Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one
Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
The embodiment of the present application provide data back up method executive agent, can be, but not limited to for mobile phone, tablet personal computer,
PC (Personal Computer, PC), intelligent television and it is any can run in the terminal of application at least one
Kind.In addition, the executive agent or data backup software of this method.
For ease of description, hereafter executive agent in this way be data backup software exemplified by, to the embodiment party of this method
Formula is introduced.It is appreciated that it is a kind of exemplary explanation that the executive agent of this method, which is data backup software, should not
It is interpreted as the restriction to this method.
The embodiment of the present application provides a kind of data back up method, to solve prior art due to applying storage in terminal
Application resource can be deleted, and be caused using the problem of can not normally running.This method implements schematic flow sheet such as Fig. 1
It is shown, mainly comprise the steps:
Step 11, for each application installed in terminal, monitor this and apply in the system data store of the terminal
The data of storage;
Wherein, described apply may generally refer to apply when being attached in terminal in the system data store of terminal,
Terminal is the region for being used to store application data in the application installation package that the application is distributed, subsequently when version occurs for the application more
After new, updating the data for the application will be also stored in the system data store of the application.
So that the operating system of terminal is Android (Android) operating system as an example, the system data store of the terminal is
Internal storage region.
It should be noted that when installing application (or being updated to the application installed in terminal), using peace
Application data in dress bag (or application updates bag) can be saved to the system data store of the application;Simultaneously also can be by this
The version number of the secondary application for installing (or renewal) is saved in the system data store of the application, the difference of same application in the lump
The corresponding application data of version is often different, i.e., can reflect the application to a certain extent by the version number of application
The application data stored up in system data stored memory, then typically can apply what is stored in system data store by monitoring
Whether application version number changes, with reach monitoring apply system data store in the data that store whether become
The purpose of change.
In one embodiment, data backup software (the data backup software in terminal can be passed through
Can be the application in terminal) it is monitored come the system data store to each application in terminal, and
Perform subsequent operation.And terminal is that the system data store that application is distributed normally only allows the access of the application at present, without
The other application in the terminal is allowed to conduct interviews, therefore in order to reach that data backup software is deposited to the system data of application
The purpose that storage area is monitored, terminal can be the higher authority of data backup software design patterns, can so as to obtain data backup software
It is monitored with the system data store to other application.
In addition, system data that can also be by the operating system of terminal directly to each application in terminal
Memory block is monitored.
There is also the need to explanation, although the data preserved in the system data store of application will not be typically mounted
Other application on the terminal is accessed, but the cleaning application that can be installed in terminal is deleted, for example, being used in user
When cleaning application is cleared up the memory space of terminal, the data preserved in application system data storage area may be deleted
Remove.
Because the application data of the system data store memory storage of application may be deleted, thus correspondence is needed to be used in
The data preserved in system data store are backed up, specifically, how the data preserved in standby system data storage area,
Refer to step 12.
Step 12, will when the data stored by performing step 11 to monitor in system data store change
Data backup after change is to the user data memory block of the terminal;
Wherein, the user data memory block of the terminal, may generally refer to be used to preserve user related data in terminal
The storage region of (such as, the photo of user, video, audio), it is equal due to what is typically preserved in the user data memory block of terminal
For the related data of user, user does not expect that user data is disposed of typically, thus cleaning conventional at present applied to end
When the memory space at end is cleared up, the data for tending not to preserve in the user data memory block to terminal are cleared up.
So that the operating system of terminal is Android operation system as an example, the system data store of the terminal is deposited for inside
Storage area.
Because the version of the application in terminal may often update, in order to ensure in user data memory block
Backup is always the data for applying latest edition, to ensure to back up the backup corresponding with application in user data memory block
Behind data recovery to the system data store of the application, the application can operationally use the application data of latest edition,
In one embodiment, whenever monitor application system data store memory storage data change it is (referred to herein
Change can such as include:Newly-increased data, replacement data, etc.) when, you can by the data backup after change to user data
In memory block, and it should will be deleted in user data memory block with this using the application data of corresponding legacy version, so as to ensure
It is being backed up in user data memory block, with using corresponding application data be always this using latest edition data.
It should be noted that is installed in the data back up method provided using the embodiment of the present application, terminal is respectively applied
The application data preserved in system data store has been backed up in the user data memory block of the terminal.In order to protect
Card is follow-up after certain applies the application data preserved in system data store to be deleted in terminal, can be deposited from user data
Recovery applies corresponding application data with this in storage area, in one embodiment, the data backup after by change to terminal
User data memory block after, the data that back up to after the change in user data memory block and pair of the application will be set up
It should be related to, then, can be according to the backup pre-established after this applies the data stored in system data store to be deleted
To the data and the corresponding relation of application of user data memory block, backup is applied corresponding in user data memory block with this
Data recovery is to the system data store of the application.
In one embodiment, can be in the user data memory block of terminal, to install difference on the terminal
Using different memory spaces are divided, such as, each application installed in terminal can be directed to, in the user data memory block of terminal
Middle establishment applies corresponding file with this, then subsequently can be standby by the data of the storage in the system data store of the application
Applied with this in corresponding file part into user data memory block, in this way to reach that foundation backs up to number of users
According to the data in memory block and the purpose of the corresponding relation of application.
In another embodiment, the data backup changed in the system data store by application is to terminal
User data memory block when, the mark of the application can be added in the data in backing up to user data memory block, such as
The title of the application, in this way to reach that data and the corresponding of application that foundation backed up in user data memory block are closed
The purpose of system.
The embodiment of the present application using which kind of mode to setting up the data backed up in user data memory block and pair of application
It should be related to and be not specifically limited.
At present, the user data memory block in terminal is generally common storage area, that is, install on the terminal it is all should
With can be conducted interviews to the data preserved in user data memory block, in order to ensure backup in user data memory block
The security of application data, in one embodiment, can be carried out the application data backed up in user data memory block
Encryption, to allow application only corresponding with the application data to access and obtain the application data of backup, then will become
Data backup after change can specifically include to the user data memory block of the terminal:Data after change are encrypted
Processing, obtains encryption data;The encryption data is preserved to the user data memory block of the terminal.
In one embodiment, the data after change are encrypted, can specifically included:Using presetting message
Digest algorithm, determines the summary info of the data after the change;Using default key to the data after the change and
The summary info is encrypted, and obtains encryption data.
Wherein, by default Message Digest 5, the data that will back up in user data memory block are determined
Summary info, is mainly used at data recovery to the system data store that will subsequently be backed up in user data memory block, leads to
Cross the summary info verify Backup Data integrality, specifically, how by the summary info of Backup Data to Backup Data
Integrality verified, associated description as detailed below, here is omitted.
The Message Digest 5 that the embodiment of the present application is used such as can be the 5th edition Message Digest 5 (Message-
Digest Algorithm 5, MD5), the embodiment of the present application can also be using other Message Digest 5s in addition, and the application is real
Example is applied to which kind of Message Digest 5 to determine that the summary info of Backup Data is not specifically limited using.
The data back up method provided using the embodiment of the present application, due to each application installed in terminal, prison can be directed to
Survey this and apply the data stored in the system data store of terminal, and the data hair stored in system memory block is monitored
During changing, by the user data memory block of the data backup after change to the terminal, and foundation backs up to user data storage
The data preserved in data after change and the corresponding relation of the application in area, user data memory block will not typically be deleted
Remove, thus when it is described apply the data that are stored in system data store to be deleted after, backup can be deposited in user data
Corresponding data recovery is applied to the system data store of the application with this in storage area, so as to avoid due to applying in system
The data stored in data storage area are deleted, and are caused using the problem of can not normally running.
The embodiment of the present application additionally provides a kind of data reconstruction method, to solve prior art due to applying storage in end
The application resource at end can be deleted, and be caused using the problem of can not normally running.This method implements schematic flow sheet
As shown in Fig. 2 mainly comprising the steps:
Step 21, the recovery instruction that the application installed in receiving terminal is sent;
Wherein, the recovery instruction is not reading described apply in the system data store of terminal for described apply
Sent during the data of storage.
Application in terminal operationally, generally requires to read application out of the application system data store
Data, such as, on startup, using can read application interface generation data from the system data store of application, and according to
The application interface generation data read generate the user interface of the application.
However, because the data of the system data store memory storage of terminal may be cleaned using deletion, thus should
With operationally, possibly data can not be read from the system data store of application, then now the application program can be to
Data backup software, which is sent, recovers instruction, so as to obtain data backup software by backed up in the user data memory block and application
Corresponding Backup Data recovers to the system data store of the application.
Step 22, recover to instruct according to described, obtained from the user data memory block of the terminal and the application pair
The data answered;
Because the user data memory block in terminal is generally common storage area, that is, all applications on the terminal are installed
The data preserved in user data memory block can be conducted interviews, in order to ensure to back up answering in user data memory block
With the security of data, the data backed up in user data memory block are typically the data after encryption, then lead to
Execution step 22 is crossed, it is being obtained from the user data memory block of terminal, general with the corresponding data of application according to recovering to instruct
For encryption data.
Step 23, by by performing the data recovery that step 22 obtains to the system data store.
Because the Backup Data acquired by performing step 22 from user data memory block is generally the backup after encryption
Data, thus recover by the application Backup Data of acquisition to before the system data store of the application, it is necessary first to correspondence
Processing is decrypted with Backup Data, it is necessary to which explanation, when the Backup Data of the application is encrypted, is used symmetrical
The mode of encryption, i.e. data backup software can use same key, and the Backup Data of same application is encrypted or solved
It is close, then data backup software can according to send recovery request application application identities, it is determined that with this apply corresponding key,
And the Backup Data of acquisition is decrypted using the key of determination, obtain with applying corresponding Backup Data and the backup number
According to summary info.
It should be noted that in order to avoid in data recovery procedure, Backup Data is illegally distorted, and cause to recover
Data to application system data storage area can not be used normally, in one embodiment, standby in the application for obtaining decryption
Before part data recovery to application system data storage area, data integrity validation can also be carried out to Backup Data, specifically,
The method for the verification of data integrity that the embodiment of the present application is provided can include:Using default Message Digest 5, institute is determined
State the summary info of Backup Data;When the summary info that decryption is obtained is identical with the summary info determined, it is determined that to described
Encryption data is verified.
By the method for above-mentioned verification of data integrity, recover when in Backup Data from user data memory block to system number
During according to memory block, it is assumed that when carrying out data integrity validation, the backup number that data backup software is obtained according to decryption
According to this and default Message Digest 5, the Backup Data that decryption is obtained is calculated, obtained summary info is with decrypting
The summary info arrived is different, by the Message Digest 5 used when calculating summary info is identical, thus can be true
Decrypt obtained Backup Data calmly different from backuping to the Backup Data that user data is deposited in area, i.e., in data recovery procedure,
Backup Data may be by illegally distorting, and refuses to deposit the system data that the Backup Data after being tampered recovers to application
Storage area, by the above-mentioned means, can determine whether Backup Data is illegally distorted in recovery process, and refuses after distorting
Backup Data recovers to the system data store of application, and being restored to so as to the Backup Data after avoiding due to distorting should
System data store, and cause using the problem of can not normally running.
With reference to Fig. 3, so that terminal is Android mobile phone as an example, it is discussed in detail standby using the data of the embodiment of the present application offer
Part method and data reconstruction method, the application data to the application in Android mobile phone are backed up and data recovery
Process:
Step 31, when installing using 1, it has been saved to Android mobile phone to answer using the application data in 1 installation kit
With in the internal storage region of distribution;
Step 32, data backup software obtains the application data of preservation out of application 1 internal storage region;
Step 33, data backup software backs up to the application data of the application 1 of acquisition the external memory area of Android mobile phone;
Step 34, will be to be read out using 1 internal storage region using 1 when operation applies 1, it is assumed that now using in 1
Data in portion memory block are cleaned using deleting, then internally can not read application data in memory block using 1;
Step 35, data recovery request is sent to data backup software using 1;
Step 36, data backup software, please according to the data recovery after receiving using 1 data recovery request sent
Ask, obtained from external memory area with applying 1 corresponding data;
Step 37, data backup software to the data verification of acquisition by rear, by the data recovery of acquisition to application 1
Internal data store area;
Specifically, data backup software how verification of data integrity, associated description as detailed above, herein no longer go to live in the household of one's in-laws on getting married
State.
Step 38, data backup software sends data recovery completion notice to application 1;
Step 39, using 1 after the data recovery completion notice is received, to the number recovered in internal data storage area
According to being read out, and run according to the data read.
Present invention also provides a kind of data backup device, to solve prior art due to applying storage in answering for terminal
It can be deleted, and be caused using the problem of can not normally running with resource.The concrete structure schematic diagram of the device as shown in figure 4,
Including:Data monitoring unit 41 and data backup unit 42.
Wherein, data monitoring unit 41, for each application installed in terminal, monitors this and applies system in the terminal
The data stored in data storage area;
Data backup unit 42, when monitoring that the data change, by the data backup after change to the end
The user data memory block at end, and set up pair of the data and application backed up to after the change in user data memory block
Should be related to so that it is proper it is described apply after the data that are stored in system data store are deleted, will back up in the user
Corresponding data recovery is applied to the system data store with this in data storage area.
In one embodiment, the data after change are encrypted by data backup unit 42, obtain encrypting number
According to;The encryption data is preserved to the user data memory block of the terminal.
In one embodiment, data backup unit 42, using presetting message digest algorithm, are determined after the change
The summary info of data;The data after the change and the summary info are encrypted using default key,
Obtain encryption data.
In one embodiment, when the operating system of the terminal is Android Android operation system, the system
Data storage area is internal storage region, and the user data memory block is external memory area.
In addition, present invention also provides a kind of Data Recapture Unit, to solve prior art due to applying storage in end
The application resource at end can be deleted, and be caused using the problem of can not normally running.The concrete structure schematic diagram of the device such as Fig. 5
It is shown, including:Recover instruction reception unit 51, Backup Data obtaining unit 52 and Backup Data recovery unit 53.
Wherein, the recovery instruction that application is sent installed in instruction reception unit 51, receiving terminal is recovered, wherein, it is described
Recover instruction for it is described apply do not read it is described apply and stored in the system data store of terminal data when send
's;
Backup Data obtaining unit 52, recovers to instruct, is obtained from the user data memory block of the terminal according to described
With the corresponding data of the application;
Backup Data recovery unit 53, by the data recovery of acquisition to the system data store.
In one embodiment, Backup Data obtaining unit 52, is obtained from the user data memory block of the terminal
With the corresponding encryption data of the application.
In one embodiment, Backup Data recovery unit 53, using default key, is carried out to the encryption data
Decryption processing, obtains the summary info with the corresponding Backup Data of the application and the Backup Data;Disappeared using default
Digest algorithm is ceased, the summary info of the Backup Data is determined;When the summary info phase for decrypting obtained summary info and determination
Simultaneously, it is determined that the encryption data is verified, and by the Backup Data recover to the system data store.
In one embodiment, when the operating system of the terminal is Android Android operation system, the system
Data storage area is internal storage region, and the user data memory block is external memory area.
The method provided using the embodiment of the present application, due to that can be directed to each application installed in terminal, monitors the application
The data stored in the system data store of terminal, and the data stored in system memory block is monitored change
When, by the user data memory block of the data backup after change to the terminal, and set up and back up in user data memory block
The data preserved in data and the corresponding relation of the application after change, user data memory block will not be typically deleted, thus
When it is described apply the data that are stored in system data store to be deleted after, can will backup in user data memory block with
This, to the system data store of the application, is stored so as to avoid using corresponding data recovery due to applying in system data
The data stored in area are deleted, and are caused using the problem of can not normally running.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.