CN104090793A - Device and method for destroying Android mobile phone body data - Google Patents

Device and method for destroying Android mobile phone body data Download PDF

Info

Publication number
CN104090793A
CN104090793A CN201410318187.XA CN201410318187A CN104090793A CN 104090793 A CN104090793 A CN 104090793A CN 201410318187 A CN201410318187 A CN 201410318187A CN 104090793 A CN104090793 A CN 104090793A
Authority
CN
China
Prior art keywords
data
destroying
module
scanning
scan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410318187.XA
Other languages
Chinese (zh)
Inventor
梁效宁
李森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN SALVATIONDATA INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
SICHUAN SALVATIONDATA INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN SALVATIONDATA INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical SICHUAN SALVATIONDATA INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201410318187.XA priority Critical patent/CN104090793A/en
Publication of CN104090793A publication Critical patent/CN104090793A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a device for destroying Android mobile phone body data. The device comprises an interface, an input and output device, a selection module and a data processing terminal. The interface is connected with a mobile phone through a USB data line, the interface and the input and output device are connected with the selection module and the data processing terminal at the same time, and the selection module is connected with the data processing terminal. The invention further discloses a method based on the device. The method comprises the steps that (1) the mobile phone is connected; (2) a scanning area is selected; (3) scanning is conducted; (4) encryption is judged and decryption is conducted; (5) the data are displayed; (6) the data are screened; (7) the data are destroyed; (8) whether data destroying is completed or not is judged. According to the device and the method, different areas of the mobile phone can be selected for conducting data scanning and destroying, the data scanned out can be displayed, files in need of destroying can be selected by a user, and the fragmented data in the mobile phone can be removed thoroughly on the condition that the normal data are not destroyed. The safety of the Android mobile phone data is guaranteed and malicious stealing of personal and corporate private data is prevented.

Description

A kind of apparatus and method of destroying Android handset data
Technical field
The present invention relates to field of information security technology, particularly a kind of device of destroying Android handset data, also relates to the method based on this device.
Background technology
Android smart mobile phone has SOS, independent operating space, third party software can be installed voluntarily, expanded function is powerful, inseparable with people's life, data in mobile phone information wherein relates to work, study, life, contacts, finance, leisure, amusement, emotion of people etc., to individual or company, is very precious intangible asset.
Data in mobile phone is to manage and store based on mobile phone file system, user has deleted file or data, because making data, the administrative mechanism in file system can't thoroughly be removed, the file of deleting is retained in the mode with fragment in the clear area of file system, market has a lot of data recovery software only need can extract easily the data of deletion by the mode of retrieving files system at present, individual privacy or company's secret is leaked and cause huge infringement.
Also there is no on the market at present a kind of device of destroying for Android handset data specially.
Summary of the invention
The defect that the present invention is directed to prior art provides a kind of apparatus and method of destroying Android handset data, can effectively solve the problem that above-mentioned prior art exists.
To achieve these goals, the technical solution used in the present invention is:
A kind of device of destroying Android handset data, comprise interface, input-output device, selection module, data processing terminal, described interface is connected with mobile phone by usb data line, interface is connected with data processing terminal with selecting module with input-output device simultaneously, selects module to be connected with data processing terminal.
As preferably, described input-output device is touch-screen or keyboard, mouse, display, and described selection module is for selecting the region in scan database, full subregion, subregion.
As preferably, described data processing terminal is comprised of subarea-scanning module, scan database module, deciphering module, data destroying module, described selection module is connected with scan database module respectively at subarea-scanning module, deciphering module is connected with scan database module respectively at subarea-scanning module, deciphering module is also connected with input-output device with data destroying terminal, and data destroying terminal is also connected with interface with input-output device.
As preferably, described subarea-scanning module is for finding deleted data in subregion, and described scan database module is for deleted data in scan database, and deciphering module is for the data of enabling decryption of encrypted, and data destroying module is used for destroying data.
On the other hand, provide a kind of method of destroying Android handset data, comprised the following steps:
1), connect and monitor mobile phone;
2) region that, artificial selection need scan;
3), carry out data scanning;
4), judge whether data encrypt, as two-way parallel schema is carried out in data encryption: a road is that one tunnel is according to key and decipherment algorithm data decryption according to data file computation key; As do not have enciphered data directly to jump into step 5;
5), the data that obtain are shown;
6) data that, artificial screening need be destroyed;
7) physical storage locations that, null value is write to these data covers raw data;
8), again scan this physical storage locations, judged whether data destroying, as do not completed destruction, get back to step 7, as complete data destroying and finish.
As preferably, it is that the concrete steps of the described step 3 of scanning area are that described step 2 is selected application program:
A), start to scan the sqlite database of this application program;
B), organization definition, the data memory format of analytical database B-TREE architectural feature and all tables of database, the name, type and the data that obtain each field are stored in the content characteristic in table;
C), adopt all pages in bitmap algorithm mark database, differentiation normal page and free page;
D), in conjunction with all features and the free page internal fragment data of database, mate successively, the match is successful represents that crumb data is recombinated and successfully enters step 4.
As preferably, it is that the described step 3 of scanning area is: selection sort according to demand that described step 2 is selected mobile phone subregion: comprise keyword scan, subarea-scanning, document classification scanning.
As preferably, described keyword scan, for by artificial input key word, scans the data of whole subregion clear area, find the data that contain key word, effective information before and after intercepting key data, enters step 4, if find key word to return, does not re-enter key word.
As preferably, described subarea-scanning, for the data in this available free region of section post of retrieval and the crumb data in normal region, enters step 4.
As preferably, described document classification scanning, for selecting the file type that needs scanning, is found out the data of all these class files in subregion by the exclusive file header of this document type, enter step 4.
beneficial effect
Compared with prior art the invention has the advantages that: can select mobile phone zones of different to scan and data destroying, the data that can display scan go out also allow user select voluntarily to need the file of destroying, and thoroughly remove the crumb data in mobile phone in the situation that not destroying normal data.
The present invention has guaranteed the safety of Android data in mobile phone, prevents from stealing for the malice of individual and company's private data.
Accompanying drawing explanation
Fig. 1 is the apparatus structure schematic diagram of the embodiment of the present invention;
Fig. 2 is the method flow diagram of the embodiment of the present invention;
Fig. 3 is the process flow diagram of embodiment of the present invention scan database;
Fig. 4 is the process flow diagram of embodiment of the present invention scanning subregion.
Embodiment
In order to describe the specific embodiment of the present invention in detail, below in conjunction with accompanying drawing with explanation:
As shown in Figure 1, a kind of device of destroying Android handset data, comprise interface, input-output device, selection module, data processing terminal, described interface is connected with mobile phone by usb data line, interface is connected with data processing terminal with selecting module with input-output device simultaneously, select module to be connected with data processing terminal, described input-output device is touch-screen in the present embodiment.
Described data processing terminal is comprised of subarea-scanning module, scan database module, deciphering module, data destroying module, described selection module is connected with scan database module respectively at subarea-scanning module, deciphering module is connected with scan database module respectively at subarea-scanning module, deciphering module is also connected with input-output device with data destroying terminal, and data destroying terminal is also connected with interface with input-output device.
Describe the function of above-mentioned module below in detail,
Select module for selecting to need the region of scanning, comprising the sqlite database in mobile phone, DATA subregion, SD card subregion, system partitioning, and the scanning of the file type in subregion and keyword scan.
Subarea-scanning module, for retrieving deleted data in full subregion, is retrieved by file type, or according to keywords retrieval.
Scan database module is for retrieving the deleted data of single or multiple sqlite databases.
Deciphering module is for data decryption, and making the data of showing can not be mess code.
Data destroying module is for destroying the crumb data of user's appointment.
As shown in Figure 2, provide a kind of method of destroying Android handset data, comprised the following steps:
1), by ADB server, set up and being connected of mobile phone;
2), the region that need scan of artificial selection, wherein option has the database of various programs as QQ, micro-letter etc., also can select DATA subregion, SD card subregion;
3), carry out data scanning;
4), judge whether data encrypt, as two-way parallel schema is carried out in data encryption: a road is for according to data file computation key, and a road be according to key and decipherment algorithm data decryption, for example, micro-letter is that AES256 encrypts, QQ is the encryption of data segment XOR; By above-mentioned encrypt file, calculate key and decipherment algorithm is decrypted; As do not have enciphered data directly to jump into step 5;
5), the data that obtain are shown;
6) data that, artificial screening need be destroyed;
7), by structure 16 system data (0x00,0xFF), filling the physical storage locations write these data covers raw data;
8), again scan this physical storage locations, judged whether data destroying, as do not completed destruction, get back to step 7, as complete data destroying and finish.
As shown in Figure 3, step 2 selection application program is that the concrete steps of the described step 3 of scanning area are:
A), start to scan the sqlite database of this application program;
B), organization definition, the data memory format of analytical database B-TREE architectural feature and all tables of database, the name, type and the data that obtain each field are stored in the content characteristic in table;
C), adopt all pages in bitmap algorithm mark database, distinguish normal page and free page, find all data of free page and the crumb data in normal page;
D), in conjunction with all features of database and the crumb data finding, mate successively, the match is successful represents that crumb data is recombinated and successfully enters step 4.
As shown in Figure 4, step 2 selection mobile phone subregion is that the described step 3 of scanning area is: selection sort according to demand: comprise keyword scan, subarea-scanning, document classification scanning;
Described keyword scan is for passing through artificial input key word, scan the data of whole subregion clear area, find the data that contain key word, the effective information before and after intercepting key data, enter step 4, if find key word to return, do not re-enter key word;
Described subarea-scanning, for the data in this available free region of section post of retrieval and the crumb data in normal region, enters step 4;
Described document classification scanning, for selecting the file type that needs scanning, is found out the data of all these class files in subregion by the exclusive file header of this document type, enter step 4.
More than describe and set forth detail to fully understand the present invention, but the present invention can also adopt other to be different from this describing mode, implement.Therefore, the present invention is not limited to above disclosed specific embodiment.

Claims (10)

1. a device of destroying Android handset data, comprise interface, input-output device, it is characterized in that: also comprise and select module and data processing terminal, described interface is connected with mobile phone by usb data line, interface is connected with data processing terminal with selecting module with input-output device simultaneously, selects module to be connected with data processing terminal.
2. a kind of device of destroying Android handset data according to claim 1, it is characterized in that: described input-output device is touch-screen or keyboard, mouse, display, described selection module is for selecting the region in scan database, full subregion, subregion.
3. a kind of device of destroying Android handset data according to claim 1, it is characterized in that: described data processing terminal is comprised of subarea-scanning module, scan database module, deciphering module, data destroying module, described selection module is connected with scan database module respectively at subarea-scanning module, deciphering module is connected with scan database module respectively at subarea-scanning module, deciphering module is also connected with input-output device with data destroying terminal, and data destroying terminal is also connected with interface with input-output device.
4. a kind of device of destroying Android handset data according to claim 3, it is characterized in that: described subarea-scanning module is for finding deleted data in subregion, described scan database module is for deleted data in scan database, deciphering module is for the data of enabling decryption of encrypted, and data destroying module is used for destroying data.
5. a method of destroying Android handset data, is characterized in that: comprise the following steps:
1), connect and monitor mobile phone;
2) region that, artificial selection need scan;
3), carry out data scanning;
4), judge whether data encrypt, as two-way parallel schema is carried out in data encryption: a road is that one tunnel is according to key and decipherment algorithm data decryption according to data file computation key; As do not have enciphered data directly to jump into step 5;
5), the data that obtain are shown;
6) data that, artificial screening need be destroyed;
7) physical storage locations that, null value is write to these data covers raw data;
8), again scan this physical storage locations, judged whether data destroying, as do not completed destruction, get back to step 7, as complete data destroying and finish.
6. a kind of method of destroying Android handset data according to claim 5, is characterized in that: it is that the concrete steps of the described step 3 of scanning area are that described step 2 is selected application program:
A), start to scan the sqlite database of this application program;
B), organization definition, the data memory format of analytical database B-TREE architectural feature and all tables of database, the name, type and the data that obtain each field are stored in the content characteristic in table;
C), adopt all pages in bitmap algorithm mark database, differentiation normal page and free page;
D), in conjunction with all features and the free page internal fragment data of database, mate successively, the match is successful represents that crumb data is recombinated and successfully enters step 4.
7. a kind of method of destroying Android handset data according to claim 5, is characterized in that: it is that the described step 3 of scanning area is: selection sort according to demand that described step 2 is selected mobile phone subregion: comprise keyword scan, subarea-scanning, document classification scanning.
8. a kind of method of destroying Android handset data according to claim 7, it is characterized in that: described keyword scan is for passing through artificial input key word, scan the data of whole subregion clear area, find the data that contain key word, effective information before and after intercepting key data, enter step 4, if find key word to return, do not re-enter key word.
9. a kind of method of destroying Android handset data according to claim 7, is characterized in that: described subarea-scanning, for the data in this available free region of section post of retrieval and the crumb data in normal region, enters step 4.
10. a kind of method of destroying Android handset data according to claim 7, it is characterized in that: described document classification scanning is for selecting the file type that needs scanning, the data of finding out all these class files in subregion by the exclusive file header of this document type, enter step 4.
CN201410318187.XA 2014-07-07 2014-07-07 Device and method for destroying Android mobile phone body data Pending CN104090793A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410318187.XA CN104090793A (en) 2014-07-07 2014-07-07 Device and method for destroying Android mobile phone body data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410318187.XA CN104090793A (en) 2014-07-07 2014-07-07 Device and method for destroying Android mobile phone body data

Publications (1)

Publication Number Publication Date
CN104090793A true CN104090793A (en) 2014-10-08

Family

ID=51638512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410318187.XA Pending CN104090793A (en) 2014-07-07 2014-07-07 Device and method for destroying Android mobile phone body data

Country Status (1)

Country Link
CN (1) CN104090793A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104298766A (en) * 2014-10-28 2015-01-21 四川秘无痕信息安全技术有限责任公司 Method for clearing data in SQLite database
CN104407822A (en) * 2014-12-17 2015-03-11 四川秘无痕信息安全技术有限责任公司 Method of clearing fragmented data of Android phone
CN104504117A (en) * 2014-12-31 2015-04-08 四川秘无痕信息安全技术有限责任公司 Method for clearing tail fragment data of normal file
CN104679816A (en) * 2014-12-17 2015-06-03 北京可思云海科技有限公司 Application method of SQLITE database in embedded system
WO2016173264A1 (en) * 2015-04-28 2016-11-03 一铂有限公司 Electronic data protection method and device, and terminal device
CN106598487A (en) * 2016-11-21 2017-04-26 深圳市中博睿存科技有限公司 Data destruction method and device
CN107277089A (en) * 2016-04-07 2017-10-20 大唐网络有限公司 The method that original information on smart mobile phone is thoroughly removed
CN107292187A (en) * 2016-04-07 2017-10-24 大唐网络有限公司 The quick automatic flow control method for realizing that file is crushed and owner's information is cleaned completely in mobile phone removal process

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101465164A (en) * 2009-01-12 2009-06-24 成都市华为赛门铁克科技有限公司 Method, device and system for obliterating data
US20100281080A1 (en) * 2009-05-04 2010-11-04 Microsoft Corporation Use of Delete Notifications By File Systems And Applications To Release Storage Space
CN103295638A (en) * 2013-06-06 2013-09-11 国家电网公司 Portable electronic storage medium data wiping device and data wiping method based on same
CN103365882A (en) * 2012-03-30 2013-10-23 网秦无限(北京)科技有限公司 Method and system for cleaning junk files on mobile terminal
CN103559276A (en) * 2013-11-05 2014-02-05 广东欧珀移动通信有限公司 Method and device for clearing useless files

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101465164A (en) * 2009-01-12 2009-06-24 成都市华为赛门铁克科技有限公司 Method, device and system for obliterating data
US20100281080A1 (en) * 2009-05-04 2010-11-04 Microsoft Corporation Use of Delete Notifications By File Systems And Applications To Release Storage Space
CN103365882A (en) * 2012-03-30 2013-10-23 网秦无限(北京)科技有限公司 Method and system for cleaning junk files on mobile terminal
CN103295638A (en) * 2013-06-06 2013-09-11 国家电网公司 Portable electronic storage medium data wiping device and data wiping method based on same
CN103559276A (en) * 2013-11-05 2014-02-05 广东欧珀移动通信有限公司 Method and device for clearing useless files

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104298766A (en) * 2014-10-28 2015-01-21 四川秘无痕信息安全技术有限责任公司 Method for clearing data in SQLite database
CN104298766B (en) * 2014-10-28 2018-03-20 四川秘无痕信息安全技术有限责任公司 A kind of method of data in removing SQLite databases
CN104407822A (en) * 2014-12-17 2015-03-11 四川秘无痕信息安全技术有限责任公司 Method of clearing fragmented data of Android phone
CN104679816A (en) * 2014-12-17 2015-06-03 北京可思云海科技有限公司 Application method of SQLITE database in embedded system
CN104679816B (en) * 2014-12-17 2018-02-06 上海彩亿信息技术有限公司 A kind of SQLITE database application methods under embedded system
CN104504117A (en) * 2014-12-31 2015-04-08 四川秘无痕信息安全技术有限责任公司 Method for clearing tail fragment data of normal file
WO2016173264A1 (en) * 2015-04-28 2016-11-03 一铂有限公司 Electronic data protection method and device, and terminal device
CN107277089A (en) * 2016-04-07 2017-10-20 大唐网络有限公司 The method that original information on smart mobile phone is thoroughly removed
CN107292187A (en) * 2016-04-07 2017-10-24 大唐网络有限公司 The quick automatic flow control method for realizing that file is crushed and owner's information is cleaned completely in mobile phone removal process
CN106598487A (en) * 2016-11-21 2017-04-26 深圳市中博睿存科技有限公司 Data destruction method and device

Similar Documents

Publication Publication Date Title
CN104090793A (en) Device and method for destroying Android mobile phone body data
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
US20180152296A1 (en) Electronic data protection method and device and terminal device
US8738928B2 (en) Apparatus and method for processing extension information in image files
CN105117635A (en) Local data security protection system and method
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN111897786A (en) Log reading method and device, computer equipment and storage medium
CN103345601A (en) Identity recording and verification system based on radio frequency
CN103559433A (en) Mobile terminal antitheft method and device
CN105335642A (en) Processing method and processing system of pictures
US20090077390A1 (en) Electronic file protection system having one or more removable memory devices
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN102118503B (en) Data protection method, device and terminal
CN105630855A (en) File sharing method, file sharing system and terminal
JPH11272681A (en) Recording method for individual information and record medium thereof
US20010053221A1 (en) Ciphering apparatus and ciphering method
CN103544443A (en) Application layer file hiding method under NTFS file system
US8347113B2 (en) System and method for encrypting an electronic file in a mobile electronic device
CN101989324A (en) Information security system based on computer and mobile storage device
CN104680083A (en) Method and device for managing image
CN101908361A (en) Method for hiding private information of U disk
CN108932436B (en) Android system-based software security reinforcement method for APP specification
CN201489536U (en) Handwriting-based application terminal for encrypting and decrypting document
Al Dallal et al. A QR code used for personal information based on multi-layer encryption system
US20090077377A1 (en) System and method of protecting content of an electronic file for sending and receiving

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141008

WD01 Invention patent application deemed withdrawn after publication