WO2018137415A1 - 数据删除方法、终端及服务器 - Google Patents

数据删除方法、终端及服务器 Download PDF

Info

Publication number
WO2018137415A1
WO2018137415A1 PCT/CN2017/115509 CN2017115509W WO2018137415A1 WO 2018137415 A1 WO2018137415 A1 WO 2018137415A1 CN 2017115509 W CN2017115509 W CN 2017115509W WO 2018137415 A1 WO2018137415 A1 WO 2018137415A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
deleted
information
preset
preset information
Prior art date
Application number
PCT/CN2017/115509
Other languages
English (en)
French (fr)
Inventor
何花
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018137415A1 publication Critical patent/WO2018137415A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Definitions

  • the present disclosure relates to the field of data management, for example, to a data deletion method, a terminal, and a server.
  • the present disclosure provides a data deletion method, a terminal, and a server to protect data to be deleted that includes preset protection information, so as to prevent the user from performing such data deletion without paying attention.
  • a data deletion method including:
  • the acquiring the relationship between the data to be deleted and the preset information includes:
  • the file type of the data to be deleted is the preset type, obtain a relationship between the data to be deleted and the preset information.
  • the method further includes:
  • the file type of the data to be deleted is the preset type
  • acquiring the relationship between the data to be deleted and the preset information including:
  • If the file type of the data to be deleted is the preset type, obtain the first information included in the data to be deleted;
  • the first information is matched with the preset information, determining that the relationship between the data to be deleted and the preset information is that the data to be deleted includes the preset information;
  • the first information does not match the preset information, determining that the relationship between the data to be deleted and the preset information is that the data to be deleted does not include the preset information.
  • the determining, according to the relationship between the to-be-deleted data and the preset information, whether to delete the to-be-deleted data includes:
  • to-be-deleted data does not include the preset information, deleting the to-be-deleted data;
  • the data to be deleted includes the preset information, retain the data to be deleted or prompt the user to determine to delete the data to be deleted in a preset manner.
  • a data deletion method including:
  • the acquiring the relationship between the data to be deleted and the preset information includes:
  • the second information is matched with the preset information, determining that the relationship between the data to be deleted and the preset information is that the data to be deleted includes the preset information;
  • the second information does not match the preset information, determine that the relationship between the data to be deleted and the preset information is that the data to be deleted does not include the preset information.
  • a terminal comprising:
  • a first acquiring module configured to acquire a relationship between data to be deleted and preset information
  • the processing module is configured to determine whether to delete the to-be-deleted data according to the relationship between the data to be deleted and the preset information.
  • the first obtaining module includes:
  • An obtaining unit configured to obtain a file type of the data to be deleted
  • a first determining unit configured to determine whether the file type of the data to be deleted is a preset type
  • the first processing unit is configured to acquire a relationship between the data to be deleted and the preset information, if the file type of the data to be deleted is the preset type.
  • a server that includes:
  • a second receiving module configured to receive data to be deleted sent by the terminal
  • a second acquiring module configured to acquire a relationship between the to-be-deleted data and preset information
  • the second sending module is configured to send information including the relationship between the data to be deleted and the preset information to the terminal, so that the terminal determines, according to the information, whether to delete the data to be deleted.
  • a computer readable storage medium storing computer executable instructions for performing the data deletion method described above.
  • a terminal comprising one or more processors, a memory, and one or more programs, the one or more programs being stored in a memory, and when executed by one or more processors, performing the data deletion method described above .
  • a server comprising one or more processors, a memory and one or more programs, the one or more programs being stored in a memory, and when executed by one or more processors, performing the data deletion method described above .
  • a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to execute Any of the above data deletion methods.
  • the data deletion method, the terminal, and the server provided by the disclosure include: obtaining a relationship between the data to be deleted and the preset protection information; determining whether to delete the data to be deleted according to the relationship between the data to be deleted and the preset protection information; In this way, the corresponding deletion scheme can be determined according to whether the preset protection information is included in the deletion, and the data to be deleted is deleted according to the corresponding deletion scheme to protect the data to be deleted including the preset protection information, so as to prevent the user from Take care of these data deletions.
  • FIG. 1 is a schematic flowchart diagram of a data deletion method according to an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart diagram of another data deletion method according to the embodiment.
  • FIG. 3 is a schematic flowchart diagram of still another data deletion method according to the embodiment.
  • FIG. 4 is a schematic diagram of a data deletion method according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of another data deletion method according to the embodiment.
  • FIG. 6 is a schematic diagram of still another data deletion method according to the embodiment.
  • FIG. 7 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another terminal according to the embodiment.
  • FIG. 9 is a schematic structural diagram of still another terminal provided by this embodiment.
  • FIG. 10 is a schematic structural diagram of a server according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of another server according to the embodiment.
  • FIG. 12 is a schematic structural diagram of a data deletion apparatus according to an embodiment of the present disclosure.
  • FIG. 13 is a schematic flowchart of data deletion processing performed by a terminal analysis module according to an embodiment of the present invention.
  • FIG. 14 is a schematic flowchart of data deletion processing performed by a prompting module provided by the embodiment.
  • FIG. 15 is a schematic structural diagram of hardware of a terminal according to an embodiment of the present disclosure.
  • FIG. 16 is a schematic structural diagram of a hardware of a server according to an embodiment of the present disclosure.
  • FIG. 1 is a schematic flowchart of a data deletion method according to an embodiment of the present invention. As shown in FIG. 1 , the method provided in this embodiment includes the following steps.
  • step 110 a relationship between the data to be deleted and the preset information is obtained.
  • the relationship between the data to be deleted and the preset information in step 110 may be implemented by the terminal.
  • the relationship between the data to be deleted and the preset information includes an inclusion relationship and a non-conclusion relationship, wherein the inclusion relationship between the data to be deleted and the preset information is that the data to be deleted includes preset information, and is to be deleted. Except for the non-contained relationship between the data and the preset information, the data to be deleted does not include preset information.
  • step 120 it is determined whether to delete the data to be deleted according to the relationship between the data to be deleted and the preset information.
  • the step 120 determines, according to the relationship between the data to be deleted and the preset information, whether to delete the data to be deleted, which may be implemented by the terminal.
  • the determining whether to delete the deleted data according to the relationship between the data to be deleted and the preset information refers to determining whether to delete the data according to the inclusion relationship and the non-containment relationship between the data to be deleted and the preset information.
  • the terminal acquires the relationship between the data to be deleted and the preset information, and determines whether to delete the data to be deleted according to the relationship between the data to be deleted and the preset information; Set the corresponding deletion scheme to the deleted data, and delete the deleted data according to the corresponding deletion scheme to protect the data to be deleted containing the preset information, so as to prevent the user from deleting the data without paying attention.
  • FIG. 2 is a schematic flowchart of another data deletion method according to the embodiment. As shown in FIG. 2, the method provided in this embodiment includes the following steps.
  • step 210 the data to be deleted sent by the terminal is received.
  • the step 210 of receiving the data to be deleted sent by the terminal may be implemented by a server.
  • step 220 a relationship between the data to be deleted and the preset information is obtained.
  • the relationship between the data to be deleted and the preset information in step 220 may be implemented by a server.
  • the server uses the Internet resource to obtain the relationship between the data to be deleted and the preset information.
  • step 230 the information including the relationship between the data to be deleted and the preset information is sent to the terminal, so that the terminal determines whether to delete the to-be-deleted data according to the information.
  • step 230 sends information including a relationship between the data to be deleted and the preset information to the terminal, which may be implemented by a server.
  • the relationship between the data to be deleted and the preset information includes an inclusion relationship and a non-conclusion relationship, wherein the inclusion relationship between the data to be deleted and the preset information is that the data to be deleted includes preset information, and the data to be deleted is The non-contained relationship between the preset information is that the data to be deleted does not contain preset information.
  • the server may try to perform big data analysis. If the file type can be parsed, the server obtains the The relationship between the data to be deleted and the preset information corresponding to the file, if the file of the type cannot be parsed, the information of the file is sent to the terminal, and the terminal prompts the user to determine whether to delete the corresponding file in the preset manner. delete data. For example, if the file to be deleted is an encrypted file, the terminal prompts the user whether to delete the data corresponding to the encrypted file in a preset manner because the encrypted file cannot be parsed.
  • the server receives the data to be deleted sent by the terminal, acquires the relationship between the data to be deleted and the preset information, and sends the information including the relationship between the data to be deleted and the preset information to the terminal;
  • the terminal can determine the corresponding deletion scheme according to whether the preset information is included in the deletion, and delete the data to be deleted according to the corresponding deletion scheme to protect the data to be deleted that includes the preset information, so as to prevent the user from paying attention to the data. In the case of these data deletions.
  • FIG. 3 is a schematic flowchart of still another data deletion method according to the embodiment. As shown in FIG. 3, the method provided in this embodiment includes the following steps.
  • step 301 the terminal acquires a file type of data to be deleted.
  • the file type of the data to be deleted may include a database file, a text file, an image file, an audio file, a video file, and the like.
  • step 302 the terminal determines whether the file type of the data to be deleted is a preset type.
  • the preset type refers to a file type that the terminal can handle by itself without using a third party, wherein the preset type may include a database file, a text file, and the like.
  • step 303 if the file type of the data to be deleted is a preset type, the terminal acquires the first information included in the data to be deleted.
  • the first information refers to the information obtained by the terminal according to the data to be deleted, so as to distinguish the information obtained by the server.
  • step 304 the terminal determines whether the first information matches the preset information.
  • the terminal may perform string comparison with the preset information by using the data to be deleted, and determine whether the first information matches the preset information.
  • step 305 if the first information matches the preset information, the terminal determines that the relationship between the data to be deleted and the preset information is that the data to be deleted includes preset information; if the first information does not match the preset information, the terminal determines The relationship between the data to be deleted and the preset information is that the data to be deleted does not include preset information.
  • the terminal performs internal processing to obtain a relationship between the data to be deleted and the preset information.
  • the file type of the data to be deleted may be one type or multiple types. If the file type of the data to be deleted is multiple, it is determined whether each file type is a preset type, in each file. In the judgment of the type, if it is determined that the file type is a preset type, the processing is performed according to step 305. If it is determined that the file type is not the preset type, the processing is performed according to step 306.
  • the relationship between the data to be deleted and the preset information is represented by a relationship between the file corresponding to the data to be deleted and the preset information.
  • the data to be deleted corresponds to three files, respectively, the file 1 , the file 2 and the file 3, the terminal acquires the first information of the file 1, the first information of the file 2, and the first information of the file 3.
  • the first of the file 2 After determining that the first information of the file 1 matches the preset information, the first of the file 2 The information does not match the preset information, and the first information of the file 3 matches the preset information, and the relationship between the data to be deleted corresponding to the file 1 and the preset information is that the data to be deleted includes preset information;
  • the relationship between the deleted data and the preset information is that the data to be deleted does not include preset information;
  • the relationship between the data to be deleted corresponding to the file 3 and the preset information is that the data to be deleted includes preset information.
  • step 306 if the file type of the data to be deleted is not a preset type, the terminal sends the data to be deleted to the server.
  • step 306 is to be implemented, the terminal should have an internet connection function and complete the network connection with the server before the step is performed.
  • the terminal cannot identify the file, and cannot determine the relationship between the data to be deleted and the preset information; therefore, the terminal will The corresponding data to be deleted is sent to the server, and the server uses the network resource to parse the file, and determines the relationship between the data to be deleted and the preset information.
  • step 307 the server receives the data to be deleted sent by the terminal, parses the data to be deleted, and obtains the second information.
  • the second information refers to information obtained by the server for parsing the data to be deleted, so as to distinguish the terminal from acquiring information included in the data to be deleted.
  • the server may try to perform big data analysis. If the file type can be parsed, the server proceeds to step 307. If the file of the type cannot be parsed, the server sends a message to inform the terminal of such a situation, and the terminal prompts the user to determine whether to delete the file in a preset manner.
  • step 308 the server determines whether the second information matches the preset information.
  • the server processes the data in the image file into the second information by using an image analysis tool, and then performs matching analysis on the second information and the preset information
  • the server processes the data in the audio file into the second information by using an audio analysis tool, and then performs matching analysis on the second information and the preset information
  • the server processes the data in the video file into the second information by means of the video analysis tool, and then matches the second information with the preset information.
  • step 309 if the second information matches the preset information, the server determines that the relationship between the data to be deleted and the preset information is that the data to be deleted includes preset information; if the second information does not match the preset information, the server determines The relationship between the data to be deleted and the preset information is that the data to be deleted does not include preset information.
  • the relationship between the data to be deleted and the preset information is specifically represented by a relationship between the file corresponding to the data to be deleted and the preset information.
  • the file is a file. 1.
  • the server obtains the second information after parsing, and determines that the second information of the file 1 matches the preset information, the second information of the file 2 does not match the preset information, and the second information of the file 3
  • the relationship between the data to be deleted and the preset information corresponding to the file 1 is that the data to be deleted includes preset information; the relationship between the data to be deleted corresponding to the file 2 and the preset information is the data to be deleted.
  • the preset information is not included; then the relationship between the data to be deleted corresponding to the file 3 and the preset information is that the data to be deleted includes preset information.
  • step 310 the server sends information including the relationship between the data to be deleted and the preset information to the terminal.
  • step 311 the terminal receives information that is sent by the server and includes a relationship between the data to be deleted and the preset information.
  • step 312 if the data to be deleted does not include the preset information, the terminal deletes the data to be deleted; if the data to be deleted includes the preset information, the terminal reserves the data to be deleted or prompts the user to determine whether to delete the data to be deleted in a preset manner.
  • the terminal may directly wait for the user without prompting the user. Delete data for deletion.
  • the preset mode may be a text mode or a voice mode. If the data to be deleted includes preset information, the terminal retains the data to be deleted or prompts the user to determine whether to delete the data to be deleted in a preset manner. If the terminal prompts the user to determine to delete the data to be deleted in a preset manner, and the user determines that the deletion includes the preset. If the data is to be deleted, the terminal deletes the data. If the terminal prompts the user to delete the data to be deleted in a preset manner, and the user determines not to delete the data to be deleted that includes the preset information, the terminal retains the data to be deleted. .
  • the terminal acquires the file type of the data to be deleted, and determines whether the file type of the data to be deleted is a preset type; if the file type of the data to be deleted is a preset type, the data to be deleted and the preset are obtained.
  • the relationship between the information; if it is not the preset type, the data to be deleted is sent to the server (the relationship between the data to be deleted and the preset information is obtained by the server), and the data to be deleted and the preset information sent by the server are received.
  • the information of the relationship between the data to be deleted is determined according to the relationship between the data to be deleted and the preset information; in this way, the corresponding deletion scheme can be determined according to whether the preset information is included or not, and corresponding The deletion scheme deletes the deleted data to protect the data to be deleted that contains the preset information, so as to prevent the user from performing the data deletion without paying attention.
  • FIG. 4 is a schematic diagram of a data deletion method according to the embodiment. As shown in FIG. 4, the method provided in this embodiment includes the following steps.
  • step 410 the terminal first determines whether the file corresponding to the data to be deleted has an encrypted file. If it is determined that the encrypted file does not exist, step 420 is performed; if it is determined that the encrypted file exists, step 430 is performed.
  • step 420 the terminal determines the file type.
  • step 430 the terminal outputs the encrypted file to the protected file list.
  • step 440 the terminal determines whether the data file type to be deleted belongs to a preset type (a database file or a text file or a specified type file that can be parsed by other terminals). If yes, the terminal performs matching between the preset information and the data to be deleted.
  • the protected file list (the list of files containing the preset information) is output according to the matching result; if not, the terminal performs step 450, that is, the terminal outputs the unprocessable file list and sends it to the server.
  • step 460 the server receives and analyzes the unprocessable file list, performs image file analysis, audio file analysis, video file analysis or other file analysis according to the file type in the file list, and then matches the preset information with the data to be deleted.
  • the terminal executes step 470, that is, outputs a list of protected files (a list of files containing preset information) according to the matching result; for files that cannot be analyzed, the terminal performs step 480, that is, the server outputs a list of unprocessable files.
  • the terminal first analyzes and processes the file type that can be analyzed and matched by itself, and sends the file type that cannot be processed by the terminal to the server, and the server analyzes and processes the final
  • the file list of the information is set; in this way, the corresponding deletion scheme can be determined according to whether the preset information is included in the deletion, and the deleted data is deleted according to the corresponding deletion scheme to protect the data to be deleted including the preset information. Avoid users making these data deletions without paying attention.
  • FIG. 5 is a schematic diagram of another data deletion method according to the embodiment.
  • the terminal receives the protected data set by the user (that is, the preset information), and assumes that the current terminal language of the user is Chinese, and the protected data is “password”. According to the language type supported by the terminal, the “password” of other languages also becomes accepted.
  • Protect the data that is, as long as the content of the message includes a "password”, the protected data condition is met.
  • the protected data set by the user may also be a combination of relational expressions, such as "A" and "B", "A" or "B”, and the like.
  • the terminal receives the data information to be deleted selected by the user, and assumes that the data to be deleted set by the user is the data in the entire SMS inbox.
  • step 510 the user performs a short message deletion operation
  • step 520 the terminal detects the deletion operation and starts analyzing the data to be deleted.
  • step 530 it is determined whether the file type of the data to be deleted is a preset type, such as a database file type and a text file type.
  • step 540 if the file type of the data to be deleted is a preset type, the terminal performs matching between the data to be deleted and the preset information, and performs step 550 to determine whether there is a matching result (that is, a case where the preset information is included). If yes, step 560 is performed, that is, the terminal prompts the user in a preset manner, and displays the matching result.
  • step 570 the user makes a decision according to the prompt information, and may select the edit analysis result to filter out the protected data or cancel the original data deletion operation.
  • step 580 the terminal performs a data deletion operation other than the protected data.
  • the terminal does not start the matching analysis. 2. If the terminal determines that the data type is only the preset type, the data to be deleted need not be transmitted to the server, and the server analysis process is not executed. ; 3, in the case of setting preset information, there is no matching result, then no matching result is displayed.
  • FIG. 6 is a schematic diagram of still another data deletion method according to the embodiment.
  • the data to be deleted set in this embodiment is the data corresponding to the directory file. It is assumed that the current mobile terminal language is Chinese, and the preset information is “password”. According to the language type supported by the mobile terminal, the “password” of other languages also becomes the key. Word, that is, as long as the directory file name, file content, etc. include “password”, that is, the protected data condition is satisfied. Filter keywords support multiple filter criteria and a combination of relational expressions, such as "account” OR "password”.
  • the deletion of the directory file is started.
  • the deleted directory is assumed to be directory A, and there is an encrypted file e, a compressed file z, an audio file a, a video file v, a picture file p, and a text file t. .
  • the compressed file has a known format binary file b, an unknown format file x.
  • the data deletion method provided in this embodiment includes the following steps.
  • step 610 the user performs a delete operation of directory A.
  • step 620 the terminal detects the deletion operation, analyzes the directory A, and generates a list of files to be analyzed.
  • step 630 the terminal cyclically executes the file list analysis to be analyzed; generates a to-be-sent server file list and a protected file list, and the process may include the following steps.
  • File e If the detected file header is a known encrypted file, put e into the protected file list.
  • File a To detect that the file header is an audio file, put a in the list of server files to be sent.
  • File p If the header of the detected file is a picture file, put p into the list of files to be sent.
  • the detection file header is a text file
  • the simple file type list to be analyzed is placed, the text class data analysis is performed, and the preset information is matched, and if the preset information is included, it is output to the protected file list.
  • the detection file header is a known format binary file, and the simple file type column to be analyzed is placed.
  • the table performs other simple class data analysis and matches with the preset information, and outputs the preset information to the protected file list.
  • step 640 the terminal sends a list of server files to be sent to the server.
  • step 650 the server continues to perform data analysis, outputting a list of protected files and a list of unprocessable files, which may include the following steps.
  • File a Perform audio data analysis, process the text-related part of the audio data into text, and then match the analysis result data with the preset information, and output the list to the protected file list if the preset information is included.
  • File v Perform video data analysis, process the text-related part of the video data into text, and then perform analysis and analysis on the analysis result data and the preset information, and output the list to the protected file list if the preset information is included.
  • File p Perform image data analysis, process the text-related part of the image data into text, and then match the analysis result data with the preset information, and output the list to the protected file list if the preset information is included.
  • File x Try to perform big data analysis. If it is identifiable, perform data matching analysis. If it contains preset information, it will be output to the protected file list. If it is not recognized, it will be output to the unprocessable file list.
  • step 660 the server sends a list of protected files and a list of unprocessable files to the terminal.
  • step 670 the terminal summarizes the list of protected files and the list of unprocessable files.
  • step 680 the terminal prompts the analysis result according to the set prompt mode, and outputs the display result.
  • step 690 the user makes a decision according to the prompt information, and may select the edit analysis result to filter out the protected file or cancel the original directory deletion operation.
  • step 700 the terminal performs a data deletion operation other than the protected file.
  • the terminal first analyzes and processes the file types that can be analyzed and matched by itself, and sends the file types that cannot be processed by the terminal to the server, and the server performs analysis and processing, and finally filters out the file list including the preset information.
  • the corresponding deletion scheme can be determined according to whether the preset information is included in the deletion, and the deleted data is deleted according to the corresponding deletion scheme to protect the data to be deleted including the preset information, so as to prevent the user from paying attention to In the case of these data deletions.
  • FIG. 7 is a schematic structural diagram of a terminal according to the embodiment. As shown in FIG. 7, the terminal 5 includes the following modules.
  • the first obtaining module 51 is configured to acquire a relationship between the data to be deleted and the preset information.
  • the processing module 52 is configured to determine, according to the relationship between the data to be deleted and the preset information, whether to delete the data to be deleted.
  • the terminal provided by the embodiment obtains the relationship between the data to be deleted and the preset information, and determines whether to delete the data to be deleted; thus, the corresponding deletion scheme can be determined according to whether the preset information is included in the case of deleting the data, and Delete the data to be deleted according to the corresponding deletion scheme to protect the data to be deleted that contains the preset information, so as to prevent the user from deleting the data without paying attention.
  • FIG. 8 is a schematic structural diagram of another terminal according to the embodiment. As shown in FIG. 8, the first acquiring module 51 includes the following units.
  • the obtaining unit 511 is configured to acquire a file type of data to be deleted.
  • the first determining unit 512 is configured to determine whether the file type of the data to be deleted is a preset type
  • the first processing unit 513 is configured to obtain a relationship between the data to be deleted and the preset information, if the file type of the data to be deleted is a preset type.
  • FIG. 9 is a schematic structural diagram of another terminal according to the embodiment. As shown in FIG. 9, the terminal 5 further Includes the following modules.
  • the first sending module 53 is configured to send the data to be deleted to the server if the file type of the data to be deleted is not a preset type.
  • the first receiving module 54 is configured to receive information that is sent by the server and includes a relationship between the data to be deleted and the preset information.
  • the first processing unit 513 is configured to: if the file type of the data to be deleted is a preset type, obtain the first information included in the data to be deleted; determine whether the first information matches the preset information; if the first information and the pre- The information is matched to determine that the relationship between the data to be deleted and the preset information is that the data to be deleted includes preset information; if the first information does not match the preset information, the relationship between the data to be deleted and the preset information is determined to be Deleting data does not contain preset information.
  • the processing module 52 is configured to delete the data to be deleted if the data to be deleted does not include the preset information; if the data to be deleted includes the preset information, retain the data to be deleted or prompt the user to determine whether to delete the data to be deleted in a preset manner.
  • the file type of the data to be deleted is obtained by the terminal, and the file type of the data to be deleted is a preset type. If the file type of the data to be deleted is a preset type, the data between the data to be deleted and the preset information is obtained. Relationship; if it is not a preset type, the data to be deleted is sent to the server, and the information sent by the server including the relationship between the data to be deleted and the preset information is received; and the relationship between the data to be deleted and the preset information is deleted. The data is deleted.
  • the corresponding deletion scheme can be determined according to whether the preset information is included in the deletion, and the deleted data is deleted according to the corresponding deletion scheme to protect the data to be deleted including the preset information, thereby avoiding the user. Perform these data deletions without paying attention.
  • the first obtaining module 51, the obtaining unit 511, the first determining unit 512, the first processing unit 513, the processing module 52, the first sending module 53, and the first receiving module 54 may each be configured by Central Processing Unit (CPU), Micro Processor Unit (MPU), Digital Signal Processor (DSP), or Field Programmable Gate Array (FPGA) located in the terminal ) and so on.
  • CPU Central Processing Unit
  • MPU Micro Processor Unit
  • DSP Digital Signal Processor
  • FPGA Field Programmable Gate Array
  • FIG. 10 is a schematic structural diagram of a server according to the embodiment. As shown in FIG. 10, the server 6 includes the following modules.
  • the second receiving module 61 is configured to receive data to be deleted sent by the terminal.
  • the second obtaining module 62 is configured to acquire a relationship between the data to be deleted and the preset information.
  • the second sending module 63 is configured to send information including a relationship between the data to be deleted and the preset information to the terminal, so that the terminal determines, according to the information, whether to delete the data to be deleted.
  • the server provided by the embodiment receives the data to be deleted sent by the terminal; acquires the relationship between the data to be deleted and the preset information, and sends the information including the relationship between the data to be deleted and the preset information to the terminal; thus, the terminal can If the preset information is included, the corresponding deletion scheme is determined, and the deleted data is deleted according to the corresponding deletion scheme to protect the data to be deleted including the preset information, so as to prevent the user from performing these without paying attention to Data deletion.
  • FIG. 11 is a schematic structural diagram of another server according to the embodiment. As shown in FIG. 11, the second obtaining module 62 includes the following units.
  • the parsing unit 621 is configured to parse the data to be deleted and obtain the second information.
  • the second determining unit 622 is configured to determine whether the second information matches the preset information.
  • the second processing unit 623 is configured to determine that the relationship between the data to be deleted and the preset information is that the data to be deleted includes preset information if the second information matches the preset information; and if the second information does not match the preset information, The relationship between the data to be deleted and the preset information is determined to be that the data to be deleted does not include preset information.
  • the server provided in this embodiment receives the data to be deleted sent by the terminal; acquires the relationship between the data to be deleted and the preset information, and sends the information including the relationship between the data to be deleted and the preset information to the terminal; In this way, the terminal can determine the corresponding deletion scheme according to whether the preset information is included in the deletion, and delete the data to be deleted according to the corresponding deletion scheme to protect the data to be deleted that includes the preset information, so as to prevent the user from paying attention to In the case of these data deletions.
  • the second receiving module 61, the second obtaining module 62, the parsing unit 621, the second judging unit 622, the second processing unit 623, and the second sending module 63 may each be a CPU or an MPU located in the server. , DSP or FPGA implementation.
  • FIG. 12 is a schematic structural diagram of a data deletion apparatus according to an embodiment of the present invention.
  • the apparatus 7 includes: a setting module 71, a terminal analysis module 72, a server analysis module 73, a prompting module 74, and an execution module 75.
  • the setting module 71 performs operations related to setting the terminal analysis module 72, the server analysis module 73, the prompting module 74, and the execution module 75, such as the setting of the preset information of the terminal analysis module 72 and the server analysis module 73.
  • the analysis module triggers preset information analysis when the user performs a protected data deletion operation, the simple data analysis is completed at the terminal analysis module 72, the complex data analysis is completed at the server analysis module 73, and the prompt module 74 is used to summarize the terminal analysis module 72 and the server.
  • the protected data output by the analysis module 73 is output to the display terminal to support interaction with the protected data.
  • the execution module 75 is configured to filter the protected data filtered by the user, and execute the data other than the protected data. Data manipulation.
  • the data deletion method corresponding to the data deletion device provided by the foregoing embodiment includes the following steps.
  • the user sets the data protection rule, and the setting module 71 completes the interaction with the user and records the corresponding data protection rule.
  • the user performs a protected data operation.
  • the terminal analysis module 72 detects the deletion operation and starts data analysis, and matches the data to be deleted with the preset information.
  • the terminal analysis module 72 performs data analysis, and if it is a complex file type, such as an audio and video file, an image file, etc., it is sent to the server, and the server analysis module 73 Perform data analysis.
  • the data content is judged, the data content is processed, and the feature matching is performed according to the type.
  • the analysis results of the terminal analysis module 72 and the server analysis module 73 are summarized into a protected data list and a non-processable data list.
  • the terminal analysis module 72 outputs the result to the prompting module 74, and the prompting module 74 implements the prompting according to the set display mode.
  • the user makes a decision based on the prompts and filters out the protected data from the list of protected data and the list of unprocessable data.
  • Execution module 75 excludes the protected data and performs the final data operation on the remaining data.
  • FIG. 13 is a schematic flowchart of data deletion processing performed by the terminal analysis module according to the embodiment.
  • the terminal analysis module 72 determines whether the data type to be a simple file type is used. If it is a simple file type, the data to be deleted is subjected to string processing matching with the preset information, and in step 820, the protected data list satisfying the protection rule is output.
  • step 910 the prompting module 74 displays a protected data list and a non-processable data list.
  • step 920 the receiving user is received.
  • the protected data list and the unprocessable data list are edited, and in step 930, the protected content is determined.
  • the data deletion device acquires the file type of the data to be deleted; determines the number to be deleted. Whether the file type of the data is a preset type; if the file type of the data to be deleted is a preset type, the relationship between the data to be deleted and the preset information is obtained; if it is not the preset type, the data to be deleted is sent to the server, and Receiving information about the relationship between the data to be deleted and the preset information sent by the server; deleting the data according to the relationship between the data to be deleted and the preset information; thus, the method can be treated according to whether the preset information is included or not Delete the data to determine the corresponding deletion scheme, and delete the data to be deleted according to the corresponding deletion scheme to protect the data to be deleted that contains the preset information, so as to prevent the user from deleting the data without paying attention.
  • the setting module 71, the terminal analyzing module 72, the server analyzing module 73, the prompting module 74, and the executing module 75 can all be implemented by a CPU, an MPU, a DSP, an FPGA, or the like in the data deleting device.
  • the embodiment further provides a computer readable storage medium storing computer executable instructions for executing the data deletion method.
  • FIG. 15 it is a schematic diagram of a hardware structure of a terminal provided by this embodiment.
  • the terminal includes: a processor 151 and a memory 152 ; and may also include a communication interface (Communications). Interface 153 and bus 154.
  • Communication interface 153 and bus 154.
  • the processor 151, the memory 152, and the communication interface 153 can complete communication with each other through the bus 154.
  • the communication interface 153 can be used for information transmission.
  • the processor 151 can call the logic instructions in the memory 152 to perform any one of the data deletion methods of the above embodiments.
  • the server includes: a processor 161 and a memory 162; and may also include a communication interface (Communications). Interface 163 and bus 164.
  • the processor 161, the memory 162, and the communication interface 163 can complete communication with each other through the bus 164. Communication interface 163 can be used for information transmission.
  • the processor 161 can call the memory 162 Logic instructions in the execution of any of the data deletion methods of the above embodiments.
  • the memory 152 and the memory 162 may include a storage program area and a storage data area, and the storage program area may store an operating system and an application required for at least one function.
  • the storage data area can store data and the like created according to the use of the terminal and the server.
  • the memory may include, for example, a volatile memory of a random access memory, and may also include a non-volatile memory. For example, at least one disk storage device, flash memory device, or other non-transitory solid state storage device.
  • the logic instructions in memory 152 and memory 162 described above can be implemented in the form of software functional units and sold or used as separate products, the logic instructions can be stored in a computer readable storage medium.
  • the technical solution of the present disclosure may be embodied in the form of a computer software product, which may be stored in a storage medium, and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) All or part of the steps of the data deletion method described in this embodiment are performed.
  • the storage medium may be a non-transitory storage medium or a transitory storage medium.
  • the non-transitory storage medium may include: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. medium.
  • All or part of the process of implementing the foregoing embodiment may be performed by a computer program to indicate related hardware, and the program may be stored in a non-transitory computer readable storage medium, and when the program is executed, may include The flow of an embodiment of the above method.
  • This embodiment can be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • the data deletion method, the terminal, and the server provided by the present disclosure can determine the corresponding deletion scheme according to whether the preset protection information is included in different situations, and delete the data to be deleted according to the corresponding deletion scheme, so as to protect the preset protection.
  • the data to be deleted of the information to prevent the user from performing such data deletion without paying attention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

一种数据删除方法、终端和服务器,其中,该方法包括获取待删除数据与预设保护信息之间的关系;根据待删除数据与预设保护信息之间的关系确定是否对待删除数据进行删除。

Description

数据删除方法、终端及服务器 技术领域
本公开涉及数据管理领域,例如涉及一种数据删除方法、终端及服务器。
背景技术
在日常生活中,用户往往需要对终端存储的文件进行管理,对不需要的文件进行删除,以保证终端始终留有一定的可存储空间。
相关技术在进行文件删除时,通过选中要删除的文件,点击删除选项,终端界面弹出提示框,提示用户是否确定删除,待用户确认删除后,对用户选中的文件进行删除。
然而这种数据删除方法,极有可能使得用户在未注意文件内容的情况下删除了重要文件,造成后续恢复数据的困难。
发明内容
本公开提供一种数据删除方法、终端及服务器,以保护包含预设保护信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
一种数据删除方法,包括:
获取待删除数据与预设信息之间的关系;
根据所述待删除数据与预设信息之间的关系确定是否对所述待删除数据进行删除。
可选地,所述获取待删除数据与预设信息之间的关系,包括:
获取所述待删除数据的文件类型;
判断所述待删除数据的文件类型是否是预设类型;
若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据与所述预设信息之间的关系。
可选地,所述方法还包括:
若所述待删除数据的文件类型不是所述预设类型,将所述待删除数据发送至服务器;
接收所述服务器发送的包含所述待删除数据与预设信息之间的关系的信息。
可选地,若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据与预设信息之间的关系,包括:
若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据包含的第一信息;
判断所述第一信息与所述预设信息是否匹配;
若所述第一信息与所述预设信息匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据包含所述预设信息;
若所述第一信息与所述预设信息不匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据不包含所述预设信息。
可选地,所述根据所述待删除数据与预设信息之间的关系确定是否对所述待删除数据进行删除,包括:
若所述待删除数据不包含所述预设信息,删除所述待删除数据;
若所述待删除数据包含所述预设信息,保留所述待删除数据或以预设方式提示用户是否确定删除所述待删除数据。
一种数据删除方法,包括:
接收终端发送的待删除数据;
获取所述待删除数据与预设信息之间的关系;
发送包含所述待删除数据与预设信息之间的关系的信息至所述终端,以使终端根据所述信息确定是否对所述待删除数据进行删除。
可选地,所述获取所述待删除数据与预设信息之间的关系,包括:
解析所述待删除数据并得到第二信息;
判断所述第二信息与所述预设信息是否匹配;
若所述第二信息与所述预设信息匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据包含所述预设信息;
若所述第二信息与所述预设信息不匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据不包含所述预设信息。
一种终端,包括:
第一获取模块,设置为获取待删除数据与预设信息之间的关系;
处理模块,设置为根据所述待删除数据与预设信息之间的关系确定是否对所述待删除数据进行删除。
可选地,所述第一获取模块包括:
获取单元,设置为获取所述待删除数据的文件类型;
第一判断单元,设置为判断所述待删除数据的文件类型是否是预设类型;
第一处理单元,设置为若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据与所述预设信息之间的关系。
一种服务器,包括:
第二接收模块,设置为接收终端发送的待删除数据;
第二获取模块,设置为获取所述待删除数据与预设信息之间的关系;
第二发送模块,设置为发送包含所述待删除数据与预设信息之间的关系的信息至所述终端,以使终端根据所述信息确定是否对所述待删除数据进行删除。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述数据删除方法。
一种终端,该终端包括一个或多个处理器、存储器以及一个或多个程序,所述一个或多个程序存储在存储器中,当被一个或多个处理器执行时,执行上述数据删除方法。
一种服务器,该服务器包括一个或多个处理器、存储器以及一个或多个程序,所述一个或多个程序存储在存储器中,当被一个或多个处理器执行时,执行上述数据删除方法。
一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任意一种数据删除方法。
本公开提供的数据删除方法、终端及服务器,该方法包括获取待删除数据与预设保护信息之间的关系;根据待删除数据与预设保护信息之间的关系确定是否对待删除数据进行删除;这样,能够根据是否包含预设保护信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设保护信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
附图说明
图1为本实施例提供的一种数据删除方法的流程示意图;
图2为本实施例提供的另一种数据删除方法的流程示意图;
图3为本实施例提供的又一种数据删除方法的流程示意图;
图4为本实施例提供的一种数据删除方法的示意图;
图5为本实施例提供的另一种数据删除方法的示意图;
图6为本实施例提供的又一种数据删除方法的示意图;
图7为本实施例提供的一种终端结构示意图;
图8为本实施例提供的另一种终端结构示意图;
图9为本实施例提供的又一种终端结构示意图;
图10为本实施例提供的一种服务器结构示意图;
图11为本实施例提供的另一种服务器结构示意图;
图12为本实施例提供的一种数据删除装置的结构示意图;
图13为本实施例提供的终端分析模块进行数据删除处理的流程示意图;
图14为本实施例提供的提示模块进行数据删除处理的流程示意图;
图15为本实施例提供的一种终端的硬件结构示意图;
图16为本实施例提供的一种服务器的硬件结构示意图。
具体实施方式
图1为本实施例提供的一种数据删除方法的流程示意图,如图1所示,本实施例提供的方法包括以下步骤。
在步骤110中,获取待删除数据与预设信息之间的关系。
可选地,步骤110获取待删除数据与预设信息之间的关系可以由终端实现。
其中,待删除数据与预设信息之间的关系包括包含关系和不包含关系,其中,待删除数据与预设信息之间的包含关系为待删除数据包含预设信息,待删 除数据与预设信息之间的不包含关系为待删除数据不包含预设信息。
在步骤120中,根据待删除数据与预设信息之间的关系确定是否对待删除数据进行删除。
可选地,步骤120根据待删除数据与预设信息之间的关系确定是否对待删除数据进行删除,可以由终端实现。
其中,根据待删除数据与预设信息之间的关系确定是否对待删除数据进行删除,指的是根据待删除数据与预设信息之间的包含关系和不包含关系确定是否对待删除数据进行删除。
本实施例提供的数据删除方法,终端获取待删除数据与预设信息之间的关系;根据待删除数据与预设信息之间的关系确定是否对待删除数据进行删除;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
图2为本实施例提供的另一种数据删除方法的流程示意图,如图2所示,本实施例提供的方法包括以下步骤。
在步骤210中,接收终端发送的待删除数据。
可选地,步骤210接收终端发送的待删除数据可以由服务器实现。
在步骤220中,获取待删除数据与预设信息之间的关系。
可选地,步骤220获取待删除数据与预设信息之间的关系可以由服务器实现。
其中,服务器运用互联网资源获取待删除数据与预设信息之间的关系。
在步骤230中,发送包含待删除数据与预设信息之间的关系的信息至终端,以使终端根据所述信息确定是否对所述待删除数据进行删除。
可选地,步骤230发送包含待删除数据与预设信息之间的关系的信息至终端可以由服务器实现。
可选地,待删除数据与预设信息之间的关系包括包含关系和不包含关系,其中,待删除数据与预设信息之间的包含关系为待删除数据包含预设信息,待删除数据与预设信息之间的不包含关系为待删除数据不包含预设信息。
可选地,在进行待删除数据的删除时,可能存在文件类型是服务器也无法解析的情况,若出现这种情况,服务器可以尝试进行大数据分析,若能够解析该文件类型,则服务器获取该文件对应的待删除数据与预设信息之间的关系,若不能够解析该类型的文件,则将该文件的信息发送给终端,由终端以预设方式提示用户是否确定删除该文件对应的待删除数据。举例来说,若待删除数据的所属文件为加密文件,由于加密文件无法解析,终端则以预设方式提示用户是否确定删除该加密文件对应的数据。
本实施例提供的数据删除方法,服务器接收终端发送的待删除数据;获取待删除数据与预设信息之间的关系,发送包含待删除数据与预设信息之间的关系的信息至终端;这样,终端能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
图3为本实施例提供的又一种数据删除方法的流程示意图,如图3所示,本实施例提供的方法包括以下步骤。
在步骤301中,终端获取待删除数据的文件类型。
可选地,待删除数据的文件类型可以包括数据库文件、文本文件、图像文件、音频文件、视频文件等。
在步骤302中,终端判断待删除数据的文件类型是否是预设类型。
可选地,预设类型指的是终端在不借助第三方的情况下、自身能够处理的文件类型,其中,预设类型可以包括数据库文件、文本文件等。
在步骤303中,若待删除数据的文件类型是预设类型,终端获取待删除数据包含的第一信息。
可选地,第一信息指的是终端根据待删除数据获取得到的信息,以此区别服务器解析得到的信息。
在步骤304中,终端判断第一信息与预设信息是否匹配。
可选地,当待删除数据为数据库数据时,终端可以通过对待删除数据与预设信息进行字符串比对,判断第一信息与预设信息是否匹配。
在步骤305中,若第一信息与预设信息匹配,终端确定待删除数据与预设信息之间的关系为待删除数据包含预设信息;若第一信息与预设信息不匹配,终端确定待删除数据与预设信息之间的关系为待删除数据不包含预设信息。
其中,若待删除数据的文件类型是终端自身能够处理的文件类型(预设类型),则终端通过自身内部处理,以获取待删除数据与预设信息之间的关系。
可选地,待删除数据的文件类型可能是一种,也可能是多种,若待删除数据的文件类型是多种,则一一判断每种文件类型是否是预设类型,在每一个文件类型的判断中,如果确定该文件类型是预设类型,则按照步骤305进行处理,如果确定该文件类型不是预设类型,则按照步骤306进行处理。
可选地,待删除数据与预设信息之间的关系表现在待删除数据对应的文件与预设信息之间的关系上,举例来说,若待删除数据对应3个文件,分别为文件1、文件2和文件3,终端获取文件1的第一信息、文件2的第一信息和文件3的第一信息,经过判断确定文件1的第一信息与预设信息匹配,文件2的第一 信息与预设信息不匹配,文件3的第一信息与预设信息匹配,那么文件1对应的待删除数据与预设信息之间的关系为待删除数据包含预设信息;文件2对应的待删除数据与预设信息之间的关系为待删除数据不包含预设信息;文件3对应的待删除数据与预设信息之间的关系为待删除数据包含预设信息。
在步骤306中,若待删除数据的文件类型不是预设类型,终端将待删除数据发送至服务器。
其中,步骤306要能够实现,终端应具有互联网连接功能并在该步骤进行前完成与服务器的网络连接。
可选地,如果待删除数据的文件类型是终端自身无法处理的文件类型,那么终端将无法识别该文件,也无法判断待删除数据与预设信息之间的关系;因此,终端会将该文件对应的待删除数据发送至服务器,交由服务器运用网络资源对文件进行解析,并判断待删除数据与预设信息之间的关系。
在步骤307中,服务器接收终端发送的待删除数据,解析待删除数据并得到第二信息。
其中,第二信息指的是服务器解析待删除数据得到的信息,以此区别终端获取待删除数据包含的信息。
可选地,在进行待删除数据的删除时,可能存在文件类型是服务器也无法解析的情况,若出现这种情况,服务器可以尝试进行大数据分析,若能够解析该文件类型,服务器进行步骤307,若不能够解析该类型的文件,服务器发送消息以告知终端此类情况,终端则以预设方式提示用户是否确定删除该文件。
在步骤308中,服务器判断第二信息与预设信息是否匹配。
可选地,当待删除数据的文件类型为图像文件时,服务器借助图像分析工具将图像文件中的数据处理成第二信息,再将第二信息与预设信息做匹配分析; 当待删除数据的文件类型为音频文件时,服务器借助音频分析工具将音频文件中的数据处理成第二信息,再将第二信息与预设信息做匹配分析;当待删除数据的文件类型为视频文件时,服务器借助视频分析工具将视频文件中的数据处理成第二信息,再将第二信息与预设信息做匹配分析。
在步骤309中,若第二信息与预设信息匹配,服务器确定待删除数据与预设信息之间的关系为待删除数据包含预设信息;若第二信息与预设信息不匹配,服务器确定待删除数据与预设信息之间的关系为待删除数据不包含预设信息。
可选地,待删除数据与预设信息之间的关系具体表现在待删除数据对应的文件与预设信息之间的关系上,举例来说,若待删除数据对应3个文件,分别为文件1、文件2和文件3,服务器经过解析得到第二信息,经过判断确定文件1的第二信息与预设信息匹配,文件2的第二信息与预设信息不匹配,文件3的第二信息与预设信息匹配,那么文件1对应的待删除数据与预设信息之间的关系为待删除数据包含预设信息;文件2对应的待删除数据与预设信息之间的关系为待删除数据不包含预设信息;那么文件3对应的待删除数据与预设信息之间的关系为待删除数据包含预设信息。
在步骤310中,服务器发送包含待删除数据与预设信息之间的关系的信息至终端。
在步骤311中,终端接收服务器发送的包含待删除数据与预设信息之间的关系的信息。
在步骤312中,若待删除数据不包含预设信息,终端删除待删除数据;若待删除数据包含预设信息,终端保留待删除数据或以预设方式提示用户是否确定删除待删除数据。
可选地,若待删除数据不包含预设信息,终端可以不提示用户而直接将待 删除数据进行删除。
可选地,预设方式可以是文字方式,也可以是语音方式。若待删除数据包含预设信息,终端保留待删除数据或以预设方式提示用户是否确定删除待删除数据,若终端以预设方式提示用户是否确定删除待删除数据,并且用户确定删除包含预设信息的待删除数据,则终端对该数据进行删除操作,若终端以预设方式提示用户是否确定删除待删除数据,并且用户确定不删除包含预设信息的待删除数据,则终端保留待删除数据。
其中,本实施例中与其它实施例中相同步骤或概念的解释可以参照其它实施例中的描述,此处不再赘述。
本实施例提供的数据删除方法,终端获取待删除数据的文件类型;判断待删除数据的文件类型是否是预设类型;若待删除数据的文件类型是预设类型,获取待删除数据与预设信息之间的关系;若不是预设类型,将待删除数据发送至服务器(由服务器获取待删除数据与预设信息之间的关系),并接收服务器发送的包含待删除数据与预设信息之间的关系的信息;根据待删除数据与预设信息之间的关系确定是否对待删除数据进行删除;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
图4为本实施例提供的一种数据删除方法的示意图,如图4所示,本实施例提供的方法包括以下步骤。
在步骤410中,终端首先判断待删除数据对应的文件是否存在加密文件,若确定不存在加密文件,则执行步骤420;若确定存在加密文件,则执行步骤430。
在步骤420中,终端判断文件类型。
在步骤430中,终端将加密文件输出至受保护文件列表。
在步骤440中,终端判断待删除数据文件类型是否属于预设类型(数据库文件或文本类文件或其他终端能够解析的指定类型文件),如果属于,终端进行预设信息与待删除数据的匹配,根据匹配结果输出受保护文件列表(包含预设信息的文件的列表);如果不属于,终端执行步骤450,即终端输出不可处理文件列表发送给服务器。
在步骤460中,服务器接收并分析不可处理文件列表,根据该文件列表里的文件类型进行图片文件分析、音频文件分析、视频文件分析或其他文件分析,然后进行预设信息与待删除数据的匹配,终端执行步骤470,即根据匹配结果输出受保护文件列表(包含预设信息的文件的列表);对于无法分析的文件,终端执行步骤480,即服务器输出不可处理文件列表。
本实施例提供的数据删除方法,对于待删除数据,终端首先对自身能够分析匹配的文件类型进行分析处理,将自身无法处理的文件类型发送给服务器,由服务器进行分析处理,最终筛选出包含预设信息的文件列表;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
下面再提供一个实施例说明数据删除方法,图5为本实施例提供的另一种数据删除方法的示意图。
首先终端接收用户设定的受保护数据(即预设信息),假设用户当前终端语言为中文,受保护数据为“密码”,根据终端支持的语言类型,其它语言的“密码”也同时成为受保护数据,即只要短信内容包括“密码”,即满足受保护数据条件。 其中,用户设定的受保护数据还可以是关系表达式组合,例如“A”和“B”,“A”或“B”等。
然后终端接收用户选定的待删除数据信息,假设用户设定的待删除数据是整个短信收件箱里的数据。
本实施例在完成以上步骤设置后,如图5所示,执行删除短信时,包括以下步骤。
在步骤510中,用户执行短信删除操作;
在步骤520中,终端检测到删除操作,启动对待删除数据分析
在步骤530中,判断待删除数据的文件类型是否为预设类型,如:数据库文件类型、文本文件类型。
在步骤540中,若待删除数据的文件类型为预设类型,终端进行待删除数据与预设信息进行匹配,并执行步骤550,即判断是否存在匹配结果(即包含预设信息的情况),如存在,则执行步骤560,即终端以预设方式提示用户,并显示匹配结果。
在步骤570中,用户根据提示信息进行决策,可选择编辑分析结果过滤出受保护的数据,或者取消原数据删除操作。
在步骤580中,终端执行受保护数据以外的数据删除操作。
其中,1、用户在未设定预设信息的情况下,终端不启动匹配分析;2、若终端判断数据类型仅为预设类型,则无需将待删除数据传送到服务器,不执行服务器分析流程;3、在设定预设信息的情况下,不存在匹配结果,则无匹配结果显示。
下面再提供一个实施例说明数据删除方法,图6为本实施例提供的又一种数据删除方法的示意图。
本实施例设定的待删除数据是目录文件对应的数据,假设当前移动终端语种为中文,预设信息为“密码”,根据移动终端支持的语言类型,其它语种的“密码”也同时成为关键字,即只要目录文件名,文件内容等包括“密码”,即满足受保护数据条件。过滤关键字支持多个过滤条件以及关系表达式组合,如“账号”OR“密码”。
本实施例在完成以上步骤设置后,开始进行目录文件的删除,被删除目录假设为目录A,内有加密文件e,压缩文件z,音频文件a,视频文件v,图片文件p,文本文件t。压缩文件中有已知格式二进制文件b,未知格式文件x。如图6所示,本实施例提供的数据删除方法包括以下步骤。
在步骤610中,用户执行目录A的删除操作。
在步骤620中,终端检测到删除操作,分析目录A,生成待分析文件列表。
在步骤630中,终端循环执行待分析文件列表分析;生成待发送服务器文件列表和受保护文件列表,该过程可以包括以下步骤。
文件e:检测文件头为已知加密文件,则将e放入受保护文件列表。
文件z:检测文件头为压缩文件,则将z执行解压操作,解压出的数据b,x重新放入待分析文件列表。
文件a:检测文件头为音频文件,则将a放入待发送服务器文件列表。
文件v:检测文件头为视频文件,则将v放入待发送服务器文件列表。
文件p:检测文件头为图片文件,则将p放入待发送服务器文件列表。
文件t:检测文件头为文本文件,则放入待分析简单文件类型列表,执行文本类数据分析,并与预设信息进行匹配,若包含预设信息则输出到受保护文件列表。
文件b:检测文件头为已知格式二进制文件,则放入待分析简单文件类型列 表,执行其它简单类数据分析,并与预设信息进行匹配,若包含预设信息则输出到受保护文件列表。
文件x:检测文件头为未知格式文件,则放入待发送服务器文件列表。
在步骤640中,终端将待发送服务器文件列表发送至服务器。
在步骤650中,服务器继续执行数据分析,输出受保护文件列表和不可处理文件列表,该过程可以包括以下步骤。
文件a:执行音频数据分析,将音频数据中文字相关的部分处理成文字,再将分析结果数据与预设信息做匹配分析,若包含预设信息则输出到受保护文件列表。
文件v:执行视频数据分析,将视频数据中文字相关的部分处理成文字,再将分析结果数据与预设信息做匹配分析,若包含预设信息则输出到受保护文件列表。
文件p:执行图像数据分析,将图像数据中文字相关的部分处理成文字,再将分析结果数据与预设信息做匹配分析,若包含预设信息则输出到受保护文件列表。
文件x:尝试进行大数据分析,若可识别则进行数据匹配分析,若包含预设信息则输出到受保护文件列表,若不可识别则输出到不可处理文件列表。
在步骤660中,服务器将受保护文件列表和不可处理文件列表发送到终端。
在步骤670中,终端汇总受保护文件列表和不可处理文件列表。
在步骤680中,终端将分析结果按设置的提示方式提示,并输出显示结果。
在步骤690中,用户根据提示信息进行决策,可选择编辑分析结果过滤出受保护的文件,或者取消原目录删除操作。
在步骤700中,终端执行受保护文件以外的数据删除操作。
本实施例提供的数据删除方法,终端首先对自身能够分析匹配的文件类型进行分析处理,将自身无法处理的文件类型发送给服务器,由服务器进行分析处理,最终筛选出包含预设信息的文件列表;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
图7为本实施例提供的一种终端结构示意图,如图7所示,该终端5包括以下模块。
第一获取模块51,设置为获取待删除数据与预设信息之间的关系。
处理模块52,设置为根据待删除数据与预设信息之间的关系确定是否对待删除数据进行删除。
本实施例提供的终端通过获取待删除数据与预设信息之间的关系;确定是否对待删除数据进行删除;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
图8为本实施例提供的另一种终端结构示意图,如图8所示,第一获取模块51包括以下单元。
获取单元511,设置为获取待删除数据的文件类型。
第一判断单元512,设置为判断待删除数据的文件类型是否是预设类型;
第一处理单元513,设置为若待删除数据的文件类型是预设类型,获取待删除数据与预设信息之间的关系。
图9为本实施例提供的又一种终端结构示意图,如图9所示,该终端5还 包括以下模块。
第一发送模块53,设置为若待删除数据的文件类型不是预设类型,将待删除数据发送至服务器。
第一接收模块54,设置为接收服务器发送的包含待删除数据与预设信息之间的关系的信息。
第一处理单元513是设置为,若待删除数据的文件类型是预设类型,获取所述待删除数据包含的第一信息;判断第一信息与预设信息是否匹配;若第一信息与预设信息匹配,确定待删除数据与预设信息之间的关系为待删除数据包含预设信息;若第一信息与预设信息不匹配,确定待删除数据与预设信息之间的关系为待删除数据不包含预设信息。
处理模块52,是设置为若待删除数据不包含预设信息,删除待删除数据;若待删除数据包含预设信息,保留待删除数据或以预设方式提示用户是否确定删除待删除数据。
本实施例提供的终端获取待删除数据的文件类型;判断待删除数据的文件类型是否是预设类型;若待删除数据的文件类型是预设类型,获取待删除数据与预设信息之间的关系;若不是预设类型,将待删除数据发送至服务器,并接收服务器发送的包含待删除数据与预设信息之间的关系的信息;根据待删除数据与预设信息之间的关系对待删除数据进行删除;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
在实际应用中,所述第一获取模块51、获取单元511、第一判断单元512、第一处理单元513、处理模块52、第一发送模块53、第一接收模块54,均可由 位于终端中的中央处理器(Central Processing Unit,CPU)、微处理器(Micro Processor Unit,MPU)、数字信号处理器(Digital Signal Processor,DSP)或现场可编程门阵列(Field Programmable Gate Array,FPGA)等实现。
图10为本实施例提供的一种服务器结构示意图,如图10所示,该服务器6包括以下模块。
第二接收模块61,设置为接收终端发送的待删除数据。
第二获取模块62,设置为获取待删除数据与预设信息之间的关系。
第二发送模块63,设置为发送包含待删除数据与预设信息之间的关系的信息至终端,以使终端根据所述信息确定是否对所述待删除数据进行删除。
本实施例提供的服务器接收终端发送的待删除数据;获取待删除数据与预设信息之间的关系,发送包含待删除数据与预设信息之间的关系的信息至终端;这样,终端能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
图11为本实施例提供的另一种服务器结构示意图,如图11所示,第二获取模块62包括以下单元。
解析单元621,设置为解析待删除数据并得到第二信息。
第二判断单元622,设置为判断第二信息与预设信息是否匹配。
第二处理单元623,设置为若第二信息与预设信息匹配,确定待删除数据与预设信息之间的关系为待删除数据包含预设信息;若第二信息与预设信息不匹配,确定待删除数据与预设信息之间的关系为待删除数据不包含预设信息。
本实施例提供的服务器接收终端发送的待删除数据;获取待删除数据与预设信息之间的关系,发送包含待删除数据与预设信息之间的关系的信息至终端; 这样,终端能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
在实际应用中,所述第二接收模块61、第二获取模块62、解析单元621、第二判断单元622、第二处理单元623、第二发送模块63,均可由位于服务器中的CPU、MPU、DSP或FPGA等实现。
图12为本实施例提供的一种数据删除装置的结构示意图,如图12所示,该装置7包括:设置模块71,终端分析模块72,服务器分析模块73,提示模块74,执行模块75。
其中,设置模块71执行对终端分析模块72、服务器分析模块73、提示模块74和执行模块75进行相关设定的操作,如终端分析模块72、服务器分析模块73的预设信息的设定,提示模块74的显示模式设定,执行模块75的执行方式设定等等。分析模块在用户执行受保护的数据删除操作时触发预设信息分析,简单数据分析在终端分析模块72完成,复杂数据分析在服务器分析模块73完成,提示模块74用于汇总终端分析模块72和服务器分析模块73输出的受保护数据,并输出到显示终端,支持对受保护数据与用户进行交互,执行模块75用于对用户筛选出的受保护数据进行过滤,对受保护数据以外的数据执行最终的数据操作。
可选地,上述实施例提供的数据删除装置对应的数据删除方法包括以下步骤。
首先,用户设定数据保护规则,设置模块71与用户完成交互,记录相应的数据保护规则。
用户执行受保护的数据操作。
终端分析模块72检测删除操作并启动数据分析,将待删除数据与预设信息进行匹配。
判断文件类型,若是简单文件类型,如数据库文件,文本文件等,则终端分析模块72进行数据分析,若是复杂文件类型,如音视频文件,图像文件等,则发送给服务器,由服务器分析模块73进行数据分析。
判断数据内容,对数据内容进行处理,按照类型不同进行特征匹配。
将终端分析模块72与服务器分析模块73的分析结果汇总成受保护数据列表与不可处理数据列表。
终端分析模块72输出结果到提示模块74,提示模块74按设定的显示模式实现提示。
用户根据提示做决策,从受保护数据列表与不可处理数据列表中筛选出受保护的数据。
执行模块75排除受保护数据,将剩余的数据执行最终的数据操作。
其中,图13为本实施例提供的终端分析模块进行数据删除处理的流程示意图,如图13所示,在步骤810中,终端分析模块72判断待数据类型是否为简单文件类型;在步骤820中,若是简单文件类型,则对待删除的数据与预设信息进行字符串处理匹配,以及在步骤820中,输出满足保护规则的受保护数据列表。
图14为本实施例提供的提示模块进行数据删除处理的流程示意图,如图14所示,在步骤910中,提示模块74显示受保护数据列表和不可处理数据列表,在步骤920中,接收用户编辑受保护数据列表和不可处理数据列表,在步骤930中,确定受保护内容。
本实施例提供的数据删除装置获取待删除数据的文件类型;判断待删除数 据的文件类型是否是预设类型;若待删除数据的文件类型是预设类型,获取待删除数据与预设信息之间的关系;若不是预设类型,将待删除数据发送至服务器,并接收服务器发送的包含待删除数据与预设信息之间的关系的信息;根据待删除数据与预设信息之间的关系对待删除数据进行删除;这样,能够根据是否包含预设信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。
在实际应用中,所述设置模块71,终端分析模块72,服务器分析模块73,提示模块74,执行模块75,均可由数据删除装置中的CPU、MPU、DSP或FPGA等实现。
本实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述数据删除方法。
如图15所示,是本实施例提供的一种终端的硬件结构示意图,如图15所示,该终端包括:处理器(processor)151和存储器(memory)152;还可以包括通信接口(Communications Interface)153和总线154。
其中,处理器151、存储器152和通信接口153可以通过总线154完成相互间的通信。通信接口153可以用于信息传输。处理器151可以调用存储器152中的逻辑指令,以执行上述实施例的任意一种数据删除方法。
如图16所示,是本实施例提供的一种服务器的硬件结构示意图,如图16所示,该服务器包括:处理器(processor)161和存储器(memory)162;还可以包括通信接口(Communications Interface)163和总线164。
其中,处理器161、存储器162和通信接口163可以通过总线164完成相互间的通信。通信接口163可以用于信息传输。处理器161可以调用存储器162 中的逻辑指令,以执行上述实施例的任意一种数据删除方法。
存储器152和存储器162可以包括存储程序区和存储数据区,存储程序区可以存储操作系统和至少一个功能所需的应用程序。存储数据区可以存储根据终端和服务器的使用所创建的数据等。此外,存储器可以包括,例如,随机存取存储器的易失性存储器,还可以包括非易失性存储器。例如至少一个磁盘存储器件、闪存器件或者其他非暂态固态存储器件。
此外,在上述存储器152和存储器162中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,该逻辑指令可以存储在一个计算机可读取存储介质中。本公开的技术方案可以以计算机软件产品的形式体现出来,该计算机软件产品可以存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本实施例所述数据删除方法的全部或部分步骤。
存储介质可以是非暂态存储介质,也可以是暂态存储介质。非暂态存储介质可以包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等多种可以存储程序代码的介质。
实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指示相关的硬件完成的,该程序可存储于一个非暂态计算机可读存储介质中,该程序被执行时,可包括如上述方法的实施例的流程。
本实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
工业实用性
本公开提供的数据删除方法、终端及服务器,能够根据是否包含预设保护信息的不同情况对待删除数据确定相应的删除方案,并按照相应的删除方案对待删除数据进行删除,以保护包含预设保护信息的待删除数据,避免用户在不注意的情况下进行这些数据删除。

Claims (11)

  1. 一种数据删除方法,包括:
    获取待删除数据与预设信息之间的关系;
    根据所述待删除数据与预设信息之间的关系确定是否对所述待删除数据进行删除。
  2. 根据权利要求1所述的方法,其中,所述获取待删除数据与预设信息之间的关系,包括:
    获取所述待删除数据的文件类型;
    判断所述待删除数据的文件类型是否是预设类型;
    若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据与所述预设信息之间的关系。
  3. 根据权利要求2所述的方法,还包括:
    若所述待删除数据的文件类型不是所述预设类型,将所述待删除数据发送至服务器;
    接收所述服务器发送的包含所述待删除数据与预设信息之间的关系的信息。
  4. 根据权利要求2所述的方法,其中,所述若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据与预设信息之间的关系,包括:
    若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据包含的第一信息;
    判断所述第一信息与所述预设信息是否匹配;
    若所述第一信息与所述预设信息匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据包含所述预设信息;
    若所述第一信息与所述预设信息不匹配,确定所述待删除数据与所述预设 信息之间的关系为所述待删除数据不包含所述预设信息。
  5. 根据权利要求1所述的方法,其中,所述根据所述待删除数据与预设信息之间的关系确定是否对所述待删除数据进行删除,包括:
    若所述待删除数据不包含所述预设信息,删除所述待删除数据;
    若所述待删除数据包含所述预设信息,保留所述待删除数据或以预设方式提示用户是否确定删除所述待删除数据。
  6. 一种数据删除方法,包括:
    接收终端发送的待删除数据;
    获取所述待删除数据与预设信息之间的关系;
    发送包含所述待删除数据与预设信息之间的关系的信息至所述终端,以使终端根据所述信息确定是否对所述待删除数据进行删除。
  7. 根据权利要求6所述的方法,其中,所述获取所述待删除数据与预设信息之间的关系,包括:
    解析所述待删除数据并得到第二信息;
    判断所述第二信息与所述预设信息是否匹配;
    若所述第二信息与所述预设信息匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据包含所述预设信息;
    若所述第二信息与所述预设信息不匹配,确定所述待删除数据与所述预设信息之间的关系为所述待删除数据不包含所述预设信息。
  8. 一种终端,包括:
    第一获取模块,设置为获取待删除数据与预设信息之间的关系;
    处理模块,设置为根据所述待删除数据与预设信息之间的关系确定是否对所述待删除数据进行删除。
  9. 根据权利要求8所述的终端,其中,所述第一获取模块包括:
    获取单元,设置为获取所述待删除数据的文件类型;
    第一判断单元,设置为判断所述待删除数据的文件类型是否是预设类型;
    第一处理单元,设置为若所述待删除数据的文件类型是所述预设类型,获取所述待删除数据与所述预设信息之间的关系。
  10. 一种服务器,包括:
    第二接收模块,设置为接收终端发送的待删除数据;
    第二获取模块,设置为获取所述待删除数据与预设信息之间的关系;
    第二发送模块,设置为发送包含所述待删除数据与预设信息之间的关系的信息至所述终端,以使终端根据所述信息确定是否对所述待删除数据进行删除。
  11. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1-5或者6-7任一项的方法。
PCT/CN2017/115509 2017-01-24 2017-12-11 数据删除方法、终端及服务器 WO2018137415A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710060216.0A CN108345619A (zh) 2017-01-24 2017-01-24 一种数据删除方法、终端及服务器
CN201710060216.0 2017-01-24

Publications (1)

Publication Number Publication Date
WO2018137415A1 true WO2018137415A1 (zh) 2018-08-02

Family

ID=62961918

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/115509 WO2018137415A1 (zh) 2017-01-24 2017-12-11 数据删除方法、终端及服务器

Country Status (2)

Country Link
CN (1) CN108345619A (zh)
WO (1) WO2018137415A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115098449B (zh) * 2022-08-26 2023-07-07 荣耀终端有限公司 一种文件清理方法及电子设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1599901A (zh) * 2001-10-02 2005-03-23 茨特里克斯系统公司 在客户端-服务器网络中用文件类型关联执行分布式程序的方法
CN105653397A (zh) * 2015-09-30 2016-06-08 宇龙计算机通信科技(深圳)有限公司 一种回收处理方法、装置及电子设备
CN106021563A (zh) * 2016-05-30 2016-10-12 珠海市魅族科技有限公司 对象删除方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1599901A (zh) * 2001-10-02 2005-03-23 茨特里克斯系统公司 在客户端-服务器网络中用文件类型关联执行分布式程序的方法
CN105653397A (zh) * 2015-09-30 2016-06-08 宇龙计算机通信科技(深圳)有限公司 一种回收处理方法、装置及电子设备
CN106021563A (zh) * 2016-05-30 2016-10-12 珠海市魅族科技有限公司 对象删除方法及装置

Also Published As

Publication number Publication date
CN108345619A (zh) 2018-07-31

Similar Documents

Publication Publication Date Title
US8955153B2 (en) Privacy control in a social network
US10425365B2 (en) System and method for relaying messages
CN109450777B (zh) 会话信息提取方法、装置、设备和介质
US20140379328A1 (en) Apparatus and method for outputting image according to text input in real time
US10650085B2 (en) Providing interactive preview of content within communication
US20170200244A1 (en) Systems and Techniques for Integrating Electronic Signature Platforms with Social Messaging Applications for Authenticated Electronic Documents
CA3061623C (en) File sending in instant messaging applications
US8402043B2 (en) Analytics of historical conversations in relation to present communication
CN111782728A (zh) 一种数据同步方法、装置、电子设备及介质
WO2020000742A1 (zh) 一种去重流量记录方法、装置、服务器及存储介质
CN106453582B (zh) 异步消息推送方法及系统
WO2018137415A1 (zh) 数据删除方法、终端及服务器
US10997963B1 (en) Voice based interaction based on context-based directives
WO2016037489A1 (zh) Rcs垃圾消息的监控方法、装置及系统
US9584537B2 (en) System and method for detecting mobile cyber incident
US10313391B1 (en) Digital distillation
US20150046565A1 (en) System and method for archiving messages
WO2018014401A1 (zh) 一种短消息的处理方法、装置及移动终端
US9769101B2 (en) Centralized communications controller
US10291766B2 (en) Information processing method and apparatus
WO2018166339A1 (zh) 一种信息处理方法
CN106371905B (zh) 应用程序操作方法、装置和服务器
CN111092803A (zh) 一种消息处理方法、设备、系统及存储介质
CN111753675B (zh) 一种图片型垃圾邮件的识别方法和装置
CN113852835A (zh) 直播音频处理方法、装置、电子设备以及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17894289

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17894289

Country of ref document: EP

Kind code of ref document: A1