Scanning method and device for storage space in mobile terminal
A storage space, mobile terminal technology, applied in the fields of instruments, computing, electrical digital data processing, etc., can solve problems such as reduced user experience, slow scanning speed, etc.
Active Publication Date: 2015-01-28
BEIJING QIHOO TECH CO LTD
5 Cites 12 Cited by
AI-Extracted Technical Summary
Problems solved by technology
In the case that the existing scanning method does not improve the speed of scanning a single file, using the existing scanning method to scan a huge number of directories and files in the storage spa...
Method used
Correspondingly, after receiving the click event of "checking the details of the data" button, as shown in Figure 4a, the following at least one type of data is displayed in the display interface: memory data, cache data, system disk garbage data , advertising data, installation package data, uninstall residual data, large file data, etc. Wherein, the category of the scanned clean-up data may specifically be determined through a matching result with a pre-downloaded or stored clean-up database during the scanning process. In this way, displaying the data of each category on the display interface can facilitate the user to clearly distinguish the cleaning data of the memory from the cleaning data of the non-volatile storage space, and understand the specific category of the cleaning data of the non-volatile storage space , improve user experience.
In this step, clean up the installation package that has been checked by the cleaning software installed in the mobile terminal, so as to avoid the problem that the space occupied by the installation package of storage is too large, improve the operating speed that affects the mobile terminal and improve the user experience. At the same time, unchecked installation packages can be retained. Unchecked installation includes the highest version of the installation package or the installation package that has no...
Abstract
The invention discloses a scanning method and device for storage space in a mobile terminal. The scanning method includes that reading the current time stamp of a current catalog to be scanned when scanning the storage space; comparing the read time stamp with the time stamp of the catalog in a scanning record, if the read time stamp is consistent with the time stamp of the catalog in the scanning record, skipping the scanning for the catalog after confirming that the catalog is bottom catalog, using the catalog information obtained through the last scanning as the catalog information obtained through the current scanning, and recording. According to the technical scheme, a scanning device in the mobile terminal can skip the scanning for the bottom catalog which keeps the time stamp in the current and last scanning in the process of scanning the storage space, and accordingly the scanning time is saved, the scanning efficiency and response time are improved, and the user experience is improved.
Application Domain
File system administrationSpecial data processing applications
Technology Topic
Current timeComputer science +2
Image
Examples
- Experimental program(1)
Example Embodiment
[0091] The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, in which the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary, and are only used to explain the present invention, and cannot be construed as limiting the present invention.
[0092] Those skilled in the art can understand that, unless specifically stated otherwise, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the term "comprising" used in the specification of the present invention refers to the presence of the described features, integers, steps, operations, elements and/or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and/or groups thereof. It should be understood that when we refer to an element as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element, or intervening elements may also be present. In addition, “connected” or “coupled” used herein may include wireless connection or wireless coupling. The term "and/or" used herein includes all or any unit and all combinations of one or more associated listed items.
[0093] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meanings as those commonly understood by those of ordinary skill in the art to which the present invention belongs. It should also be understood that terms such as those defined in a general dictionary should be understood as having a meaning consistent with the meaning in the context of the prior art, and unless specifically defined as here, they will not be idealized or overly Explain the formal meaning.
[0094] Those skilled in the art can understand that the "terminal" and "mobile terminal" used herein include both wireless signal receiver equipment, equipment that only has wireless signal receivers without transmitting capability, and hardware receiving and transmitting equipment. A device that has a device capable of receiving and transmitting hardware for two-way communication on a two-way communication link. Such equipment may include: cellular or other communication equipment, which has a single-line display or multi-line display or cellular or other communication equipment without a multi-line display; PCS (Personal Communications Service, personal communication system), which can combine voice and data Processing, fax and/or data communication capabilities; PDA (Personal Digital Assistant), which can include radio frequency receivers, pagers, Internet/Intranet access, web browsers, notepads, calendars and/or GPS (Global Positioning System (Global Positioning System) receiver; conventional laptop and/or palmtop computer or other device, which has and/or includes a radio frequency receiver, conventional laptop and/or palmtop computer or other device. The "terminal" and "mobile terminal" used here may be portable, transportable, installed in vehicles (aviation, sea and/or land), or suitable and/or configured to operate locally, and/or In a distributed form, it runs on the earth and/or any other location in space. The "terminal" and "mobile terminal" used here can also be communication terminals, internet terminals, music/video playback terminals, such as PDA, MID (Mobile Internet Device, mobile Internet device) and/or music/video playback Functional mobile phones can also be devices such as smart TVs and set-top boxes.
[0095] The inventor of the present invention found that the timestamps of directories in many mobile terminals have the following characteristics: when any file in the directory changes, the timestamp of the directory changes accordingly; when the timestamp of a subdirectory in the directory occurs When changed, the timestamp of the directory will not change.
[0096] Therefore, the inventor of the present invention considers that it is possible to determine whether the content in the directory has changed by examining the timestamp of the directory; if it is determined that the content in the directory has not changed from the content in the last scan, you can skip the Scan the directory, and directly use the last scan result of the directory as the scan result of the directory obtained in this scanning process, thereby saving scanning time, improving scanning efficiency and response time, and improving user experience.
[0097] The technical solutions of the embodiments of the present invention will be described in detail below with reference to the drawings.
[0098] The embodiment of the present invention provides a method for scanning the storage space of a mobile terminal. The schematic flow chart of the method is as follows: figure 1 As shown, including the following steps:
[0099] S101: When scanning the storage space, read the current timestamp of the directory currently to be scanned.
[0100] Specifically, when the mobile terminal scans the storage space of the mobile terminal, for the directory currently to be scanned, the current timestamp of the directory is read.
[0101] Wherein, the storage space of the mobile terminal may specifically be the storage space of a non-volatile memory or the memory in the mobile terminal. Non-volatile memory specifically includes: EEPROM (Electrically Erasable Programmable Read-Only Memory), flash memory, SD (Secure Digital Memory) card, micro SD card, memory stick, Micro hard drives and solid state drives, etc.
[0102] Preferably, when the mobile terminal scans the storage space, for the directory currently to be scanned, the number of files in the directory is determined; when it is determined that the number of files in the directory exceeds a set threshold (for example, 2000), Read the current timestamp of the directory.
[0103] S102: For the directory currently to be scanned, compare the current timestamp of the read directory with the timestamp of the directory recorded in the scan record to determine whether the two are consistent, if yes, perform step S103; otherwise, perform Step S106.
[0104] Specifically, for the directory currently to be scanned, the mobile terminal finds the timestamp of the directory from the scan record, compares the found timestamp with the current timestamp of the directory read in step S101, and judges whether they are both If yes, go to step S103; otherwise, go to step S106.
[0105] Wherein, the timestamp of the directory recorded in the scan record is obtained by the mobile terminal during the last scan and recorded in the scan record in response to the directory.
[0106] In addition, for the directory currently to be scanned, if the time stamp of the directory is not found in the scan record, the mobile terminal executes step S106.
[0107] S103: For the current directory to be scanned, identify whether the directory is a bottom-level directory; if so, perform step S104; otherwise, perform step S105.
[0108] S104: For a directory identified as a bottom-level directory, skip scanning the directory, and record the information of the directory obtained in the last scanning process as the information of the directory obtained in the current scanning process.
[0109] Specifically, for a directory identified as a bottom-level directory, the mobile terminal skips scanning the directory, and records the information of the directory obtained in the last scanning process as the information of the directory obtained in this scanning process.
[0110] The information of the directory may include the name and path of the directory; in addition, the information of the directory may also include: the version number, timestamp, and size of the space occupied by the directory, as well as the name, version number, and timestamp of the files in the directory And the size of the space occupied.
[0111] S105: For a directory identified as a non-bottom directory, determine whether to skip scanning the subdirectory under the directory according to the timestamp of the subdirectory under the directory.
[0112] Specifically, for a directory identified as a non-low-level directory, the mobile terminal continues to obtain the current timestamp of each subdirectory under the directory; for each subdirectory, the current timestamp of the subdirectory is compared with the timestamp of the subdirectory in the scan record Perform comparison; according to the comparison result, deciding whether to skip scanning the subdirectory includes:
[0113] If the mobile terminal determines that the comparison result is consistent and the sub-directory is the bottom-level directory, it will skip scanning the sub-directory, and use the sub-directory information obtained during the last scan as the current scan The obtained information of the subdirectory is recorded.
[0114] If the mobile terminal determines that the comparison result is inconsistent, it scans the sub-directory and records the information of the sub-directory obtained this time.
[0115] If the mobile terminal determines that the comparison result is consistent, and the subdirectory is a non-bottom directory, it will determine whether to skip scanning the directories under the subdirectory according to the timestamp of each directory under the subdirectory according to the same method.
[0116] Preferably, the mobile terminal can also determine the level of the directory to be scanned that is identified as a non-low-level directory, and determine whether to continue obtaining the current timestamp of each subdirectory under the directory according to the level of the directory: If the level of the directory is less than the preset number of levels (for example, 10 levels), then continue to obtain the current timestamp of each subdirectory under the directory; otherwise, continue to obtain the current timestamp of each subdirectory under the directory.
[0117] S106: For the current directory to be scanned with inconsistent timestamps or not recorded by the timestamp, scan the directory, and record the information of the directory obtained by this scan.
[0118] Specifically, for the directory currently to be scanned, if the mobile terminal determines in step S102 that the time stamp of the directory found from the scan record is different from the current time stamp of the directory read in step S101, then in this step , Replace the current timestamp of the directory with the timestamp of the directory recorded in the scan record, scan the directory, and record the information of the directory obtained in this scan.
[0119] Or, for the directory currently to be scanned, if the mobile terminal determines in step S102 that the time stamp of the directory is not found in the scan record, in this step, the current time stamp of the directory read in step S101 Save it in the scan record, scan the catalog, and record the information of the catalog obtained this time.
[0120] Based on the above-mentioned scanning method for the storage space of a mobile terminal, an embodiment of the present invention also provides a scanning device arranged in the mobile terminal to scan the storage space. A schematic diagram of the internal structure of the scanning device is as follows: figure 2 As shown, it includes: a scanning module 201 and a search and comparison module 202.
[0121] The scanning module 201 is used to read the current timestamp of the directory currently to be scanned when scanning the storage space; preferably, when scanning the storage space, the scanning module 201 determines the number of files in the directory currently to be scanned, When the number of files in the directory exceeds the set threshold, read the current timestamp of the directory; and output a search notification.
[0122] In addition, the scanning module 201 is configured to, if the received comparison results are consistent, after determining that the directory is the bottom directory, skip scanning the directory, and use the directory information obtained during the last scan as the current The information of the directory obtained during the scanning process is recorded; preferably, after the received comparison result is consistent, the scanning module 201 continues to obtain the current timestamp of each subdirectory under the directory if it determines that the directory is not the bottom directory, And output a search notification for each sub-directory; then, according to the comparison result returned for each sub-directory, decide whether to skip the scan of the corresponding sub-directory: For each sub-directory, after receiving the comparison result returned by the sub-directory is consistent , If it is determined that the subdirectory is the bottom directory, the scanning of the subdirectory is skipped, and the information of the subdirectory obtained in the last scan process is used as the information of the subdirectory obtained in the scanning process recording.
[0123] The search and comparison module 202 is configured to, after receiving the search notification output by the scanning module 201, find the timestamp of the directory currently to be scanned from the scanning record, and compare the searched timestamp with the timestamp read by the scanning module 202 ; And return the comparison result.
[0124] Further, the search and comparison module 202 is also used to, after receiving the search notification, for the directory currently to be scanned, if the time stamp of the directory is not found in the scan record, then the current time stamp of the directory is stored in the scan Record, and output a no-record notification; or, after receiving the search notification, for the current directory to be scanned, if it is determined that the searched timestamp is different from the current timestamp of the directory, then the current timestamp of the directory Replace the timestamp of the directory recorded in the scan record and output inconsistent comparison results.
[0125] The scanning module 201 is further configured to scan the current directory to be scanned after receiving the no-record notification or inconsistent comparison results output by the search and comparison module 202, and record the information of the directory obtained this time.
[0126] More preferably, in the scan record of the embodiment of the present invention, the corresponding recorded directory may also record the path information and scanning strategy of the directory; in addition, the corresponding recorded directory in the scan record may record the type of the directory and the Types of files in the directory; based on this, an embodiment of the present invention also provides a scanning method for accelerating storage space:
[0127] In the process of scanning the storage space, the mobile terminal obtains the path information of the directory to be scanned; finds the corresponding scanning strategy in the scan record according to the path information of the directory; determines the scanning of the directory according to the found scanning strategy result.
[0128] Among them, the scanning strategy of the directory may include: parsing the total description file, average file size, skip scanning, etc.
[0129] When the scanning strategy corresponding to the path information of the directory to be scanned is found in the scan record, the size of the directory can be calculated according to the size of each file in the directory recorded in the general description file. , As the result of scanning the catalog, so that the catalog does not need to be scanned during this scanning process, and the scanning speed is accelerated.
[0130] When the scan strategy corresponding to the path information of the current directory to be scanned is found in the scan record as the average file size, the total number of files in the directory can be obtained, and the total obtained and the average file size found are calculated The product of the values is recorded as the scanning result of the catalog, so that the catalog does not need to be scanned in this scanning process, and the scanning speed is accelerated.
[0131] When it is found in the scan record that the scan strategy corresponding to the path information of the directory to be scanned is skip scan, the scan of the directory is skipped, and the scan result of the directory obtained from the previous scan is used as The scan results of the directory are recorded.
[0132] Preferably, in the scan record, the directory corresponding to the scan strategy of skipping scanning may include: a system directory, a directory whose size exceeds a set upper limit, or a directory where installation package files are stored. The installation package file may specifically be a file with an extension name of APK (AndroidPacKage, Android installation package).
[0133] More preferably, after the mobile terminal obtains the scan result of the current directory to be scanned, if it is determined that the number of files in the directory exceeds the set threshold, and the variance of the size of each file is within the set range, the average file size of the directory is calculated Value, and use the calculated average file size as the scanning strategy for the directory, and update the corresponding directory to the scan record.
[0134] Scanning methods based on the above accelerated storage space, such as figure 2 The shown scanning device of the storage space in the mobile terminal also has the following functions:
[0135] The scanning module 201 is also used to obtain the path information of the current directory to be scanned from the scanning record when scanning the storage space; and determine the scanning result of the directory according to the returned scanning strategy.
[0136] The search and comparison module 202 is also used to, after receiving the search notification, search for the corresponding scan strategy in the scan record according to the path information of the directory obtained by the scan module 201 and send it to the scan module 201; wherein, in the scan record, the corresponding record The directory also records the path information and scanning strategy of the directory.
[0137] More preferably, in order to reduce the operation of mobile terminal users, the present invention also provides a one-key scanning method for cleaning data of storage space, such as Figure 3a As shown, the process can specifically include the following steps:
[0138] S301: After receiving the scan instruction, scan the memory and the non-volatile storage space for cleaning data at the same time.
[0139] Specifically, the user may send a scan instruction to the mobile terminal before performing the cleaning data scan. For example, you can trigger the sending of a scan instruction by clicking a preset data cleaning scan button on the display screen of the mobile terminal, or opening a pre-installed one-key scan cleaning software that supports data cleaning. After the mobile terminal receives the scan instruction sent by the user, it simultaneously scans the memory and the non-volatile storage space for data cleaning.
[0140] In this step, the cleaning data scanning of the memory and the non-volatile storage space may be specifically executed by the same process, or may be executed by two processes separately. For example, the cleaning data of the memory can be executed by a preset memory scanning process; the cleaning data scanning of the non-volatile storage space can be executed by the non-volatile storage space scanning process. In actual applications, the memory and non-volatile storage space cleaning data scan is performed by one process or two processes. The memory and non-volatile storage space are scanned separately, and the memory will start a thread to scan; The volatile storage space allocates threads according to the state of the mobile terminal. For example, on a mobile terminal with a multi-core CPU, scanning threads can be allocated according to the number of CPUs and cores, and a maximum of 4 threads can be allocated to scan non-volatile storage space.
[0141] In actual applications, in the process of scanning and cleaning data, the relevant information (such as path, package name, etc.) of the currently scanned directory can be matched with the information of the directory in the cleanup database that is pre-downloaded from the cloud server or stored locally According to information such as the cleanup strategy and category corresponding to the matched directory, it is recognized that the currently scanned directory is cleaned data, and the category to which the cleaned data belongs can be further determined, and the cleanup strategy used to clean the cleaned data. Further, the cloud server can periodically update and upgrade the local cleanup database, and update the directories recorded in the cleanup database and corresponding cleanup strategies in time.
[0142] Among them, the cleaning strategies for cleaning up records in the database can include the following:
[0143] Completely clean up, that is, the directory and all subdirectories and files in the directory are cleaned and deleted.
[0144] Validity cleaning is to clean and delete files in the directory that have exceeded the validity period, that is, files that have lost their validity.
[0145] Carefully clean up, that is, prompt the user of the risk of performing cleanup and after receiving the user's definite cleanup instruction, check all subdirectories and files in the directory to clean up.
[0146] Partial cleaning, that is, cleaning and deleting the directories or files in the directory that are identified as recommended to be cleaned; the directories or files in the directory that are identified as being carefully cleaned, cleaning and deleting the directory or files after receiving the user's clear cleaning instruction; The directories or files that are not marked as recommended to be cleaned up or carefully cleaned up will not be checked and cleaned up.
[0147] Among them, the category of the cleaning data recorded in the cleaning database may specifically include: memory data, cache data, system disk junk data, advertisement data, installation package data, uninstall residual data, large file data, and so on.
[0148] S302: Calculate the overall progress periodically according to the progress of scanning the cleaning data of the memory and the progress of scanning the cleaning data of the non-volatile storage space.
[0149] Specifically, in the scanning process of cleaning up data, the overall progress J when the i-th cycle arrives can be calculated according to the following formula 1 i :
[0150] J i =j ci w c +j fi w f (Formula 1)
[0151] Where j ci Is the progress of the memory cleaning data scan when the i-th cycle arrives, j fi It is the progress of scanning data cleaning of non-volatile storage space when the i-th cycle arrives; w c Is the weight of memory scanning in the overall progress, w f Is the weight of the non-volatile storage space scanning in the overall progress; i is a natural number.
[0152] Among them, the weight of the proportion of memory scanning in the overall progress and the weight of the proportion of non-volatile storage space scanning in the overall progress are preset. For example, if the memory cleaning data scan is completed, its progress accounts for 50% of the overall progress; correspondingly, after the nonvolatile storage space cleaning data scans, its progress accounts for 50% of the overall progress, then the memory scan can be accounted for The weight of the overall progress is set to 0.5, and the weight of the non-volatile storage space scanning in the overall progress is set to 0.5. In this way, when the progress of cleaning data in the currently scanned memory is 50% and the progress of cleaning data in the non-volatile storage space is 20%, the overall progress is calculated according to the above formula 1 and the preset weighting Is 35%.
[0153] Of course, in actual applications, other methods can also be used to calculate the overall progress, for example, the progress of the data scanning of the memory cleaning, the progress of the cleaning data scanning of the non-volatile storage space, the memory and the non-volatile storage space The size of each to calculate the overall progress.
[0154] S303: On the display interface, display the progress of the progress indicator according to the overall progress.
[0155] In this step, on the display interface, according to the overall progress calculated periodically in step S302, you can use such as Figure 3b The progress bar shown periodically displays progress.
[0156] Of course, in practical applications, the progress indicator can be a circular progress percentage display in addition to a progress bar.
[0157] S304: On the display interface, display the color of the progress indicator according to the size of the currently scanned cleaning data during the scanning process of the cleaning data of the non-volatile storage space.
[0158] In the embodiment of the present invention, step S303 and step S304 are not executed in a sequential order, that is, step S304 can be executed before step S303 or simultaneously with step S303.
[0159] Specifically, the mobile terminal scans the memory in the storage space and the cleaning data of the non-volatile storage space. During the scanning process, the size of the currently scanned cleaning data can be obtained in real time; for several pre-divided numerical ranges , Determine the value range to which the size of the cleaned data of the currently scanned nonvolatile storage space belongs; then, for the determined value range, display the color of the progress indicator according to the color value set in advance corresponding to the value range.
[0160] Of course, in actual applications, during the scanning process, the progress indicator may also change color according to the size of the scanned data in the non-volatile storage space. For example, the interface is a gradient from blue to yellow at 0-20M, from yellow to orange at 20-100M, and from orange to red at 100M. When the scan is completed, when the scanned data is in a certain interval, the final state is displayed in the color corresponding to the maximum value of the interval. For example, when 50M garbage is scanned, the final status is displayed in orange.
[0161] More preferably, in order to facilitate the user to distinguish between memory and non-volatile storage space, while displaying the overall progress, they can also accurately understand the size of the cleaned data scanned by the memory and non-volatile storage space. The display interface can also display the size of the cleaned data of the currently scanned memory and the cleaned data of the non-volatile storage space during the process of cleaning data of the memory. During the scanning process, the cleaned data of the currently scanned non-volatile storage space the size of.
[0162] In practical applications, after scanning the cleaned data of the memory and non-volatile storage space, the size of the cleaned data of the scanned memory and the size of the cleaned data of the non-volatile storage space can also be separated on the display interface. display. For example, in Figure 3c On the display interface shown, "memory garbage" means the cleaned data of the memory, "204MB" means the size of the cleaned data of the scanned memory; "cache garbage" means the cleaned data of the non-volatile storage space, "91.4MB" Indicates the size of the scanned data in the non-volatile storage space.
[0163] In practical applications, data cleaning strategies can often be obtained while scanning and cleaning data. Therefore, more preferably, in the embodiment of the present invention, after scanning the cleaning data of the memory and the non-volatile storage space, the total size of the cleaning data of the memory and the non-volatile storage space and the corresponding The cleaning strategy is the recommended size of all the cleaning data to be cleaned, and it is displayed on the display interface.
[0164] For example, in Figure 3d On the display interface shown, "135MB" indicates the size of all the cleaned data that is recommended to be cleaned by the corresponding cleanup strategy that was scanned; "326MB found in total" indicates the cleaned data of the memory and non-volatile storage space The sum of the sizes.
[0165] More preferably, in the process of cleaning up data scanning of memory and non-volatile storage space, you can also scan the entire disk at the same time for banned items, and after the scan is over, on the display interface, such as Figure 3e As shown, the size of the scanned forbidden item is displayed together with the size of the cleaned data of the scanned memory and the size of the cleaned data of the non-volatile storage space.
[0166] In this embodiment, the purpose of scanning the cleaning data of the memory and the non-volatile storage space is to clean the cleaning data of the memory and the non-volatile storage space. Therefore, more preferably, after the scanning of the cleaning data of the memory and non-volatile storage space is completed, in order to reduce the user's operation, the "one-key cleanup" button can be displayed on the display interface; After the event is clicked, the mobile terminal can clean the scanned data of the memory and non-volatile storage space with one key; there is no need to clean the clean data of the memory and non-volatile storage space through different trigger operations. , To facilitate the user's operation.
[0167] More preferably, in actual applications, in order to facilitate the user to view the scanned cleaned data, a button of "Viewing Cleaned Data Details" may also be displayed on the display interface.
[0168] Correspondingly, after receiving the click event of the "Clear data details view" button, such as Figure 4a As shown, data of at least one of the following categories is displayed on the display interface: memory data, cache data, system disk junk data, advertisement data, installation package data, uninstall residual data, large file data, and so on. Wherein, the category of the scanned cleaning data can be specifically determined by the matching result of the cleaning database downloaded or stored in advance during the scanning process. In this way, displaying the data of each category in the display interface can facilitate the user to clearly distinguish the cleaned data of the memory and the cleaned data of the non-volatile storage space, and the understanding of the specific category of the cleaned data of the non-volatile storage space , Improve user experience.
[0169] Preferably, the "Viewing Details of Cleared Data" button may also specifically include: "Viewing Details of Cleared Data in Memory" and "Viewing Details of Cleared Data in Non-volatile Storage Space" buttons.
[0170] For example, in Figure 3c On the display interface shown, under "204MB" and "91.4MB", there are corresponding links to the button "View the details of cleaning data in memory" and the link to the button "View details of cleaning data in non-volatile storage".
[0171] After receiving the click event of the "Memory Cleaning Data Details View" button, it can be displayed on the display interface such as Figure 4b The cleaning data details of the memory as shown; after receiving the click event of the "non-volatile storage space cleaning data details view" button, it can be displayed on the display interface as Figure 4c Details of the cleaned data of the non-volatile storage space shown.
[0172] Further, considering that the cleaned data that is scanned often contains cleaned data that is recommended to be cleaned, and cleaned data that is carefully cleaned. Therefore, in order to facilitate users to understand the data cleaning strategy, it is better to Figure 4a , 4c As shown, on the display interface, corresponding to each category of data, the size of the cleaned data suggested to be cleaned up for the category of data can also be displayed, as well as the "expand" button.
[0173] Correspondingly, after receiving a click event of the "expand" button of a type of data, on the display interface, such as Figure 4c or Figure 4d As shown, the relevant information of each sub-item under the data of the category is displayed; among them, the relevant information of the sub-item includes: the name of the sub-item, the occupied size, and the check status.
[0174] In this embodiment, the cleaning data determined to be recommended for cleaning is usually set as checked by default under the data of the category. For example, considering that system disk junk data and advertisement data are usually cleaned data that is recommended to be cleaned up, therefore, in order to reduce user operations, the tick states of system disk junk data and advertisement data are all set to checked by default. selected.
[0175] In this way, by clicking the "Expand" button, you can understand the data cleaning strategy according to the check status of each sub-item under the displayed data of the category. The recommended cleaning data size for a category of data usually refers to the total size of the selected sub-items under the category of data; after receiving the click event of the "one-click cleaning" button, you can The data of the checked sub-items is cleared.
[0176] In fact, users may not want to clean up some cleaned data that is recommended to clean up; and for some cleaned data, users can be sure that they can be deleted. Therefore, in order to consider the autonomy of the user, the user can also adjust the check state of the sub-items to effectively release the memory and non-volatile storage space.
[0177] Furthermore, when cleaning the memory, record the list of programs cleaned up this time; 5 seconds after the cleaning action is completed, scan the memory again to obtain the program list and compare it with the program list cleaned up for the first time to find out the sum of the cleanup failed Programs that are successfully cleaned up but restarted soon; re-clean this part of the program, scan again and re-compared after 5 seconds; for programs that cannot be cleaned up all the time, they are marked as stubborn programs; for stubborn programs that are not commonly used by users The installer can guide users to uninstall or disable.
[0178] In fact, the method of the present invention also provides several file cleaning methods based on floating windows, one of which is a schematic flow chart of a file cleaning method based on floating windows, such as Figure 5 As shown, including the following steps:
[0179] S501: Call the second floating window according to the calling instruction generated by operating the first floating window.
[0180] During the file cleaning process, the first floating window is always displayed, mainly showing the user the current memory occupancy rate of the mobile terminal. When it is detected that the mobile terminal has files to be cleaned, a cleaning prompt is also displayed.
[0181] In this method, the first floating window is relatively small, including a ball that characterizes the memory occupancy rate and a balloon dialog box that characterizes the cleanup prompt; for the memory occupancy rate, it is refreshed every 10s; when the memory occupancy rate is below 85%, it displays blue Color; when the memory occupancy rate is 85% or above, it displays red; when the balloon dialog box is triggered, the balloon dialog box can be expanded to display the corresponding prompt text.
[0182] In this method, the second floating window is larger and includes a memory acceleration interface, a cleaning interface, and a common interface. The functions of each interface are as follows:
[0183] A. The memory acceleration interface includes an initial sub-interface and a completion sub-interface. The initial sub-interface is used to display the current memory occupancy rate. There is a click acceleration function control on it, which is used to call the completion sub-interface.
[0184] The specific process of memory acceleration is: before acceleration, the initial sub-interface displays the current memory occupancy rate, when the memory occupancy rate is less than 85%, the initial sub-interface displays blue, and when the memory occupancy rate is 85% or above, the initial sub-interface displays Red: After clicking the acceleration function control, the memory usage rate drops from the initial value to 0% and then rises to the memory usage rate after acceleration. The color of the interface changes accordingly, and the sub-interface is finally generated.
[0185] Among them, the completion sub-interface also displays how much speed has been increased, and the calculation method of how much has been increased is: the current memory usage before acceleration minus the current memory usage after acceleration, if the difference between the two is less than 1%, the completion sub-interface will display "It has reached the best."
[0186] Among them, the current memory occupancy rate displayed in the initial sub-interface is read from the first floating window, and is the same as the memory occupancy rate displayed in the first floating window.
[0187] B. The cleanup interface includes scan subinterface, stop scan subinterface, cleanup subinterface and cleaned up subinterface. Scanning sub-interface, stop scanning sub-interface, and cleaning sub-interface are respectively equipped with scanning function control, stop scanning function control, one-key cleaning function control, scanning function control is used to call stop scanning sub-interface, and stop scanning function control is used to call cleaning In the sub-interface, the one-click cleaning function control is used to call the cleaned sub-interface.
[0188] The specific cleaning process is: before cleaning, the scanning sub-interface displays the current stored value; after clicking the scan function control, the scanning sub-interface displays the scanned garbage value; after clicking the stop scanning function control, if the garbage has been scanned, go to cleaning In the sub-interface, if the garbage is not scanned, go to the scanning sub-interface; the clean-up sub-interface displays the scanned garbage, and there is also a detail control on this interface to query the details of the garbage; after clicking the one-click cleaning function control, the The cleanup sub-interface displays the garbage that has been cleaned up.
[0189] Among them, if the scanned garbage is less than or equal to 50M, the scanning sub-interface is stopped and the cleaning sub-interface is blue; if the scanned garbage is greater than 50M, the scanning sub-interface is stopped and the cleaning sub-interface is red.
[0190] C. Common interfaces include self-start management function controls, uninstall pre-installed function controls, privacy cleanup function controls, game/video acceleration function controls, software uninstallation function controls, and timed cleanup function controls. The above-mentioned function controls are the entrances of corresponding functions.
[0191] Each of the above interfaces is provided with a setting control and a control for entering the system interface, wherein the setting control is used to set the second floating window.
[0192] According to the content displayed in the first floating window, the display state of the called second floating window includes the following two situations:
[0193] A. When the first floating window shows the memory occupancy rate, the second floating window displays a conventional interface, which is specifically a memory acceleration interface.
[0194] B. When the first floating window shows memory usage and cleaning prompts, the second floating window displays a conventional interface, and a cleaning prompt area is added to the conventional interface. Among them, the cleaning prompt area is the control area.
[0195] Wherein, the cleaning prompt area is provided with a prompt copy corresponding to the cleaning prompt of the first floating window.
[0196] In other methods, when the cleaning prompt corresponds to the function of the second floating window interface, the second floating window directly displays the interface required for the cleaning prompt.
[0197] S502: Receive a cleaning instruction generated by operating the second floating window.
[0198] Since this method is based on the second floating window for cleaning, it is necessary to operate the second floating window, specifically operating on the functional controls or cleaning the prompt area of the second floating window.
[0199] S503: Clean up the file according to the cleaning instruction.
[0200] A. Clean up the files according to the cleaning instructions generated by the operation of the functional controls.
[0201] When there is no cleaning prompt for the first floating window, the user can select the function control to clean it up.
[0202] It should be pointed out that when there is a cleaning prompt for the first floating window, the user can also select the functional controls of the second floating window to clean up.
[0203] B. According to the cleaning instruction generated by the operation of the cleaning prompt area, call the interface of the second floating window or the system interface to clean the file.
[0204] The following is a detailed description of B cleaning methods through specific methods.
[0205] a. After the user's mobile phone newly installs the software, check whether the newly installed software has boot/background auto-start permission, if it has and has obtained the Root permission, the first floating window will prompt.
[0206] Click the first floating window to call the second floating window. The cleaning prompt area of the second floating window displays the text "Add self-starting software, click here to process.", after clicking the cleaning prompt area, it will jump to the common interface of the second floating window , Enter the self-start management system interface from the self-start management function control of the common interface to perform self-start management.
[0207] b. After unlocking the screen of the mobile phone, check the memory space. If the memory space is less than 20%, the first floating window will prompt. This check can be performed at predetermined intervals.
[0208] Click the first floating window to call the second floating window. The cleaning prompt area of the second floating window displays the copy "Memory space is less than 20%, click here to release space". After clicking the cleaning prompt area, enter the system drive letter analysis interface, and proceed further Cleanup.
[0209] c. After unlocking the screen of the mobile phone, check the storage space. If the storage space is less than 20%, the first floating window will prompt. This check can be performed at predetermined intervals.
[0210] Click the first floating window to call the second floating window. The cleaning prompt area of the second floating window displays the copy "Storage space is less than 20%, click here to release space". After clicking the cleaning prompt area, enter the system drive letter analysis interface and proceed further Cleanup.
[0211] d. After unlocking the screen of the phone, check whether more than 5 pre-installed software can be uninstalled normally. If the number of pre-installed software is exceeded and Root permission is obtained, the first floating window will prompt. This detection can be performed at a predetermined time interval. The number of prompts within a predetermined time It can also be limited as needed.
[0212] Click the first floating window to call the second floating window. The cleaning prompt area of the second floating window displays the text "5 pre-installed software can be uninstalled, click here to release space", after clicking the cleaning prompt area, jump to the second floating window For the common interface, the uninstall preinstalled function control of the common interface enters the uninstall preinstalled system interface to uninstall.
[0213] After unlocking the screen of the phone, check whether there are more than 5 pre-installed software that can be uninstalled normally. If the number of pre-installed software is exceeded but not obtained, the first floating window will also prompt.
[0214] The text displayed in the cleaning prompt area of the second floating window is "5 pre-installed software can be disabled, click here to release space", click the cleaning prompt area to enter the corresponding system interface.
[0215] e. After unlocking the screen of the mobile phone, check whether there are more than 5 types of infrequently used software. If it exceeds, the first floating window will prompt. This detection can be performed at a predetermined interval. Among them, when the number of infrequently used software tested this time is the same as the number of infrequently used software tested last time, no prompt will be given this time.
[0216] Click the first floating window to call the second floating window. The cleaning prompt area of the second floating window displays the text "5 uncommon softwares can be uninstalled, click here to release space", after clicking the cleaning prompt area, jump to the second floating window Common interface, enter the software uninstall system interface from the software uninstall function control of the common interface to uninstall.
[0217] f. After unlocking the screen of the mobile phone, check whether there are more than 3 types of similar software. If it exceeds, the first floating window will prompt. This detection can be performed at a predetermined interval.
[0218] Click the first floating window to call the second floating window. The cleaning prompt area of the second floating window displays the copy "Too many similar software, click to release space", click the cleaning prompt area to jump to the corresponding system interface or pop-up box to uninstall .
[0219] Among them, the first floating window can also remind users of new functions that are not used by the user in the system.
[0220] In other methods, when the phone is locked and connected to the computer via a USB cable, between 501-5 o'clock in the evening, detect whether there is more than 100M of cleanable storage garbage. If there is, the first floating window prompts, this detection Tests can be performed at predetermined intervals.
[0221] Click on the first floating window to call the second floating window. The second floating window directly displays its cleaning interface for garbage cleaning.
[0222] In the above methods, no new prompts will be generated within a predetermined time (such as 2 hours) of the first floating window.
[0223] In this method, cloud control can be performed on whether the cleaning prompt is effective, the copy of the cleaning prompt area, the detection timing, and the prompt interval.
[0224] As described above, the method uses the first floating window to promptly prompt the files to be cleaned in the mobile terminal, and performs cleaning based on the second floating window, which facilitates user operations and improves user experience.
[0225] See Image 6 , Image 6 It is a schematic flow diagram of another file cleaning method based on floating window of the present invention, such as Image 6 As shown, including the following steps:
[0226] S601: Call the second floating window according to the calling instruction generated by operating the first floating window.
[0227] S602: Receive a cleaning instruction generated by operating the second floating window.
[0228] S603: Clean the file according to the cleaning instruction.
[0229] In this method, steps S601, S602, S603 and Figure 5 The steps in the method shown are the same and will not be repeated here.
[0230] S604: After file cleaning is completed, close the second floating window within a predetermined time.
[0231] The second floating window can be closed automatically within a predetermined time or closed by the user.
[0232] S605: After the second floating window is closed, call a corresponding pop-up window for guiding file cleaning.
[0233] The following is a detailed description through specific methods.
[0234] a. After the second floating window is closed, call the pop-up window for setting the list of ignored applications, and add frequently used software to the list of ignored applications through the pop-up window to avoid being cleared. Specifically, the user clicks the set ignore application list button on the pop-up window to enter the ignored application list interface; the user can also click the cancel button on the pop-up window to close the pop-up window.
[0235] b. After the second floating window is closed, if the system has obtained Root permission, check whether there is any software in the mobile terminal that is recommended to prohibit self-starting, and if so, call the pop-up window for self-starting management. Specifically, the pop-up window displays the software that is recommended to prohibit self-starting in the form of a checkbox, and the user can check it; the user can also click the cancel button on the pop-up window to close the pop-up window.
[0236] c. After the second floating window is closed, if the system does not obtain Root permission, check whether there is pre-installed software recommended to be deactivated in the mobile terminal. If so, call the pop-up window for deactivating the pre-installed software. Specifically, click the disable button on the pop-up window to jump to the uninstall pre-installation interface; click the cancel button on the pop-up window to close the pop-up window. Use this pop-up window to disable certain pre-installed software that is resident in the background, which can effectively reduce the memory usage.
[0237] d. After the second floating window is closed, when no software that is recommended to prohibit self-starting or pre-installed software that is recommended to be disabled is not detected, detect whether there is uncommon software in the mobile terminal, and if it exists, call the pop-up window for uninstalling the software . Specifically, click the uninstall button to jump to the uninstall software interface; click the cancel button to close the pop-up window.
[0238] e. After the second floating window is closed, when no software that is recommended to prohibit self-starting, pre-installed software that is recommended to be disabled or infrequently used software is not detected, check whether automatic cleaning is enabled, if not, call to enable automatic cleaning The pop-up window of memory.
[0239] As mentioned above, this method can further improve the file cleaning method by using the pop-up window, improve user experience, and enable the user to clean up files to be cleaned in time.
[0240] More preferably, the embodiment of the present invention also provides two methods for cleaning cache files, and a schematic flow diagram of the method for cleaning cache files is as follows: Figure 7 It includes the following steps:
[0241] S701: Obtain cache information and original file information corresponding to the cache information.
[0242] The method of this method is suitable for the cleaning of cache files in smart terminals, especially the cleaning of cache files in mobile terminals. The smart terminal first obtains the cache information and the original file information. The following takes a specific type of file as an example to describe the cache file information and the original file information.
[0243] A. Application
[0244] During the running or installation of the application, a corresponding cache file will be generated, so that the application does not need to be parsed during subsequent runs, thereby improving the running speed of the application.
[0245] The application scenario of this method is that when the application program is uninstalled abnormally, some of its corresponding cache files still exist. Due to the inability to identify and clean up, these cache files always occupy the cache space. If there are too many such cache files, it will affect The performance of smart terminals reduces user experience.
[0246] Therefore, for the identification and cleaning of invalid cache files of the application, the cache information is the virtual machine cache package name, that is, the package name of the virtual machine cache file, and the original file information is the installed file package name, usually the name of each file in the installed file list. Package names.
[0247] B. Picture
[0248] The pictures are cached as thumbnails, and the pictures can be browsed quickly through thumbnails.
[0249] The application scenario of this method is that when the original picture does not exist, if the corresponding thumbnail is not cleared in time, it will occupy the cache space and affect the performance of the smart terminal.
[0250] Therefore, for the identification and cleaning of invalid image cache files, the cache information is thumbnail information, specifically the information in the thumbnails table in the database, and the original file information is the original image information that has a mapping relationship with the thumbnail information, that is, the image table in the database ( image table).
[0251] S702: Match the cache information with the original file information.
[0252] Combining the analysis of the two scenarios above A and B, the cached information and the original file information can be understood as two objects that have a corresponding relationship. In theory, the cached information and the original file information should maintain a corresponding relationship with each other. If a piece of cached information It cannot correspond to all the original file information. In this case, the cached information can be regarded as the object to be cleaned up.
[0253] For the identification and cleaning of invalid cache files of the application, the virtual machine cache package name is matched with the installed file package name. When the file package name in the virtual machine cache package name does not match the corresponding one in the installed file package name When the file package name is used, the cache file corresponding to the file package name is an invalid cache file.
[0254] Specifically, the package name in the .dex file is matched with the package name in the installed file list. When the file package name in the .dex file cannot find its corresponding file package name in the installed file list, It means that the file corresponding to this file package name is not in the installation state, therefore, the cache file corresponding to this file package name is an invalid cache file.
[0255] For the identification and cleaning of invalid image cache files, the thumbnail information is matched with the original image information. When the file information in the thumbnail information does not match the corresponding file information in the original image information, the cache file corresponding to the file information It is an invalid cache file.
[0256] Specifically, match the information in the thumbnails table with the information in the image table. When the ID in the thumbnails table cannot find the ID corresponding to it in the image table, it means that the image file corresponding to this ID has been deleted, so , The thumbnail corresponding to this ID is an invalid thumbnail.
[0257] S703: When the file information in the cache information does not match the file information corresponding to the original file information, the cache file corresponding to the file information is cleaned up.
[0258] After the invalid cache file is identified, the invalid cache file is cleaned up.
[0259] As described above, the method for cleaning cache files in this method can identify and clean invalid cache files in the cache, avoiding the need for one-click cleaning or selecting cleaning when the user cleans the invalid cache, and improving the user experience effect.
[0260] See Figure 8 , Figure 8 It is a schematic flowchart of another method for cleaning cache files of the present invention, such as Figure 8 As shown, including the following steps:
[0261] S801: Obtain cache information and original file information corresponding to the cache information.
[0262] S802: Match the cache information with the original file information.
[0263] S803: When the file information in the cache information does not match the file information corresponding to the original file information, mark the cache file corresponding to the file information as invalid.
[0264] S804: After the matching of the cache information and the original file information is completed, the cache file identified as invalid is cleaned up.
[0265] Among them, steps S801, S802 and Figure 7 Steps S701 and S702 in the method shown are the same, and will not be repeated here.
[0266] In this method, the identified invalid cache files are identified, and after the matching is completed, all cache files identified as invalid are cleaned up.
[0267] It should be pointed out that the smart terminal can trigger step S801 according to a user instruction or timing. When the matching is completed, the smart terminal can automatically clean up the cached files identified as invalid according to the user instruction or automatically.
[0268] More preferably, the present invention also provides a method for cleaning the installation package stored in the mobile terminal. The schematic flow chart of the method is as follows: Picture 9 As shown, including the following steps:
[0269] Step 901: When the installation package stored in the mobile terminal is scanned, the directory information of the installation package is parsed.
[0270] In this method, when the user needs to clean up the installation package stored in the mobile terminal, the cleaning software is first started to scan the installation package. When the installation package stored in the mobile terminal is scanned, the directory information of the installation package is parsed. The directory information includes the installation package Name, file format, size, etc. According to the directory information of the installation package, a matching installation package directory is found in the database, and then the directory category corresponding to the directory information of the found installation package is parsed out, where the database is pre-downloaded from the server side by the mobile terminal. After the directory information of the installation package is parsed, step 902 is entered.
[0271] Step 902: Determine the directory category of the installation package according to the directory information of the installation package.
[0272] In this step, according to the directory information of the installation package, determine the directory category of the installation package. In this embodiment, the directory categories of the installation package include: backup directory, cache directory, non-cache directory, and whitelist directory. The backup directory may be a local backup directory where the installation package is stored locally, or it may be a cloud backup directory where the installation package is stored in the cloud. The cache directory refers to the cache directory where the installation package is stored in the cache; the non-cache directory refers to the directory where the installation package is stored in the non-cache such as the SD card; the whitelist directory refers to the file set by the user to store the installation package. Directory, the installation package corresponding to the whitelist directory is the installation package that the user needs to keep, but it can also be manually deleted by the user. After determining the directory category of the installation package, proceed to step 903.
[0273] Step 903: Determine whether to select the installation package as the installation package to be cleaned according to the check rule corresponding to the determined directory category.
[0274] In this method, the directory categories of the installation package include: the directory categories of the installation package include: a backup directory, a cache directory, a non-cache directory, and a whitelist directory. When the directory category is specifically a backup directory, the check rules corresponding to the backup directory specifically include: if the installation package is further determined to be a local backup directory based on the directory information of the installation package, then the installation package is not checked; if it is based on the installation package directory If it is further determined that the installation package is a cloud backup directory, check the installation package that has been installed on the mobile terminal, and uncheck the installation package that is not installed on the mobile terminal.
[0275] In the case where the directory information of the installation package is the cache directory, the installation package with the highest version downloaded within the preset time and not installed on the mobile terminal is not checked, and the remaining installation packages are checked.
[0276] When the directory information of the installation package is a non-cached directory, uncheck the installation package of the highest version that is not installed, and check the damaged installation package, duplicate installation package, and installed installation package.
[0277] When the directory information of the installation package is a whitelist directory made by the user, do not check the installation package.
[0278] In this step, according to the check rule corresponding to the determined directory category, decide whether to check the installation package as the installation package to be cleaned, uncheck the installation package that does not need to be cleaned, and then go to step 904.
[0279] Step 904: Clean up the selected installation package.
[0280] In this step, the installation package that has been checked is cleaned up by the cleaning software installed in the mobile terminal to avoid the problem of too much space occupied by the stored installation package, increase the operating speed of the mobile terminal and improve the user experience At the same time, the unchecked installation package can also be kept, and the unchecked installation includes the installation package of the highest version or the installation package that has not been installed. Cleaning up the selected installation package specifically includes: deleting the selected installation package, or reminding the user to uninstall the running program of the low version installation package that has been checked.
[0281] Furthermore, the embodiment of the present invention also provides several cleaning methods.
[0282] For example, during the scanning process, the usage time of the program that appears in the foreground is recorded, and the input method, desktop, and desktop-related programs and system programs are also excluded. Software that is not used for a long time can be judged as infrequently used software. During the scanning process, it is first recommended to clean up uncommon software.
[0283] Or, for some programs that are related to time, such as news readers and chat programs, the image cache and chat history also have time characteristics, and the cache over a certain period of time will seldom be used by users. Scan the cached files matched by the scanning program, compare the attributes of the cache, and determine the timestamp of the file when it finds the image cache or chat history. If it exceeds a certain threshold, it will be marked as cleanable.
[0284] Alternatively, the information of the installed program can be sent to the server, so that the server generates directory identification information and cleaning commands based on the program information and the pre-stored cache cleaning database; receives the directory identification information and cleaning commands fed back by the server, and scans the local directory structure in turn, And by matching the directory information to obtain the cleaning command of the corresponding directory, and finally execute the corresponding command to clean up.
[0285] Alternatively, the information of the installed system program can be sent to the server, so that the server generates identification information and uninstallation commands based on the program information and the pre-stored pre-installed program database; receives the program identification information and uninstallation commands fed back by the server, and follows the corresponding commands Uninstall the program.
[0286] Furthermore, when the program is running on the user's mobile phone, the user's behavior will trigger different functions of the software, and different directories or files may be generated. Some have been identified, some have not been identified; the unidentified parts will be uploaded to the server side Record it; the server will further identify and verify this part of the directory and add it to the identification database; this part of the content will take effect the next time the directory or file is identified. This method can continuously complete the identification data of the directory or file through the user's behavior, avoiding accidental deletion or omission.
[0287] In addition, scan the software list and parse its configuration files to find out the software that subscribes to key events, and prohibit its subscription to events through the API provided by the system, thereby achieving the purpose of preventing self-starting.
[0288] In the technical solution of the embodiment of the present invention, the scanning device in the mobile terminal can skip the scanning of the underlying directory whose time stamp remains unchanged during the scanning of the storage space, thereby saving scanning time and improving scanning efficiency and response time To improve the user experience.
[0289] Moreover, in the technical solution of the embodiment of the present invention, it is also possible to skip scanning the directories in which each subdirectory is the bottom directory and the timestamp of each subdirectory remains unchanged, which further saves scanning time and improves scanning efficiency and response. time.
[0290] Further, in the technical solution of the embodiment of the present invention, it is also possible to directly obtain the scanning result of the directory according to the number and size of the files in the directory without scanning the directory; or to skip scanning the directory according to the scanning strategy; thereby further saving scanning time , Improve scanning efficiency and response time.
[0291] Those skilled in the art can understand that the present invention includes devices related to performing one or more of the operations described in this application. These devices may be specially designed and manufactured for the required purpose, or may also include known devices in general-purpose computers. These devices have computer programs stored in them that are selectively activated or reconfigured. Such a computer program may be stored in a device (for example, computer) readable medium or in any type of medium suitable for storing electronic instructions and respectively coupled to a bus. The computer readable medium includes but is not limited to any Types of disks (including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks), ROM (Read-Only Memory), RAM (Random Access Memory), EPROM (Erasable Programmable Read-Only Memory) , Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or optical card. That is, the readable medium includes any medium that stores or transmits information in a readable form by a device (for example, a computer).
[0292] Those skilled in the art can understand that computer program instructions can be used to implement each block in these structure diagrams and/or block diagrams and/or flow diagrams and combinations of blocks in these structure diagrams and/or block diagrams and/or flow diagrams. . Those skilled in the art can understand that these computer program instructions can be provided to processors of general-purpose computers, professional computers, or other programmable data processing methods for implementation, so that the computer or other programmable data processing method processors can execute this The structure diagram and/or the block diagram and/or the flow diagram of the disclosure of the invention are a block or schemes specified in multiple blocks.
[0293] Those skilled in the art can understand that the various operations, methods, steps, measures, and solutions in the process that have been discussed in the present invention can be alternated, changed, combined, or deleted. Further, various operations, methods, and other steps, measures, and solutions in the process that have been discussed in the present invention can also be alternated, changed, rearranged, decomposed, combined or deleted. Further, the steps, measures, and solutions in the various operations, methods, and procedures disclosed in the present invention in the prior art can also be alternated, changed, rearranged, decomposed, combined or deleted.
[0294] The above are only part of the embodiments of the present invention. It should be pointed out that for those of ordinary skill in the art, without departing from the principle of the present invention, several improvements and modifications can be made, and these improvements and modifications are also It should be regarded as the protection scope of the present invention.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.