CN104008343A - Data shattering method and device - Google Patents

Data shattering method and device Download PDF

Info

Publication number
CN104008343A
CN104008343A CN201410203474.6A CN201410203474A CN104008343A CN 104008343 A CN104008343 A CN 104008343A CN 201410203474 A CN201410203474 A CN 201410203474A CN 104008343 A CN104008343 A CN 104008343A
Authority
CN
China
Prior art keywords
data
transmitted
terminal
software
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410203474.6A
Other languages
Chinese (zh)
Inventor
李佳珊
刘亚奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410203474.6A priority Critical patent/CN104008343A/en
Publication of CN104008343A publication Critical patent/CN104008343A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data shattering method and device. The method comprises the steps that it is determined that data transmission is finished, and data transmitted locally are shattered so that the data cannot be recovered. According to the data shattering method, after data transmission is finished, the data transmitted locally are shattered so that the data cannot be recovered, so that the problem that user data cannot be thoroughly deleted when the data are manually deleted and/or a terminal is restored to factory settings in the prior art is solved, and the effect that user information safety and/or user individual privacy data are more reasonably and efficiently protected against threat is achieved.

Description

The method of data crushing and device
Technical field
The present invention relates to data crushing field, particularly relate to a kind of method and device of data crushing.
Background technology
Along with scientific and technological development, people's productive life more and more depends on intelligent terminal.For example, the client of bank is installed in mobile phone, and by the cell-phone customer terminal of bank transfer accounts, the operation such as remittance.Again for example, use the terminals such as mobile phone, panel computer to send the message that relates to personal property information and/or privacy information to household or friend or colleague.And on the other hand, along with scientific and technological development, the speed that the intelligent terminals such as mobile phone, panel computer update is more and more faster.People are also more and more accustomed to the quickening of intelligent terminal renewal frequency.
But after changing intelligent terminal, most users only can be by factory reset, even simple deletion action is deleted the personal property information and/or the privacy information that have a large number of users in the terminal of replacing.Because this deletion action is not thorough to the deletion of data, after causing often occurring that the terminals such as mobile phone are bought and sold by secondary on network and/or on TV and/or on newspaper, lawless person recovers the data in the terminals such as mobile phone, and illegally obtain accordingly the news of user's property, even lawless person extorts user according to user's privacy information, and the news of extorting is also much.
To sum up, because data are divided into two parts after depositing hard disk in, a part is real data, another part is the index for authentic data, and in prior art when in terminal, data are deleted, only the index part in hard disk can be deleted, therefore can not carry out real deletion to the data in terminal, cause user's personal information and/or the higher file of some confidentialities easily to be leaked, and then cause the adverse consequencess such as user's property loss.
Summary of the invention
In view of the above problems, the present invention has been proposed to a kind of method and corresponding device of the data crushing that overcomes the problems referred to above or address the above problem are at least in part provided.
According to one aspect of the present invention, a kind of method of data crushing is provided, after being applied to and sending data to other-end, comprising: specified data end of transmission; Pulverize the local data of having transmitted, it cannot be recovered.
Alternatively, the local data of having transmitted of described pulverizing, comprising: delete the local data of having transmitted; The storage medium that this locality storage has been transmitted to data is wiped.
Alternatively, described data comprise following one of at least: associated person information; Note; Message registration; Picture; Audio frequency and video; Document; Application software and software data; The tinkle of bells.
Alternatively, described software data comprises: the chat record of chat software; The game progress of Games Software; The historical viewings record of browser software.
Alternatively, before pulverizing the local data of having transmitted, also comprise: obtain local data processing authority.
Alternatively, described data processing authority comprises ROOT authority.
Alternatively, the method of described data crushing is applicable to the data crushing process of changing planes after operating between terminal, wherein, the described operation of changing planes refers to the data division of first terminal or all goes to the second terminal, can continue to use the data from first terminal for user while enabling the second terminal.
According to another aspect of the present invention, a kind of device of data crushing is also provided, after being applied to and sending data to other-end, comprising: determination module, is configured to specified data end of transmission; Pulverize module, be configured to pulverize the local data of having transmitted, it cannot be recovered.
Alternatively, described pulverizing module is also configured to: delete the local data of having transmitted; The storage medium that this locality storage has been transmitted to data is wiped.
Alternatively, described data comprise following one of at least: associated person information; Note; Message registration; Picture; Audio frequency and video; Document; Application software and software data; The tinkle of bells.
Alternatively, described software data comprises: the chat record of chat software; The game progress of Games Software; The historical viewings record of browser software.
Alternatively, described pulverizing module is also configured to: obtain local data processing authority.
Alternatively, described data processing authority comprises ROOT authority.
The data crushing method providing according to the embodiment of the present invention, can be after specified data end of transmission, pulverizes the local data of having transmitted, and it cannot be recovered.Because data are divided into two parts after depositing hard disk in, a part is real data, another part is the index for authentic data, and only the index part in hard disk can be deleted the deletion action of data in prior art, and data division is designated to countless certificates, so that system continues the new data of storage.Therefore, deletion action of the prior art cannot ensure to have deleted data and not be resumed, and after more cannot ensureing to delete, can not be revealed for the higher file of some confidentialities.For example, carry some account information data and passwords thereof of user in the note data of user mobile phone, the contact data of user mobile phone is resumed easily and causes " fishing " event to make friends and family's property cheated etc.In the embodiment of the present invention; can be after specified data end of transmission; pulverize the local data of having transmitted; it cannot be recovered; solve and in prior art, data have manually been deleted and/or terminal is carried out to the problem that user data cannot be thoroughly deleted in the operation of factory reset, reached and more rationally protect efficiently user information safety and/or the not compromised beneficial effect of protection individual subscriber private data.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description to the specific embodiment of the invention by reference to the accompanying drawings below, those skilled in the art will understand above-mentioned and other objects, advantage and feature of the present invention more.
Brief description of the drawings
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skill in the art.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows the processing flow chart of the method for data crushing according to an embodiment of the invention;
Fig. 2 shows the processing flow chart of the method for data crushing in accordance with a preferred embodiment of the present invention;
Fig. 3 shows the interface schematic diagram that the data that needs are pulverized are in accordance with a preferred embodiment of the present invention searched for; And
Fig. 4 shows the structural representation of the device of data crushing according to an embodiment of the invention.
Embodiment
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In correlation technique, mention, in prior art when in terminal, data are deleted, only the index part in hard disk can be deleted, therefore can not carry out real deletion to the data in terminal, cause user's personal information and/or the higher file of some confidentialities easily to be leaked, and then cause the adverse consequencess such as user's property loss.
For solving the problems of the technologies described above, the embodiment of the present invention provides a kind of method of data crushing, after being applied to and sending data to other-end.Fig. 1 shows the processing flow chart of the method for data crushing according to an embodiment of the invention.Referring to Fig. 1, this flow process at least comprises that step S102 is to step S104.
Step S102, specified data end of transmission.
Step S104, the local data of having transmitted of pulverizing, cannot recover it.
The data crushing method providing according to the embodiment of the present invention, can be after specified data end of transmission, pulverizes the local data of having transmitted, and it cannot be recovered.Because data are divided into two parts after depositing hard disk in, a part is real data, another part is the index for authentic data, and only the index part in hard disk can be deleted the deletion action of data in prior art, and data division is designated to countless certificates, so that system continues the new data of storage.Therefore, deletion action of the prior art cannot ensure to have deleted data and not be resumed, and after more cannot ensureing to delete, can not be revealed for the higher file of some confidentialities.For example, carry some account information data and passwords thereof of user in the note data of user mobile phone, the contact data of user mobile phone is resumed easily and causes " fishing " event to make friends and family's property cheated etc.In the embodiment of the present invention; can be after specified data end of transmission; pulverize the local data of having transmitted; it cannot be recovered; solve and in prior art, data have manually been deleted and/or terminal is carried out to the problem that user data cannot be thoroughly deleted in the operation of factory reset, reached and more rationally protect efficiently user information safety and/or the not compromised beneficial effect of protection individual subscriber private data.
In the embodiment of the present invention, before the data that this locality has been transmitted are carried out crushing operation, obtain local data processing authority.Wherein, due in practical operation, process and need to obtain different authorities for the data of the different application of terminal, and ROOT authority can cover the authority that most of data are processed, therefore the data processing authority of, obtaining in the embodiment of the present invention comprises ROOT authority.In practical operation, the data processing authority of terminal this locality is comprised to interim ROOT authority and permanent ROOT authority.Wherein, compared with permanent ROOT authority, interim ROOT authority refers to temporary ROOT authority, and, after terminal restarts, interim ROOT authority can disappear automatically.But get after interim ROOT authority to the operating right of data with obtain permanent ROOT authority after identical to the operation claim of data.
For example, the operation that gets interim ROOT authority comprises: the internal processes operation of operation that system file is backed up, amendment system, set up applications are obtained arbitrarily the operating right after permanent ROOT authority to the unloading operation of the fitting operation of mourning in silence that obtains operation, application program, application program and/or the system pre-installed applications program of operation, system file and/or the application file catalogue of safe digital card (Secure Digital Memory Card, hereinafter to be referred as SD card) etc.Therefore, in the embodiment of the present invention, obtain the processing authority that interim ROOT authority guarantees to obtain the data to terminal this locality, and ensure after data are carried out to pulverization process, interim ROOT authority can disappear automatically, avoid, owing to obtaining permanent ROOT authority, causing user to lose for the maintenance free of this terminal and the service of maintenance.
In the embodiment of the present invention, can judge the current interim ROOT authority of whether having obtained, and determine whether to process the data of terminal this locality according to judged result.For example, the embodiment of the present invention can be passed through the order of adb shell id, obtains active user's ID rank.If ID=0, represents that active user has obtained interim ROOT authority.Above mention, get ROOT authority and be the highest rights of using of the system that gets terminal.User's ID=0 represents current this highest weight limit that got, and active user has obtained interim ROOT authority.
For example, in the time that the system of terminal is Android system, concrete carries out as given an order:
shell:su-c?mount-o?remount?rw/system/app/system/app
Wherein, this instruction utilizes the shell-command of adb mentioned above to obtain active user's ID rank.And, utilize su in shell-command to add mount-0remount order to destination path (/system/app), thus general/system/app is made as read-write (being the rw in instruction) state.Wherein, the su in shell-command represents that high rights of using are acquired, and can start use, for example, obtain the interim ROOT authority in this example.
In addition, in practical operation, exist the embodiment of the present invention cannot directly obtain the type of the terminal of ROOT authority, in this kind of situation, need user to obtain by other means as required the ROOT authority of terminal.After obtaining, this ROOT authority is carried out to Authorized operation.The method that afterwards, can use the data crushing that the embodiment of the present invention provides the processing such as pulverizes to the data that receive.
Above mention, after obtaining local data processing authority, the embodiment of the present invention is carried out the crushing operation that cannot recover to data.In practical operation, the difference that is provided with data in the different operating system of different terminals is deposited rule, and in the storing directory of depositing regulation different pieces of information in rule.The name of the storing directory of the data that for example, specify all application in the Android system of mobile phone in mobile phone EMS memory is called " data ".Further, in this " data " catalogue, be application distribution catalogue, and according to the bag name of different application, the catalogue of distributing named.In addition, it can be the rule of depositing arranging in the operating system of terminal that the difference existing for different application is deposited rule, can also be the rule of depositing arranging in to the compiling procedure of application.And the data in the storing directory of application only can be carried out read-write operation by this application, and each application also only can be carried out read-write operation to its corresponding catalogue.
For example, the storing directory (also can be called deposit path) of the application data of micro-letter in mobile phone EMS memory is: mobile phone EMS memory-data-weixindata.In addition, the image data of micro-letter can be deposited in the storing directory arranging in the SD card of mobile phone, and this storing directory is: SD card-weixin-picture.Wherein " weixin " is the phonetic spelling of " micro-letter ".Again for example, the game class in mobile phone is applied in the storing directory in mobile phone EMS memory and is: mobile phone EMS memory-data-youxidata.In addition, game class application can also arrange storing directory in SD card, is: SD card-zhaonimeidata, and the progress data of storage game in this storing directory as game " look for you younger sister " can arrange storing directory in SD card.Wherein, " zhaonimei " is the phonetic spelling of " look for you younger sister ".
Therefore, for ensureing in the time that the data to local are carried out crushing operation, can find more all sidedly and relate to the data of user privacy information and/or property information etc. and it is carried out to crushing operation, and avoid because the improper deletion of the data in terminal or application causes the operating system paralysis of terminal or unavailable, and then affect the problem of the use of user to terminal, the embodiment of the present invention is obtained the deposit data rule of different application, and by the deposit data rale store getting in database.Before the data to local are carried out crushing operation, the embodiment of the present invention travels through the data of depositing in terminal, obtains the storing directory of total data in terminal.According to the deposit data rule getting, data and storing directory thereof that traversal is obtained are analyzed.For example, if specified data is that terminal is used to the data (application data of third party's application of installing) without impact, can directly carry out crushing operation to data.If the data that specified data is terminal operating system, are further analyzed these data, when determining cannot affect the normal running of terminal system to the crushing operation of data time, can directly carry out crushing operation to data.
In the time that data are carried out to crushing operation, because data are divided into two parts after depositing hard disk in, a part is real data, another part is the index for authentic data, and in the manual deletion action of prior art, only the index part in hard disk is deleted, and data division is designated to countless certificates, so that system continues the new data of storage.Therefore, manual deletion action of the prior art cannot ensure to have deleted data and not be resumed, and after more cannot ensureing to delete, can not be revealed for the higher file of some confidentialities.For example, carry some account information data and passwords thereof of user in the note data of user mobile phone, the contact data of user mobile phone is resumed easily and causes " fishing " event to make friends and family's property cheated etc.
For guaranteeing that the data of having transmitted are deleted thoroughly and/or destroyed, when the embodiment of the present invention is pulverized definite data of having transmitted, delete the local data of having transmitted.And after deleting the local data of having transmitted, the storage medium that this locality storage has been transmitted to data is wiped.The embodiment of the present invention can be by ensureing the data of having transmitted to carry out the pulverizing that cannot recover to the deletion of transmitting data and to wiping of its storage medium.Therefore; the embodiment of the present invention can solve manually deletes data in prior art and/or terminal is carried out to the problem that user data cannot be thoroughly deleted in the operation of factory reset, reaches and more rationally protects efficiently user information safety and/or the not compromised beneficial effect of protection individual subscriber private data.
Preferably, the method of the data crushing that the embodiment of the present invention provides can be applicable to the data crushing process after the operation of changing planes between terminal, wherein, the operation of changing planes refers to the data division of first terminal or all goes to the second terminal, can continue to use the data from first terminal for user while enabling the second terminal.For example, after user buys new cell-phone, need to be by the data transmission in old mobile phone to new cell-phone.After transmission, if only according to deletion means of the prior art, data in old mobile phone are carried out and manually deleted and/or factory reset operation, cannot avoid the privacy contents such as photo in mobile phone, video, recording, chat record again to be recovered.And the method for the data crushing providing according to the embodiment of the present invention, can be after the data in old mobile phone be deleted, wipe the storage medium in mobile phone, data in mobile phone are deleted thoroughly, comprise progress data of the application software such as play in the historical record data of note data, contact data, chat application of user in old mobile phone and old mobile phone etc.Therefore, the data crushing method providing according to the embodiment of the present invention is pulverized the data of having transmitted in old mobile phone, can strengthen the destruction degree to data in old mobile phone, if old mobile phone is made a gift to someone or resell after pulverization process, can ensure that the data in old mobile phone cannot maliciously be recovered.Therefore,, in the embodiment of the present invention, after sending data to receiving terminal, the data that this locality has been transmitted are pulverized the protection that can strengthen privacy of user safety.
In addition, the embodiment of the present invention can be applied in the terminal that uses Android system.Because Android system limits the deletion action to data in cell phone system, therefore, preferably, after the data that this locality has been transmitted are carried out crushing operation, can manually be confirmed to delete by user, further ensure that the local data of having transmitted are thoroughly destroyed, ensure user's personal secrets.
In the embodiment of the present invention, determine that the data that end of transmission is pulverized can be in terminal, to obtain arbitrarily the data that authority is pulverized it, comprising: associated person information, note, message registration, picture, audio frequency and video, document, application software and software data, the tinkle of bells.Wherein, software data can be the chat record of chat software, can be the game progress of Games Software, can also be browser software historical viewings record etc. arbitrarily user use the historical information data of software.Therefore, use the data crushing method that the embodiment of the present invention provides to carry out pulverization process to the arbitrary data of determining end of transmission, cannot recover with the data that ensure pulverizing, avoid the deleted data of user to be recovered the adverse consequences that causes user's property information and/or individual privacy to be revealed by malice.
For example, after user buys new cell-phone, use the data crushing that provides of the embodiment of the present invention method can by the data transmission in old mobile phone to new cell-phone, all personal information of user in old mobile phone and/or data and/or data are pulverized, avoid user that old mobile phone is made a gift to someone or secondary when transaction, personal information data in old mobile phone are maliciously recovered, and promote user and experience.
Embodiment mono-
For the method for the data crushing that each embodiment provides is set forth clearlyer, now provide the method for the data crushing that a preferred embodiment provides the embodiment of the present invention to be introduced above.It should be noted that, for this preferred embodiment is set forth succinctly, in this preferred embodiment, data are set and transfer to new cell-phone by old mobile phone, and after determining end of transmission, the data of old mobile phone this locality are pulverized.
As shown in Figure 2 the processing flow chart of method of data crushing in accordance with a preferred embodiment of the present invention.Referring to Fig. 2, this flow process at least comprises that step S202 is to step S210.
Step S202, select to transmit data according to user.
Particularly, according to user's selection, by old mobile phone, all personal information that user needs and/or data and/or data transmission are to new cell-phone.
Whether step S204, specified data are transmitted complete, if so, perform step S206, if not, continue execution step S202.
Step S206, obtain ROOT authority.
Particularly, ROOT authority can cover the authority that most of data are processed, and therefore, before the data that this locality has been transmitted are carried out crushing operation, obtains ROOT authority.In practical operation, the data processing authority of terminal this locality is comprised to interim ROOT authority and permanent ROOT authority.In the embodiment of the present invention, obtain the processing authority that interim ROOT authority guarantees to obtain the data to terminal this locality, and ensure after data are carried out to pulverization process, interim ROOT authority can disappear automatically, avoid, owing to obtaining permanent ROOT authority, causing user to lose for the maintenance free of this terminal and the service of maintenance.
Step S208, the local data that need pulverizing of search.
Particularly, Fig. 3 shows the interface schematic diagram that the data that needs are pulverized are in accordance with a preferred embodiment of the present invention searched for.As shown in Figure 3, this preferred embodiment is searched for the data that may comprise user privacy information in old mobile phone.In the time that the data in old mobile phone are searched for, this preferred embodiment is searched for data according to the deposit data rule of storing in database, and the source of specified data.Therefore, this preferred embodiment is searched for the data that may comprise user privacy information in old mobile phone, can ensure follow-up when local data are carried out to crushing operation, can find more all sidedly and relate to the data of user privacy information and/or property information etc. and it is carried out to crushing operation, and avoid because the improper deletion of the data in terminal or application causes the operating system paralysis of terminal or unavailable, and then affect the problem of the use of user to terminal.
In search interface as shown in Figure 3, search altogether 634 of privacy informations in mobile phone.Wherein, 634 privacy informations that search comprise 0 of alternative document on SD card, 527 of picture files, 104 of 3 of video files and recording files.And, as shown in Figure 3, in the interface that the privacy information in mobile phone is searched for, this preferred embodiment mark has " advising that you pulverize old mobile phone private; prevent from being resumed utilization ", with prompting user, local data are pulverized, ensure to mobile phone represent or when two time selling lawless person cannot carry out malice to the data in mobile phone and recover, the ill effect of avoiding user to be caused personal property information and/or privacy information to be revealed due to the data in mobile phone by malice recovery.
Step S210, according to user's selection instruction, data are pulverized, flow process finishes.
Particularly, as shown in Figure 3, this preferred embodiment can be shown the data that may comprise user privacy information in the local data searching, and point out user may comprise the data type of the data of privacy information.634 privacy informations that search as mentioned above comprise 0 of alternative document on SD card, 527 of picture files, 104 of 3 of video files and recording files.And in this preferred embodiment, the file that user can pulverize needs and/or data and/or information are selected.For example, user is buying new cell-phone, and by the data transmission in old mobile phone to new cell-phone, intend old mobile phone to represent user's father.Because comprising, the picture in old mobile phone therefore, retains user's daily life picture, so that user's father can check for picture in old mobile phone.And recording file in old mobile phone comprises the work data in user job, for avoiding work data to be not intended to reveal the ill effect causing, user can select recording file to pulverize.
Therefore, this preferred embodiment can be after specified data end of transmission, searches the data that may comprise user privacy information in old mobile phone, and shows.User can carry out selectivity pulverizing to the data in old mobile phone according to the privacy scanning list showing, to ensure that pulverized data cannot be resumed, avoids userspersonal information's leakage, promotes user and experiences.
The method of the data crushing based on above each preferred embodiment provides, based on same inventive concept, the embodiment of the present invention provides a kind of device of data crushing, to realize the method for data crushing.
Fig. 4 shows the structural representation of the device of data crushing according to an embodiment of the invention.Referring to Fig. 4, the device of the data crushing of the embodiment of the present invention at least comprises: determination module 410 and pulverizing module 420.
Now introduce the annexation between each device of device or function and the each several part of composition of the data crushing of the embodiment of the present invention:
Determination module 410, is configured to specified data end of transmission.
Pulverize module 420, be configured to pulverize the local data of having transmitted, it cannot be recovered.
In a preferred embodiment, pulverizing module 420 is also configured to: delete the local data of having transmitted; The storage medium that this locality storage has been transmitted to data is wiped.
In a preferred embodiment, data comprise following one of at least: associated person information; Note; Message registration; Picture; Audio frequency and video; Document; Application software and software data; The tinkle of bells.
In a preferred embodiment, software data comprises: the chat record of chat software; The game progress of Games Software; The historical viewings record of browser software.
In a preferred embodiment, pulverizing module 420 is also configured to: obtain local data processing authority.
In a preferred embodiment, data processing authority comprises ROOT authority.
According to the combination of above-mentioned any one preferred embodiment or multiple preferred embodiments, the embodiment of the present invention can reach following beneficial effect:
The data crushing method providing according to the embodiment of the present invention, can be after specified data end of transmission, pulverizes the local data of having transmitted, and it cannot be recovered.Because data are divided into two parts after depositing hard disk in, a part is real data, another part is the index for authentic data, and only the index part in hard disk can be deleted the deletion action of data in prior art, and data division is designated to countless certificates, so that system continues the new data of storage.Therefore, deletion action of the prior art cannot ensure to have deleted data and not be resumed, and after more cannot ensureing to delete, can not be revealed for the higher file of some confidentialities.For example, carry some account information data and passwords thereof of user in the note data of user mobile phone, the contact data of user mobile phone is resumed easily and causes " fishing " event to make friends and family's property cheated etc.In the embodiment of the present invention; can be after specified data end of transmission; pulverize the local data of having transmitted; it cannot be recovered; solve and in prior art, data have manually been deleted and/or terminal is carried out to the problem that user data cannot be thoroughly deleted in the operation of factory reset, reached and more rationally protect efficiently user information safety and/or the not compromised beneficial effect of protection individual subscriber private data.
In the instructions that provided herein, a large amount of details are described.But, can understand, embodiments of the invention can be put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.But, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them in addition multiple submodules or subelement or sub-component.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature instead of further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module of moving on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize the some or all functions according to the some or all parts in the equipment of the data crushing of the embodiment of the present invention.The present invention can also be embodied as part or all equipment or the device program (for example, computer program and computer program) for carrying out method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described instead of limit the invention, and those skilled in the art can design alternative embodiment in the case of not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has multiple such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim of having enumerated some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
So far, those skilled in the art will recognize that, illustrate and described of the present invention multiple exemplary embodiment although detailed herein, but, without departing from the spirit and scope of the present invention, still can directly determine or derive many other modification or the amendment that meet the principle of the invention according to content disclosed by the invention.Therefore, scope of the present invention should be understood and regard as and cover all these other modification or amendments.
The embodiment of the invention also discloses a kind of method of A1, data crushing, after being applied to and sending data to other-end, comprising:
Specified data end of transmission;
Pulverize the local data of having transmitted, it cannot be recovered.
A2, according to the method described in A1, wherein, describedly pulverize the local data of having transmitted, comprising:
Delete the local data of having transmitted;
The storage medium that this locality storage has been transmitted to data is wiped.
A3, according to the method described in A1 or A2, wherein, described data comprise following one of at least:
Associated person information;
Note;
Message registration;
Picture;
Audio frequency and video;
Document;
Application software and software data;
The tinkle of bells.
A4, according to the method described in A3, wherein, described software data comprises:
The chat record of chat software;
The game progress of Games Software;
The historical viewings record of browser software.
A5, according to the method described in A1 to A4 any one, wherein, before pulverizing the local data of having transmitted, also comprise: obtain local data processing authority.
A6, according to the method described in A5, wherein, described data processing authority comprises ROOT authority.
A7, according to the method described in A1 to A6 any one, wherein, the method of described data crushing is applicable to the data crushing process of changing planes after operating between terminal, wherein, the described operation of changing planes refers to the data division of first terminal or all goes to the second terminal, can continue to use the data from first terminal for user while enabling the second terminal.
The embodiment of the invention also discloses the device of B8, a kind of data crushing, after being applied to and sending data to other-end, comprising:
Determination module, is configured to specified data end of transmission;
Pulverize module, be configured to pulverize the local data of having transmitted, it cannot be recovered.
B9, according to the device described in B8, wherein, described pulverizing module is also configured to:
Delete the local data of having transmitted;
The storage medium that this locality storage has been transmitted to data is wiped.
B10, according to the device described in claim B8 or B9, wherein, described data comprise following one of at least:
Associated person information;
Note;
Message registration;
Picture;
Audio frequency and video;
Document;
Application software and software data;
The tinkle of bells.
B11, according to the device described in B10, wherein, described software data comprises:
The chat record of chat software;
The game progress of Games Software;
The historical viewings record of browser software.
B12, according to the device described in B8 to B11 any one, wherein, described pulverizing module is also configured to: obtain local data processing authority.
B13, according to the device described in B12, wherein, described data processing authority comprises ROOT authority.

Claims (10)

1. a method for data crushing, after being applied to and sending data to other-end, comprising:
Specified data end of transmission;
Pulverize the local data of having transmitted, it cannot be recovered.
2. method according to claim 1, wherein, the local data of having transmitted of described pulverizing, comprising:
Delete the local data of having transmitted;
The storage medium that this locality storage has been transmitted to data is wiped.
3. method according to claim 1 and 2, wherein, described data comprise following one of at least:
Associated person information;
Note;
Message registration;
Picture;
Audio frequency and video;
Document;
Application software and software data;
The tinkle of bells.
4. method according to claim 3, wherein, described software data comprises:
The chat record of chat software;
The game progress of Games Software;
The historical viewings record of browser software.
5. according to the method described in claim 1 to 4 any one, wherein, before pulverizing the local data of having transmitted, also comprise: obtain local data processing authority.
6. method according to claim 5, wherein, described data processing authority comprises ROOT authority.
7. according to the method described in claim 1 to 6 any one, wherein, the method of described data crushing is applicable to the data crushing process of changing planes after operating between terminal, wherein, the described operation of changing planes refers to the data division of first terminal or all goes to the second terminal, can continue to use the data from first terminal for user while enabling the second terminal.
8. a device for data crushing, after being applied to and sending data to other-end, comprising:
Determination module, is configured to specified data end of transmission;
Pulverize module, be configured to pulverize the local data of having transmitted, it cannot be recovered.
9. device according to claim 8, wherein, described pulverizing module is also configured to:
Delete the local data of having transmitted;
The storage medium that this locality storage has been transmitted to data is wiped.
10. device according to claim 8 or claim 9, wherein, described data comprise following one of at least:
Associated person information;
Note;
Message registration;
Picture;
Audio frequency and video;
Document;
Application software and software data;
The tinkle of bells.
CN201410203474.6A 2014-05-14 2014-05-14 Data shattering method and device Pending CN104008343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410203474.6A CN104008343A (en) 2014-05-14 2014-05-14 Data shattering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410203474.6A CN104008343A (en) 2014-05-14 2014-05-14 Data shattering method and device

Publications (1)

Publication Number Publication Date
CN104008343A true CN104008343A (en) 2014-08-27

Family

ID=51368993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410203474.6A Pending CN104008343A (en) 2014-05-14 2014-05-14 Data shattering method and device

Country Status (1)

Country Link
CN (1) CN104008343A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488429A (en) * 2015-11-25 2016-04-13 华勤通讯技术有限公司 Mobile terminal and data security protection method thereof
CN105824839A (en) * 2015-01-06 2016-08-03 中兴通讯股份有限公司 Method and apparatus for safe deletion of data in mobile terminal
CN107086998A (en) * 2017-04-27 2017-08-22 努比亚技术有限公司 Recover the method and device, terminal, computer-readable recording medium of application data
CN107665312A (en) * 2016-07-28 2018-02-06 深圳市祈飞科技有限公司 Data guard method, client and system
CN108875421A (en) * 2018-04-28 2018-11-23 置富科技(深圳)股份有限公司 Copying apparatus, data managing method, storage medium and data destroying, alternate device
CN109522756A (en) * 2018-09-27 2019-03-26 中国科学院信息工程研究所 A kind of data method for deleting and device
CN111191269A (en) * 2018-11-15 2020-05-22 天津奇立软件技术有限公司 Private data smashing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093527A (en) * 2007-07-25 2007-12-26 郭发源 Outer placed mobile storage in use for alete information processing
US20090063797A1 (en) * 2007-09-05 2009-03-05 Yuichi Taguchi Backup data erasure method
CN101739444A (en) * 2008-11-17 2010-06-16 富士通株式会社 Electronic file management system
CN102065392A (en) * 2010-12-02 2011-05-18 中兴通讯股份有限公司 Communication terminal and short message secret-keeping method thereof
CN102332014A (en) * 2011-09-14 2012-01-25 奇智软件(北京)有限公司 Method and device for deleting file
CN102609495A (en) * 2012-01-29 2012-07-25 奇智软件(北京)有限公司 Method for deleting file and system
CN102819717A (en) * 2012-08-07 2012-12-12 北京奇虎科技有限公司 Method and device for carrying out protection processing on file
CN102880714A (en) * 2012-09-29 2013-01-16 北京奇虎科技有限公司 File deleting method and file deleting device
CN103020534A (en) * 2012-11-30 2013-04-03 北京网秦天下科技有限公司 Method and system for managing mobile terminal
CN103220394A (en) * 2013-04-03 2013-07-24 广东欧珀移动通信有限公司 Method and system for preventing secret leakage of mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093527A (en) * 2007-07-25 2007-12-26 郭发源 Outer placed mobile storage in use for alete information processing
US20090063797A1 (en) * 2007-09-05 2009-03-05 Yuichi Taguchi Backup data erasure method
CN101739444A (en) * 2008-11-17 2010-06-16 富士通株式会社 Electronic file management system
CN102065392A (en) * 2010-12-02 2011-05-18 中兴通讯股份有限公司 Communication terminal and short message secret-keeping method thereof
CN102332014A (en) * 2011-09-14 2012-01-25 奇智软件(北京)有限公司 Method and device for deleting file
CN102609495A (en) * 2012-01-29 2012-07-25 奇智软件(北京)有限公司 Method for deleting file and system
CN102819717A (en) * 2012-08-07 2012-12-12 北京奇虎科技有限公司 Method and device for carrying out protection processing on file
CN102880714A (en) * 2012-09-29 2013-01-16 北京奇虎科技有限公司 File deleting method and file deleting device
CN103020534A (en) * 2012-11-30 2013-04-03 北京网秦天下科技有限公司 Method and system for managing mobile terminal
CN103220394A (en) * 2013-04-03 2013-07-24 广东欧珀移动通信有限公司 Method and system for preventing secret leakage of mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
科学中国-中国网: "冠希终结者出现!360"安全换机"彻底清除隐患", 《HTTP://SCIENCE.CHINA.COM.CN/2014-04/15/CONTENT_32098815.HTM》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824839A (en) * 2015-01-06 2016-08-03 中兴通讯股份有限公司 Method and apparatus for safe deletion of data in mobile terminal
CN105488429A (en) * 2015-11-25 2016-04-13 华勤通讯技术有限公司 Mobile terminal and data security protection method thereof
CN107665312A (en) * 2016-07-28 2018-02-06 深圳市祈飞科技有限公司 Data guard method, client and system
CN107086998A (en) * 2017-04-27 2017-08-22 努比亚技术有限公司 Recover the method and device, terminal, computer-readable recording medium of application data
CN108875421A (en) * 2018-04-28 2018-11-23 置富科技(深圳)股份有限公司 Copying apparatus, data managing method, storage medium and data destroying, alternate device
CN109522756A (en) * 2018-09-27 2019-03-26 中国科学院信息工程研究所 A kind of data method for deleting and device
CN111191269A (en) * 2018-11-15 2020-05-22 天津奇立软件技术有限公司 Private data smashing method and device

Similar Documents

Publication Publication Date Title
CN104008343A (en) Data shattering method and device
CN110073353B (en) Container-based operating system and method
JP6860563B2 (en) Information recommendation method and equipment
US8244678B1 (en) Method and apparatus for managing backup data
CN104023410B (en) A kind of method and apparatus of the safe transfer data between wireless terminal
CN105830477A (en) Operating system integrated domain management
Geewax Google Cloud platform in action
CN103959302A (en) Systems and methods for secure distributed storage
CN103677935A (en) Installation and control method, system and device for application programs
CN104021052A (en) Method and device for carrying out data recovery during data transferring between wireless terminals
CN104092743B (en) The guard method of user data and system under cloud environment
CN103647785A (en) Security control method, device and system for mobile terminal
CN103647784A (en) Public and private isolation method and device
US20170169234A1 (en) System and method for removing internet attack surface from internet connected devices
Paraskevas Cybersecurity in travel and tourism: a risk-based approach
Srivastava et al. Control framework for secure cloud computing
CN104615662A (en) Data processing method and device and terminal device
CN103824021A (en) Setting method and device of browser setting item
Ceci et al. China’s 5G networks: A tool for advancing digital authoritarianism abroad?
CN106254442A (en) A kind of cloud disk data transmission method based on virtual encryption disk and device
Ryan et al. Insecure software on a fragmenting Internet
CN104318174A (en) Document protecting method, document protecting devices and document protecting system
US9148444B2 (en) Rotation of web site content to prevent e-mail spam/phishing attacks
CN112149177B (en) Bidirectional protection method and system for network information security
Hacquebord et al. The near and far future of ransomware business models

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140827