CN105786575A - Mobile terminal and data elimination avoiding method thereof during system rewriting - Google Patents

Mobile terminal and data elimination avoiding method thereof during system rewriting Download PDF

Info

Publication number
CN105786575A
CN105786575A CN201610154128.2A CN201610154128A CN105786575A CN 105786575 A CN105786575 A CN 105786575A CN 201610154128 A CN201610154128 A CN 201610154128A CN 105786575 A CN105786575 A CN 105786575A
Authority
CN
China
Prior art keywords
rewriting
content
data
config set
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610154128.2A
Other languages
Chinese (zh)
Other versions
CN105786575B (en
Inventor
纪海军
张曰琳
周欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chima Technology Co Ltd
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Chima Technology Co Ltd
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chima Technology Co Ltd, Beijing Qihoo Technology Co Ltd filed Critical Beijing Chima Technology Co Ltd
Priority to CN201610154128.2A priority Critical patent/CN105786575B/en
Publication of CN105786575A publication Critical patent/CN105786575A/en
Application granted granted Critical
Publication of CN105786575B publication Critical patent/CN105786575B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a mobile terminal and a data elimination avoiding method thereof during system rewriting.The method comprises the steps that a resource interface used for determining whether a configuration set of data area content is eliminated or not during system rewriting is applied for an agency service used for acquiring the highest permission of a system; the resource interface is called, and the configuration set is set in the mode that the data area content is not eliminated during system rewriting; a rewriting data package used for system rewriting is written by responding a user command.According to the method, the resource interface used for determining whether the configuration set of the data area content is eliminated or not during system rewriting is applied for the agency service and then called to modify the configuration set to ensure that the content of an original data area is not eliminated, on one hand, data loss caused when a user recovers the mobile terminal is avoided, on the other hand, the repeated copying process performed for saving data when the user recovers the mobile terminal is avoided, and the operating procedures of recovering the mobile terminal is simplified.

Description

Mobile terminal and for rewriting system time data exempt from remove method
Technical field
The present invention relates to field of mobile terminals, specifically, the present invention relates to a kind of mobile terminal and data are exempted to remove during for rewriting system method.
Background technology
Brush machine refers to by certain method change or replaces language, software or the operating system etc. that originally exist in mobile terminal, and popular system of resetting exactly, brush machine can make cell-phone function more perfect.In prior art, in order to prevent that brush machine process exists bug, in advance system can be carried out double; two clear, namely remove buffer memory and internal storage data;So it is possible not only to make brush machine cleaner, also avoids the system that legacy data causes unstable.And generally for avoiding deleting the data of user, can be copied out by user data, but for the big user of data volume, copy procedure takes long enough, and needs a storage tool with enough memory spaces.Meanwhile, brush machine also needs to after completing corresponding data are copied to mobile terminal again so that user operation is not convenient, increases complicated operation degree.Further, if some user data is missed, then can lose because of System Formatted data area in brush machine process, cause data irrecoverable, the loss that cause the user is certain.Accordingly, it is desirable to provide a kind of more convenient more effective way so that in brush machine process, data can intact preservation be avoided being removed by mistake.
Summary of the invention
The purpose of the present invention aims to solve the problem that at least one problem above-mentioned, it is provided that a kind of data exempt from the method removed, and loses with the system data solving to cause in brush machine process.
To achieve these goals, the present invention provide a kind of for rewriting system time data exempt from remove method, comprise the following steps:
Resource interface to the config set of the region content that whether clears data when being used for the agency service application obtaining system highest weight limit for determining rewriting system;
Call described resource interface, described config set is set as when rewriting system and exempts to remove described data area content;
The rewriting packet of rewriting system it is used in response to user instruction write.
Further, also including step, the content of described data area is restarted and recovered to completion system after rewriteeing.
Concrete, during the system reboot of described rewriting, described config set is verified, is proved to be successful, recover the content of described data area.
Concrete, there are mapping relations between its corresponding system version of described config set.
Preferably, described mapping relations are stored in cloud server in the form of a list, and are carried out regular update by cloud server.
Wherein, the resource interface of described config set is provided with the form forming signature according to preset rules.
Preferably, described signature generates based on the feature of config set information.
Concrete, the resource interface of described config set is provided with the form forming ciphertext according to preset rules encryption.
Wherein, described agency service runs on the ccf layer of system.
Concrete, described agency service is modified system signature and obtains system highest weight limit.
Concrete, by default file being prestored the appointment position to system and the relevant original of replacement system, to implant described agency service.
Preferably, described default file is under recovery pattern in system and is stored to appointment position.
A kind of mobile terminal, including:
Application unit: be configured to the resource interface of config set to the region content that whether clears data during for obtaining the agency service application of system highest weight limit for determining rewriting system;
Setup unit: be configured to call described resource interface, is set as when rewriting system by described config set and exempts to remove described data area content;
Rewriting unit: be configured to respond to the user instruction write rewriting packet for rewriting system.
Further, also include data recovery unit, after rewriteeing for completion system, restart and recover the content of described data area.
Concrete, during the system reboot of described rewriting, data recovery unit described config set is verified, is proved to be successful, recover the content of described data area.
Concrete, there are mapping relations between its corresponding system version of described config set.
Preferably, described mapping relations are stored in cloud server in the form of a list, and are carried out regular update by cloud server.
Wherein, described signature generates based on the feature of config set information.
Preferably, the resource interface of described config set is provided with the form forming signature according to preset rules.
Concrete, described signature generates based on the feature of config set information.
Concrete, the resource interface of described config set is provided with the form forming ciphertext according to preset rules encryption.
Wherein, described agency service runs on the ccf layer of system.
Concrete, described agency service is modified system signature and obtains system highest weight limit.
Concrete, by default file being prestored the appointment position to system and the relevant original of replacement system, to implant described agency service.
Concrete, described default file is under recovery pattern in system and is stored to appointment position.
Compared to existing technology, the solution of the present invention has the advantage that
The present invention obtains system highest weight limit by the agency service of implant system process, and it is as the agency providing system service, and the application serviced to other Request System provides system service, controls corresponding system service under the premise keeping security of system.On this basis, the resource interface of the config set of the region content that whether clears data during by being used for determine rewriting system to agency service application, obtain respective resources interface, and by calling described resource interface, described config set is modified, so that when the system reboot being rewritten is verified, described config set can successfully pass checking, so that it is guaranteed that the content of former data area is not eliminated, still it is saved in corresponding memory space, and recovers after system reboot.By the method for the invention or device, avoid the loss of data that user causes when carrying out brush machine on the one hand, avoid user when brush machine to preserve the repetition copy procedure that data carry out on the other hand, simplify the operating process of brush machine.
Aspect and advantage that the present invention adds will part provide in the following description, and these will become apparent from the description below, or is recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will be apparent from easy to understand from the following description of the accompanying drawings of embodiments, wherein:
Fig. 1 be of the present invention for rewriting system time data exempt from remove method flow schematic diagram;
Fig. 2 is the structural representation of mobile terminal of the present invention.
Detailed description of the invention
Being described below in detail embodiments of the invention, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of same or like function from start to finish.The embodiment described below with reference to accompanying drawing is illustrative of, and is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, and singulative used herein " ", " one ", " described " and " being somebody's turn to do " may also comprise plural form.Should be further understood that, the wording " including " used in the description of the present invention refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim element to be " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or can also there is intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or wireless couple.Wording "and/or" used herein includes one or more list the whole of item or any cell being associated and combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technical term and scientific terminology), have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.It should also be understood that, those terms of definition in such as general dictionary, should be understood that there is the meaning consistent with the meaning in the context of prior art, and unless by specific definitions as here, otherwise will not explain by idealization or excessively formal implication.
Those skilled in the art of the present technique are appreciated that, " terminal " used herein above, " terminal unit " had both included the equipment of wireless signal receiver, it only possesses the equipment of wireless signal receiver of non-emissive ability, include again the equipment receiving and launching hardware, it has the reception that on bidirectional communication link, can carry out two-way communication and launches the equipment of hardware.This equipment may include that honeycomb or other communication equipments, and it has single line display or multi-line display or does not have honeycomb or other communication equipments of multi-line display;PCS (PersonalCommunicationsService, PCS Personal Communications System), its can combine voice, data process, fax and/or its communication ability;PDA (PersonalDigitalAssistant, personal digital assistant), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, calendar and/or GPS (GlobalPositioningSystem, global positioning system) receptor;Conventional laptop and/or palmtop computer or other equipment, it has and/or includes the conventional laptop of radio frequency receiver and/or palmtop computer or other equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged in the vehicles (aviation, sea-freight and/or land), or it is suitable for and/or is configured at local runtime, and/or with distribution form, any other position operating in the earth and/or space is run." terminal " used herein above, " terminal unit " can also is that communication terminal, access terminals, music/video playback terminal, can be such as PDA, MID (MobileInternetDevice, mobile internet device) and/or there is the mobile phone of music/video playing function, it is also possible to it is the equipment such as intelligent television, Set Top Box.
For android system, brush machine is the process of formatting, in order to prevent there is bug in brush machine process, it will usually system is carried out double; two clear, namely removes buffer memory and internal storage data.So it is possible not only to make brush machine cleaner, also avoids the system that legacy data causes unstable.But this process would generally cause the loss of user data, and cannot recover, thus bring unnecessary loss to user.For these reasons, the present invention provides a kind of data to exempt from sweep-out method, is not wiped free of so that being maintained with data in system brush machine process.
As it is shown in figure 1, it exempts from the schematic flow sheet of sweep-out method for data when being used for rewriting system described in one embodiment of the invention, comprise the following steps:
Step S101, the resource interface of config set to the region content that whether clears data when being used for the agency service application obtaining system highest weight limit for determining rewriting system;
Described agency service is by implant system process during to system brush machine, in a particular embodiment by default file storing the appointment position to system and the relevant original of replacement system, the relevant original of wherein said replacement system includes replacing whole system file or only replacing part system file.
Described default file is different from the configuration mapped file of system brush machine pattern.In the specific embodiment of the invention, described default file includes the file being named as Chimaster and NetD, and it is all placed into the appointment position " date/local/temp " of system.Described default file is under recovery pattern in system and is stored to appointment position, wherein said storing process is specially decompression process, the compressed package of default file carries out decompression be reduced to specific bit and put, so that the corresponding original of the associated documents covering system in default file.The startup of described recovery pattern, by guiding file to perform, guides corresponding default file put into appointment position and decompress, and wherein, described guiding file can be system original, it is also possible to for rewriteeing the file of write, the invention is not limited in this regard.
By by default file writing system, thus implanting described agency service.Agency service of the present invention refers specifically to as transfer service mutual between system process and other application processes.It is known that Root authority refers to system manager's authority of Unix type operating system (including Linux and Android), it is similar to Administrator (manager) authority in Windows system;Root authority can access and revise almost all of file (android system file and user file) in the mobile equipment of user.But, owing to current mobile terminal system is very strict for the management of Root authority, most application or program do not possess Root authority under normal circumstances, therefore need the operation possessing Root authority just cannot perform for some.Under normal conditions, the highest control authority of system, namely Root authority can be limited for security consideration, thus limits a lot of application behavior, in order to system resource being done allotment further and controlling, it is necessary to obtain the Root authority of system.And prior art obtains Root authority by simple brush machine mode so that the safety of system is on the hazard.Thus, the embodiment of the present invention adopts the mode of agency service to obtain Root authority, obtains the highest weight limit of system especially by amendment system signature.When other application requests obtain system service, agency service provide corresponding resource interface, and some signatures are provided, when signature verification is passed through, it is allowed to call corresponding resource interface, realize safer Root authority in this way and control.Concrete, described default file brush is entered ROM by recovery brush machine by the embodiment of the present invention, recovery guides described default file to be stored in the ad-hoc location of system, and guide the decompression of described default file to store to ROM replacement original system file, and generate a signature based on amended ROM file, this signature is verified by system, to guarantee that the system after brush machine can normal startup optimization.
Wherein, described agency service runs on the ccf layer of system, such as android system, including four layer architectures, and respectively application layer, ccf layer, system Runtime Library layer and Linux inner core.The erection of described agency service has the module of the resource interface access rights for managing system, in this case, when certain program process asks corresponding resource interface, generally received its request by this management module, this request instruction, should be substantially a kind of interface signature, this management module distribute to this program process in advance, function similarly to the effect of token.This signature is verified, just provides corresponding resource interface to described program process after being verified after receiving the interface signature comprising respective request by management module.
Based on above-mentioned principle, when system being carried out brush machine and rewriteeing, the resource interface of the config set of the region content that whether clears data when being first used for determine rewriting system to described agency service application.Wherein, described data area includes all data of storage in memory headroom.Under normal circumstances, system exists a config set, is used for deciding whether the region content that clears data, is verified by system when it restarts after system is rewritten, as being proved to be successful, recover and read the data of data area, the data in the region that then automatically clears data such as authentication failed.Therefore, the embodiment of the present invention obtains described resource interface based on this principle to described proxy service request, in order to follow-up, it is modified.
Step S102, call described resource interface, described config set is set as when rewriting system and exempts to remove described data area content;
After the resource interface of the config set of the region content that whether clears data when obtaining for determining rewriting system based on above-mentioned steps, described config set is set as when rewriting system and exempts to remove described data area content.In a particular embodiment, described config set is different according to the difference of system version, different still further accord with the difference of mobile terminal model.As Samsung galaxynote4 is different from the system of Semen setariae note, then the described config set in its system is also different, the system installed in further example such as Samsung galaxynote4 is amended Android4.1, the system installed in Semen setariae note is amended Android4.2, and the amendment of the android system of different editions is also not quite similar by both, its self-defining system of each self-forming, and it is used to the hands machine of different model, so can be mapped as the relation between mobile phone model and config set further according to the corresponding relation between mobile phone model and system version, namely different config sets can be determined by different types.
Mapping relations between described config set and each system version or type are stored in cloud server in the form of a list, in a particular embodiment, described list can be previously generated, by collecting different system versions config set corresponding to detector, its corresponding relation is stored one by one.Cloud server carries out regular update based on this presets list, increases new system version and corresponding config set, deletes the system version being eliminated and corresponding config set simultaneously.Further, described the presets list can also record the mapping relations between the corresponding config set of different type of machines.
Preferably, the resource interface of described config set is provided with the form forming signature according to preset rules.In a particular embodiment, described preset rules refers to by which kind of mode to process to generate signature to described resource interface, as adopted hash algorithm or RSA Algorithm to process resource interface to generate a string random code characterizing signature.Specifically, described signature adopts preset rules to generate described signature based on the correlated characteristic of config set information.The mode generating signature is not limited as by the present invention, and namely described preset rules includes the mode that arbitrarily can form signature, and it does not affect the realization of the present invention.Wherein, this signature is provided previously by by agency service, when the resource interface of the config set to the region content that whether clears data time described in the acquisition of described proxy service request for determining rewriting system, first verifies described signature, if signature verification success, then allow to call the resource interface of described config set.
It is further preferred that the resource interface of described config set is provided with the form forming ciphertext according to preset rules encryption.In a particular embodiment, the information such as AES, decipherment algorithm of making an appointment, wherein said enciphering and deciphering algorithm can be the method being arbitrarily capable of encryption and decryption, not as limitation of the present invention.The resource interface of the config set of the region content that whether clears data when being used for determine rewriting system to agency service application, described agency service provides the resource interface of described config set with the form of ciphertext.The decipherment algorithm that described resource interface adopts agreement is decrypted, thus obtaining corresponding resource interface.
After obtaining described resource interface, described config set is modified, set it to and exempt from the region content that clears data when rewriting system.In a particular embodiment, described config set can be one or more parameter, and one or more files, one or more instructions, they are different according to the difference of system version.Call corresponding resource interface, described config set is modified, it is ensured that when system rewrites, described data area content is not eliminated.
It is significant to note that, described system rewrite process refers specifically to the brush machine process of user operation, it is different from the process that described default file brush enters, therefore it is prohibited the content of described default file is modified in the brush machine process of user operation, the change of described default file need to by brushing the signature verification of fashionable generation at it, the process agency service of user's brush machine does not provide corresponding signature, therefore can not default file content be modified.
Step S103, in response to user instruction write for the rewriting packet of rewriting system.
Described user instruction includes various ways, such as the order inputted by user, is and for example providing corresponding system to rewrite under interface conditions, can pass through to arrange selection key, dialog box etc. and receive the instruction of user.User instruction is responded, performs the write operation of system, replace original system file to realize the rewriting of system.
Further, other embodiments of the invention also include, and after system has rewritten, system carries out restarting and recovering the content of described data area.Concrete, when the system reboot re-writed, the config set of the region content that whether clears data when being used for and determine rewriting system can be verified, then recover the content of described data area when the authentication succeeds.Owing to above-mentioned steps is complete the amendment to described config set so that it can pass through system verification, thus ensure that described data area is not eliminated, by system recovery and read.
Based on said process, the resource interface of the config set of the region content that whether clears data during by being used for determine rewriting system to agency service application, obtain respective resources interface, and by calling described resource interface, described config set is modified, so that when the system reboot being rewritten is verified, described config set can successfully pass checking, so that it is guaranteed that the content of former data area is not eliminated, still it is saved in corresponding memory space, and recovers after system reboot.Thus, avoid the loss of data that user causes when carrying out brush machine on the one hand, avoid user when brush machine to preserve the repetition copy procedure that data carry out on the other hand, simplify the operating process of brush machine.
Modularized thoughts according to computer program, the present invention exempts from sweep-out method according to aforesaid data and additionally provides the specific embodiment of a kind of mobile terminal, as shown in Figure 2, described mobile terminal includes application unit 11, setup unit 12, rewriting unit 13, and the data recovery unit 14 in other embodiments, the function that prompting each unit realizes in detailed below:
Application unit 11, is configured to the resource interface of config set to the region content that whether clears data during for obtaining the agency service application of system highest weight limit for determining rewriting system;
Described agency service is by implant system process during to system brush machine, in a particular embodiment by default file storing the appointment position to system and the relevant original of replacement system, the relevant original of wherein said replacement system includes replacing whole system file or only replacing part system file.
Described default file is different from the configuration mapped file of system brush machine pattern.In the specific embodiment of the invention, described default file includes the file being named as Chimaster and NetD, and it is all placed into the appointment position " date/local/temp " of system.Described default file is under recovery pattern in system and is stored to appointment position, wherein said storing process is specially decompression process, the compressed package of default file carries out decompression be reduced to specific bit and put, so that the corresponding original of the associated documents covering system in default file.The startup of described recovery pattern, by guiding file to perform, guides corresponding default file put into appointment position and decompress, and wherein, described guiding file can be system original, it is also possible to for rewriteeing the file of write, the invention is not limited in this regard.
By by default file writing system, thus implanting described agency service.Agency service of the present invention refers specifically to as transfer service mutual between system process and other application processes.Under normal conditions, the highest control authority of system, namely Root authority can be limited for security consideration, thus limits a lot of application behavior, in order to system resource being done allotment further and controlling, it is necessary to obtain the Root authority of system.And prior art obtains Root authority by simple brush machine mode so that the safety of system is on the hazard.Thus, the embodiment of the present invention adopts the mode of agency service to obtain Root authority, obtains the highest weight limit of system especially by amendment system signature.When other application requests obtain system service, agency service provide corresponding resource interface, and some signatures are provided, when signature verification is passed through, it is allowed to call corresponding resource interface, realize safer Root authority in this way and control.Concrete, described default file brush is entered ROM by recovery brush machine by the embodiment of the present invention, recovery guides described default file to be stored in the ad-hoc location of system, and guide the decompression of described default file to store to ROM replacement original system file, and generate a signature based on amended ROM file, this signature is verified by system, with guarantee the system after brush machine can normal startup optimization, be simultaneously implanted described agency service at brush machine.
Wherein, described agency service runs on the ccf layer of system, such as android system, including four layer architectures, and respectively application layer, ccf layer, system Runtime Library layer and Linux inner core.The erection of described agency service has the module of the resource interface access rights for managing system, in this case, when certain program process asks corresponding resource interface, generally received its request by this management module, this request instruction, should be substantially a kind of interface signature, this management module distribute to this program process in advance, function similarly to the effect of token.This signature is verified, just provides corresponding resource interface to described program process after being verified after receiving the interface signature comprising respective request by management module.
Based on above-mentioned principle, when system being carried out brush machine and rewriteeing, the resource interface of the config set of the region content that whether clears data when being first used for and determine rewriting system to described agency service application by described application unit 11.Wherein, described data area includes all data of storage in memory headroom.Under normal circumstances, system exists a config set, is used for deciding whether the region content that clears data, is verified by system when it restarts after system is rewritten, as being proved to be successful, recover and read the data of data area, the data in the region that then automatically clears data such as authentication failed.Therefore, the embodiment of the present invention obtains described resource interface based on this principle to described proxy service request, in order to follow-up, it is modified.
Setup unit 12, is configured to call described resource interface, is set as when rewriting system by described config set and exempts to remove described data area content;
After the resource interface of the config set of the region content that whether clears data when obtaining for determining rewriting system based on above-mentioned steps, setup unit 12 call described resource interface, described config set is set as when rewriting system and exempts to remove described data area content.In a particular embodiment, described config set is different according to the difference of system version, different still further accord with the difference of mobile terminal model.As Samsung galaxynote4 is different from the system of Semen setariae note, then the described config set in its system is also different, the system installed in further example such as Samsung galaxynote4 is amended Android4.1, the system installed in Semen setariae note is amended Android4.2, and the amendment of the android system of different editions is also not quite similar by both, its self-defining system of each self-forming, and it is used to the hands machine of different model, so can be mapped as the relation between mobile phone model and config set further according to the corresponding relation between mobile phone model and system version, namely different config sets can be determined by different types.
Mapping relations between described config set and each system version or type are stored in cloud server in the form of a list, in a particular embodiment, described list can be previously generated, by collecting different system versions config set corresponding to detector, its corresponding relation is stored one by one.Cloud server carries out regular update based on this presets list, increases new system version and corresponding config set, deletes the system version being eliminated and corresponding config set simultaneously.Further, described the presets list can also record the mapping relations between the corresponding config set of different type of machines.
Preferably, the resource interface of described config set is provided with the form forming signature according to preset rules.In a particular embodiment, described preset rules refers to by which kind of mode to process to generate signature to described resource interface, as adopted hash algorithm or RSA Algorithm to process resource interface to generate a string random code characterizing signature.Specifically, described signature adopts preset rules to generate described signature based on the correlated characteristic of config set information.The mode generating signature is not limited as by the present invention, and namely described preset rules includes the mode that arbitrarily can form signature, and it does not affect the realization of the present invention.Wherein, this signature is provided previously by by agency service, when the resource interface of the config set to the region content that whether clears data time described in the acquisition of described proxy service request for determining rewriting system, first verifies described signature, if signature verification success, then allow to call the resource interface of described config set.
It is further preferred that the resource interface of described config set is provided with the form forming ciphertext according to preset rules encryption.In a particular embodiment, the information such as AES, decipherment algorithm of making an appointment, wherein said enciphering and deciphering algorithm can be the method being arbitrarily capable of encryption and decryption, not as limitation of the present invention.The resource interface of the config set of the region content that whether clears data when being used for determine rewriting system to agency service application, described agency service provides the resource interface of described config set with the form of ciphertext.The decipherment algorithm that described resource interface adopts agreement is decrypted, thus obtaining corresponding resource interface.
After obtaining described resource interface, described config set is modified, set it to and exempt from the region content that clears data when rewriting system.In a particular embodiment, described config set can be one or more parameter, and one or more files, one or more instructions, they are different according to the difference of system version.Call corresponding resource interface, described config set is modified, it is ensured that when system rewrites, described data area content is not eliminated.
It is significant to note that, described system rewrite process refers specifically to the brush machine process of user operation, it is different from the process that described default file brush enters, therefore it is prohibited the content of described default file is modified in the brush machine process of user operation, the change of described default file need to by brushing the signature verification of fashionable generation at it, the process agency service of user's brush machine does not provide corresponding signature, therefore can not default file content be modified.
Rewriting unit 13, is configured to respond to the user instruction write rewriting packet for rewriting system.
Described user instruction includes various ways, such as the order inputted by user, is and for example providing corresponding system to rewrite under interface conditions, can pass through to arrange selection key, dialog box etc. and receive the instruction of user.User instruction is responded by described rewriting unit 13, performs the write operation of system, replaces original system file to realize the rewriting of system.
Further, other embodiments of the invention also include data recovery unit 14, and after system has rewritten, system carries out restarting and recovering the content of described data area.Concrete, when the system reboot re-writed, the config set of the region content that whether clears data when being used for and determine rewriting system can be verified, then recover the content of described data area when the authentication succeeds.Owing to above-mentioned steps is complete the amendment to described config set so that it can pass through system verification, thus ensure that described data area is not eliminated, by system recovery and read.
Based on above-mentioned each unit module, the resource interface of the config set of the region content that whether clears data during by being used for determine rewriting system to agency service application, obtain respective resources interface, and by calling described resource interface, described config set is modified, so that when the system reboot being rewritten is verified, described config set can successfully pass checking, so that it is guaranteed that the content of former data area is not eliminated, still it is saved in corresponding memory space, and recovers after system reboot.Thus, avoid the loss of data that user causes when carrying out brush machine on the one hand, avoid user when brush machine to preserve the repetition copy procedure that data carry out on the other hand, simplify the operating process of brush machine.
In an application scenarios of the present invention, default file brush is entered system by method of the present invention by being preconfigured to of customer mobile terminal, to guarantee acquisition system root authority, starts agency service of the present invention simultaneously.When user is follow-up mobile terminal is carried out brush machine time, by recovery or other corresponding bootstrap notify corresponding functional module to described agency service application for determining rewriting system time whether clear data the resource interface of config set of region content, now described agency service receives application, call subscriber interface module, one user interface is provided, user is operated on a user interface, as clicked confirming button or selecting the relevant options in pop-up dialogue box, then this subscriber interface module notifies that described the corresponding function module calls respective resources interface, the config set of amendment correspondence system version, so that the process of bootstrap execution brush machine ensures that the content of data area is not eliminated.After described bootstrap is mourned in silence and performed system rewrite process, system is restarted, and verifies config set, and config set recovers after being proved to be successful and reads the content in described data area.
Those skilled in the art of the present technique are appreciated that the present invention includes the one or more equipment relating to perform in operation described herein.These equipment can specialized designs and manufacture for required purpose, or the known device in general purpose computer can also be included.These equipment have storage computer program within it, and these computer programs optionally activate or reconstruct.nullSuch computer program can be stored in equipment (such as,Computer) in computer-readable recording medium or be stored in and be suitable to storage e-command and be coupled to any kind of medium of bus respectively,Described computer-readable medium includes but not limited to that any kind of dish (includes floppy disk、Hard disk、CD、CD-ROM、And magneto-optic disk)、ROM(Read-OnlyMemory,Read only memory)、RAM(RandomAccessMemory,Memorizer immediately)、EPROM(ErasableProgrammableRead-OnlyMemory,Erarable Programmable Read only Memory)、EEPROM(ElectricallyErasableProgrammableRead-OnlyMemory,EEPROM)、Flash memory、Magnetic card or light card.It is, computer-readable recording medium include by equipment (such as, computer) with can read form storage or transmission information any medium.
Those skilled in the art of the present technique are appreciated that, it is possible to the calculation machine programmed instruction combination to the frame in each frame realizing in these structure charts and/or block diagram and/or flow graph and these structure charts and/or block diagram and/or flow graph of using tricks.Those skilled in the art of the present technique are appreciated that, the processor that these computer program instructions can be supplied to general purpose computer, special purpose computer or other programmable data processing methods realizes, and performs the scheme specified in the frame of structure chart disclosed by the invention and/or block diagram and/or flow graph or multiple frame thereby through the processor of computer or other programmable data processing methods.
Those skilled in the art of the present technique are appreciated that the step in the various operations discussed in the present invention, method, flow process, measure, scheme can be replaced, change, combine or delete.Further, have the various operations discussed in the present invention, method, other steps in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted.Further, of the prior art have with the present invention disclosed in various operations, method, the step in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted.
The above is only the some embodiments of the present invention; it should be pointed out that, for those skilled in the art, under the premise without departing from the principles of the invention; can also making some improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (10)

1. one kind for rewriting system time data exempt from remove method, it is characterised in that comprise the following steps:
Resource interface to the config set of the region content that whether clears data when being used for the agency service application obtaining system highest weight limit for determining rewriting system;
Call described resource interface, described config set is set as when rewriting system and exempts to remove described data area content;
The rewriting packet of rewriting system it is used in response to user instruction write.
2. method according to claim 1, it is characterised in that also include step, the content of described data area is restarted and recovered to completion system after rewriteeing.
3. method according to claim 2, it is characterised in that during the system reboot of described rewriting, described config set is verified, is proved to be successful, recover the content of described data area.
4. method according to claim 1, it is characterised in that there are mapping relations between its corresponding system version of described config set.
5. method according to claim 4, it is characterised in that described mapping relations are stored in cloud server in the form of a list, and are carried out regular update by cloud server.
6. a mobile terminal, it is characterised in that including:
Application unit: be configured to the resource interface of config set to the region content that whether clears data during for obtaining the agency service application of system highest weight limit for determining rewriting system;
Setup unit: be configured to call described resource interface, is set as when rewriting system by described config set and exempts to remove described data area content;
Rewriting unit: be configured to respond to the user instruction write rewriting packet for rewriting system.
7. mobile terminal according to claim 6, it is characterised in that also include data recovery unit, after rewriteeing for completion system, restarts and recovers the content of described data area.
8. mobile terminal according to claim 7, it is characterised in that during the system reboot of described rewriting, data recovery unit described config set is verified, is proved to be successful, recover the content of described data area.
9. mobile terminal according to claim 6, it is characterised in that there are mapping relations between its corresponding system version of described config set.
10. mobile terminal according to claim 9, it is characterised in that described mapping relations are stored in cloud server in the form of a list, and are carried out regular update by cloud server.
CN201610154128.2A 2016-03-17 2016-03-17 Mobile terminal and its data exempt from the method removed when for rewriting system Expired - Fee Related CN105786575B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610154128.2A CN105786575B (en) 2016-03-17 2016-03-17 Mobile terminal and its data exempt from the method removed when for rewriting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610154128.2A CN105786575B (en) 2016-03-17 2016-03-17 Mobile terminal and its data exempt from the method removed when for rewriting system

Publications (2)

Publication Number Publication Date
CN105786575A true CN105786575A (en) 2016-07-20
CN105786575B CN105786575B (en) 2019-06-04

Family

ID=56394021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610154128.2A Expired - Fee Related CN105786575B (en) 2016-03-17 2016-03-17 Mobile terminal and its data exempt from the method removed when for rewriting system

Country Status (1)

Country Link
CN (1) CN105786575B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107402849A (en) * 2017-07-31 2017-11-28 郑州云海信息技术有限公司 A kind of method of backup and recovery based on K UX systems
CN108132805A (en) * 2017-12-20 2018-06-08 深圳Tcl新技术有限公司 Voice interactive method, device and computer readable storage medium
CN111124440A (en) * 2019-12-17 2020-05-08 湖南国科微电子股份有限公司 Chip software burning method, chip software burning data processing method and device
CN113157328A (en) * 2021-05-20 2021-07-23 读书郎教育科技有限公司 Method for enabling Android terminal to be compatible with multiple models through same ROM

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004703A (en) * 2009-08-31 2011-04-06 比亚迪股份有限公司 Method and system for protecting data
CN103207790A (en) * 2012-01-16 2013-07-17 联想(北京)有限公司 Operating system updating method and terminal
CN103324507A (en) * 2013-06-25 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for updating terminal preset application program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004703A (en) * 2009-08-31 2011-04-06 比亚迪股份有限公司 Method and system for protecting data
CN103207790A (en) * 2012-01-16 2013-07-17 联想(北京)有限公司 Operating system updating method and terminal
CN103324507A (en) * 2013-06-25 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for updating terminal preset application program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
佚名: "http://www.yidianzixun.com/article/0C6r34XU", 《360推子公司雷电OS木马遭硅谷安全公司揭露》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107402849A (en) * 2017-07-31 2017-11-28 郑州云海信息技术有限公司 A kind of method of backup and recovery based on K UX systems
CN107402849B (en) * 2017-07-31 2020-11-27 苏州浪潮智能科技有限公司 Backup and recovery method based on K-UX system
CN108132805A (en) * 2017-12-20 2018-06-08 深圳Tcl新技术有限公司 Voice interactive method, device and computer readable storage medium
CN111124440A (en) * 2019-12-17 2020-05-08 湖南国科微电子股份有限公司 Chip software burning method, chip software burning data processing method and device
CN113157328A (en) * 2021-05-20 2021-07-23 读书郎教育科技有限公司 Method for enabling Android terminal to be compatible with multiple models through same ROM
CN113157328B (en) * 2021-05-20 2022-05-10 读书郎教育科技有限公司 Method for enabling Android terminal to be compatible with multiple models through same ROM

Also Published As

Publication number Publication date
CN105786575B (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US10437680B2 (en) Relay apparatus, relay method, and computer program product
US8230222B2 (en) Method, system and computer program for deploying software packages with increased security
EP3369030B1 (en) Methods and apparatus for mobile computing device security in testing facilities
CN101578609B (en) Secure booting a computing device
US8239674B2 (en) System and method of protecting files from unauthorized modification or deletion
KR101602308B1 (en) Method and computation node for processing application data
US20030079126A1 (en) Method and apparatus to facilitate software installation using embedded user credentials
JP5304345B2 (en) Content processing apparatus, content processing system, and content processing program
JP6079875B2 (en) Application execution program, application execution method, and information processing terminal device for executing application
US20060161768A1 (en) Method of managing software components that are integrated into an embedded system
CN105786575A (en) Mobile terminal and data elimination avoiding method thereof during system rewriting
CN107943501A (en) Embedded device upgrade method, device, computer equipment and storage medium
US20210234686A1 (en) Information processing device, information processing method, and storage medium
JP5112924B2 (en) Application moving system, application moving method, program, and portable terminal
US20200349292A1 (en) Data bundle generation and deployment
WO2019183806A1 (en) Resource permission processing method and apparatus, and storage medium and chip
US20130174217A1 (en) Access control information generating system
CN107995230A (en) A kind of method for down loading and terminal
CN112559252B (en) Configuration data management method and device based on attribute classification
JP2009169868A (en) Storage area access device and method for accessing storage area
JP2008153728A (en) Update information generating device, identification information updating system, identification information updating method, and program
JP4738175B2 (en) Server apparatus, server accommodation method, and server accommodation program
CN116127491A (en) Database management method, system, equipment and storage medium
JP2005032236A (en) Program execution system
CN116915603A (en) OTA upgrading method and device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190604

Termination date: 20210317

CF01 Termination of patent right due to non-payment of annual fee