CN110308871A - A kind of data managing method and device - Google Patents

A kind of data managing method and device Download PDF

Info

Publication number
CN110308871A
CN110308871A CN201910385836.0A CN201910385836A CN110308871A CN 110308871 A CN110308871 A CN 110308871A CN 201910385836 A CN201910385836 A CN 201910385836A CN 110308871 A CN110308871 A CN 110308871A
Authority
CN
China
Prior art keywords
target data
data
storage equipment
user terminal
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910385836.0A
Other languages
Chinese (zh)
Inventor
周智
吴汉中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Mingtutong Technology Co Ltd
Original Assignee
Chengdu Mingtutong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Mingtutong Technology Co Ltd filed Critical Chengdu Mingtutong Technology Co Ltd
Priority to CN201910385836.0A priority Critical patent/CN110308871A/en
Publication of CN110308871A publication Critical patent/CN110308871A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices

Abstract

The application proposes a kind of data managing method and device, it is related to technical field of data administration, by when user terminal is communicated with storage equipment foundation, if listening to user to instruct the operational order of target data to delete, target data is sent to storage equipment, so that after storage equipment stores the target data, it is that user terminal locally deletes the target data, compared with the prior art, make user terminal in delete target data, in storage device backup target data, it avoids accidentally deleting operation because of user, target data is caused to be difficult to be retrieved, and then promote the usage experience of user.

Description

A kind of data managing method and device
Technical field
This application involves technical field of data administration, in particular to a kind of data managing method and device.
Background technique
With paperless office popularize and the development of mobile phone photograph technology etc., personal user or enterprise customer The data volume of electronic bits of data more increase, such as the photo of mobile phone user's shooting, individual is up to tens MB (MByte, million words Section), greatly occupy the memory space of user.
In aforementioned applications scene, user generally can be by deleting some electronic bits of data for thinking may not be necessary, with clear Manage out the memory space of a part.But there is the possibility accidentally deleted when deleting electronic bits of data in user, in some instances it may even be possible to all not have once The deleted cleanings such as the picture seen either video.
If user's discovery in the future is when clearing up memory space, a part of important electronic bits of data is accidentally deleted, then is difficult to look for again Return the electronic bits of data being deleted.
Summary of the invention
The application's is designed to provide a kind of data managing method and device, can be avoided and accidentally deletes operation because of user, Target data is caused to be difficult to be retrieved.
To achieve the goals above, the embodiment of the present application the technical solution adopted is as follows:
In a first aspect, the embodiment of the present application provides a kind of data managing method, pass through local area network applied to storage equipment Network establishes the user terminal of communication, which comprises
Operational order of the monitoring users to target data;
If listening to the operational order to delete instruction, the target data is sent to the storage equipment, with The storage equipment is set to store the target data;
The target data is locally deleted in the user terminal.
Second aspect, the embodiment of the present application provide a kind of data administrator, pass through local area network applied to storage equipment Network establishes the user terminal of communication, and described device includes:
Processing module, for monitoring users to the operational order of target data;
Sending module, if the target data is sent to institute for listening to the operational order to delete instruction Storage equipment is stated, so that the storage equipment stores the target data;
The processing module is also used to, and locally deletes the target data in the user terminal.
The third aspect, the embodiment of the present application provide a kind of user terminal, and the user terminal includes memory, for storing one Or multiple programs;Processor.When one or more of programs are executed by the processor, above-mentioned data management side is realized Method.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer program, The computer program realizes above-mentioned data managing method when being executed by processor.
Compared with the existing technology, a kind of data managing method and device provided by the embodiments of the present application, by user terminal When being communicated with storage equipment foundation, if listening to user to the operational order of target data to delete instruction, target data is sent out Storage equipment is given, so as to be that user terminal locally deletes the target data, phase after the target data is automatically stored in storage equipment Than making user terminal in delete target data in the prior art, in storage device backup target data, the mistake because of user is avoided Operation is deleted, target data is caused to be difficult to be retrieved, and then promotes the usage experience of user.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of illustrative application scene figure of data managing method provided by the embodiments of the present application;
Fig. 2 is a kind of schematic diagram of user terminal provided by the embodiments of the present application;
Fig. 3 is a kind of schematic flow chart of data managing method provided by the embodiments of the present application;
Fig. 4 is another schematic flow chart of data managing method provided by the embodiments of the present application;
Fig. 5 is a kind of schematic flow chart of the sub-step of S303 in Fig. 3;
Fig. 6 is another schematic flow chart of data managing method provided by the embodiments of the present application;
Fig. 7 is another schematic flow chart of data managing method provided by the embodiments of the present application;
Fig. 8 is another schematic flow chart of data managing method provided by the embodiments of the present application;
Fig. 9 is a kind of schematic diagram of data administrator provided by the embodiments of the present application.
In figure: 100- user terminal;101- memory;102- processor;103- storage control;104- Peripheral Interface; 105- wireless communication unit;106- communication bus/signal wire;107- Landline communication unit;200- stores equipment;500- data pipe Manage device;501- processing module;502- sending module.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
With reference to the accompanying drawing, it elaborates to some embodiments of the application.In the absence of conflict, following Feature in embodiment and embodiment can be combined with each other.
Referring to Fig. 1, Fig. 1 is a kind of illustrative application scene figure of data managing method provided by the embodiments of the present application, In the embodiment of the present application, user terminal 100 is mutually established by local area network with storage equipment 200 and is communicated, such as by wired Connection, or pass through WLAN, Wi-Fi (WirelessFidelity, Wireless Fidelity), bluetooth (Bluetooth) etc. Mode establishes communication, to realize user terminal 100 and store the interaction of data between equipment 200.
A kind of data managing method provided by the embodiments of the present application is applied to user terminal 100 as shown in figure 1, the user terminal 100 In application program is installed, with storage equipment 200 relative to providing service, data pipe provided by the embodiments of the present application for user Reason method can be realized by the application program installed in the user terminal 100.
Referring to Fig. 2, Fig. 2 is a kind of schematic diagram of user terminal 100 provided by the embodiments of the present application, the user It is smart phone, PC (personal computer, PC), tablet computer, a number that end 100, which may be, but not limited to, Word assistant (personal digital assistant, PDA), wearable mobile terminal etc..
The user terminal 100 includes memory 101, storage control 103, at one or more (only showing one in figure) Manage device 102, Peripheral Interface 104, wireless communication unit 105, Landline communication unit 107 etc..These components pass through one or more Communication bus/signal wire 106 mutually communicates.
Memory 101 can be used for storing software program and mould group, such as data administrator provided by the embodiments of the present application 500 corresponding program instructions/mould group, the software program and mould group that processor 102 is stored in memory 101 by operation, Thereby executing various function application and data processing, such as data managing method provided by the embodiments of the present application.
Wherein, the memory 101 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..
Processor 102 can be a kind of IC chip, have signal handling capacity.Above-mentioned processor 102 can be with It is general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP), speech processor and video processor etc.;Can also be digital signal processor, specific integrated circuit, Field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components. It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can be Microprocessor or the processor 102 are also possible to any conventional processor etc..
Various input/output devices are couple processor 102 and memory 101 by Peripheral Interface 104.In some implementations In example, Peripheral Interface 104, processor 102 and storage control 103 can be realized in one single chip.The application other Some embodiments in, they can also be realized by independent chip respectively.
Wireless communication unit 105 for receiving and transmitting wireless signal, thus with communication network or other equipment into Row communication.
Landline communication unit 107 is used to carry out the friendship of communication and data by way of wired connection with other equipment Mutually.
It is appreciated that structure shown in Fig. 2 is only to illustrate, user terminal 100 may include than shown in Fig. 2 more or more Few component, or with the configuration different from shown in Fig. 2.Each component shown in Fig. 2 can use hardware, software or its group It closes and realizes.
Application scenarios as shown in connection with fig. 1, referring to Fig. 3, Fig. 3 is data managing method provided by the embodiments of the present application A kind of schematic flow chart, the data managing method are applied to user terminal 100 as shown in figure 1, method includes the following steps:
S301, operational order of the monitoring users to target data.
Target data is sent to storage equipment if listening to operational order to delete instruction by S303, so that storage is set Standby storage target data.
S305, in user terminal local delete target data.
User is when operating user terminal 100, such as browsing pictures, broadcasting video or broadcasting audio etc., and user terminal 100 is logical Monitoring users are crossed to the operational order of target data, corresponding operation is executed to target data.
For example, mobile phone operating system is used by monitoring using mobile phone as user terminal 100, picture as target data Instruction of family input, such as amplification picture, deletion picture, editing picture etc. execute corresponding operation to the picture that user chooses.
Wherein, if user terminal 100 listens to user to the operational order of target data to delete instruction, user terminal at this time 100 judgement users are intended to delete target data to clear up the local memory space of user terminal 100, then user terminal 100 is by the number of targets According to storage equipment 200 is sent to, so that storage equipment 200 stores the target data, and then should then at local delete of user terminal 100 Target data.
Such as it is above-mentioned using mobile phone as user terminal 100, the application scenarios using the picture chosen as target data in, if The operating system of mobile phone listens to user to the operational order of the picture chosen to delete instruction, then the operating system of mobile phone will The picture chosen is sent to storage equipment 200 and locally deletes after storing the picture chosen by storage equipment 200 then at mobile phone Except the picture chosen.
User can arbitrarily delete the local data of user terminal 100 in experience as a result, and be automatically stored to store Equipment 200, it is ensured that the data that user is locally stored in user terminal 100 will not because of the operational order executed in user terminal 100 and Being permanently deleted can not give for change, accomplish " user at will deletes, I helps you to deposit ", promote the experience of user.
It is worth noting that in the embodiment of the present application, user instructs the deletion of target data, and main purpose is It triggers target data unloading in the operation of storage equipment 200, in some other possible implementation of the embodiment of the present application, Target data is sent to storage equipment 200 executing S303, so that after storage equipment 200 stores target data, it can also not Execute S305, i.e., when user terminal 100 is established with storage equipment 200 and communicated, the not delete target data immediately of user terminal 100, But after being communicated with the storage disconnection of equipment 200, then at the local delete target data of user terminal 100.
Based on above-mentioned, it is seen then that a kind of data managing method provided by the embodiments of the present application, by being set in user terminal and storage When standby foundation communication, if listening to user to the operational order of target data to delete instruction, target data is sent to storage Equipment, so as to be that user terminal locally deletes the target data, compared to existing after the target data is automatically stored in storage equipment Technology makes user terminal in delete target data, in storage device backup target data, avoids accidentally deleting operation because of user, Cause target data to be difficult to be retrieved, and then promotes the usage experience of user.
Optionally, as a kind of possible implementation, in application scenarios as shown in Figure 1, user terminal 100 and storage Equipment 200 mutually establishes communication by local area network, for example passes through wired connection or WLAN, Wi-Fi, bluetooth Deng, without establishing communication by the way of internet (Internet), avoid storage equipment 200 internet is passed through by unauthorized person It is accessed, the data so as to cause the user stored in storage equipment 200 are stolen.
Due in data managing method provided by the embodiments of the present application, in order to avoid the user stored in storage equipment 200 Data by network attack etc., user terminal 100 using the local communications such as wired connection, WLAN mode and storage Equipment 200 establishes communication.
Therefore, if during user terminal 100 sends target data to storage equipment 200, user terminal 100 and storage The communication of equipment 200 is broken down, such as local area network blocking either wireline interface failure etc., causes target data not complete It is transmitted to storage equipment 200 entirely, but user terminal 100 has executed the operation of delete target data, just may cause target data It loses.
Therefore, optionally, on the basis of Fig. 3, referring to Fig. 4, Fig. 4 is data management side provided by the embodiments of the present application Another schematic flow chart of method, as a kind of possible implementation, before executing S305, the data managing method is also The following steps are included:
It is logical to determine that storage equipment has been disconnected with user terminal after the storage confirmation message for receiving storage equipment feedback by S304 Letter.
After target data is sent to storage equipment 200 by user terminal 100, not at once by the target of 100 local of user terminal Data are deleted, but wait the storage feedback storage confirmation message of equipment 200, storage confirmation message characterization storage equipment 200 complete storage target data.
Also, to avoid the process resource for occupying user terminal 100 when user is using user terminal 100 from removing delete target number According to therefore, after user terminal 100 receives the storage confirmation message that storage equipment 200 is fed back, user terminal 100 determines that storage is set Whether standby 200 disconnect with the communication connection of user terminal 100;If not disconnecting, do not execute temporarily in the local deletion mesh of user terminal 100 Mark the operation of data;But after determining that the communication connection of storage equipment 200 and user terminal 100 has disconnected, then executes S305 and exist The operation of the local delete target data of user terminal 100, to utilize user terminal when user terminal 100 is not used in user as far as possible 100 process resource delete target data, promote the experience of user.
When realizing S303, can be realized by the operational order that 100 native operating sys-tern of monitoring users end calls, If being instructed than the operational order for listening to 100 native operating sys-tern of user terminal calling to delete, it is determined that user is to number of targets According to operational order be delete instruction;Either, the operational order that external input device is sent is monitored, such as in PC Under application scenarios, if external connection keyboard is sent to the operational order of PC to delete instruction, it is determined that listen to user to mesh The operational order for marking data is to delete instruction.
However, due to the cause of some secret protections, there may be no permission prisons for user terminal 100 when realizing S303 The operational order of operating software is listened, such as in some chat softwares, if user wants to delete part chat record, but user terminal 100 do not monitor the permission of the chat software operational order, the chat record in the chat software that user deletes at this time, then Just it can not achieve automated back-up to storage equipment 200.
Therefore, optionally, referring to Fig. 5, Fig. 5 is a kind of schematic flow chart of the sub-step of S303 in Fig. 3, as one The possible implementation of kind, S303 includes following sub-step:
S303-1, the operation interface at monitoring users end.
S303-2, if there are setting identifications for operation interface, using setting identification in the region of operation interface as target area.
There is input instruction in target area if listening to user, it is determined that listen to user's input deletion and refer in S303-3 It enables.
As alternatively possible implementation, when stating S303 in realization, the operation at monitoring users end 100 can be passed through Interface, such as the interactive interface of mobile phone, and the setting identification for being used to indicate delete operation is locally stored in advance in user terminal 100, If user terminal 100 operation interface there are the setting identification, continue the setting identification being located at 100 operation interface of user terminal Region as target area, continue operational order of the monitoring users in operation interface;Exist if user terminal 100 listens to user There is input instruction in target area, then user terminal 100 determines the deletion instruction for listening to user's input.
Wherein, as a kind of possible implementation, which is the pattern that the printed words of setting are either set.
For example, illustratively, which is " deletion " printed words, if when 100 snoop-operations interface of user terminal, by cutting The picture at extract operation interface identifies the text in picture, determines there are " deletion " printed words in operation interface, then by " deletion " printed words In the region where operation interface as target area, and continue operational order of the monitoring users in operation interface;If monitoring When operational order in operation interface, being resolved to user should there are defeated target area where " deletion " printed words in operation interface Enter instruction, it is determined that listen to the deletion instruction of user's input.
It is worth noting that it is above-mentioned only using " deletion " as setting identification for, the sub-step of above-mentioned S303 is shown Example property explanation, in the embodiment of the present application, the pattern which can also either set for the printed words of other settings, than Such as " Delete ", " removing ", or it is used to indicate the pattern etc. for deleting function, it is similar to Microsoft " recovery vehicle " and either pacifies The pattern etc. of tall and erect " dustbin ", as long as the setting identification can be used to indicate that delete operation.
Based on above-mentioned, it is seen then that a kind of data managing method provided by the embodiments of the present application, using the operation at monitoring users end Interface, and the target area in the operation interface by judging user terminal where setting identification is with the presence or absence of the side of input instruction Formula, it is determined whether the deletion instruction for listening to user's input can realize monitoring users on the basis of not needing any permission Operational order, it is ensured that can listen to user deletion instruction.
In application scenes, if the data that user terminal 100 stores are more, such as the picture that stores in mobile phone of user compared with It is more, if user wants large batch of deletion data at this time, after needing the choosing an of rule, then deleted.
Such as in the application scenarios using mobile phone as user terminal 100, if user wants what deletion 50 was shot on the same day Picture then needs to click 50 times, to choose 50 pictures to be deleted, operates then in conjunction with " deletion " to 50 photographs chosen Piece is deleted.
However, in aforementioned applications scene, due to needing to choose a sheet by a sheet to 50 photos, cause user need to spend compared with More time repeats to do same part thing (choosing picture), and it is time-consuming and laborious to delete a large amount of pictures.
For this purpose, optionally, on the basis of Fig. 3, referring to Fig. 6, Fig. 6 is data management side provided by the embodiments of the present application Another schematic flow chart of method, as a kind of possible implementation, before S301, this method further includes following step It is rapid:
S300a obtains target data according to the data search condition that user inputs.
In the embodiment of the present application, can using by user terminal 100 receive user input data search condition by the way of, The data search condition that user terminal 100 is inputted according to user, in all data that user terminal 100 is locally stored, all satisfactions The data of the received data search condition constitute target data, and then execute S301 again with the target data.
For example, user can pass through input setting in the application scenarios that above-mentioned user deletes the photo of mobile phone storage Date-time " 2017.06.07 " is used as data search condition;Correspondingly, mobile phone terminal is according to data search condition " 2017.06.07 ", choosing all date-times is the photo of " 2017.06.07 ", as target data;If user terminal as a result, 100, which listen to user, deletes instruction to the target data input chosen, and all date-times are then by user terminal 100 The photo of " 2017.06.07 " is sent to storage equipment 200, and is in the local all date-times of deletion of user terminal 100 The photo of " 2017.06.07 ".
Either, user is searched by the date-time section " 2017.08.13-2017.08.15 " of input setting as data Rope condition;Correspondingly, then mobile phone terminal is according to data search condition " 2017.08.13-2017.08.15 ", when choosing all dates Between be located at period " 2017.08.13-2017.08.15 " in all photos, as target data.
In some other possible application scenarios of the embodiment of the present application, can also by way of mass customized search, Obtain target data.
For example, as alternatively possible implementation, referring to Fig. 7, Fig. 7 is data pipe provided by the embodiments of the present application Another schematic flow chart of reason method, as alternatively possible implementation, before S301, this method further include with Lower step:
S300b obtains the target data according to the setting search condition of preparatory typing.
It in the embodiment of the present application, can also be using by the preparatory typing of user as alternatively possible implementation Search condition is set, according to the setting search condition of preparatory typing, traverse user end 100 is locally stored all user terminal 100 Data using all data for meeting the setting search condition as target data, and then execute S301 again with the target data.
For example, using the strategy deleted is customized, it is whenever meeting preset condition, then local according to user terminal 100 is defaulted in Data search condition, all data of the data search condition will be met as target data.
For example, by taking periodic cleaning photo as an example, user is settable periodically monthly to be cleared up in some possible application scenarios Once, when the time reaching last day monthly, for example on March 31st, 2019 will in the time of setting, such as 19:00 All photos are chosen on 2 28th, 2019 19:00-2019 19:00 periods March 31, as target data, and from It moves after being sent to storage equipment 200, is locally deleted in user terminal 100 automatically.
Data to send convenient for storage equipment 200 to user terminal 100 are managed, referring to Fig. 8, Fig. 8 is the application Embodiment provide data managing method another schematic flow chart, by target data be sent to storage equipment 200 it Before, the data managing method can with the following steps are included:
S400 obtains target data according to the data search condition that user inputs.
S401, operational order of the monitoring users to target data.
S403 adds target labels if listening to operational order to delete instruction for target data, to obtain new mesh Mark data.
New target data is sent to storage equipment by S404, so that storage equipment stores new target data.
S405, in user terminal local delete target data.
In the embodiment of the present application, it if user terminal 100 is listened to the operational order of target data to delete instruction, uses Before target data to be sent to storage equipment 200, user terminal 100 is that target data adds target labels at family end 100, with To new target data, to make user terminal 100 when target data is sent to storage equipment 200, by the new number of targets Equipment 200 is stored according to being sent to.
Optionally, as a kind of possible implementation, the target labels that user terminal 100 adds include that target data is corresponding Temporal information, location information, id information, status information, keyword message, QQ number code, wechat number, contact details (such as At least one of mail, telephone number, blog address etc.) and signing messages.
Illustratively, below using mobile phone as user terminal 100, mobile phone terminal store photo as target data, and with when Between information as target labels for, above-mentioned S403 is further explained.
Mobile phone terminal by the shooting time of the photo and is incited somebody to action when determining a certain photo as the target data to be deleted The previous moment that photo is sent to storage equipment 200 is used as the target labels of the picture, and by obtained target labels and is somebody's turn to do After picture is compressed together, it is sent to storage equipment 200, so that storage equipment 200 carries out the picture according to target labels Classification storage;Correspondingly, user can also pass through search mesh through mobile phone terminal when being intended to give the picture for change from storage equipment 200 Label is marked, the picture is obtained, it is convenient and efficient.
It is worth noting that including multiple in target data during the above-mentioned addition target labels for target data It can be the unified addition target labels of this entirety of target data when data;Or each data in target data are equal Target data is added, depending on specific application scenarios, the embodiment of the present application is not construed as limiting this for this.
Based on inventive concept identical with the embodiment of above-mentioned data managing method, referring to Fig. 9, Fig. 9 is that the application is real A kind of schematic diagram of the data administrator 500 of example offer is applied, which is applied to as shown in figure 1 User terminal 100, the data administrator 500 include processing module 501 and sending module 502.
Processing module 501 is for monitoring users to the operational order of target data;
If sending module 502 deletes instruction for listening to operational order, target data is sent to storage equipment, So that storage equipment stores target data;
Processing module 501 is also used in user terminal local delete target data.
Optionally, as a kind of possible implementation, processing module 501 refers to the operation of target data in monitoring users When enabling, it is specifically used for:
The operation interface at monitoring users end;
If there are setting identifications for operation interface, using setting identification in the region of operation interface as target area, wherein set Calibration, which is known, is used to indicate delete operation;
There is input instruction in target area if listening to user, it is determined that listen to user and input deletion instruction.
Optionally, as a kind of possible implementation, setting identification is the pattern that the printed words of setting are either set.
Optionally, as a kind of possible implementation, processing module 501 user terminal local delete target data it Before, processing module 501 is also used to:
After the storage confirmation message for receiving storage equipment feedback, determine that storage equipment is communicated with whether user terminal disconnects; Wherein, storage confirmation message characterization storage equipment completes storage target data;
If it is determined that having disconnected, then in user terminal local delete target data.
Optionally, as a kind of possible implementation, processing module 501 refers to the operation of target data in monitoring users Before enabling, processing module 501 is also used to:
According to the data search condition that user inputs, target data is obtained, wherein target data is searched by all data that meet The data of rope condition are constituted.
Optionally, as a kind of possible implementation, processing module 501 refers to the operation of target data in monitoring users Before enabling, processing module 501 is also used to:
According to the setting search condition of preparatory typing, target data is obtained, wherein target data is searched by the setting of all satisfactions The data of rope condition are constituted.
Optionally, as a kind of possible implementation, target data is sent to storage equipment in sending module 502, So that processing module 501 is also used to before storage equipment storage target data:
Target labels are added for target data, to obtain new target data;
So that target data is being sent to storage equipment by sending module 502, so that when storage equipment storage target data, It is specifically used for:
New target data is sent to storage equipment, so that storage equipment stores new number of targets according to target labels According to.
Optionally, as a kind of possible implementation, target labels include the corresponding temporal information of target data, position At least one of information, id information, status information, keyword message and signing messages.
Optionally, pass through wired or wireless LAN as a kind of possible implementation, user terminal and storage equipment Mode establishes communication.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown According to the device of the embodiment of the present application, the architecture, function and operation in the cards of method and computer program product. In this regard, each box in flowchart or block diagram can represent a part of a module, section or code, the mould A part of block, program segment or code includes one or more executable instructions for implementing the specified logical function.Also it answers When note that function marked in the box can also be to be different from being marked in attached drawing in some implementations as replacement The sequence of note occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite Sequence execute, this depends on the function involved.It is also noted that each box in block diagram and or flow chart and The combination of box in block diagram and or flow chart can use the dedicated hardware based system for executing defined function or movement System is to realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module in the embodiment of the present application can integrate one independent part of formation together, It can be modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute the embodiment of the present application the method all or part of the steps.And it is preceding The storage medium stated includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), magnetic or disk.
In conclusion a kind of data managing method provided by the embodiments of the present application and device, by user terminal and storage When equipment establishes communication, if listening to user to the operational order of target data to delete instruction, target data is sent to and is deposited Equipment is stored up, so as to be that user terminal locally deletes the target data, compared to existing skill after storage equipment stores the target data Art makes user terminal in delete target data, in storage device backup target data, avoids accidentally deleting operation because of user, lead It causes target data to be difficult to be retrieved, and then promotes the usage experience of user.
Also, the operation interface at monitoring users end is also used, and setting identification in the operation interface by judging user terminal Mode of the target area at place with the presence or absence of input instruction, it is determined whether listen to the deletion instruction of user's input, Neng Gou The operational order that monitoring users are realized on the basis of any permission is not needed, it is ensured that the deletion instruction of user can be listened to.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.

Claims (10)

1. a kind of data managing method, which is characterized in that establish the user communicated by local area network applied to storage equipment End, which comprises
Operational order of the monitoring users to target data;
If listening to the operational order to delete instruction, the target data is sent to the storage equipment, so that institute It states storage equipment and stores the target data;
The target data is locally deleted in the user terminal.
2. the method as described in claim 1, which is characterized in that step of the monitoring users to the operational order of target data Suddenly, comprising:
Monitor the operation interface of the user terminal;
If there are setting identifications for the operation interface, using the setting identification in the region of the operation interface as target area Domain, wherein the setting identification is used to indicate delete operation;
There is input instruction in the target area if listening to user, it is determined that listen to user and input the deletion instruction.
3. method according to claim 2, which is characterized in that the setting identification is the figure that the printed words of setting are either set Sample.
4. the method as described in claim 1, which is characterized in that in the step of user terminal locally deletes the target data Before, the method also includes:
After the storage confirmation message for receiving the storage equipment feedback, determine whether the storage equipment breaks with the user terminal Open letter;Wherein, the storage confirmation message characterizes the storage equipment and completes to store the target data;
If it is determined that having disconnected, then execute the step of the user terminal locally deletes the target data.
5. the method as described in claim 1, which is characterized in that in the monitoring users to the step of the operational order of target data Before rapid, the method also includes:
According to the data search condition that user inputs, the target data is obtained, wherein the target data meets institute by all The data for stating data search condition are constituted.
6. the method as described in claim 1, which is characterized in that in the monitoring users to the step of the operational order of target data Before rapid, the method also includes:
According to the setting search condition of preparatory typing, the target data is obtained, wherein the target data meets institute by all The data for stating setting search condition are constituted.
7. the method as described in claim 1 or 5 or 6, which is characterized in that the target data is sent to described deposit described Equipment is stored up, so that before the step of storage equipment stores the target data, the method also includes:
Target labels are added for the target data, to obtain new target data;
It is described that the target data is sent to the storage equipment, so that the storage equipment stores the step of the target data Suddenly, comprising:
The new target data is sent to the storage equipment, so that the storage equipment is stored according to the target labels The new target data.
8. the method for claim 7, which is characterized in that the target labels include the target data corresponding time In information, location information, id information, status information, keyword message, QQ number code, wechat number, contact details and signing messages At least one of.
9. the method as described in claim 1, which is characterized in that the user terminal passes through wired or wireless with the storage equipment The mode of local area network establishes communication.
10. a kind of data administrator, which is characterized in that establish the user communicated by local area network applied to storage equipment End, described device include:
Processing module, for monitoring users to the operational order of target data;
Sending module, if the target data is sent to described deposit for listening to the operational order to delete instruction Equipment is stored up, so that the storage equipment stores the target data;
The processing module is also used to, and locally deletes the target data in the user terminal.
CN201910385836.0A 2019-05-09 2019-05-09 A kind of data managing method and device Pending CN110308871A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910385836.0A CN110308871A (en) 2019-05-09 2019-05-09 A kind of data managing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910385836.0A CN110308871A (en) 2019-05-09 2019-05-09 A kind of data managing method and device

Publications (1)

Publication Number Publication Date
CN110308871A true CN110308871A (en) 2019-10-08

Family

ID=68074640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910385836.0A Pending CN110308871A (en) 2019-05-09 2019-05-09 A kind of data managing method and device

Country Status (1)

Country Link
CN (1) CN110308871A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750198A (en) * 2011-04-20 2012-10-24 腾讯科技(深圳)有限公司 Backup method and system of social networking site content
WO2014000255A1 (en) * 2012-06-29 2014-01-03 宇龙计算机通信科技(深圳)有限公司 Terminal and management method of notification messages
US20140181575A1 (en) * 2012-12-21 2014-06-26 Microsoft Corporation Data error detection and correction using hash values
CN105868049A (en) * 2015-12-15 2016-08-17 乐视移动智能信息技术(北京)有限公司 Data processing method and apparatus
CN106777289A (en) * 2016-12-29 2017-05-31 深圳市捷顺科技实业股份有限公司 A kind of file search method and device
CN106815283A (en) * 2016-12-02 2017-06-09 乐视控股(北京)有限公司 Data processing method, device and electronic equipment
CN106934052A (en) * 2017-03-16 2017-07-07 维沃移动通信有限公司 A kind of media text handling method and mobile terminal
CN107220364A (en) * 2017-06-07 2017-09-29 深圳天珑无线科技有限公司 A kind of method and device of information processing

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750198A (en) * 2011-04-20 2012-10-24 腾讯科技(深圳)有限公司 Backup method and system of social networking site content
WO2014000255A1 (en) * 2012-06-29 2014-01-03 宇龙计算机通信科技(深圳)有限公司 Terminal and management method of notification messages
US20140181575A1 (en) * 2012-12-21 2014-06-26 Microsoft Corporation Data error detection and correction using hash values
CN105868049A (en) * 2015-12-15 2016-08-17 乐视移动智能信息技术(北京)有限公司 Data processing method and apparatus
CN106815283A (en) * 2016-12-02 2017-06-09 乐视控股(北京)有限公司 Data processing method, device and electronic equipment
CN106777289A (en) * 2016-12-29 2017-05-31 深圳市捷顺科技实业股份有限公司 A kind of file search method and device
CN106934052A (en) * 2017-03-16 2017-07-07 维沃移动通信有限公司 A kind of media text handling method and mobile terminal
CN107220364A (en) * 2017-06-07 2017-09-29 深圳天珑无线科技有限公司 A kind of method and device of information processing

Similar Documents

Publication Publication Date Title
CN101404665B (en) Method and apparatus for processing data
CN101404789B (en) Method and apparatus for processing data
US9164748B2 (en) Information backup method and apparatus
CN107395697A (en) Push Channel Selection, information push method, device and equipment, computer-readable recording medium
CN102004994B (en) Online product recommendation and selection method, device and system
CN112311612B (en) Information construction method and device and storage medium
CN102769640B (en) The update method of user profile, server and system
CN105989144A (en) Notification message management method, apparatus and system as well as terminal device
JP5373818B2 (en) Centralized social network response tracking
CN108134696A (en) A kind of micro services configuration update method and device
CN101897167A (en) System and method for customized sharing of multimedia content in a communications network
CN101621816A (en) System and method for monitoring background server of mobile terminal
CN105045911B (en) Label generating method and equipment for user to mark
CN106095789A (en) A kind of message subscribing managing device and method
CN112468409A (en) Access control method, device, computer equipment and storage medium
CN103873519A (en) Data synchronization method, client end, server, terminal and system
US11531689B2 (en) Information processing apparatus, information processing method, and non-transitory computer readable medium
CN103490978A (en) Terminal, server and message monitoring method
CN104991949B (en) Mobile terminal and its file management system and method
CN110308871A (en) A kind of data managing method and device
KR101421666B1 (en) Method for providing file aging service
CN108886631B (en) Electronic data inspection system, electronic data inspection method, and storage medium
US20150227556A1 (en) Information terminal device and storage service use method
JP5301499B2 (en) Transfer device, transfer method, and transfer program
JP2020201812A (en) Management system, server device, control method, and control program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191008

RJ01 Rejection of invention patent application after publication