File redundancy removal method for terminal equipment, terminal equipment and storage medium

A terminal device and file technology, applied in the file system, file metadata retrieval, file/folder operation, etc., can solve the problems of large time and system resource overhead, and achieve the effect of reducing time and eliminating redundant files

Pending Publication Date: 2022-08-05
GUANGDONG OPPO MOBILE TELECOMM CORP LTD +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If you use the full-disk scan method to deduplicate the same file, you need to scan each file in the smartphone, and y

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File redundancy removal method for terminal equipment, terminal equipment and storage medium
  • File redundancy removal method for terminal equipment, terminal equipment and storage medium
  • File redundancy removal method for terminal equipment, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Embodiments of the present application provide a method, terminal device, and storage medium for de-duplicating files on a terminal device, which are used to eliminate redundant files generated by a user when using the terminal device, and also reduce the time required for the de-duplication process.

[0034] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the present application. examples, but not all examples. Based on the embodiments in this application, all should belong to the scope of protection of this application.

[0035] Since the redundant program involves the reading and writing process of files, this scenario involves each application (Application, App) application in the backgrou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a file redundancy removal method for terminal equipment, the terminal equipment and a storage medium, which are used for eliminating redundant files generated when a user uses the terminal equipment and shortening the time required by a redundancy removal process. The method comprises the steps of obtaining a write request; according to the write request, calculating a foreground hash value and metadata of a write page through a foreground; acquiring idle information of the terminal equipment, and determining a triggering opportunity; under the condition that the triggering opportunity is met, calculating a file with the same foreground hash value, and outputting index node information of the file with the same foreground hash value; calculating a background hash value according to the foreground hash value, the metadata and the index node information; and performing redundancy removal on the same files in the background hash value by using a hard link method.

Description

technical field [0001] The present application relates to the field of terminal equipment, and in particular, to a file de-redundancy method, terminal equipment and storage medium related to terminal equipment. Background technique [0002] According to the survey, an in-depth user of a smartphone will generate redundant files of a considerable size. At present, most of the smartphone de-duplication methods are carried out in the background. These de-duplication programs will detect the existing redundant files through a full scan of the smartphone, and then provide them to the user for elimination. [0003] Today, smartphones encrypt files for security reasons. Since Android (Android) 7.0, most smartphones support the FBE (File-based Encryption, file-level encryption) method. The advantage of this encryption method is that one file has one key. If the full-disk scanning method is used to de-duplicate the same files, each file in the smartphone needs to be scanned, and a d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/174G06F16/16G06F16/14
CPCG06F16/1748G06F16/162G06F16/152Y02D30/70
Inventor 郭维超朱宗卫
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products