannot be deleted in the terminal are automatically added into the white list. That is, in practical applications, the manner of setting the white list includes: adding the system file and the encrypted file to a management white list; and/or adding the preference file selected by the user to the management white list.
Specifically, as shown in fig. 7, in the configuration interface diagram, the terminal directly adds the system file and the encrypted file into the white list, so as to avoid system crash caused by mistaken deletion of the user.
Specifically, as shown in fig. 8, in the configuration interface diagram, a user may select all files under a certain application to directly add to a white list, or may only add some favorite files to the white list, so as to avoid marking the favorite files of the user as junk files.
In practical application, for some large video files just downloaded by a user, if the algorithm is directly adopted for calculation, the large video files are directly regarded as junk files, and user experience is affected, for this reason, the parameter of the time length threshold is provided, for example, 10 days, the parameter is assumed that when a certain file is not used for more than 10 days in a mobile phone terminal power-on state, the algorithm is started to calculate the junk attribute value, for example, when the file size is about 100K, the parameter is substituted into the formula to calculate that the file needs 21 days, similarly, when the file size is 1M, the number of days is calculated to be 19 days, when the file size is more than or equal to 10M, the number of days is calculated to be 10 days (here, ten days are 10 days of waiting), and 10 days are enough for the user to watch the corresponding video, and if the files are liked, the files can be added into a white list.
In practical applications, if a user reuses a file already marked as a junk file at a certain time, it is necessary to restore the file to an original state (a state in which the file is not marked with the junk file), and recalculate the junk attribute value.
S502: and marking the file with the junk attribute value larger than a preset junk threshold value as a junk file.
When the calculated junk attribute value of a certain file is larger than a preset junk threshold value, marking the file as a junk file; specifically, the files can be marked as junk files by adding fields, setting junk file identifiers and the like.
In order to clean up terminal storage space rationally, still include:
setting a deleting condition for deleting the junk files;
and deleting the files marked as the junk files when the deletion condition is detected to be met.
In order to avoid deleting the user preference file, before deleting the file marked as a junk file, the method further comprises the following steps:
displaying the files marked as junk files;
determining a cleaning object in the file marked as the junk file according to the received selection operation instruction;
deleting files marked as junk files includes: and deleting the junk files corresponding to the cleaning objects.
In practical application, the terminal can set various deleting conditions according to user operation, and if the storage space of the terminal is lower than 15%, a process of deleting the junk files is started; or, periodically starting a process of deleting the junk files; or, when the terminal storage space can not store the files required to be downloaded by the user, starting a process of deleting the junk files; or, when receiving a command that the user needs to delete the junk file, starting a process of deleting the junk file, and the like. The terminal can set and activate a deletion condition, and can also set and activate all deletion conditions so as to ensure that the storage space of the terminal is cleaned to the maximum extent.
When the terminal meets the deletion condition, a process of deleting the junk files is started, wherein the deletion process can directly delete all files marked as the junk files, can delete a preset number of files marked as the junk files with the junk attribute values ranked in the front, and can display the junk files to a user for the user to select.
In practical application, the scheme of directly deleting all the files marked as garbage files can be realized simply and is not described any further.
In practical application, deleting a predetermined number of files marked as junk files with junk attribute values ranked first requires calculating and updating the junk attribute values of the junk files all the time, and performing sequencing updating.
In practical application, deleting a predetermined number of files marked as junk files before the time of marking as junk files, the time of marking as junk files of each file is required to be recorded, and the files are sorted, and the earlier marked as junk files, the more likely the file is not used any more by a user, the more likely the file is deleted, and the conventional use requirements of the user are met.
In practical application, the way of displaying the junk files to the user for the user to select is most in accordance with the use requirements of the user, so that the favorite files of the user can be prevented from being deleted, meanwhile, the terminal files are too many, and the user is difficult to add all the favorite files to a white list, the junk files corresponding to the deletion do not need to be selected from all the files of the terminal one by one, and only simple selection needs to be performed on a deletion interface.
As shown in fig. 9, the deletion interface displays all junk files in a list manner, and the user may select the junk files.
As shown in fig. 10, the deletion interface displays all junk files in a list manner, and also displays parameters such as acquisition date/source of the corresponding file, so that the user can refer to the parameters when selecting the junk files, and determine whether the junk files are junk files without opening the files.
The method for managing the terminal file provided by the embodiment includes the steps that parameters such as unused time and data size of the file are obtained, a junk attribute value of the file is calculated according to the unused time and the data size of the file, the junk attribute value is used for representing the probability that the file belongs to the junk file, and when the junk attribute value of the file is larger than a junk threshold value, the corresponding file is marked as the junk file; therefore, whether the files in the terminal are junk files or not can be managed, the files meeting the conditions are marked as the junk files, and the junk files can be displayed for a user to select to delete when the deletion conditions are met.
As shown in fig. 6, a second embodiment of the terminal file management method of the present invention is provided, in which a desktop display method includes the following steps:
s601: setting a deleting condition, a white list and a time length threshold;
in practical applications, the user may set the deletion condition, the white list, and the duration threshold value through the keyboard or the like of the user input unit 120 shown in fig. 1.
And if the deletion condition is that the residual storage capacity of the terminal is lower than 15%, triggering a deletion process, wherein the time length threshold is 10 days.
S602: screening all files of the terminal, determining a target file, and detecting the use condition;
all files refer to any files of the terminal, including files 1-20, and then target files are screened out according to a white list, namely, a user favorite file (file 1) and system files/encrypted files (files 2 and 3) in all files are screened out, and the rest files are target files, including files 4-20.
S603: judging whether the unused time of the target file is greater than a time length threshold value or not; if yes, go to S604; if not, returning to S602 to detect the use condition;
s604: determining a file to be marked, and periodically calculating a junk attribute value;
counting unused time aiming at target files, and when the unused time of some files (files 5-9) is greater than a time length threshold value, such as 10 days, taking the unused time as files to be marked (including files 5-9), and starting to respectively calculate junk attribute values of the files to be marked (files 5-9);
according to an algorithm formula: and y is x/21+ m/10, and the junk attribute value of each file is calculated.
S605: whether the junk attribute value of the file is larger than 1; if yes, go to S606; if not, returning to S604 to calculate the junk attribute value;
when the garbage attribute value y of a certain file is larger than 1, the certain file is marked as a garbage file.
S606: and marking the file with the junk attribute value larger than 1 as a junk file.
These files can be marked as junk files by adding fields, setting junk file identifications, and the like.
S607: detecting the residual storage space of the terminal;
detecting the residual capacity of the storage space of the terminal in real time, and outputting a detection result in a percentage mode;
s608: detecting whether a deletion condition is met; if yes, executing S609; if not, returning to S607;
the deletion condition is that the remaining storage capacity of the terminal is less than 15%, therefore, if the detection result is less than 15%, the deletion condition is considered to be satisfied, S609 is executed, otherwise, the deletion condition is considered to be not satisfied, and S607 is returned to be executed.
S609: displaying a cleaning interface, displaying a garbage file list for a user to select whether to clean or not, executing S610 if the user selects to clean, and returning to execute S609 after preset time otherwise;
s610: and cleaning the junk files according to the selection of the user on the cleaning interface.
The embodiment provides a new mode for defining and cleaning the garbage files of the terminal, the garbage files are defined to be garbage according to the unused time and the size of the files, a reasonable cleaning process is provided by combining the living habits and experiences of people, and the processing process is reasonable. When the terminal is not stored enough, the garbage clearing prompt box is automatically ejected, and the garbage clearing prompt box is convenient and quick.
According to the terminal file management device, the terminal and the terminal file management method, parameters such as unused time and data size of a file are obtained, a junk attribute value of the file is calculated according to the unused time and the data size of the file, the junk attribute value is used for representing the probability that the file belongs to the junk file, and when the junk attribute value of the file is larger than a preset junk threshold value, the corresponding file is marked as the junk file; therefore, whether the files in the terminal are junk files or not can be managed, the files meeting the conditions are marked as the junk files, and the junk files can be displayed for a user to select to delete when the deletion conditions are met.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A terminal file management apparatus, comprising:
the calculation module is used for calculating the junk attribute value of the file according to the unused time and the data size of the file, wherein the junk attribute value is used for representing the probability that the file belongs to the junk file;
and the marking module is used for marking the file with the junk attribute value larger than the preset junk threshold value as a junk file.
2. The terminal file management apparatus according to claim 1, further comprising a filtering module and a deleting module; the screening module is used for screening all files in the terminal according to a white list, determining target files which do not belong to the white list, and transmitting the target files to the computing module to compute the junk attribute values of the target files; and the deleting module is used for deleting the file marked as the junk file when a deleting condition is met.
3. The terminal file management apparatus according to claim 2, further comprising a display module, configured to display the file marked as a junk file, and notify the deletion module of a cleaning object in the file marked as the junk file according to a received selection operation instruction, where the deletion module is configured to delete the junk file corresponding to the cleaning object.
4. The terminal file management device according to any one of claims 1 to 3, wherein the calculating module is configured to calculate a garbage attribute value of the file according to y ═ x/a + m/b, where y is the garbage attribute value of the file, x is the unused time of the file, m is the data size of the file, and a and b are constants.
5. A terminal characterized by comprising the terminal file management apparatus according to any one of claims 1 to 4.
6. A terminal file management method is characterized by comprising the following steps:
according to the unused time and the data size of the file, calculating a junk attribute value of the file, wherein the junk attribute value is used for representing the probability that the file belongs to the junk file;
and marking the file with the junk attribute value larger than a preset junk threshold value as a junk file.
7. The terminal file management method according to claim 6, further comprising, before said calculating the junk attribute value of the file:
setting a white list;
screening all files in the terminal according to the white list, and determining target files which do not belong to the white list;
acquiring the unused time and the data size of the target file;
the calculating the garbage attribute value of the file comprises the following steps: and calculating the garbage attribute value of the target file.
8. The terminal file management method according to claim 7, wherein before said calculating the garbage attribute value of the target file, further comprising:
setting a time length threshold value for calculating the rubbish attribute value;
screening the target files according to a time length threshold, and recording the target files with unused time lengths larger than the time length threshold as files to be marked;
the calculating the garbage attribute value of the target file comprises the following steps: and periodically calculating the garbage attribute value of the file to be marked.
9. The terminal file management method according to any one of claims 6 to 8, characterized in that the method further comprises:
setting a deleting condition for deleting the junk files;
and deleting the files marked as the junk files when the deletion condition is detected to be met.
10. The terminal file management method according to claim 9, further comprising, before deleting a file marked as a junk file:
displaying the file marked as the junk file;
determining a cleaning object in the file marked as the junk file according to the received selection operation instruction;
the deleting the file marked as the junk file comprises: and deleting the junk files corresponding to the cleaning objects.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610548394.3A CN106227744A (en) | 2016-07-12 | 2016-07-12 | Terminal document managing device, terminal and terminal document management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610548394.3A CN106227744A (en) | 2016-07-12 | 2016-07-12 | Terminal document managing device, terminal and terminal document management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106227744A true CN106227744A (en) | 2016-12-14 |
Family
ID=57519215
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610548394.3A Pending CN106227744A (en) | 2016-07-12 | 2016-07-12 | Terminal document managing device, terminal and terminal document management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106227744A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106951522A (en) * | 2017-03-20 | 2017-07-14 | 山东大学 | A kind of Android terminal intelligents file management system and method |
CN106980661A (en) * | 2017-03-20 | 2017-07-25 | 北京金山安全软件有限公司 | Method and device for cleaning data files in mobile terminal and electronic equipment |
CN109086305A (en) * | 2018-06-21 | 2018-12-25 | 上海二三四五网络科技有限公司 | A kind of control method and control device of efficient cleaning terminal rubbish |
CN109656875A (en) * | 2018-12-05 | 2019-04-19 | 广东小天才科技有限公司 | Storage space classification management method and device, terminal and storage medium |
CN109753482A (en) * | 2018-12-29 | 2019-05-14 | 联想(北京)有限公司 | File management method and device |
CN109871361A (en) * | 2018-11-26 | 2019-06-11 | 乐蜜有限公司 | A kind of file uploading method, device, electronic equipment and readable storage medium storing program for executing |
CN110140117A (en) * | 2017-11-10 | 2019-08-16 | 华为技术有限公司 | Terminal is based on the automatic cleaning individual subscriber file of user's habit |
CN110400356A (en) * | 2019-06-24 | 2019-11-01 | 武汉联影医疗科技有限公司 | Image texture control method, device, equipment and storage medium |
CN110543451A (en) * | 2019-07-30 | 2019-12-06 | 华为技术有限公司 | Method and device for efficiently cleaning equipment files |
CN112131189A (en) * | 2020-09-29 | 2020-12-25 | 珠海海鸟科技有限公司 | Method and device for cleaning junk files and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102968297A (en) * | 2012-10-25 | 2013-03-13 | 北京奇虎科技有限公司 | Software management system and method for mobile terminal |
CN104156414A (en) * | 2014-07-30 | 2014-11-19 | 珠海市君天电子科技有限公司 | Terminal, device and method for clearing junk files |
CN104572819A (en) * | 2014-12-02 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | Clearing method and system for junk data |
-
2016
- 2016-07-12 CN CN201610548394.3A patent/CN106227744A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102968297A (en) * | 2012-10-25 | 2013-03-13 | 北京奇虎科技有限公司 | Software management system and method for mobile terminal |
CN104156414A (en) * | 2014-07-30 | 2014-11-19 | 珠海市君天电子科技有限公司 | Terminal, device and method for clearing junk files |
CN104572819A (en) * | 2014-12-02 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | Clearing method and system for junk data |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106951522A (en) * | 2017-03-20 | 2017-07-14 | 山东大学 | A kind of Android terminal intelligents file management system and method |
CN106980661A (en) * | 2017-03-20 | 2017-07-25 | 北京金山安全软件有限公司 | Method and device for cleaning data files in mobile terminal and electronic equipment |
CN106980661B (en) * | 2017-03-20 | 2020-10-09 | 北京金山安全软件有限公司 | Method and device for cleaning data files in mobile terminal and electronic equipment |
CN110140117A (en) * | 2017-11-10 | 2019-08-16 | 华为技术有限公司 | Terminal is based on the automatic cleaning individual subscriber file of user's habit |
CN110140117B (en) * | 2017-11-10 | 2023-11-17 | 华为技术有限公司 | Terminal automatically cleans personal files of users based on user habits |
CN109086305A (en) * | 2018-06-21 | 2018-12-25 | 上海二三四五网络科技有限公司 | A kind of control method and control device of efficient cleaning terminal rubbish |
CN109871361A (en) * | 2018-11-26 | 2019-06-11 | 乐蜜有限公司 | A kind of file uploading method, device, electronic equipment and readable storage medium storing program for executing |
CN109871361B (en) * | 2018-11-26 | 2023-05-23 | 北京乐我无限科技有限责任公司 | File uploading method and device, electronic equipment and readable storage medium |
CN109656875A (en) * | 2018-12-05 | 2019-04-19 | 广东小天才科技有限公司 | Storage space classification management method and device, terminal and storage medium |
CN109753482A (en) * | 2018-12-29 | 2019-05-14 | 联想(北京)有限公司 | File management method and device |
CN110400356A (en) * | 2019-06-24 | 2019-11-01 | 武汉联影医疗科技有限公司 | Image texture control method, device, equipment and storage medium |
CN110543451A (en) * | 2019-07-30 | 2019-12-06 | 华为技术有限公司 | Method and device for efficiently cleaning equipment files |
CN112131189A (en) * | 2020-09-29 | 2020-12-25 | 珠海海鸟科技有限公司 | Method and device for cleaning junk files and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106227744A (en) | Terminal document managing device, terminal and terminal document management method | |
CN107133097B (en) | Memory optimization method and device | |
CN106227867B (en) | A kind of method and device of file management | |
CN106775391B (en) | Interface switching device and method | |
CN106201474A (en) | A kind of notification message display packing and terminal | |
CN106293124A (en) | Input method switching device, terminal and method | |
CN106572250B (en) | Method and device for cleaning background application program of mobile terminal | |
CN106610770A (en) | Picture viewing method and device | |
CN106249989B (en) | Method for arranging social application program icons during content sharing and mobile terminal | |
CN106559563B (en) | Image data processing method and device | |
CN106250268B (en) | Content of text recovery device and method | |
CN106055660A (en) | Mobile terminal page access method, mobile terminal page access device and mobile terminal | |
CN106598538B (en) | Instruction set updating method and system | |
CN105426036A (en) | Interface display upgrade method, apparatus and system for application | |
CN105912262B (en) | Desktop icon adjusting device, terminal and desktop icon adjusting method | |
CN106598417A (en) | Terminal screen turnoff control device and method | |
CN104994121A (en) | Method and device for pushing notification messages | |
CN106066865B (en) | Application recommendation device and method | |
CN108829267A (en) | A kind of vocabulary recommended method, equipment and computer can storage mediums | |
CN106507337B (en) | FOTA upgrading device and method | |
CN106559577B (en) | Mobile terminal and control method thereof | |
CN106095308B (en) | The method of mobile terminal and dummy keyboard false-touch prevention | |
CN105787030B (en) | A kind of mobile terminal and its method for handling data | |
CN106557555A (en) | media playing method and device | |
CN106961523A (en) | The alarm set and method of system status information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161214 |