WO2019029504A1 - 防止误删除文件方法以及移动终端 - Google Patents

防止误删除文件方法以及移动终端 Download PDF

Info

Publication number
WO2019029504A1
WO2019029504A1 PCT/CN2018/099086 CN2018099086W WO2019029504A1 WO 2019029504 A1 WO2019029504 A1 WO 2019029504A1 CN 2018099086 W CN2018099086 W CN 2018099086W WO 2019029504 A1 WO2019029504 A1 WO 2019029504A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
delete flag
target file
identity
target
Prior art date
Application number
PCT/CN2018/099086
Other languages
English (en)
French (fr)
Inventor
唐向东
Original Assignee
捷开通讯(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 捷开通讯(深圳)有限公司 filed Critical 捷开通讯(深圳)有限公司
Publication of WO2019029504A1 publication Critical patent/WO2019029504A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance

Definitions

  • the present invention relates to the field of file processing technologies, and in particular, to a method for preventing accidental deletion of files and a mobile terminal.
  • smart mobile devices have become one of the commonly used devices for storing information with the convenience of being portable with them.
  • a large number of photos, videos, audio, documents and other files are stored, and users can look at smart mobile devices at any time. Stored content.
  • the user needs to delete some unused content from time to time to save the storage space of the smart mobile device and facilitate subsequent searching for related content, but the content information stored in the smart mobile device is huge.
  • the user deletes some important content that may need to be used; in addition, the user often shares the content in his smart mobile device with the younger generation, causing some important content to be deleted by mistake.
  • the technical problem to be solved by the present invention is to provide a method for preventing accidental deletion of files and a mobile terminal, which can improve the efficiency of determining whether the target file is a protected file.
  • a technical solution adopted by the present invention is to provide a method for preventing accidental deletion of files, the method comprising:
  • the path of the target file it is determined step by step whether the anti-delete flag of each directory file of the target file is set;
  • the current directory file is the parent directory file of the target file. If the anti-delete flag bit of the target file is set, an error code that needs to identify the identity right to be deleted is returned;
  • the anti-delete flag of the setting file includes: obtaining directory information of the file; obtaining index node information of the file according to the directory information of the file; adding an anti-delete flag to the index node information of the file and setting the anti-delete flag;
  • the anti-delete flag of the current directory file is set, the error code that needs to be authenticated to be deleted can be deleted. If the authentication permission is passed, it is determined whether the current directory file is the parent directory file of the target file, and the current directory file. It is not the parent directory file of the target file, resetting the anti-delete flag of the current directory file, and setting the anti-delete flag of the current directory file after the preset time; after that, continuing to judge the next-level directory file according to the path of the target file.
  • the anti-delete flag bit is set; if the current directory file is the parent directory file of the target file, it is determined whether the anti-delete flag bit of the target file is set, and if the anti-delete flag bit of the target file is set, returning the need The error code that identifies the identity permission to be deleted; if the authentication identity does not pass, the target file is not deleted.
  • Another technical solution adopted by the present invention is to provide a method for preventing accidental deletion of files, the method comprising:
  • the path of the target file it is determined step by step whether the anti-delete flag of each directory file of the target file is set;
  • the current directory file is the parent directory file of the target file. If the anti-delete flag bit of the target file is set, an error code that needs to authenticate the identity permission is deleted.
  • a mobile terminal which includes a processor, a storage device communicably connected to the processor, the storage device stores program data, and the processor calls the storage device.
  • Program data to achieve the following actions:
  • the path of the target file it is determined step by step whether the anti-delete flag of each directory file of the target file is set;
  • the current directory file is the parent directory file of the target file. If the anti-delete flag bit of the target file is set, an error code that needs to authenticate the identity permission is deleted.
  • the invention has the beneficial effects of determining whether the file to be deleted is a protected file according to the path of the protected file according to the recorded state, thereby protecting the protected file from being accidentally deleted, and the present invention passes the file in the file.
  • the anti-delete flag bit is added to the index node information. If the anti-delete flag bit of the target file is set, the target file is deleted and the identity authentication permission is deleted to delete the target file, so that the target file is not deleted by mistake, and the judgment target file can be improved. Whether it is the efficiency of the protected file.
  • FIG. 2 is a schematic flow chart of an embodiment of a method for setting a file anti-delete flag according to the present invention
  • FIG. 3 is a schematic flow chart of another embodiment of a method for setting a file anti-delete flag according to the present invention.
  • FIG. 4 is a schematic flow chart of an embodiment of a method for preventing accidental deletion of files according to the present invention
  • FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention.
  • Figure 6 is a block diagram showing an embodiment of a memory device of the present invention.
  • the method for setting a file anti-delete flag bit and the method for preventing accidental deletion of a file as described in this embodiment may be based on an IOS system, an Android system, and a Symbian system, and the implementation may be implemented by adding an anti-delete flag bit at a corresponding position.
  • the method for setting the file anti-delete flag and the method for preventing the file from being deleted by mistake are not limited herein.
  • the Android system is taken as an example for detailed explanation.
  • FIG. 1 is a schematic structural diagram of an embodiment of a file content storage method according to the present invention.
  • a user file of a mobile terminal based on an Android system is generally established on a storage medium, such as SDCARD, etc.
  • the file contains data content and attribute information
  • the data content is user information recorded in the file, such as a photo, Audio and video, etc.
  • the attribute information is the information collection of the file itself
  • the data content and the attribute information are stored in different blocks
  • the attribute information is stored in the iNode (index node)
  • the data content is stored in the Data.
  • block data block
  • some overall information is stored in the Super block.
  • Super Block records the entire information of the entire file system, including the total amount of iNode and block, usage, remaining amount, and file system format;
  • the block records the data content of the file and occupies one or more blocks depending on the size of the data content.
  • Each directory file stores a directory entry for each file in its directory.
  • the directory entry stores the file name and the iNode corresponding to the file name.
  • Number which is the index node iNode of the file. Accessing a file is to find the directory entry of the file step by step through the file path, and find the corresponding iNode in the directory entry of the file. Number, thereby finding the index node iNode information of the file, obtaining the rights information stored in the index node iNode, the flag bit and the data block number index information pointing to the data block, wherein the data block number index information pointing to the data block is the storage file Data content data Block number.
  • the operation is to find the folder where the file is located (that is, its parent directory) through the file path, and delete the record of the corresponding directory item stored in the directory entry table of the parent directory. So you need to find the iNode corresponding to the file. Number and read the iNode information. If an anti-delete flag is added to the file flag information, the anti-delete flag in the iNode information can be checked before deleting, and the file can be prevented from being deleted.
  • the location operation is to find the directory entry of the file through the file path level one level. This operation is implemented by a function, in order to return the iNode node of the parent directory. To distinguish other operations by passing in the flag looking for the target file's parent directory file (open and execute operations also need to call the function to find the file's inode).
  • the iNode node By invoking a newly added flag to distinguish other operations (open, execute, etc.), so in the first-level search process, the iNode node is designed to find the parent directory of the deleted file, if corresponding to each level of the directory file The anti-delete flag bit is checked, and it is found that when this flag bit is set, the error code that is not enough for the upper-level authority to authenticate the identity is returned, and all the files in the directory (including the files in the sub-directory) can be prevented. Remove control.
  • FIG. 2 is a schematic flowchart diagram of an embodiment of a method for setting a file anti-delete flag according to the present invention. It should be noted that, in this embodiment, the method for setting a file anti-delete flag bit includes but is not limited to the following steps:
  • the parent directory file of the target file is obtained by calling a function to obtain the directory information of the target file, and the parent directory file of the target file is stored in the direct superior file of the target file, and the parent directory file of the target file is called.
  • the function has a flag for finding the parent directory file of the target file, and is used to distinguish other search operations, such as opening a file operation, performing a file operation, etc., opening a file operation, performing a file operation, and the like all have a seek operation, so the embodiment passes
  • the function with the flag of finding the parent directory file of the target file further improves the efficiency of the parent directory file of the present embodiment for finding the target file.
  • the parent directory file of the target file stores the directory information of the target file, and the iNode number of the target file is found through the directory information of the target file, and then the iNode is passed through the iNode. Number reads the inode information of the target file.
  • S203 adding an anti-delete flag bit to the index node information of the file and setting the anti-delete flag bit;
  • an anti-delete flag bit is added to the flag bit information in the index node information of the target file, and the anti-delete flag bit is initially assigned a value of “0”, which means that the target file can be deleted without identifying the identity right, and the defense will be prevented.
  • the flag position is deleted, that is, the value of the anti-delete flag is changed to "1", and the target file needs to be authenticated to be deleted.
  • the present invention protects the target file by setting an anti-delete flag in the index node of the target file to prevent the target file from being deleted accidentally due to misoperation, and it is not necessary to record the path of all the target files, thereby improving the judgment target. Whether the file is the efficiency of the protected file.
  • FIG. 3 is a schematic flowchart diagram of another embodiment of a method for setting a file anti-delete flag according to the present invention. It should be noted that, in this embodiment, the method for setting a file anti-delete flag bit includes but is not limited to the following steps:
  • the target file to be protected is selected and the anti-delete flag is set.
  • the target file may be a photo, an audio, a video, a document, etc., and the file deleted due to human error may be described herein.
  • the target file is not limited here.
  • the target file may be selected in the operating system of the mobile terminal and the anti-delete flag bit may be set, or the target file being browsed may be selected and the anti-delete flag bit may be set in the process of browsing the target file.
  • the anti-delete flag bit may be set, or the target file being browsed may be selected and the anti-delete flag bit may be set in the process of browsing the target file.
  • S302 Obtain directory information of the target file by using a target file path.
  • the parent directory file of the target file is obtained by calling a function to obtain the directory information of the target file, and the parent directory file of the target file is stored in the direct superior file of the target file, and the parent directory file of the target file is called.
  • the function has a flag for finding the parent directory file of the target file, and is used to distinguish other search operations, such as opening a file operation, performing a file operation, etc., opening a file operation, performing a file operation, and the like all have a seek operation, so the embodiment passes
  • the function with the flag of finding the parent directory file of the target file further improves the efficiency of the parent directory file of the present embodiment for finding the target file.
  • step S304 it is determined whether there is a modification authority of the target file: if there is a modification authority of the target file, step S304 is performed; if there is no modification authority of the target file, step S307 is performed.
  • the target file may be an internal system file of the mobile terminal, etc., and the target file at this time is a file necessary for the mobile terminal system, and the external operation is not allowed to be modified, and thus the modification permission of the target file is not provided.
  • S304 Obtain index node information of the target file according to the directory information of the target file.
  • an anti-delete flag bit is added to the flag bit information in the index node information of the target file, and the anti-delete flag bit is initially assigned a value of “0”, which means that the target file can be deleted without identifying the identity right, and the defense will be prevented.
  • the flag position is deleted, that is, the value of the anti-delete flag is changed to "1", and the target file needs to be authenticated to be deleted.
  • the anti-delete flag bit can also be reset, and the value assigned by the anti-delete flag bit is changed from 1 to 0, so that the target file can be deleted without identifying the identity right.
  • the authentication identity authority may be configured to generate an authentication identity rights interface, and input identity rights information in the authentication identity rights interface. If the identity rights information matches the preset identity rights information, the identity rights permission is passed, and vice versa, the identity rights are not passed.
  • the identity privilege can also be used to collect the identity privilege information in the mobile terminal and match the preset identity privilege information, which is not limited herein.
  • the identity rights information and the preset identity rights information may be passwords, fingerprints, or voiceprints, and the identity information that is unique to the identity, or may be the identity information of the smart wearable device that records the uniqueness of the identity.
  • the information transmission between the wearable device and the mobile terminal is matched with the preset identity rights information, which is not limited herein.
  • the anti-delete flag bit of the target file is successfully set, when the target file is deleted, it is determined whether the anti-delete flag bit of the target file is set: if set, the identity permission needs to be returned. Delete and generate the authentication identity permission interface; if not set, delete the target file.
  • the present invention protects the target file by setting an anti-delete flag in the index node of the target file to prevent the target file from being deleted accidentally due to misoperation, and it is not necessary to record the path of all the target files, thereby improving the judgment target. Whether the file is the efficiency of the protected file.
  • FIG. 4 is a schematic flowchart diagram of an embodiment of a method for preventing accidental deletion of files according to the present invention. It should be noted that, in this embodiment, the method for preventing accidental deletion of files based on the method for setting a file anti-delete flag according to the above embodiment includes, but is not limited to, the following steps:
  • the target file may be a photo, an audio, a video, a document, and the like, and the file that is deleted due to the human error may be the target file as described herein, which is not limited herein.
  • the target file may be selected and initiated in the operating system of the mobile terminal, or the target file being browsed may be selected and the deletion operation may be initiated in the process of browsing the target file, etc. limited.
  • S402 Find each directory file of the target file step by step according to the path of the target file;
  • each directory file of the target file is searched step by step, aiming to find the parent directory file of the target file, and calling the function to find the parent directory file of the target file to obtain the directory information of the target file, and the parent directory file of the target file.
  • the function called by the parent directory file of the target file has a flag for finding the parent directory file of the target file, which is used to distinguish other search operations, such as opening a file operation, performing a file operation, opening a file operation, performing a file operation, etc.
  • search operation so the present embodiment further improves the efficiency of finding the parent directory file of the target file in this embodiment by a function with a flag for finding the parent directory file of the target file.
  • S403 Determine whether the anti-delete flag bit of the current directory file is set.
  • step S404 if the anti-delete flag bit of the current directory file is not set, step S404 is performed, and if the anti-delete flag bit of the current directory file is set, step S406 is performed.
  • step S405 if the current directory file is not the parent directory file of the target file, step S402 is performed.
  • S405 Determine whether the anti-delete flag bit of the target file is set.
  • step S406 is performed. If the anti-delete flag bit of the target file is not set, step S408 is performed.
  • step S406 is triggered by step S403. If the authentication authority is passed, step S404 is performed. If the current directory file is not the parent directory file of the target file, the anti-delete flag of the current directory file is reset. And after the preset time, the anti-delete flag of the current directory file is set; after that, step S402 is performed; if the current directory file is the parent directory file of the target file, step S405 is performed.
  • the authentication identity authority may be configured to generate an authentication identity rights interface, and input identity rights information in the authentication identity rights interface. If the identity rights information matches the preset identity rights information, the identity rights permission is passed, and vice versa, the identity rights are not passed.
  • the identity privilege can also be used to collect the identity privilege information in the mobile terminal and match the preset identity privilege information, which is not limited herein.
  • the identity rights information and the preset identity rights information may be passwords, fingerprints, or voiceprints, and the identity information that is unique to the identity, or may be the identity information of the smart wearable device that records the uniqueness of the identity.
  • the information transmission between the wearable device and the mobile terminal is matched with the preset identity rights information, which is not limited herein.
  • S407 Temporarily remove the anti-delete flag bit of the directory file, and resume the anti-delete flag bit of the directory file after the preset time;
  • step S402 is continued.
  • the called function does not continue to search the parent directory file of the target file to the lower-level directory file, so it is necessary to delete the current time within the preset time.
  • the anti-delete flag of the directory file is set.
  • the method for preventing accidental deletion of a file is described in the above embodiment, and the target file is deleted after the identity is authenticated, so that the target file may be accidentally deleted due to human error.
  • the authentication of the identity authority fails, and the operation of deleting the target file fails, and the input identity authority information does not match the preset identity authority information, or is caused by a misoperation, and the operation is found to be misoperation. Deliberately failing to authenticate identity rights, thereby avoiding the target file being accidentally deleted due to human error.
  • the present invention protects the target file by setting the target file anti-delete flag bit.
  • the deletion target file operation it is determined whether the anti-delete flag bit of the target file is set, thereby preventing the misoperation caused by the misoperation.
  • the target file is deleted by mistake, and it is not necessary to record the path of all the target files, thereby improving the efficiency of determining whether the target file is a protected file.
  • FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention.
  • the mobile terminal 500 includes a processor 501, a storage device 502 communicatively coupled to the processor 501, the storage device 502 stores program data, and the processor 501 calls program data in the storage device 502 to implement an action of: following the path of the target file.
  • FIG. 6 is a schematic structural diagram of an embodiment of a memory device according to the present invention.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device implementations described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the object of the present embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods of the various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read only memory (ROM, Read-Only) Memory, random access memory (RAM), disk or optical disk, and other media that can store program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明公开了一种防止误删除文件方法以及移动终端。该方法包括步骤:设置文件的防删除标志位;根据目标文件的路径,逐级判断目标文件各目录文件的防删除标志位是否被置位;若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为目标文件的父目录文件,若当前目录文件为目标文件的父目录文件,则判断目标文件的防删除标志位是否被置位,若目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码。

Description

防止误删除文件方法以及移动终端
【技术领域】
本发明涉及文件处理技术领域,特别是涉及一种防止误删除文件方法以及移动终端。
【背景技术】
近年来,智能移动设备凭借其可随身携带的便捷性已成为存储信息的常用设备之一,其中存储了大量的照片、视频、音频、文档以及其他文件,用户可以随时翻看智能移动设备中所存储的内容。
随着智能移动设备中所存储的内容增多,用户需要不定时删除一些没有用处的内容,以节省智能移动设备的存储空间以及便于后续查找相关内容,但由于智能移动设备中所存储的内容信息庞大,在操作过程中,由于疏忽导致用户删除一些可能需要用到的重要内容;再者,用户经常将自己智能移动设备里的内容向晚辈分享,导致一些重要内容被误删除。
【发明内容】
有鉴于此,本发明主要解决的技术问题是提供一种防止误删除文件方法以及移动终端,能够提高判断目标文件是否为受保护文件的效率。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种防止误删除文件方法,该方法包括:
设置文件的防删除标志位;
根据目标文件的路径,逐级判断目标文件各目录文件的防删除标志位是否被置位;
若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为目标文件的父目录文件;
若当前目录文件为目标文件的父目录文件,则判断目标文件的防删除标志位是否被置位,若目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;
设置文件的防删除标志位包括:获取文件的目录信息;根据文件的目录信息,获取文件的索引节点信息;在文件的索引节点信息中增加防删除标志位并将防删除标志位置位;
若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码包括:若鉴定身份权限通过,则判断当前目录文件是否为目标文件的父目录文件,若当前目录文件不是目标文件的父目录文件,重置当前目录文件的防删除标志位,并在预设时间后将当前目录文件的防删除标志位置位;之后,继续根据目标文件的路径判断下一级目录文件的防删除标志位是否被置位;若当前目录文件为目标文件的父目录文件,判断目标文件的防删除标志位是否被置位,若目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若鉴定身份权限未通过,则不删除目标文件。
为解决上述技术问题,本发明采用的又一个技术方案是:提供一种防止误删除文件方法,该方法包括:
设置文件的防删除标志位;
根据目标文件的路径,逐级判断目标文件各目录文件的防删除标志位是否被置位;
若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为目标文件的父目录文件;
若当前目录文件为目标文件的父目录文件,则判断目标文件的防删除标志位是否被置位,若目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码。
为解决上述技术问题,本发明采用的又一个技术方案是:提供一种移动终端,该移动终端包括处理器,与处理器通信连接的存储装置,存储装置存储程序数据,处理器调用存储装置中的程序数据以实现如下动作:
设置文件的防删除标志位;
根据目标文件的路径,逐级判断目标文件各目录文件的防删除标志位是否被置位;
若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为目标文件的父目录文件;
若当前目录文件为目标文件的父目录文件,则判断目标文件的防删除标志位是否被置位,若目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码。
本发明的有益效果是:相比于现有技术通过根据记录的受保护文件的路径,判断要删除文件是否为受保护文件,从而保护受保护文件不被误删除,而本发明通过在文件的索引节点信息中增加防删除标志位,若目标文件的防删除标志位被置位,则删除目标文件时会返回需要鉴定身份权限才能删除,进而保护目标文件不被误删除,能够提高判断目标文件是否为受保护文件的效率。
【附图说明】
图1是本发明文件内容存储方式一实施例的结构示意图;
图2是本发明设置文件防删除标志位方法一实施例的流程示意图;
图3是本发明设置文件防删除标志位方法另一实施例的流程示意图;
图4是本发明防止误删除文件方法一实施例的流程示意图;
图5是本发明移动终端一实施例的结构示意图;
图6是本发明存储装置一实施例的结构示意图。
【具体实施方式】
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。
本实施例所阐述的设置文件防删除标志位的方法以及防止误删除文件的方法可以基于IOS系统、Android系统以及塞班系统等,只需在相应位置添加防删除标志位,就可以实现本实施例所阐述的设置文件防删除标志位的方法以及防止误删除文件的方法,在此不做限定。以下实施例中,以Android系统为例进行详细阐述。
请参阅图1,图1是本发明文件内容存储方式一实施例的结构示意图。
如本领域技术人员所理解,基于Android系统的移动终端的用户文件通常建立在存储介质上,例如SDCARD等,文件包含数据内容以及属性信息,数据内容为文件所存储记录的用户信息,例如照片、音频以及视频等,属性信息为文件自身的信息集合,数据内容与属性信息存储在不同的区块,属性信息存放于iNode(索引节点)中,数据内容则存放于Data block(数据块)中,当然还有一些整体信息存放于Super block(超级块)。Super block记录整个文件系统的整体信息,包括iNode与块的总量、使用量、剩余量以及文件系统的格式等;Data block记录文件的数据内容,根据数据内容大小占用一个或多个块。iNode记录文件的属性信息以及数据内容所在Data block号码,一个文件占用一个iNode,属性信息主要包括:文件类型(一般文件、目录文件、Socket文件、符号链接文件等);文件的存储模式(可读、可写等);文件的拥有者及群组;文件的大小;时间戳(建立或状态改变的时间、最近一次的读取时间以及最近修改的时间等);定义文件特性的标志;文件真正内容的指向,即存放数据内容的Data block号码。
每个目录文件存储其目录下各文件的目录项,目录项存储着文件名和与文件名对应的iNode number,也就是文件的索引节点iNode所在。文件的访问为通过文件路径逐级找到该文件的目录项,在该文件的目录项里找到对应的iNode number,从而找到文件的索引节点iNode信息,获取索引节点iNode里存储的权限信息,标志位以及指向数据块的数据块号索引信息,其中,指向数据块的数据块号索引信息,即为存放文件数据内容的Data block号码。
删除文件时,其操作是通过文件路径找到文件所在文件夹(也就是其父目录),对存储在父目录的目录项表中的对应目录项做删除记录操作。因此需要找到文件对应的iNode number并读取iNode信息。若在文件标志信息里增加一个防删除标志位,在删除前检查iNode信息里的防删除标志位,就可以实现文件的防删除。
如上文所述删除文件时要先找到其父目录,其定位操作是通过文件路径一级一级的找到该文件的目录项,这个操作是通过函数来实现的,为了返回父目录的iNode结点为,通过传入寻找目标文件父目录文件的标志作为参数以区分其它操作(打开和执行等操作同样需要调用函数来找到文件的inode)。通过传入一个新加的标志来区分其它操作(打开、执行等操作),这样在一级一级寻找过程中,旨在寻找被删除文件父目录的iNode节点,若对每一级目录文件对应的防删除标志位都进行检查,发现此标志位被置位就返回给上层权限不够需要鉴定身份权限的错误代码,就可以实现对此目录下的所有文件(包括子目录下的文件)的防删除控制。
请参阅图2,图2是本发明设置文件防删除标志位方法一实施例的流程示意图。需要说明的是在本实施例中,设置文件防删除标志位的方法包括但不限于以下步骤:
S201:获取文件的目录信息;
在本实施例中,通过调用函数寻找目标文件的父目录文件,以获取目标文件的目录信息,目标文件的父目录文件存储于目标文件的直接上级文件中,寻找目标文件的父目录文件所调用的函数带有寻找目标文件父目录文件的标志,用以区分其他寻找操作,例如打开文件操作,执行文件操作等,打开文件操作,执行文件操作等操作都带有寻找操作,因此本实施例通过带有寻找目标文件父目录文件的标志的函数,进一步提高本实施例寻找目标文件的父目录文件的效率。
S202:根据文件的目录信息,获取文件的索引节点信息;
在本实施例中,目标文件的父目录文件里存储有目标文件的目录信息,通过目标文件的目录信息找到目标文件的iNode number,再通过iNode number读取到目标文件的索引节点信息。
S203:在文件的索引节点信息中增加防删除标志位并将防删除标志位置位;
在本实施例中,在目标文件的索引节点信息里的标志位信息中添加防删除标志位,防删除标志位初始赋值为“0”,代表目标文件不需要鉴定身份权限即可删除,将防删除标志位置位,也就是将防删除标志位赋值修改为“1”,目标文件需要鉴定身份权限才可删除。
以上可以看出,本发明通过在目标文件的索引节点中设置防删除标志位,对目标文件加以保护,防止由于误操作导致目标文件被误删除,无需记录所有目标文件的路径,从而提高判断目标文件是否为受保护文件的效率。
请参阅图3,图3是本发明设置文件防删除标志位方法另一实施例的流程示意图。需要说明的是在本实施例中,设置文件防删除标志位的方法包括但不限于以下步骤:
S301:发起设置目标文件的防删除标志位;
在本实施例中,选择需要加以保护的目标文件并对其设置防删除标志位,目标文件可以是照片、音频、视频以及文档等,防止由于人为误操作被删除的文件都可以是此处所阐述的目标文件,在此不做限定。
可选地,可在移动终端的操作系统中选定目标文件并对其设置防删除标志位,或者是在浏览目标文件过程中选定正在浏览的目标文件并对其设置防删除标志位等,在此不做限定。
S302:通过目标文件路径,获取目标文件的目录信息;
在本实施例中,通过调用函数寻找目标文件的父目录文件,以获取目标文件的目录信息,目标文件的父目录文件存储于目标文件的直接上级文件中,寻找目标文件的父目录文件所调用的函数带有寻找目标文件父目录文件的标志,用以区分其他寻找操作,例如打开文件操作,执行文件操作等,打开文件操作,执行文件操作等操作都带有寻找操作,因此本实施例通过带有寻找目标文件父目录文件的标志的函数,进一步提高本实施例寻找目标文件的父目录文件的效率。
S303:判断是否有目标文件的修改权限;
在本实施例中,判断是否有目标文件的修改权限:若有目标文件的修改权限,则执行步骤S304;若无目标文件的修改权限,则执行步骤S307。
可选地,目标文件可以为移动终端的内部系统文件等,此时的目标文件是移动终端系统所必须的文件,不允许外部操作对其进行修改,因此不具备该类目标文件的修改权限。
S304:根据目标文件的目录信息,获取目标文件的索引节点信息;
在本实施例中,目标文件的父目录文件里存储有目标文件的目录信息,通过目标文件的目录信息找到目标文件的iNode number,再通过iNode number读取到目标文件的索引节点信息。
S305:在目标文件的索引节点信息中增加防删除标志位并将防删除标志位置位;
在本实施例中,在目标文件的索引节点信息里的标志位信息中添加防删除标志位,防删除标志位初始赋值为“0”,代表目标文件不需要鉴定身份权限即可删除,将防删除标志位置位,也就是将防删除标志位赋值修改为“1”,目标文件需要鉴定身份权限才可删除。
可选地,与将防删除标志位置位对应,还可以重置防删除标志位,将防删除标志位所赋予的值由1更改为0,进而使目标文件不需要鉴定身份权限就能删除。
可选地,鉴定身份权限可以为生成一鉴定身份权限界面,在鉴定身份权限界面输入身份权限信息,若身份权限信息匹配预设身份权限信息,则鉴定身份权限通过,反之则鉴定身份权限未通过,当然,如本领域技术人员所理解,鉴定身份权限也可以为移动终端内部采集身份权限信息,与预设身份权限信息进行匹配,在此不做限定。
可选地,身份权限信息以及预设身份权限信息可以为密码、指纹或者声纹等,代表身份唯一性的身份信息,也可以是智能可穿戴设备记录记录身份唯一性的身份信息,通过智能可穿戴设备与移动终端之间信息传输,与预设身份权限信息进行匹配,在此不做限定。
S306:返回设置成功;
在本实施例中,成功设置目标文件的防删除标志位后,当删除目标文件时,就会判断目标文件的防删除标志位是否被置位:若被置位,则返回需要鉴定身份权限才能删除并生成鉴定身份权限界面;若没有被置位,则删除目标文件。
S307:返回无权限修改目标文件;
在本实施例中,对目标文件无修改权限,说明目标文件可能为系统内部所必须文件,删除目标文件,可能导致系统无法运转,移动终端出厂时该类型文件均为不可修改文件,也就无法对该类目标文件的标志位进行修改。
以上可以看出,本发明通过在目标文件的索引节点中设置防删除标志位,对目标文件加以保护,防止由于误操作导致目标文件被误删除,无需记录所有目标文件的路径,从而提高判断目标文件是否为受保护文件的效率。
请参阅图4,图4是本发明防止误删除文件方法一实施例的流程示意图。需要说明的是在本实施例中,基于上述实施例所阐述的设置文件防删除标志位方法的防止误删除文件方法包括但不限于以下步骤:
S401:发起删除目标文件;
在本实施例中,目标文件可以是照片、音频、视频以及文档等,防止由于人为误操作被删除的文件都可以是此处所阐述的目标文件,在此不做限定。
可选地,可在移动终端的操作系统中选定目标文件并对其发起删除操作,或者是在浏览目标文件过程中选定正在浏览的目标文件并对其发起删除操作等,在此不做限定。
S402:根据目标文件路径,逐级寻找目标文件各目录文件;
在本实施例中,逐级寻找目标文件各目录文件,旨在找到目标文件的父目录文件,通过调用函数寻找目标文件的父目录文件,以获取目标文件的目录信息,目标文件的父目录文件存储于目标文件的直接上级文件中。寻找目标文件的父目录文件所调用的函数带有寻找目标文件父目录文件的标志,用以区分其他寻找操作,例如打开文件操作,执行文件操作等,打开文件操作,执行文件操作等操作都带有寻找操作,因此本实施例通过带有寻找目标文件父目录文件的标志的函数,进一步提高本实施例寻找目标文件的父目录文件的效率。
S403:判断当前目录文件的防删除标志位是否被置位;
在本实施例中,若当前目录文件的防删除标志位没有被置位,则执行步骤S404,若当前目录文件的防删除标志位被置位,则执行步骤S406。
S404:判断当前目录文件是否为目标文件的父目录文件;
在本实施例中,若当前目录文件为目标文件的父目录文件,就可以在目标文件的父目录文件中找到目标文件的索引节点号,从而找到目标文件的索引节点信息,进而找到目标文件的防删除标志位,则执行步骤S405,若当前目录文件非目标文件的父目录文件,则执行步骤S402。
S405:判断目标文件的防删除标志位是否被置位;
在本实施例中,若目标文件的防删除标志位被置位,说明用户对目标文件设置了防删除标志位加以保护,防止由于人为误操作导致目标文件被误删除,则执行步骤S406,若目标文件的防删除标志位没有被置位,则执行步骤S408。
S406:返回需要鉴定身份权限才能删除的错误代码;
在本实施例中,由步骤S403触发本步骤S406,若鉴定身份权限通过,则执行步骤S404,若当前目录文件不是所述目标文件的父目录文件,重置当前目录文件的防删除标志位,并在预设时间后将当前目录文件的防删除标志位置位;之后,执行步骤S402;若当前目录文件是所述目标文件的父目录文件,则执行步骤S405。
由步骤S405触发本步骤S406,若鉴定身份权限通过,则执行步骤S408,若鉴定身份权限失败,则执行步骤S409。
可选地,鉴定身份权限可以为生成一鉴定身份权限界面,在鉴定身份权限界面输入身份权限信息,若身份权限信息匹配预设身份权限信息,则鉴定身份权限通过,反之则鉴定身份权限未通过,当然,如本领域技术人员所理解,鉴定身份权限也可以为移动终端内部采集身份权限信息,与预设身份权限信息进行匹配,在此不做限定。
可选地,身份权限信息以及预设身份权限信息可以为密码、指纹或者声纹等,代表身份唯一性的身份信息,也可以是智能可穿戴设备记录记录身份唯一性的身份信息,通过智能可穿戴设备与移动终端之间信息传输,与预设身份权限信息进行匹配,在此不做限定。
S407:临时去除目录文件的防删除标志位,并在预设时间后重新恢复此目录文件的防删除标志位;
步骤S407执行之后继续执行步骤S402。在本实施例中,若目标文件的上级文件的防删除标志位被置位,所调用的函数就不会继续往下级目录文件寻找目标文件的父目录文件,因此需要在预设时间内删除当前目录文件的防删除标志位。
可选地,预设时间可以为5s,预设时间可以根据移动终端系统的处理速度以及用户需要进行设定,在此不做限定。
S408:删除目标文件;
在本实施例中,通过上述实施例所阐述防止误删除文件的方式,目标文件为经过鉴定身份权限才被删除,可以避免由于人为误操作导致目标文件被误删除。
S409:删除目标文件失败;
在本实施例中,鉴定身份权限未通过,所发起删除目标文件的操作失败,可以是所输入身份权限信息与预设身份权限信息不匹配,又或者是由于误操作,删除时发现误操作,有意识地使鉴定身份权限失败,从而避免由于人为误操作导致目标文件被误删除。
综上所述,本发明通过将目标文件防删除标志位置位,对目标文件加以保护,当发起删除目标文件操作时,判断目标文件的防删除标志位是否被置位,从而防止由于误操作导致目标文件被误删除,无需记录所有目标文件的路径,进而提高判断目标文件是否为受保护文件的效率。
请参阅图5,图5是本发明移动终端一实施例的结构示意图。
在本实施例中,移动终端500能够执行程序以实现上述实施例所阐述的防止误删除文件方法。
具体地,移动终端500包括处理器501,与处理器501通信连接的存储装置502,存储装置502存储程序数据,处理器501调用存储装置502中的程序数据以实现如下动作:根据目标文件的路径,逐级判断所述目标文件各目录文件的防删除标志位是否被置位;若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为所述目标文件的父目录文件,若当前目录文件为所述目标文件的父目录文件,则判断所述目标文件的防删除标志位是否被置位,若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码。
请参阅图6,图6是本发明存储装置一实施例的结构示意图。
在本实施例中,存储装置600存储有程序数据601,程序数据601能够被执行以实现上述实施例所阐述的防止误删除文件方法,在此就不再赘述。
在本发明所提供的几个实施方式中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施方式仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施方式的目的。
另外,在本发明各个实施方式中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本发明各个实施方式所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (19)

  1. 一种防止误删除文件方法,其中,所述方法包括:
    设置文件的防删除标志位;
    根据目标文件的路径,逐级判断所述目标文件各目录文件的防删除标志位是否被置位;
    若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为所述目标文件的父目录文件;
    若当前目录文件为所述目标文件的父目录文件,则判断所述目标文件的防删除标志位是否被置位,若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;
    所述设置文件的防删除标志位包括:获取文件的目录信息;根据所述文件的目录信息,获取所述文件的索引节点信息;在所述文件的索引节点信息中增加防删除标志位并将所述防删除标志位置位;
    所述若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码包括:若鉴定身份权限通过,则判断当前目录文件是否为所述目标文件的父目录文件,若当前目录文件不是所述目标文件的父目录文件,重置当前目录文件的防删除标志位,并在预设时间后将当前目录文件的防删除标志位置位;之后,继续根据所述目标文件的路径判断下一级目录文件的防删除标志位是否被置位;若当前目录文件为所述目标文件的父目录文件,判断所述目标文件的防删除标志位是否被置位,若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若鉴定身份权限未通过,则不删除所述目标文件。
  2. 根据权利要求1所述的方法,其中,所述将所述文件的防删除标志位置位之前包括:判断是否有所述文件的修改权限,若有所述文件的修改权限,则将所述文件的防删除标志位置位;若无所述文件的修改权限,则返回无修改权限不能修改所述文件的防删除标志位。
  3. 根据权利要求1所述的方法,其中,所述将所述文件的防删除标志位置位包括:将所述防删除标志位所赋予的值由0更改为1,进而使所述文件需要鉴定身份权限才能删除。
  4. 根据权利要求3所述的方法,其中,所述方法进一步包括重置所述文件的防删除标志位:将所述防删除标志位所赋予的值由1更改为0,进而使所述文件不需要鉴定身份权限就能删除。
  5. 根据权利要求1所述的方法,其中,所述若当前目录文件为所述目标文件的父目录文件,则判断所述目标文件的防删除标志位是否被置位进一步包括:
    若所述目标文件的防删除标志位未被置位,则删除所述目标文件。
  6. 根据权利要求1所述的方法,其中,所述若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码进一步包括:
    若鉴定身份权限通过,则删除所述目标文件。
  7. 根据权利要求1所述的方法,其中,所述方法进一步包括:生成一鉴定身份权限界面,在所述鉴定身份权限界面输入身份权限信息,若所述身份权限信息匹配预设身份权限信息,则鉴定身份权限通过,反之则鉴定身份权限未通过。
  8. 根据权利要求7所述的方法,其中,所述身份权限信息包括:密码、指纹或者声纹。
  9. 一种防止误删除文件方法,其中,所述方法包括:
    设置文件的防删除标志位;
    根据目标文件的路径,逐级判断所述目标文件各目录文件的防删除标志位是否被置位;
    若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为所述目标文件的父目录文件;
    若当前目录文件为所述目标文件的父目录文件,则判断所述目标文件的防删除标志位是否被置位,若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码。
  10. 根据权利要求9所述的方法,其中,所述设置文件的防删除标志位包括:
    获取文件的目录信息;
    根据所述文件的目录信息,获取所述文件的索引节点信息;
    在所述文件的索引节点信息中增加防删除标志位并将所述防删除标志位置位。
  11. 根据权利要求10所述的方法,其中,所述将所述文件的防删除标志位置位之前包括:判断是否有所述文件的修改权限,若有所述文件的修改权限,则将所述文件的防删除标志位置位;若无所述文件的修改权限,则返回无修改权限不能修改所述文件的防删除标志位。
  12. 根据权利要求10所述的方法,其中,所述将所述文件的防删除标志位置位包括:将所述防删除标志位所赋予的值由0更改为1,进而使所述文件需要鉴定身份权限才能删除。
  13. 根据权利要求12所述的方法,其中,所述方法进一步包括重置所述文件的防删除标志位:将所述防删除标志位所赋予的值由1更改为0,进而使所述文件不需要鉴定身份权限就能删除。
  14. 根据权利要求9所述的方法,其中,所述若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码包括:
    若鉴定身份权限通过,则判断当前目录文件是否为所述目标文件的父目录文件,若当前目录文件不是所述目标文件的父目录文件,重置当前目录文件的防删除标志位,并在预设时间后将当前目录文件的防删除标志位置位;之后,继续根据所述目标文件的路径判断下一级目录文件的防删除标志位是否被置位;
    若当前目录文件为所述目标文件的父目录文件,判断所述目标文件的防删除标志位是否被置位,若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;
    若鉴定身份权限未通过,则不删除所述目标文件。
  15. 根据权利要求14所述的方法,其中,所述若当前目录文件为所述目标文件的父目录文件,则判断所述目标文件的防删除标志位是否被置位进一步包括:
    若所述目标文件的防删除标志位未被置位,则删除所述目标文件。
  16. 根据权利要求14所述的方法,其中,所述若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码进一步包括:
    若鉴定身份权限通过,则删除所述目标文件。
  17. 根据权利要求14所述的方法,其中,所述方法进一步包括:生成一鉴定身份权限界面,在所述鉴定身份权限界面输入身份权限信息,若所述身份权限信息匹配预设身份权限信息,则鉴定身份权限通过,反之则鉴定身份权限未通过。
  18. 根据权利要求17所述的方法,其中,所述身份权限信息包括:密码、指纹或者声纹。
  19. 一种移动终端,其中,所述移动终端包括处理器,与所述处理器通信连接的存储装置,所述存储装置存储程序数据,所述处理器调用所述存储装置中的所述程序数据以实现如下动作:
    设置文件的防删除标志位;
    根据目标文件的路径,逐级判断所述目标文件各目录文件的防删除标志位是否被置位;
    若当前目录文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码;若当前目录文件的防删除标志位没有被置位,则判断当前目录文件是否为所述目标文件的父目录文件;
    若当前目录文件为所述目标文件的父目录文件,则判断所述目标文件的防删除标志位是否被置位,若所述目标文件的防删除标志位被置位,则返回需要鉴定身份权限才能删除的错误代码。
PCT/CN2018/099086 2017-08-08 2018-08-07 防止误删除文件方法以及移动终端 WO2019029504A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710675501.3A CN107609027B (zh) 2017-08-08 2017-08-08 设置文件防删除标志位和防止误删除文件的方法及装置
CN201710675501.3 2017-08-08

Publications (1)

Publication Number Publication Date
WO2019029504A1 true WO2019029504A1 (zh) 2019-02-14

Family

ID=61064587

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/099086 WO2019029504A1 (zh) 2017-08-08 2018-08-07 防止误删除文件方法以及移动终端

Country Status (2)

Country Link
CN (1) CN107609027B (zh)
WO (1) WO2019029504A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609027B (zh) * 2017-08-08 2020-06-02 捷开通讯(深圳)有限公司 设置文件防删除标志位和防止误删除文件的方法及装置
CN108563754B (zh) * 2018-04-16 2021-09-28 Oppo广东移动通信有限公司 文件处理方法、装置、移动终端及计算机可读存储介质
CN108549698B (zh) * 2018-04-16 2021-07-09 Oppo广东移动通信有限公司 文件处理方法、装置、移动终端及计算机可读存储介质
CN109828962B (zh) * 2018-12-19 2022-06-24 北京达佳互联信息技术有限公司 防止文件误删除的方法、装置、服务器及存储介质
CN110248028A (zh) * 2019-07-30 2019-09-17 深圳市趣创科技有限公司 基于已设置为铃声的音频保护方法、装置和计算机设备
CN112995264B (zh) * 2019-12-18 2022-08-19 花瓣云科技有限公司 防止数据误删除的方法、设备及存储介质
CN112367563A (zh) * 2020-10-14 2021-02-12 广东长虹电子有限公司 一种记录观看表单的电视及观看表单管理方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100228802A1 (en) * 2009-03-09 2010-09-09 Sandisk Il Ltd. System and method to respond to a data file deletion instruction
CN102917098A (zh) * 2012-10-17 2013-02-06 广东欧珀移动通信有限公司 一种防止重要联系人误删的方法及装置
CN104750869A (zh) * 2015-04-20 2015-07-01 安一恒通(北京)科技有限公司 文件管理方法和装置
CN106528315A (zh) * 2016-10-31 2017-03-22 北京小米移动软件有限公司 信息提示方法及装置
CN106778340A (zh) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 数据的删除方法、装置及移动终端
CN107609027A (zh) * 2017-08-08 2018-01-19 捷开通讯(深圳)有限公司 设置文件防删除标志位和防止误删除文件的方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103620616B (zh) * 2013-03-28 2016-03-09 华为技术有限公司 一种访问控制权限管理方法和装置
CN105302924A (zh) * 2015-12-09 2016-02-03 浪潮(北京)电子信息产业有限公司 一种文件管理方法及装置
CN106599690A (zh) * 2016-12-21 2017-04-26 哈尔滨安天科技股份有限公司 国产操作系统下的可移动介质访问权限的管控方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100228802A1 (en) * 2009-03-09 2010-09-09 Sandisk Il Ltd. System and method to respond to a data file deletion instruction
CN102917098A (zh) * 2012-10-17 2013-02-06 广东欧珀移动通信有限公司 一种防止重要联系人误删的方法及装置
CN104750869A (zh) * 2015-04-20 2015-07-01 安一恒通(北京)科技有限公司 文件管理方法和装置
CN106528315A (zh) * 2016-10-31 2017-03-22 北京小米移动软件有限公司 信息提示方法及装置
CN106778340A (zh) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 数据的删除方法、装置及移动终端
CN107609027A (zh) * 2017-08-08 2018-01-19 捷开通讯(深圳)有限公司 设置文件防删除标志位和防止误删除文件的方法及装置

Also Published As

Publication number Publication date
CN107609027B (zh) 2020-06-02
CN107609027A (zh) 2018-01-19

Similar Documents

Publication Publication Date Title
WO2019029504A1 (zh) 防止误删除文件方法以及移动终端
US8108427B2 (en) System and method for storage operation access security
WO2018107811A1 (zh) 网络安全联合防御方法、装置、服务器和存储介质
US20050273858A1 (en) Stackable file systems and methods thereof
US20060236104A1 (en) Method and apparatus for encrypting and decrypting data in a database table
WO2013044502A1 (zh) 数据管理的方法及装置
WO2018121454A1 (zh) 文件访问控制列表管理方法和相关装置和系统
WO2018030667A1 (ko) 피싱 또는 랜섬웨어 공격을 차단하는 방법 및 시스템
WO2017071329A1 (zh) 密码管理方法、密码管理系统及终端设备
US8762738B2 (en) System and method for protecting content on a storage device
JP2010539584A (ja) データセキュリティ装置
CN110135151B (zh) 基于lsm与系统调用拦截相配合的可信计算实现系统及方法
WO2019223098A1 (zh) 一种文件的读写方法及设备
CN106599115A (zh) 数据保护方法、装置及终端
WO2018053903A1 (zh) 文件管理方法、文件管理装置及移动终端
WO2019231089A1 (ko) 보안정책 및 감사로그 양방향 조회, 대조, 추적 시스템 및 그 방법
WO2017067292A1 (zh) 一种保证指纹数据稳定的方法、装置及终端
JP5310075B2 (ja) ログ収集システム、情報処理装置、ログ収集方法およびプログラム
CN114186222A (zh) 一种勒索病毒的防护方法及系统
CN112597492A (zh) 一种基于Windows内核的二进制可执行文件更改监测方法
WO2021070978A1 (ko) 블록체인 기반의 edr 장치 및 방법
WO2024106794A1 (ko) 리눅스 기반 운영체제에서의 데이터 보호방법 및 장치
JP4201225B2 (ja) データベース同期更新方法およびそのシステム
CN115168908B (zh) 文件保护方法、装置、设备及存储介质
US11714896B2 (en) Information processing apparatus, information processing method, and computer program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18844493

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18844493

Country of ref document: EP

Kind code of ref document: A1