WO2016000553A1 - 鉴别垃圾目录的方法及装置 - Google Patents
鉴别垃圾目录的方法及装置 Download PDFInfo
- Publication number
- WO2016000553A1 WO2016000553A1 PCT/CN2015/082211 CN2015082211W WO2016000553A1 WO 2016000553 A1 WO2016000553 A1 WO 2016000553A1 CN 2015082211 W CN2015082211 W CN 2015082211W WO 2016000553 A1 WO2016000553 A1 WO 2016000553A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- directory
- file
- authenticated
- files
- identified
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/122—File system administration, e.g. details of archiving or snapshots using management policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/164—File meta data generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1737—Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices
Definitions
- the present application relates to the field of file processing, and in particular, to a method and apparatus for identifying a garbage directory.
- various application software can usually be installed in an electronic device to meet different needs of users.
- the application software due to improper development of application software, the application software usually creates some directories automatically when the user runs the application software, and each directory can be booted to a folder in the folder (that is, under the directory).
- Some files are cached, where the cached image files can usually occupy more than 80% of the total number of files; and these cached files are usually useless for the user, which makes useless files occupy a large amount of storage space. , affecting the overall performance of electronic devices.
- a garbage directory that is, a directory in which a file that is useless to the user is cached.
- the embodiment of the present application discloses a method and device for identifying a garbage directory to effectively identify whether a directory in the application software is a garbage directory.
- the technical solutions are as follows:
- the embodiment of the present application provides a method for identifying a garbage directory, including:
- the directory to be authenticated is determined as a garbage directory.
- the method before obtaining the file name of the file in the to-be-identified directory, the method further includes:
- the determining, by the file name of the file in the to-be-identified directory, the temporary file naming rules including:
- the determining, by the file name of the file in the to-be-identified directory, the temporary file naming rules including:
- the determining, by the file name of the file in the to-be-identified directory, the temporary file naming rules including:
- the obtaining, by the file name of the file in the directory to be authenticated includes:
- the obtaining the to-be-identified directory includes:
- the method further includes:
- the directory to be authenticated is output, and the user is prompted to delete, and after the user confirms the deletion, the folder to which the directory to be authenticated is directed is deleted.
- the method further includes:
- the file is a picture file.
- the embodiment of the present application provides an apparatus for identifying a garbage directory, including:
- a directory obtaining module configured to obtain a directory to be authenticated; wherein the directory to be authenticated is a directory generated after the application software runs;
- a file name obtaining module configured to obtain a file name of a file in the directory to be authenticated
- a file name judging module configured to determine whether the file names of the files in the to-be-identified directory are consistent with the temporary file naming rules; if yes, triggering the junk directory determining module;
- the garbage directory determining module is configured to determine the to-be-identified directory as a garbage directory.
- the embodiment of the present application provides an apparatus for identifying a garbage directory, and further includes:
- a file quantity obtaining module configured to obtain the number of files in the to-be-authenticated directory before obtaining the file name of the file in the directory to be authenticated
- the file quantity determining module is configured to determine whether the number of the files reaches a predetermined number, and if yes, trigger the file name obtaining module.
- the file name judging module includes:
- a first file name judging unit configured to determine whether the file names of the files in the to-be-identified directory are all named by a numeric string having a predetermined number of digits, and if so, indicating that the file names of the files in the directory to be detected are
- the garbage catalog determination module is triggered by conforming to the temporary file naming rules.
- the file name judging module includes:
- a second file name determining unit configured to determine whether a file name of the file in the directory to be authenticated is All are named after the md5 string. If yes, it indicates that the file name of the file in the directory to be detected conforms to the temporary file naming rule, and the garbage directory determining module is triggered.
- the file name judging module includes:
- a second file name determining unit configured to determine whether the file names of the files in the directory to be authenticated are all named by a numeric string having a predetermined number of digits, and if yes, indicating that the file names of the files in the directory to be detected are Matching the temporary file naming rule, triggering the garbage directory determining module;
- the file name obtaining module is specifically configured to:
- the directory obtaining module includes:
- the directory determining unit is configured to select one of the directories generated after the application software is simulated to be the directory to be authenticated.
- the embodiment of the present application provides an apparatus for identifying a garbage directory, and further includes:
- a first processing module configured to report the to-be-authenticated directory to the server after determining the to-be-identified directory as the garbage directory, so that the server adds the to-be-identified directory to the pre-established garbage catalog;
- a second processing module configured to automatically delete the folder to be identified by the directory to be identified after determining the to-be-identified directory as a garbage directory
- a third processing module configured to output the to-be-authenticated directory after determining the to-be-identified directory as a garbage directory, and prompt the user to delete, and delete the to-be-identified directory after the user confirms the deletion folder.
- the embodiment of the present application provides an apparatus for identifying a garbage directory, and further includes:
- a fourth processing module configured to add the to-be-authenticated directory to the pre-established garbage catalog after determining the to-be-identified directory as a garbage directory.
- the file is a picture file.
- an embodiment of the present application further provides an electronic device, including: a processor, a memory, a communication interface, and a bus;
- the processor, the memory, and the communication interface are connected by the bus and complete communication with each other;
- the memory stores executable program code
- the processor by reading the executable program code stored in the memory, runs a program corresponding to the executable program code for executing any one of the methods for identifying a garbage directory provided by the embodiments of the present application.
- the embodiment of the present application further provides a storage medium for storing an application, where the application is used to execute any method for identifying a garbage directory provided by the embodiment of the present application.
- the embodiment of the present application further provides an application program for performing any method for identifying a garbage directory provided by the embodiment of the present application.
- the directory to be authenticated is obtained; wherein the directory to be authenticated is a directory generated after the application software is run; the file name of the file in the directory to be authenticated is obtained; and the file name of the file in the directory to be authenticated is determined. Whether the temporary file naming rules are met; if so, the directory to be authenticated is determined to be a garbage directory. It can be seen that, in this solution, whether the file name of the file in the directory to be authenticated is consistent with the temporary file naming rule is used to identify whether the to-be-identified directory is a junk file, and the directory cache file automatically created by the application software is fully utilized. The unique naming method, therefore, can effectively identify whether the directory in the application software is a spam directory.
- FIG. 1 is a flowchart of a method for identifying a garbage directory according to an embodiment of the present application
- FIG. 2 is another flowchart of a method for identifying a garbage directory according to an embodiment of the present application
- FIG. 3 is a schematic structural diagram of an apparatus for identifying a garbage directory according to an embodiment of the present application.
- the embodiment of the present application provides a method and device for identifying a garbage directory.
- a method for identifying a garbage directory provided by the embodiment of the present application is first introduced.
- the method for identifying the garbage directory provided by the embodiment of the present application may be applied to the terminal by using software, or may be applied to the server by using the software, and the application software for the method may be various types of client application software, for example, various types of instant messaging.
- the terminal can be a smart phone, a tablet or a laptop with various application software installed.
- the directory local to the terminal may be authenticated based on the method, and the corresponding operation is performed based on the authentication result; when the method for authenticating the garbage directory applies the software to the server
- the garbage catalog library can be constructed based on the method, so that the catalog uploaded by each terminal is identified according to the constructed garbage catalog, and the recognition result is fed back to the corresponding terminal, thereby realizing remote identification of the catalog in the terminal.
- the directory referred to in the embodiment of the present application is a folder path, and the directory can be directed to the corresponding folder.
- the complete directory directed to the folder generally includes: a path for indicating a local storage location and a path for indicating a location in the application software, and, for an application software, When running on different terminals, the installation location of the application software may be different, causing the path indicating the local storage location to change but the path for indicating the location in the application software is unchanged. Therefore, in order to ensure extensive application software,
- the authentication directory is a path for indicating the location in the application software.
- /mnt/sdcard/kingsoft/ksnmgsdk is the complete directory that leads to the folder ksnmgsdk, where the directory to be authenticated can be kingsoft/ksnmgsdk, not including the previous one. Indicates the path /mnt/sdcard/ of the local storage location.
- a method for identifying a garbage directory may include:
- the directory to be authenticated may be obtained first, and then the subsequent processing is performed.
- the directory to be authenticated is a directory generated after the application software runs, and the directory can be directed to a folder.
- the application software can automatically create a directory, and the automatically created directory is a garbage directory that caches files that are useless to the user. Therefore, if the application software corresponding to the directory to be authenticated has been run, the directory to be authenticated can be obtained directly; and when the application software to be authenticated is not run, further,
- the obtaining the directory to be identified may include:
- the method for identifying the garbage directory provided by the embodiment of the present application is described by taking a directory to be identified as an example. It can be understood that for an application software, it has a large number of directories, and for each directory, The method provided by the embodiment of the present application can be used for identification.
- the file name of the file in the directory to be authenticated can be obtained for subsequent processing. It can be understood by those skilled in the art that since the picture file in the file cached in the automatic creation directory accounts for more than 80% of the total number, the file may be a picture file, which is of course not limited thereto.
- the directory can be authenticated based on the partial files. Accordingly, the file name of the file in the directory to be authenticated can be obtained, which can include : Obtain the file name of some files in the directory to be authenticated, for example, obtain the file name of 90% of the files in the directory to be authenticated or the file name of 95% of the files in the directory to be authenticated.
- obtaining the file name of the file in the directory to be authenticated may include: obtaining the file name of all the files in the directory to be authenticated.
- the file Since the file is named by the temporary file naming rule when the file is cached in the garbage directory, after obtaining the file name of the file in the directory to be authenticated, it can be determined whether the file name of the file in the directory to be authenticated is consistent with the temporary file name. File naming rules, and perform different operations according to different judgment results. When it is determined that the file names of the files in the to-be-identified directory all conform to the temporary file naming rules, S104 may be performed; otherwise, S105 may be performed.
- the determining whether the file name of the file in the directory to be authenticated meets the temporary file naming rules may include:
- the predetermined number of bits can be 8 or 11 bits.
- the number string of the predetermined number of bits of the named picture file may be, for example, a time stamp such as 20140626204839 or 20140626204840.
- the determining whether the file name of the file in the directory to be authenticated meets the temporary file naming rules may include:
- the md5 string is a string of a specific format formed based on the md5 algorithm. Specifically, the string includes a part of 32 characters of 0-9 and A-Z (or a-z). Taking an image file as an example, when the image file is automatically cached, the md5 string of the named image file can be, for example:
- determining whether the file name of the file in the directory to be authenticated conforms to the temporary file naming rule may include:
- determining whether the file names of the files in the to-be-identified directory are consistent with the temporary file naming rules may include:
- the directory to be identified is determined as a garbage directory.
- the to-be-identified directory is determined to be a non-spam directory.
- the directory to be authenticated is obtained; wherein the directory to be authenticated is a directory generated after the application software is run; the file name of the file in the directory to be authenticated is obtained; and the file name of the file in the directory to be authenticated is determined. Whether the temporary file naming rules are met; if so, the directory to be authenticated is determined to be a garbage directory. It can be seen that, in this solution, whether the file name of the file in the directory to be authenticated is consistent with the temporary file naming rule is used to identify whether the to-be-identified directory is a junk file, and the directory cache file automatically created by the application software is fully utilized. The unique naming method, therefore, can effectively identify whether the directory in the application software is a spam directory.
- the method for authenticating the garbage directory may further include:
- the directory to be authenticated is output, and the user is prompted to delete, and after the user confirms the deletion, the folder to which the directory to be authenticated is directed is deleted.
- the method for authenticating the garbage directory applies the software to the server, after determining the to-be-identified directory as the garbage directory, the method may further include: adding the to-be-identified directory to the pre-established garbage catalog.
- the garbage catalog is improved by adding the to-be-identified directory to the garbage catalog, so that after receiving the authentication request carried by the terminal and carrying the directory, the server will identify the directory in the request and the garbage directory in the garbage catalog. A match is made to feed back the matching result to the terminal.
- the embodiment of the present application further provides a method for identifying a garbage directory.
- the method for identifying the garbage directory provided by the embodiment of the present application may be applied to the terminal by using software, or may be applied to the server by using the software, and the application software for the method may be various types of client application software, for example, various types of instant messaging.
- the terminal can be a smart phone, a tablet or a laptop with various application software installed.
- the directory local to the terminal may be authenticated based on the method, and the corresponding operation is performed based on the authentication result; when the method for authenticating the garbage directory applies the software to the server
- the garbage catalog library can be constructed based on the method, so that the catalog uploaded by each terminal is identified according to the constructed garbage catalog, and the recognition result is fed back to the corresponding terminal, thereby realizing remote identification of the catalog in the terminal.
- the directory referred to in the embodiment of the present application is a folder path, and the directory can be directed to the corresponding folder.
- the complete directory directed to the folder generally includes: a path for indicating a local storage location and a path for indicating a location in the application software, and, for an application software, When running on different terminals, the installation location of the application software may be different, causing the path indicating the local storage location to change but the path for indicating the location in the application software is unchanged. Therefore, in order to ensure extensive application software, The directory to be authenticated is a path for indicating the location in the application software.
- /mnt/sdcard/kingsoft/ksnmgsdk is the complete directory that leads to the folder ksnmgsdk, where the directory to be authenticated can be kingsoft/ksnmgsdk, not including the previous one for indicating local storage.
- a method for identifying a garbage directory may include:
- the directory to be authenticated may be obtained first, and then the subsequent processing is performed.
- the directory to be authenticated is a directory generated after the application software runs, and the directory can be directed to a folder.
- the application software can automatically create a directory, and the automatically created directory is a garbage directory that caches files that are useless to the user. Therefore, if the application software corresponding to the directory to be authenticated has been run, the directory to be authenticated can be obtained directly; and when the application software to be authenticated is not run, further,
- the obtaining the directory to be identified may include:
- the method for identifying the garbage directory provided by the embodiment of the present application is described by taking a directory to be identified as an example. It can be understood that for an application software, it has a large number of directories, and for each directory, The method provided by the embodiment of the present application can be used for identification.
- the subsequent judgment may be performed when there are many files in the directory. Therefore, after obtaining the directory to be authenticated, the number of files in the directory to be authenticated may be obtained, thereby determining whether the number of the files reaches a predetermined number. If yes, S204 can be performed; otherwise, the authentication process can be ended.
- the predetermined number may be 10, 12, or 15, etc., and may be set according to actual conditions.
- the file name of the file in the directory to be authenticated may be obtained for subsequent processing. It can be understood by those skilled in the art that since the picture file in the file cached in the automatic creation directory accounts for more than 80% of the total number, the file may be a picture file, which is of course not limited thereto.
- the directory can be authenticated based on the partial files. Accordingly, the file name of the file in the directory to be authenticated can be obtained, which can include : Obtain the file name of some files in the directory to be authenticated, for example, obtain the file name of 90% of the files in the directory to be authenticated or the file name of 95% of the files in the directory to be authenticated.
- obtaining the file name of the file in the directory to be authenticated may include: obtaining the file name of all the files in the directory to be authenticated.
- the file Since the file is named by the temporary file naming rule when the file is cached in the garbage directory, after obtaining the file name of the file in the directory to be authenticated, it can be determined whether the file name of the file in the directory to be authenticated is consistent with the temporary file name. File naming rules, and perform different operations according to different judgment results. When it is determined that the file names of the files in the to-be-identified directory are consistent with the temporary file naming rules, S206 may be performed; otherwise, S207 may be performed.
- the determining whether the file name of the file in the directory to be authenticated meets the temporary file naming rules may include:
- the predetermined number of bits can be 8 or 11 bits.
- the number string of the predetermined number of bits of the named picture file may be, for example, a time stamp such as 20140626204839 or 20140626204840.
- the determining whether the file name of the file in the directory to be authenticated meets the temporary file naming rules may include:
- the md5 string is a string of a specific format formed based on the md5 algorithm. Specifically, the string includes a part of 32 characters of 0-9 and A-Z (or a-z). Taking an image file as an example, when the image file is automatically cached, the md5 string of the named image file can be, for example:
- determining whether the file names of the files in the to-be-identified directory are consistent with the temporary file naming rules may include:
- determining whether the file names of the files in the to-be-identified directory are consistent with the temporary file naming rules may include:
- the directory to be identified is determined as a garbage directory.
- the to-be-identified directory may be determined as a non-spam directory.
- the directory to be authenticated is obtained; wherein the directory to be authenticated is a directory generated after the application software is run; the number of files in the directory to be authenticated is obtained, and when it is determined whether the number of the files reaches a predetermined number And obtaining a file name of the file in the directory to be authenticated; determining whether the file name of the file in the directory to be authenticated conforms to the temporary file naming rule; if yes, determining the directory to be authenticated as a garbage directory.
- the method for authenticating the garbage directory may further include:
- the directory to be authenticated is output, and the user is prompted to delete, and after the user confirms the deletion, the folder to which the directory to be authenticated is directed is deleted.
- the method for authenticating the garbage directory applies the software to the server, after determining the to-be-identified directory as the garbage directory, the method may further include: adding the to-be-identified directory to the pre-established garbage catalog.
- the garbage catalog is improved by adding the to-be-identified directory to the garbage catalog, so that after receiving the authentication request carried by the terminal and carrying the directory, the server will identify the directory in the request and the garbage directory in the garbage catalog. A match is made to feed back the matching result to the terminal.
- the embodiment of the present application provides a device for identifying a garbage directory.
- the method may include:
- a directory obtaining module 310 configured to obtain a directory to be authenticated; wherein the directory to be authenticated is a directory generated after the application software runs;
- a file name obtaining module 320 configured to obtain a file name of a file in the directory to be authenticated
- the file name judging module 330 is configured to determine whether the file names of the files in the to-be-identified directory are consistent with the temporary file naming rules; if yes, triggering the junk directory determining module;
- the garbage directory determining module 340 is configured to determine the to-be-identified directory as a garbage directory.
- the directory to be authenticated is obtained; wherein the directory to be authenticated is a directory generated after the application software is run; the file name of the file in the directory to be authenticated is obtained; and the file name of the file in the directory to be authenticated is determined. Whether the temporary file naming rules are met; if so, the directory to be authenticated is determined to be a garbage directory. It can be seen that, in this solution, whether the file name of the file in the directory to be authenticated is consistent with the temporary file naming rule is used to identify whether the to-be-identified directory is a junk file, and the directory cache file automatically created by the application software is fully utilized. The unique naming method, therefore, can effectively identify whether the directory in the application software is a spam directory.
- the apparatus for identifying a garbage list provided by the embodiment of the present application may further include:
- a file quantity obtaining module configured to obtain the number of files in the to-be-authenticated directory before obtaining the file name of the file in the directory to be authenticated
- the file quantity determining module is configured to determine whether the number of the files reaches a predetermined number, and if yes, trigger the file name obtaining module.
- the file name judging module 330 may include:
- a first file name judging unit configured to determine whether the file names of the files in the to-be-identified directory are all named by a numeric string having a predetermined number of digits, and if so, indicating that the file names of the files in the directory to be detected are
- the garbage catalog determination module is triggered by conforming to the temporary file naming rules.
- the file name judging module 330 may include:
- a second file name judging unit configured to determine whether the file names of the files in the to-be-identified directory are all named by the md5 string, and if yes, indicating that the file names of the files in the to-be-detected directory are consistent with the temporary file name
- the rule triggers the garbage list determination module.
- the file name judging module 330 may include:
- a second file name judging unit configured to determine whether the file names of the files in the to-be-identified directory are all named by a numeric string having a predetermined number of digits, and if yes, indicating the files in the directory to be detected The file name is consistent with the temporary file naming rule, and the garbage directory determining module is triggered;
- the file name obtaining module 320 is specifically configured to:
- the directory obtaining module 310 may include:
- a directory determining unit for selecting one of the directories generated after running the application software as a to-be-identified directory
- the device may further include:
- a first processing module configured to report the to-be-authenticated directory to the server after determining the to-be-identified directory as the garbage directory, so that the server adds the to-be-identified directory to the pre-established garbage catalog;
- a second processing module configured to automatically delete the folder to be identified by the directory to be identified after determining the to-be-identified directory as a garbage directory
- a third processing module configured to output the to-be-authenticated directory after determining the to-be-identified directory as a garbage directory, and prompt the user to delete, and delete the to-be-identified directory after the user confirms the deletion folder.
- the device may further include:
- a fourth processing module configured to add the to-be-authenticated directory to the pre-established garbage catalog after determining the to-be-identified directory as a garbage directory.
- the file may be a picture file.
- the embodiment of the present application further provides an electronic device, including: a processor, a memory, Communication interface and bus;
- the processor, the memory, and the communication interface are connected by the bus and complete communication with each other;
- the memory stores executable program code
- the processor by reading the executable program code stored in the memory, runs a program corresponding to the executable program code for executing any one of the methods for identifying a garbage directory provided by the embodiments of the present application.
- the method for identifying a garbage directory provided by the embodiment of the present application includes:
- the directory to be authenticated is determined as a garbage directory.
- the embodiment of the present application further provides a storage medium for storing an application, and the application is used to execute any method for identifying a garbage directory provided by the embodiment of the present application.
- the method for identifying a garbage directory provided by the embodiment of the present application includes:
- the directory to be authenticated is determined as a garbage directory.
- the embodiment of the present application further provides an application program for performing any method for identifying a garbage directory provided by the embodiment of the present application.
- the method for identifying a garbage directory provided by the embodiment of the present application includes:
- the directory to be authenticated is determined as a garbage directory.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims (20)
- 一种鉴别垃圾目录的方法,其特征在于,包括:获得待鉴别目录;其中,所述待鉴别目录为应用软件运行后所产生的目录;获得所述待鉴别目录中的文件的文件名;判断所述待鉴别目录中的文件的文件名是否均符合临时文件命名规则;如果是,将所述待鉴别目录确定为垃圾目录。
- 根据权利要求1所述的方法,其特征在于,在获得所述待鉴别目录中的文件的文件名之前,还包括:获得所述待鉴别目录中的文件的数量;判断所述文件的数量是否达到预定数量,如果是,再执行所述获得所述待鉴别目录中的文件的文件名的步骤。
- 根据权利要求1或2所述的方法,其特征在于,所述判断所述待鉴别目录中的文件的文件名是否均符合临时文件命名规则,包括:判断所述待鉴别目录中的文件的文件名是否均以具有预定位数的数字串命名,如果是,表明所述待鉴别目录中的文件的文件名均符合临时文件命名规则。
- 根据权利要求1或2所述的方法,其特征在于,所述判断所述待鉴别目录中的文件的文件名是否均符合临时文件命名规则,包括:判断所述待鉴别目录中的文件的文件名是否均以md5字符串命名,如果是,表明所述待鉴别目录中的文件的文件名均符合临时文件命名规则。
- 根据权利要求1或2所述的方法,其特征在于,所述判断所述待鉴别目录中的文件的文件名是否均符合临时文件命名规则,包括:判断所述待鉴别目录中的文件的文件名是否均以具有预定位数的数字串命名,如果是,表明所述待鉴别目录中的文件的文件名均符合临时文件命名规则;如果否,继续判断所述待鉴别目录中的文件的文件名是否均以md5字符串命名,如果是,表明所述待鉴别目录中的文件的文件名均符合临时文件命名规则。
- 根据权利要求1或2所述的方法,其特征在于,所述获得所述待鉴别目录中的文件的文件名,包括:获得所述待鉴别目录中的所有的文件的文件名。
- 根据权利要求1或2所述的方法,其特征在于,所述获得待鉴别目录,包括:模拟运行应用软件;从模拟运行应用软件后所产生的目录中任选一个作为待鉴别目录。
- 根据权利要求1或2所述的方法,其特征在于,在将所述待鉴别目录确定为垃圾目录后,还包括:将所述待鉴别目录上报服务器,以使得所述服务器将所述待鉴别目录增加到预先建立的垃圾目录库中;或者,自动删除所述待鉴别目录所指引到的文件夹;或者,输出所述待鉴别目录,并提示用户是否删除,并在用户确认删除后,删除所述待鉴别目录所指引到的文件夹。
- 根据权利要求1或2所述的方法,其特征在于,在将所述待鉴别目录确定为垃圾目录后,还包括:将所述待鉴别目录增加到预先建立的垃圾目录库中。
- 根据权利要求1或2所述的方法,其特征在于,所述文件为图片文件。
- 一种鉴别垃圾目录的装置,其特征在于,包括:目录获得模块,用于获得待鉴别目录;其中,所述待鉴别目录为应用软件运行后所产生的目录;文件名获得模块,用于获得所述待鉴别目录中的文件的文件名;文件名判断模块,用于判断所述待鉴别目录中的文件的文件名是否均符合临时文件命名规则;如果是,触发垃圾目录确定模块;所述垃圾目录确定模块,用于将所述待鉴别目录确定为垃圾目录。
- 根据权利要求11所述的装置,其特征在于,还包括:文件数量获得模块,用于在获得所述待鉴别目录中的文件的文件名之前,获得所述待鉴别目录中的文件的数量;文件数量判断模块,用于判断所述文件的数量是否达到预定数量,如果是,触发所述文件名获得模块。
- 根据权利要求11或12所述的装置,其特征在于,所述文件名判断模块,包括:第一文件名判断单元,用于判断所述待鉴别目录中的文件的文件名是否均以具有预定位数的数字串命名,如果是,表明所述待检测的目录中的文件的文件名均符合临时文件命名规则,则触发所述垃圾目录确定模块。
- 根据权利要求11或12所述的装置,其特征在于,所述文件名判断模块,包括:第二文件名判断单元,用于判断所述待鉴别目录中的文件的文件名是否均以md5字符串命名,如果是,表明所述待检测的目录中的文件的文件名均符合临时文件命名规则,则触发所述垃圾目录确定模块。
- 根据权利要求11或12所述的装置,其特征在于,所述文件名判断模块,包括:第二文件名判断单元,用于判断所述待鉴别目录中的文件的文件名是否均以具有预定位数的数字串命名,如果是,表明所述待检测的目录中的文件的文件名均符合临时文件命名规则,则触发所述垃圾目录确定模块;如果否,继续判断所述待鉴别目录中的文件的文件名是否均以md5字符串命名,如果是,表明所述待鉴别目录中的文件的文件名均符合临时文件命名规则,则触发所述垃圾目录确定模块。
- 根据权利要求11或12所述的装置,其特征在于,所述文件名获得模块,具体用于:获得所述待鉴别目录中的所有的文件的文件名。
- 根据权利要求11或12所述的装置,其特征在于,所述目录获得模块,包括:模拟运行单元,用于模拟运行应用软件;目录确定单元,用于从模拟运行应用软件后所产生的目录中任选一个作 为待鉴别目录。
- 根据权利要求11或12所述的装置,其特征在于,还包括:第一处理模块,用于在将所述待鉴别目录确定为垃圾目录后,将所述待鉴别目录上报服务器,以使得所述服务器将所述待鉴别目录增加到预先建立的垃圾目录库中;或者,第二处理模块,用于在将所述待鉴别目录确定为垃圾目录后,自动删除所述待鉴别目录指引的文件夹;或者,第三处理模块,用于在将所述待鉴别目录确定为垃圾目录后,输出所述待鉴别目录,并提示用户是否删除,并在用户确认删除后,删除所述待鉴别目录所指引到的文件夹。
- 根据权利要求11或12所述的装置,其特征在于,还包括:第四处理模块,用于在将所述待鉴别目录确定为垃圾目录后,将所述待鉴别目录增加到预先建立的垃圾目录库中。
- 根据权利要求11或12所述的装置,其特征在于,所述文件为图片文件。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/321,694 US20170206209A1 (en) | 2014-06-30 | 2015-06-24 | Junk directory identification method and apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410307300.4A CN105224572B (zh) | 2014-06-30 | 2014-06-30 | 鉴别垃圾目录的方法及装置 |
CN201410307300.4 | 2014-06-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016000553A1 true WO2016000553A1 (zh) | 2016-01-07 |
Family
ID=54993541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/082211 WO2016000553A1 (zh) | 2014-06-30 | 2015-06-24 | 鉴别垃圾目录的方法及装置 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20170206209A1 (zh) |
CN (1) | CN105224572B (zh) |
WO (1) | WO2016000553A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10660369B2 (en) | 2016-07-14 | 2020-05-26 | Altria Client Services Llc | Fluid permeable heater assembly and cartridge for an aerosol-generating system |
CN112015702A (zh) * | 2020-09-15 | 2020-12-01 | 支付宝(杭州)信息技术有限公司 | 一种报文文件名处理方法、装置及设备 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609066A (zh) * | 2017-08-30 | 2018-01-19 | 努比亚技术有限公司 | 清理文件的方法、设备及计算机可存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102654872A (zh) * | 2011-03-03 | 2012-09-05 | 腾讯科技(深圳)有限公司 | 一种清理应用程序产生的垃圾文件的方法及装置 |
CN102880713A (zh) * | 2012-09-29 | 2013-01-16 | 北京奇虎科技有限公司 | 文件清理方法及装置 |
CN102880714A (zh) * | 2012-09-29 | 2013-01-16 | 北京奇虎科技有限公司 | 文件清理方法及装置 |
CN103559299A (zh) * | 2013-11-14 | 2014-02-05 | 贝壳网际(北京)安全技术有限公司 | 清理文件的方法、装置及移动终端 |
CN104317840A (zh) * | 2014-10-10 | 2015-01-28 | 北京金山安全软件有限公司 | 一种文件清理方法、装置及终端 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5202982A (en) * | 1990-03-27 | 1993-04-13 | Sun Microsystems, Inc. | Method and apparatus for the naming of database component files to avoid duplication of files |
JP3865775B2 (ja) * | 1995-04-11 | 2007-01-10 | キネテック インコーポレイテッド | データ処理システムにおけるデータの識別 |
US7689601B2 (en) * | 2004-05-06 | 2010-03-30 | Oracle International Corporation | Achieving web documents using unique document locators |
JP2006092268A (ja) * | 2004-09-24 | 2006-04-06 | Fuji Photo Film Co Ltd | 画像ファイル記録システムおよびその制御方法 |
EP1934840A4 (en) * | 2005-10-06 | 2010-12-15 | Guidance Software Inc | ELECTRONIC DISCOVERY SYSTEM AND METHOD |
JP5163264B2 (ja) * | 2008-05-07 | 2013-03-13 | 株式会社ニコン | カメラ |
KR100996855B1 (ko) * | 2008-08-29 | 2010-11-26 | 주식회사 안철수연구소 | 정상 파일 데이터베이스 제공 시스템 및 방법 |
US8380676B1 (en) * | 2009-05-27 | 2013-02-19 | Google Inc. | Automatic deletion of temporary files |
CN102761627B (zh) * | 2012-06-27 | 2015-12-09 | 北京奇虎科技有限公司 | 基于终端访问统计的云网址推荐方法及系统及相关设备 |
CN102902922B (zh) * | 2012-09-29 | 2016-04-20 | 北京奇虎科技有限公司 | 文件修复方法和系统 |
US10346358B2 (en) * | 2014-06-04 | 2019-07-09 | Waterline Data Science, Inc. | Systems and methods for management of data platforms |
-
2014
- 2014-06-30 CN CN201410307300.4A patent/CN105224572B/zh active Active
-
2015
- 2015-06-24 US US15/321,694 patent/US20170206209A1/en not_active Abandoned
- 2015-06-24 WO PCT/CN2015/082211 patent/WO2016000553A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102654872A (zh) * | 2011-03-03 | 2012-09-05 | 腾讯科技(深圳)有限公司 | 一种清理应用程序产生的垃圾文件的方法及装置 |
CN102880713A (zh) * | 2012-09-29 | 2013-01-16 | 北京奇虎科技有限公司 | 文件清理方法及装置 |
CN102880714A (zh) * | 2012-09-29 | 2013-01-16 | 北京奇虎科技有限公司 | 文件清理方法及装置 |
CN103559299A (zh) * | 2013-11-14 | 2014-02-05 | 贝壳网际(北京)安全技术有限公司 | 清理文件的方法、装置及移动终端 |
CN104317840A (zh) * | 2014-10-10 | 2015-01-28 | 北京金山安全软件有限公司 | 一种文件清理方法、装置及终端 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10660369B2 (en) | 2016-07-14 | 2020-05-26 | Altria Client Services Llc | Fluid permeable heater assembly and cartridge for an aerosol-generating system |
CN112015702A (zh) * | 2020-09-15 | 2020-12-01 | 支付宝(杭州)信息技术有限公司 | 一种报文文件名处理方法、装置及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN105224572A (zh) | 2016-01-06 |
CN105224572B (zh) | 2019-11-15 |
US20170206209A1 (en) | 2017-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10705748B2 (en) | Method and device for file name identification and file cleaning | |
US10754634B1 (en) | Customized application package with context specific token | |
US7734914B1 (en) | System and method for allowing applications to securely access files | |
WO2015062389A1 (zh) | 一种终端设备卸载系统应用的方法和装置 | |
WO2016201819A1 (zh) | 检测恶意文件的方法和装置 | |
US10673823B2 (en) | Migration containers | |
US9355250B2 (en) | Method and system for rapidly scanning files | |
WO2017107961A1 (zh) | 一种备份系统及方法 | |
WO2015139539A1 (zh) | 一种视频信息推送方法及装置 | |
US10540325B2 (en) | Method and device for identifying junk picture files | |
WO2019076102A1 (zh) | 一种数据回滚方法、系统、设备及计算机可读存储介质 | |
US20190005057A1 (en) | Methods and Devices for File Folder Path Identification and File Folder Cleaning | |
WO2016110203A1 (zh) | 一种文件路径的存储和本地文件的访问方法及装置 | |
AU2014328401B2 (en) | Methods, systems, and devices for identifying an application type of unknown data | |
WO2016000553A1 (zh) | 鉴别垃圾目录的方法及装置 | |
CN108846129B (zh) | 存储数据访问方法、装置及存储介质 | |
CN114328029B (zh) | 一种应用资源的备份方法、装置、电子设备及存储介质 | |
US9665732B2 (en) | Secure Download from internet marketplace | |
CN110365776B (zh) | 图片批量下载方法、装置、电子设备及存储介质 | |
CN108459927B (zh) | 一种数据备份方法、装置和服务器 | |
US11023426B1 (en) | Method and system for detection of open source web application version | |
CN115277677B (zh) | 批量档案挂接方法、装置、计算机设备及存储介质 | |
US10726109B2 (en) | Method and system for identifying whether an application is genuine by means of digital watermarks | |
JP2015523633A (ja) | 情報を削除する方法 | |
CN113626409B (zh) | 一种测试资料处理方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15815304 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15321694 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03/05/17) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15815304 Country of ref document: EP Kind code of ref document: A1 |