CN106354884B - Data object deleting method and device based on distributed file system - Google Patents
Data object deleting method and device based on distributed file system Download PDFInfo
- Publication number
- CN106354884B CN106354884B CN201610880093.0A CN201610880093A CN106354884B CN 106354884 B CN106354884 B CN 106354884B CN 201610880093 A CN201610880093 A CN 201610880093A CN 106354884 B CN106354884 B CN 106354884B
- Authority
- CN
- China
- Prior art keywords
- data object
- recycle bin
- directory
- deleting
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a data object deleting method and device based on a distributed file system. The method is applied to a client of a distributed file system, the distributed file system comprises a service directory and a recycle bin directory, and the file names of data objects in the recycle bin directory all carry setting marks, and the method comprises the following steps: receiving a deleting instruction of a first user for a first data object; determining whether the first data object carries a setting flag; if yes, deleting the first data object in the recycle bin directory; if not, the first data object is moved from the service directory to the recycle bin directory, and a setting mark is added to the file name of the first data object. In this way, the recycle bin directory provides a barrier for the user to move a data object to the recycle bin directory when the user deletes the data object in the service directory, so that the user can recover the data object from the recycle bin directory when the user finds that the deletion operation is a false deletion operation.
Description
Technical Field
The invention relates to the technical field of distributed file systems, in particular to a data object deleting method and device based on a distributed file system.
Background
With the rapid development of computer technology, the application of distributed file systems is more and more extensive. In the distributed file system, a client can provide an operation interface for a user, and the user can realize read-write operation on data objects, such as data files or data directories, of the distributed file system through the client.
The existing distributed file system does not support the function of a recycle bin, in the distributed file system of a Unix or Linux operating system, a user can delete a data object by using an rm command, the data object is completely deleted after the rm command is executed, and the deletion result caused by the rm command is irreversible.
However, the user is likely to have a false delete operation in the process of operating the data object. This results in data loss and is annoying to the user.
Disclosure of Invention
The invention aims to provide a data object deleting method and device based on a distributed file system, so as to avoid data loss and trouble brought to users due to mistaken deleting operation of the users.
In order to solve the technical problems, the invention provides the following technical scheme:
a data object deleting method based on a distributed file system is applied to a client of the distributed file system, the distributed file system comprises a service directory and a recycle bin directory, and the file names of the data objects in the recycle bin directory all carry setting marks, and the method comprises the following steps:
receiving a deleting instruction of a first user for a first data object;
determining whether the file name of the first data object carries the setting mark;
if so, deleting the first data object in the recycle bin directory;
and if not, moving the first data object from the service directory to the recycle bin directory, and adding the setting mark in the file name of the first data object.
In an embodiment of the present invention, before deleting the first data object in the recycle bin directory, the method further includes:
determining whether the first user has deletion rights;
if so, the step of deleting the first data object in the recycle bin directory is performed.
In one embodiment of the present invention, the method further comprises:
receiving a search request of a second user based on the set mark;
and outputting and displaying the data object carrying the setting mark to the second user.
In one embodiment of the present invention, the method further comprises:
receiving a recovery instruction of a third user for a second data object in the recycle bin directory, wherein the recovery instruction carries information of a position to be stored;
and moving the second data object to the position to be stored, and clearing the setting mark carried in the file name of the second data object.
In one embodiment of the present invention, the method further comprises:
and when a set cleaning triggering condition is reached, cleaning the data object in the recycle bin directory.
A data object deleting device based on a distributed file system is applied to a client of the distributed file system, the distributed file system comprises a service directory and a recycle bin directory, and the file names of the data objects in the recycle bin directory all carry setting marks, and the device comprises:
the deleting instruction receiving module is used for receiving a deleting instruction of a first user for the first data object;
a setting mark determining module, configured to determine whether the file name of the first data object carries the setting mark, if yes, trigger a first deleting module, and if no, trigger a second deleting module;
the first deleting module is used for deleting the first data object in the recycle bin directory;
the second deleting module is configured to move the first data object from the service directory to the recycle bin directory, and add the setting flag to the file name of the first data object.
In one embodiment of the present invention, the method further comprises:
and the deletion permission determining module is used for determining whether the first user has the deletion permission or not before deleting the first data object in the recycle bin directory, and if so, triggering the first deletion module.
In one embodiment of the present invention, the method further comprises:
the searching request receiving module is used for receiving a searching request of a second user based on the setting mark;
and the output display module is used for outputting and displaying the data object carrying the setting mark to the second user.
In one embodiment of the present invention, the method further comprises:
a recovery instruction receiving module, configured to receive a recovery instruction of a second data object in the recycle bin directory from a third user, where the recovery instruction carries information of a location to be stored;
and the data object recovery module is used for moving the second data object to the position to be stored and clearing the setting mark carried in the file name of the second data object.
In one embodiment of the present invention, the method further comprises:
and the clearing module is used for clearing the data objects in the recycle bin directory when a set clearing trigger condition is reached.
By applying the technical scheme provided by the embodiment of the invention, the distributed file system comprises a service directory and a recycle bin directory, the file names of the data objects in the recycle bin directory all carry setting marks, when a deletion instruction of a first user for a first data object is received, whether the file name of the first data object carries the setting marks is determined, if the file name carries the setting marks, the first data object is indicated in the recycle bin directory, the first data object can be deleted in the recycle bin directory, if the file name does not carry the setting marks, the first data object is indicated in the service directory, the first data object can be moved from the service directory to the recycle bin directory, and the setting marks are added in the file name of the first data object. The recycle bin directory provides a barrier for users to move data objects to the recycle bin directory when users delete data objects in the service directory, so that users can recover the data objects from the recycle bin directory when finding that the deletion operation is a mistake.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating an implementation of a method for deleting a data object based on a distributed file system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a data object deleting device based on a distributed file system in an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the disclosure, the invention will be described in further detail with reference to the accompanying drawings and specific embodiments. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a data object deleting method based on a distributed file system, which can be applied to a client of the distributed file system, and a user can read and write data objects in the distributed file system through the client. In the embodiment of the invention, the distributed file system comprises a service directory and a recycle bin directory, and the data objects stored in the service directory and the recycle bin directory can be data files or data directories. The file names of the data objects in the recycle bin directory carry setting marks. The setting flag may specifically be a character of the setting.
Referring to fig. 1, an implementation flowchart of a method for deleting a data object based on a distributed file system according to an embodiment of the present invention is shown, where the method includes the following steps:
s110: and receiving a deleting instruction of the first user for the first data object.
In practical application, a user can operate a data object in the distributed file system according to actual requirements. When a user wants to delete a data object in the distributed file system, a delete instruction may be issued to the client.
After receiving the deletion instruction of the first user for the first data object, the client may continue to perform the operation of step S120.
S120: and determining whether the file name of the first data object carries a setting mark.
In the embodiment of the invention, the file names of the data objects in the recycle bin directory of the distributed file system all carry setting marks. For a certain data object, whether the data object is in the service directory or the recycle bin directory can be determined by judging whether the file name of the data object carries the setting mark.
After receiving the deletion instruction for the first data object, it may be determined whether the file name of the first data object carries a setting flag, if so, the first data object is indicated in the recycle bin directory, and the operation of step S130 may be continuously performed, and if not, the first data object is indicated in the service directory, and the operation of step S140 may be continuously performed.
S130: the first data object is deleted in the recycle bin directory.
When it is determined in step S120 that the first data object carries the setting flag, indicating that the first data object is in the recycle bin directory, the first data object may be deleted in the recycle bin directory. In this case, the first data object will be completely deleted and will no longer exist in the distributed file system.
S140: the first data object is moved from the service directory to the recycle bin directory and a setting flag is added to the file name of the first data object.
When it is determined in step S120 that the file name of the first data object does not carry the set mark, it indicates that the first data object is not in the recycle bin directory, but in the service directory, the first data object can be moved from the service directory to the recycle bin directory. In this case, the first data object is simply deleted from the service directory and temporarily stored in the recycle bin directory. The recycle bin directory provides a barrier for users to recover corresponding data objects from the recycle bin directory when a user finds a false delete operation.
When the first data object is moved from the service directory to the recycle bin directory, a setting flag may be added to the file name of the first data object, and the setting flag may be carried in the file names of the data objects in the recycle bin directory.
By applying the method provided by the embodiment of the present invention, the distributed file system includes a service directory and a recycle bin directory, and the file names of the data objects in the recycle bin directory all carry setting flags, when a deletion instruction of a first user for a first data object is received, it is determined whether the file name of the first data object carries the setting flag, if so, it indicates that the first data object is in the recycle bin directory, and the first data object may be deleted in the recycle bin directory, and if not, it indicates that the first data object is in the service directory, and the first data object may be moved from the service directory to the recycle bin directory, and the setting flag is added in the file name of the first data object. The recycle bin directory provides a barrier for users to move data objects to the recycle bin directory when users delete data objects in the service directory, so that users can recover the data objects from the recycle bin directory when finding that the deletion operation is a mistake.
In an embodiment of the present invention, before step S130, the method may further include the steps of:
it is determined whether the first user has the deletion authority, and if so, the operation of step S130 is performed.
In the embodiment of the invention, the recycle bin directory of the distributed file system is unique, and the user authority can be set aiming at the recycle bin directory. For example, only the read right, write right, and delete right are opened to the administrator, and only the read right is opened to the general user.
After determining that the first data object carries the setting flag and determining that the first data object is in the recycle bin directory, determining whether the first user has a deletion right, if so, continuing to execute the operation of deleting the first data object in the recycle bin directory in step S130, otherwise, not processing the received deletion instruction of the first user for the first data object, or returning a prompt message limited by the right to the first user.
Therefore, the situation that the recycle bin directory is emptied by mistake or the data objects in the recycle bin directory are deleted by mistake due to the fact that too many users have the deletion right of the data objects in the recycle bin directory can be avoided.
In another embodiment of the present invention, the method may further comprise the steps of:
the method comprises the following steps: receiving a search request of a second user based on the set mark;
step two: and outputting and displaying the data object carrying the setting mark to a second user.
For convenience of description, the above two steps are combined for illustration.
In practical applications, if the user is not aware of the deleted data object, it can be looked up by a search command. When a search request based on the setting mark of the second user is received, the data object carrying the setting mark in the recycle bin directory can be output and displayed to the second user. So that the user can view the data objects deleted in the service directory.
In another embodiment of the present invention, the method may further comprise the steps of:
the first step is as follows: receiving a recovery instruction of a second data object in the recycle bin directory by a third user, wherein the recovery instruction carries information of a position to be stored;
the second step is that: and moving the second data object to a position to be stored, and clearing the setting mark carried in the file name of the second data object.
For convenience of description, the above two steps are combined for illustration.
In practical application, a user may delete a data object from a business directory due to a false deletion operation. In an embodiment of the invention, the data object is removed from the service directory and moved to the recycle bin directory. When the user becomes aware of the deletion error, the corresponding data object may be recovered from the recycle bin directory.
And receiving a recovery instruction of a third user for the second data object in the recycle bin directory, wherein the recovery instruction carries information of a position to be stored, the second data object can be moved to the position to be stored, the position to be stored is a certain specified position in the service directory, and a setting mark carried in a file name of the second data object is cleared.
Specifically, the data object to be restored can be restored to the specified location by the encapsulated restore command.
And recovering the second data object in the service directory from the recycle bin directory, wherein the second data object can be normally used by a subsequent service.
In practical applications, before the second step, it may be determined whether a third user has a recovery right, and if so, the operation of the second step is performed.
In one embodiment of the invention, the method may further comprise the steps of:
and when the set clearing triggering condition is reached, clearing the data object in the recycle bin directory.
In the embodiment of the present invention, the data objects in the recycle bin directory may be periodically cleaned, or when a cleaning request from an administrator user is received, the data objects in the recycle bin directory may be cleaned. During cleaning, the data objects with the storage duration exceeding the set threshold can be cleaned according to the sequence stored in the recycle bin directory.
Corresponding to the above method embodiment, an embodiment of the present invention further provides a data object deleting device based on a distributed file system, which is applied to a client of the distributed file system, where the distributed file system includes a service directory and a recycle bin directory, and file names of data objects in the recycle bin directory all carry setting flags. The following description describes a data object deleting device based on a distributed file system, and the above description describes a data object deleting method based on a distributed file system, which may be referred to with each other.
Referring to fig. 2, the apparatus includes the following modules:
a deleting instruction receiving module 210, configured to receive a deleting instruction of the first user for the first data object;
a setting flag determining module 220, configured to determine whether the file name of the first data object carries a setting flag, if yes, trigger the first deleting module 230, and if no, trigger the second deleting module 240;
a first delete module 230 to delete the first data object in the recycle bin directory;
the second deleting module 240 is configured to move the first data object from the service directory to the recycle bin directory, and add a setting flag to the file name of the first data object.
By applying the apparatus provided by the embodiment of the present invention, the distributed file system includes a service directory and a recycle bin directory, where file names of data objects in the recycle bin directory all carry setting flags, and when a deletion instruction of a first user for a first data object is received, it is determined whether the file name of the first data object carries the setting flag, if so, it indicates that the first data object is in the recycle bin directory, and the first data object may be deleted in the recycle bin directory, and if not, it indicates that the first data object is in the service directory, and the first data object may be moved from the service directory to the recycle bin directory, and the setting flag is added in the file name of the first data object. The recycle bin directory provides a barrier for users to move data objects to the recycle bin directory when users delete data objects in the service directory, so that users can recover the data objects from the recycle bin directory when finding that the deletion operation is a mistake.
In one embodiment of the present invention, the method further comprises:
and a deletion permission determining module, configured to determine whether the first user has a deletion permission before deleting the first data object in the recycle bin directory, and if so, trigger the first deleting module 230.
In one embodiment of the present invention, the method further comprises:
the searching request receiving module is used for receiving a searching request of a second user based on the set mark;
and the output display module is used for outputting and displaying the data object carrying the setting mark to a second user.
In one embodiment of the present invention, the method further comprises:
the recovery instruction receiving module is used for receiving a recovery instruction of a third user for a second data object in the recycle bin directory, and the recovery instruction carries information of a position to be stored;
and the data object recovery module is used for moving the second data object to the position to be stored and clearing the setting mark carried in the file name of the second data object.
In one embodiment of the present invention, the method further comprises:
and the cleaning module is used for cleaning the data objects in the recycle bin directory when the set cleaning triggering condition is reached.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The principle and the implementation of the present invention are explained in the present application by using specific examples, and the above description of the embodiments is only used to help understanding the technical solution and the core idea of the present invention. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
Claims (6)
1. A data object deleting method based on a distributed file system is characterized in that the method is applied to a client of the distributed file system, the distributed file system comprises a service directory and a recycle bin directory, and the file names of the data objects in the recycle bin directory carry setting marks, and the method comprises the following steps:
receiving a deleting instruction of a first user for a first data object;
determining whether the file name of the first data object carries the setting mark;
if so, deleting the first data object in the recycle bin directory;
if not, the first data object is moved from the service directory to the recycle bin directory, and the setting mark is added to the file name of the first data object;
receiving a recovery instruction of a third user for a second data object in the recycle bin directory, wherein the recovery instruction carries information of a position to be stored;
moving the second data object to the position to be stored, and clearing the setting mark carried in the file name of the second data object;
wherein, before deleting the first data object in the recycle bin directory, the method further comprises:
determining whether the first user has deletion rights;
if so, the step of deleting the first data object in the recycle bin directory is performed.
2. The distributed file system-based data object deletion method of claim 1, further comprising:
receiving a search request of a second user based on the set mark;
and outputting and displaying the data object carrying the setting mark to the second user.
3. The distributed file system-based data object deletion method according to claim 1 or 2, further comprising:
and when a set cleaning triggering condition is reached, cleaning the data object in the recycle bin directory.
4. A data object deleting device based on a distributed file system is characterized in that the device is applied to a client of the distributed file system, the distributed file system comprises a service directory and a recycle bin directory, and the file names of the data objects in the recycle bin directory all carry setting marks, and the device comprises:
the deleting instruction receiving module is used for receiving a deleting instruction of a first user for the first data object;
a setting mark determining module, configured to determine whether the file name of the first data object carries the setting mark, if yes, trigger a first deleting module, and if no, trigger a second deleting module;
the first deleting module is used for deleting the first data object in the recycle bin directory;
the second deleting module is used for moving the first data object from the service directory to the recycle bin directory and adding the setting mark in the file name of the first data object;
a recovery instruction receiving module, configured to receive a recovery instruction of a second data object in the recycle bin directory from a third user, where the recovery instruction carries information of a location to be stored;
the data object recovery module is used for moving the second data object to the position to be stored and clearing the setting mark carried in the file name of the second data object;
and the deletion permission determining module is used for determining whether the first user has the deletion permission or not before deleting the first data object in the recycle bin directory, and if so, triggering the first deletion module.
5. The distributed file system-based data object deletion apparatus as claimed in claim 4, further comprising:
the searching request receiving module is used for receiving a searching request of a second user based on the setting mark;
and the output display module is used for outputting and displaying the data object carrying the setting mark to the second user.
6. The distributed file system-based data object deletion apparatus according to claim 4 or 5, further comprising:
and the clearing module is used for clearing the data objects in the recycle bin directory when a set clearing trigger condition is reached.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610880093.0A CN106354884B (en) | 2016-10-09 | 2016-10-09 | Data object deleting method and device based on distributed file system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610880093.0A CN106354884B (en) | 2016-10-09 | 2016-10-09 | Data object deleting method and device based on distributed file system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106354884A CN106354884A (en) | 2017-01-25 |
CN106354884B true CN106354884B (en) | 2020-02-07 |
Family
ID=57866992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610880093.0A Active CN106354884B (en) | 2016-10-09 | 2016-10-09 | Data object deleting method and device based on distributed file system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106354884B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934052B (en) * | 2017-03-16 | 2021-01-08 | 维沃移动通信有限公司 | Media text processing method and mobile terminal |
CN109690519A (en) * | 2017-06-16 | 2019-04-26 | 华为技术有限公司 | A kind of document handling method and mobile terminal |
CN108897498A (en) * | 2018-06-29 | 2018-11-27 | 郑州云海信息技术有限公司 | Cluster file system data fast deleting method, device, equipment |
CN109460370A (en) * | 2018-10-23 | 2019-03-12 | 浪潮电子信息产业股份有限公司 | Distributed storage recycle bin data management method and related device |
CN109828962B (en) * | 2018-12-19 | 2022-06-24 | 北京达佳互联信息技术有限公司 | Method, device, server and storage medium for preventing file from being deleted by mistake |
CN110381121B (en) * | 2019-06-26 | 2022-03-22 | 苏州浪潮智能科技有限公司 | Data processing method and device |
CN110888847B (en) * | 2019-12-16 | 2023-04-21 | 新华三技术有限公司成都分公司 | Recycle bin system and file recycling method |
CN111309682B (en) * | 2020-02-06 | 2022-04-19 | 苏州浪潮智能科技有限公司 | Recycle bin file cleaning method and device based on distributed file system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103973731A (en) * | 2013-01-29 | 2014-08-06 | 中兴通讯股份有限公司 | Method and device for managing cloud storage recycle bin |
CN104991934A (en) * | 2015-07-06 | 2015-10-21 | 无锡天脉聚源传媒科技有限公司 | Directory deletion method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9046998B2 (en) * | 2012-09-14 | 2015-06-02 | Empire Technology Development Llc | Cloud-based trash-can |
-
2016
- 2016-10-09 CN CN201610880093.0A patent/CN106354884B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103973731A (en) * | 2013-01-29 | 2014-08-06 | 中兴通讯股份有限公司 | Method and device for managing cloud storage recycle bin |
CN104991934A (en) * | 2015-07-06 | 2015-10-21 | 无锡天脉聚源传媒科技有限公司 | Directory deletion method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106354884A (en) | 2017-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106354884B (en) | Data object deleting method and device based on distributed file system | |
CN107643880B (en) | File data migration method and device based on distributed file system | |
US11455276B2 (en) | Method for processing snapshots and distributed block storage system | |
US10108501B2 (en) | Terminal backup and recovery method | |
CN107733662B (en) | Group recovery method and device | |
EP3474143B1 (en) | Method and apparatus for incremental recovery of data | |
CN105260216A (en) | Method, device and terminal for starting application program | |
CN105224423A (en) | Terminal data backup method and device | |
US20170199889A1 (en) | Method and device for identifying junk picture files | |
CN110851081A (en) | Method and device for safely cleaning storage space and computer readable storage medium | |
CN107924397A (en) | A kind of file editing method and file editor | |
CN111382126A (en) | System and method for deleting files and hindering file recovery | |
CN111382011B (en) | File data access method and device and computer readable storage medium | |
CN103838589A (en) | Plug-in unit deleting and recovering method and client side | |
CN110879764B (en) | Bitmap setting method, device and equipment and readable storage medium | |
CN108459927B (en) | Data backup method and device and server | |
CN107220146B (en) | File scanning recovery method and device | |
CN107704337B (en) | Factory setting restoring method, mobile terminal and device with storage function | |
CN112269679A (en) | Database persistence method, system, equipment and storage medium of cloud platform | |
WO2017067397A1 (en) | Data recovery method and device | |
CN109597721B (en) | Audio data acquisition method, device, equipment and storage medium | |
CN110908610A (en) | Volume recovery station cleaning method, device, equipment and readable storage medium | |
CN107908370B (en) | Data storage method and device | |
CN103645967A (en) | Read-only snapshot rollback method and device | |
CN114281769A (en) | Method and device for managing files on disk, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20191203 Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province Applicant after: Suzhou Wave Intelligent Technology Co., Ltd. Address before: 450018 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601 Applicant before: Zhengzhou Yunhai Information Technology Co. Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |