CN113342756A - Temporary file occupation storage method, client and computing device - Google Patents

Temporary file occupation storage method, client and computing device Download PDF

Info

Publication number
CN113342756A
CN113342756A CN202110751279.7A CN202110751279A CN113342756A CN 113342756 A CN113342756 A CN 113342756A CN 202110751279 A CN202110751279 A CN 202110751279A CN 113342756 A CN113342756 A CN 113342756A
Authority
CN
China
Prior art keywords
value
target
detection value
temporary file
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110751279.7A
Other languages
Chinese (zh)
Inventor
张松
水渠成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Uniontech Software Technology Co Ltd
Original Assignee
Uniontech Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Uniontech Software Technology Co Ltd filed Critical Uniontech Software Technology Co Ltd
Priority to CN202110751279.7A priority Critical patent/CN113342756A/en
Publication of CN113342756A publication Critical patent/CN113342756A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems

Abstract

The invention discloses a temporary file occupying storage method, which is executed in computing equipment and comprises the following steps: receiving a request of a user, and determining a target temporary file to be stored; determining a current detection value based on the first step value; checking whether a digital name corresponding to the current detection value is included in the digital names of the currently stored temporary files; if yes, determining a next detection value based on the current detection value and the first further value, and checking whether a digital name corresponding to the next detection value is included in the digital names of the currently stored temporary files; if not, determining that at least one target value exists between the last detected value and the current detected value; and naming the target temporary file based on the determined target numerical value so as to store the target temporary file based on the numerical name corresponding to the target numerical value. The invention also discloses a corresponding mailbox client and a corresponding computing device.

Description

Temporary file occupation storage method, client and computing device
Technical Field
The invention relates to the technical field of computers and the Internet, in particular to a temporary file occupation storage method, a client and computing equipment.
Background
Mailbox clients are important office software for enterprises and individuals. In the business logic of the mailbox, a large number of temporary files need to be stored, for example, the temporary files need to be stored in scenes of storing drafts, importing mails and the like. After the temporary file is stored, the mailbox background processing is waited, and the temporary file is deleted after the corresponding processing is finished in the background. The time when the mailbox background finishes processing and the time when the temporary files are deleted are not determined, and the deletion is performed according to the sequence of the temporary files in most cases. It should be noted that the temporary files are named in a predetermined format including numbers, for example, the name of the first temporary mail is 100001.eml (the name of the format is hereinafter referred to as "number name"), the name of the second mail is 100002.eml, and so on. When the stored temporary file is not deleted, the digital name is in a position occupying state; when the previously stored temporary file is deleted, the number name used by the previous temporary file is in a vacant state.
For example, when the first mail named 100001.eml is deleted, the number name 100001.eml is in a vacant state, and from the program internal logic, when a new temporary file is stored next time, it is desirable that the new temporary file can still be named 100001.eml, and it is not desirable that the number in the mail name is increased indefinitely.
If the above naming is to be implemented, according to the prior art solution, every time a new temporary file is stored, it is checked in order, starting from the first digit, i.e. it is checked 100001,100002 in turn whether it is occupied. When there is a digit in the empty state, a new temporary file is named based on the number pair of the empty so as to insert the new temporary file. However, with this scheme, when the number of temporary files to be stored is large, for example, more than 1 ten thousand, the efficiency of searching for empty spaces is significantly reduced, resulting in a long time required for storing each temporary file.
Therefore, a temporary file occupying storage method is needed to improve the storage efficiency of the mailbox on the temporary file and solve the problems in the technical scheme.
Disclosure of Invention
Therefore, the present invention provides a temporary file placeholder storage method and a client, in an attempt to solve or at least alleviate the above existing problems.
According to one aspect of the present invention, there is provided a temporary file placeholder storage method, executed in a computing device, the temporary file adapted to be stored based on a numeric name in a predetermined format, comprising the steps of: receiving a request of a user, and determining a target temporary file to be stored; determining a current detection value based on the first step value; checking whether a digital name corresponding to the current detection value is included in the digital names of the currently stored temporary files; if yes, determining a next detection value based on the current detection value and the first further value, and checking whether a digital name corresponding to the next detection value is included in the digital names of the currently stored temporary files; if not, determining that at least one target value exists between the last detected value and the current detected value; and naming the target temporary file based on the determined target numerical value so as to store the target temporary file based on the numerical name corresponding to the target numerical value.
Optionally, in the temporary file occupancy storage method according to the present invention, if a number name corresponding to the current detected value is not included in the number names of the currently stored temporary files, the method further includes the steps of: determining a second detection value based on the last detection value and the second step value; checking whether the number name of the temporary file stored currently comprises a number name corresponding to the secondary detection value; if yes, determining a next secondary detection value based on the secondary detection value and the second step value, and checking whether a digital name corresponding to the next secondary detection value is included in the digital names of the currently stored temporary files; and if not, determining that at least one target value exists between the last detection value and the second-level detection value, so as to name and store the target temporary file based on the determined target value.
Optionally, in the temporary file occupancy storage method according to the present invention, the step of determining the current detection value based on the first step value includes: and determining the sum of the last detection value and the first step value as the current detection value.
Optionally, in the temporary file occupancy storage method according to the present invention, before determining the current detection value based on the first step value, the method includes the steps of: determining an initial value; checking whether a numerical name corresponding to the initial numerical value is included in numerical names of the currently stored temporary files.
Optionally, in the temporary file occupancy storage method according to the present invention, the step of determining the target temporary file to be saved includes: receiving a request for storing a draft mail, and determining the draft mail as a target temporary file; or receiving a request for importing the mail and determining the imported mail as a target temporary file.
Optionally, in the temporary file occupancy storage method according to the present invention, the first step value is 100, and the second step value is 10.
Optionally, in the temporary file occupancy storage method according to the present invention, the temporary file is an eml file; the predetermined format of the numerical name is XXXXXXX.
Optionally, in the temporary file placeholder storage method according to the present invention, the computing device includes a mailbox client, and the method is adapted to be executed at the mailbox client.
According to an aspect of the present invention, there is provided a client, including: the receiving module is suitable for receiving a request of a user and determining a target temporary file to be stored; the checking module is suitable for determining a current detection value based on the first stepping value and checking whether a digital name corresponding to the current detection value is included in the digital names of the currently stored temporary files; if yes, determining a next detection value based on the current detection value and the first further value, and checking whether a digital name corresponding to the next detection value is included in the digital names of the currently stored temporary files; if not, determining that at least one target value exists between the last detected value and the current detected value; and the storage module is suitable for naming the target temporary file based on the determined target numerical value so as to store the target temporary file based on the numerical name corresponding to the target numerical value.
According to an aspect of the present invention, there is provided a computing device comprising: at least one processor; and a memory storing program instructions, wherein the program instructions are configured to be executed by the at least one processor, the program instructions comprising instructions for performing the temporary file placeholder storage method as described above.
According to an aspect of the present invention, there is provided a readable storage medium storing program instructions which, when read and executed by a computing device, cause the computing device to perform the method as described above.
According to the technical scheme, the invention provides the temporary file occupation storage method and the client, the unoccupied number names can be quickly found by adopting a step retrieval mode, and the temporary file is named based on the unoccupied number names, so that the temporary file occupation storage is realized. Therefore, when the number of temporary files stored in the mailbox is large, the efficiency of searching the vacancy can be obviously improved, and the occupied storage time of the temporary files is saved.
Drawings
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings, which are indicative of various ways in which the principles disclosed herein may be practiced, and all aspects and equivalents thereof are intended to be within the scope of the claimed subject matter. The above and other objects, features and advantages of the present disclosure will become more apparent from the following detailed description read in conjunction with the accompanying drawings. Throughout this disclosure, like reference numerals generally refer to like parts or elements.
FIG. 1 shows a schematic diagram of a computing device 100, according to one embodiment of the invention;
FIG. 2 illustrates a flow diagram of a temporary file placeholder storage method 200, according to an embodiment of the invention;
fig. 3 shows a schematic diagram of a client 300 according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a schematic block diagram of an example computing device 100.
As shown in FIG. 1, in a basic configuration 102, a computing device 100 typically includes a system memory 106 and one or more processors 104. A memory bus 108 may be used for communication between the processor 104 and the system memory 106.
Depending on the desired configuration, the processor 104 may be any type of processing, including but not limited to: a microprocessor (UP), a microcontroller (UC), a digital information processor (DSP), or any combination thereof. The processor 104 may include one or more levels of cache, such as a level one cache 110 and a level two cache 112, a processor core 114, and registers 116. The example processor core 114 may include an Arithmetic Logic Unit (ALU), a Floating Point Unit (FPU), a digital signal processing core (DSP core), or any combination thereof. The example memory controller 118 may be used with the processor 104, or in some implementations the memory controller 118 may be an internal part of the processor 104.
Depending on the desired configuration, system memory 106 may be any type of memory, including but not limited to: volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.), or any combination thereof. System memory 106 may include an operating system 120, one or more applications 122, and program data 124. In some implementations, the application 122 can be arranged to execute instructions on an operating system with program data 124 by one or more processors 104.
Computing device 100 also includes a storage device 132, storage device 132 including removable storage 136 and non-removable storage 138.
Computing device 100 may also include a storage interface bus 134. The storage interface bus 134 enables communication from the storage devices 132 (e.g., removable storage 136 and non-removable storage 138) to the basic configuration 102 via the bus/interface controller 130. At least a portion of the operating system 120, applications 122, and data 124 may be stored on removable storage 136 and/or non-removable storage 138, and loaded into system memory 106 via storage interface bus 134 and executed by the one or more processors 104 when the computing device 100 is powered on or the applications 122 are to be executed.
Computing device 100 may also include an interface bus 140 that facilitates communication from various interface devices (e.g., output devices 142, peripheral interfaces 144, and communication devices 146) to the basic configuration 102 via the bus/interface controller 130. The example output device 142 includes a graphics processing unit 148 and an audio processing unit 150. They may be configured to facilitate communication with various external devices, such as a display or speakers, via one or more a/V ports 152. Example peripheral interfaces 144 may include a serial interface controller 154 and a parallel interface controller 156, which may be configured to facilitate communication with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device) or other peripherals (e.g., printer, scanner, etc.) via one or more I/O ports 158. An example communication device 146 may include a network controller 160, which may be arranged to facilitate communications with one or more other computing devices 162 over a network communication link via one or more communication ports 164.
A network communication link may be one example of a communication medium. Communication media may typically be embodied by computer readable instructions, data structures, program modules, and may include any information delivery media, such as carrier waves or other transport mechanisms, in a modulated data signal. A "modulated data signal" may be a signal that has one or more of its data set or its changes made in a manner that encodes information in the signal. By way of non-limiting example, communication media may include wired media such as a wired network or private-wired network, and various wireless media such as acoustic, Radio Frequency (RF), microwave, Infrared (IR), or other wireless media. The term computer readable media as used herein may include both storage media and communication media.
Computing device 100 may be implemented as a personal computer including both desktop and notebook computer configurations. Of course, computing device 100 may also be implemented as part of a small-form factor portable (or mobile) electronic device such as a cellular telephone, a digital camera, a Personal Digital Assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset, an application specific device, or a hybrid device that include any of the above functions. And may even be implemented as a server, such as a file server, a database server, an application server, a WEB server, and so forth. The embodiments of the present invention are not limited thereto.
In an embodiment consistent with the invention, computing device 100 is configured to perform a temporary file placeholder storage method 200 consistent with the invention. The application 122 of the computing device 100 includes a plurality of program instructions for executing the temporary file placeholder storage method 200 of the present invention, and the program instructions can be read and executed by the computing device 100, so that the computing device 100 executes the temporary file placeholder storage method 200 according to the present invention.
In one embodiment, the application 122 of the computing device 100 includes a client 300 therein, and the client 300 contains program instructions for executing the temporary file placeholder storage method 200 of the present invention, such that the temporary file placeholder storage method 200 of the present invention may be executed at the client 300. It should be noted that the present invention is not limited to the specific kind of client 300.
In one embodiment, client 300 may be implemented as a mailbox client, for example.
FIG. 2 shows a flow diagram of a temporary file placeholder storage method 200, according to an embodiment of the invention. Temporary file placeholder storage method 200 is suitable for execution in a computing device (e.g., computing device 200 described above), and may be specifically executed at client 300 of computing device 200.
In one embodiment, client 300 may be implemented as a mailbox client, however, a client performing method 200 of the present invention is not limited to a mailbox client.
It should be noted that, in the embodiment according to the present invention, the temporary file may be stored based on a numerical name in a predetermined format, and specifically, when the client 300 stores the temporary file, the temporary file may be named by using a currently unoccupied numerical value, so that the file name of the temporary file is the numerical name, and the temporary file is stored in a corresponding location based on the numerical name. In this way, as for the plurality of temporary files that have been currently stored, the plurality of temporary files are stored in an arrangement based on the order of the respective numerical names.
As shown in fig. 2, the method 200 begins at step S210. In step S210, a request from a user is received, and one or more target temporary files to be saved are determined according to the request from the user. According to the embodiment of the present invention, when storing the target temporary file, it is necessary to search the numerical name of the vacant position (i.e., the numerical name corresponding to the currently unoccupied numerical value) to name the target temporary file, as the numerical name of the target temporary file, so as to store the target temporary file based on the numerical name.
In one embodiment, when a user requests to save a draft mail or requests to import a mail, it may be determined that a corresponding target temporary file needs to be saved. Specifically, in response to a request of a user to save a draft mail, determining the draft mail as a target temporary file to be saved; or, in response to a request for the user to import the mail, the imported mail is determined as a target temporary file to be saved.
Subsequently in step S220, a current detection value is determined based on the first further value.
It should be noted that, according to the technical solution of the present invention, when looking up the numerical name of the empty state, it is checked in a step-by-step manner whether the numerical value is occupied by the currently stored temporary file, and the numerical value to be checked is called a detection numerical value. Here, by checking the number name used by the currently stored temporary file, it may be determined whether the detection value is occupied by the currently stored temporary file according to whether the number name of the currently stored temporary file includes the number name corresponding to the detection value, and if the number name includes the number name corresponding to the detection value, it indicates that the number name corresponding to the detection value is in an occupied state; if the number name corresponding to the detection value is not included, the number name corresponding to the detection value is in a vacant state, and the vacant number can be used for naming the target temporary file to serve as the number name of the target temporary file, and enabling the target temporary file to be inserted into a corresponding position in the current temporary file to be stored based on the number name.
In addition, in the embodiment according to the present invention, a plurality of step values may be set according to a requirement for actually storing the temporary file, and the first step value is a one-step value according to a case where the temporary file is first checked and no empty bit is checked. It should be noted that the first step value is determined according to the number of temporary files currently stored by the client 300, and the present invention is not limited to a specific value of the first step value.
In one embodiment, the first step value is 10nWherein n is not less than 1 and n is an integer. For example, the first step value may be 10,100,1000 … ….
For example, when the first step value is 100, the detected value is detected once per step of 100, that is, each detected value determined based on the first step value is increased by 100 on the basis of the last detected value. The current detected value is determined based on the first step value, i.e. the sum of the last detected value and the first step value is determined as the current detected value.
Subsequently, in step S230, it is checked whether or not a numerical name corresponding to the currently detected numerical value is included in the numerical names of the currently stored temporary files.
If a number name corresponding to the currently detected value is included, it may be determined that the number name corresponding to the currently detected value is occupied, and values between the currently detected value and the last detected value are considered to be occupied here. In this case, step S240 is performed. In step S240, a next detected value is determined based on the current detected value and the first further value, and it is checked whether a number name corresponding to the next detected value is included in the number names of the currently stored temporary file until it is checked that the number name corresponding to the detected value is in a vacant state and is unoccupied (i.e., until it is checked that the number name corresponding to the next detected value is not included in the number names of the currently stored temporary file). Here, the next detected value may be determined by the sum of the current detected value and the first further value.
If the number name corresponding to the current detected value is not included (indicating that the number name corresponding to the current detected value is in a vacant state and is not occupied), step S250 is performed. In step S250, it is determined that at least one target value exists between the last detected value and the current detected value. The target value is an unoccupied, empty-state value, so that the number name corresponding to the target value can be used by the target temporary file. It is understood that at least the current detected value may be used as the target value, and the number name corresponding to the current detected value may be used by the target temporary file.
According to one embodiment, if the number name corresponding to the currently detected value is not included in the number names of the currently stored temporary file (the number name corresponding to the currently detected value is in a vacant state, unoccupied), the next round of checking is also performed by performing the following steps:
first, a secondary detection value is determined based on the sum of the last detection value and the second step value. Here, in order to distinguish the detection value determined based on the first step value, the detection value determined based on the second step value is referred to as a secondary detection value. It should be noted that the second step value is a small two-step value set with respect to the first step value, and here, the present invention is not limited to a specific numerical value of the second step value. In one embodiment, the first step value is ten times the second step value, e.g., the first step value is 100 and the second step value may be 10.
Furthermore, whether the number name corresponding to the secondary detection value is included in the number names of the currently stored temporary files is checked, that is, whether the secondary detection value is occupied is checked. For example, in one embodiment, the last detection value is 100101 and the current detection value is 100201, then the current round of checking actually checks whether there is a null value between 100101 and 100201. In this embodiment, the secondary detection value determined based on the previous detection value and the second step value is 100111, that is, it is checked whether 100111 is occupied. In addition, in another embodiment, in the checking process based on the second step value, the second step value can be set to 1 according to the actual situation, that is, all the values between 100101-100201 are detected.
If a number name corresponding to the secondary detection value is included, it may be determined that the secondary detection value is occupied, a next secondary detection value is determined based on a sum of the secondary detection value and the second step value, and it is checked whether a number name corresponding to the next secondary detection value is included in the number names of the currently stored temporary file until it is checked that the number name corresponding to the secondary detection value is in a vacant state and is unoccupied (i.e., until it is checked that the number name corresponding to the next secondary detection value is not included in the number name). It should be noted that, based on the first step value being 10 times the second step value, in the current round of checking based on the second step value, 9 secondary detection values are generated at most, and the checking is performed 9 times.
And if the number name corresponding to the secondary detection value is not included (the number name corresponding to the secondary detection value is in a vacant state and is not occupied), determining that at least one target value exists between the last detection value and the secondary detection value, so that the target temporary file is named and stored based on the determined target value. It is understood that at least the secondary detection value may be used as the target value, and the number name corresponding to the secondary detection value may be used by the target temporary file.
Finally, in step S260, the target temporary file is named based on the determined target value, that is, the target temporary file is named as the numerical name corresponding to the target value, so that the target temporary file can be stored in the corresponding location based on the numerical name corresponding to the target value.
In one embodiment, the temporary file is an eml file and the predetermined format for the numerical name is xxxxxx. Wherein XXXXXXX represents a number. Thus, the corresponding numerical name may be combined based on the numerical value and the file suffix ". eml".
In one embodiment, the test is started with the value corresponding to the first numerical name (initial value), i.e., the initial value is taken as the first tested value. Before performing step S220, an initial numerical value is first determined, and then it is checked whether a numerical name corresponding to the initial numerical value is included in the numerical names of the currently stored temporary files. If included (indicating that the initial value is occupied), then a second detected value is determined further based on the sum of the initial value and the first step value, if the second detected value is also occupied, then a third detected value is determined … … further based on the sum of the second detected value and the first step value, and so on.
For example, the first further value is 100, the first numerical designation is 100001, eml, and the first numerical designation corresponds to an initial value (first test value) of 100001. Then, the second detected value is 100101 and the second detected value is 100201.
It should be noted that, for the case that a plurality of target temporary files need to be stored simultaneously, that is, when a plurality of target temporary files are included, after determining a target value, it may be continuously checked whether consecutive numerical values subsequent to the target value are occupied (that is, it is checked whether a numerical name corresponding to the consecutive numerical values subsequent to the target value is included in the numerical names of the currently stored temporary files), and if not occupied, the plurality of target temporary files may be sequentially named as the target value and a numerical name corresponding to one or more numerical values subsequent to the target value, so that the plurality of target temporary files may be stored in adjacent locations based on the numerical names corresponding to the consecutive numerical values. In addition, the whole checking process does not need to be executed on each target temporary file, and occupation storage time of a plurality of target temporary files is saved.
It should also be noted that the present invention is not limited to the above-mentioned two-step value setting process of performing two-step search, and in some embodiments of the present invention, a multi-step value may be set, that is, based on the second step value, further checking may be performed based on the third step value, so that the range of the target value may be gradually narrowed, and the vacancy value at the front of the ranking may be found as much as possible.
Fig. 3 shows a schematic diagram of a client 300 according to an embodiment of the invention. As shown in fig. 3, the client 300 includes a receiving module 310, a checking module 320, and a storing module 330, which are connected in sequence. Client 300 may be implemented, for example, as a mailbox client, although the invention is not limited to a particular category of client 300.
The receiving module 310 is configured to receive a request from a user, and determine a target temporary file that needs to be saved. The checking module 320 determines a current detection value based on the first step value and checks whether a number name corresponding to the current detection value is included in the number names of the currently stored temporary files. If so, determining a next detected value based on the current detected value and the first further value, and checking whether a number name corresponding to the next detected value is included in the number names of the currently stored temporary files. If not, it is determined that at least one target value exists between the last detected value and the current detected value. The storage module 330 names the target temporary file based on the determined target value so as to store the target temporary file based on the number name corresponding to the target value.
It should be noted that the receiving module 310 may specifically execute the step S210 of the method 200, the checking module 320 may specifically execute the steps S220 to S250, and the storing module 330 may execute the step S260. Here, the specific execution logic of the receiving module 310, the checking module 320, and the storing module 330 is as described in the foregoing description of the method 200, and is not described herein again.
According to the temporary file occupation storage scheme, the unoccupied number names can be quickly found in a stepping retrieval mode, and the temporary file is named based on the unoccupied number names, so that the temporary file is occupied and stored. Therefore, when the number of temporary files stored in the mailbox is large, the efficiency of searching the vacancy can be obviously improved, and the occupied storage time of the temporary files is saved.
A7, the method of any one of A1-A6, wherein the temporary file is a eml file; the predetermined format of the numerical name is XXXXXXX.
The various techniques described herein may be implemented in connection with hardware or software or, alternatively, with a combination of both. Thus, the methods and apparatus of the present invention, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as removable hard drives, U.S. disks, floppy disks, CD-ROMs, or any other machine-readable storage medium, wherein, when the program is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention.
In the case of program code execution on programmable computers, the computing device will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Wherein the memory is configured to store program code; the processor is configured to execute the multilingual spam-text recognition method of the present invention according to instructions in said program code stored in the memory.
By way of example, and not limitation, readable media may comprise readable storage media and communication media. Readable storage media store information such as computer readable instructions, data structures, program modules or other data. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. Combinations of any of the above are also included within the scope of readable media.
In the description provided herein, algorithms and displays are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with examples of this invention. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules or units or components of the devices in the examples disclosed herein may be arranged in a device as described in this embodiment or alternatively may be located in one or more devices different from the devices in this example. The modules in the foregoing examples may be combined into one module or may be further divided into multiple sub-modules.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Furthermore, some of the described embodiments are described herein as a method or combination of method elements that can be performed by a processor of a computer system or by other means of performing the described functions. A processor having the necessary instructions for carrying out the method or method elements thus forms a means for carrying out the method or method elements. Further, the elements of the apparatus embodiments described herein are examples of the following apparatus: the apparatus is used to implement the functions performed by the elements for the purpose of carrying out the invention.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this description, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as described herein. Furthermore, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter. Accordingly, many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the appended claims. The present invention has been disclosed in an illustrative rather than a restrictive sense, and the scope of the present invention is defined by the appended claims.

Claims (10)

1. A temporary file placeholder storage method, executed in a computing device, the temporary file adapted to be stored based on a numeric name in a predetermined format, comprising the steps of:
receiving a request of a user, and determining a target temporary file to be stored;
determining a current detection value based on the first step value;
checking whether a digital name corresponding to the current detection value is included in the digital names of the currently stored temporary files;
if yes, determining a next detection value based on the current detection value and the first further value, and checking whether a digital name corresponding to the next detection value is included in the digital names of the currently stored temporary files;
if not, determining that at least one target value exists between the last detected value and the current detected value; and
naming the target temporary file based on the determined target value so as to store the target temporary file based on a numerical name corresponding to the target value.
2. The method of claim 1, wherein if a numeric name corresponding to the current detected value is not included in numeric names of the currently stored temporary files, further comprising the steps of:
determining a second detection value based on the last detection value and the second step value;
checking whether the number name of the temporary file stored currently comprises a number name corresponding to the secondary detection value;
if yes, determining a next secondary detection value based on the secondary detection value and the second step value, and checking whether a digital name corresponding to the next secondary detection value is included in the digital names of the currently stored temporary files;
and if not, determining that at least one target value exists between the last detection value and the second-level detection value, so as to name and store the target temporary file based on the determined target value.
3. The method of claim 1 or 2, wherein the step of determining the current detection value based on the first step value comprises:
and determining the sum of the last detection value and the first step value as the current detection value.
4. A method according to any one of claims 1-3, wherein before determining the current detection value based on the first step value, comprising the steps of:
determining an initial value;
checking whether a numerical name corresponding to the initial numerical value is included in numerical names of the currently stored temporary files.
5. The method of any of claims 1-4, wherein determining the target temporary file that needs to be saved comprises:
receiving a request for storing a draft mail, and determining the draft mail as a target temporary file; or
And receiving a request for importing the mail, and determining the imported mail as a target temporary file.
6. The method of any one of claims 1-5, wherein the first step value is 100 and the second step value is 10.
7. The method of any one of claims 1-6, wherein the computing device includes a mailbox client therein, the method adapted to be performed at the mailbox client.
8. A client, comprising:
the receiving module is suitable for receiving a request of a user and determining a target temporary file to be stored;
the checking module is suitable for determining a current detection value based on the first stepping value and checking whether a digital name corresponding to the current detection value is included in the digital names of the currently stored temporary files; if yes, determining a next detection value based on the current detection value and the first further value, and checking whether a digital name corresponding to the next detection value is included in the digital names of the currently stored temporary files; if not, determining that at least one target value exists between the last detected value and the current detected value; and
and the storage module is suitable for naming the target temporary file based on the determined target numerical value so as to store the target temporary file based on the numerical name corresponding to the target numerical value.
9. A computing device, comprising:
at least one processor; and
a memory storing program instructions, wherein the program instructions are configured to be adapted to be executed by the at least one processor, the program instructions comprising instructions for performing the method of any of claims 1-8.
10. A readable storage medium storing program instructions that, when read and executed by a computing device, cause the computing device to perform the method of any of claims 1-8.
CN202110751279.7A 2021-07-02 2021-07-02 Temporary file occupation storage method, client and computing device Pending CN113342756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110751279.7A CN113342756A (en) 2021-07-02 2021-07-02 Temporary file occupation storage method, client and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110751279.7A CN113342756A (en) 2021-07-02 2021-07-02 Temporary file occupation storage method, client and computing device

Publications (1)

Publication Number Publication Date
CN113342756A true CN113342756A (en) 2021-09-03

Family

ID=77482363

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110751279.7A Pending CN113342756A (en) 2021-07-02 2021-07-02 Temporary file occupation storage method, client and computing device

Country Status (1)

Country Link
CN (1) CN113342756A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5678046A (en) * 1994-11-18 1997-10-14 The Chase Manhattan Bank, N.A. Method and apparatus for distributing files on a file storage device
CN1199204A (en) * 1996-10-16 1998-11-18 佳能株式会社 File management system of image data
CN101465872A (en) * 2007-12-17 2009-06-24 新奥特(北京)视频技术有限公司 Method for transmitting and managing document
CN109960932A (en) * 2017-12-22 2019-07-02 北京安天网络安全技术有限公司 File test method, device and terminal device
CN113326951A (en) * 2021-04-06 2021-08-31 国营芜湖机械厂 Auxiliary detection device for aircraft outer surface cover screws and use method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5678046A (en) * 1994-11-18 1997-10-14 The Chase Manhattan Bank, N.A. Method and apparatus for distributing files on a file storage device
CN1199204A (en) * 1996-10-16 1998-11-18 佳能株式会社 File management system of image data
CN101465872A (en) * 2007-12-17 2009-06-24 新奥特(北京)视频技术有限公司 Method for transmitting and managing document
CN109960932A (en) * 2017-12-22 2019-07-02 北京安天网络安全技术有限公司 File test method, device and terminal device
CN113326951A (en) * 2021-04-06 2021-08-31 国营芜湖机械厂 Auxiliary detection device for aircraft outer surface cover screws and use method thereof

Similar Documents

Publication Publication Date Title
CN107341233B (en) Position recommendation method and computing device
CN111651464B (en) Data processing method, system and computing device
WO2016177830A1 (en) Method, system and computer program product for performing numeric searches
CN112328548A (en) File retrieval method and computing device
EP3608798A1 (en) Group search method based on social network, device, server and storage medium
CN113032432A (en) Data caching processing method, system, computing device and readable storage medium
CN110795343A (en) Test system, test method and computing device
CN114416252A (en) Window display method and device, computing equipment and storage medium
CN113688617A (en) Method for generating table page and computing equipment
CN111198961A (en) Commodity searching method and device and server
CN113342756A (en) Temporary file occupation storage method, client and computing device
CN107508705B (en) Resource tree construction method of HTTP element and computing equipment
CN108173716B (en) Method for identifying network equipment manufacturer and computing equipment
CN110516169B (en) Data display method, device and system and computing equipment
CN110995574B (en) User information management method, acquisition method and system
CN114422502A (en) Resource downloading method, computing device and storage medium
CN110532108B (en) Resume delivery task processing method, device, server and system
CN113377289A (en) Cache management method, system, computing device and readable storage medium
CN111814029A (en) Data query method, system and computing device
CN108509478B (en) Splitting and calling method of rule engine file, electronic device and storage medium
CN114884974B (en) Data multiplexing method, system and computing device
CN112800318B (en) Mail searching method and computing device
CN113194127B (en) Data storage method, data transmission method and computing equipment
CN105468603A (en) Data selection method and apparatus
CN113904962B (en) Resource access method and device and computing equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination