A method and terminal for finding backup data
A technology for backing up data and terminals, applied in the field of data processing, can solve problems such as inability to be reused and reduce user experience, and achieve the effects of saving user data traffic, improving user experience, and quick search process.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] The embodiment of the present invention provides a method for searching backup data; the method is applied to a terminal; specifically, figure 1 It is a schematic diagram of the implementation flow of the method for searching backup data according to the embodiment of the present invention; figure 2 It is a schematic diagram of the application framework of the embodiment of the present invention; in practical application, such as figure 2 As shown, the terminal can access the network through a signal tower, and then access the application server, for example, the terminal accesses the network through wireless fidelity (Wi-Fi, WIreless-Fidelity) and then accesses the application server; or, the terminal also The base station can access the network, and then access the application server to run the target application on the terminal; here, the application server stores the target application and various functional components corresponding to the target application, that...
Embodiment 2
[0044] Based on the method described in Embodiment 1, in order to ensure that the terminal can find the target feature in its own stored backup data corresponding to the target plug-in based on the target feature value of the target plug-in, such as the MD5 value value matching target backup data; in this embodiment, before step 104, the method for searching backup data also includes:
[0045] Step A: Obtain backup data of at least one plug-in corresponding to the target application;
[0046] Step B: Obtain plug-in identification information and compatible feature information of at least one plug-in corresponding to the target application program;
[0047] Step C: Generate a characteristic value of the at least one plug-in according to the plug-in identification information and compatible feature information of the at least one plug-in corresponding to the target application;
[0048] The characteristic value described in this embodiment is also specifically an MD5 value. For...
Embodiment 3
[0064] Based on the method described in Embodiment 1 or Embodiment 2, this embodiment provides a specific application scenario; specifically:
[0065] Application scenario one:
[0066] The terminal can also detect whether it can access the target communication network, for example, whether it can access Wi-Fi; when it fails to access the target communication network, the terminal will respond from the stored target plug-in Check whether there is target backup data that matches the target feature value in the backup data.
[0067] In this way, a foundation is laid for the terminal to quickly run the target plug-in, a foundation is also laid for multiplexing backup data, and a foundation is laid for improving user experience.
[0068] Further, when the terminal fails to access the target communication network, such as Wi-Fi, and when the search result indicates that there is no target backup data matching the target feature value, the terminal may generate a Figure 6 The dis...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


