CN106649495A - Data deletion method and device for application with multiple operated accounts, and mobile terminal - Google Patents

Data deletion method and device for application with multiple operated accounts, and mobile terminal Download PDF

Info

Publication number
CN106649495A
CN106649495A CN201610885226.3A CN201610885226A CN106649495A CN 106649495 A CN106649495 A CN 106649495A CN 201610885226 A CN201610885226 A CN 201610885226A CN 106649495 A CN106649495 A CN 106649495A
Authority
CN
China
Prior art keywords
application
data
user
subdirectory
applications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610885226.3A
Other languages
Chinese (zh)
Other versions
CN106649495B (en
Inventor
林志泳
付亮晶
乔家栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610885226.3A priority Critical patent/CN106649495B/en
Publication of CN106649495A publication Critical patent/CN106649495A/en
Application granted granted Critical
Publication of CN106649495B publication Critical patent/CN106649495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data deletion method and device for an application with multiple operated accounts, and a mobile terminal. The method comprises the following steps of: detecting an operation event for each set of applications with multiple operated accounts in real time, wherein the set of applications with multiple operated accounts comprises a main application and copy applications corresponding to the main application; when a data deletion event of a target application in the set of applications with multiple operated accounts is detected, determining a relevant application of the target application, wherein the relevant application is an application corresponding to the target application in the set of applications with multiple operated accounts; and deleting the target application and target data corresponding to the data deletion event in the relevant application. By use of the method, the problem of being complex in an operation for deleting the data of the application with multiple operated accounts is solved, and the data of the main application and the data of the corresponding copy applications can be conveniently and quickly deleted.

Description

A kind of data-erasure method device and mobile terminal for opening application more
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of data-erasure method device for opening application more and Mobile terminal.
Background technology
With the increasingly maturation of mobile communication technology, mobile terminal, such as smart mobile phone and panel computer have become The necessary article of people's daily lifes.Also, in the application system of smart mobile phone, the use of Android system is than wide.
At present, on market Android system smart mobile phone or panel computer, a usual application program can only start one Example simultaneously runs, however, for certain chat tool or microblogging, user may have multiple accounts, and but cannot log in makes simultaneously With;Or for certain money game, user has multiple accounts, also cannot log in meet the convenient operation such as switching, transaction simultaneously. Thus, smart mobile phone or panel computer are limited to the characteristic of Android system, and user can only open an application under Android system The example of program, when needing to log in another account, can only nullify current account and be cut with reaching in the example of current operation The purpose changed, this just brings many inconvenience.
Therefore, Android fan have studied some can make some application programs realize the methods opened more, for example, based on peace Multi-user's mechanism of tall and erect system, can install under from user and attend to anything else application with certain the main application identical in primary user, Start the same application of each self installation under each user, realize logging in multiple accounts simultaneously.But the data that each account is produced can be deposited Under storing up the application memory path of correspondence user, when user deletes junk data, need to be switched under different users Delete one by one, it is cumbersome.
The content of the invention
In view of this, the purpose of the present invention is to propose to open the data-erasure method device and mobile terminal of application a kind of more, With the data conveniently and efficiently deleted main application and correspond to application of attending to anything else.
For achieving the above object, the present invention is adopted the following technical scheme that:
In a first aspect, embodiments provide a kind of data-erasure method for opening application more, including:
Real-time detection to each Action Events for opening set of applications more, wherein, it is described open set of applications include main application and It is described main using corresponding application of attending to anything else;
When the data deletion event of the intended application opened more in set of applications is detected, the pass of the intended application is determined Connection application, wherein, the associated application opens application corresponding with the intended application in set of applications more for described;
Delete target data corresponding with the data deletion event in the intended application and the associated application.
Second aspect, embodiments provides a kind of data deletion apparatus for opening application more, including:
Action Events detection module, for real-time detection to each Action Events for opening set of applications more, wherein, it is described to open more Set of applications includes main application and described main using corresponding application of attending to anything else;
Associated application determining module, for when the data deletion events for detecting the intended application opened more in set of applications When, determine the associated application of the intended application, wherein, the associated application for it is described open in set of applications with the target Using corresponding application;
Target data removing module, for deleting thing with the data in deleting the intended application and the associated application The corresponding target data of part.
The third aspect, embodiments provides a kind of mobile terminal, it is characterised in that the mobile terminal is integrated with The data deletion apparatus for opening application as described in above-mentioned second aspect more.
During the data deletion event of intended application of the present invention under system active user in detecting to opening application more, lead to The target data for deleting the intended application is crossed, the corresponding number of targets of associated application that just can simultaneously under other each users of deletion system According to, it is not necessary to it is switched under different users and target data is deleted one by one, solve deletion to open application data cumbersome more Problem, can conveniently and efficiently delete main application and correspond to the data of application of attending to anything else.
Description of the drawings
The exemplary embodiment of the present invention will be described in detail by referring to accompanying drawing below, make one of ordinary skill in the art The above-mentioned and other feature and advantage of the present invention are become apparent from, in accompanying drawing:
Fig. 1 is a kind of schematic flow sheet of data-erasure methods for opening application provided in an embodiment of the present invention more;
Fig. 2 is the schematic flow sheet of another kind of data-erasure methods for opening application provided in an embodiment of the present invention more;
Fig. 3 is the structured flowchart of the data deletion apparatus for opening application provided in an embodiment of the present invention more;
Fig. 4 is the structural representation of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Further illustrate technical scheme below in conjunction with the accompanying drawings and by specific embodiment.May be appreciated It is that specific embodiment described herein is used only for explaining the present invention, rather than limitation of the invention.Further need exist for explanation , for the ease of description, part related to the present invention rather than entire infrastructure are illustrate only in accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of data-erasure methods for opening application provided in an embodiment of the present invention more.The method Same the junk data such as the buffered data of each application, refuse messages and spam set of applications is opened suitable for deleting simultaneously more Situation, the method can perform by the data deletion apparatus or mobile terminal for opening application more.The above-mentioned data for opening application more Deleting device can be realized that the device is configured in mobile terminal by the mode of software and/or hardware.
As shown in figure 1, the method for the present embodiment includes:
Step 110, real-time detection to each Action Events for opening set of applications more.
Wherein, open set of applications includes main application and main using corresponding application of attending to anything else more;Action Events are included to opening more Main application in set of applications is carried out attending to anything else establishment event, the on/off thing to opening arbitrary application in set of applications more of application Part, the unloading deletion event to opening arbitrary application in set of applications more and the data to opening arbitrary application in set of applications more are deleted Event etc..
Step 120, when detect open the intended application in set of applications data deletion event when, determine intended application Associated application.
Wherein, associated application is to open application corresponding with intended application in set of applications more.
In the present embodiment, opening the implementation of set of applications can have many kinds more, and the present embodiment is not specifically limited.Example Such as, the application of different editions can be respectively mounted, using a kind of version as main application, using other versions as application of attending to anything else, wherein, Can by decompiling change application installation kit (APK) file, then install amended APK file come realize install different editions Same money application;And for example, can be by opening assistant's software the third party of application simulation user's space and Dynamic loading technique come real more It is existing;For another example, can be realized by changing system mechanism.
Preferably, in the present embodiment to open set of applications based on multi-user's mechanism to realize, wherein multi-user's mechanism is concrete more May include multi-user's mechanism that the operating system in intelligent terminal is supported, such as multi-user's mechanism of Android (Android) system And multi-user's mechanism of mobile phone window (Windows Phone, WP) operating system etc..
Exemplary, the data deletion event of intended application can be that user deletes instruction to the data of intended application, or The data volume of person's target data reaches default storage threshold value.It is exemplary, user's optionally delete target application at any time Data, when mobile terminal detects the instruction of the target data of user's delete target application, determine that the association of intended application should With;Or, the data volume of the target data of the intended application under mobile terminal real-time detection active user, in the number of target data When reaching default storage threshold value according to amount, the associated application of intended application is determined, wherein, default storage threshold value opens application more with each Stable operation and arrange.
In addition, in this enforcement, determining the associated application of intended application may include:
A, the application identities for obtaining intended application.
Wherein, application identities include Apply Names.For distinguish it is different open application, it is main to apply and application of attending to anything else have There is identical Apply Names, while to distinguish main application and application of attending to anything else, identifier can be arranged before Apply Names.For example, Main application is wechat, and Apply Names can be weixin, and now, the Apply Names of an application of attending to anything else can be * weixin.
B, by the corresponding application of application identities with intended application Apply Names, the association for being defined as intended application should With.
Target data corresponding with data deletion event in step 130, delete target application and associated application.
Multi-user mechanism of the present embodiment based on Android system, for user data management, the mobile terminal of the present embodiment Executable following operation:
1. application of attending to anything else can be created under new user's space using management module of attending to anything else, when establishment is attended to anything else and applied, can be existed The path that creates data file is applied under new user path to attend to anything else.
It is exemplary, when create first attend to anything else apply when, application attends to anything else management module by multi-user services UserManagerServcie creates a new user, and based on above-mentioned multi-user's mechanism, new user can automatically distribute userId and be U10, and for its path data/user/u10 that creates data file, for example, if this application is wechat, application is attended to anything else management mould Block can attend to anything else using the path data/user/u10/weixin that creates data file for this, attend to anything else using operationally for preserving Peration data.
2. when user is operated in main application, produced data can be stored in using management module of attending to anything else primary Under the main application path at family;When user operation is attended to anything else applies, using attending to anything else, management module can be stored in produced data Attending to anything else using under path from user.
3. the data of application of attending to anything else can be deleted or modified across user using management module of attending to anything else, to realize to dividing The control of body application data.
It is exemplary, when main application and its attend to anything else need to preserve using the data for having correlation when, application is attended to anything else management module Under the path of application of attending to anything else can be saved the data in;Certain setting is carried out when user is using main application, this data also may be used With by applying management module of attending to anything else by data modification under attending to anything else using path, so as to realize also possessing this in application of attending to anything else Arrange;Using attend to anything else management module can by the data management to main application and application of attending to anything else, when realizing logging in different account, Data under different user in data file path can freely be accessed according to account.
4. when attend to anything else using it is unloaded when, application management module of attending to anything else can attend to anything else this using the data dump under path.
5. application management module of attending to anything else is capable of the change of monitored data file, and such as data increase, delete and change behaviour Make, and these operations are responded.
Exemplary, when main application has data to change, through judging needs synchronization using management module of attending to anything else Attend to anything else to apply and also respective change is made to data.
In the step of the present embodiment 130, target data can be the rubbish number such as data cached, refuse messages and spam According to.The target data of intended application deletion is listened to according to data deletion event, application attends to anything else management module according under each user The path of associated application, deletes the corresponding target data of associated application.
The data-erasure method for opening application provided in an embodiment of the present invention, is detecting to opening the mesh in set of applications more more During the data deletion event of mark application, by the target data for deleting the intended application, associated application correspondence just can be simultaneously deleted Target data, it is not necessary to be switched under different users and target data deleted one by one, solve that deletion opens application datas behaviour more Make loaded down with trivial details problem, can conveniently and efficiently delete main application and correspond to the data of application of attending to anything else.
Fig. 2 is the schematic flow sheet of another kind of data-erasure methods for opening application provided in an embodiment of the present invention more.This reality Example is applied on the basis of above-described embodiment, the store path of goal-selling data, and by the application of step delete target with associate should Target data corresponding with data deletion event is optimized for in:According to default cache file subdirectory, refuse messages specific item The priority with spam subdirectory is recorded, according to priority order from high to low deletes the target data under subdirectory;When deleting After except the target data under arbitrary subdirectory, ask whether to continue delete target data.Thus, preferential deletion takes memory space Junk data maximum or that usage frequency is 0.
Specifically, as shown in Fig. 2 the data-erasure methods for opening application of the present embodiment comprise the steps more:
Step 210, real-time detection to each Action Events for opening set of applications more.
Step 220, when detect open the intended application in set of applications data deletion event when, determine intended application Associated application.
Wherein, open set of applications to realize based on multi-user's mechanism more, including main application and with main using corresponding all Attend to anything else application.
Specifically, open set of applications to realize may include following content based on multi-user's mechanism more:Main application is installed on master Under user, attend to anything else using being installed on under user, comprising for attending to anything else using the access port for being operated in primary user.
In one embodiment, multi-user's realization mechanism of the application includes following logic:
1. multi-user management
A) system default has a primary user, and primary user can create other multiple new users (from user), it is possible to Delete and manage them;
B) domestic consumer (non-master user) and Guest User, can be collectively referred to as from user;
C) it is 0 to give tacit consent to primary user id (identity, Identification), and other Add User id from the beginning of 10, by Individual increase;
When d) switching user, a series of changing interfaces such as desktop can be reloaded;
E) primary user can limit whether other users can take the authority such as phone and transmitting-receiving note.
For multi-user management, can by primary user to being managed from user, including the establishment from user, delete and Priority assignation etc., ID is arranged from the beginning of primary user, is increased newly when switching between ID laminated structure, each user, and it is right to reload A series of interfaces such as the desktop using family.
2. multi-user's peace loading, unloading application
A) application of default installation, can be installed to all users that oneself creates, all visible application on other user's desktops Icon;
B) application installed by file management in primary user, will not be installed to other users, on other user's desktops Invisible application icon;
C) system may specify userid (User Identity) when loading, unloading application is pacified, it is intended that application is installed to certain Specified user, or unload the application in certain specified user.All users can also all be installed with application, or unloading application.
For multi-user pacifies loading, unloading application, the application of default installation can be installed to all users for having created (including master User and from user), and generate application icon on each user's desktop;And by answering that file management is installed under primary user With, under being mounted only to primary user, application icon is generated in primary user's desktop, it is not installed under user;Using installation/unloading Also user can be specified based on user, user is specified by specifying User Identity in primary user and from user Using installation/be discharged under certain user, certain user or all users carry out.
3. user data management
A) related to system data user's id catalogues:The corresponding various system data storages of user are housed, for example:Table Face widget (component) list, arranges database, and default application starts strategy etc..
B) related to application packet data user's id catalogues:The application bag catalogue that user's correspondence is installed is housed, if should Data are generated with operation, then application data also deposits in this catalogue.
C) system SD card (Secure Digital Memory Card, safe digital card) catalogue:Each user sees certainly Oneself sdcard catalogues are all different, can only see the sdcard catalogues of oneself.
For user data management, under multi-user's realization mechanism, system data and application-dependent data point under each user Under not depositing in different data storage paths, e.g., various system datas deposit in the first data storage specified under certain user Under path, and application data these application-dependent datas that the application bag catalogue and application operating installed is produced deposit in what is specified Under second data storage path;Data storage is separate under each user, and each user can only check the data storage of itself, such as certainly The sdcard catalogues of body.
4. user authority management
A) apply after installation, using the various authorities applied (for example:Read storage catalogue authority, read-write note power Limit, opens camera authority etc.), can be divided into two parts, a part of insensitive authority, when application is installed, system is directly allowed Using acquisition authority;A part for example reads and writes note authority than more sensitive dangerous authority, can be when application is used, and system is carried Show whether user is allowed using acquisition authority.
B) system, in different users, is independent and isolated, the base that an application is obtained to the authority of same application This insensitive authority, after mounting, directly obtains in each user, and part is than more sensitive dangerous authority Independent.For example:When user 0 opens wechat, if obtaining read-write note authority, when being switched to user 10, beat for the first time When opening wechat, system still can prompt the user whether to allow, and will not remind because wechat obtains authority in user 0.Together Reason, it is same in other users.
For user authority management, when under a certain user using installing, insensitive authority can directly obtain permission, sensitivity power Limit needs Jing user's license to obtain;It is independent and isolated mutually to the authority configuration of same application under different users, in user During switching, for the sensitive permission of the application for using for the first time, it is both needed to point out whether user assigns power.
In one embodiment, the process opened set of applications more and realized based on multi-user's mechanism can be described as follows:
Assume intelligent terminal default user be primary user, user under primary user by from using shop download or from The modes such as other source copies will be stored in intelligent terminal using the installation kit of ABC (package, APK) file such as ABC.apk In, system is installed after ABC.apk under primary user, and primary user's desktop can generate the icon of a main application ABC.When in primary user Under detect for main application ABC attend to anything else request to create when, (if there is currently no from user, one can created from user Individual from user, the establishment process is completed in the case where user cannot discover, and without user account and password are arranged) under ABC.apk is installed and obtains application of attending to anything else, in order to main application and attend to anything else using being distinguish between, can be it is new install attend to anything else to apply and add Plus a mark (being assumed to be *), application of attending to anything else can be designated as ABC*.After ABC* installs success, may specify " installing successfully " Notice (in the notice also addition mark *) be sent to the desktop reception under primary user, primary user to the notice after, generation one It is individual with mark * icon, made a distinction with the icon with main application ABC, the icon can as in primary user to application of attending to anything else The access port for being operated, after the icon is clicked, system starts specified ABC* under from user, phase corresponding with ABC* Put Cheng Ye into run under user, and under the human-computer interaction interface (abbreviation interface) of ABC* is shown in into primary user, now The interface of ABC* also can apply the access port for being operated as in primary user to attending to anything else.
For application of attending to anything else, the existence form of its access port in primary user can be diversified, this reality Apply example to be not specifically limited, for example, it may be the desktop icons comprising application identities, the application identities should will currently attend to anything else With with it is main application and other application divisions of attending to anything else come;Can also be the application identities being additional on main application icon;May be used also Be with floating window form exist the icon comprising application identities;Can also be the project for being present in the positions such as notice center.
Intelligent terminal user is capable of achieving the operation to main application in primary user, while can also be in primary user by accessing Mouth is applied to attending to anything else accordingly and operated.It is understood that same main application can correspond to multiple applications of attending to anything else, each point Body application be installed in one it is different from user, make respectively to attend to anything else using being separately operable in different from user, in fortune It does not interfere with each other during row.
Realize that open application is advantageous in that more based on multi-user's mechanism, for assistant's software is opened compared to third party more, Avoid third party software advertisement and steal the generation of the behaviors such as privacy of user data, security is higher;Compare and application Main body and application are attended to anything else for the scheme run under same user, are reduced different application under same user and are attended to anything else or application master Process interference between body, and avoid the generation of afunction phenomenon that complicated running environment brought.
Step 230, according to the preferential of default cache file subdirectory, refuse messages subdirectory and spam subdirectory Grade, according to priority order from high to low deletes the target data under subdirectory.
In the present embodiment, the target data of intended application and associated application is stored respectively in presetting under respective store path In file directory, wherein, default file catalogue may include cache file subdirectory, refuse messages subdirectory and spam specific item Record, cache file subdirectory is used for memory buffers data, and refuse messages subdirectory is used to store refuse messages, spam specific item Employ in storage spam.
When system memory space is not enough, target data can be deleted.Exemplary, above-mentioned each subdirectory can be set Priority, high priority data in the high subdirectory of priority deletes, if to the further classification of file under subdirectory, can also be right Sorted file arranges priority.For example cache file subdirectory may include video file, audio file and picture file, can Priority, such as video file highest priority are arranged according to the size of file, picture file priority is minimum, delete slow preferential When depositing the data in file subdirectory, the data in video file are first deleted.The present embodiment can also be according to the usage frequency of data The priority of subdirectory is set, is that the corresponding subdirectory of data that usage frequency is 0 (such as refuse messages or spam) is arranged Limit priority.
Step 240, after target data under deleting arbitrary subdirectory, ask whether to continue delete target data.
On the basis of above-mentioned technical proposal, the target data under a subdirectory is often deleted, mobile terminal can inquire use Whether family continues delete target data, and user can select yes/no according to the size of residual memory space, if user's selection is, Mobile terminal order still according to priority from high to low continues to delete the target data in next subdirectory.Thus, moving In the case that terminal residual space is enough, some users can be retained and want or feel also available data.
The data-erasure method for opening application provided in an embodiment of the present invention, is set more by the subdirectory to storing target data Priority is put, in delete target data, the target data in subdirectory is deleted by subdirectory priority order from high to low, The junk data for taking that memory space is maximum or usage frequency is 0 can be preferentially deleted, while enough in mobile terminal remaining space In the case of, some users can be retained and want or feel also available data.
Fig. 3 is the structured flowchart of the data deletion apparatus for opening application provided in an embodiment of the present invention more.As shown in figure 3, should Device includes:Associated application determining module 31 and target data removing module 32.
Wherein, Action Events detection module 31, for real-time detection to each Action Events for opening set of applications more, wherein, Set of applications is opened described includes main application and described main using corresponding application of attending to anything else more;Associated application determining module 32 is used to work as When detecting the data deletion event of the intended application opened more in set of applications, the associated application of intended application is determined, wherein, it is many Opening set of applications includes main application and main using corresponding application of attending to anything else, associated application be open more in set of applications with intended application Corresponding application;Target data removing module 33 is used for corresponding with data deletion event in delete target application and associated application Target data.
In above-mentioned technical proposal, the data deletion event of intended application includes that user is deleted the data of intended application and refers to Order;Or, the data volume of target data reaches default storage threshold value.
Based on above-mentioned technical proposal, associated application determining module 32 includes:
Application identities acquiring unit, for obtaining the application identities of intended application, wherein, application identities include application name Claim;
Associated application determining unit, for by the corresponding application of application identities with intended application Apply Names, it is determined that For the associated application of intended application.
In the present embodiment, the target data of intended application and associated application is stored respectively in presetting under respective store path In file directory;
Wherein, default file catalogue may include cache file subdirectory, refuse messages subdirectory and spam subdirectory.
Based on above-mentioned technical proposal, target data removing module 33 includes:
Target data deletes unit, for according to default cache file subdirectory, refuse messages subdirectory and rubbish postal The priority of part subdirectory, according to priority order from high to low delete the target data under subdirectory;
Inquiry unit is deleted, for when the target data under deleting arbitrary subdirectory after, asking whether continuation delete target Data.
Preferably, the present embodiment open set of applications based on multi-user's mechanism to realize more.Specifically, main application is installed on Under primary user, application of attending to anything else is installed on under user, is included in the primary user for attending to anything else what application was operated to described Access port.
The data deletion apparatus for opening application that the present embodiment is provided, open provided with any embodiment of the present invention should more more Data-erasure method belongs to same inventive concept, can perform the data for opening application that any embodiment of the present invention is provided more Delet method, possesses corresponding function and beneficial effect.Ins and outs of detailed description in the present embodiment, not can be found in this The data-erasure methods for opening application that bright any embodiment is provided more.
The embodiment of the present invention additionally provides a kind of mobile terminal, including the data for opening application provided in an embodiment of the present invention more Delete device.The mobile terminal can pass through the data deletion apparatus for opening application that the present invention is provided more, should using corresponding open more Data-erasure method deletes same buffered data, refuse messages and the spam opened more and respectively applied in set of applications simultaneously Deng junk data.
Wherein, mobile terminal can be smart mobile phone, panel computer or personal digital assistant etc..
Fig. 4 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention, as shown in figure 4, the mobile terminal 400 can include:Memory 401, central processing unit (Central Processing Unit, CPU) 402, Peripheral Interface 403, RF (Radio Frequency, radio frequency) circuit 405, voicefrequency circuit 406, loudspeaker 411, power management chip 408, input/defeated Go out (I/O) subsystem 409, touch-screen 412, other input/control devicess 410 and outside port 404, these parts pass through one Individual or multiple communication bus or holding wire 407 are communicating.
It should be understood that diagram mobile terminal 400 is only an example of mobile terminal, and mobile terminal 400 Can have than the more or less part shown in figure, can combine two or more parts, or can be with Configure with different parts.Various parts shown in figure can be including one or more signal transactings and/or special Integrated circuit is realized in the combination of interior hardware, software or hardware and software.
The mobile terminal for controlling application process for providing with regard to the present embodiment below is described in detail, the movement end End is by taking smart mobile phone as an example.
Memory 401, memory 401 can be accessed by CPU402, Peripheral Interface 403 etc., and memory 401 can include height Fast random access memory, can also include nonvolatile memory, such as one or more disk memories, flash memories Part or other volatile solid-state parts.
The input of equipment and output peripheral hardware can be connected to CPU402 and memory by Peripheral Interface 403, Peripheral Interface 403 401。
I/O subsystems 409, I/O subsystems 409 can by the input/output peripheral on equipment, for example touch-screen 412 and its His input/control devices 410, is connected to Peripheral Interface 403.I/O subsystems 409 can include display controller 4091 and be used for Control one or more input controllers 4092 of other input/control devicess 410.Wherein, one or more input controllers 4092 receive electric signal or send electric signal to other input/control devicess 410 from other input/control devicess 410, other Input/control devices 410 can include physical button (pressing button, rocker buttons etc.), dial, slide switch, control stick, Click on roller.What deserves to be explained is, input controller 4092 can with it is following any one be connected:Keyboard, infrared port, USB connect The instruction equipment of mouth and such as mouse.
Touch-screen 412, touch-screen 412 is the input interface and output interface between user terminal and user, will be visual defeated Go out to be shown to user, visual output can include figure, text, icon, video etc..
Display controller 4091 in I/O subsystems 409 receives electric signal or to touch-screen 412 from touch-screen 412 Electric signals.Contact on the detection touch-screen of touch-screen 412, display controller 4091 is converted to the contact for detecting and display The interaction of the user interface object on touch-screen 412, that is, realize man-machine interaction, the user interface being displayed on touch-screen 412 Object can be the icon of running game, be networked to icon of corresponding network etc..What deserves to be explained is, equipment can also include light Mouse, light mouse is not show the visual touch sensitive surface for exporting, or the extension of the touch sensitive surface formed by touch-screen.
RF circuits 405, are mainly used in setting up the communication of mobile phone and wireless network (i.e. network side), realize mobile phone and wireless network The data receiver of network and transmission.For example receive and dispatch short message, Email etc..Specifically, RF circuits 405 receive and send RF letters Number, RF signals are also referred to as electromagnetic signal, and RF circuits 405 convert electrical signals to electromagnetic signal or electromagnetic signal is converted to into telecommunications Number, and communicated with communication network and other equipment by the electromagnetic signal.RF circuits 405 can be included for performing The known circuit of these functions, its include but is not limited to antenna system, RF transceivers, one or more amplifiers, tuner, one Individual or multiple oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, ID mould Block (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 406, is mainly used in receiving voice data from Peripheral Interface 403, and the voice data is converted to into telecommunications Number, and the electric signal is sent to into loudspeaker 411.
Loudspeaker 411, for the voice signal for receiving mobile phone from wireless network by RF circuits 405, is reduced to sound And play the sound to user.
Power management chip 408, the hardware for being connected by CPU402, I/O subsystem and Peripheral Interface 403 is supplied Electricity and power management.
The executable following operations of CPU402 provided in an embodiment of the present invention:
Real-time detection to each Action Events for opening set of applications more, wherein, it is described open set of applications include main application and It is described main using corresponding application of attending to anything else;
When the data deletion event of the intended application opened more in set of applications is detected, determine that the association of intended application should With, wherein, associated application is to open application corresponding with intended application in set of applications more;
Target data corresponding with data deletion event in delete target application and associated application.
Wherein, main application is arranged under primary user, is attended to anything else using installed in under user.
The mobile terminal that the present embodiment is provided, including the data deletion dresses for opening application that the embodiment of the present invention is provided more Put, possess corresponding function and beneficial effect.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although the present invention is carried out by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also More other Equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (15)

1. a kind of data-erasure method for opening application, it is characterised in that include more:
Real-time detection to each Action Events for opening set of applications more, wherein, the set of applications of opening include main application and described more It is main using corresponding application of attending to anything else;
When the data deletion event of the intended application opened more in set of applications is detected, determine that the association of the intended application should With, wherein, the associated application opens application corresponding with the intended application in set of applications more for described;
Delete target data corresponding with the data deletion event in the intended application and the associated application.
2. method according to claim 1, it is characterised in that the data deletion event of the intended application includes:
User deletes instruction to the data of the intended application;Or,
The data volume of the target data reaches default storage threshold value.
3. method according to claim 1, it is characterised in that the associated application of the determination intended application, including:
The application identities of the intended application are obtained, wherein, application identities include Apply Names;
By the corresponding application of application identities with the intended application Apply Names, the association for being defined as the intended application should With.
4. method according to claim 1, it is characterised in that the target data of the intended application and the associated application It is stored respectively in the default file catalogue under respective store path;
The default file catalogue includes cache file subdirectory, refuse messages subdirectory and spam subdirectory.
5. method according to claim 4, it is characterised in that in the deletion intended application and the associated application Target data corresponding with the data deletion event, including:
According to the priority of default cache file subdirectory, refuse messages subdirectory and spam subdirectory, according to priority Order from high to low deletes the target data under subdirectory;
After target data under deleting arbitrary subdirectory, ask whether to continue delete target data.
6. the method according to any one of claim 1-5, it is characterised in that the set of applications of opening based on multi-user's machine more Make to realize.
7. method according to claim 6, it is characterised in that the set of applications of opening carry out reality more based on multi-user's mechanism It is existing, including:
Main application is installed under primary user, is attended to anything else using being installed on under user, comprising for described point in the primary user The access port that body application is operated.
8. a kind of data deletion apparatus for opening application, it is characterised in that include more:
Action Events detection module, for real-time detection to each Action Events for opening set of applications more, wherein, it is described to open application more Set includes main application and described main using corresponding application of attending to anything else;
Associated application determining module, for when detect open the intended application in set of applications data deletion event when, really The associated application of the fixed intended application, wherein, the associated application for it is described open in set of applications with the intended application Corresponding application;
Target data removing module, in deleting the intended application and the associated application with the data deletion event pair The target data answered.
9. device according to claim 8, it is characterised in that the data deletion event of the intended application includes:
User deletes instruction to the data of the intended application;Or,
The data volume of the target data reaches default storage threshold value.
10. device according to claim 8, it is characterised in that the associated application determining module includes:
Application identities acquiring unit, for obtaining the application identities of the intended application, wherein, application identities include application name Claim;
Associated application determining unit, for by the corresponding application of application identities with the intended application Apply Names, it is determined that For the associated application of the intended application.
11. devices according to claim 8, it is characterised in that the number of targets of the intended application and the associated application According in the default file catalogue being stored respectively under respective store path;
The default file catalogue includes cache file subdirectory, refuse messages subdirectory and spam subdirectory.
12. devices according to claim 11, it is characterised in that the target data removing module includes:
Target data deletes unit, for according to default cache file subdirectory, refuse messages subdirectory and spam The priority of catalogue, according to priority order from high to low delete the target data under subdirectory;
Inquiry unit is deleted, for when the target data under deleting arbitrary subdirectory after, asking whether continuation delete target data.
13. devices according to any one of claim 8-12, it is characterised in that the set of applications of opening based on multi-user more Mechanism is realizing.
14. devices according to claim 13, it is characterised in that the set of applications of opening are based on multi-user's mechanism come real more It is existing, including:
Main application is installed under primary user, is attended to anything else using being installed on under user, comprising for described point in the primary user The access port that body application is operated.
15. a kind of mobile terminals, it is characterised in that the mobile terminal is integrated with many as described in any one of claim 8-14 Open the data administrator of application.
CN201610885226.3A 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more Active CN106649495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610885226.3A CN106649495B (en) 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610885226.3A CN106649495B (en) 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more

Publications (2)

Publication Number Publication Date
CN106649495A true CN106649495A (en) 2017-05-10
CN106649495B CN106649495B (en) 2019-10-15

Family

ID=58854861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610885226.3A Active CN106649495B (en) 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more

Country Status (1)

Country Link
CN (1) CN106649495B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110109869A (en) * 2018-01-22 2019-08-09 上海鹰信智能技术有限公司 A method of be quickly located by connecting device's document
CN111159734A (en) * 2019-12-20 2020-05-15 青岛海信移动通信技术股份有限公司 Communication terminal and multi-application data inter-access processing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8838574B2 (en) * 2006-06-09 2014-09-16 International Business Machines Corporation Autonomic index creation, modification and deletion
CN104699773A (en) * 2015-03-05 2015-06-10 北京畅游天下网络技术有限公司 Application software management method and device
CN104793978A (en) * 2015-05-08 2015-07-22 宁波萨瑞通讯有限公司 Application management system and method
CN105791581A (en) * 2016-03-25 2016-07-20 努比亚技术有限公司 Application operation method and device and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8838574B2 (en) * 2006-06-09 2014-09-16 International Business Machines Corporation Autonomic index creation, modification and deletion
CN104699773A (en) * 2015-03-05 2015-06-10 北京畅游天下网络技术有限公司 Application software management method and device
CN104793978A (en) * 2015-05-08 2015-07-22 宁波萨瑞通讯有限公司 Application management system and method
CN105791581A (en) * 2016-03-25 2016-07-20 努比亚技术有限公司 Application operation method and device and mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SMALL_ROLE: "android 5.0 创建多用户 双开多开应用(2)", 《HTTPS://BLOG.CSDN.NET/SMALL_ROLE/ARTICLE/DETAILS/51745307》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110109869A (en) * 2018-01-22 2019-08-09 上海鹰信智能技术有限公司 A method of be quickly located by connecting device's document
CN110109869B (en) * 2018-01-22 2021-01-12 上海鹰信智能技术有限公司 Method for quickly positioning document of connecting equipment
CN111159734A (en) * 2019-12-20 2020-05-15 青岛海信移动通信技术股份有限公司 Communication terminal and multi-application data inter-access processing method

Also Published As

Publication number Publication date
CN106649495B (en) 2019-10-15

Similar Documents

Publication Publication Date Title
CN106357921B (en) A kind of data sharing method of application, device and mobile terminal
CN106445647B (en) Open the data manipulation method, device and mobile terminal of application more
CN106484547A (en) A kind of management method, device and terminal for opening application more
CN106445671B (en) A kind of management method of application program, device and terminal
CN107729764A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN106650324A (en) Application program authority management method and device and mobile terminal
CN107026933A (en) A kind of information management method, device and intelligent terminal for opening application more
CN106484479A (en) A kind of management method, device and intelligent terminal for opening application more
CN106485136A (en) The authority configuring method of application program, device and mobile terminal
CN106648736A (en) Application control method and device and mobile terminal
CN106445706B (en) Open the data transmission method, device and mobile terminal of application more
CN106648737A (en) Application control method and device, and mobile terminal
CN106487789A (en) A kind of method of the password of modification application account, device and mobile terminal
CN106484419A (en) Information searching method, device and mobile terminal in a kind of application program
CN106383672B (en) A kind of data-erasure method, device and mobile terminal for opening application more
CN106484517A (en) A kind of changing method, device and intelligent terminal for opening application more
CN106445670B (en) A kind of data managing method, device and mobile terminal for opening application more
CN106484514A (en) A kind of operation management method, device and intelligent terminal for opening application more
CN106502732A (en) A kind of method for closing of application program, device and intelligent terminal
CN106648962B (en) A kind of management method, device and intelligent terminal for opening application more
CN106649495A (en) Data deletion method and device for application with multiple operated accounts, and mobile terminal
CN106648459B (en) A kind of data managing method of application, device and mobile terminal
CN106648738A (en) Copy application management method and device, and terminal
CN106650403A (en) Permission management method and device of application with multiple operated accounts, and intelligent terminal
CN106648908A (en) Control method, device of application progress and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant