System and method for maintaining a file system at a computing device

ABSTRACT

A computing device including a file system in memory is provided. The file system has a plurality of items. Where an item is a file, it has a unique content. Where an item is a folder, it is represented by a plurality of container structures. Each container structure references items in the file system through the use of references such as pointers. Each item can be contained by more than one folder by being referenced by more than one folder. Each item can also include a contained-by structure including references to folders containing that item. Moreover, each item can include relationship structures allowing the items to be organized in accordance with relationships other than contained-by relationships, such as content derivation relationships. The file system can be manipulated through the use of various operations such as “Archive” and “Restore” operations.

RELATED APPLICATIONS

This application claims priority from U.S. patent application61/853,486, filed Apr. 8, 2013. Priority is claimed to this earlierfiled application and the contents of this earlier-filed application areincorporated herein, in their entirety, by reference.

FIELD OF THE INVENTION

The present invention relates generally to maintaining a file system ata computing device. More specifically, the present invention relates toorganizing files and other data at a computing device.

BACKGROUND OF THE INVENTION

Computer operating systems use a hierarchical system of folders forstoring data items in the form of files, called a file system.Additionally, computer operating systems employ one or more file managerapplications for browsing and manipulating a graphical representation ofthis hierarchical file system.

Existing file systems encourage the duplication of files in multiplefolders, to allow users to store and find data in more than one folder.Such file systems, which require a full copy of a file in each folderlocation, trace their design to the physical filing systems familiarwhen the first computer file systems were created. While the file andfolder metaphor has proven functional, the requirement to createmultiple file copies makes the existing computer file system model anexpensive, confusing, and impractical solution. Recognition of thesecosts has led to the implementation of a partial solution in the form ofsymbolic links (variously referred to as shortcuts, soft links, oraliases) which add to the problem due to their own inherent drawbacks.

SUMMARY OF THE INVENTION

It is an object to provide a novel system and method for maintaining afile system that obviates and mitigates at least one of theabove-identified disadvantages of the prior art.

According to an aspect a computing device is provided. The computingdevice can comprise a processor, and memory operably connected to theprocessor. The memory can include a file system. The file system canhave:

-   -   a plurality of items comprising:        -   a plurality of files, each file having unique content;        -   a plurality of container structures representing a plurality            of folders, at least two container structures including one            or more references referencing at least some of the            plurality of items other than the at least two container            data structures; and    -   a first item of the plurality of items being referenced by more        than one container structure whereby a single item of the file        system can be contained in multiple folders.

The one or more references can comprise at least one of: pointers tomemory location; pointers to location translators; and file systemdirectory paths. The plurality of items can include archived items andactive items. The archived item can be an item referenced only byreferences and folders designated for referencing archived items. Eachitem can include an associated metadata and an item can be classified asan archived item when indicated by an archive indicator contained by theassociated metadata. Each item can include a contained-by structureincluding references to one or more of the plurality of containerstructures each item is contained in.

The plurality of files can include relationship files, each relationshipfile including a content relationship structure having relationshipreferences to other relationship files based on a relationship. Therelationship can be a content derivation relationship and therelationship references can indicate one of a derived-by andderived-from relationship between relationship files. Each containerstructure can be maintained as a file in the file system.

According to another aspect, a method of maintaining a file system on acomputing device having a memory and a processor is provided. The methodcan comprise:

-   -   maintaining in the memory a plurality of items including a        plurality of files having unique content and a plurality of        folders, each folder represented by a container structure, each        container structure including references indicating items        contained by the referencing container structure, at least one        item being referenced by more than one container structure; and    -   performing an operation on the file system.

The operation can be “Refer” for referencing a selected item, selectedfrom one of the plurality of items, by a destination folder selectedfrom one of the plurality of folders and the performing can furthercomprise:

-   -   adding, to a destination container structure representing the        destination folder, a reference to the selected item.

Each item of the plurality of items can include a contained-by structureand the destination container structure can include references tocontained items other than the selected item. The method can furthercomprise:

-   -   identifying additional folders, other than the destination        folder, referencing the contained items; and    -   providing the additional folders as further folders to add the        selected item by applying the “Refer” operation.

The operation can be “Delete” for deleting a selected item selected fromone of the plurality of items and the performing can further compriseone of:

-   -   deleting the selected item by:        -   removing, from the plurality of container structures, any            references to the selected item; and        -   removing the selected item from the file system; and    -   when the selected item is a folder optionally applying one of:        -   when items are left unreferenced by any container structure            in the file system as a result of deleting the selected            folder, removing the unreferenced items from the file            system; and        -   performing, on all items referenced by the container            structure corresponding to the selected folder, the “Delete”            operation.

The method can further comprise:

-   -   when the selected item is a folder, applying the “Delete”        operation to items indirectly contained by the selected item.

The plurality of items can include archived items and active items, theoperation can be “Archive” for archiving a selected one of the pluralityof active items and the performing can further comprise:

-   -   classifying the selected active item as an archived item; and    -   when the selected active item is a folder optionally applying        one of: classifying as archived, all items becoming unreferenced        by an active folder as a result of archiving the selected active        item; and classifying as archived, all items directly referenced        by the selected folder.

The method can further comprise:

-   -   when the selected item is a folder, applying the “Archive”        operation to items indirectly contained by the selected active        item.

The classifying as archived can comprise at least one of:

-   -   indicating the selected active item as archived in metadata        associated with the item; and    -   removing all references to the selected active item.

The plurality of items can include archived items and active items, theoperation can be “Restore” for restoring a selected one of the pluralityof archived items and the performing can further comprise:

-   -   indicating the selected archived item as active in metadata        associated with the item.

The plurality of items can include archived items and active items, theoperation can be “Restore” for restoring a selected one of the pluralityof archived items, the selected archived item can include a contained-bystructure and the performing can further comprise:

-   -   restoring the selected archived item as an active item by adding        references to the selected archived item based on the        contained-by structure of the selected archived item.

The operation can be provision of a context based view of the filesystem and the performing can further comprise:

-   -   receiving an indication of a selected item from the plurality of        items; and    -   selectively presenting a portion of the file system in        accordance with a context of the selected item wherein the        context comprises at least one of:        -   each of the plurality of folders directly containing the            selected item, as identified on the basis of the selected            item's contained-by array; and        -   each of the plurality of folders indirectly containing the            selected item, as identified on the basis of the selected            item's contained-by array.

Each of the plurality of files can include derivation files, eachderivation file can have a content derivation structure havingderivation relationship references to other derivation files based on aderived-by and derived-from relationship and the operation can be“Delete” for deleting a selected derivation file selected from one ofthe plurality of derivation files and the performing can furthercomprise:

-   -   deleting the selected derivation file from the file system; and    -   when the selected derivation file is both referenced-by        derivation files and references referenced derivation files,        linking the references to form derived-by and derived-from        relationships with the referenced-by and referenced derivation        files.

The operation can be “Populate” for determining the contents of aselected folder selected from one of the plurality of folders andperforming can further comprise:

-   -   determining the content of the selected folder based on a        formula combining one or more of the plurality of items.

The performing can be carried out in response to content changes in theone or more of the plurality of items.

These, together with other aspects and advantages which will besubsequently apparent, reside in the details of construction andoperation as more fully hereinafter described and claimed, referencebeing had to the accompanying drawings forming a part hereof, whereinlike numerals refer to like parts throughout.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a block diagram of functional subsystems of an examplecomputing device in accordance with an implementation;

FIG. 2 shows a block diagram of an example file system organization inaccordance with an implementation;

FIG. 3 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 4 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 5 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 6 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 7 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 8 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 9 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 10 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 11 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 12 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 13 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 14 shows a block diagram of an example file system organizationincluding structures representing folders in accordance with animplementation;

FIG. 15 shows a block diagram of an example file system organizationbased on file relationships in accordance with an implementation;

FIG. 16 shows a block diagram of an example file system organizationbased on file relationships in accordance with an implementation;

FIG. 17 shows a block diagram of functional subsystems of an examplecomputing device in accordance with an implementation; and

FIG. 18 shows an example method of performing operations on a filesystem.

DETAILED DESCRIPTION

Before the present invention is disclosed and described, it is to beunderstood that this invention is not limited to the particularstructures, process steps, or materials disclosed herein, but isextended to equivalents thereof as would be recognized by thoseordinarily skilled in the relevant arts. It should also be understoodthat terminology employed herein is used for the purpose of describingparticular embodiments only and is not intended to be limiting.

Devices or systems may be described herein in terms of block components.It should be appreciated that such block components may be realized byany number of hardware, software, and/or firmware components configuredto perform the specified functions. For example, an embodiment of asystem or a device may employ various integrated circuit elements, e.g.,memory elements, digital signal processing elements, logic elements orthe like, which may carry out a variety of functions under the controlof one or more microprocessors or other control devices.

FIG. 1 depicts a computing device 104. Computing device 104, in thepresent example, is based on the computing environment and functionalityof a laptop computer. Computing device 104 is not limited to a laptopcomputer, however. Other devices are also contemplated, such as cellulartelephones, smart telephones, Personal Digital Assistants (“PDAs”),media (e.g. MP3) players, tablet computers, digital cameras and thelike. In other examples, computing device 104 can be a computing devicesuch as a desktop computer, an embedded computer or other computingdevice.

Computing device 104 includes at least one main processor 108 thatcontrols the overall operation of the computing device 104. Thecomputing device 104 is interconnected with a non-transitory computerreadable storage medium such as a memory 112. Memory 112 can be anysuitable combination of volatile (e.g. Random Access Memory (“RAM”)) andnon-volatile (e.g. read only memory (“ROM”) including ElectricallyErasable Programmable Read Only Memory (“EEPROM”), flash memory,magnetic computer storage device, or optical disc memory. In the presentexample, memory 112 includes both a volatile memory and a non-volatilememory. Other types of non-transitory computer readable storage mediumare also contemplated, such as compact discs (CD-ROM, CD-RW), digitalvideo discs (DVD), secure digital (SD) cards and variants thereof.

Computing device 104 also includes one or more input devicesinterconnected with main processor 108. Such input devices areconfigured to receive input and provide data representative of suchinput to processor 108. Input devices can include, for example, a keypad116 and a pointing device 118. Thus, keypad 116 can receive input in theform of the depression of one or more keys, and can then provide datarepresentative of such input to processor 108. The data provided toprocessor 108 can be, for example, an American Standard Code forInformation Interchange (ASCII) value for each of the depressed keys.Keypad 116 can be a full QWERTY keypad, a reduced QWERTY keypad or anyother suitable arrangement of keys. In variations, a keyboard can beimplemented as a soft keyboard relying on a touch screen, for example. Apointing device can be implemented as a computer mouse, track ball,track wheel, touchscreen, an active digitizer and corresponding stylusor any suitable combination thereof. In some examples, a computingdevice can include additional input devices in the form of one or moreadditional buttons, light sensors, microphones and the like. Pointingdevice 118 can receive input in the form of movement, pressure or swipegestures, and can then provide data representative of such input toprocessor 108 in the form of, for example, coordinates representing thelocation of a virtual cursor, the direction and/or velocity of a swipegesture, and the like.

In some examples, computing device 104 can include additional inputdevices in the form of one or more microphones (144), buttons, lightsensors and the like. For example, the communications device 104 caninclude a camera (148), a fingerprint sensor (not shown), otherbiometric sensors (not shown), motion sensor (155) and others. In someimplementations, one or more of these input devices can provideinformation that can be used as, for example, passcode substitutes forunlocking the computing device 104. For example, gestures, either on atouchscreen or in the air detected via a camera or other sensors can beused to unlock a device. In other examples, faces or voice recognitioncan be used to unlock a device. Other sensors and mechanisms forunlocking a device or for providing passcode substitutes will now occurto a person of skill in the art. More generally, any suitablecombination of the above-mentioned input devices can be incorporatedinto computing device 104.

Computing device 104 further includes one or more output devices. Theoutput devices of computing device 104 include a display 120. Display120 includes display circuitry controllable by processor 108 forgenerating interfaces which include representations of data and/orapplications maintained in memory 112. Display 120 includes a flat paneldisplay comprising any one of, or any suitable combination of, a LiquidCrystal Display (LCD), a plasma display, an Organic Light Emitting Diode(OLED) display, and the like. The display circuitry can thus include anysuitable combination of display buffers, transistors, LCD cells, plasmacells, phosphors, LEDs and the like. When the input devices of computingdevice 104 include a touch screen input device, the touch screen (notshown) can be integrated with display 120.

The output devices of computing device 104 can also include a speaker128 interconnected with processor 108. Additional output devices arealso contemplated including, for example, a light-emitting indicator inthe form of a Light-Emitting Diode (LED) 130. In general, computingdevice 104 can include any suitable combination of the above-mentionedoutput devices, and may also include other suitable output devices.

Computing device 104 also includes a communications interface 132interconnected with processor 108. Communications interface 132 allowscomputing device 104 to perform voice and/or data communications via alink 136, which can be wired and/or wireless, and, where appropriate,with or via a network (not shown). The communication interface 132receives messages from and sends messages through link 136. Someexamples of wireless links 136 include Institute of Electrical andElectronic Engineers (IEEE) 802.11 (Wi-Fi) and Bluetooth™. In someimplementations, communications interface 132 can also be configured toallow communications through wired links 136 such as Ethernet anduniversal serial bus (USB).

Computing device 104 maintains, in memory 112, one or more filescontaining a plurality of computer readable instructions and/or data.Typically, files are organized in accordance with a structure and logicreferred to as a file system. In this illustrative example, file system180 maintained in memory 112 represents the structure and organizationof files accessible by computing device 104.

Files are typically stored in a non-volatile portion of memory 112 suchas a solid state disk or a hard drive. In variations, the files can bestored in other portions of memory 112 such as in volatile memory or ina combination of different portions. In yet other variations, some ofthe files may be stored in memory or storage locations that are externalto computing device 104, such as those maintained at network-based cloudstorage. The location of files can also vary based on the operationalstate of the computing device 104. For example, files may be maintainedin a non-volatile portion of memory 112 when the computing device isturned off. However, at least some of the files may be moved into avolatile portion of memory 112 as the computer device 104 is powered up,or otherwise rendered operational. In variations, files may be moved tovolatile memory as the files are accessed by processor 108. Othercombinations of memory 112 portions and operational states for storingfiles within memory 112 will now occur to a person of skill and arecontemplated.

Alone or in combination, one or more files can form an applicationsoftware or a module. For example, as illustrated in FIG. 1, computingdevice 104 stores a file manager application 150, a picture managementapplication 160 and an operating system 170. When processor 108 executesinstructions contained in the one or more files forming application 150,160 and/or 170, processor 108 is configured to perform various functionsprescribed by the computer readable instructions of the respectiveapplications. It is contemplated that memory 112 can store a variety ofadditional applications, such as database applications, web browsingapplications, and the like (not shown).

Memory 112 can also maintain various files representing information ordata that can be utilized by various applications. For example,operating system 170 can utilize a registry data file in carrying out atleast some of its functionality, the picture management application 160can utilize picture files, such as those based on the Joint PhotographicExperts Group (JPEG) standard, while performing its functionality.

An operating system such as operating system 170, is a collection ofsoftware and/or modules that manages the hardware resources of acomputing device. An operating system also provides common servicesallowing other applications to make use of the hardware resources asappropriate. For example, an operating system can include file systemservices through which an application such as file manager 150 canaccess and manipulate the file system supported by the operating system.File system services allow access to basic file management operations bythe operating system as well as by applications and modules operating atthe computing device 104.

Typically, file system services are provided to help implement a filesystem in accordance with a specific file system protocol such as theNew Technology File System (NTFS). The file system protocol determinesthe logic and structure according to which files can be organized, theformat for naming a file, the format for storing the data and metadataassociated with a file, as well as other file system policies that willnow occur to a person of skill. In this illustrative example, files arestored in accordance with the file system 180 protocol.

A file system can use folders or containers to organize files maintainedin memory 112 (or other storage systems located remotely from device104). Essentially, a folder or a container is a construct that is ableto contain files and other folders, and allows for the hierarchicalorganization of the file system in the form of graphs. Accordingly, oneor more specialized data structures, container data structures,representing folders or containers can be maintained in memory 112. Thefiles (or folders) contained by a container or a folder are not actuallyintegrated into the container data structure. Rather, the files aremaintained in memory 112, and the folder includes mechanisms foridentifying and accessing contained files in memory.

To illustrate the content of container data structures, they will bediscussed in the context of example file system 180. Each container datastructure of file system 180 can include an identifier of the folderthat the data structure corresponds to. Accordingly, in this example, acontainer data structure includes a folder name. Specifically, thefolder name refers to an identifying indicator for the folder that ismade available to applications executed on computing device 104, as wellas applications accessing file system 180 through a link 136.

The example container data structure of file system 180 can also storethe number of files and the number of folders contained by a particularfolder, for example as separate count indicators. The example containercan also include an indication of or a reference to the actual items(for example, files and folders) contained in or referenced by thefolder. For example, a list of pointers to file locations in memory 112for each contained item can be maintained in the example containerstructure. References to items are to be distinguished from symboliclinks or equivalents. A symbolic link may not remain valid when the fileor folder is moved or deleted, it is a static link to a file or afolder, unlike the references as described herein, which areautomatically updated. Additionally, a symbolic link may appeardifferently or exhibit different behavior from the file or folder itrepresents. Indeed, one of the advantages of the file system describedherein is that symbolic links and their equivalent are no longerrequired since, in the file system described herein, a file may beincluded in multiple folders using the system and methods describedherein.

Finally, the example container data structure can contain additionalmetadata which may include various types of data specific to thatfolder. For example, metadata may include information regardingcreating, editing, viewing and sorting and related options. Particularsof the metadata will be described in greater detail below. It should benoted that in some implementations, files other than folders may alsohave associated metadata. The file metadata may be part of the fileitself, or may be maintained in one or more separate locations in memory112.

The details of the example container data structure for file system 180,as described above, are merely illustrative. In other implementations,the structure and content of the data structure can be different. Forexample, instead of containing two separate indicators or values for thenumber of files and the number of folders contained, a single valuerepresenting all items contained by a folder can be maintained. In sucha variation, the type of the item contained, namely whether it is afolder or a regular file containing data or instructions can bedetermined on the basis of other data such as the list of itemscontained. For example, the list of items contained may indicate thetype of item being pointed to or the type may be determined on the basisof the item itself once the item is accessed. In other implementations,pointers may also include an item size to enable proper delineation ofthe file in memory 112. Alternatively, the item size may be part of thefile itself and may be determined upon accessing the item. In yetfurther variations, file and folder names associated with the files andfolders contained can also be stored in the container structure,although in other variations, the file and folder names can be obtainedfrom the files and folders themselves. Other variations for thecontainer data structure will now occur to a person of skill and arecontemplated.

In some variations, one or more specialized files, referred to herein asfolder files, can be used to store the container data structures. Forexample, each container data structure may be contained by one folderfile. In such variations, the folder name can be the same as the filename for the folder file storing the container structure. In othervariations, more than one container data structure may be included in afile folder. In yet other variations, each container structure may becontained in various groupings comprising one or more files. These andother variations which will now occur to a person of skill arecontemplated. In this illustrative example, it will be assumed that forfile system 180, each container data structure for a folder is stored ina folder file of its own, and hence container data structures will betreated as synonymous with folder files or folders for short. It shouldbe emphasized that this arrangement is chosen for illustrative purposesonly, and as-described above, other arrangements are possible and arecontemplated.

The folders can be maintained in a non-volatile portion of memory asfiles and loaded into a volatile portion such as random access memory(RAM) for convenience and execution speed. The transfer or loading to avolatile portion of memory 112 can occur, for example, while thecomputing device 104 is booting, powered up or otherwise renderedoperational. In variations, the transfer can occur during theoperational state of the computing device 104. For example, the transfermay occur when a file is accessed, providing a means of caching thefolder. The loading process could also involve translating the containerstructure from one storage format to another, the formats being chosenfor example on the basis of their suitability to the type of memoryportion currently maintaining the container structures or the type ofoperations contemplated at a given operational state of device 104. Inother variations, the structures can be maintained in and accessed fromnon-volatile memory only. Other combinations of memory 112 portions andoperational states for storing folders within memory 112 will now occurto a person of skill and are contemplated.

Files (including folders) stored within memory 112, in this example filesystem 180, can typically be maintained and organized by a user ofcomputing device 104 via the execution of the file manager application150 by processor 108. A file manager application is typically configuredto operate in conjunction with the operating system and the file systemservices. In this example, file manager application 150 works inconjunction with the operating system 170. In variations, a filemanagement application can be part of an operating system, such as oneof its provided modules.

File manager application 150 provides programmatic, command and/orgraphical based interface or interfaces for accessing file systemservices of operating system 180. Through these interfaces, users and/orother applications can manipulate the file system 180, performingmultiple operations such as creating or deleting files.

Continuing with the illustrative implementation and referring to FIG. 2,an example file organization for a portion of files and folderscontained in an illustrative file system maintained by operating system170 is shown at 180-1. File system 180-1 corresponds to file system 180of FIG. 1, except that the files forming the operating system 170 andapplications 150 and 160 have been omitted to simplify the illustrativeexample. In FIG. 2, folders are shown as ovals and files are shown asrectangles. The arrows indicate files and folders contained by a folder.For example, in this exemplary file organization, folder Folder1 isdesignated as the root folder and contains three files (File1.jpg,File2.jpg and File3.jpg) and two folders (Folder2 and Folder3).

Referring now to FIG. 3, the contents of the exemplary containerstructure for each folder included in the illustrative file system 180-1are indicated at 300. The files are shown as rectangles as with FIG. 2.It should be noted however that, although not shown, files may includesome additional metadata in addition to the actual file content relatedto the management of file system 180-1. Referring to 305, the contentsof the container data structure for the folder named Folder1 areindicated. Accordingly, based on rows 2 and 3 of the container datastructure 305, folder Folder1 contains three files and two folders, atotal of five items. Row 5 shows that the list of items contained can befound at memory 112 locations indicated by pointers P1, P2, P3, P4 andP5. Finally, row 4 contains metadata MetaData1 associated with Folder1.

Continuing with FIG. 3, the contents of the exemplary container for thefolder named Folder2 are indicated at 310. Accordingly, based on rows 2and 3 of the container data structure 310, folder Folder2 contains onefolder and one file. Row 5 of container structure 310 indicates that thelist of items contained can be found at file locations indicated bypointers P1 and P3. Finally, row 4 contains metadata MetaData2.

Continuing with FIG. 3, the contents of the exemplary container for thefolder named Folder3 are indicated at 315. Accordingly, based on rows 2and 3 of the container data structure 315, folder Folder3 contains onefile and one folder. Row 5 of container structure 315 indicates that thelist of items contained can be found at file locations indicated bypointers P6 and P7. Finally, row 5 contains metadata MetaData3.

Continuing with FIG. 3, the contents of the exemplary container for thefolder named Folder4 are indicated at 320. Accordingly, based on rows 2and 3 of the container data structure 320, folder Folder4 contains twofiles and no folders. Row 5 of container structure 320 indicates thatthe list of items contained can be found at file locations indicated bypointers P8 and P7. Finally, row 5 contains metadata MetaData4.

Although, in this example implementation, container data structures havebeen shown in a particular manner, they can be implemented using avariety of structures or constructs including linked lists, arrays,structures, object oriented containers or relational or flat databases,amongst others. Moreover, they may be stored in fewer or more structuresor files organized in a different manner. Additionally, it is assumedthat each container structure is contained in a single folder file, andthus pointers in the container structures point to memory 112 locationsfor those folder files. In variations, however, container structures canbe contained in different formats and combinations; the references suchas the pointers to contained folders can be adjusted to reflect thesevariations. For example, in variations, all of the container structurescan be maintained in a single data structure in memory 112, and thepointers to folders could be pointers to relevant portions of that datastructure.

Operating systems typically provide file system services for performingoperations on the file system. In this illustrative example, operatingsystem 170 provides file system services for performing operations formanaging and organizing files and folders of file system 180 inaccordance with file system 180 protocol. These operations include, forexample, “Create”, “Import”, “Refer”, “Unrefer”, “Delete”, “Purge”,“Archive” and “Restore” operations that can be applied to files and/orfolders. Each of these operations can cause creation and/or updating ofone or more container data structures to reflect the operation'seffects. Moreover, each of these functions is described in greaterdetail below. In some variations, combinations of these operations canbe used to form combined operations which are presented through a userinterface. For example, a “Move” operation may be formed from acombination of “Unrefer” and “Refer” operations.

The “Create” operation involves creating within the file system 180and/or importing to the file system 180 one or more files or folders. Ineffect, the “Create” operation causes one or more new files and/orfolders to be included in the file system 180. To create items, severalactions are performed. One or more files and/or folders are created inmemory 112 and the created file's content is appropriately populated,including associated container structures if the created item is afolder. The metadata for the created files or folders is alsoappropriately updated. To import items, one or more files or folders arebrought into the file system 180 from another file system. Theappropriate content structure and metadata are added to the importeditems. Creation or importing of an item allows the formation of aninstance of that item in memory 112 (or a remote location if the filesystem includes memory locations external to computing device 104).However, the created or imported items, in some variations, may not bereferenced by any folders in the file system 180. Thus, created orimported items can be unreferenced items and can be archived asappropriate as described below. In other variations, created or importeditems may also be included in one or more existing folders through the“Refer” operation. The “Refer” operation is described below in greaterdetail.

Referring now to FIG. 4, an illustrative example of creating a folder,Folder5 and a file, File6.jpg, in file system 180-1 of FIG. 2 is shownat 400. Container structure 405 for folder Folder5 has been created andpopulated in memory 112 as a folder file. Accordingly, folder Folder5contains no files and no folders, and thus includes a null pointer inrow 5 to indicate that there is nothing to point to. The metadataMetadata5 may also be updated accordingly, so as to indicate a creationtime and date for the folder. A file for file File6.jpg is also createdin memory 112 as indicated at 410. The metadata of file File6.jpg (notshown) may also be updated to reflect creation related information. Itshould be noted that, at this point there are no references or pointersto the created items since they have not yet been archived or referencedby any folders.

Typically, files are created by an application that can read and/orwrite that file type. For example, the picture manager application 160can be used to create a picture file such as File1.jpg. Applications canalso be used to create folders. On the other hand, typically folders arecreated or items are imported through the use of an application thatallows access to file system operations such as file manager 150.

In some implementations, prior to performing an operation, preliminaryvalidity checks may be performed to help ensure that the file systemprotocols are being adhered to. In variations, validity checks can beperformed as part of any or some of the file system operationsavailable. For example, in this example implementation, “Create” or“Import” operations can be accompanied with a validity check to ensurecreated or imported files are not duplicates of items already in thefile system. In some implementations, folders may be duplicated evenwhen file duplication is not allowed. In variations, where the item tobe created or imported is also added to an existing folder, and thatitem is a duplicate, the duplicate item already existing in the filesystem is added to the folder through the “ ” operation instead ofcreating a new instance of the item. Other validity checks will nowoccur to a person of skill and are contemplated.

It should be noted that in variations where the created or importedfolders and files involve a hierarchy (when being imported for example),content of the container structure or structures created can beappropriately varied to reflect the hierarchy. Moreover, in furthervariations, the created items may also be added to one or more folders.The “Refer” operation is described next.

Continuing with example operations that can be performed by theillustrative file system services, performing a “Refer” operationinvolves referencing an existing item by an existing folder so as toindicate that the item is contained by that folder. Referring now toFIG. 5, the result of referencing an item from a folder of file system180-1 of FIG. 2 is shown at 500 where file File4.jpg is now referencedby folder Folder3. Accordingly, container data structure 315 is updatedsuch that rows 2 and 3 now indicate that folder Folder3 contains twofiles and one folder respectively. Moreover, an additional pointer, P8has been added to Row 5 to point to the Memory 112 location of fileFile4.jpg. It should be noted that when a “Refer” operation isperformed, the item referenced by a folder is not actually modified inmemory 112, by for example duplication of the item in memory 112.Rather, a reference to that item's location in memory 112 is added tothe containing folder. Accordingly, only one instance of each item ismaintained in memory 112, even though that item may be referenced bymultiple folders. This has significant advantages, such as eliminatingduplication, and accordingly, avoiding pitfalls that arise where fileduplication is allowed. For example, where file duplication isdisallowed, the complexities necessary for tracking multiple copies of afile can be reduced or eliminated. This can provide significantadvantages such as reducing storage requirements, and reducing thechance of creating unreferenced files. Moreover, files are not deemed tobe ‘located’ in any one folder or a combination of folders. The instanceof a file is located independently of the folder hierarchy.Additionally, searching or traversing the file system maintained inaccordance with the description herein is rendered moreresource-efficient since multiple copies of files need not be traversedor searched. Backing up the file system is also rendered more efficientdue to above mentioned advantages.

In some variations, validity checks may be performed prior to performinga “Refer” operation to help ensure that the file system protocols arebeing adhered to. For example, checks may be performed to ensure thatreferring to a folder by another folder does not result in a circularreference. For example, trying to contain folder Folder1 by folderFolder4 would result in a circular reference where folder Folder1contains folder Folder3, folder Folder3 contains folder Folder4 andfolder Folder4 contains folder Folder1. Such an operation may thus beprevented in some implementations. Moreover, additional validity checksmay be performed to detect and prevent operations defined as invalid fora file system, such as trying to contain a folder by itself. Invariations, validity checks can be performed as part of any or some ofthe file system operations available. Other validity checks will nowoccur to a person of skill and are contemplated.

The “Unrefer” operation is a further file system 180 operation thatresults in dereferencing of an item from a folder directly containingthat item. Dereferenced items are not removed from memory 112. Insteadit is the pointers to the dereferenced item that are removed from theappropriate container data structures, thus ensuring that the item is nolonger contained in folders corresponding to those container structures.For example, referring to FIG. 6, the result of dereferencing fileFile5.jpg from folder Folder3 of file system 180-1 of FIG. 2 is shown at600. Container data structure 315 is updated to reflect the decrementedfile counter indicated at row 2 to zero—indicating that folder Folder3does not contain any files—and the file pointer P7 for file File5.jpg isremoved. It should be noted that where the result of the dereferencingis such that the item dereferenced is no longer contained in anyfolders, namely where the file or folder dereferenced becomesunreferenced, the dereferenced item could be archived as describedbelow.

Continuing with file system operations, performing a “Delete” operationon an item results in the item being permanently deleted from the filesystem 180. Referring to FIG. 7, the result of deleting a file, fileFile4.jpg from file system 180-1 of FIG. 2 is shown at 700. Based on the“Delete” operation, file File4.jpg is deleted from memory 112. Moreover,container structure 320 is updated by removing the pointer P8 anddecrementing the contained number of files, indicated at row 2, to 1. Invariations where the deleted item is contained by multiple folders, allof the container structures associated with the containing folders canbe updated in a similar manner.

Where the deleted item is a folder, additional complexities may need tobe addressed and thus several delete rules may be used. For example, inaccordance with a first delete rule, only the folder selected isdeleted. Accordingly, the container data structure for that folder isdeleted from memory 112. Moreover, container structures for folderscontaining the deleted folder are updated as with the dereferencing of afolder through the “Unrefer” operation. In cases where the deletedfolder contains items, these contained items can become unreferenced ifnot referenced by any other folders in the file system. The unreferenceditems can be archived as described below. In situations where thedeleted folder is the root folder, all other items may be dereferencedand archived in the manner described below.

Referring to FIG. 8, the result of completing a “Delete” operation fordeleting a folder, Folder4, from file system 180-1 of FIG. 2 is shown at800 in accordance with a second delete rule. According to the seconddelete rule, deleting a folder deletes the folder, and any itemsunreferenced as a result of deleting the folder. In this example,deleting folder Folder4 results in the dereferencing of file File4.jpg.File File4.jpg thus becomes unreferenced, and is also deleted inaccordance with the rule. However, items still contained by otherfolders, such as file File5.jpg which is contained by folder Folder3,remain in the file system 180-1. In variations, the unreferenced items,such as file File4.jpg in this example, could be archived as describedbelow instead of being deleted.

In accordance with a third delete rule, deleting a folder, Folder4 offile system 180-1 of FIG. 2 for example, can result in all itemsdirectly contained by the folder, in this example file File4.jpg andfile File5.jpg, to also be deleted. An item is directly contained by afolder if the folder includes a reference or a pointer to that item. Ina variation, directly contained items could be archived instead of beingdeleted. Furthermore, any items that become unreferenced as a result ofperforming the “Delete” operation in accordance with the third deleterule can be archived in the manner described below.

In variations, the first, second or third delete rule can be alsoapplied to folders contained by the folder being deleted. This processcan be repeated. For example, the first delete rule can be applied toall folders reachable from the initially deleted folder. Alternatively,the rule can be applied to a specified portion of the hierarchy, such asto a predetermined number or portion of folders, contained (directly orindirectly) by the deleted folder. An item is indirectly contained by afolder if there is a path of folders from the folder to the item. Forexample, folder Folder4 of FIG. 2 is indirectly contained by folderFolder1 since there is a path of folders (Folder1-Folder3-Folder4) fromFolder1 to Folder4.

As a further alternative, the rule can be applied to folders containedby the deleted folder that are a predetermined number of levels belowthe deleted folder in the hierarchy. For example, referring to FIG. 2,deleting folder Folder2 from the file system 180-1 in accordance withthe second delete rule, the rule can be applied to all of the folderscontained directly or indirectly by folder Folder2. Referring to FIG. 2,the second delete rule would first be applied to folder Folder2resulting in Folder2 being deleted. Then the second delete rule would beapplied to the folders contained by Folder2, in this case folderFolder3. Accordingly, folder Folder3, and folder Folder4 would bedeleted (folder Folder4 would become unreferenced as a result ofdeleting folder Folder3, and hence would also be deleted). Next thesecond delete rule would be applied to folder Folder4 (prior tocompleting the deletion of that folder, for example), since it isindirectly contained by folder Folder2. Accordingly, files File4 andFile5 would also be deleted since they are now unreferenced. Thus,applying the second delete rule to folder Folder2 and its directly andindirectly contained folders would result in the deletion of foldersFolder2, Folder3 and Folder 4 as well as files File4.jpg and File5.jpg.In all of these variations, container data structures would be updatedas appropriate to reflect the changes to the file system. Othervariations of applying delete rules to a folder and its contents willnow occur to a person of skill and are contemplated. For example, insome variations, only the files or the folders may be deleted inaccordance with the above rules. It should be noted that maintainingonly one instance of a file makes deleting files much more efficient incomparison with the case where duplicates are allowed and are located inmultiple locations. In this case, deleting a file simply involvesdeleting one instance and removing several references, as opposed tohaving to track and delete duplicates.

The “Purge” operation is a special version of the “Unrefer” operationwhere all of the contents of a folder are dereferenced. For example,referring to FIG. 9, the result of purging folder Folder3 of file system180-1 indicated in FIG. 2 is shown at 900. The directly contained itemsof folder Folder3 are dereferenced, resulting in folder Folder4 becomingunreferenced. The items which thus become unreferenced (for examplefolder Folder4) could be archived as described below. In othervariations the purge operation can be applied to specific type of itemssuch as files or folders only.

Continuing with the operations of file system 180, the “Archive”operation is the process whereby the classification of selected items ischanged from active to archived. Accordingly, the selected items becomeexempt from at least some of the operations applicable to active itemsof the file system 180 but are preserved as archived items of the filesystem 180 for later access and restoration. It should be noted thatsome items may be implicitly archived as a result of performing otheroperations. For example, an item that is dereferenced as a result ofdeleting its containing folder could be archived implicitly if itbecomes unreferenced by any other active and/or archived folders in thefile system.

Archiving can be implemented using various mechanisms. In oneimplementation, archiving an item by dereferencing involves removing allreferences or pointers to that file from containing folders and markingit as archived, for example through an archived indicator maintained inits metadata. An archived indicator in metadata can indicate whether anitem is archived or active. In some variations, the marking is optional.One difference between an “Unrefer” operation and an“Archive-by-dereferencing” operation is that when an “Unrefer” operationis applied to an item, the item is dereferenced from a particularfolder. On the other hand, when an “Archive-by-dereferencing” operationis applied to an item, the item is dereferenced from all of the foldersit is contained in and archived. For example, archiving by dereferencingthe file File5.jpg of file system indicated at 300 shown in FIG. 3 wouldinvolve removing pointer P7 from the container structures for bothfolders Folder4 and Folder3.

Where the archived item is a folder, additional complexities may need tobe addressed and thus several archiving rules may be used. According toa first archiving rule, only the folder selected is archived. Allremaining items remain as they are. For example, archiving folderFolder3 from file system 180-1 of FIG. 2 using the first rule orarchiving, would result in folder Folder3 being archived, as shown at1000 in FIG. 10. To archive folder Folder3 in accordance with the firstarchiving rule, all pointers to folder Folder3 are removed and thefolder Folder3 is marked as archived in the metadata, as indicated bythe asterisk next to its name for illustrative purposes. In variations,any items that become unreferenced as a result of applying the “Archive”operation in accordance with the first archiving rule can also bearchived.

One way of maintaining items archived by dereferencing is to maintain atop level folder TopLevel (as indicated in FIG. 10). The TopLevel foldercould be the root folder in some implementations. At least one pointerfrom folder TopLevel, in this case pointer 1010, can be identified forpointing to or referencing active items only of the file system 180-1.Other pointers from folder TopLevel, such as pointer 1005, can beclassified as pointing to or referencing archived items. In variations,the pointers would not be classified in any manner, but it would beassumed that items contained by the TopLevel folder are not referred toby a folder by convention. Accordingly, in these variations, beingmarked as archived would be relied upon to classify an item as anarchived item.

In other implementations, a designated folder could be used to containall the archived items (not shown) and the designated folder can be, asindicated above, the TopLevel folder or can be contained by the TopLevelfolder or some other folder in the file system. Such designated folderor folders can be referenced by references identified as pointing toarchived items (such as pointer 1005) and items contained by thedesignated folder(s) can reference their contained items throughreferences identified as referencing archived items. In some variations,the TopLevel folder would be designated as the root folder for the filesystem.

Other methods of maintaining items archived by dereferencing will nowoccur to a person of skill and are contemplated. For example, in onevariation, any item that is contained by a folder (other than a folderdesignated for containing archived items, such as the TopLevel folderthrough references identified as referencing archived items) may beconsidered to be an active item. Moreover, the containing folder can bean archived folder. As an example, an item that is referenced byreferences other than references identified as referencing archiveditems can be considered to be an active item. For example, as indicatedin FIG. 10, application of the first archiving rule can leave some itemssuch as folder Folder4 being referenced or contained by archived foldersonly (Folder3 in this example). However, folder Folder4 would still beclassified as active item in file system 180-1 since it is indeedcontained by a folder, albeit an archived one.

In accordance with a second archiving rule, all items contained in thearchived folder that are referenced only by archived folders can also bearchived. For example, archiving folder Folder3 of file system 180-1 asshown in FIG. 2 based on the first archiving rule resulted in folderFolder4 and files File4.jpg and File5.jpg remaining as active items infile system 180, as indicated in FIG. 10. On the other hand, when folderFolder3 is archived based on the second archiving rule, folder Folder4would be archived since it is contained only by the archived folderFolder3, as shown in FIG. 11 at 1100. In FIG. 11, archived items arereferred to by pointers or references identified as referencing archiveditems, namely 1105 and 1106, and the active folder is referred to by thepointer 1110. Moreover, archived items are marked as archived asindicated by an asterisk next to their name for illustrative purposes.Accordingly, references from folder Folder3 to folder Folder4 and fileFile5.jpg would also be removed to effect archiving by dereferencing.However, it should be noted that file File4.jpg would not be archivedsince it is not directly contained by folder Folder3, and file File5.jpgwould not be archived since it is referenced by Folder4, even thoughthey are referenced only by an archived folder, Folder4. Accordingly,the references to file File4.jpg and file File5.jpg are not removed andthe files remain classified as active items. In variations, any itemsthat become unreferenced as a result of applying the “Archive” operationin accordance with the second archiving rule can also be archived.

In accordance with a third archiving rule, the folder selected, as wellas all directly contained or referenced items, can be archived.Accordingly, file File2.jpg and folder Folder3 would also be archivedwhen folder Folder2 of file system 180-1 as shown in FIG. 2 is archivedin accordance with the third archiving rule. The result is shown in FIG.12 at 1200 where archived items are referred to by pointers identifiedas referencing archived items, namely pointers 1205, 1206 and 1207 andmarked as archived as indicated by an asterisk next to their name forillustrative purposes. Active folder Folder1 is referred to by thepointer 1210. As shown, to effect archiving by dereferencing inaccordance with the third archiving rule, the references to fileFile2.jpg and folder Folder3 would be removed, as well as to folderFolder2 and these items would be referenced by references identified asreferencing archived items.

In variations, the first, second and/or third archiving rules can bealso applied to folders contained by the folder being archived.Moreover, this process can be repeated. For example, the first archivingrule can be applied to all folders reachable from the initially archivedfolder. Alternatively, a rule can be applied for a specified portion ofthe hierarchy, such as to a predetermined number or portion of folderscontained (directly or indirectly) by the archived folder. As a furtheralternative, a rule can be applied to folders contained by the archivedfolder that are a predetermined number of levels below the archivedfolder in the hierarchy. Archiving folder Folder3 from the file system180-1, in accordance with the second archiving rule as applied to all ofthe folders reachable through folder Folder3, for example, would resultin the archiving of folders Folder3 and Folder 4 as well as filesFile4.jpg and File5.jpg, (as opposed to the results indicated in FIG. 11which are obtained when the second archiving rule is applied only to thearchived folder itself). In all of these archiving variations, containerdata structures would be updated as appropriate to reflect the changesto the file system. In further variations, different rules may beapplied to different portions or levels of the hierarchy contained by afolder. Other variations of applying archiving rules to a folder and itscontents will now occur to a person of skill and are contemplated. Forexample, in variations, only files or folders may be archived inaccordance with the archiving rules.

In another implementation of archiving, archiving with references, whenan item is archived, references to that item are not actually removed,but instead the item is marked as archived. FIG. 13 at 1300 shows theresult of archiving with references folder Folder3 of file system 180-1of FIG. 2 in accordance with the third archiving rule. The items markedas archived are indicated with an asterisk next to their name forillustrative purposes, even though the marking would typically beeffected through manipulations of the metadata associated with thearchived items. For example an archive indicator maintained by themetadata of an item can be changed to indicate that the item isarchived. Other methods of marking items as archived will now occur to aperson of skill and are contemplated.

Continuing with FIG. 13, items archived with references continue to bereferenced by folders within file system 180-1. When the file system istraversed, however, to display contents or generate search results foractive items, for example, any archived item can be omitted from theresults collected or presented. The items archived with references wouldbe presented when archived items are being sought. Thus, as far as anyapplication or user accessing the file system is concerned, thearchiving operation would appear to yield the same results as archivingby removing references (dereferencing). The advantage of archiving withreferences is that archived items or hierarchies of items can continueto be updated, where appropriate, in accordance with the operations onthe active items of the file system. For example, referring to FIG. 13,when folder Folder2 is deleted, archived folder Folder3 is removed fromthe folder Folder2's container data structure, and thus is onlycontained by folder Folder1.

In variations, archiving by dereferencing or with references can beapplied selectively to different portions of the file system. In orderto be able to mix the two methods of archiving, all items archived aremarked as archived, through for example the use of metadata, regardlessof which method of archiving was used.

Another file system operation, “Restore”, involves classifying archiveditems as active items and thus integrating archived items back into thefile system. When restoring archived items, the type of archivingperformed (with or without references) can determine the restorationmethodology to be used. For example, where the archived item wasarchived by removing references to it, a location for the archived item(for example which folder or folders it should be contained by) can bechosen, and the archive mark, typically contained with the metadata, ofthe item modified to change the status of the item to unarchived oractive, to complete the restoration of that item. Alternatively, wherethe references by the containing folders were not removed, the “Restore”operation may entail modifying the archive mark to unarchived or activewithout further input of folders, since the references to the item bycontaining folders were retained when the item was archived. This methodof archiving has the advantage that restoring an item or items allowstheir restoration into the locations from which they were archived.Moreover, since the items archived with references can be updated basedon file system operations, the restoration allows an item to be restoredto its previous location even when the item's previous location has beenupdated, by for example moving it to other locations through “Refer” and“Unrefer” operations. In variations, both choosing a location andmodifying the archiving indicator from the metadata may be used. If theitem being restored is a folder containing other archived items, thoseitems could also be restored at this point.

In some variations, file system operations may include mechanisms toenforce certain file system policies associated with the file system.For example, as described above, “Create” and “Refer” operations can beused to enforce a no file duplication policy. Other policies will nowoccur to a person of skill and are contemplated. For example, in somevariations, two folders or two files with the same name may not becontained in the same folder.

In some variations of a file system, each item (file and/or folder) inthe file system may also include location pointers to all folders withinwhich the item is contained (contained-by pointers). In someimplementations, this information can be maintained in the form of anadditional array in the container data structure for example, and/or canbe included in the metadata for the item (including files that are notfolders). Other variations for maintaining contained-by information willnow occur to a person of skill and are contemplated.

Referring to FIG. 14, contained-by arrays of pointers are shown at 1400for each item of file system 180-1 of FIG. 2. The arrows indicate thefolders by which an item is contained. For example, file File2.jpg iscontained by folder Folder1 (P0) and folder Folder2 (P2), whereas folderFolder4 is contained by folder Folder3 (P1). Contained-by constructsallow quick and efficient search of the file system. Moreover,contained-by constructs allow efficient realization of an item'scontext. For example, contained by pointers can be used to quicklyprovide a context for an item (which folders contain the item, forexample).

Contained-by arrays may be updated in light of operations performedthrough the file system services. For example, when an item is created,a null contained-by array is included to reflect that it is notreferenced by a folder in the file system. When an item is newlyreferenced by a folder, a pointer to that folder is added to itscontained-by array. Similarly, when an item is dereferenced from afolder, the pointer to that folder is removed from its contained-byarray. Along the same lines, when an item is archived, its contained-byarray can be emptied. Alternatively, the archived item's contained-byarray may be retained, thus allowing the item to be restored to itsprevious location or locations, as indicated by its contained-by array.Accordingly, when the item is restored, it can be referenced into thefolders pointed to by the contained-by array of the item being restored.In these variations, the contained-by array may be updated when relevantchanges occur to the file system. These variations to archiving andrestoring may be applicable whether an item is archived by dereferencingor archived with references.

Contained-by constructs may also allow enhanced functionality of atleast some of the operations of the file system. For example, in thecase of the “Refer” operation where an item is being referenced by adestination folder, contained-by arrays of other items in thedestination folder may be used to locate other folders that containthose items contained by the destination folder. These other folders maythen be provided as suggestions for alternative or additional folderswithin which the item being referenced may be also included. Moreover,file manager 150 can also suggest referencing other items contained inthe referenced item's original folder to the destination folder. In onevariation, the suggestions may be provided as part of a user interface.For example, in the case of the “Unrefer” operation where an item isbeing dereferenced from one or more folders which contain it, thecontained-by array may be used to present a list of folders from whichthe item may be simultaneously removed. In another example, in the caseof the “Restore” operation where an item which has been archived withreferences is being restored to one or more folders which contain it,the contained-by array may be used to present a list of folders intowhich the item may be simultaneously restored.

Files and folders in the file system 180 may be organized using variousother relationships besides contains and contained-by relationships.Similar to the contains and contained-by arrays, each item may maintainone reference structure, or two reference structures (paired referencestructures) such as two arrays of references, or more referencestructures that indicate the relationships between items in a filesystem. It should be noted that in some of these variations, files maybe organized hierarchically in a graph, without the use of folders.

As an example, consider organizing the file system based on a contentderivation relationship. Accordingly, a first file may be related to asecond file if the contents of the second file are derived from thefirst file. In this case the first file can be referred to as the parentfile (derived-from), and the second file may be referred to as the childfile (derived-by). The derivation may be in the form of editing thecontent of a file. For example, if the first file is a picture, a secondfile may be derived from a first file by cropping that picture.Alternatively, the derivation may be in the form of combining content.For example, if the first and second files are side-by-side pictures ofa landscape, a third file may be derived from the first and second filesby combining the two to generate a panoramic view picture of thelandscape as the third file. Accordingly, a parent may have manychildren or a child may have many parents, or both.

Referring to FIG. 15, content derivation relationships for file system180-1 of FIG. 2 are shown at 1500. Accordingly, files File1.jpg andFile3.jpg are parents of file File2.jpg. In turn, file File2.jpg is theparent of file File4.jpg. Finally, file File3.jpg is the parent of fileFile5.jpg. Content derivation relationships can be updated based on filesystem operations. For example, deleting file File2.jpg would result infile File4.jpg becoming the direct child of files File1.jpg andFile3.jpg, as shown in FIG. 16 at 1600.

Appropriate data structures may be added to the files to allow therepresentation and maintenance of content derivation relationships. Inthis example, is each file can include one and/or two arrays. One arraywould contain references or pointers to those files that are itschildren. The second array would contain references or pointers to thosefiles that are its parents. Content derivation relationships can becreated by an application, for example when saving a new file formedfrom combining two other files. Other relationships will now occur to aperson of skill in the art which can be maintained through the use ofone or more reference structures. For example, arbitrary relationshipscan be created based on user-defined relationships. Accordingly, eachuser may specify the relationships between items, arbitrarily, withoutbeing based on content derivation, for example. In variations, each filesystem may be organized in accordance with one, two or morerelationships at a time.

The file manager application 150 of FIG. 1 may include a user interfacemodule for providing folder organization visually and for receivinginput from users through the input devices of computing device 104.Moreover, the operations and data structures used for the file systemmay aid these user interfaces. For example, graphical user interfacesmay be provided to indicate active and archived items in the filesystem. In one implementation, the user interface can present all of thefolders that directly contain a selected item, as identified for exampleon the basis of the item's contained-by array. In variations indirectcontainers of an item can also be provided. For example, for file File5of file system 180-1 as depicted in FIG. 2, folders Folder4, Folder3,Folder2, and Folder1 may all be provided. In variations, as in theexample just discussed, the indirect containers may be traced back tothe root folder. Moreover, the folders may be listed individually, oralternatively, a folder path may be specified for each folder. Forexample the folder path for folder Folder3 may be Folder3-Folder4.Accordingly, a portion of the file system hierarchy is selectivelypresented in accordance with a context of the selected item. In somevariations, contents of the folders presented as direct and/or indirectcontainers of the selected item may also be presented. The presentedcontext can be traversed by selecting, from the presented items, a newitem, which would thus cause the context presented to be updated asappropriate for the selected item. Thus, the context-based presentationof the file system allows the visualization of potentially relateditems.

Similarly, a user interface may provide, on the basis of contained-byarrays, one or more containers containing the item when an item is tobe, for example, unreferred. Moreover, the potential restore locationscan be provided for an item to be restored based, for example, oncontained-by arrays. The interfaces may also allow selection ordeselection of one or more options, such as references or folders. Thiscould allow controlling which of the folders or containers of theselected item are operated on. For example, based on this interface, anitem can be removed from more than one folder through the sameinterface. In variations, multiple paths to an item can be presented andthe selections can be based on paths.

The user interface may also be used to provide all versions of a file ora subset of the content relationships for a file, based on otherrelationship structures such as the content derivation relationshipstructure.

In variations, the list of items contained in a folder may also beorganized in a manner to reflect file and folder order to be presentedin the user interface. Accordingly, the items in the list may beorganized in a predetermined manner to reflect a preferred order offiles and folders as specified, for example, by a user, such that theitem to be presented first, when the folder content is being viewed as alist, appears first in the list of items contained, and items to bepresented later appear later in the list of items, in accordance withthe provided ordering. The ordering may be based on folder properties,as specified in the metadata. For example, metadata may indicate thatwhen the folder contents are to be viewed, files are to be presentedfirst, followed by folders. The ordering of pointers in the list ofitems contained can reflect this preference. In some implementationsmultiple lists can be included. Moreover, similar methods can be appliedto contained-by arrays and the display of folders containing an item.

In some variations, contents of, or items contained in, a folder may bepopulated in accordance with a “Populate” operation based on one or morefolders. For example, contents of a recipient folder, Folder8, may bedetermined on the basis of the contents of two other folders, Folder9and Folder10 which are the contributor folders. One or more operatorsmay be used to create population selection operations on the basis ofwhich content from the contributor folders can be selected. For example,contents of the contributor folders may be combined using union,intersection or exclusive union operators. Where the union operator isused, the contents found in either contributor folder would be combinedto populate the contents of the recipient folder. Where the intersectionoperator is used, contents common in both contributor folders are usedto populate the recipient folder. And where the exclusive union operatoris used, all content found in one contributor folder or the othercontributor folder is used, but those items found in both contributorfolders is excluded. Although two contributor folders are used as anexample, in variations one or more contributor folders can be used. Thecontent contributed can be directly and/or indirectly contained contentsof the contributor folders. In the case of indirectly contained content,the content structure can be flattened prior to inclusion the recipientfolder. In further variations, the operators can be used in variouscombinations. Moreover, other operators than the three described arepossible and contemplated. For example, a unary operator “not” can beused to indicate that a contributor folder or folder's contents shouldbe excluded.

To implement folder population, one or more reference structures,similar to contains and contained-by arrays can be used. In onevariation each contributor folder can maintain a recipient structureindicating the recipient folders to which a folder contributes, in thisexample a list of pointers or references to recipient folders. Therecipient structure can be part of the metadata for a folder or part ofthe folder's container structure. Thus, in this example, the recipientstructure for folders Folder9 and Folder10 would include a pointer tofolder Folder8. Whenever the contents of any of the contributor folders,such as folder Folder9, change, the recipient folder's, in this casefolder Folder8, content is re-determined, as indicated by the recipientstructure. This re-determination, for example, can be done as part ofthe operation that updates a contributor folder's content. In somevariations, the list of items contained for the recipient folder may beupdated based on the determination. In other variations, thedetermination may be made each time a recipient folder's contents needto be accessed, for example for display purposes. In someimplementations, the recipient folder may have content in addition tothe content populated on the basis of the contributor folders. Infurther variations, each folder may include an additional contributorstructure, indicating the folders from which a recipient folder receivedcontent.

In some variations, population selection operations can be updated whenthe contents of one or more of the contributor folders are updated. Forexample, when a contributor folder is deleted, it can be removed fromthe population selection operation. In some variations, the removal mayneed to be verified in order to prevent the formula becoming invalid. Inother variations, when a contributor folder is archived, the archivedfolder can remain in the population selection operation. Performing an“Refer” or “Unrefer” operation involving a contributor folder may causethe performance of population selection operations including that folderto be triggered, the operation being reapplied at some point after theoperators are applied to the contributor folder. In some variations,after an “Archive” operation is applied to a recipient folder therecipient folder may continue to be updated. Accordingly, when thearchived recipient folder is restored, its contents can be restored aswell. In other variations, when a recipient folder is archived, thepopulation selection operation associated with the folder may also bearchived. When the archived recipient folder is restored, it can berepopulated in accordance with the population selection operationassociated with the restored folder. It should be noted that in thesecases, the population selection operation associated with an archivedfolder may continue to be updated as the contributor folders areupdated, for example by a “Delete” operation.

Metadata for files and folders may include various information. Forexample, it may include information such as creation and editing timesand dates. It may also include other items such as file sizes, file sizein memory 112, as well as information regarding whether an item isactive or archived. It may also include contained-by arrays, and/orcontent-relationship structures. Metadata can also include informationand structures that allow options selected for each file or folder to bemaintained. Some such structures, an ordered list of items and relateddata so as to provide a selected display order for the contained itemsof a folder, have already been discussed. Others will now occur to aperson of skill and are contemplated.

In the above provided illustrative example shown in FIG. 1, file manager150 utilizes the file system services provided by operating system 170to organize and maintain files and folders in memory 112. In otherimplementations, a file manager application may be configured toimplement a file system in accordance with a file system protocol thatis different from the file system protocol supported by the operatingsystem 170. For example, operating system 170 may provide file systemservices that allow maintaining a file system in accordance with thefile system protocols such as new technology file system (NTFS). Incontrast, the file manager application can maintain a file system inaccordance with different file system protocols, such as those describedabove.

Referring now to FIG. 17, a device 104 a is shown in accordance withanother implementation. In FIG. 17, Device 104 a is a variation ondevice 104 and thus like references bear like elements except followedby the suffix “a”. Moreover, in memory 112 a, a file system 190 a ismaintained in accordance with a file system protocol that is differentfrom the file system protocol supported by the file system 180 a ofoperating system 170 a.

In this example implementation, file manager application 150 a maintainsa file system 190 a inside file system 180 a, and is used to organize atleast a portion of the files and folders maintained by file system 180a, in accordance with a file system protocol that is potentiallydifferent from the one used by file system 180 a. Accordingly, the filemanager application 150 a utilizes the file system services in the formof application programming interfaces (APIs) provided by the operatingsystem 170 a to access the files and folders maintained in memory 112 a.However, file manager 150 a uses its own file system operations toorganize the file system it maintains. For example, if file manager 150a operates as a Windows® operating system application, file manager 150a may organize a number of files in accordance with the operations andpolicies described herein, but would ultimately call the file systemservices provided by Windows® to store the files in memory 112 a.Accordingly, the files of file system 190 a would be organized both inaccordance with the file system 190 a and the file system 180 a.

The file manager application 150 a may utilize certain mechanisms toimpose policies in file system 190 a, such as a no duplicate filespolicy, that may not be imposed by the operating file system 180 a.Moreover, the hierarchy of the files maintained in 190 a may bedifferent from their organization in file system 180 a. For example, onefolder maintained by file system 180 a may be used to store all thefiles and folders maintained by file system 190 a. In addition, filenames used by the file system 190 a may be different from the file namesused by file system 180 a, and this difference may be imposed in asystematic manner. For example, where the same name refers to multiplefiles of system 190 a, the same file name cannot appear twice in the onefolder of file system 180 a used to contain the files and foldersmanaged by file manager 150 a. Accordingly, a character such as “#” canbe reserved as a disallowable character for use in file names of filesystem 190 a. The names used by the file system 180 a may then beappended by a number—indicating the instance of the file—and thedisallowed character to distinguish the files which have the same name.As an example, according to this method, the first instance of a filewith the file name File.jpg in the file system 190 a would also get thename File.jpg in the file system 180 a. However, the second instance ofa file with the file name File.jpg in file system 190 a would get thename File#1.jpg in the file system 180 a.

In some implementations, the container data structures of file system190 a may utilize data items to facilitate interaction with the filesystem 180 a. For example, the file names used by the file system 180 amay be different from the file names used by the file system 190 a.Accordingly, container data structures of file system 190 a may alsoinclude the file names used by the file system 180 a to allowcoordination between the two file systems. Additional variations to datastructures to allow coordination between the two file systems will nowoccur to a person of skill and are contemplated. For example, in someimplementations of a file manager 150 a a file location data structuremay be used. To put the file location structure into use, the containerdata structures could include pointers to the file location structure,as opposed to the file system. Accordingly, the file location structurecan operate as a name and location translator between file system 190 aand file system 180 a.

In other variations where the file manager 150 a implements analternative file system to the one maintained by the operating system,container data structures can use pointers in different forms to accessthe files as they are maintained by the operating system. For example, adirectory path combined with an operating system file name can be usedin place of a pointer. Alternatively, handles to files, as obtained fromthe operating system file system service API calls can be used. Otherforms of pointing to the files will now occur to a person of skill andare contemplated. In some implementations, file manager application 150or 150 a can be used to view and organize files and folders associatedwith one or more applications, such as the picture manager application160 or 160 a. In these implementations, file manager 150 or 150 a canexpose APIs that allow other applications, such as the picture manager160 or 160 a to perform various operations defined above. Accordinglypicture manager 160, for example, can access file manager 150 or 150 ato perform file operations.

Referring now to FIG. 18 a method of maintaining a file system in acomputing device is indicated at 1800. In order to assist in theexplanation of the method, it will be assumed that method 1800 isoperated using one of devices 104 or 104 a as shown in FIG. 1 and FIG.17 respectively. Additionally, the following discussion of method 1800leads to further understanding of devices 104 a and 104. However, it isto be understood that devices 104 and 104 a, and method 1800 can bevaried, and need not work exactly as discussed herein in conjunctionwith each other, and that such variations are within scope.

At block 1810, an item selection is received from the file system. Theselection of the item may be assisted through the use of user interfacesas described herein. For some operations, the item selection isoptional. At block 1820, an operation is applied. The operation can beany one of the operations described herein. The application of theoperation may be assisted through the use of an interface that assistsselection of references, folders or other options that can assist theapplication of the operation. The application of the operation typicallyinvolves modifying data of the file system such as the container datastructures, metadata and others that will now occur to a person ofskill. At block 1830, the results of applying the operation of block1820 are presented through an interface.

It is to be emphasized, however, that method 1800 need not be performedin the exact sequence as shown, unless otherwise indicated, and likewisevarious blocks may be performed in parallel rather than in sequence.Hence the elements of method 1800 are referred to herein as “blocks”rather than “steps”.

The above-described embodiments are intended to be examples andalterations and modifications may be effected thereto, by those of skillin the art, without departing from the scope which is defined solely bythe claims appended hereto. For example, methods, systems andembodiments discussed can be varied and combined, in full or in part.

1. A computing device comprising: a processor, memory operably connectedto the processor, the memory including a file system having: a pluralityof items comprising: a plurality of files, each file having uniquecontent; a plurality of container structures representing a plurality offolders, at least two container structures including one or morereferences referencing at least some of the plurality of items otherthan the at least two container data structures; and a first item of theplurality of items being referenced by more than one container structurewhereby a single item of the file system can be contained in multiplefolders.
 2. The computing device of claim 1 wherein the one or morereferences comprise at least one of: pointer to memory location; pointerto location translators; and file system directory path.
 3. Thecomputing device of claim 1 wherein the plurality of items includearchived items and active items.
 4. The computing device of claim 3wherein an archived item is an item referenced only by references andfolders designated for referencing archived items.
 5. The computingdevice of claim 3 wherein each item includes an associated metadata andan item is classified as an archived item when indicated by an archiveindicator contained by the associated metadata.
 6. The computing deviceof claim 1 wherein each item includes a contained-by structure includingreferences to one or more of the plurality of container structures eachitem is contained in.
 7. The computing device of claim 1 wherein theplurality of files includes relationship files, each relationship fileincluding a content relationship structure having relationshipreferences to other relationship files based on a relationship.
 8. Thecomputing device of claim 7 wherein the relationship is a contentderivation relationship and the relationship references indicate one ofa derived-by and derived-from relationship between relationship files.9. The computing device of claim 1 wherein each container structure ismaintained as a file in the file system.
 10. A method of maintaining afile system on a computing device having a memory and a processor, themethod comprising: maintaining in the memory a plurality of itemsincluding a plurality of files having unique content and a plurality offolders, each folder represented by a container structure, eachcontainer structure including references indicating items contained bythe referencing container structure, at least one item being referencedby more than one container structure; and performing an operation on thefile system.
 11. The method of claim 10 wherein the operation is “Refer”for referencing a selected item, selected from one of the plurality ofitems, by a destination folder selected from one of the plurality offolders and wherein the performing further comprises: adding, to adestination container structure representing the destination folder, areference to the selected item.
 12. The method of claim 11 wherein eachitem of the plurality of items includes a contained-by structure andwherein the destination container structure includes references tocontained items other than the selected item, the method furthercomprising: identifying additional folders, other than the destinationfolder, referencing the contained items; and providing the additionalfolders as further folders to add the selected item by applying the“Refer” operation.
 13. The method of claim 10 wherein the operation is“Delete” for deleting a selected item selected from one of the pluralityof items and wherein the performing further comprises one of: deletingthe selected item by: removing, from the plurality of containerstructures, any references to the selected item; and removing theselected item from the file system; and when the selected item is afolder optionally applying one of: when items are left unreferenced byany container structure in the file system as a result of deleting theselected folder, removing the unreferenced items from the file system;and performing, on all items referenced by the container structurecorresponding to the selected folder, the “Delete” operation.
 14. Themethod of claim 13 further comprising: when the selected item is afolder, applying the “Delete” operation to items indirectly contained bythe selected item.
 15. The method of claim 10 wherein the plurality ofitems include archived items and active items, wherein the operation is“Archive” for archiving a selected one of the plurality of active itemsand wherein the performing further comprises: classifying the selectedactive item as an archived item; and when the selected active item is afolder optionally applying one of: classifying as archived, all itemsbecoming unreferenced by an active folder as a result of archiving theselected active item; and classifying as archived, all items directlyreferenced by the selected folder.
 16. The method of claim 15 furthercomprising: when the selected item is a folder, applying the “Archive”operation to items indirectly contained by the selected active item. 17.The method of claim 15 wherein classifying as archived comprises atleast one of: indicating the selected active item as archived inmetadata associated with the item; and removing all references to theselected active item.
 18. The method of claim 10 wherein the pluralityof items include archived items and active items, wherein the operationis “Restore” for restoring a selected one of the plurality of archiveditems and wherein the performing further comprises: indicating theselected archived item as active in metadata associated with the item.19. The method of claim 10 wherein the plurality of items includearchived items and active items, wherein the operation is “Restore” forrestoring a selected one of the plurality of archived items, wherein theselected archived item includes a contained-by structure and wherein theperforming further comprises: restoring the selected archived item as anactive item by adding references to the selected archived item based onthe contained-by structure of the selected archived item.
 20. The methodof claim 10 wherein the operation is provision of a context based viewof the file system and wherein the performing further comprises:receiving an indication of a selected item from the plurality of items;and selectively presenting a portion of the file system in accordancewith a context of the selected item wherein the context comprises atleast one of: each of the plurality of folders directly containing theselected item, as identified on the basis of the selected item'scontained-by array; and each of the plurality of folders indirectlycontaining the selected item, as identified on the basis of the selecteditem's contained-by array.
 21. The method of claim 10 wherein each ofthe plurality of files includes derivation files, each derivation filehaving a content derivation structure having derivation relationshipreferences to other derivation files based on a derived-by andderived-from relationship and wherein the operation is “Delete” fordeleting a selected derivation file selected from one of the pluralityof derivation files and wherein the performing further comprises:deleting the selected derivation file from the file system; and when theselected derivation file is both referenced-by derivation files andreferences referenced derivation files, linking the references to formderived-by and derived-from relationships with the referenced-by andreferenced derivation files.
 22. The method of claim 10 wherein theoperation is “Populate” for determining the contents of a selectedfolder selected from one of the plurality of folders and wherein theperforming further comprises: determining the content of the selectedfolder based on a formula combining one or more of the plurality ofitems.
 23. The method of claim 22 wherein the performing is carried outin response to content changes in the one or more of the plurality ofitems.