[go: up one dir, main page]

CN110688353A - File management method, device and computer readable medium - Google Patents

File management method, device and computer readable medium Download PDF

Info

Publication number
CN110688353A
CN110688353A CN201910859371.8A CN201910859371A CN110688353A CN 110688353 A CN110688353 A CN 110688353A CN 201910859371 A CN201910859371 A CN 201910859371A CN 110688353 A CN110688353 A CN 110688353A
Authority
CN
China
Prior art keywords
file
deleted
user
files
network equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910859371.8A
Other languages
Chinese (zh)
Inventor
徐学东
顾正相
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201910859371.8A priority Critical patent/CN110688353A/en
Publication of CN110688353A publication Critical patent/CN110688353A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/168Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The file management method comprises the steps of determining a file to be deleted according to a cleaning instruction, sending the file to network equipment for storage, and deleting the file locally on user equipment, so that the deleted file can be retrieved when needed. In addition, a classification directory of deleted files can be displayed, the classification directory comprises the deleted files displayed according to classification information, after a target file needing to be retrieved is detected to be selected by a user based on the displayed classification directory, the target file is obtained from the network equipment, and the target file is locally restored at the user equipment, so that even when the number of the deleted files is large, the user can quickly find the specific deleted files by checking the classification directory, the files can be quickly retrieved, and the user experience is improved.

Description

File management method, device and computer readable medium
Technical Field
The present application relates to the field of information technology, and in particular, to a file management method, device, and computer readable medium.
Background
With the development of technology, electronic devices have become an indispensable device. When people use electronic equipment, various files are stored in the electronic equipment, and various application programs are installed in the electronic equipment so as to realize corresponding functions. For an electronic device, the larger the storage capacity is, the higher the cost is, and therefore the storage capacity of the device is generally limited. For example, for a mobile terminal, a conventional storage capacity is generally set to a fixed specification such as 64GB, 128GB, 512GB, etc., and if a user encounters insufficient capacity during use, the user may obtain a storage space by cleaning up unnecessary files.
At present, in the industry, when files are cleared, files needing to be cleared can be determined manually or automatically, for example, a user manually selects the files needing to be cleared in a file list or an electronic device automatically scans files which can be deleted according to a certain rule, after clearing is completed, the files cannot be deleted, and at this time, the available storage space in the user device is increased. However, this solution has the disadvantage that if the undesired files are inadvertently and incorrectly selected, the user cannot retrieve the corresponding files after the files have been cleaned. In order to avoid the problem of being unable to find back, an improved scheme is to backup the file before deleting the file, and store the file in another storage space, such as a recycle bin, a cloud storage device, and the like. When a user needs to retrieve a deleted file, the user needs to log in a backup storage space to search for a specific file, and the difficulty of searching increases with the increase of the number of backup files, so that the scheme solves the problem that the file cannot be retrieved, but the retrieval is difficult when the number of files is large, and the user experience is poor.
Content of application
An object of the present application is to provide a file management method, apparatus, and computer-readable medium.
To achieve the above object, some embodiments of the present application provide a piece management method, including:
determining a file to be deleted according to the cleaning instruction;
sending the file to network equipment for storage, and locally deleting the file at user equipment;
displaying a classification directory of deleted files, wherein the classification directory comprises the deleted files displayed according to classification information, the deleted files comprise files which are deleted locally in user equipment and stored by network equipment, and the classification information is determined according to attributes of the deleted files;
and after detecting that the user selects the target file to be retrieved based on the displayed classified directory, acquiring the target file from the network equipment, and locally recovering the target file at the user equipment.
Furthermore, an embodiment of the present application also provides a file management device, which includes a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to execute the file management method.
Embodiments of the present application also provide a computer readable medium, on which computer program instructions are stored, the computer readable instructions being executable by a processor to implement the file management method.
In the scheme provided by some embodiments of the present application, a file to be deleted may be determined according to a cleaning instruction, and then the file is sent to the network device for saving, and the file is deleted locally at the user device, so that the deleted file may be retrieved when needed. In addition, a classification directory of deleted files can be displayed, the classification directory comprises the deleted files displayed according to classification information, after a target file needing to be retrieved is detected to be selected by a user based on the displayed classification directory, the target file is obtained from the network equipment, and the target file is locally restored at the user equipment, so that even when the number of the deleted files is large, the user can quickly find the specific deleted files by checking the classification directory, the files can be quickly retrieved, and the user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a flowchart illustrating a file management method according to an embodiment of the present disclosure;
FIG. 2 is a flowchart illustrating a process performed by a UE to send and delete a file according to an embodiment of the present disclosure;
FIG. 3 is a diagram illustrating a category list displayed to a user by a user device in an embodiment of the present application;
FIG. 4 is a flowchart of a process for implementing file cleaning according to a solution of an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a device capable of file management according to an embodiment of the present application;
the same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In a typical configuration of the present application, the terminal, the devices serving the network each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The embodiment of the application provides a file management method, which can display a classification directory of deleted files, wherein the classification directory comprises the deleted files displayed according to classification information, and after a target file to be retrieved is detected to be selected by a user based on the displayed classification directory, the target file is acquired from network equipment, and the target file is locally restored at user equipment, so that even if the number of the deleted files is large, the user can quickly find out the specific deleted file by checking the classification directory, the quick retrieval of the file is realized, and the user experience is improved.
In a practical scenario, the execution subject of the method may be various types of user equipment, where the user equipment includes an input/output device for implementing interaction with a user, such as acquiring an operation and an instruction of the user, displaying related content to the user, and the like. The specific implementation of the user equipment may include, but is not limited to, various terminal devices such as a computer, a mobile phone, a tablet computer, and the like, or may also be an application program that can be run on the terminal device and implement corresponding processing logic.
Fig. 1 shows a processing flow of a file management method provided in an embodiment of the present application, where an execution subject of the method may be a user device, and processing logic corresponding to a relevant processing flow may be controlled and executed by an application running on the user device, and includes the following processing steps:
and step S101, determining the file to be deleted according to the cleaning instruction. The cleaning instruction may be an instruction for cleaning the storage space, which is manually input by a user, for example, an instruction triggered by the user manually selecting a file to be cleaned in a file list and clicking a cleaning button; or the instruction may be an instruction for automatically clearing the storage space triggered based on a preset condition, for example, when the storage space occupied in the user equipment reaches a preset value, a file that can be deleted is automatically scanned according to a set rule, and then a deletion instruction is triggered. Based on the cleaning instructions, files to be deleted can be determined, and after the files are deleted, the local storage space can be cleaned.
And step S102, sending the file to network equipment for storage, and deleting the file locally on the user equipment. Because the file to be deleted is sent to the network equipment for storage, even if the file is deleted locally by the user equipment, the backup of the file also exists in the network equipment, so that the problem that the file cannot be found back after the file which is not expected to be clear is deleted by mistake by accident can be avoided, and meanwhile, the backup file does not occupy the local storage space of the user equipment, so that the local storage space can be effectively cleaned.
Because data transmission between the user equipment and the network equipment needs to depend on a network environment, for example, when the network environment is not good, the transmission condition may not meet the requirement of file transmission, so that file transmission fails, and the network equipment cannot store files to be deleted. At this time, if the user device deletes the file locally, the user cannot retrieve the file deleted locally. Thus, in some embodiments of the present application, when sending the file to the network device for saving and deleting the file locally at the user device, a processing flow as shown in fig. 2 may be adopted, including:
step S201, determining whether the network environment meets the transmission condition. The network environment is determined based on a connection status, which may include, for example, the ability to connect to the network device and the inability to connect to the network device, a transmission speed, which is a speed of data transmission between the user equipment and the network device in the case of the ability to connect to the network device, and the like. In an actual scenario, it may be determined that the network device is capable of connecting to the network device and the transmission speed is greater than or equal to the preset value N, and it is determined that the network device is not capable of connecting to the network device, or it is capable of connecting to the network device and the transmission speed is less than the preset value N, and it is determined that the network device is not compliant with the transmission condition.
Step S202, if the transmission condition is met, it indicates that the file can be smoothly transmitted from the user equipment to the network equipment for saving, so that the file can be sent to the network equipment for saving, and the file can be deleted locally at the user equipment.
Step S203, if the transmission condition is not met, it indicates that the file may not be successfully transmitted from the user equipment to the network equipment for saving in the current network environment, so that the file may be cached locally in the user equipment, and then returned to step S201 for determination, until the transmission condition is met, the file is sent to the network equipment for saving, and the file is deleted locally in the user equipment. In an actual scenario, when a file is cached locally, the file may be deleted in an original storage path, and the file is uniformly stored in a preset storage path, such as a recycle bin, until a transmission condition is met, the cached file is sent to a network device for storage, and the file is deleted from the locally preset storage path.
When a file is sent to a network device for saving, if the file is already stored in the network device, if the file is still repeatedly sent, the resource is wasted. Therefore, in some embodiments of the present application, when the file is sent to the network device for saving and the user device deletes the file locally, the summary information of the file may be generated first, and the summary information may be obtained by calculation based on any hash algorithm, such as MD5, SHA256, and the like. The method comprises the steps that the data of the files are subjected to hash calculation to obtain summary information with small data volume, and the same files are identical in summary obtained based on the same hash algorithm, so that the summary information is sent to network equipment, and the network equipment can judge whether the files are stored or not according to the summary information.
For example, for the file d1 to be deleted, before sending it to the network device for saving, the user device may calculate its MD5 value, and provide the MD5 value to the network device, and the network device may determine whether there is a file with the same MD5 value in the files already stored therein, if so, it may determine that the file d1 is already saved in the network device, and if not, it may indicate that the file d1 is not saved in the network device. The network device may return the determination result to the user device, and the user obtains the determination result returned by the network device and performs subsequent processing based on the determination result. If the judgment result is yes, the file is directly deleted locally at the user equipment; if the judgment result is negative, the file is sent to the network equipment for storage, and the file is locally deleted at the user equipment.
Step S103, displaying the classified directory of the deleted files. The deleted files comprise files which are deleted locally in user equipment and stored by network equipment, the classification directory comprises the deleted files displayed according to classification information, and the classification information is determined according to attributes of the deleted files.
In an actual scenario, the attribute of the deleted file may include a file type, a local deletion time, and the like, and thus the classification information is determined according to the file type and/or the local deletion time of the deleted file. For example, common document type files such as PDF, Word, Excel, and PPT can be classified into one type according to file types, multimedia type files such as pictures, videos, and audios can be classified into one type, various types of installation packages can be classified into one type, other files can be classified into another type, files deleted on the same day can be classified into one type according to local deletion time, files deleted within one week can be classified into one type, files deleted within one week to one month can be classified into one type, and the like. In addition, the file type and the local deletion time can be combined, and after the file type is divided, and then the file type is subdivided or sorted according to the time under each classification. It will be understood by those skilled in the art that the above-described manner of determining classification information is by way of example only, and other forms based on similar principles, now existing or later to come, if applicable, are intended to be encompassed within the scope of the present application and are herein incorporated by reference.
In an actual scenario, when a deleted file is displayed in the classification directory according to the classification information, the file name and the icon of the deleted file may be displayed according to the classification of the classification information. Fig. 3 is a schematic diagram illustrating a category directory displayed to a user by a user device, wherein if the user needs to retrieve a certain erroneously deleted file, the user can quickly find a specific file through the category directory, so as to conveniently retrieve the erroneously deleted file. In addition, besides the file name and the icon, other descriptive contents about the file, such as the file size, the deletion time, the creation time, the modification time, the file creator, and the like, can be displayed, so that the user can find the file more conveniently.
The classification information of the deleted file can be determined by the user equipment, or can be determined by the network equipment and returned to the user equipment after being stored on the network equipment. Therefore, after the user equipment sends the file to the network equipment for storage, the network equipment can determine the classification information according to the attribute of the deleted file and return the classification information. At this time, the user device may acquire classification information on the deleted files from the network device and display a classification directory of the deleted files according to the classification information.
In some embodiments of the present application, the classification information may also be used to determine a degree of importance. For example, in a scenario in which classification information is divided according to file types, the classification information is a document class, a multimedia class, an installation package class, and other classes, respectively, a document class including files such as PDF, Word, Excel, and PPT may be used as a class with the highest importance, a multimedia class including files such as pictures, videos, and audios may be used as a class with the second highest importance, an installation package class may be used as a class with the third highest importance, and other classes may be used as a class with the lowest importance. Also for example, in a scenario in which classification information is divided according to local deletion time, the degree of importance of each category may be determined according to local deletion time, the closer the local deletion time, the higher the degree of importance. Thereby, the importance of the deleted file can be determined based on the classification information.
Based on the determined importance degree, when the classification directory of the deleted files is displayed, the deleted files in the classification directory can be displayed in a distinguishing manner according to the importance degrees of the deleted files. The purpose of the distinguishing display is to enable a user to visually distinguish the importance degrees of different deleted files after seeing the classification directory, for example, the specific form of the distinguishing display may be a display with different colors, or a priority display of deleted files with high importance degrees, and the like. It will be understood by those skilled in the art that the specific forms shown and described are by way of example only and that other forms, whether now known or later developed based on similar principles, are also within the scope of the present application and are herein incorporated by reference.
Taking the foregoing classification directories displayed according to the classification information of the document class, the multimedia class, the installation package class, and the other classes as an example, the file name of the deleted file of the document class may be displayed with a red font, the file name of the deleted file of the multimedia class may be displayed with a yellow font, the file name of the deleted file of the installation package class may be displayed with a blue font, and the file name of the deleted file of the other classes may be displayed with a black font. Therefore, the user can intuitively judge the importance degree of the deleted file through the display color of the file name so as to search for the specific file.
And step S104, after detecting that the target file needing to be retrieved is selected by the user based on the displayed classified catalogue, acquiring the target file from the network equipment, and locally restoring the target file in the user equipment. The user equipment displays the classification catalog of the deleted files, so that the user can check the classification catalog through the user equipment, and if the user deletes a certain file by mistake and needs to retrieve the file, the user can execute corresponding operation on the classification catalog to select a target file needing to be retrieved. Therefore, even when the number of the deleted files is large, the user can quickly find the specific deleted files by checking the classified directory, so that the files can be quickly found back, and the user experience is improved.
In an actual scene, when a user selects a target file to be retrieved based on a displayed classification directory, a deleted file in the classification directory can be clicked through an input device such as a mouse or a touch screen, and the clicked deleted file is the selected target file. After the post-target file is selected, the retrieving operation may be triggered in a preset manner, for example, a confirmation button of the retrieving operation is clicked or a specific gesture operation is input. After the retrieving operation is triggered, the user equipment may acquire the target file from the network device, and locally restore the target file at the user equipment, thereby completing retrieving the target file.
In addition, in addition to retrieving the target file, the scheme provided by the embodiment of the present application may also completely delete the target file, that is, delete the file stored in the network device. Therefore, the file management method provided by the embodiment of the application may further include: and requesting the network equipment to delete the stored target file after detecting that the user selects the target file to be deleted based on the displayed classification directory.
When a user selects a target file to be deleted based on the displayed classification directory, the deleted file in the classification directory can be clicked through an input device such as a mouse or a touch screen, and the clicked deleted file is the selected target file. After the selected target file is selected, a complete deletion operation may be triggered in a preset manner, for example, a confirmation button of the complete deletion operation is clicked or a specific gesture operation is input. After triggering the complete deletion operation, the user equipment may send corresponding information to the network equipment, requesting the network equipment to delete the saved target file.
To further ensure the security of the files stored in the network device, the files may be associated with the source identifier. Therefore, when the user equipment sends the file to the network equipment for saving, the user equipment can send the file and the source identification to the network equipment, so that the network equipment marks the source of the file according to the source identification when saving the file. The source identifier is used to identify the source of the file, thereby restricting operations on the file by instructions from other sources.
In some embodiments of the present application, when the target file is obtained from the network device and the target file is locally restored by the user equipment, a recovery request may be sent to the network device. The retrieve request includes a file identifier of the target file and a source identifier, where the file identifier may be any information that can uniquely point to the file, such as a file name, an MD5 value corresponding to the file, and the like. The source identifier is information for determining the source of the request, and may be a user ID or a device ID, for example. For example, the source identifier may be a user ID or an equipment ID, and if the user ID is used, the source identifier is also carried when the user equipment uploads a file to the network equipment for backup storage. When the network device saves the file, the source of the file is marked according to the user ID, which indicates that the file comes from a certain user 1. If the device ID is used, the network device, when saving the file, marks the source of the file according to the device ID, indicating that the file is from a certain user equipment UE 1.
Therefore, the network device determines the target file corresponding to the retrieval request according to the file identifier and the source identifier in the retrieval request, for example, the network device may first search in the stored file according to the file identifier in the retrieval request, if the file with the same file identifier can be found, further retrieve the total source identifier of the request and the source identifier of the file, and if the two identifiers are consistent, send the file back to the user device as the target file. Therefore, the user receives the target file returned by the network equipment and restores the target file locally on the user equipment. For example, if the source of the file d1 stored in the network device is identified as user ID user1, and if the file name of the target file to be retrieved in the retrieval request sent by the user device is d1, but the source is identified as user2, the target file d1 cannot be retrieved from the network device. Therefore, the security of the deleted files in the network equipment can be improved, and the deleted files are prevented from being acquired by other users.
Fig. 4 shows a processing flow when file cleaning is implemented by using a scheme of an embodiment of the present application, including the following processing steps:
step S401, the user selects the junk files needing to be cleaned in the user equipment.
Step S402, the user equipment judges whether the user equipment can be connected to the network equipment, if not, step S403 is executed, if yes, step S404 is executed
Step S403, cache the garbage file locally, and return to step S402.
Step S404, determining whether the network device stores the junk file to be uploaded. The garbage files to be uploaded comprise newly selected garbage files and garbage files which are temporarily not uploaded and are cached locally. The step S406 is directly executed for the junk files already stored in the network device without uploading, and the step S405 is executed for the junk files not stored in the network device.
And step S405, uploading the junk files, and performing associated storage according to the device ID, the user ID and the like.
In step S406, the user equipment performs a local deletion operation.
Step S407, judging whether the deletion is successful, and prompting the user that the deletion is successful or failed according to the result.
Step S408, displaying the classification directory of the junk files. The user can quickly search for the needed junk files based on the displayed classification directories, for example, if the mistakenly deleted junk files need to be retrieved, the target files needing to be retrieved can be selected from the classification directories.
Step S409, after detecting that the user selects the target file to be retrieved based on the displayed classified directory, the user equipment acquires the target file from the network equipment and locally restores the target file in the user equipment. In addition to retrieving files, the user may also completely delete files uploaded to the network device.
Based on the same inventive concept, the embodiment of the application also provides a file management device, the corresponding method of the device is the file management method in the previous embodiment, and the principle of solving the problem is similar to the method. The apparatus comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform the aforementioned file management method.
The specific implementation of the file management device may be various user devices, where the user device includes an input/output device for implementing interaction with a user, such as obtaining an operation and an instruction of the user, and displaying related content to the user. The specific implementation of the user equipment may include, but is not limited to, various terminal devices such as a computer, a mobile phone, a tablet computer, and the like, or may also be an application program that can be run on the terminal device and implement corresponding processing logic.
Fig. 5 shows a structure of a device suitable for implementing the method and/or technical solution in the embodiment of the present application, and the device 500 includes a Central Processing Unit (CPU)501, which can execute various suitable actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage portion 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for system operation are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other via a bus 504. An Input/Output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, a touch screen, a microphone, an infrared sensor, and the like; an output section 507 including a Display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), an LED Display, an OLED Display, and the like, and a speaker; a storage portion 508 comprising one or more computer-readable media such as a hard disk, optical disk, magnetic disk, semiconductor memory, or the like; and a communication section 509 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet.
In particular, the methods and/or embodiments in the embodiments of the present application may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. The computer program performs the above-described functions defined in the method of the present application when executed by the Central Processing Unit (CPU) 501.
It should be noted that the computer readable medium described herein can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart or block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer-readable medium carries one or more computer-readable instructions executable by a processor to implement the methods and/or aspects of the embodiments of the present application as described above.
To sum up, in the solutions provided in some embodiments of the present application, a file to be deleted may be determined according to a cleaning instruction, and then the file is sent to the network device for saving, and the file is deleted locally at the user device, so that the deleted file may be retrieved when needed. In addition, a classification directory of deleted files can be displayed, the classification directory comprises the deleted files displayed according to classification information, after a target file needing to be retrieved is detected to be selected by a user based on the displayed classification directory, the target file is obtained from the network equipment, and the target file is locally restored at the user equipment, so that even when the number of the deleted files is large, the user can quickly find the specific deleted files by checking the classification directory, the files can be quickly retrieved, and the user experience is improved.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In some embodiments, the software programs of the present application may be executed by a processor to implement the above steps or functions. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (11)

1. A file management method, wherein the method comprises:
determining a file to be deleted according to the cleaning instruction;
sending the file to network equipment for storage, and locally deleting the file at user equipment;
displaying a classification directory of deleted files, wherein the classification directory comprises the deleted files displayed according to classification information, the deleted files comprise files which are deleted locally in user equipment and stored by network equipment, and the classification information is determined according to attributes of the deleted files;
and after detecting that the user selects the target file to be retrieved based on the displayed classified directory, acquiring the target file from the network equipment, and locally recovering the target file at the user equipment.
2. The method of claim 1, wherein sending the file to a network device for saving comprises:
and sending the file and the source identification to network equipment so that the network equipment marks the source of the file according to the source identification when saving the file.
3. The method of claim 2, wherein obtaining the target file from the network device and restoring the target file locally at a user device comprises:
sending a retrieval request to the network equipment, wherein the retrieval request comprises a file identifier and a source identifier of a target file;
receiving a target file returned by the network equipment, wherein the target file is determined by the network equipment according to a file identifier and a source identifier in the retrieval request;
and locally restoring the target file at the user equipment.
4. The method of claim 1, wherein sending the file to a network device for saving and deleting the file locally at a user device comprises:
judging whether the network environment meets the transmission condition;
if the transmission condition is met, sending the file to network equipment for storage, and locally deleting the file at the user equipment;
if the transmission condition is not met, the file is cached locally in the user equipment until the transmission condition is met, the file is sent to the network equipment to be stored, and the file is deleted locally in the user equipment.
5. The method of claim 1, wherein sending the file to a network device for saving and deleting the file locally at a user device comprises:
generating summary information of the file;
sending the abstract information to network equipment so that the network equipment judges whether the file is stored or not according to the abstract information;
obtaining a judgment result returned by the network equipment;
if the judgment result is yes, the file is directly deleted locally at the user equipment;
if the judgment result is negative, the file is sent to the network equipment for storage, and the file is locally deleted at the user equipment.
6. The method of claim 1, wherein displaying the sorted directory of deleted files comprises:
and acquiring classification information about the deleted files from the network equipment, and displaying a classification directory of the deleted files according to the classification information, wherein the classification information is determined by the network equipment according to the attributes of the deleted files.
7. The method according to any one of claims 1 to 6, wherein the classification information is determined according to a file type and/or a local deletion time of a deleted file.
8. The method of claim 1, wherein the method further comprises:
determining the importance degree of the deleted files according to the classification information;
a cataloged directory for displaying deleted files, comprising:
and displaying the deleted files in the classified directory in a distinguishing way according to the importance degrees of the deleted files.
9. The method of claim 1, wherein the method further comprises:
and requesting the network equipment to delete the stored target file after detecting that the user selects the target file to be deleted based on the displayed classification directory.
10. A file management apparatus comprising a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform the method of any of claims 1 to 9.
11. A computer readable medium having stored thereon computer program instructions executable by a processor to implement the method of any one of claims 1 to 9.
CN201910859371.8A 2019-09-11 2019-09-11 File management method, device and computer readable medium Pending CN110688353A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910859371.8A CN110688353A (en) 2019-09-11 2019-09-11 File management method, device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910859371.8A CN110688353A (en) 2019-09-11 2019-09-11 File management method, device and computer readable medium

Publications (1)

Publication Number Publication Date
CN110688353A true CN110688353A (en) 2020-01-14

Family

ID=69109041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910859371.8A Pending CN110688353A (en) 2019-09-11 2019-09-11 File management method, device and computer readable medium

Country Status (1)

Country Link
CN (1) CN110688353A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111601153A (en) * 2020-05-22 2020-08-28 青岛海信传媒网络技术有限公司 Media file playing method and display device
CN112347052A (en) * 2020-11-04 2021-02-09 深圳集智数字科技有限公司 File matching method and related device
CN113032783A (en) * 2021-03-11 2021-06-25 北京顶象技术有限公司 Virus detection method and system based on non-code characteristics
CN113568874A (en) * 2021-07-14 2021-10-29 上海分木信息科技有限公司 File selection uploading method and equipment
CN115098447A (en) * 2022-07-18 2022-09-23 重庆紫光华山智安科技有限公司 File recovery method and device, electronic equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552669A (en) * 2008-04-02 2009-10-07 林兆祥 Method and system of data transmission
CN106095793A (en) * 2016-05-30 2016-11-09 百度在线网络技术(北京)有限公司 The method and apparatus of management mobile terminal memory space
CN107332966A (en) * 2017-06-30 2017-11-07 江西博瑞彤芸科技有限公司 A kind of backup method of address list information
CN108021698A (en) * 2017-12-21 2018-05-11 努比亚技术有限公司 Delet method, device and the computer-readable storage medium of storage file
CN108833658A (en) * 2018-03-27 2018-11-16 陈迎春 A kind of method and apparatus of data scrubbing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552669A (en) * 2008-04-02 2009-10-07 林兆祥 Method and system of data transmission
CN106095793A (en) * 2016-05-30 2016-11-09 百度在线网络技术(北京)有限公司 The method and apparatus of management mobile terminal memory space
CN107332966A (en) * 2017-06-30 2017-11-07 江西博瑞彤芸科技有限公司 A kind of backup method of address list information
CN108021698A (en) * 2017-12-21 2018-05-11 努比亚技术有限公司 Delet method, device and the computer-readable storage medium of storage file
CN108833658A (en) * 2018-03-27 2018-11-16 陈迎春 A kind of method and apparatus of data scrubbing

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111601153A (en) * 2020-05-22 2020-08-28 青岛海信传媒网络技术有限公司 Media file playing method and display device
CN112347052A (en) * 2020-11-04 2021-02-09 深圳集智数字科技有限公司 File matching method and related device
CN113032783A (en) * 2021-03-11 2021-06-25 北京顶象技术有限公司 Virus detection method and system based on non-code characteristics
CN113032783B (en) * 2021-03-11 2024-03-19 北京顶象技术有限公司 Virus detection method and system based on non-code characteristics
CN113568874A (en) * 2021-07-14 2021-10-29 上海分木信息科技有限公司 File selection uploading method and equipment
CN115098447A (en) * 2022-07-18 2022-09-23 重庆紫光华山智安科技有限公司 File recovery method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110688353A (en) File management method, device and computer readable medium
RU2646334C2 (en) File management using placeholders
CN110147320A (en) Interface test method, device and electronic equipment
CN112328853A (en) Document information processing method, device and electronic device
CN114416667B (en) Method and device for rapidly sharing network disk file, network disk and storage medium
US10540325B2 (en) Method and device for identifying junk picture files
CN112183045B (en) Online document processing method and device and electronic equipment
CN113626301B (en) Method and device for generating test script
US20240004917A1 (en) Data processing method and device, terminal, and storage medium
CN113918659A (en) Data manipulation method, device, storage medium and electronic device
CN114461518A (en) Brain map-based use case management method, device and storage medium
CN115825312B (en) Chromatographic detection data interaction method, chromatographic detection data interaction device, chromatographic detection data interaction equipment and computer readable medium
CN111857720B (en) User interface state information generation method and device, electronic equipment and medium
CN105574163A (en) File processing method and device and electronic equipment
US10313284B1 (en) Upload and share files to a sharing service using a messaging client
CN112783887A (en) Data processing method and device based on data warehouse
CN113934692B (en) File cleaning method, device, storage medium and equipment
CN112445790B (en) Report data storage method, device, equipment and medium
CN114997115A (en) Document processing method, apparatus, apparatus and medium
CN118261135A (en) Document rendering processing method, device, equipment and medium
CN107741992B (en) Network storage method and device for conference records, intelligent tablet and storage medium
CN117828678A (en) Data processing method, apparatus, storage medium, and program product
CN114297157B (en) File processing method, device, equipment and medium
CN112417259A (en) Media resource processing method, device, equipment and storage medium
CN110750268A (en) File cleaning method and device, computer readable storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200114

RJ01 Rejection of invention patent application after publication