CN108549576A - File monitor method, apparatus, electronic equipment and storage medium - Google Patents
File monitor method, apparatus, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN108549576A CN108549576A CN201810354951.7A CN201810354951A CN108549576A CN 108549576 A CN108549576 A CN 108549576A CN 201810354951 A CN201810354951 A CN 201810354951A CN 108549576 A CN108549576 A CN 108549576A
- Authority
- CN
- China
- Prior art keywords
- file
- prompt message
- trigger action
- operation requests
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
This application involves a kind of file monitor method, apparatus, electronic equipment and storage mediums.This method includes:The operation requests to file are obtained, operation requests carry application identities, when application identities are not in default set of applications, freeze operation is asked, and show the first prompt message, the trigger action to the first prompt message is obtained, and execute action corresponding with trigger action.By identifying whether to judge in default set of applications to application, trigger action can be screened.And when application identities are not in default set of applications, freeze operation request shows the first prompt message, can reduce because maloperation makes the risk that file is lost, to improve safety.
Description
Technical field
This application involves technical field of mobile terminals, more particularly to a kind of file monitor method, apparatus, electronic equipment and
Storage medium.
Background technology
With the development of mobile terminal technology, mobile terminal has become a part inseparable in people's life,
For example, mobile terminal can be used for handling official business, take pictures, chat.These operations often can all generate various each in the terminal
The file of sample includes the important informations such as business secret, individual privacy in these files, once it loses, it will it is brought to user
Huge loss.Under normal conditions, these files can be very good preserve in the terminal, only user could to file into
Row operation.
However, when there is service logic mistake in the application in mobile terminal, application on mobile terminal can to file into
Row maloperation has that safety is low so as to cause the loss of file.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of file monitor method that can improve safety, dress
It sets, electronic equipment and storage medium.
A kind of file monitor method, including:
The operation requests to file are obtained, the operation requests carry application identities;
When the application identities are not in default set of applications, freeze the operation requests, and shows the first prompt letter
Breath;
The trigger action to first prompt message is obtained, and executes action corresponding with the trigger action.
A kind of document monitoring device, including:
Acquisition request module, for obtaining the operation requests to file, the operation requests carry application identities;
Information display module, for when the application identities are not in default set of applications, freezing the operation requests,
And show the first prompt message;
Acquisition module is operated, for obtaining the trigger action to first prompt message, and executes and is grasped with the triggering
Make corresponding action.
A kind of electronic equipment, including memory and processor store computer program, the calculating in the memory
When machine program is executed by the processor so that the processor executes following steps:
The operation requests to file are obtained, the operation requests carry application identities;
When the application identities are not in default set of applications, freeze the operation requests, and shows the first prompt letter
Breath;
The trigger action to first prompt message is obtained, and executes action corresponding with the trigger action.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Following steps are realized when row:
The operation requests to file are obtained, the operation requests carry application identities;
When the application identities are not in default set of applications, freeze the operation requests, and shows the first prompt letter
Breath;
The trigger action to first prompt message is obtained, and executes action corresponding with the trigger action.
Above-mentioned file monitor method, apparatus, electronic equipment and storage medium, by obtaining the operation requests to file, behaviour
Make request and carries application identities, when application identities are not in default set of applications, freeze operation request, and obtain to first
The trigger action of prompt message, and execute action corresponding with trigger action.By identifying whether application in default application collection
Judged in conjunction, trigger action can be screened.And when application identities are not in default set of applications, freeze to grasp
It asks, shows the first prompt message, can reduce because maloperation makes the risk that file is lost, to improve safety.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the applied environment figure of file monitoring method in one embodiment;
Fig. 2 is the internal structure schematic diagram of electronic equipment in one embodiment;
Fig. 3 is the flow chart of file monitoring method in one embodiment;
Fig. 4 is the method flow diagram that file type is judged in one embodiment;
Fig. 5 is the method flow diagram executed in one embodiment with trigger action respective action;
Fig. 6 is the surface chart that the first prompt message is shown in one embodiment;
Fig. 7 is the method flow diagram that the second prompt message is shown in one embodiment;
Fig. 8 is the surface chart that the second prompt message is shown in one embodiment;
Fig. 9 is document monitoring device structure diagram in one embodiment;
Figure 10 is the part-structure block diagram of mobile phone in one embodiment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
It is appreciated that term " first " used in this application, " second " etc. can be used to describe herein various elements,
But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes
It says, in the case where not departing from scope of the present application, the first client can be known as the second client, and similarly, can incite somebody to action
Second client is known as the first client.First client and the second client both client, but it is not same visitor
Family end.
Fig. 1 is the application environment schematic diagram of file monitoring method in one embodiment.As shown in Figure 1, the application environment packet
Include terminal 110 and cloud server 120.Wherein, terminal 110 is communicated by network with cloud server 120.Terminal
110 can include but is not limited to be various mobile terminals, personal computer, laptop, tablet computer etc., cloud server
120 can be realized with the server cluster of the either multiple server compositions of independent server.
Fig. 2 is the internal structure schematic diagram of a kind of electronic equipment in one embodiment.The electronic equipment includes passing through system
Processor, memory, display and the network interface of bus connection.Wherein, which is used to provide calculating and control ability,
Support the operation of entire electronic equipment.Memory stores at least one computer program for storage file etc. on memory, should
Computer program can be executed by processor, to realize the file monitor side suitable for electronic equipment provided in the embodiment of the present application
Method.Memory may include that the non-volatile memories such as magnetic disc, CD, read-only memory (Read-Only Memory, ROM) are situated between
Matter or random access memory (Random-Access-Memory, RAM) etc..It is situated between for example, memory includes non-volatile memories
Matter and built-in storage.Non-volatile memory medium is stored with operating system and computer program.The computer program can be handled
Performed by device, for realizing a kind of file monitor method that each embodiment of the application is provided.Built-in storage is non-volatile
Property storage medium in operating system and computer program provide cache running environment.Display can be touch screen,
For example be capacitance plate or electrical screen, it is used for the interface information of the corresponding application of display foreground process, may be utilized for detection and make
Touch operation for the display screen.The electronic equipment further includes the network interface connected by system bus, and network interface can
To be Ethernet card or wireless network card etc., for being communicated with external equipment, for example it can be used for same cloud server and carry out
Communication.
It will be understood by those skilled in the art that structure shown in Figure 2, is only tied with the relevant part of application scheme
The block diagram of structure, does not constitute the restriction for the electronic equipment being applied thereon to application scheme, and specific electronic equipment can be with
Including than more or fewer components as shown in the figure, either combining certain components or being arranged with different components.
In one embodiment, provide a kind of file monitor method, be applied to above-mentioned electronic equipment come for example,
As shown in figure 3, including the following steps:
Step 302, the operation requests to file are obtained, operation requests carry application identities.
File may include the data such as picture, video and the document of storage in the terminal.Application identities refer in terminal
The mark of application APP (Application), each application program in terminal have unique corresponding application identities,
For distinguishing different application programs.Operation requests can be that application program is sent out in terminal, can be with to the operation requests of file
Be in terminal application program send out to operation requests such as the deletion, modification and position of file movements.
Terminal can get the operation requests to file of application program transmission, be carried in operation requests using mark
Know, terminal can get the application identities in operation requests simultaneously when obtaining operation requests.Due to each application program
There are unique corresponding application identities, terminal that can find the operation requests sent to file according to the application identities got
Application program.
Step 304, when application identities are not in default set of applications, freeze operation request, and show the first prompt letter
Breath.
Wherein, set of applications is pre-set, the set for storing application identities.That is stored in set of applications answers
It can be the corresponding application identities of application program for allowing to operate file with mark, code can be written in application identities
In, it is stored in set of applications by the two-dimensional array of string format.Freeze to be that process is instigated to be in frozen state, it cannot
Operation, freeze operation request refer to that will operate the state in that cannot run.First prompt message can be shown in terminal
One dialog box.
Terminal can mark the application got after getting to the operation requests of file and corresponding application identities
Whether knowledge is judged, that is, judge the application identities in default set of applications.When terminal judges the application identities default
When in set of applications, directly allow operation requests of the corresponding application program of the application identities to file.When terminal judges this
When application identities are not in default set of applications, terminal can freeze operation of the corresponding application program of the application identities to file
Request, and show the first prompt message.
Step 306, the trigger action to the first prompt message is obtained, and executes action corresponding with trigger action.
Can be the trigger action generated in the first prompt message dialog box to the trigger action of the first prompt message, it can
Can also be not allow the corresponding application of application identities to be that the corresponding application program of application identities is allowed to operate file
Program operates file.
Terminal can obtain the trigger action to the first prompt message, and execution and trigger action by the dialog box of display
Corresponding action.When trigger action is that the corresponding application program of application identities is allowed to operate file, terminal can permit
Perhaps application program operates file.When trigger action is that the corresponding application program of application identities is not allowed to grasp file
When making, file can be reverted to the position of original storage file by terminal.
By obtaining the operation requests to file, operation requests carry application identities, when application identities are not answered default
When in set, freeze operation request, and the trigger action to the first prompt message is obtained, and execute corresponding with trigger action
Action.By identifying whether to judge in default set of applications to application, trigger action can be screened.And
When application identities are not in default set of applications, freeze operation request shows the first prompt message, can reduce because maloperation makes
The risk that file is lost, to improve safety.
As shown in figure 4, in one embodiment, a kind of file monitor method provided can also include judging file type
Process, specific steps include:
Step 402, the file type of file is obtained.
File may include picture, video and document etc..The file type of file may include .jpg .GIF and
.bmp equal picture files type, can also including wmv, asf, asx, mp4 etc. video file types, can also including .doc,
.xls, the document files type such as .zip.
Terminal can obtain corresponding file according to the operation requests to file of acquisition, further according to file acquisition to file
Corresponding file type.
Step 404, when file type is preset file type, freeze operation asks and shows the first prompt message.
Preset file type can be the shielded file type set.Terminal can judge application identities
After not in default set of applications, the file type of file is judged, when file type is shielded file type,
Terminal can be asked with freeze operation, and show the first prompt message on a display screen.
By obtaining the file type of file, when file type is preset file type, freeze operation is asked and is shown
Show the first prompt message.The file type of file is judged, and according to judging result decide whether freeze operation request with
And the first prompt message of display, it can reduce because maloperation makes the risk that file is lost, to improve safety.
In one embodiment, a kind of file monitor method provided can also include:When file is file in media library
When, application identities are detected whether in default set of applications by media bank interface.
Wherein, media library may include the system applications such as photograph album, video player, music player.To matchmaker
File in this kind of system application in body library is operated, it is necessary to which the interface provided by media library is operated.Work as terminal
When detecting that application program operates the file in media library, can by media library provide interface judge to file into
Whether the corresponding application identities of application program of row operation are in default set of applications.
When the corresponding application identities of the application program operated to file are in default set of applications, terminal can permit
Perhaps the application program operates file.When the corresponding application identities of the application program operated to file are not answered default
When in set, terminal can show the first prompt message.
In one embodiment, as shown in figure 5, a kind of file monitor method provided can also include executing to grasp with triggering
Make the process of respective action, specific steps include:
Step 502, when the trigger action to the first prompt message is the first trigger action, by the file in temp directory
It is back to the position of original storage file.
Wherein, temp directory can be a library of temporary storage file, and only system application could access
Temp directory.First trigger action can not allow application program to operate file, as the triggering behaviour that terminal is got
When as the first trigger action, expression does not allow the application program to operate file, and terminal, which can will be temporarily stored in, faces
When catalogue in file back to the position of original storage file.
Step 504, when the trigger action to the first prompt message is the second trigger action, the text in temp directory is emptied
Part.
Second trigger action can be that application program is allowed to operate file, when the trigger action that terminal is got is
When the second trigger action, expression allows the application program to operate file, and terminal can will be temporarily stored in temp directory
In file emptied.
When the trigger action to the first prompt message is the first trigger action, the file in temp directory is back to original
The position of file is stored, when the trigger action to first prompt message is the second trigger action, is emptied in temp directory
File.Terminal executes corresponding move by judging trigger action, and according to judging result to the file in temp directory
Make, can reduce because maloperation makes the risk that file is lost, to improve safety.
In one embodiment, a kind of file monitor method provided can also include:If not having in preset time range
There are the trigger action got to the first prompt message, the staged files to temp directory.
Preset time range can be pre-set, and the time range of trigger action is obtained for terminal.For example, pre-
If time range can be 5 seconds to 8 seconds.Terminal can detect in preset time range after showing the first prompt message
To the trigger action of the first prompt message, if not getting the behaviour of the triggering to the first prompt message within this time range
Make, file can be transferred to temp directory by terminal.
When there are multiple files, file can be transferred to temp directory successively by terminal, and according to the suitable of the staged files
Sequence sends to the application program sent out to the operation requests of file and operates successful result.
If not getting the trigger action to the first prompt message in preset time range, the staged files to interim mesh
Record.When not getting trigger action in preset time range, by being shifted to file, system power dissipation can be reduced.
In one embodiment, as shown in fig. 6, when application identities are not in default set of applications, terminal can be freezed
Operation requests, and show the first prompt message.For example, the chat software in terminal has issued the behaviour for deleting a photo in photograph album
It asks, when terminal detects the application identities of chat software not in default set of applications, terminal can freeze chat software
The operation of photo is deleted, and shows the first prompt message on a display screen.First prompt message can be that " chat software to be ready deleting
Except 1 photo in photograph album, if allow" dialog box.Meanwhile first prompt message interface in can also include chat
The specific photo that software is being deleted can also include the prompt of " irrecoverable after deletion ".In the interface of first prompt message
There can also be " permission " and " not allowing " two controls, allow the chat software to execute operation for choosing whether.Wherein,
Countdown can also be shown on " not allowing " control.There can also be answering for " selection for remembeing me " in the interface of first prompt message
Select frame, after choosing, when chat software sends out same operation requests again, terminal can according to the permission selected or
Do not allow the chat software to execute operation directly to be selected again.
In one embodiment, as shown in fig. 7, a kind of file monitor method provided can also include the second prompt of display
The process of information, specific steps include:
Step 702, the quantity of file in the temp directory emptied is obtained.
Terminal can count the quantity of the file emptied in the file in emptying temp directory.Terminal can be with
It adds up to the quantity of the file in the temp directory that empties, gets total quantity for emptying file in temp directory.
Step 704, when quantity reaches preset quantity, the second prompt message is shown.
Preset quantity is the specific numerical value set, for example, preset quantity can be 4.Terminal gets total
It empties in temp directory after the quantity of file, the quantity got can be compared with preset quantity.When the number got
When amount reaches preset quantity, terminal can show the second prompt message on a display screen.
By obtaining the quantity of file in the temp directory emptied, when quantity reaches preset quantity, the second prompt of display
Information.Due to showing the second prompt message, can reduce because maloperation makes the risk that file is lost, to improve safety
Property.
In one embodiment, as shown in figure 8, when the quantity that terminal counts on file in the temp directory emptied reaches pre-
If when quantity, terminal can show the second prompt message on a display screen.For example, terminal is got in the first prompt message
Trigger action be allow chat software delete photograph album in 1 photo, when preset quantity be 4, terminal count on empty it is interim
When the quantity of file reaches 4 in catalogue, terminal can show that the second prompt message is that " chat software to be ready deleting on a display screen
4 photos in photograph album, if allow" dialog box.Equally, can also have in the interface of the second prompt message " permission " with
And " not allowing " two controls, 4 photos for choosing whether that the chat software is allowed to delete in photograph album.
In one embodiment, a kind of file monitor method provided can also include:Receive that high in the clouds issues default answers
With set, local default set of applications is updated according to the default set of applications in high in the clouds.
The feedback information for carrying application identities can be sent to high in the clouds by terminal, high in the clouds upon receipt, Ke Yigen
Default set of applications is updated according to the feedback information, updated default application is obtained and combines.High in the clouds will be updated pre-
If set of applications is handed down to terminal, terminal is further according to the local default set of applications of the default set of applications update in high in the clouds.
The default set of applications issued by receiving high in the clouds, according to default the answering of the default set of applications in high in the clouds update local
With set.Terminal can be updated default set of applications, to more accurately judge to send out to the operation requests of file
Application identities improve safety whether in default set of applications.
In one embodiment, a kind of file monitor method is provided, it is described to realize that this method is as follows:
First, terminal can obtain the operation requests to file, and operation requests carry application identities.Terminal can obtain
The operation requests to file sent to application program, application identities are carried in operation requests, and terminal is obtaining operation requests
When, the application identities in operation requests can be got simultaneously.Since each application program has unique corresponding application mark
Know, terminal can find the application program sent to the operation requests of file according to the application identities got.
Then, terminal may determine that application identities whether in default set of applications, when application identities are not in default application
When in set, terminal can obtain the file type of file.Terminal can obtain pair according to the operation requests to file of acquisition
The file answered, further according to file acquisition to the corresponding file type of file.When file type is preset file type, freeze
Operation requests simultaneously show the first prompt message.Freeze to be that process is instigated to be in frozen state, cannot run, freeze operation request is
Refer to operation in the state that cannot be run.Terminal can also show the first prompt message.
Then, when file be media library in file when, terminal can by media bank interface detect application identities whether
In default set of applications.Wherein, media library may include the system applications such as photograph album, video player, music player.It wants
Want to operate the file in this kind of system application of media library, it is necessary to which the interface provided by media library is operated.
When terminal detects that application program operates the file in media library, the interface judgement pair of media library offer can be passed through
Whether the corresponding application identities of application program that file is operated are in default set of applications.
Then, terminal can obtain the trigger action to the first prompt message, and execute action corresponding with trigger action.
It can be the trigger action generated in the first prompt message dialog box to the trigger action of the first prompt message, can allow
The corresponding application program of application identities operates file, can also be not allow the corresponding application program of application identities to text
Part is operated.If not getting the trigger action to the first prompt message in preset time range, terminal can shift
File is to temp directory.Preset time range can be pre-set, and the time range of trigger action is obtained for terminal.
For example, preset time range can be 5 seconds to 8 seconds.Terminal, can be in preset time range after showing the first prompt message
The trigger action of the first prompt message is touched the first prompt message if not getting within this time range in interior detection
File can be transferred to temp directory by hair operation, terminal.When there are multiple files, file can be successively transferred to by terminal
Temp directory, and according to the sequence of the staged files, it is successful to send operation to the application program sent out to the operation requests of file
As a result.
Wherein, when to the trigger action of the first prompt message is the first trigger action, terminal can will be in temp directory
File be back to the position of original storage file.Temp directory can be a library of temporary storage file, only be
System application program could access temp directory.First trigger action can not allow application program to operate file, when
When the trigger action that terminal is got is the first trigger action, expression does not allow the application program to operate file, terminal
The file being temporarily stored in temp directory can be returned to the position of original storage file.It is touched when to the first prompt message
When hair operation is the second trigger action, terminal can empty the file in temp directory.Second trigger action can allow to answer
File is operated with program, when the trigger action that terminal is got is the second trigger action, expression allows this to apply journey
Ordered pair file is operated, and terminal can empty the file being temporarily stored in temp directory.
Then, terminal can obtain the quantity of file in the temp directory emptied.Text of the terminal in emptying temp directory
When part, the quantity of the file emptied can be counted.Terminal can to the quantity of the file in the temp directory that empties into
Row is cumulative, gets total quantity for emptying file in temp directory.When quantity reaches preset quantity, terminal can show
Two prompt messages.Preset quantity is the specific numerical value set, for example, preset quantity can be 4.Terminal is got always
Empty in temp directory after the quantity of file, the quantity got can be compared with preset quantity.When what is got
When quantity reaches preset quantity, terminal can show the second prompt message on a display screen.
Finally, terminal can receive the default set of applications that high in the clouds issues, and be updated further according to the default set of applications in high in the clouds
Local default set of applications.The feedback information for carrying application identities can be sent to high in the clouds by terminal, and high in the clouds is receiving
Later, default set of applications can be updated according to the feedback information, obtains updated default application and combines.It high in the clouds will
Updated default set of applications is handed down to terminal, and terminal is further according to the local default application of the default set of applications update in high in the clouds
Set.
It should be understood that although each step in above-mentioned flow chart is shown successively according to the instruction of arrow, this
A little steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, in above-mentioned flow chart at least
A part of step may include that either these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps
Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to
Secondary progress, but can either the sub-step of other steps or at least part in stage in turn or replace with other steps
Ground executes.
In one embodiment, as shown in figure 9, providing a kind of document monitoring device, including:Acquisition request module 910,
Information display module 920 and operation acquisition module 930, wherein:
Acquisition request module 910, for obtaining the operation requests to file, operation requests carry application identities.
Information display module 920, for when application identities are not in default set of applications, freeze operation to be asked, and is shown
Show the first prompt message.
Acquisition module 930 is operated, for obtaining the trigger action to the first prompt message, and is executed corresponding with trigger action
Action.
In one embodiment, information display module 920 can be also used for obtaining the file type of file, work as file type
For preset file type when, freeze operation asks and shows the first prompt message.
In one embodiment, information display module 920 can be also used for, when file is file in media library, passing through matchmaker
Body bank interface detects application identities whether in default set of applications.
In one embodiment, operation acquisition module 930 can be also used for working as is to the trigger action of the first prompt message
When the first trigger action, the file in temp directory is back to the position of original storage file, when to the first prompt message
When trigger action is the second trigger action, the file in temp directory is emptied.
In one embodiment, if operation acquisition module 930 can be also used for not getting in preset time range
To the trigger action of the first prompt message, the staged files to temp directory.
In one embodiment, operation acquisition module 930 can be also used for obtaining the number of file in the temp directory emptied
Amount shows the second prompt message when quantity reaches preset quantity.
In one embodiment, information display module 920 can be also used for receiving the default set of applications that high in the clouds issues, root
According to the local default set of applications of the default set of applications update in high in the clouds.
The division of modules is only used for for example, in other embodiments in above-mentioned document monitoring device, can will be literary
Part monitoring device is divided into different modules as required, to complete all or part of function of above-mentioned document monitoring device.
Specific about document monitoring device limits the restriction that may refer to above for file monitor method, herein not
It repeats again.Modules in above-mentioned document monitoring device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the document monitoring device provided in the embodiment of the present application can be the shape of computer program
Formula.The computer program can be run in terminal.The program module that the computer program is constituted is storable in the memory of terminal
On.When the computer program is executed by processor, described in realization the embodiment of the present application the step of method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the processor executes the step of file monitor method.
A kind of computer program product including instruction, when run on a computer so that computer executes file
Monitoring method.
The embodiment of the present application also provides a kind of electronic equipment.As shown in Figure 10, for convenience of description, it illustrates only and this
Apply for that the relevant part of embodiment, particular technique details are not disclosed, please refers to the embodiment of the present application method part.The electronics is set
Include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS for that can be
The arbitrary terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using electronic equipment as mobile phone
For:
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of electronic equipment provided by the embodiments of the present application.Reference chart
10, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit
1040, sensor 1050, voicefrequency circuit 1060, Wireless Fidelity (wireless fidelity, WiFi) module 1070, processor
The components such as 1080 and power supply 1090.It will be understood by those skilled in the art that handset structure shown in Fig. 10 does not constitute opponent
The restriction of machine may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1010 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station
After downlink information receives, handled to processor 1080;The data of uplink can also be sent to base station.In general, RF circuits include
But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 1010 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless
Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email,
Short message service (Short Messaging Service, SMS) etc..
Memory 1020 can be used for storing software program and module, and processor 1080 is stored in memory by operation
1020 software program and module, to execute various function application and the data processing of mobile phone.Memory 1020 can be led
To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function
Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can
Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1020 can wrap
High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories
Part or other volatile solid-state parts.
Input unit 1030 can be used for receiving the number or character information of input, and generates and set with the user of mobile phone 1000
It sets and the related key signals of function control inputs.Specifically, input unit 1030 may include touch panel 1031 and other
Input equipment 1032.Touch panel 1031, alternatively referred to as touch screen collect user on it or neighbouring touch operation (are compared
Such as user is using finger, stylus any suitable object or attachment on touch panel 1031 or near touch panel 1031
Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, touch panel 1031 can
Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine
The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched
Information is touched, and is converted into contact coordinate, then gives processor 1080, and order that processor 1080 is sent can be received and added
To execute.Furthermore, it is possible to realize touch panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
1031.In addition to touch panel 1031, input unit 1030 can also include other input equipments 1032.Specifically, other are inputted
Equipment 1032 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc.
Kind is a variety of.
Display unit 1040 can be used for showing information input by user or be supplied to user information and mobile phone it is each
Kind menu.Display unit 1040 may include display panel 1041.In one embodiment, liquid crystal display may be used
(Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode,
) etc. OLED forms configure display panel 1041.In one embodiment, touch panel 1031 can cover display panel 1041,
When touch panel 1031 detects on it or after neighbouring touch operation, processor 1080 is sent to determine touch event
Type is followed by subsequent processing device 1080 and provides corresponding visual output on display panel 1041 according to the type of touch event.Although
In Fig. 10, touch panel 1031 and display panel 1041 are to realize the input and input of mobile phone as two independent components
Function, but in some embodiments it is possible to touch panel 1031 and display panel 1041 are integrated and are realized the input of mobile phone
And output function.
Mobile phone 1000 may also include at least one sensor 1050, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ring
The light and shade of border light adjusts the brightness of display panel 1041, and proximity sensor can close display when mobile phone is moved in one's ear
Panel 1041 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer
The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal
Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer,
Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1060, loud speaker 1061 and microphone 1062 can provide the audio interface between user and mobile phone.Sound
The transformed electric signal of the audio data received can be transferred to loud speaker 1061 by frequency circuit 1060, by 1061 turns of loud speaker
It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1062, by voicefrequency circuit
Audio data is converted to after 1060 receptions, then by after the processing of audio data output processor 1080, can be sent out through RF circuits 1010
Another mobile phone is given, or audio data is exported to memory 1020 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1070
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Figure 10 is shown
WiFi module 1070, but it is understood that, and it is not belonging to must be configured into for mobile phone 1000, it can save as needed
Slightly.
Processor 1080 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone,
By running or execute the software program and/or module that are stored in memory 1020, and calls and be stored in memory 1020
Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.In one embodiment,
Processor 1080 may include one or more processing units.In one embodiment, processor 1080 can integrate application processor
And modem processor, wherein the main processing operation system of application processor, user interface and application program etc.;Modulatedemodulate
Processor is adjusted mainly to handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor
In 1080.
Mobile phone 1000 further includes the power supply 1090 (such as battery) powered to all parts, it is preferred that power supply can pass through
Power-supply management system and processor 1080 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system
The functions such as consumption management.
In one embodiment, mobile phone 1000 can also include camera, bluetooth module etc..
In the embodiment of the present application, the processor 1080 included by the electronic equipment executes the calculating of storage on a memory
The step of file monitor method is realized when machine program.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein,
Any reference to memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. a kind of file monitor method, the method includes:
The operation requests to file are obtained, the operation requests carry application identities;
When the application identities are not in default set of applications, freeze the operation requests, and show the first prompt message;
The trigger action to first prompt message is obtained, and executes action corresponding with the trigger action.
2. according to the method described in claim 1, it is characterized in that, freezing the operation requests, and display the first prompt letter
Before breath, the method further includes:
Obtain the file type of the file;
When the file type is preset file type, freezes the operation requests and show the first prompt message.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
When the file is file in media library, whether the application identities are detected in default application collection by media bank interface
In conjunction.
4. according to the method described in claim 1, it is characterized in that, the triggering obtained to first prompt message is grasped
Make, and executes action corresponding with the trigger action, including:
When the trigger action to first prompt message is the first trigger action, the file in temp directory is back to original
To store the position of the file;
When the trigger action to first prompt message is the second trigger action, the file in temp directory is emptied.
5. method according to claim 1 to 4, which is characterized in that the method further includes:
If not getting the trigger action to first prompt message in preset time range, the file is shifted to facing
When catalogue.
6. according to the method described in claim 4, it is characterized in that, the method further includes:
The quantity of file in the temp directory emptied described in acquisition;
When the quantity reaches preset quantity, the second prompt message is shown.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
The default set of applications that high in the clouds issues is received, according to the local default application collection of the default set of applications in high in the clouds update
It closes.
8. a kind of document monitoring device, which is characterized in that described device includes:
Acquisition request module, for obtaining the operation requests to file, the operation requests carry application identities;
Information display module, for when the application identities are not in default set of applications, freezing the operation requests, and show
Show the first prompt message;
Acquisition module is operated, for obtaining the trigger action to first prompt message, and is executed and the trigger action pair
The action answered.
9. a kind of electronic equipment, including memory and processor, the memory are stored with computer program, which is characterized in that
The processor realizes the step of any one of claim 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claim 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354951.7A CN108549576A (en) | 2018-04-19 | 2018-04-19 | File monitor method, apparatus, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354951.7A CN108549576A (en) | 2018-04-19 | 2018-04-19 | File monitor method, apparatus, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108549576A true CN108549576A (en) | 2018-09-18 |
Family
ID=63515666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810354951.7A Pending CN108549576A (en) | 2018-04-19 | 2018-04-19 | File monitor method, apparatus, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108549576A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111176708A (en) * | 2019-12-20 | 2020-05-19 | 南京领行科技股份有限公司 | SDK file processing method and device, electronic equipment and storage medium |
CN111566632A (en) * | 2018-09-29 | 2020-08-21 | 华为技术有限公司 | Operation control method and electronic equipment |
WO2023160208A1 (en) * | 2022-02-28 | 2023-08-31 | 荣耀终端有限公司 | Image deletion operation notification method, device, and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
CN104915599A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Application program monitoring method and terminal |
CN107423369A (en) * | 2017-07-01 | 2017-12-01 | 珠海格力电器股份有限公司 | A kind of method and device for handling file to be deleted |
CN107622203A (en) * | 2017-09-30 | 2018-01-23 | 广东欧珀移动通信有限公司 | Guard method, device, storage medium and the electronic equipment of sensitive information |
-
2018
- 2018-04-19 CN CN201810354951.7A patent/CN108549576A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
CN104915599A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Application program monitoring method and terminal |
CN107423369A (en) * | 2017-07-01 | 2017-12-01 | 珠海格力电器股份有限公司 | A kind of method and device for handling file to be deleted |
CN107622203A (en) * | 2017-09-30 | 2018-01-23 | 广东欧珀移动通信有限公司 | Guard method, device, storage medium and the electronic equipment of sensitive information |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111566632A (en) * | 2018-09-29 | 2020-08-21 | 华为技术有限公司 | Operation control method and electronic equipment |
CN111566632B (en) * | 2018-09-29 | 2023-11-03 | 华为技术有限公司 | Operation control method and electronic equipment |
CN111176708A (en) * | 2019-12-20 | 2020-05-19 | 南京领行科技股份有限公司 | SDK file processing method and device, electronic equipment and storage medium |
CN111176708B (en) * | 2019-12-20 | 2022-05-13 | 南京领行科技股份有限公司 | SDK file processing method and device, electronic equipment and storage medium |
WO2023160208A1 (en) * | 2022-02-28 | 2023-08-31 | 荣耀终端有限公司 | Image deletion operation notification method, device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106557330B (en) | Method and device for processing notification information of notification bar of mobile terminal system and mobile terminal | |
CN103327189B (en) | Method and device for uploading, browsing and deleting pictures | |
CN106484562B (en) | A kind of data transmission processing method and terminal device | |
CN104426963B (en) | The method and terminal of associated terminal | |
CN108549698A (en) | Document handling method, device, mobile terminal and computer readable storage medium | |
CN107562539B (en) | Application program processing method and device, computer equipment and storage medium | |
CN103501485B (en) | Push the method, apparatus and terminal device of application | |
CN103488403A (en) | Switching method and device for interface layout and mobile terminal | |
TW201911066A (en) | Folder sending method, sending terminal, receiving terminal and storage medium | |
CN112148579B (en) | User interface testing method and device | |
CN103631580B (en) | Method and device for generating theme icon | |
CN108241703B (en) | Webpage data transmission method and device | |
CN104301315A (en) | Method and device for limiting information access | |
CN110377235B (en) | Data processing method and device, mobile terminal and computer readable storage medium | |
CN107943417A (en) | Image processing method, terminal, computer-readable storage medium and computer program | |
CN108563754A (en) | Document handling method, device, mobile terminal and computer readable storage medium | |
CN104954159A (en) | Network information statistics method and device | |
CN108572908A (en) | information feedback method and device | |
CN104123276A (en) | Method, device and system for intercepting popup windows in browser | |
CN108549576A (en) | File monitor method, apparatus, electronic equipment and storage medium | |
CN106168905A (en) | Text handling method, device and mobile terminal in a kind of mobile terminal | |
CN107992822A (en) | Image processing method and device, computer equipment, computer-readable recording medium | |
CN108509788A (en) | Information sharing method and device, computer readable storage medium, terminal | |
CN107918529A (en) | Image processing method and device, computer equipment, computer-readable recording medium | |
CN107592409A (en) | Application control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180918 |
|
RJ01 | Rejection of invention patent application after publication |