CN105760788A - Data protection method and device - Google Patents

Data protection method and device Download PDF

Info

Publication number
CN105760788A
CN105760788A CN201610082318.8A CN201610082318A CN105760788A CN 105760788 A CN105760788 A CN 105760788A CN 201610082318 A CN201610082318 A CN 201610082318A CN 105760788 A CN105760788 A CN 105760788A
Authority
CN
China
Prior art keywords
data
instruction
stored
protected
available resources
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610082318.8A
Other languages
Chinese (zh)
Inventor
邱绪东
常学健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201610082318.8A priority Critical patent/CN105760788A/en
Publication of CN105760788A publication Critical patent/CN105760788A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data protection method and device. The problem that data, needing to be protected, in a mobile terminal cannot be protected in the prior art, and user experience is reduced is solved. The method includes the steps that it is determined that data to be stored needs to be protected; the data to be stored is stored into a special partition used for storing the data needing to be protected; after a deletion instruction is received, if it is determined that the data which the deletion instruction indicates to be deleted is protected, prompt information is transmitted and is used for prompting that the data which the deletion instruction indicates to be deleted is protected. As the data needing to be protected is stored in the special partition, after the deletion instruction is received, if the data which the deletion instruction indicates to be deleted is protected, prompt information is transmitted to a user and is used for prompting that the data which the deletion instruction indicates to be deleted is protected, the user is reminded that the data indicated to be deleted is protected, mistaken deletion operation on the data stored in the special partition is effectively avoided, and then the data stored in the special partition already is protected.

Description

A kind of data guard method and device
Technical field
The present invention relates to technical field of data processing, particularly to a kind of data guard method and device.
Background technology
In order to meet the demand of user, the function of intelligent terminal from strength to strength, and needs the information category of storage and quantity of information also to get more and more in intelligent terminal, for instance address list, privacy information, note, photo, file etc..
But, when the information that user preserves in intelligent terminal is operated, it is possible to some significant data can be deleted by mistake.It addition, after user deletes some information sometimes, it has been found that deleted information is important information, it is necessary to give the information deleted for change.
At present, owing to the significant data in mobile terminal cannot be protected, Consumer's Experience is reduced.
Summary of the invention
Embodiments provide a kind of data guard method and device, for solving the significant data in mobile terminal cannot be protected by prior art, the problem reducing Consumer's Experience.
First aspect, a kind of data guard method, described method includes:
Determine that data to be stored are for needing data to be protected;
Described data to be stored are stored and is used for preserving in the private partition needing data to be protected;
After receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.
Optionally, it is determined that go out data to be stored for needing data to be protected, including:
If it is determined that the type of described data to be stored is identical with any kind in the list of types needing data to be protected preset, it is determined that go out data to be stored for needing data to be protected;Or
Sending solicited message, described solicited message is for whether request protects described data to be stored;Receiving for after indicating the protection instruction protecting described data to be stored, it is determined that go out data to be stored for needing data to be protected.
Optionally, it is determined that go out described deletion instruction instruction delete data protected, including:
Storing path according to the data that described instruction is deleted, however, it is determined that the data going out described instruction deletion are stored in described private partition, it is determined that go out described deletion instruction and indicate the data deleted protected;Or
If the data that described instruction is deleted are provided with protection mark, it is determined that go out described deletion instruction and indicate the data deleted protected.
Optionally, it is determined that going out data to be stored for after needing data to be protected, described method also includes: for described data to be stored, described protection mark is set.
Optionally, after sending information, described method also includes:
After receiving and determining deletion instruction, the resource that takies in described private partition of data that described instruction is deleted is set to first kind available resources;
When needing the data of storage in described private partition, if there are Equations of The Second Kind available resources in described private partition, it would be desirable to the data of storage store in described Equations of The Second Kind available resources, wherein, described Equations of The Second Kind available resources are idling-resource;
If described private partition is absent from described Equations of The Second Kind available resources, according to the erasing time of stored data in described first kind available resources, it would be desirable to the data of storage store in erasing time first kind available resources the earliest.
Optionally, after the resource that the data that described deletion instruction instruction is deleted take in described private partition is set to first kind available resources, described method also includes:
After receiving query statement, data according to the instruction inquiry of described query statement, determine the data that there is described instruction inquiry in described private partition, and the resource that takies in described private partition of data of described instruction inquiry is first kind available resources, the first kind available resources that the data of described instruction inquiry take are set to unavailable resource.
Second aspect, a kind of data protecting device, described device includes:
First processing module, is used for determining that data to be stored are for needing data to be protected;
Memory module, is used for preserving in the private partition needing data to be protected for described data to be stored being stored;
Second processing module, for after receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.
Optionally, described first processing module specifically for:
If it is determined that the type of described data to be stored is identical with any kind in the list of types needing data to be protected preset, it is determined that go out data to be stored for needing data to be protected;Or
Sending solicited message, described solicited message is for whether request protects described data to be stored;Receiving for after indicating the protection instruction protecting described data to be stored, it is determined that go out data to be stored for needing data to be protected.
Optionally, state the second processing module specifically for:
Storing path according to the data that described instruction is deleted, however, it is determined that the data going out described instruction deletion are stored in described private partition, it is determined that go out described deletion instruction and indicate the data deleted protected;Or
If the data that described instruction is deleted are provided with protection mark, it is determined that go out described deletion instruction and indicate the data deleted protected.
Optionally, described second processing module determines that data to be stored are for, after needing data to be protected, being additionally operable to: arrange described protection mark for described data to be stored.
Optionally, described second processing module is additionally operable to after sending information:
After receiving and determining deletion instruction, the resource that takies in described private partition of data that described instruction is deleted is set to first kind available resources;
When needing the data of storage in described private partition, if there are Equations of The Second Kind available resources in described private partition, it would be desirable to the data of storage store in described Equations of The Second Kind available resources, wherein, described Equations of The Second Kind available resources are idling-resource;
If described private partition is absent from described Equations of The Second Kind available resources, according to the erasing time of stored data in described first kind available resources, it would be desirable to the data of storage store in erasing time first kind available resources the earliest.
Optionally, described second processing module is additionally operable to after the resource that the data that described deletion instruction instruction is deleted take in described private partition is set to first kind available resources:
After receiving query statement, data according to the instruction inquiry of described query statement, determine the data that there is described instruction inquiry in described private partition, and the resource that takies in described private partition of data of described instruction inquiry is first kind available resources, the first kind available resources that the data of described instruction inquiry take are set to unavailable resource.
In the embodiment of the present invention, it is determined that go out data to be stored for needing data to be protected;Described data to be stored are stored and is used for preserving in the private partition needing data to be protected;After receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.Owing to data to be protected will be needed to be stored in private partition; after receiving deletion instruction; if the data that this deletion instruction instruction is deleted are stored in private partition; information can be sent to user; to remind user to indicate the data of deletion for protected data; thus effectively prevent the mistake deletion action of stored data in private partition, and then protect stored data in private partition.
Accompanying drawing explanation
Figure 1A is the structural representation of existing GTP subregion;
Figure 1B is the structural representation of the GTP subregion in the embodiment of the present invention;
The schematic flow sheet of the Fig. 2 a kind of data guard method for providing in the embodiment of the present invention;
The Fig. 3 anti-error interpolation schematic flow sheet deleting data for providing in the embodiment of the present invention;
The Fig. 4 data deletion schematic flow sheet for providing in the embodiment of the present invention;
The Fig. 5 data retrieving schematic flow sheet for providing in the embodiment of the present invention;
The schematic diagram of the Fig. 6 a kind of data protecting device for providing in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Below in conjunction with Figure of description, the embodiment of the present invention is described in further detail.Should be appreciated that embodiment described herein is merely to illustrate and explains the present invention, be not intended to limit the present invention.
In the embodiment of the present invention, existing partition table arranges at least one private partition and needs data to be protected for storage, it is achieved thereby that to the protection needing data to be protected.With globally unique identifier's partition table, (GUIDPartitionTable is called for short GPT;GloballyUniqueIdentifier; it being called for short GUID) partition table is example; Figure 1A show the structure chart of existing GPT partition table; Figure 1B is the structure chart of the GPT partition table in the embodiment of the present invention; the embodiment of the present invention is provided with multiple private partition in the DATA in GPT partition table (data) district, needs data to be protected with storage.
In the embodiment of the present invention one, it is provided that a kind of data guard method, as in figure 2 it is shown, include:
S21, determine that data to be stored are for needing data to be protected;
S22, described data to be stored are stored it is used for preserving in the private partition needing data to be protected;
S23, receive deletion instruction after, however, it is determined that go out described deletion instruction instruction delete data protected, send information, described information for point out described instruction delete data be protected data.
In the embodiment of the present invention, it is determined that go out data to be stored for needing data to be protected;Described data to be stored are stored and is used for preserving in the private partition needing data to be protected;After receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.Owing to data to be protected will be needed to be stored in private partition; after receiving deletion instruction; if the data that this deletion instruction instruction is deleted are protected; information can be sent to user; to remind user to indicate the data of deletion for protected data; thus effectively prevent the mistake deletion action of stored data in private partition, and then protect stored data in private partition.
In the embodiment of the present invention, after receiving deletion instruction, except the mode of above-mentioned S23 can be adopted, it is also possible in the following way:
If it is determined that the data that described deletion instruction instruction is deleted are protected data, ignore this deletion action.
Concrete, the attribute of the data arranging protection labelling is read-only, namely can only perform read operation, it is impossible to perform other operations, such as write operation, deletion action etc..
In the embodiment of the present invention, S21 determining, data to be stored are for needing data to be protected, including the optional implementation of following two:
Mode 1 is if it is determined that the type of described data to be stored is identical with any kind in the list of types needing data to be protected preset, it is determined that go out data to be stored for needing data to be protected.
Under which, pre-set the list of types needing data to be protected, as long as the type of data to be stored is identical with any kind preserved in this list, it is determined that go out data to be stored for needing data to be protected.
Illustrating, arranging in advance needs the list of types of data to be protected to include word, jpg and mp3.If the type of data to be stored is word or jpg or mp3, then it is assumed that data to be stored are to need data to be protected;If the type of data to be stored is the other types except word, jpg and mp3, such as mp4, then it is assumed that data to be stored are not required to the data of protection.
Which only needs to mate the type of data to be stored with the list of types needing data to be protected preset, and namely can determine that whether data to be stored are for needing data to be protected, therefore, it is achieved simple, it is not necessary to extra Signalling exchange.
Under which, according to demand, the type information needing to comprise in the list of types of data to be protected can be updated.
Mode 2, transmission solicited message, described solicited message is for whether request protects described data to be stored;Receiving for after indicating the protection instruction protecting described data to be stored, it is determined that go out data to be stored for needing data to be protected.
Under which, when needing storage data, all send solicited message to user, to inquire that whether user's data to be stored are for needing data to be protected every time.If receiving for after indicating the protection instruction protecting data to be stored, it is determined that these data to be stored are to need data to be protected;If receiving for after indicating the non-protected instruction that need not protect data to be stored, it is determined that these data to be stored are not required to the data of protection.
Under which, when needing storage data every time, can according to the actual demand of user, it is determined that whether data to be stored are for needing data to be protected, thus improving Consumer's Experience further.
In the embodiment of the present invention, S23 determining, the data that described deletion instruction instruction is deleted are protected, including the optional implementation of following two:
Mode one, the storing path of data deleted according to described instruction, however, it is determined that go out the data that described instruction deletes and be stored in described private partition, it is determined that go out the data that described deletion instruction instruction deletes protected.
Concrete, after receiving deletion instruction, first get the storing path of the data that described instruction is deleted, to judge whether the data that described instruction is deleted are stored in described private partition.If the data that described instruction is deleted are stored in described private partition, it is determined that the data going out described deletion instruction instruction deletion are protected;If the data that described instruction is deleted are not stored in described private partition, it is determined that the data going out described deletion instruction instruction deletion are unprotected.
If the data that the described instruction of mode two is deleted are provided with protection mark, it is determined that go out described deletion instruction and indicate the data deleted protected.
Concrete, after receiving deletion instruction, first get the relevant information of the data of described instruction deletion, if determining that the data that described instruction is deleted are provided with protection mark according to relevant information, it is determined that go out described deletion instruction and indicate the data deleted protected;If determining that the data that described instruction is deleted are not provided with protection mark according to relevant information, it is determined that go out described deletion instruction and indicate the data deleted unprotected.
Under which, it is determined that going out data to be stored for after needing data to be protected, the method also includes: for described data to be stored, described protection mark is set.
Under which, receiving after determining deletion instruction, the method also includes: the resource that the data that described instruction is deleted take in described private partition is set to first kind available resources, and deletes the protection mark of the data that described instruction is deleted.
In the embodiment of the present invention, storing new when needing data to be protected in described private partition, preferential storage is in the Equations of The Second Kind available resources in described private partition, and wherein, described Equations of The Second Kind available resources are the idling-resource in described private partition.
In the embodiment of the present invention, sending after information in S23, the method includes:
After receiving and determining deletion instruction, the resource that takies in described private partition of data that described instruction is deleted is set to first kind available resources;
When needing the data of storage in described private partition, if there are Equations of The Second Kind available resources in described private partition, it would be desirable to the data of storage store in described Equations of The Second Kind available resources, wherein, described Equations of The Second Kind available resources are idling-resource;
If described private partition is absent from described Equations of The Second Kind available resources, according to the erasing time of stored data in described first kind available resources, it would be desirable to the data of storage store in erasing time first kind available resources the earliest.
Concrete, after sending information, deletion instruction is determined if receiving, then the resource that the data that described instruction is deleted take in described private partition is set to first kind available resources, now from user perspective, the data that described instruction is deleted are deleted, now simply it is disconnected the link of the described resource indicating the data deleted to take in described private partition, the data that described instruction is deleted still are stored in this resource, but now this resource is available, the data preserved in this resource can be capped, data after covering cannot be recovered, defining this available resources is first kind available resources;
After being disconnected the link of the described resource indicating the data deleted to take in described private partition, if desired in private partition, store data, then: if described private partition exists Equations of The Second Kind available resources, the data needing storage are preferentially stored in Equations of The Second Kind available resources by i.e. idling-resource;If described private partition is absent from any Equations of The Second Kind available resources, namely Equations of The Second Kind available resources are all occupied, now the data needing storage can be stored first kind available resources, during storage, preferentially store in the first kind available resources that erasing time data the earliest take, namely cover the data deleted the earliest.
Optionally, after the data needing storage are stored in erasing time first kind available resources the earliest, the method also includes: send announcement information, and described announcement information is for notifying that in the first kind available resources shared by data needing to store, the data of original storage are by complete deletion.
Based on any of the above-described embodiment, in the embodiment of the present invention, after the resource that the data that described deletion instruction instruction is deleted take in described private partition is set to first kind available resources, described method also includes:
After receiving query statement, data according to the instruction inquiry of described query statement, determine the data that there is described instruction inquiry in described private partition, and the resource that takies in described private partition of data of described instruction inquiry is first kind available resources, the first kind available resources that the data of described instruction inquiry take are set to unavailable resource.
Concrete, after receiving query statement, the data according to the instruction inquiry of described query statement, first judge whether the data of described instruction inquiry exist;
If existing; open the data of described instruction inquiry; if now the data of described instruction inquiry are present in described private partition; and the resource first kind available resources that take in described private partition of data of described instruction inquiry; then the first kind available resources that the data of described instruction inquiry take are set to unavailable resource, thus again protecting the data of storage in these first kind available resources;
If being absent from, described in prompting user, the data of inquiry are indicated to be absent from.
Optionally, described query statement indicates the attribute information of the data of inquiry, in order in private partition, search the data of described instruction inquiry described in portability;In described query statement, portability is for representing the erasing time scope of the data of described instruction inquiry, in order to search stored data within the scope of erasing time in private partition.Certainly, the embodiment of the present invention does not limit the specific implementation of described query statement, and described query statement can also adopt other implementations.
Below by three specific embodiments, a kind of data guard method that the embodiment of the present invention is provided is described in detail.
Embodiment two, the anti-error interpolation flow process deleting data, as it is shown on figure 3, include:
S31, at least one private partition is set in partition holding table;
S32, determine application program produce need storage data;
Whether S33, the data judging whether to store are significant data (namely needing data to be protected);
If so, S34 is performed;
If it is not, perform S35;
S34, for needing the data of storage to arrange anti-error labelling (namely protecting mark) of deleting, and the data migration private partition stored by these needs preserves;
S35, the non-dedicated subregion of data migration stored by these needs preserve.
Embodiment three, data deletion flow process, as shown in Figure 4, including:
S41, receive user send deletion instruction;
S42, determine need delete data;
Whether S43, the data judging whether to delete are provided with and anti-error delete labelling;
If so, S44 is performed;
If it is not, perform S45;
S44, send information to user, to point out the configured anti-error labelling of deleting of data needing to delete, and perform S46;
S45, data execution deletion action needs deleted according to existing procedure;
S46, delete after instruction receiving the confirmation that user sends, cancel the anti-error labelling of deleting of data needing to delete, and to needing the data deleted to perform deletion action.
Now, simply linking disconnection (resource being about to the data needing deletion shared in private partition is set to first kind available resources), data are also present in private partition itself.
Embodiment four, data retrieving flow process, as it is shown in figure 5, include:
S51, receive user send query statement;
S52, judge described query statement instruction inquiry data whether exist;
If so, S53 is performed;
If it is not, perform S55;
If the resource that the data of the described instruction inquiry of S53 take is first kind available resources, then recover the link of the resource that the described data indicating inquiry take, the resource shared in private partition by the data of described instruction inquiry is set to unavailable resource, and performs S54.
It should be noted that, but after the Equations of The Second Kind available resources of private partition are all occupied, if also needing to move into new data, time sequencing when being then deleted according to the data in the resource of break link in private partition, the preferential resource storage using the time the earliest, and covering the data in this resource, the data being capped are to give for change.
S54, open described instruction inquiry data.
S55, prompting are absent from the data that described instruction is inquired about.
Said method handling process can realize with software program, and this software program can be stored in storage medium, when the software program of storage is called, performs said method step.
Based on same inventive concept, additionally providing a kind of data protecting device in the embodiment of the present invention, owing to the principle of this device solution problem is similar to above-mentioned a kind of data guard method, therefore the enforcement of this device may refer to the enforcement of method, repeats part and repeats no more.
In the embodiment of the present invention five, it is provided that a kind of data protecting device, as shown in Figure 6, including:
First processing module 61, is used for determining that data to be stored are for needing data to be protected;
Memory module 62, is used for preserving in the private partition needing data to be protected for described data to be stored being stored;
Second processing module 63, for after receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.
Optionally, described first processing module 61 specifically for:
If it is determined that the type of described data to be stored is identical with any kind in the list of types needing data to be protected preset, it is determined that go out data to be stored for needing data to be protected;Or
Sending solicited message, described solicited message is for whether request protects described data to be stored;Receiving for after indicating the protection instruction protecting described data to be stored, it is determined that go out data to be stored for needing data to be protected.
Optionally, described second processing module 63 specifically for:
Storing path according to the data that described instruction is deleted, however, it is determined that the data going out described instruction deletion are stored in described private partition, it is determined that go out described deletion instruction and indicate the data deleted protected;Or
If the data that described instruction is deleted are provided with protection mark, it is determined that go out described deletion instruction and indicate the data deleted protected.
Optionally, described second processing module 63 determines that data to be stored are for, after needing data to be protected, being additionally operable to: arrange described protection mark for described data to be stored.
Optionally, storing new when needing data to be protected in described private partition, preferential storage is in the Equations of The Second Kind available resources in described private partition, and wherein, described Equations of The Second Kind available resources are the idling-resource in described private partition.
Optionally, described second processing module 63 is additionally operable to after sending information:
After receiving and determining deletion instruction, the resource that takies in described private partition of data that described instruction is deleted is set to first kind available resources;
When needing the data of storage in described private partition, if there are Equations of The Second Kind available resources in described private partition, it would be desirable to the data of storage store in described Equations of The Second Kind available resources, wherein, described Equations of The Second Kind available resources are idling-resource;
If described private partition is absent from described Equations of The Second Kind available resources, according to the erasing time of stored data in described first kind available resources, it would be desirable to the data of storage store in erasing time first kind available resources the earliest.
Optionally, described second processing module 63 is additionally operable to after the resource that the data that described deletion instruction instruction is deleted take in described private partition is set to first kind available resources:
After receiving query statement, data according to the instruction inquiry of described query statement, determine the data that there is described instruction inquiry in described private partition, and the resource that takies in described private partition of data of described instruction inquiry is first kind available resources, the first kind available resources that the data of described instruction inquiry take are set to unavailable resource.
Optionally, the data protecting device that the embodiment of the present invention provides is mobile terminal, such as mobile phone, panel computer, notebook computer etc..
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, complete software implementation or the embodiment in conjunction with software and hardware aspect.And, the present invention can adopt the form at one or more upper computer programs implemented of computer-usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) wherein including computer usable program code.
The present invention is that flow chart and/or block diagram with reference to method according to embodiments of the present invention, equipment (system) and computer program describe.It should be understood that can by the combination of the flow process in each flow process in computer program instructions flowchart and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can be provided to produce a machine to the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device so that the instruction performed by the processor of computer or other programmable data processing device is produced for realizing the device of function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and can guide in the computer-readable memory that computer or other programmable data processing device work in a specific way, the instruction making to be stored in this computer-readable memory produces to include the manufacture of command device, and this command device realizes the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices provides for realizing the step of function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art are once know basic creative concept, then these embodiments can be made other change and amendment.So, claims are intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, the present invention can be carried out various change and modification without deviating from the spirit and scope of the present invention by those skilled in the art.So, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (12)

1. a data guard method, it is characterised in that described method includes:
Determine that data to be stored are for needing data to be protected;
Described data to be stored are stored and is used for preserving in the private partition needing data to be protected;
After receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.
2. the method for claim 1, it is characterised in that determine that data to be stored are for needing data to be protected, including:
If it is determined that the type of described data to be stored is identical with any kind in the list of types needing data to be protected preset, it is determined that go out data to be stored for needing data to be protected;Or
Sending solicited message, described solicited message is for whether request protects described data to be stored;Receiving for after indicating the protection instruction protecting described data to be stored, it is determined that go out data to be stored for needing data to be protected.
3. the method for claim 1, it is characterised in that determine that the data that described deletion instruction instruction is deleted are protected, including:
Storing path according to the data that described instruction is deleted, however, it is determined that the data going out described instruction deletion are stored in described private partition, it is determined that go out described deletion instruction and indicate the data deleted protected;Or
If the data that described instruction is deleted are provided with protection mark, it is determined that go out described deletion instruction and indicate the data deleted protected.
4. method as claimed in claim 3, it is characterised in that determining that data to be stored are for after needing data to be protected, described method also includes: described protection mark is set for described data to be stored.
5. the method for claim 1, it is characterised in that after sending information, described method also includes:
After receiving and determining deletion instruction, the resource that takies in described private partition of data that described instruction is deleted is set to first kind available resources;
When needing the data of storage in described private partition, if there are Equations of The Second Kind available resources in described private partition, it would be desirable to the data of storage store in described Equations of The Second Kind available resources, wherein, described Equations of The Second Kind available resources are idling-resource;
If described private partition is absent from described Equations of The Second Kind available resources, according to the erasing time of stored data in described first kind available resources, it would be desirable to the data of storage store in erasing time first kind available resources the earliest.
6. method as claimed in claim 5, it is characterised in that after the resource that the data that described deletion instruction instruction is deleted take in described private partition is set to first kind available resources, described method also includes:
After receiving query statement, data according to the instruction inquiry of described query statement, determine the data that there is described instruction inquiry in described private partition, and the resource that takies in described private partition of data of described instruction inquiry is first kind available resources, the first kind available resources that the data of described instruction inquiry take are set to unavailable resource.
7. a data protecting device, it is characterised in that described device includes:
First processing module, is used for determining that data to be stored are for needing data to be protected;
Memory module, is used for preserving in the private partition needing data to be protected for described data to be stored being stored;
Second processing module, for after receiving deletion instruction, however, it is determined that the data going out described deletion instruction instruction deletion are protected, send information, and the data that described information is deleted for pointing out described instruction are protected data.
8. device as claimed in claim 7, it is characterised in that described first processing module specifically for:
If it is determined that the type of described data to be stored is identical with any kind in the list of types needing data to be protected preset, it is determined that go out data to be stored for needing data to be protected;Or
Sending solicited message, described solicited message is for whether request protects described data to be stored;Receiving for after indicating the protection instruction protecting described data to be stored, it is determined that go out data to be stored for needing data to be protected.
9. device as claimed in claim 7, it is characterised in that described second processing module specifically for:
Storing path according to the data that described instruction is deleted, however, it is determined that the data going out described instruction deletion are stored in described private partition, it is determined that go out described deletion instruction and indicate the data deleted protected;Or
If the data that described instruction is deleted are provided with protection mark, it is determined that go out described deletion instruction and indicate the data deleted protected.
10. device as claimed in claim 9, it is characterised in that described second processing module determines that data to be stored are for, after needing data to be protected, being additionally operable to: described protection mark is set for described data to be stored.
11. device as claimed in claim 7, it is characterised in that described second processing module is additionally operable to after sending information:
After receiving and determining deletion instruction, the resource that takies in described private partition of data that described instruction is deleted is set to first kind available resources;
When needing the data of storage in described private partition, if there are Equations of The Second Kind available resources in described private partition, it would be desirable to the data of storage store in described Equations of The Second Kind available resources, wherein, described Equations of The Second Kind available resources are idling-resource;
If described private partition is absent from described Equations of The Second Kind available resources, according to the erasing time of stored data in described first kind available resources, it would be desirable to the data of storage store in erasing time first kind available resources the earliest.
12. device as claimed in claim 11, it is characterised in that described second processing module is additionally operable to after the resource that the data that described deletion instruction instruction is deleted take in described private partition is set to first kind available resources:
After receiving query statement, data according to the instruction inquiry of described query statement, determine the data that there is described instruction inquiry in described private partition, and the resource that takies in described private partition of data of described instruction inquiry is first kind available resources, the first kind available resources that the data of described instruction inquiry take are set to unavailable resource.
CN201610082318.8A 2016-02-05 2016-02-05 Data protection method and device Pending CN105760788A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610082318.8A CN105760788A (en) 2016-02-05 2016-02-05 Data protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610082318.8A CN105760788A (en) 2016-02-05 2016-02-05 Data protection method and device

Publications (1)

Publication Number Publication Date
CN105760788A true CN105760788A (en) 2016-07-13

Family

ID=56330686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610082318.8A Pending CN105760788A (en) 2016-02-05 2016-02-05 Data protection method and device

Country Status (1)

Country Link
CN (1) CN105760788A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111651122A (en) * 2020-05-20 2020-09-11 远景智能国际私人投资有限公司 Data deleting method, device, server and storage medium
CN113407994A (en) * 2021-06-22 2021-09-17 北京金山云网络技术有限公司 Data protection method, device and equipment for object storage and storage medium
WO2024032770A1 (en) * 2022-08-12 2024-02-15 维沃移动通信有限公司 Data deletion method and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364192A (en) * 2007-08-09 2009-02-11 英华达(上海)电子有限公司 Recovery method and system after data being cancelled by mistake and electronic appliance
CN102819911A (en) * 2012-07-17 2012-12-12 武汉天喻信息产业股份有限公司 Ticket buying and checking method and movie ticket service system
CN103631617A (en) * 2013-11-01 2014-03-12 北京奇虎科技有限公司 Method and device for unloading system application on terminal equipment
CN103714297A (en) * 2012-10-08 2014-04-09 三星电子株式会社 Apparatus and a method for protecting data in terminal
CN103955421A (en) * 2014-05-06 2014-07-30 珠海市君天电子科技有限公司 Method and system for file deletion

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364192A (en) * 2007-08-09 2009-02-11 英华达(上海)电子有限公司 Recovery method and system after data being cancelled by mistake and electronic appliance
CN102819911A (en) * 2012-07-17 2012-12-12 武汉天喻信息产业股份有限公司 Ticket buying and checking method and movie ticket service system
CN103714297A (en) * 2012-10-08 2014-04-09 三星电子株式会社 Apparatus and a method for protecting data in terminal
US20140101777A1 (en) * 2012-10-08 2014-04-10 Samsung Electronics Co. Ltd. Apparatus and method for protecting data in terminal
CN103631617A (en) * 2013-11-01 2014-03-12 北京奇虎科技有限公司 Method and device for unloading system application on terminal equipment
CN103955421A (en) * 2014-05-06 2014-07-30 珠海市君天电子科技有限公司 Method and system for file deletion

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111651122A (en) * 2020-05-20 2020-09-11 远景智能国际私人投资有限公司 Data deleting method, device, server and storage medium
CN111651122B (en) * 2020-05-20 2023-07-28 远景智能国际私人投资有限公司 Data deleting method, device, server and storage medium
CN113407994A (en) * 2021-06-22 2021-09-17 北京金山云网络技术有限公司 Data protection method, device and equipment for object storage and storage medium
WO2024032770A1 (en) * 2022-08-12 2024-02-15 维沃移动通信有限公司 Data deletion method and electronic device

Similar Documents

Publication Publication Date Title
US10129264B2 (en) Method and apparatus for implementing document sharing between user groups
EP3306897B1 (en) Access method and apparatus
US20120185454A1 (en) Method and device for accessing file resources
CN103500116A (en) Method and system for clearing data generated by application program
CN105335187A (en) Application processing method and apparatus
CN104011698B (en) Supplementary data is accessed based on the identifier derived from corresponding primary application program data
CN105681566A (en) Incoming call number processing method and device
CN105224396A (en) A kind of business data processing method and device
CN105760788A (en) Data protection method and device
CN105955847A (en) False deletion preventing method and system for electronic device file
CN103281798A (en) Method, device and system for achieving modification synchronization
CN104484172A (en) Method and device for packaging files
CN104870068A (en) Method and router for access network
CN105630757A (en) Data editing method and apparatus
CN107018189A (en) Migrate application data and receive the method and device of application data
CN103559198A (en) Data synchronizing method and equipment
CN104219356A (en) Method and device for displaying and searching contact man information and mobile terminal
CN103944805A (en) Information updating method and system based on Wechat platform
CN103179153B (en) Mobile terminal and mobile terminal data backup method based on cloud server
CN104517067A (en) Method, device and system for data access
CN104021022A (en) Partition adjusting method and electronic equipment
CN105224575A (en) A kind of document display method and device
CN102938806B (en) A kind of method and device obtaining call resource
CN110866380A (en) Method and terminal for filling in information field content
CN114706526A (en) Automatic capacity expansion method, system and equipment for cloud native storage data volume

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160713