WO2019090586A1 - Mobile terminal, and computer readable storage medium for data wiping - Google Patents

Mobile terminal, and computer readable storage medium for data wiping Download PDF

Info

Publication number
WO2019090586A1
WO2019090586A1 PCT/CN2017/110164 CN2017110164W WO2019090586A1 WO 2019090586 A1 WO2019090586 A1 WO 2019090586A1 CN 2017110164 W CN2017110164 W CN 2017110164W WO 2019090586 A1 WO2019090586 A1 WO 2019090586A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
factory
password
frp
operation instruction
Prior art date
Application number
PCT/CN2017/110164
Other languages
French (fr)
Chinese (zh)
Inventor
木魁
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to PCT/CN2017/110164 priority Critical patent/WO2019090586A1/en
Priority to CN201780096648.5A priority patent/CN111316277A/en
Publication of WO2019090586A1 publication Critical patent/WO2019090586A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Definitions

  • the present invention relates to the field of data erasure in mobile terminals, and more particularly to a mobile terminal and a computer readable storage medium for data erasure.
  • Factory Reset Protection is a protection measure in Android devices developed by Google that protects devices after they are stolen or lost, preventing unauthorized users from logging in or using them. If the electronic device is running Android OS 5.1 or higher, after logging in to the Google account and launching the FRP lock on this device, the relevant account information will be stored in a separate partition. If the user's mobile terminal is lost or stolen, the user does not normally brush the machine, or restores the factory settings, after restarting the device, you need to fill in the information of its Google account to complete the boot process. If the account password is forgotten, the mobile terminal cannot activate the entry interface. At the same time, the user can also clear the user's personal information by erasing the data in the FRP partition.
  • the drawback of the one-button erase FRP partition function implemented by the mobile terminal is that if the password of the mobile terminal is not known, the system cannot be erased, and thus the FRP partition cannot be erased.
  • the user forgets the password by himself but needs to clear the personal information in the smart terminal, it is difficult to implement.
  • the present invention provides a mobile terminal and a computer readable storage medium for data erasure.
  • the invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
  • a computer readable storage medium for data erasing on which a computer program is stored, wherein when the computer program is executed by a processor, the following steps are implemented: capturing a first operation instruction, starting security Mode, in the safe mode, selecting and entering the factory reset protection program, in the factory reset protection program, selecting to erase the factory reset protection data, capturing a second operation instruction, inputting a password information, The password information is compared with a preset password, and when the password information matches the preset password, the factory reset protection data is erased.
  • capturing a first operation instruction comprises: capturing an operation instruction input by the pair of mobile terminals, parsing the operation instruction, obtaining an operation content, and controlling the mobile terminal to enter according to the operation content Safe mode.
  • the password information is an unlock code of the factory reset protection program.
  • the acquiring method of the unlocking code comprises: reading an international mobile device identity code of the mobile terminal, and retrieving an unlocking code of the mobile terminal's factory reset protection program according to the international mobile device identity code.
  • the following steps are further implemented, the security mode is parsed, the setting authority is obtained, and the entry of the factory reset protection program is written into the security mode.
  • a mobile terminal includes a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the following steps: capturing a first An operation command starts a safety mode, in which the selection and enters a factory reset protection program, in the factory reset protection program, selects an erase factory reset protection data, captures a second operation instruction, and inputs a
  • the password information compares the password information with a preset password, and when the password information matches the preset password, erasing and restoring the factory setting protection data.
  • capturing a first operation instruction comprises: capturing an operation instruction input by the pair of mobile terminals, parsing the operation instruction, obtaining an operation content, and controlling the mobile terminal to enter according to the operation content Safe mode.
  • the password information is an unlock code of the factory reset protection program.
  • the acquiring method of the unlocking code comprises: reading an international mobile device identity code of the mobile terminal, and retrieving an unlocking code of the mobile terminal's factory reset protection program according to the international mobile device identity code.
  • the processor executes the computer program
  • the following steps are implemented, the security mode is parsed, the setting authority is obtained, and the entry of the factory reset protection program is written into the security mode.
  • the technical advantage of the present invention is that the present invention proposes a mobile terminal and a computer readable storage medium for data erasure.
  • the invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
  • FIG. 1 is a flow chart showing the steps implemented when a computer program stored on a computer readable storage medium for data erasure is executed by a processor in accordance with a preferred embodiment of the present invention
  • FIG. 2 is a flow chart showing a step of automatically capturing a first operation command and starting a security mode in accordance with the present invention
  • FIG. 3 is a flow chart showing a step of obtaining an unlock code of the factory reset protection program in accordance with FIG. 1;
  • FIG. 4 is a flow diagram showing the steps of a write-to-safe mode that preferably restores the factory-set protection program of FIG.
  • first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information without departing from the scope of the present disclosure.
  • second information may also be referred to as first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determination"
  • the drawback of the one-button erasure FRP partition function implemented by the mobile terminal is that if the password of the mobile terminal is not known, the system cannot be accessed, and thus the FRP partition cannot be erased. When the user forgets the password by himself but needs to clear the personal information in the smart terminal, it is difficult to implement.
  • a computer readable storage medium for data erasing is proposed. Referring to Figure 1, there is shown a flow diagram of the steps implemented when a computer program stored on a computer readable storage medium for data erasure is executed by a processor in accordance with a preferred embodiment of the present invention.
  • the steps implemented when the computer program is executed by the processor mainly include: S1: capturing a first operation instruction, starting a security mode; S2: selecting, in the security mode, selecting And enter the factory reset protection program; S3: in the factory reset protection program, select to erase the factory settings protection data; S4: capture a second operation instruction, input a password information; S5: comparing the password information with a preset password; S6: erasing and restoring the factory setting protection data when the password information matches the preset password.
  • the steps implemented when the computer program is executed by the processor are as follows:
  • the security mode is: Recovery mode, which is an Android mobile terminal backup function, and refers to a data that can be internal to the Android machine. Or the mode in which the system is modified (similar to windows PE or DOS). In this mode, the user can back up or upgrade the existing system, or restore the factory settings here.
  • the use of recovery is the same as the GHOST software on the computer, which plays a role in system backup and restoration. Of course, you can also upgrade the kernel, brush patches, and so on. Recovery is written in conjunction with the system baseband, and different baseband versions cannot be messed up. Enter the recovery interface, the user can directly use the zip format rom format on the sd card to upgrade (downgrade) the user's system.
  • the mobile terminal after the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
  • FIG. 2 it is a schematic flowchart of a step of automatically capturing a first operation instruction and starting a security mode according to the present invention.
  • the step of capturing a first operation instruction and starting the security mode is as follows:
  • the user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, further parse the operation
  • the operation instruction for example, acquiring a button position of the user, a button strength, and the like, and obtaining an operation content pointed by the operation instruction according to the parsed operation instruction, thereby further controlling the mobile terminal to enter the security mode.
  • the volume button is the cursor selection button, which can be used to move the cursor
  • the power button is the confirmation button.
  • the factory reset protection is a protection measure in the Android device developed by Google. Protect your device after it has been stolen or lost, preventing unauthorized users from logging in or using it.
  • Google In order to prevent user information from leaking after the mobile terminal is lost, Google requires that Android 5.1 and later versions need to have FRP function and be enabled by default. This security feature prevents unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is enabled, the user can perform the operation of clearing the user data by remotely logging in to the Google account to avoid leakage of information, and the method needs to be turned on after the factory is restored. The navigation verifies that the Google account that was last logged in can enter the system and use the mobile terminal normally. The user can control the FRP function to be turned on and off through the "Settings - Developer Options - Open OEM Unlock" menu. The OEM switch is off, indicating that the FRP function is on. When FRP is turned on, Secureboot cannot be unlocked, and the fastboot flash command cannot be executed.
  • the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal in a security mode, after the mobile terminal parses the operation instruction. And, according to the operation instruction, enter a reset factory setting protection program of the mobile terminal. Therefore, it is possible to realize the normal use of the factory reset protection program without logging into the Google account.
  • the user may implement an operation instruction by triggering a specific button on the mobile terminal to trigger the mobile terminal to perform an operation instruction, and the mobile terminal parses the After the operation instruction, the device can be selected to erase and restore the factory setting protection data according to the operation instruction.
  • a password request is sent, for example, by popping up a dialog box on the display screen of the mobile terminal.
  • the user inputs a password information to the mobile terminal by using a keyboard or the like of the mobile terminal, that is, sends a second operation instruction; after reading the password information input by the user, the mobile terminal converts the password information into one Computer-readable digital information, such as converting decimal numbers to binary digital information, etc., and sending them out.
  • the password information is an unlock code of the factory reset protection program.
  • FIG. 3 it is a flow diagram of a step corresponding to the unlock code of FIG. 1 that preferably obtains a factory reset protection program.
  • the method for acquiring the unlock code includes:
  • the International Mobile Equipment Identity is an abbreviation of the international mobile device identity code
  • the international mobile equipment identification code is an "electronic serial number" consisting of 15 digits, which is associated with each The phones correspond one-to-one, and the code is the only one in the world.
  • Each handset will be assigned a globally unique set of numbers after assembly, and this number will be recorded by the manufacturer of the manufacturing process from production to delivery.
  • IMEI is TAC+FAC+SNR+SP, and its composition is:
  • the first 6 digits is the "model approval number", which generally represents the model.
  • the subsequent 6-digit number is the "serial number", which generally represents the production sequence number.
  • SP last 1 digit
  • the IMEI code is attached to the logo on the back of the mobile phone (also stored in the mobile phone, which can be obtained by pressing "*#06#” on the mobile phone), and is read and written in the memory of the mobile phone. It is also the "file” and "identity number” of the mobile phone at the manufacturer.
  • the international mobile device identity code of the mobile terminal can be obtained by reading the identification information on the mobile terminal or by pressing “*#06#” on the mobile terminal.
  • the FRP unlocking code can be queried by the IMEI in the “Query Unlocking Code” function of the FRP unlocking tool, such as the ComPartner platform.
  • the mobile terminal after the mobile terminal captures a password information input by a user to the mobile terminal, the mobile terminal further further stores the password information with a pre-stored one in the mobile terminal.
  • the default password is correct.
  • the mobile terminal may obtain the rights erasure to restore the factory setting protection data.
  • the technical effect of bypassing the Google account password and one-click erasing the FRP partition data is realized.
  • FIG. 4 it is a flow diagram of a step in accordance with FIG. 1 which preferably restores the entry of the factory-set protection program to the security mode.
  • the proposed step of writing the entry of the factory reset protection program into the security mode includes:
  • the recovery.img is rewritten in the Linux environment, and the split_bootimg.zip file is downloaded.
  • the zip file contains a perl file, split_bootimg.pl script, which can read recovery.img and read the kernel and ramdisk. This script also outputs the kernel command line and board name.
  • Unpack recovery.img use mkbootfs tool to recreate ramdisk; use mkbootimg to recreate recovery-new.img, get a new recovery-new.img, and then brush into the third-party recovery method.
  • a recovery that satisfies the condition can be re-created and written into the original recovery, and the specific steps are as follows:
  • recovery.img-kernel is the new kernel
  • ramdisk-new.gz is the new memory disk
  • boot-new.img is the new img generated.
  • Boot.img or recovery.img packaged according to this method because of the base address and kernel parameters Both are correct and can be used directly on the mobile terminal.
  • a mobile terminal and a computer readable storage medium for data erasing are provided.
  • the invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
  • Another aspect of the present invention is to provide a mobile terminal including a memory, a processor, and a memory And a computer program executable on the processor, wherein the processor executes the computer program to implement the following steps:
  • S'1 capture a first operation instruction, start the security mode
  • S'2 in the security mode, select and enter the factory reset protection program
  • S'3 in the factory reset protection program, select to erase Restore factory setting protection data
  • S'4 capture a second operation instruction, input a password information
  • S'5 compare the password information with a preset password
  • S'6 when the password information and the location When the preset passwords match, the erase restores the factory settings protection data.
  • the security mode is: Recovery mode, which is an Android mobile terminal backup function, and refers to a data that can be internal to the Android machine. Or the mode in which the system is modified (similar to windows PE or DOS). In this mode, the user can back up or upgrade the existing system, or restore the factory settings here.
  • the use of recovery is the same as the GHOST software on the computer, which plays a role in system backup and restoration. Of course, you can also upgrade the kernel, brush patches, and so on. Recovery is written in conjunction with the system baseband, and different baseband versions cannot be messed up. Enter the recovery interface, the user can directly use the zip format rom format on the sd card to upgrade (downgrade) the user's system.
  • the mobile terminal after the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
  • the step of capturing a first operation instruction and starting the security mode is provided by:
  • the user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, further parse the operation
  • the operation instruction for example, acquiring a button position of the user, a button strength, and the like, and obtaining an operation content pointed by the operation instruction according to the parsed operation instruction, thereby further controlling the mobile terminal to enter the security mode.
  • the volume button is the cursor selection button, which can be used to move the cursor
  • the power button is the confirmation button.
  • the factory reset protection is a protection measure in the Android device developed by Google, which can be Protect the device after theft or loss, preventing unauthorized users from logging in or using it.
  • Google In order to prevent user information from leaking after the mobile terminal is lost, Google requires that Android 5.1 and later versions need to have FRP function and be enabled by default. This security feature prevents unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is enabled, the user can perform the operation of clearing the user data by remotely logging in to the Google account to avoid leakage of information, and the method needs to be turned on after the factory is restored. The navigation verifies that the Google account that was last logged in can enter the system and use the mobile terminal normally. The user can control the FRP function to be turned on and off through the "Settings - Developer Options - Open OEM Unlock" menu. The OEM switch is off, indicating that the FRP function is on. When FRP is turned on, Secureboot cannot be unlocked, and the fastboot flash command cannot be executed.
  • the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal in a security mode, and after the mobile terminal parses the operation instruction, According to the operation instruction, the factory reset protection program of the mobile terminal is entered. Therefore, it is possible to realize the normal use of the factory reset protection program without logging into the Google account.
  • the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal under the factory reset protection program, and after the mobile terminal parses the operation instruction, According to the operation instruction, select to erase and restore the factory setting protection data.
  • a password request is sent, for example, by popping up a dialog box in the display screen of the mobile terminal.
  • the user inputs a password information to the mobile terminal by using a keyboard or the like of the mobile terminal, that is, sends a second operation instruction; after reading the password information input by the user, the mobile terminal converts the password information into one Computer readable digital information, For example, convert a decimal number into binary digital information, etc., and send it out.
  • the password information is an unlock code of the factory reset protection program.
  • the method for acquiring the unlock code includes:
  • the International Mobile Equipment Identity is an abbreviation of the international mobile device identity code
  • the international mobile equipment identification code is an "electronic serial number" consisting of 15 digits, which is associated with each The phones correspond one-to-one, and the code is the only one in the world.
  • Each handset will be assigned a globally unique set of numbers after assembly, and this number will be recorded by the manufacturer of the manufacturing process from production to delivery.
  • IMEI is TAC+FAC+SNR+SP, and its composition is:
  • the first 6 digits is the "model approval number", which generally represents the model.
  • the subsequent 6-digit number is the "serial number", which generally represents the production sequence number.
  • SP last 1 digit
  • the IMEI code is attached to the logo on the back of the mobile phone (also stored in the mobile phone, which can be obtained by pressing "*#06#” on the mobile phone), and is read and written in the memory of the mobile phone. It is also the "file” and "identity number” of the mobile phone at the manufacturer.
  • the international mobile device identity code of the mobile terminal can be obtained by reading the identification information on the mobile terminal or by pressing “*#06#” on the mobile terminal.
  • the FRP unlocking code can be queried by the IMEI in the "Query Unlocking Code" function of the FRP unlocking tool, such as the ComPartner platform.
  • the mobile terminal after the mobile terminal captures a password information input by the user to the mobile terminal, the mobile terminal further compares the password information with a preset password pre-stored in the mobile terminal. Correct.
  • the mobile terminal may obtain the rights erasure restoration factory setting protection data.
  • the technical effect of bypassing the Google account password and one-click erasing the FRP partition data is realized.
  • the proposed step of writing the entry of the factory reset protection program into the security mode includes:
  • the recovery.img is rewritten in the Linux environment, and the split_bootimg.zip file is downloaded.
  • the zip file contains a perl file, split_bootimg.pl script, which can read recovery.img and read the kernel and ramdisk. This script also outputs the kernel command line and board name.
  • Unpack recovery.img use mkbootfs tool to recreate ramdisk; use mkbootimg to recreate recovery-new.img, get a new recovery-new.img, and then brush into the third-party recovery method.
  • a recovery that satisfies the condition can be re-created and written into the original recovery, and the specific steps are as follows:
  • recovery.img-kernel is the new kernel
  • ramdisk-new.gz is the new memory disk
  • boot-new.img is the new img generated.
  • Boot.img or recovery.img packaged according to this method because of the base address and kernel parameters Both are correct and can be used directly on the mobile terminal.
  • a mobile terminal in the present invention, writes the entry of the FRP into the recovery mode of the mobile terminal, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

A mobile terminal, and a computer readable storage medium for data wiping, said computer readable storage medium storing therein a computer program, which, when being executed by a processor, causes the following steps to be implemented: capturing a first operation instruction to start a security mode; in the security mode, selecting and entering a factory reset protection (FRP) program; in the FRP program, selecting and wiping FRP data; capturing a second operation instruction, to input password information; comparing the password information with a preset password; and when the password information matches the preset password, wiping the FRP data. According to the present application, the entry of the FRP is written into a recovery mode, and a user can wipe the personal information data in an FRP partition by inputting a correct FRP password in the recovery mode.

Description

一种移动终端及用于数据擦除的计算机可读存储介质Mobile terminal and computer readable storage medium for data erasing 技术领域Technical field
本发明涉及移动终端中的数据擦除的技术领域,尤其涉及一种移动终端及用于数据擦除的计算机可读存储介质。The present invention relates to the field of data erasure in mobile terminals, and more particularly to a mobile terminal and a computer readable storage medium for data erasure.
背景技术Background technique
恢复出厂设置保护(FRP,Factory Reset Protection),是谷歌开发的安卓设备中的一种保护措施,可以在设备被盗、丢失后保护设备,防止未经授权的用户登录或使用。如果电子设备运行的是安卓OS 5.1或更高版本,在此设备上登陆了谷歌账户并启动FRP锁后,相关账户信息会储存在一个独立的分区中。如果用户移动终端丢失、被盗,用户自己非正常刷机,或者恢复出厂设置,在重新启动设备后,需要填写其谷歌账户的信息来完成开机引导程序。如果忘记账户密码,移动终端就不能激活进入界面。同时,用户还可以通过擦除FRP分区中的数据来清除用户的个人信息。Factory Reset Protection (FRP) is a protection measure in Android devices developed by Google that protects devices after they are stolen or lost, preventing unauthorized users from logging in or using them. If the electronic device is running Android OS 5.1 or higher, after logging in to the Google account and launching the FRP lock on this device, the relevant account information will be stored in a separate partition. If the user's mobile terminal is lost or stolen, the user does not normally brush the machine, or restores the factory settings, after restarting the device, you need to fill in the information of its Google account to complete the boot process. If the account password is forgotten, the mobile terminal cannot activate the entry interface. At the same time, the user can also clear the user's personal information by erasing the data in the FRP partition.
但是,现有技术中,移动终端实现的一键擦除FRP分区功能的弊端是如果不知道移动终端的密码也就进不去系统,因此也就无法擦除FRP分区。当用户自身忘记密码,但是需要清除智能终端中的个人信息时,难以实现。However, in the prior art, the drawback of the one-button erase FRP partition function implemented by the mobile terminal is that if the password of the mobile terminal is not known, the system cannot be erased, and thus the FRP partition cannot be erased. When the user forgets the password by himself but needs to clear the personal information in the smart terminal, it is difficult to implement.
发明内容Summary of the invention
为解决上述问题,本发明提出一种移动终端及用于数据擦除的计算机可读存储介质。本发明将FRP的入口写入recovery模式中,用户可以在recovery模式中,通过输入正确的FRP密码,实现擦除FRP分区中的个人信息数据。To solve the above problems, the present invention provides a mobile terminal and a computer readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
具体地,一种用于数据擦除的计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现以下步骤:捕获一第一操作指令,启动安全模式,在所述安全模式下,选择并进入恢复出厂设置保护程序,在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据,捕获一第二操作指令,输入一密码信息,将所述密码信息与一预设密码进行比较,当所述密码信息与所述预设密码相匹配时,擦除恢复出厂设置保护数据。 Specifically, a computer readable storage medium for data erasing, on which a computer program is stored, wherein when the computer program is executed by a processor, the following steps are implemented: capturing a first operation instruction, starting security Mode, in the safe mode, selecting and entering the factory reset protection program, in the factory reset protection program, selecting to erase the factory reset protection data, capturing a second operation instruction, inputting a password information, The password information is compared with a preset password, and when the password information matches the preset password, the factory reset protection data is erased.
优选地,捕获一第一操作指令,启动安全模式的步骤包括,捕获一对移动终端输入的操作指令,解析所述操作指令,获得一操作内容,根据所述操作内容,控制所述移动终端进入安全模式。Preferably, capturing a first operation instruction, the step of starting the security mode comprises: capturing an operation instruction input by the pair of mobile terminals, parsing the operation instruction, obtaining an operation content, and controlling the mobile terminal to enter according to the operation content Safe mode.
优选地,所述密码信息为所述恢复出厂设置保护程序的解锁码。Preferably, the password information is an unlock code of the factory reset protection program.
优选地,所述解锁码的获取方法包括,读取移动终端的国际移动设备身份码,根据所述国际移动设备身份码检索所述移动终端的恢复出厂设置保护程序的解锁码。Preferably, the acquiring method of the unlocking code comprises: reading an international mobile device identity code of the mobile terminal, and retrieving an unlocking code of the mobile terminal's factory reset protection program according to the international mobile device identity code.
优选地,所述计算机程序被处理器执行时还实现以下步骤,解析安全模式,获得设置权限,将恢复出厂设置保护程序的入口写入安全模式中。Preferably, when the computer program is executed by the processor, the following steps are further implemented, the security mode is parsed, the setting authority is obtained, and the entry of the factory reset protection program is written into the security mode.
优选地,一种移动终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现以下步骤:捕获一第一操作指令,启动安全模式,在所述安全模式下,选择并进入恢复出厂设置保护程序,在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据,捕获一第二操作指令,输入一密码信息,将所述密码信息与一预设密码进行比较,当所述密码信息与所述预设密码相匹配时,擦除恢复出厂设置保护数据。Preferably, a mobile terminal includes a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the following steps: capturing a first An operation command starts a safety mode, in which the selection and enters a factory reset protection program, in the factory reset protection program, selects an erase factory reset protection data, captures a second operation instruction, and inputs a The password information compares the password information with a preset password, and when the password information matches the preset password, erasing and restoring the factory setting protection data.
优选地,捕获一第一操作指令,启动安全模式的步骤包括,捕获一对移动终端输入的操作指令,解析所述操作指令,获得一操作内容,根据所述操作内容,控制所述移动终端进入安全模式。Preferably, capturing a first operation instruction, the step of starting the security mode comprises: capturing an operation instruction input by the pair of mobile terminals, parsing the operation instruction, obtaining an operation content, and controlling the mobile terminal to enter according to the operation content Safe mode.
优选地,所述密码信息为所述恢复出厂设置保护程序的解锁码。Preferably, the password information is an unlock code of the factory reset protection program.
优选地,所述解锁码的获取方法包括,读取移动终端的国际移动设备身份码,根据所述国际移动设备身份码检索所述移动终端的恢复出厂设置保护程序的解锁码。Preferably, the acquiring method of the unlocking code comprises: reading an international mobile device identity code of the mobile terminal, and retrieving an unlocking code of the mobile terminal's factory reset protection program according to the international mobile device identity code.
优选地,所述处理器执行所述计算机程序时实现以下步骤,解析安全模式,获得设置权限,将恢复出厂设置保护程序的入口写入安全模式中。Preferably, when the processor executes the computer program, the following steps are implemented, the security mode is parsed, the setting authority is obtained, and the entry of the factory reset protection program is written into the security mode.
与现有技术相比较,本发明的技术优势在于:本发明提出一种移动终端及用于数据擦除的计算机可读存储介质。本发明将FRP的入口写入recovery模式中,用户可以在recovery模式中,通过输入正确的FRP密码,实现擦除FRP分区中的个人信息数据。Compared with the prior art, the technical advantage of the present invention is that the present invention proposes a mobile terminal and a computer readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
附图说明DRAWINGS
图1为一符合本发明一优选实施例的用于数据擦除的计算机可读存储介质上存储的计算机程序被处理器执行时实现的步骤的流程示意图;1 is a flow chart showing the steps implemented when a computer program stored on a computer readable storage medium for data erasure is executed by a processor in accordance with a preferred embodiment of the present invention;
图2为一符合本发明一优选地捕获一第一操作指令,启动安全模式的步骤的流程示意图; 2 is a flow chart showing a step of automatically capturing a first operation command and starting a security mode in accordance with the present invention;
图3为一符合图1中一优选地获取恢复出厂设置保护程序的解锁码的步骤的流程示意图;3 is a flow chart showing a step of obtaining an unlock code of the factory reset protection program in accordance with FIG. 1;
图4为一符合图1中一优选地将恢复出厂设置保护程序的入口写入安全模式的步骤的流程示意图。4 is a flow diagram showing the steps of a write-to-safe mode that preferably restores the factory-set protection program of FIG.
具体实施方式Detailed ways
下面结合附图及具体实施例,详细阐述本发明的优势。The advantages of the present invention are explained in detail below with reference to the accompanying drawings and specific embodiments.
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. The following description refers to the same or similar elements in the different figures unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present disclosure. Instead, they are merely examples of devices and methods consistent with aspects of the present disclosure as detailed in the appended claims.
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。The terms used in the present disclosure are for the purpose of describing particular embodiments only, and are not intended to limit the disclosure. The singular forms "a", "the" and "the" It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”It should be understood that although the terms first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, the first information may also be referred to as second information without departing from the scope of the present disclosure. Similarly, the second information may also be referred to as first information. Depending on the context, the word "if" as used herein may be interpreted as "when" or "when" or "in response to determination"
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本发明的说明,其本身并没有特定的意义。因此,“模块”与“部件”可以混合地使用。In the following description, the use of suffixes such as "module", "component" or "unit" for indicating an element is merely an explanation for facilitating the present invention, and does not have a specific meaning per se. Therefore, "module" and "component" can be used in combination.
现有技术中,移动终端实现的一键擦除FRP分区功能的弊端是如果不知道移动终端的密码也就进不去系统,因此也就无法擦除FRP分区。当用户自身忘记密码,但是需要清除智能终端中的个人信息时,难以实现。In the prior art, the drawback of the one-button erasure FRP partition function implemented by the mobile terminal is that if the password of the mobile terminal is not known, the system cannot be accessed, and thus the FRP partition cannot be erased. When the user forgets the password by himself but needs to clear the personal information in the smart terminal, it is difficult to implement.
为解决上述问题,本发明一方面,提出一种用于数据擦除的计算机可读存储介质。查阅图1,其为一符合本发明一优选实施例的用于数据擦除的计算机可读存储介质上存储的计算机程序被处理器执行时实现的步骤的流程示意图。从图中可以看出,本实施例中,所述计算机程序被处理器执行时实现的步骤主要包括:S1:捕获一第一操作指令,启动安全模式;S2:在所述安全模式下,选择并进入恢复出厂设置保护程序;S3:在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据;S4:捕获一第二操作指令,输入 一密码信息;S5:将所述密码信息与一预设密码进行比较;S6:当所述密码信息与所述预设密码相匹配时,擦除恢复出厂设置保护数据。In order to solve the above problems, in one aspect of the invention, a computer readable storage medium for data erasing is proposed. Referring to Figure 1, there is shown a flow diagram of the steps implemented when a computer program stored on a computer readable storage medium for data erasure is executed by a processor in accordance with a preferred embodiment of the present invention. As can be seen from the figure, in the embodiment, the steps implemented when the computer program is executed by the processor mainly include: S1: capturing a first operation instruction, starting a security mode; S2: selecting, in the security mode, selecting And enter the factory reset protection program; S3: in the factory reset protection program, select to erase the factory settings protection data; S4: capture a second operation instruction, input a password information; S5: comparing the password information with a preset password; S6: erasing and restoring the factory setting protection data when the password information matches the preset password.
其中,具体地,本实施例中,所述计算机程序被处理器执行时实现的步骤如下:Specifically, in this embodiment, the steps implemented when the computer program is executed by the processor are as follows:
S1:捕获一第一操作指令,启动安全模式S1: Capture a first operation instruction to start the safe mode
优选地,当所述的移动终端为搭载安卓(Android)系统的移动终端时,所述的安全模式为:Recovery模式,是Android移动终端备份功能,指的是一种可以对安卓机内部的数据或系统进行修改的模式(类似于windows PE或DOS)。在这个模式下用户可以对已有的系统进行备份或升级,也可以在此恢复出厂设置。recovery的使用原理就和电脑上的GHOST软件一样,起到系统备份与还原作用。当然也可以升级内核,刷补丁等。recovery的编写是和系统基带联系在一起的,不同的基带版本不能乱刷。进入recovery界面,用户可以直接用sd卡上的zip格式的rom升(降)级(备份)用户的系统。Preferably, when the mobile terminal is a mobile terminal equipped with an Android system, the security mode is: Recovery mode, which is an Android mobile terminal backup function, and refers to a data that can be internal to the Android machine. Or the mode in which the system is modified (similar to windows PE or DOS). In this mode, the user can back up or upgrade the existing system, or restore the factory settings here. The use of recovery is the same as the GHOST software on the computer, which plays a role in system backup and restoration. Of course, you can also upgrade the kernel, brush patches, and so on. Recovery is written in conjunction with the system baseband, and different baseband versions cannot be messed up. Enter the recovery interface, the user can directly use the zip format rom format on the sd card to upgrade (downgrade) the user's system.
从而,本实施例中,当用户触发移动终端,并向所述移动终端发送一操作指令后,所述移动终端根据所述操作指令,进入所述移动终端的安全模式。Therefore, in this embodiment, after the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
其中,优选地,参阅图2,其为一符合本发明一优选地捕获一第一操作指令,启动安全模式的步骤的流程示意图。从图中可以看出,本实施例中,所提供的捕获一第一操作指令,启动安全模式的步骤包括:Preferably, referring to FIG. 2, it is a schematic flowchart of a step of automatically capturing a first operation instruction and starting a security mode according to the present invention. As can be seen from the figure, in the embodiment, the step of capturing a first operation instruction and starting the security mode is as follows:
-捕获一对移动终端输入的操作指令- Capture operation instructions input by a pair of mobile terminals
-解析所述操作指令,获得一操作内容- parsing the operation instruction to obtain an operation content
-根据所述操作内容,控制所述移动终端进入安全模式Controlling the mobile terminal to enter a safe mode according to the operation content
可见,本实施例中,用户可以通过按动所述移动终端上的特定功能键的形式,向所述移动终端输入一操作指令;所述移动终端感应到所述操作指令后,进一步解析所述操作指令,如,获取用户的按键位置,按键力度等,并根据解析后的操作指令获得所述操作指令指向的操作内容,从而,进一步控制所述移动终端进入安全模式。It can be seen that, in this embodiment, the user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, further parse the operation The operation instruction, for example, acquiring a button position of the user, a button strength, and the like, and obtaining an operation content pointed by the operation instruction according to the parsed operation instruction, thereby further controlling the mobile terminal to enter the security mode.
其中,更加优选地,本实施例中,进入recovery的方法:Wherein, more preferably, in this embodiment, the method of entering recovery:
1、将移动终端完全关机后,按住音量键下(上)+电源键,进入bootloader界面;1. After the mobile terminal is completely shut down, press and hold the volume button (up) + power button to enter the bootloader interface;
2、按音量键将光标移动到recovery那一行;2. Press the volume button to move the cursor to the recovery line;
3、按电源键,之后移动终端会自动重启进入recovery模式。3. Press the power button, then the mobile terminal will automatically restart into the recovery mode.
其中,音量键为光标选择键,可以用来移动光标,电源键则是确认键。Among them, the volume button is the cursor selection button, which can be used to move the cursor, and the power button is the confirmation button.
S2:在所述安全模式下,选择并进入恢复出厂设置保护程序S2: in the safe mode, select and enter the factory reset protection program
优选地,当所述的移动终端为搭载安卓(Android)系统的移动终端时,恢复出厂设置保护(FRP,Factory Reset Protection),为谷歌开发的安卓设备中的一种保护措施,可 以在设备被盗、丢失后保护设备,防止未经授权的用户登录或使用。Preferably, when the mobile terminal is a mobile terminal equipped with an Android system, the factory reset protection (FRP, Factory Reset Protection) is a protection measure in the Android device developed by Google. Protect your device after it has been stolen or lost, preventing unauthorized users from logging in or using it.
为防止用户信息在移动终端丢失后外泄,Google要求Android 5.1版本及以后版本都需要具备FRP功能且默认开启。此安全特性可以防止未经授权的用户登陆或使用设备。例如,若移动终端丢失或被盗,只要FRP功能处于使能状态,用户可以通过远程登陆Google账户的方式进行清除用户数据的操作,避免信息外泄,且经过此方法进行恢复出厂后需要在开机导航验证最近一次登陆过的Google账户才可进入系统,并正常使用移动终端。用户可以通过“设置-开发者选项-开启OEM解锁”菜单控制FRP功能的开启和关闭,OEM开关处于关闭状态,代表FRP功能为开启状态。FRP开启时,Secureboot不能解锁,fastboot刷机命令不能执行。In order to prevent user information from leaking after the mobile terminal is lost, Google requires that Android 5.1 and later versions need to have FRP function and be enabled by default. This security feature prevents unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is enabled, the user can perform the operation of clearing the user data by remotely logging in to the Google account to avoid leakage of information, and the method needs to be turned on after the factory is restored. The navigation verifies that the Google account that was last logged in can enter the system and use the mobile terminal normally. The user can control the FRP function to be turned on and off through the "Settings - Developer Options - Open OEM Unlock" menu. The OEM switch is off, indicating that the FRP function is on. When FRP is turned on, Secureboot cannot be unlocked, and the fastboot flash command cannot be executed.
现有技术中,FRP基本功能的使用方法及步骤包括:FRP使用=支持FRP+开启FRP+存在Google账号,其步骤为:a.进入设置->开发者选项->OEM解锁,关闭“OEM解锁”开关(开启FRP);b.测试机连接VPN,登陆Google账户(存在Google账号);c.设置锁屏密码。可见,现有技术中,用户只有在具有且知道Google账户及其密码的情况下才可实现对FRP中的数据进行处理。In the prior art, the method and steps of using the basic functions of the FRP include: FRP use = support FRP + open FRP + existing Google account, the steps are: a. Go to Settings -> Developer Options -> OEM Unlock, close the "OEM Unlock" switch (Open FRP); b. Test machine to connect to VPN, login to Google account (there is a Google account); c. Set the lock screen password. It can be seen that in the prior art, the user can process the data in the FRP only if he has and knows the Google account and its password.
继续参阅图1,本实施例中,用户可以实现在安全模式下,通过触发所述移动终端上特定按钮的形式,向所述移动终端发送一操作指令,所述移动终端解析所述操作指令后,可以按照所述操作指令,进入所述移动终端的恢复出厂设置保护程序。从而,实现不用登陆Google账户的情况下,实现正常使用恢复出厂设置保护程序。With reference to FIG. 1 , in this embodiment, the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal in a security mode, after the mobile terminal parses the operation instruction. And, according to the operation instruction, enter a reset factory setting protection program of the mobile terminal. Therefore, it is possible to realize the normal use of the factory reset protection program without logging into the Google account.
S3:在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据S3: In the factory reset protection program, select Erase and restore the factory settings protection data.
继续参阅图1,本实施例中,用户可以实现在恢复出厂设置保护程序下,通过触发所述移动终端上特定按钮的形式,向所述移动终端发送一操作指令,所述移动终端解析所述操作指令后,可以按照所述操作指令,选择擦除恢复出厂设置保护数据。With continued reference to FIG. 1 , in this embodiment, the user may implement an operation instruction by triggering a specific button on the mobile terminal to trigger the mobile terminal to perform an operation instruction, and the mobile terminal parses the After the operation instruction, the device can be selected to erase and restore the factory setting protection data according to the operation instruction.
S4:捕获一第二操作指令,输入一密码信息S4: Capture a second operation instruction, input a password information
继续参阅图1,本实施例中,所述移动终端感应用户选择擦除恢复出厂设置保护数据后,将,如通过在所述移动终端的显示屏幕中弹出一对话框的形式,发出一密码请求。用户借助所述移动终端的键盘等,向所述移动终端输入一密码信息,也即发送一第二操作指令;所述移动终端读取用户输入的密码信息后,将所述密码信息转换为一计算机可读的数字信息,如将十进制的数字转换为二进制数字信息等,并向外发送。With reference to FIG. 1, in this embodiment, after the mobile terminal senses that the user selects to erase the factory reset protection data, a password request is sent, for example, by popping up a dialog box on the display screen of the mobile terminal. . The user inputs a password information to the mobile terminal by using a keyboard or the like of the mobile terminal, that is, sends a second operation instruction; after reading the password information input by the user, the mobile terminal converts the password information into one Computer-readable digital information, such as converting decimal numbers to binary digital information, etc., and sending them out.
具体地,所述密码信息为所述恢复出厂设置保护程序的解锁码。Specifically, the password information is an unlock code of the factory reset protection program.
更加优选地,参阅图3,其为一符合图1中一优选地获取恢复出厂设置保护程序的解锁码的步骤的流程示意图。从图中可以看出,本实施例中,所述解锁码的获取方法包括: More preferably, referring to FIG. 3, it is a flow diagram of a step corresponding to the unlock code of FIG. 1 that preferably obtains a factory reset protection program. As shown in the figure, in this embodiment, the method for acquiring the unlock code includes:
-读取移动终端的国际移动设备身份码- reading the mobile device's international mobile device identity code
本实施例中,国际移动设备身份码(IMEI,International Mobile Equipment Identity)是国际移动设备身份码的缩写,国际移动装备辨识码,是由15位数字组成的"电子串号",它与每台手机一一对应,而且该码是全世界唯一的。每一只手机在组装完成后都将被赋予一个全球唯一的一组号码,这个号码从生产到交付使用都将被制造生产的厂商所记录。In this embodiment, the International Mobile Equipment Identity (IMEI) is an abbreviation of the international mobile device identity code, and the international mobile equipment identification code is an "electronic serial number" consisting of 15 digits, which is associated with each The phones correspond one-to-one, and the code is the only one in the world. Each handset will be assigned a globally unique set of numbers after assembly, and this number will be recorded by the manufacturer of the manufacturing process from production to delivery.
IMEI为TAC+FAC+SNR+SP,其组成为:IMEI is TAC+FAC+SNR+SP, and its composition is:
1、前6位数(TAC)是"型号核准号码",一般代表机型。1. The first 6 digits (TAC) is the "model approval number", which generally represents the model.
2、接着的2位数(FAC)是"最后装配号",一般代表产地。2. The next 2 digits (FAC) is the "final assembly number", which generally represents the place of origin.
3、之后的6位数(SNR)是"串号",一般代表生产顺序号。3. The subsequent 6-digit number (SNR) is the "serial number", which generally represents the production sequence number.
4、最后1位数(SP)通常是"0",为检验码,目前暂备用。4. The last 1 digit (SP) is usually "0", which is the check code and is currently reserved.
IMEI码贴在移动电话机背面的标志上(也存储于手机内,可通过在移动电话机上按“*#06#”获得),并且读写于移动电话机内存中。它也是该移动电话机在厂家的"档案"和"身份证号"。The IMEI code is attached to the logo on the back of the mobile phone (also stored in the mobile phone, which can be obtained by pressing "*#06#" on the mobile phone), and is read and written in the memory of the mobile phone. It is also the "file" and "identity number" of the mobile phone at the manufacturer.
从而,本实施例中,可以通过读取移动终端上的标识信息或者通过移动终端上按“*#06#”获得所述移动终端的国际移动设备身份码。Therefore, in this embodiment, the international mobile device identity code of the mobile terminal can be obtained by reading the identification information on the mobile terminal or by pressing “*#06#” on the mobile terminal.
-根据所述国际移动设备身份码检索所述移动终端的恢复出厂设置保护程序的解锁码Retrieving an unlock code of the factory-set protection program of the mobile terminal according to the international mobile device identity code
继续参阅图3,本实施例中,可以借助FRP解锁工具,如ComPartner平台,的“查询解锁码”功能中用IMEI查询到FRP解锁码。Continuing to refer to FIG. 3, in this embodiment, the FRP unlocking code can be queried by the IMEI in the “Query Unlocking Code” function of the FRP unlocking tool, such as the ComPartner platform.
S5:将所述密码信息与一预设密码进行比较S5: comparing the password information with a preset password
继续参阅图1,本实施中,当所述移动终端捕获一用户对所述移动终端输入的一密码信息后,所述移动终端将进一步将所述密码信息与所述移动终端中预先存储的一预设密码相比对。With continued reference to FIG. 1, in this implementation, after the mobile terminal captures a password information input by a user to the mobile terminal, the mobile terminal further further stores the password information with a pre-stored one in the mobile terminal. The default password is correct.
S6:当所述密码信息与所述预设密码相匹配时,擦除恢复出厂设置保护数据S6: when the password information matches the preset password, erasing and restoring the factory setting protection data
继续参阅图1,本实施例中,当所述移动终端比较结果为所述密码信息与所述预设密码相匹配时,所述移动终端可以获得权限擦除恢复出厂设置保护数据。从而,实现绕过谷歌账号密码,一键擦除FRP分区数据的技术效果。With continued reference to FIG. 1, in this embodiment, when the comparison result of the mobile terminal is that the password information matches the preset password, the mobile terminal may obtain the rights erasure to restore the factory setting protection data. Thus, the technical effect of bypassing the Google account password and one-click erasing the FRP partition data is realized.
优选地,参阅图4,其为一符合图1中一优选地将恢复出厂设置保护程序的入口写入安全模式的步骤的流程示意图。从图中可以看出,本实施例中,所提出的将恢复出厂设置保护程序的入口写入安全模式的步骤包括:Preferably, referring to FIG. 4, it is a flow diagram of a step in accordance with FIG. 1 which preferably restores the entry of the factory-set protection program to the security mode. As can be seen from the figure, in the embodiment, the proposed step of writing the entry of the factory reset protection program into the security mode includes:
-启动安全模式的设置权限; - Start setting security mode permissions;
-将恢复出厂设置保护程序的入口写入安全模式中。- Write the entry to the factory reset protector to safe mode.
具体地,还是在linux环境下改写recovery.img,下载split_bootimg.zip文件,在此zip文件中包含一个perl文件,split_bootimg.pl脚本,该脚本可以读取recovery.img,将kernel和ramdisk读取出来,此脚本也会输出内核命令行和板子名字。解包recovery.img;使用mkbootfs工具来重新创建ramdisk;使用mkbootimg来重新创建recovery-new.img,得到了一个新的recovery-new.img,然后刷入第三方recovery的方法刷入即可。Specifically, the recovery.img is rewritten in the Linux environment, and the split_bootimg.zip file is downloaded. The zip file contains a perl file, split_bootimg.pl script, which can read recovery.img and read the kernel and ramdisk. This script also outputs the kernel command line and board name. Unpack recovery.img; use mkbootfs tool to recreate ramdisk; use mkbootimg to recreate recovery-new.img, get a new recovery-new.img, and then brush into the third-party recovery method.
其中,优选地,本实施例中,可重新制作一满足条件的recovery,并写入原recovery中,具体步骤如下:Preferably, in this embodiment, a recovery that satisfies the condition can be re-created and written into the original recovery, and the specific steps are as follows:
1.从官方包,解压出原生的recovery.img;1. From the official package, extract the native recovery.img;
2.解出原生recovery包的内核recovery.img-kernel和ramdisk内存镜像,再把ramdisk内存镜像解包;2. Solve the kernel recovery.img-kernel and ramdisk memory image of the original recovery package, and then unpack the ramdisk memory image;
3.找到合适的功能比较好的第三方recovery包,比如以G6的recovery-clockwork-5.0.2.0.img为例,同样解出其内核kernel和ramdisk内存镜像,再把ramdisk内存镜像解包;3. Find a suitable third-party recovery package with good function. For example, take G6's recovery-clockwork-5.0.2.0.img as an example, and also solve the kernel kernel and ramdisk memory image, and then unpack the ramdisk memory image;
4.准备新recovery的内核,本实施例中,使用官方原生包的recovery.img-kernel,只有原生的内核才能跟移动终端的硬件匹配;4. Prepare the kernel of the new recovery. In this embodiment, the recovery.img-kernel of the official native package is used, and only the native kernel can match the hardware of the mobile terminal;
5.修改ramdisk内存盘,5. Modify the ramdisk memory disk,
6.按照上面打包ramdisk的方法打包新改的ramdisk内存盘;6. Pack the newly modified ramdisk memory disk according to the method of packing the ramdisk above;
7.按照上面打包img的方法打包生成新的recovery-new.img;7. According to the above package img method package to generate a new recovery-new.img;
8.将新的recovery-new.img刷入手机;8. Brush the new recovery-new.img into the phone;
9.打开手机原生的recovery.img,对比来两个文件的文件头,把原生的前16行(000h-100h)复制到新的recovery上覆盖。9. Open the phone's native recovery.img, compare the file headers of the two files, and copy the original first 16 lines (000h-100h) to the new recovery.
10.最后把新的recovery-new.img,第二行的前三个字节改回到刚才记下的三个值,保存。10. Finally, the new recovery-new.img, the first three bytes of the second line are changed back to the three values just recorded, and saved.
其中recovery.img-kernel为新内核;ramdisk-new.gz为新的内存盘;boot-new.img为生成的新img.按照此方法打包的boot.img或recovery.img因为基址和内核参数都正确可以直接移动终端上使用。Where recovery.img-kernel is the new kernel; ramdisk-new.gz is the new memory disk; boot-new.img is the new img generated. Boot.img or recovery.img packaged according to this method because of the base address and kernel parameters Both are correct and can be used directly on the mobile terminal.
综上所述,本发明中,提供一种移动终端及用于数据擦除的计算机可读存储介质。本发明将FRP的入口写入recovery模式中,用户可以在recovery模式中,通过输入正确的FRP密码,实现擦除FRP分区中的个人信息数据。In summary, in the present invention, a mobile terminal and a computer readable storage medium for data erasing are provided. The invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
本发明的另一方面在于,提供一种移动终端,包括存储器、处理器及存储在存储器 上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现以下步骤:Another aspect of the present invention is to provide a mobile terminal including a memory, a processor, and a memory And a computer program executable on the processor, wherein the processor executes the computer program to implement the following steps:
S’1:捕获一第一操作指令,启动安全模式;S’2:在所述安全模式下,选择并进入恢复出厂设置保护程序;S’3:在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据;S’4:捕获一第二操作指令,输入一密码信息;S’5:将所述密码信息与一预设密码进行比较;S’6:当所述密码信息与所述预设密码相匹配时,擦除恢复出厂设置保护数据。S'1: capture a first operation instruction, start the security mode; S'2: in the security mode, select and enter the factory reset protection program; S'3: in the factory reset protection program, select to erase Restore factory setting protection data; S'4: capture a second operation instruction, input a password information; S'5: compare the password information with a preset password; S'6: when the password information and the location When the preset passwords match, the erase restores the factory settings protection data.
其中,具体地,本实施例中,所述处理器执行所述计算机程序时实现以下步骤:Specifically, in this embodiment, when the processor executes the computer program, the following steps are implemented:
S’1:捕获一第一操作指令,启动安全模式S’1: Capture a first operation command to start safe mode
优选地,当所述的移动终端为搭载安卓(Android)系统的移动终端时,所述的安全模式为:Recovery模式,是Android移动终端备份功能,指的是一种可以对安卓机内部的数据或系统进行修改的模式(类似于windows PE或DOS)。在这个模式下用户可以对已有的系统进行备份或升级,也可以在此恢复出厂设置。recovery的使用原理就和电脑上的GHOST软件一样,起到系统备份与还原作用。当然也可以升级内核,刷补丁等。recovery的编写是和系统基带联系在一起的,不同的基带版本不能乱刷。进入recovery界面,用户可以直接用sd卡上的zip格式的rom升(降)级(备份)用户的系统。Preferably, when the mobile terminal is a mobile terminal equipped with an Android system, the security mode is: Recovery mode, which is an Android mobile terminal backup function, and refers to a data that can be internal to the Android machine. Or the mode in which the system is modified (similar to windows PE or DOS). In this mode, the user can back up or upgrade the existing system, or restore the factory settings here. The use of recovery is the same as the GHOST software on the computer, which plays a role in system backup and restoration. Of course, you can also upgrade the kernel, brush patches, and so on. Recovery is written in conjunction with the system baseband, and different baseband versions cannot be messed up. Enter the recovery interface, the user can directly use the zip format rom format on the sd card to upgrade (downgrade) the user's system.
从而,本实施例中,当用户触发移动终端,并向所述移动终端发送一操作指令后,所述移动终端根据所述操作指令,进入所述移动终端的安全模式。Therefore, in this embodiment, after the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
其中,优选地,本实施例中,所提供的捕获一第一操作指令,启动安全模式的步骤包括:Preferably, in this embodiment, the step of capturing a first operation instruction and starting the security mode is provided by:
-捕获一对移动终端输入的操作指令- Capture operation instructions input by a pair of mobile terminals
-解析所述操作指令,获得一操作内容- parsing the operation instruction to obtain an operation content
-根据所述操作内容,控制所述移动终端进入安全模式Controlling the mobile terminal to enter a safe mode according to the operation content
可见,本实施例中,用户可以通过按动所述移动终端上的特定功能键的形式,向所述移动终端输入一操作指令;所述移动终端感应到所述操作指令后,进一步解析所述操作指令,如,获取用户的按键位置,按键力度等,并根据解析后的操作指令获得所述操作指令指向的操作内容,从而,进一步控制所述移动终端进入安全模式。It can be seen that, in this embodiment, the user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, further parse the operation The operation instruction, for example, acquiring a button position of the user, a button strength, and the like, and obtaining an operation content pointed by the operation instruction according to the parsed operation instruction, thereby further controlling the mobile terminal to enter the security mode.
其中,更加优选地,本实施例中,进入recovery的方法:Wherein, more preferably, in this embodiment, the method of entering recovery:
1、将移动终端完全关机后,按住音量键下(上)+电源键,进入bootloader界面;1. After the mobile terminal is completely shut down, press and hold the volume button (up) + power button to enter the bootloader interface;
2、按音量键将光标移动到recovery那一行;2. Press the volume button to move the cursor to the recovery line;
3、按电源键,之后移动终端会自动重启进入recovery模式。 3. Press the power button, then the mobile terminal will automatically restart into the recovery mode.
其中,音量键为光标选择键,可以用来移动光标,电源键则是确认键。Among them, the volume button is the cursor selection button, which can be used to move the cursor, and the power button is the confirmation button.
S’2:在所述安全模式下,选择并进入恢复出厂设置保护程序S’2: in the safe mode, select and enter the factory reset protection program
优选地,当所述的移动终端为搭载安卓(Android)系统的移动终端时,恢复出厂设置保护(FRP,Factory Reset Protection),为谷歌开发的安卓设备中的一种保护措施,可以在设备被盗、丢失后保护设备,防止未经授权的用户登录或使用。Preferably, when the mobile terminal is a mobile terminal equipped with an Android system, the factory reset protection (FRP, Factory Reset Protection) is a protection measure in the Android device developed by Google, which can be Protect the device after theft or loss, preventing unauthorized users from logging in or using it.
为防止用户信息在移动终端丢失后外泄,Google要求Android 5.1版本及以后版本都需要具备FRP功能且默认开启。此安全特性可以防止未经授权的用户登陆或使用设备。例如,若移动终端丢失或被盗,只要FRP功能处于使能状态,用户可以通过远程登陆Google账户的方式进行清除用户数据的操作,避免信息外泄,且经过此方法进行恢复出厂后需要在开机导航验证最近一次登陆过的Google账户才可进入系统,并正常使用移动终端。用户可以通过“设置-开发者选项-开启OEM解锁”菜单控制FRP功能的开启和关闭,OEM开关处于关闭状态,代表FRP功能为开启状态。FRP开启时,Secureboot不能解锁,fastboot刷机命令不能执行。In order to prevent user information from leaking after the mobile terminal is lost, Google requires that Android 5.1 and later versions need to have FRP function and be enabled by default. This security feature prevents unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is enabled, the user can perform the operation of clearing the user data by remotely logging in to the Google account to avoid leakage of information, and the method needs to be turned on after the factory is restored. The navigation verifies that the Google account that was last logged in can enter the system and use the mobile terminal normally. The user can control the FRP function to be turned on and off through the "Settings - Developer Options - Open OEM Unlock" menu. The OEM switch is off, indicating that the FRP function is on. When FRP is turned on, Secureboot cannot be unlocked, and the fastboot flash command cannot be executed.
现有技术中,FRP基本功能的使用方法及步骤包括:FRP使用=支持FRP+开启FRP+存在Google账号,其步骤为:a.进入设置->开发者选项->OEM解锁,关闭“OEM解锁”开关(开启FRP);b.测试机连接VPN,登陆Google账户(存在Google账号);c.设置锁屏密码。可见,现有技术中,用户只有在具有且知道Google账户及其密码的情况下才可实现对FRP中的数据进行处理。In the prior art, the method and steps of using the basic functions of the FRP include: FRP use = support FRP + open FRP + existing Google account, the steps are: a. Go to Settings -> Developer Options -> OEM Unlock, close the "OEM Unlock" switch (Open FRP); b. Test machine to connect to VPN, login to Google account (there is a Google account); c. Set the lock screen password. It can be seen that in the prior art, the user can process the data in the FRP only if he has and knows the Google account and its password.
优选地,本实施例中,用户可以实现在安全模式下,通过触发所述移动终端上特定按钮的形式,向所述移动终端发送一操作指令,所述移动终端解析所述操作指令后,可以按照所述操作指令,进入所述移动终端的恢复出厂设置保护程序。从而,实现不用登陆Google账户的情况下,实现正常使用恢复出厂设置保护程序。Preferably, in this embodiment, the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal in a security mode, and after the mobile terminal parses the operation instruction, According to the operation instruction, the factory reset protection program of the mobile terminal is entered. Therefore, it is possible to realize the normal use of the factory reset protection program without logging into the Google account.
S’3:在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据S’3: In the factory reset protection program, select Erase to restore the factory settings protection data.
本实施例中,用户可以实现在恢复出厂设置保护程序下,通过触发所述移动终端上特定按钮的形式,向所述移动终端发送一操作指令,所述移动终端解析所述操作指令后,可以按照所述操作指令,选择擦除恢复出厂设置保护数据。In this embodiment, the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal under the factory reset protection program, and after the mobile terminal parses the operation instruction, According to the operation instruction, select to erase and restore the factory setting protection data.
S’4:捕获一第二操作指令,输入一密码信息S'4: capture a second operation instruction, input a password information
本实施例中,所述移动终端感应用户选择擦除恢复出厂设置保护数据后,将,如通过在所述移动终端的显示屏幕中弹出一对话框的形式,发出一密码请求。用户借助所述移动终端的键盘等,向所述移动终端输入一密码信息,也即发送一第二操作指令;所述移动终端读取用户输入的密码信息后,将所述密码信息转换为一计算机可读的数字信息, 如将十进制的数字转换为二进制数字信息等,并向外发送。In this embodiment, after the mobile terminal senses that the user selects to erase the factory reset protection data, a password request is sent, for example, by popping up a dialog box in the display screen of the mobile terminal. The user inputs a password information to the mobile terminal by using a keyboard or the like of the mobile terminal, that is, sends a second operation instruction; after reading the password information input by the user, the mobile terminal converts the password information into one Computer readable digital information, For example, convert a decimal number into binary digital information, etc., and send it out.
具体地,所述密码信息为所述恢复出厂设置保护程序的解锁码。Specifically, the password information is an unlock code of the factory reset protection program.
更加优选地,本实施例中,所述解锁码的获取方法包括:More preferably, in this embodiment, the method for acquiring the unlock code includes:
-读取移动终端的国际移动设备身份码- reading the mobile device's international mobile device identity code
本实施例中,国际移动设备身份码(IMEI,International Mobile Equipment Identity)是国际移动设备身份码的缩写,国际移动装备辨识码,是由15位数字组成的"电子串号",它与每台手机一一对应,而且该码是全世界唯一的。每一只手机在组装完成后都将被赋予一个全球唯一的一组号码,这个号码从生产到交付使用都将被制造生产的厂商所记录。In this embodiment, the International Mobile Equipment Identity (IMEI) is an abbreviation of the international mobile device identity code, and the international mobile equipment identification code is an "electronic serial number" consisting of 15 digits, which is associated with each The phones correspond one-to-one, and the code is the only one in the world. Each handset will be assigned a globally unique set of numbers after assembly, and this number will be recorded by the manufacturer of the manufacturing process from production to delivery.
IMEI为TAC+FAC+SNR+SP,其组成为:IMEI is TAC+FAC+SNR+SP, and its composition is:
1、前6位数(TAC)是"型号核准号码",一般代表机型。1. The first 6 digits (TAC) is the "model approval number", which generally represents the model.
2、接着的2位数(FAC)是"最后装配号",一般代表产地。2. The next 2 digits (FAC) is the "final assembly number", which generally represents the place of origin.
3、之后的6位数(SNR)是"串号",一般代表生产顺序号。3. The subsequent 6-digit number (SNR) is the "serial number", which generally represents the production sequence number.
4、最后1位数(SP)通常是"0",为检验码,目前暂备用。4. The last 1 digit (SP) is usually "0", which is the check code and is currently reserved.
IMEI码贴在移动电话机背面的标志上(也存储于手机内,可通过在移动电话机上按“*#06#”获得),并且读写于移动电话机内存中。它也是该移动电话机在厂家的"档案"和"身份证号"。The IMEI code is attached to the logo on the back of the mobile phone (also stored in the mobile phone, which can be obtained by pressing "*#06#" on the mobile phone), and is read and written in the memory of the mobile phone. It is also the "file" and "identity number" of the mobile phone at the manufacturer.
从而,本实施例中,可以通过读取移动终端上的标识信息或者通过移动终端上按“*#06#”获得所述移动终端的国际移动设备身份码。Therefore, in this embodiment, the international mobile device identity code of the mobile terminal can be obtained by reading the identification information on the mobile terminal or by pressing “*#06#” on the mobile terminal.
-根据所述国际移动设备身份码检索所述移动终端的恢复出厂设置保护程序的解锁码Retrieving an unlock code of the factory-set protection program of the mobile terminal according to the international mobile device identity code
本实施例中,可以借助FRP解锁工具,如ComPartner平台,的“查询解锁码”功能中用IMEI查询到FRP解锁码。In this embodiment, the FRP unlocking code can be queried by the IMEI in the "Query Unlocking Code" function of the FRP unlocking tool, such as the ComPartner platform.
S’5:将所述密码信息与一预设密码进行比较S'5: comparing the password information with a preset password
本实施中,当所述移动终端捕获一用户对所述移动终端输入的一密码信息后,所述移动终端将进一步将所述密码信息与所述移动终端中预先存储的一预设密码相比对。In this implementation, after the mobile terminal captures a password information input by the user to the mobile terminal, the mobile terminal further compares the password information with a preset password pre-stored in the mobile terminal. Correct.
S’6:当所述密码信息与所述预设密码相匹配时,擦除恢复出厂设置保护数据S'6: when the password information matches the preset password, erasing and restoring the factory setting protection data
本实施例中,当所述移动终端比较结果为所述密码信息与所述预设密码相匹配时,所述移动终端可以获得权限擦除恢复出厂设置保护数据。从而,实现绕过谷歌账号密码,一键擦除FRP分区数据的技术效果。In this embodiment, when the comparison result of the mobile terminal is that the password information matches the preset password, the mobile terminal may obtain the rights erasure restoration factory setting protection data. Thus, the technical effect of bypassing the Google account password and one-click erasing the FRP partition data is realized.
优选地,本实施例中,所提出的将恢复出厂设置保护程序的入口写入安全模式的步骤包括: Preferably, in this embodiment, the proposed step of writing the entry of the factory reset protection program into the security mode includes:
-启动安全模式的设置权限;- Start setting security mode permissions;
-将恢复出厂设置保护程序的入口写入安全模式中。- Write the entry to the factory reset protector to safe mode.
具体地,还是在linux环境下改写recovery.img,下载split_bootimg.zip文件,在此zip文件中包含一个perl文件,split_bootimg.pl脚本,该脚本可以读取recovery.img,将kernel和ramdisk读取出来,此脚本也会输出内核命令行和板子名字。解包recovery.img;使用mkbootfs工具来重新创建ramdisk;使用mkbootimg来重新创建recovery-new.img,得到了一个新的recovery-new.img,然后刷入第三方recovery的方法刷入即可。Specifically, the recovery.img is rewritten in the Linux environment, and the split_bootimg.zip file is downloaded. The zip file contains a perl file, split_bootimg.pl script, which can read recovery.img and read the kernel and ramdisk. This script also outputs the kernel command line and board name. Unpack recovery.img; use mkbootfs tool to recreate ramdisk; use mkbootimg to recreate recovery-new.img, get a new recovery-new.img, and then brush into the third-party recovery method.
其中,优选地,本实施例中,可重新制作一满足条件的recovery,并写入原recovery中,具体步骤如下:Preferably, in this embodiment, a recovery that satisfies the condition can be re-created and written into the original recovery, and the specific steps are as follows:
1.从官方包,解压出原生的recovery.img;1. From the official package, extract the native recovery.img;
2.解出原生recovery包的内核recovery.img-kernel和ramdisk内存镜像,再把ramdisk内存镜像解包;2. Solve the kernel recovery.img-kernel and ramdisk memory image of the original recovery package, and then unpack the ramdisk memory image;
3.找到合适的功能比较好的第三方recovery包,比如以G6的recovery-clockwork-5.0.2.0.img为例,同样解出其内核kernel和ramdisk内存镜像,再把ramdisk内存镜像解包;3. Find a suitable third-party recovery package with good function. For example, take G6's recovery-clockwork-5.0.2.0.img as an example, and also solve the kernel kernel and ramdisk memory image, and then unpack the ramdisk memory image;
4.准备新recovery的内核,本实施例中,使用官方原生包的recovery.img-kernel,只有原生的内核才能跟移动终端的硬件匹配;4. Prepare the kernel of the new recovery. In this embodiment, the recovery.img-kernel of the official native package is used, and only the native kernel can match the hardware of the mobile terminal;
5.修改ramdisk内存盘,5. Modify the ramdisk memory disk,
6.按照上面打包ramdisk的方法打包新改的ramdisk内存盘;6. Pack the newly modified ramdisk memory disk according to the method of packing the ramdisk above;
7.按照上面打包img的方法打包生成新的recovery-new.img;7. According to the above package img method package to generate a new recovery-new.img;
8.将新的recovery-new.img刷入手机;8. Brush the new recovery-new.img into the phone;
9.打开手机原生的recovery.img,对比来两个文件的文件头,把原生的前16行(000h-100h)复制到新的recovery上覆盖。9. Open the phone's native recovery.img, compare the file headers of the two files, and copy the original first 16 lines (000h-100h) to the new recovery.
10.最后把新的recovery-new.img,第二行的前三个字节改回到刚才记下的三个值,保存。10. Finally, the new recovery-new.img, the first three bytes of the second line are changed back to the three values just recorded, and saved.
其中recovery.img-kernel为新内核;ramdisk-new.gz为新的内存盘;boot-new.img为生成的新img.按照此方法打包的boot.img或recovery.img因为基址和内核参数都正确可以直接移动终端上使用。Where recovery.img-kernel is the new kernel; ramdisk-new.gz is the new memory disk; boot-new.img is the new img generated. Boot.img or recovery.img packaged according to this method because of the base address and kernel parameters Both are correct and can be used directly on the mobile terminal.
综上所述,本发明中,提供一种移动终端。本发明将FRP的入口写入移动终端的recovery模式中,用户可以在recovery模式中,通过输入正确的FRP密码,实现擦除FRP分区中的个人信息数据。 In summary, in the present invention, a mobile terminal is provided. The invention writes the entry of the FRP into the recovery mode of the mobile terminal, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
应当注意的是,本发明的实施例有较佳的实施性,且并非对本发明作任何形式的限制,任何熟悉该领域的技术人员可能利用上述揭示的技术内容变更或修饰为等同的有效实施例,但凡未脱离本发明技术方案的内容,依据本发明的技术实质对以上实施例所作的任何修改或等同变化及修饰,均仍属于本发明技术方案的范围内。 It should be noted that the embodiments of the present invention are preferred embodiments, and are not intended to limit the scope of the present invention. Any one skilled in the art may use the above-disclosed technical contents to change or modify the equivalent embodiments. Any modification or equivalent changes and modifications of the above embodiments in accordance with the technical spirit of the present invention are still within the scope of the technical solutions of the present invention.

Claims (10)

  1. 一种用于数据擦除的计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现以下步骤:A computer readable storage medium for data erasing, on which is stored a computer program, wherein the computer program is executed by a processor to implement the following steps:
    捕获一第一操作指令,启动安全模式,Capture a first operational command to initiate safe mode,
    在所述安全模式下,选择并进入恢复出厂设置保护程序,In the safe mode, select and enter the factory reset protection program,
    在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据,In the factory reset protection program, select Erase to restore the factory settings protection data.
    捕获一第二操作指令,输入一密码信息,Capturing a second operation instruction, inputting a password information,
    将所述密码信息与一预设密码进行比较,Comparing the password information with a preset password,
    当所述密码信息与所述预设密码相匹配时,When the password information matches the preset password,
    擦除恢复出厂设置保护数据。Erase and restore factory settings to protect data.
  2. 如权利要求1所述的计算机可读存储介质,其特征在于,The computer readable storage medium of claim 1 wherein:
    捕获一第一操作指令,启动安全模式的步骤包括,Capturing a first operational instruction, the step of initiating a secure mode includes,
    捕获一对移动终端输入的操作指令,Capturing an operation instruction input by a pair of mobile terminals,
    解析所述操作指令,获得一操作内容,Parsing the operation instruction to obtain an operation content,
    根据所述操作内容,控制所述移动终端进入安全模式。And controlling the mobile terminal to enter a security mode according to the operation content.
  3. 如权利要求1所述的计算机可读存储介质,其特征在于,The computer readable storage medium of claim 1 wherein:
    所述密码信息为所述恢复出厂设置保护程序的解锁码。The password information is an unlock code of the factory reset protection program.
  4. 如权利要求3所述的计算机可读存储介质,其特征在于,The computer readable storage medium of claim 3 wherein:
    所述解锁码的获取方法包括,The method for obtaining the unlock code includes:
    读取移动终端的国际移动设备身份码,Reading the mobile device's international mobile device identity code,
    根据所述国际移动设备身份码检索所述移动终端的恢复出厂设置保护程序的解锁码。Retrieving an unlock code of the factory-set protection program of the mobile terminal according to the international mobile device identity code.
  5. 如权利要求1所述的计算机可读存储介质,其特征在于,The computer readable storage medium of claim 1 wherein:
    所述计算机程序被处理器执行时还实现以下步骤,The computer program is also executed by the processor to implement the following steps,
    解析安全模式,Parsing the security mode,
    获得设置权限,Get set permissions,
    将恢复出厂设置保护程序的入口写入安全模式中。Write the entry to the factory reset protector to safe mode.
  6. 一种移动终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现以下步骤:A mobile terminal includes a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the following steps:
    捕获一第一操作指令,启动安全模式,Capture a first operational command to initiate safe mode,
    在所述安全模式下,选择并进入恢复出厂设置保护程序, In the safe mode, select and enter the factory reset protection program,
    在恢复出厂设置保护程序中,选择擦除恢复出厂设置保护数据,In the factory reset protection program, select Erase to restore the factory settings protection data.
    捕获一第二操作指令,输入一密码信息,Capturing a second operation instruction, inputting a password information,
    将所述密码信息与一预设密码进行比较,Comparing the password information with a preset password,
    当所述密码信息与所述预设密码相匹配时,When the password information matches the preset password,
    擦除恢复出厂设置保护数据。Erase and restore factory settings to protect data.
  7. 如权利要求1所述的移动终端,其特征在于,The mobile terminal of claim 1 wherein:
    捕获一第一操作指令,启动安全模式的步骤包括,Capturing a first operational instruction, the step of initiating a secure mode includes,
    捕获一对移动终端输入的操作指令,Capturing an operation instruction input by a pair of mobile terminals,
    解析所述操作指令,获得一操作内容,Parsing the operation instruction to obtain an operation content,
    根据所述操作内容,控制所述移动终端进入安全模式。And controlling the mobile terminal to enter a security mode according to the operation content.
  8. 如权利要求1所述的移动终端,其特征在于,The mobile terminal of claim 1 wherein:
    所述密码信息为所述恢复出厂设置保护程序的解锁码。The password information is an unlock code of the factory reset protection program.
  9. 如权利要求3所述的移动终端,其特征在于,The mobile terminal of claim 3, wherein
    所述解锁码的获取方法包括,The method for obtaining the unlock code includes:
    读取移动终端的国际移动设备身份码,Reading the mobile device's international mobile device identity code,
    根据所述国际移动设备身份码检索所述移动终端的恢复出厂设置保护程序的解锁码。Retrieving an unlock code of the factory-set protection program of the mobile terminal according to the international mobile device identity code.
  10. 如权利要求1所述的移动终端,其特征在于,The mobile terminal of claim 1 wherein:
    所述处理器执行所述计算机程序时实现以下步骤,The processor implements the following steps when executing the computer program,
    解析安全模式,Parsing the security mode,
    获得设置权限,Get set permissions,
    将恢复出厂设置保护程序的入口写入安全模式中。 Write the entry to the factory reset protector to safe mode.
PCT/CN2017/110164 2017-11-09 2017-11-09 Mobile terminal, and computer readable storage medium for data wiping WO2019090586A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/110164 WO2019090586A1 (en) 2017-11-09 2017-11-09 Mobile terminal, and computer readable storage medium for data wiping
CN201780096648.5A CN111316277A (en) 2017-11-09 2017-11-09 Mobile terminal and computer readable storage medium for data erasure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/110164 WO2019090586A1 (en) 2017-11-09 2017-11-09 Mobile terminal, and computer readable storage medium for data wiping

Publications (1)

Publication Number Publication Date
WO2019090586A1 true WO2019090586A1 (en) 2019-05-16

Family

ID=66437523

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/110164 WO2019090586A1 (en) 2017-11-09 2017-11-09 Mobile terminal, and computer readable storage medium for data wiping

Country Status (2)

Country Link
CN (1) CN111316277A (en)
WO (1) WO2019090586A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220229898A1 (en) * 2020-07-14 2022-07-21 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348979A (en) * 2014-11-13 2015-02-11 深圳市中兴移动通信有限公司 Display method and device for mobile terminal and short messages thereof under encryption mode
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN104615951A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal
US20160342389A1 (en) * 2013-12-04 2016-11-24 Google Inc. User interface customization based on speaker characterics
CN106778359A (en) * 2015-11-20 2017-05-31 宏碁股份有限公司 Reset the release method and its electronic installation of protection of dispatching from the factory

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8260747B2 (en) * 2009-02-05 2012-09-04 Netapp, Inc. System, method, and computer program product for allowing access to backup data
US8892072B2 (en) * 2011-09-23 2014-11-18 Lg Electronics Inc. Mobile terminal and method of providing security thereto
CN102883026B (en) * 2012-09-07 2015-12-02 广东欧珀移动通信有限公司 A kind of mobile terminal realizes the method for power-on protection
US9100769B2 (en) * 2013-02-08 2015-08-04 Sprint Communications Company L.P. System and method of storing service brand packages on a mobile device
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160342389A1 (en) * 2013-12-04 2016-11-24 Google Inc. User interface customization based on speaker characterics
CN104348979A (en) * 2014-11-13 2015-02-11 深圳市中兴移动通信有限公司 Display method and device for mobile terminal and short messages thereof under encryption mode
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN104615951A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal
CN106778359A (en) * 2015-11-20 2017-05-31 宏碁股份有限公司 Reset the release method and its electronic installation of protection of dispatching from the factory

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220229898A1 (en) * 2020-07-14 2022-07-21 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)
US11748470B2 (en) * 2020-07-14 2023-09-05 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)

Also Published As

Publication number Publication date
CN111316277A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
CN103019775B (en) A kind of method of terminal device brush machine, device and equipment
US9292680B2 (en) Mobile terminal detection method and mobile terminal
US9703635B2 (en) Method, computer program, and computer for restoring set of variables
JP5889933B2 (en) Method for preventing malfunction of computer, computer program, and computer
CN109964227B (en) Method and terminal for updating SELinux security policy
US20070061561A1 (en) OS starting method and apparatus using the same
JP4929804B2 (en) Authentication method, authentication apparatus, and authentication program
US20160004648A1 (en) Data erasing apparatus, data erasing method, and computer-readable storage medium
WO2016000166A1 (en) Data processing method and intelligent terminal
TW200305807A (en) Basic input/output system (BIOS) shadowed small-print hard disk drive as robust, always on, backup for hard disk image & software failure
US20120060215A1 (en) Mobile terminal and method for protecting its system data
US20060090158A1 (en) Rewritable, nonvolatile memory, electronic device, method of rewriting rewritable, nonvolatile memory, and storage medium having stored thereon rewrite program
WO2019090586A1 (en) Mobile terminal, and computer readable storage medium for data wiping
Gómez-Miralles et al. Versatile iPad forensic acquisition using the apple camera connection kit
JP4653497B2 (en) Portable storage device
JP2010152750A (en) Terminal device
CN109871334B (en) Cable modem and method of operation
Gómez-Miralles et al. Universal, fast method for iPad forensics imaging via USB adapter
JP6393171B2 (en) Information processing terminal and control program for information processing terminal
JP2018139025A (en) Data erasing method, data erasing program, computer with data erasing program and data erasing management server
US20090187898A1 (en) Method for securely updating an autorun program and portable electronic entity executing it
CN108319848B (en) Starting-up control method and device
TWI677789B (en) Peripheral hardware operating method and system
CN110688663A (en) Execution command protection method and device, android device and storage medium
CN110659477A (en) Anti-flash protection method and system for android device, android device and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17931681

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17931681

Country of ref document: EP

Kind code of ref document: A1