CN106649495B - A kind of data-erasure method device and mobile terminal for opening application more - Google Patents

A kind of data-erasure method device and mobile terminal for opening application more Download PDF

Info

Publication number
CN106649495B
CN106649495B CN201610885226.3A CN201610885226A CN106649495B CN 106649495 B CN106649495 B CN 106649495B CN 201610885226 A CN201610885226 A CN 201610885226A CN 106649495 B CN106649495 B CN 106649495B
Authority
CN
China
Prior art keywords
application
data
target
subdirectory
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610885226.3A
Other languages
Chinese (zh)
Other versions
CN106649495A (en
Inventor
林志泳
付亮晶
乔家栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610885226.3A priority Critical patent/CN106649495B/en
Publication of CN106649495A publication Critical patent/CN106649495A/en
Application granted granted Critical
Publication of CN106649495B publication Critical patent/CN106649495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses data-erasure methods, device and mobile terminal that one kind opens application more, wherein method includes: real-time detection to each action events for opening set of applications more, wherein, the set of applications of opening includes main application and the corresponding application of attending to anything else of the main application more;When detecting the data deletion event for more opening the target application in set of applications, the associated application of the target application is determined, wherein the associated application opens application corresponding with the target application in set of applications to be described more;Delete target data corresponding with the data deletion event in the target application and the associated application.The present invention solve the problems, such as to delete open cumbersome using data manipulation, can conveniently and efficiently delete the data of main application and corresponding application of attending to anything else.

Description

Data deletion method and device for multi-open application and mobile terminal
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a data deleting method and device for multi-open application and a mobile terminal.
Background
With the more and more mature mobile communication technology, mobile terminals, such as smart phones and tablet computers, have become necessary for people's daily life. In addition, in an application system of the smart phone, an android system is widely used.
At present, in a smart phone or a tablet computer of an android system in the market, usually, one application program can only start one instance and run, however, for a certain chat tool or a microblog, a user may have multiple accounts and cannot log in and use at the same time; or for a certain game, the user has a plurality of account numbers, and can not log in at the same time to meet the convenient operation of switching, trading and the like. Therefore, the smart phone or the tablet computer is limited by the characteristics of the android system, a user can only open an instance of an application program under the android system, and when another account needs to be logged in, the user can only log out the current account in the currently running instance to achieve the purpose of switching, which brings great inconvenience.
Therefore, android fans have studied methods for enabling some application programs to be opened more, for example, a multi-user mechanism based on an android system can install the same individual application as a certain primary application in a master user under a slave user, start the same application installed under each user, and realize simultaneous login of multiple accounts. However, data generated by each account can be stored in an application storage path of a corresponding user, and when the user deletes junk data, the junk data need to be deleted one by switching to different users, which is tedious in operation.
Disclosure of Invention
In view of this, the present invention provides a data deleting method and apparatus for multiple applications, and a mobile terminal, so as to conveniently and quickly delete data of a main application and a corresponding split application.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, an embodiment of the present invention provides a method for deleting data of multiple applications, where the method includes:
detecting operation events of each multi-open application set in real time, wherein the multi-open application set comprises a main application and a body-splitting application corresponding to the main application;
when a data deletion event of a target application in an open-loop application set is detected, determining a related application of the target application, wherein the related application is an application corresponding to the target application in the open-loop application set;
and deleting the target data corresponding to the data deletion event in the target application and the associated application.
In a second aspect, an embodiment of the present invention provides a data deleting device for multiple applications, including:
the system comprises an operation event detection module, a multi-open application collection and a multi-open application collection processing module, wherein the operation event detection module is used for detecting operation events of each multi-open application collection in real time, and the multi-open application collection comprises a main application and an individual application corresponding to the main application;
the system comprises a related application determining module, a data deleting module and a data deleting module, wherein the related application determining module is used for determining related applications of a target application in a multi-open application set when a data deleting event of the target application is detected, and the related applications are applications corresponding to the target application in the multi-open application set;
and the target data deleting module is used for deleting the target data corresponding to the data deleting event in the target application and the associated application.
In a third aspect, an embodiment of the present invention provides a mobile terminal, where the mobile terminal is integrated with a data deleting device for multiple applications as described in the second aspect.
When a data deletion event of a target application of a current user of the system in the multi-open application is detected, the target data of the target application is deleted, so that the target data corresponding to the associated applications of other users of the system can be deleted at the same time, the target data are not required to be deleted one by switching to different users, the problem of complex operation of deleting the multi-open application data is solved, and the data of the main application and the corresponding personal application can be conveniently and quickly deleted.
Drawings
The above and other features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 is a schematic flowchart of a data deletion method for multiple applications according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another data deletion method for multiple applications according to an embodiment of the present invention;
fig. 3 is a block diagram of a data deleting apparatus for multiple applications according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Fig. 1 is a schematic flowchart of a data deletion method for multiple applications according to an embodiment of the present invention. The method is suitable for the condition of simultaneously deleting the junk data such as the buffer data, the junk short messages, the junk mails and the like of each application in the same multi-open application set, and can be executed by a data deleting device or a mobile terminal of the multi-open application. The data deleting device for the multi-open application can be implemented by software and/or hardware, and the device can be configured in a mobile terminal.
As shown in fig. 1, the method of the present embodiment includes:
and 110, detecting operation events of each multi-open application set in real time.
The multi-open application set comprises a main application and a split application corresponding to the main application; the operation events comprise creation events of split applications of the main application in the multi-open application set, starting/closing events of any application in the multi-open application set, unloading deletion events of any application in the multi-open application set, data deletion events of any application in the multi-open application set and the like.
And step 120, when a data deletion event of the target application in the multi-open application set is detected, determining the associated application of the target application.
The related application is an application corresponding to the target application in the multi-open application set.
In this embodiment, the implementation manner of the multi-open application set may be various, and this embodiment is not particularly limited. For example, applications of different versions can be installed respectively, one version is used as a main application, and other versions are used as separate applications, wherein installation of the same application of different versions can be realized by decompiling and modifying an installation package (APK) file of the application and then installing the modified APK file; for another example, the method can be realized by applying third-party multi-open helper software for simulating user space and dynamically loading technology; as another example, this may be accomplished by modifying the system mechanism.
Preferably, the multiple application sets in this embodiment are implemented based on a multi-user mechanism, where the multi-user mechanism may specifically include a multi-user mechanism supported by an operating system in the intelligent terminal, such as a multi-user mechanism of an Android (Android) system and a multi-user mechanism of a Windows (WP) operating system of a mobile Phone.
For example, the data deletion event of the target application may be a data deletion instruction of the target application by a user, or the data amount of the target data reaches a preset storage threshold. Illustratively, a user can selectively delete data of a target application at any time, and when the mobile terminal detects an instruction of the user to delete the target data of the target application, the mobile terminal determines the associated application of the target application; or the mobile terminal detects the data volume of the target data of the target application of the current user in real time, and determines the associated application of the target application when the data volume of the target data reaches a preset storage threshold value, wherein the preset storage threshold value is set by stable operation of each multi-open application.
In addition, in this implementation, determining the associated application of the target application may include:
A. and acquiring the application identification of the target application.
Wherein the application identification comprises an application name. To distinguish different multi-divided applications, the main application and the divided applications may have the same application name, while to distinguish the main application and the divided applications, an identifier may be set in front of the application name. For example, the main application is WeChat, the application name may be weixin, and in this case, the application name of a separate application may be weixin.
B. And determining the application corresponding to the application identifier with the target application name as the associated application of the target application.
And step 130, deleting the target data corresponding to the data deletion event in the target application and the associated application.
In this embodiment, based on a multi-user mechanism of the android system, for user data management, the mobile terminal of this embodiment may perform the following operations:
1. the application body-separating management module can create body-separating application in the new user space, and when the body-separating application is created, a data file path can be created for the body-separating application in the new user path.
Illustratively, when a first avatar application is created, the application avatar management module creates a new user through the multi-user service usermanagervice, based on the multi-user mechanism, the new user will automatically assign userId as u10 and create a data file path data/user/u10 for the new user, for example, if the application is WeChat, the application avatar management module will create a data file path data/user/u10/weixin for the avatar application, so as to save the operation data of the avatar application during operation.
2. When a user operates in the main application, the application self-identification management module stores the generated data in the main application path of the main user; when the user operates the self-body application, the application self-body management module stores the generated data under the self-body application path of the user.
3. The application body-separating management module can delete or modify the data of the body-separating application across users so as to control the body-separating application data.
For example, when the main application and the self-body-splitting application thereof have related data to be stored, the application self-body-splitting management module may store the data under the path of the self-body-splitting application; when the user uses the main application, a certain setting is carried out, and the data can be modified to the position under the split application path through the application split management module, so that the setting is also realized in the split application; the application body-separating management module can realize freely accessing data in data file paths of different users according to the account when logging in different accounts through data management of the main application and the body-separating application.
4. When the body-divided application is unloaded, the application body-divided management module can clear data under the body-divided application path.
5. The application self-body management module can monitor the change of the data file, such as the addition, deletion and modification of data and respond to the operation.
Illustratively, when the data of the main application changes, the application-based management module determines that the application-based application needing synchronization also needs to make corresponding changes to the data.
In step 130 of this embodiment, the target data may be cache data, spam messages, spam mails, and other spam data. And monitoring target data deleted by the target application according to the data deletion event, and deleting the target data corresponding to the associated application by the application self-body-distinguishing management module according to the path of the associated application under each user.
According to the data deleting method for the multi-open application, when a data deleting event for the target application in the multi-open application set is detected, the target data corresponding to the associated application can be deleted at the same time by deleting the target data of the target application, the target data are not required to be deleted one by switching to different users, the problem of complex operation of deleting the multi-open application data is solved, and data of a main application and data of corresponding individual applications can be deleted conveniently and quickly.
Fig. 2 is a schematic flowchart of another data deletion method for multiple applications according to an embodiment of the present invention. In this embodiment, on the basis of the above embodiment, a storage path of target data is preset, and target data corresponding to a data deletion event in the step deletion target application and the associated application is optimized as follows: deleting target data in the subdirectory from high to low according to the priority of the preset cache file subdirectory, the preset spam message subdirectory and the preset spam mail subdirectory; and after the target data in any subdirectory is deleted, inquiring whether to continuously delete the target data. Therefore, the garbage data occupying the largest storage space or having the use frequency of 0 is preferentially deleted.
Specifically, as shown in fig. 2, the method for deleting data of multiple applications in this embodiment includes the following steps:
and step 210, detecting the operation event of each multi-open application set in real time.
And step 220, when a data deletion event of the target application in the multi-open application set is detected, determining the associated application of the target application.
The multi-open application set is realized based on a multi-user mechanism and comprises a main application and all the split applications corresponding to the main application.
Specifically, the implementation of the multiple open application set based on the multi-user mechanism may include the following: the main application is installed under a main user, the body-separated application is installed under a slave user, and the main user comprises an access port for operating the body-separated application.
In one embodiment, the multi-user implementation mechanism of the present application includes the following logic:
1. multi-user management
a) The system defaults to have a master user, and the master user can create other new users (slave users) and delete and manage the new users;
b) common users (non-master users) and guest users, which may be collectively referred to as slave users;
c) the default master user id (identity Identification) is 0, and other newly added user ids are increased one by one from 10;
d) when the user is switched, a series of interface switching such as desktop reloading and the like can be realized;
e) the master user can limit the authorities of other users whether to be capable of making and receiving calls, short messages and the like.
For multi-user management, the slave users can be managed through the master user, the slave users comprise creation, deletion, authority setting and the like of the slave users, ID setting starts from the master user, the IDs of the new slave users are added in sequence and overlapped, and a series of interfaces such as desktops of the corresponding users are reloaded when the users are switched.
2. Multi-user installation, uninstallation applications
a) The default installed application can be installed to all created users, and application icons can be seen on desktops of other users;
b) the application installed in the master user is managed through the file, the application cannot be installed to other users, and the application icons cannot be seen on desktops of other users;
c) the system can specify userid (user identity) when installing and uninstalling the application, specify the application to be installed to a specified user, or uninstall the application at a specified user. Applications may also be installed for all users, or uninstalled.
For multi-user installation and uninstallation of applications, the default installed applications are installed to all the created users (including a master user and a slave user), and application icons are generated on desktops of the users; the application installed through file management under the master user is only installed under the master user, and an application icon is generated on the desktop of the master user and is not installed under the slave user; the installation/uninstallation of an application may also be based on a user's designation of a user, who designates the installation/uninstallation of an application under a certain user, some users or all users, among the master user and the slave users by designating the user identities.
3. User data management
a) User id directory related to system data: various system data stores corresponding to the users are stored, such as: desktop widget lists, setup databases, default application start policies, and the like.
b) User id directory related to application package data: and storing the application package catalog correspondingly installed by the user, and if the application operation generates data, storing the application data in the catalog.
c) System SD Card (Secure Digital Memory Card) catalog: it is not the same that each subscriber sees its sdcard directory, but only its sdcard directory.
For user data management, under a multi-user implementation mechanism, system data and application related data under each user are respectively stored under different data storage paths, for example, various system data under a certain user are stored under a specified first data storage path, and application related data such as an installed application package directory and application data generated by application operation are stored under a specified second data storage path; the data storage of each user is independent, and each user can only view own stored data, such as an own sdcard directory.
4. User rights management
a) After installation, the application applies various permissions (e.g.: read and store the catalogue authority, read and write the message authority, open the camera authority, etc.), will be divided into two parts, one part is insensitive to the authority, while employing and installing, the system allows the application to obtain the authority directly; some sensitive dangerous authorities, such as read-write short message authorities, prompt the user whether the application is allowed to obtain the authority or not when the application is used.
b) The system is independent and isolated for the authority of the same application at different users, the basic insensitive authority obtained by one application is directly obtained in each user after installation, and the partial sensitive dangerous authority is independent. For example: when the user 0 opens the WeChat, if the permission of reading and writing the short message is obtained, the system prompts whether the user allows the WeChat or not when the user 10 is switched to, and the user 0 does not need to be reminded because the WeChat obtains the permission. The same applies to other users.
For user authority management, when a certain user installs an application, an insensitive authority can directly obtain permission, and the sensitive authority needs to be obtained by permission of the user; under different users, the permission configurations of the same application are independent and isolated, and when the users switch, the sensitive permission of the application used for the first time needs to prompt the users whether to be entitled.
In one embodiment, the process by which the multi-open application set is implemented based on a multi-user mechanism can be described as follows:
assuming that a default user of the intelligent terminal is a master user, the user stores an installation package (APK) file such as abc.apk of application ABC in the intelligent terminal in a manner of downloading from an application store or copying from other sources under the master user, and after the system installs the abc.apk under the master user, a desktop of the master user generates an icon of master application ABC. When an avatar creation request for a master application ABC is detected under a master user, an avatar application is installed under a slave user (if no slave user exists, a slave user can be created, the creation process is completed without being perceived by the user, and no account and password are set by the user). After ABC is successfully installed, an appointed notification of 'successful installation' (identification is added in the notification) is sent to a master user, after a desktop under the master user receives the notification, an icon with the identification is generated to be distinguished from an icon of ABC of the master application, the icon can be used as an access port for operating the body application in the master user, after the icon is clicked, the system appoints ABC to be started under a slave user, a relevant process corresponding to ABC is also operated under the slave user, a human-computer interaction interface (abbreviated as an interface) of ABC is displayed under the master user, and the interface of ABC can also be used as an access port for operating the body application in the master user.
For the self-body application, the existence form of the access port in the master user may be various, and this embodiment is not particularly limited, for example, the access port may be a desktop icon including an application identifier, where the application identifier is used to distinguish the current self-body application from the master application and other self-body applications; the application identifier can be attached to the main application icon; an icon containing an application identifier which can also exist in a floating window form; but also items that exist in a notification center or the like.
The intelligent terminal user can realize the operation of the main application in the main user and can also operate the corresponding personal application through the access port in the main user. It can be understood that the same master application may correspond to a plurality of separate applications, and each separate application is installed in a different slave user, so that each separate application is respectively operated in different slave users, and does not interfere with each other in the operation process.
Compared with third-party multi-open helper software, the multi-open application is realized based on a multi-user mechanism, so that the actions of pushing advertisements and stealing user privacy data by the third-party software are avoided, and the safety is higher; compared with the scheme that the application main body and the application sub-body are operated under the same user, the method reduces the process interference between different application sub-bodies or application main bodies under the same user, and avoids the function loss phenomenon caused by a complex operation environment.
And step 230, deleting the target data in the subdirectory from high to low according to the preset priorities of the cached file subdirectory, the spam message subdirectory and the spam message subdirectory.
In this embodiment, the target data of the target application and the target data of the associated application are respectively stored in preset file directories under respective storage paths, where the preset file directories may include a cache file subdirectory, a spam message subdirectory, and a spam message subdirectory, the cache file subdirectory is used for storing cache data, the spam message subdirectory is used for storing spam messages, and the spam message subdirectory is used for storing spam messages.
When the system storage space is insufficient, the target data can be deleted. For example, the priority of each of the above subdirectories may be set, data in the subdirectory with the higher priority may be deleted preferentially, and if the file is further classified under the subdirectory, the classified file may also be set with a priority. For example, the cache file subdirectory may include a video file, an audio file, and a picture file, and priorities may be set according to the file sizes, for example, the video file has the highest priority, the picture file has the lowest priority, and when data in the cache file subdirectory is preferentially deleted, data in the video file is deleted first. The present embodiment may also set the priority of the subdirectory according to the use frequency of the data, and set the highest priority for the subdirectory corresponding to the data with the use frequency of 0 (such as spam or spam).
And step 240, after the target data in any subdirectory is deleted, inquiring whether to continuously delete the target data.
On the basis of the technical scheme, each time the target data in one subdirectory is deleted, the mobile terminal inquires whether the user continuously deletes the target data, the user can select yes or no according to the size of the residual storage space, and if the user selects yes, the mobile terminal continuously deletes the target data in the next subdirectory according to the sequence of the priority from high to low. Thus, in case the remaining space of the mobile terminal is sufficient, some data that the user wants or feels is still available may be retained.
According to the data deleting method for the multi-application provided by the embodiment of the invention, the priority is set for the subdirectory for storing the target data, when the target data is deleted, the target data in the subdirectory is deleted according to the sequence of the priorities of the subdirectories from high to low, the junk data occupying the largest storage space or having the use frequency of 0 can be preferentially deleted, and meanwhile, under the condition that the residual space of the mobile terminal is enough, some data which a user wants or feels still available can be reserved.
Fig. 3 is a block diagram of a data deleting apparatus for multiple applications according to an embodiment of the present invention. As shown in fig. 3, the apparatus includes: an associated application determination module 31 and a target data deletion module 32.
The operation event detection module 31 is configured to detect an operation event for each multi-open application set in real time, where the multi-open application set includes a main application and an individual application corresponding to the main application; the associated application determining module 32 is configured to determine an associated application of a target application when a data deletion event of the target application in a multi-open application set is detected, where the multi-open application set includes a main application and an avatar application corresponding to the main application, and the associated application is an application corresponding to the target application in the multi-open application set; the target data deleting module 33 is configured to delete the target data corresponding to the data deleting event in the target application and the associated application.
In the technical scheme, the data deletion event of the target application comprises a data deletion instruction of the user to the target application; or the data volume of the target data reaches a preset storage threshold value.
Based on the above technical solution, the associated application determining module 32 includes:
the application identification obtaining unit is used for obtaining an application identification of a target application, wherein the application identification comprises an application name;
and the associated application determining unit is used for determining the application corresponding to the application identifier with the target application name as the associated application of the target application.
In this embodiment, target data of a target application and a related application are respectively stored in preset file directories under respective storage paths;
the preset file directory may include a cache file subdirectory, a spam message subdirectory and a spam mail subdirectory.
Based on the above technical solution, the target data deleting module 33 includes:
the target data deleting unit is used for deleting the target data in the subdirectory from high to low according to the priority of the preset cache file subdirectory, the preset spam message subdirectory and the preset spam mail subdirectory;
and the deletion inquiry unit is used for inquiring whether to continuously delete the target data after deleting the target data in any subdirectory.
Preferably, the multi-open application set of the present embodiment is implemented based on a multi-user mechanism. Specifically, the master application is installed under a master user, the body-separated application is installed under a slave user, and the master user comprises an access port for operating the body-separated application.
The data deleting device for the multi-open application provided by the embodiment of the invention and the data deleting method for the multi-open application provided by any embodiment of the invention belong to the same inventive concept, can execute the data deleting method for the multi-open application provided by any embodiment of the invention, and has corresponding functions and beneficial effects. For details of the technology that are not described in detail in this embodiment, reference may be made to the data deleting method for the multi-application provided in any embodiment of the present invention.
The embodiment of the invention also provides a mobile terminal which comprises the multi-open application data deleting device provided by the embodiment of the invention. The mobile terminal can simultaneously delete the buffer data, the junk short messages, the junk mails and other junk data of each application in the same multi-open application set by adopting the data deleting device of the multi-open application provided by the invention and a corresponding data deleting method of the multi-open application.
The mobile terminal can be a smart phone, a tablet computer or a personal digital assistant.
Fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, and as shown in fig. 4, the mobile terminal 400 may include: memory 401, Central Processing Unit (CPU) 402, peripheral interfaces 403, RF (Radio Frequency) circuitry 405, audio circuitry 406, speaker 411, power management chip 408, input/output (I/O) subsystem 409, touch screen 412, other input/control devices 410, and external port 404, which communicate via one or more communication buses or signal lines 407.
It should be understood that the illustrated mobile terminal 400 is merely one example of a mobile terminal and that the mobile terminal 400 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes in detail a mobile terminal for controlling an application process provided in this embodiment, where the mobile terminal is a smart phone as an example.
Memory 401, memory 401 being accessible by CPU402, peripheral interface 403, etc., memory 401 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
A peripheral interface 403, the peripheral interface 403 may connect input and output peripherals of the device to the CPU402 and the memory 401.
I/O subsystem 409, I/O subsystem 409 may connect input and output peripherals on the device, such as touch screen 412 and other input/control devices 410, to peripheral interface 403. The I/O subsystem 409 may include a display controller 4091 and one or more input controllers 4092 for controlling other input/control devices 410. Where one or more input controllers 4092 receive electrical signals from or send electrical signals to other input/control devices 410, the other input/control devices 410 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is noted that the input controller 4092 may be connected to any one of the following: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
A touch screen 412, the touch screen 412 being an input interface and an output interface between the user terminal and the user, displays visual output to the user, which may include graphics, text, icons, video, and the like.
The display controller 4091 in the I/O subsystem 409 receives electrical signals from the touch screen 412 or transmits electrical signals to the touch screen 412. The touch screen 412 detects a contact on the touch screen, and the display controller 4091 converts the detected contact into an interaction with a user interface object displayed on the touch screen 412, i.e., implements a human-computer interaction, and the user interface object displayed on the touch screen 412 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
The RF circuit 405 is mainly used to establish communication between the mobile phone and the wireless network (i.e., network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, the RF circuitry 405 receives and transmits RF signals, also referred to as electromagnetic signals, through which the RF circuitry 405 converts electrical signals to or from electromagnetic signals and communicates with communication networks and other devices. RF circuitry 405 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
The audio circuit 406 is mainly used to receive audio data from the peripheral interface 403, convert the audio data into an electric signal, and transmit the electric signal to the speaker 411.
The speaker 411 is used to restore the voice signal received by the mobile phone from the wireless network through the RF circuit 405 to sound and play the sound to the user.
And a power management chip 408 for supplying power and managing power to the hardware connected to the CPU402, the I/O subsystem, and the peripheral interface 403.
The CPU402 provided in the embodiment of the present invention may perform the following operations:
detecting operation events of each multi-open application set in real time, wherein the multi-open application set comprises a main application and a body-splitting application corresponding to the main application;
when a data deletion event of a target application in the multi-open application set is detected, determining a related application of the target application, wherein the related application is an application corresponding to the target application in the multi-open application set;
and deleting the target data corresponding to the data deletion event in the target application and the associated application.
The main application is installed under a main user, and the self-service application is installed under a slave user.
The mobile terminal provided by the embodiment of the invention comprises the data deleting device for the multi-open application, and has corresponding functions and beneficial effects.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (11)

1. A data deleting method for multi-open application is characterized by comprising the following steps:
detecting operation events of each multi-open application set in real time, wherein the multi-open application set comprises a main application and a body-splitting application corresponding to the main application;
when a data deletion event of a target application in an open-loop application set is detected, determining a related application of the target application, wherein the related application is an application corresponding to the target application in the open-loop application set;
deleting target data corresponding to the data deletion event in the target application and the associated application;
target data of the target application and the associated application are respectively stored in preset file targets under respective storage paths;
the preset file target comprises a cache file subdirectory, a spam message subdirectory and a spam mail subdirectory;
the deleting the target data corresponding to the data deletion event in the target application and the associated application includes:
deleting target data in the subdirectory from high to low according to the priority of the preset cache file subdirectory, the preset spam message subdirectory and the preset spam mail subdirectory; the priority of the subdirectory is determined by the use frequency of data in the subdirectory or the storage space occupied by the data in the subdirectory;
and after the target data in any subdirectory is deleted, inquiring whether to continuously delete the target data.
2. The method of claim 1, wherein the data deletion event for the target application comprises:
a data deleting instruction of the target application is sent by the user; or,
and the data volume of the target data reaches a preset storage threshold value.
3. The method of claim 1, wherein the determining the associated application of the target application comprises:
acquiring an application identifier of the target application, wherein the application identifier comprises an application name;
and determining the application corresponding to the application identifier with the target application name as the associated application of the target application.
4. The method according to any of claims 1-3, wherein the set of multiple open applications is implemented based on a multi-user mechanism.
5. The method of claim 4, wherein the multi-open application set is implemented based on a multi-user mechanism, comprising:
the main application is installed under a main user, the sub-body application is installed under a sub-user, and the main user comprises an access port used for operating the sub-body application.
6. A data deleting apparatus for a multi-open application, comprising:
the system comprises an operation event detection module, a multi-open application collection and a multi-open application collection processing module, wherein the operation event detection module is used for detecting operation events of each multi-open application collection in real time, and the multi-open application collection comprises a main application and an individual application corresponding to the main application;
the system comprises a related application determining module, a data deleting module and a data deleting module, wherein the related application determining module is used for determining related applications of a target application in a multi-open application set when a data deleting event of the target application is detected, and the related applications are applications corresponding to the target application in the multi-open application set;
the target data deleting module is used for deleting the target data corresponding to the data deleting event in the target application and the associated application;
target data of the target application and the associated application are respectively stored in preset file directories under respective storage paths;
the preset file directory comprises a cache file subdirectory, a spam message subdirectory and a spam mail subdirectory;
the target data deletion module comprises:
the target data deleting unit is used for deleting the target data in the subdirectory from high to low according to the priority of the preset cache file subdirectory, the preset spam message subdirectory and the preset spam mail subdirectory; the priority of the subdirectory is determined by the use frequency of data in the subdirectory or the storage space occupied by the data in the subdirectory;
and the deletion inquiry unit is used for inquiring whether to continuously delete the target data after deleting the target data in any subdirectory.
7. The apparatus of claim 6, wherein the data deletion event of the target application comprises:
a data deleting instruction of the target application is sent by the user; or,
and the data volume of the target data reaches a preset storage threshold value.
8. The apparatus of claim 6, wherein the associated application determining module comprises:
an application identifier obtaining unit, configured to obtain an application identifier of the target application, where the application identifier includes an application name;
and the associated application determining unit is used for determining the application corresponding to the application identifier with the target application name as the associated application of the target application.
9. The apparatus according to any of claims 6-8, wherein the multi-open application set is implemented based on a multi-user mechanism.
10. The apparatus of claim 9, wherein the multi-open application set is implemented based on a multi-user mechanism, comprising:
the main application is installed under a main user, the sub-body application is installed under a sub-user, and the main user comprises an access port used for operating the sub-body application.
11. A mobile terminal characterized in that it integrates the data deletion means of the multi-open application according to any of claims 6-10.
CN201610885226.3A 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more Active CN106649495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610885226.3A CN106649495B (en) 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610885226.3A CN106649495B (en) 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more

Publications (2)

Publication Number Publication Date
CN106649495A CN106649495A (en) 2017-05-10
CN106649495B true CN106649495B (en) 2019-10-15

Family

ID=58854861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610885226.3A Active CN106649495B (en) 2016-10-10 2016-10-10 A kind of data-erasure method device and mobile terminal for opening application more

Country Status (1)

Country Link
CN (1) CN106649495B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110109869B (en) * 2018-01-22 2021-01-12 上海鹰信智能技术有限公司 Method for quickly positioning document of connecting equipment
CN111159734A (en) * 2019-12-20 2020-05-15 青岛海信移动通信技术股份有限公司 Communication terminal and multi-application data inter-access processing method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8838574B2 (en) * 2006-06-09 2014-09-16 International Business Machines Corporation Autonomic index creation, modification and deletion
CN104699773B (en) * 2015-03-05 2018-05-25 北京畅游天下网络技术有限公司 application software management method and device
CN104793978A (en) * 2015-05-08 2015-07-22 宁波萨瑞通讯有限公司 Application management system and method
CN105791581B (en) * 2016-03-25 2019-07-26 努比亚技术有限公司 Application operating method, device and mobile terminal

Also Published As

Publication number Publication date
CN106649495A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106357921B (en) A kind of data sharing method of application, device and mobile terminal
CN106484547B (en) Multi-open application management method and device and terminal
CN107026933B (en) Multi-open application message management method and device and intelligent terminal
CN106445647B (en) Open the data manipulation method, device and mobile terminal of application more
CN106445612B (en) Method and device for opening application and mobile terminal
CN106484518B (en) Display method and device of multi-open application and terminal
CN108710515B (en) Application preloading method and device, storage medium and terminal
CN106484538B (en) Memory control method and device of terminal equipment and terminal equipment
CN106484478B (en) A kind of method, device and mobile terminal creating application of attending to anything else
CN106648736B (en) A kind of control method of application, device and mobile terminal
CN106648737B (en) A kind of control method of application, device and mobile terminal
CN106445706B (en) Open the data transmission method, device and mobile terminal of application more
CN109408465B (en) File attribution information recording method, device, storage medium and terminal
CN106502732B (en) Application closing method and device and intelligent terminal
CN106484514B (en) Multi-open application operation management method and device and intelligent terminal
CN106383672B (en) A kind of data-erasure method, device and mobile terminal for opening application more
CN106357667B (en) Account management method and device for split application in multi-open application and intelligent terminal
CN106485111B (en) Method, device and terminal for hiding self-service application
CN106648738B (en) Method, device and terminal for managing personal applications
CN106484480A (en) A kind of determination method of application of attending to anything else, device and terminal
CN106649495B (en) A kind of data-erasure method device and mobile terminal for opening application more
CN106648459B (en) A kind of data managing method of application, device and mobile terminal
CN106648962B (en) A kind of management method, device and intelligent terminal for opening application more
CN106484419A (en) Information searching method, device and mobile terminal in a kind of application program
CN106445670B (en) A kind of data managing method, device and mobile terminal for opening application more

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant