CN105786575B - Mobile terminal and its data exempt from the method removed when for rewriting system - Google Patents
Mobile terminal and its data exempt from the method removed when for rewriting system Download PDFInfo
- Publication number
- CN105786575B CN105786575B CN201610154128.2A CN201610154128A CN105786575B CN 105786575 B CN105786575 B CN 105786575B CN 201610154128 A CN201610154128 A CN 201610154128A CN 105786575 B CN105786575 B CN 105786575B
- Authority
- CN
- China
- Prior art keywords
- rewriting
- data
- config set
- resource interface
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/62—Uninstallation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Whether the present invention provides a kind of mobile terminal and its data exempt from the method removed when for rewriting system, the method comprise the steps that being used to determine to clear data when rewriting system the resource interface of the config set of region content to the agency service application for obtaining system highest permission;The resource interface is called, the config set is set as to exempt to remove the data area content in rewriting system;The rewriting data packet of rewriting system is used in response to user instruction write-in.The present invention by agency service application be used to determine whether to clear data when rewriting system region content config set resource interface, the resource interface is called to modify the config set, to ensure that the content of former data area is not removed, on the one hand avoid user when carrying out brush machine caused by loss of data, on the other hand it avoids user from saving the repetition copy procedure of data progress in brush machine, simplifies the operating process of brush machine.
Description
Technical field
The present invention relates to field of mobile terminals, specifically, the present invention relates to a kind of mobile terminal and its for rewriteeing system
Data exempt from the method removed when system.
Background technique
Brush machine refers to through language, software or operating system existing for script in certain method change or replacement mobile terminal
Deng, it is popular for be exactly to reset system, brush machine can make cell-phone function more perfect.In the prior art, brush machine mistake in order to prevent
There are bug in journey, can be double to system progress in advance clear, that is, remove caching and internal storage data;Brush machine not only can be made more dry
Only, also avoid system caused by legacy data unstable.And generally for the data for avoiding deleting user, user data can be copied
Out, but for the user big for data volume, copy procedure takes a long time, and needing one has storage enough empty
Between storage tool.Meanwhile also needing corresponding data being copied to mobile terminal again after the completion of brush machine, so that user's operation is not
It is convenient, increase operation complexity.It further, can be because of system during brush machine if some user data are missed
Format data region and lose, cause data irrecoverable, certain loss caused to user.Accordingly, it is desirable to provide a kind of
More convenient more effective way allows the intact preservation of data during brush machine to avoid accidentally being removed.
Summary of the invention
The purpose of the present invention aims to solve the problem that at least one above-mentioned problem, provides a kind of data and exempts from the method removed, to solve
System data caused by during brush machine is lost.
To achieve the goals above, the present invention provide it is a kind of for rewriting system when data exempt from remove method, including with
Lower step:
To the agency service application for obtaining system highest permission for determining the area that whether clears data when rewriting system
The resource interface of the config set of domain content;
The resource interface is called, the config set is set as exempting to remove in the data area in rewriting system
Hold;
The rewriting data packet of rewriting system is used in response to user instruction write-in.
Further, further include step, after system of completing is rewritten, restart and restore the content of the data area.
Specifically, verifying, being proved to be successful to the config set when system reboot of the rewriting, restore the number
According to the content in region.
Specifically, between its corresponding system version of config set, there are mapping relations.
Preferably, the mapping relations are stored in cloud server in the form of a list, and are determined by cloud server
Phase updates.
Wherein, the resource interface of the config set is provided in the form for forming signature according to preset rules.
Preferably, the feature of the signature based on config set information generates.
Specifically, the resource interface of the config set is provided in the form of encrypting according to preset rules and to form ciphertext.
Wherein, the agency service runs on the ccf layer of system.
Specifically, the agency service obtains system highest permission by modification system signature.
Specifically, replacement system correlation original and being stored in advance default file to the designated position of system, with
It is implanted into the agency service.
Preferably, the default file is stored to designated position in the case where system is in recovery mode.
A kind of mobile terminal, comprising:
Application unit: it is configured as to the agency service application for obtaining system highest permission for determining rewriting system
When whether clear data region content config set resource interface;
Setup unit: being configured as calling the resource interface, the config set is set as exempting from rewriting system clear
Except the data area content;
Rewriting unit: it is configured to respond to the rewriting data packet that user instruction write-in is used for rewriting system.
Further, further include data recovery unit, after completing system rewriting, restart and restore the data area
Content.
Specifically, verified by data recovery unit to the config set when system reboot of the rewriting, verifying at
Function then restores the content of the data area.
Specifically, between its corresponding system version of config set, there are mapping relations.
Preferably, the mapping relations are stored in cloud server in the form of a list, and are determined by cloud server
Phase updates.
Wherein, the feature of the signature based on config set information generates.
Preferably, the resource interface of the config set is provided in the form for forming signature according to preset rules.
Specifically, the feature of the signature based on config set information generates.
Specifically, the resource interface of the config set is provided in the form of encrypting according to preset rules and to form ciphertext.
Wherein, the agency service runs on the ccf layer of system.
Specifically, the agency service obtains system highest permission by modification system signature.
Specifically, replacement system correlation original and being stored in advance default file to the designated position of system, with
It is implanted into the agency service.
Specifically, the default file is stored to designated position in the case where system is in recovery mode.
Compared with prior art, the solution of the invention has the following advantages:
The present invention obtains system highest permission by the agency service of implant system process, as offer system service
Agency, the application to other Request System services provide system service, control under the premise of keeping security of system corresponding
System service.On this basis, by being used to determine the region content that whether clears data when rewriting system to agency service application
Config set resource interface, obtain respective resources interface, and repair to the config set by the calling resource interface
Change, when so that the system reboot being rewritten being verified, the config set can successfully pass verifying, so that it is guaranteed that former data area
Content do not removed, be still stored in corresponding memory space, and recover after system reboot.It is described through the invention
Method or apparatus, on the one hand avoid user when carrying out brush machine caused by loss of data, on the other hand avoid user in brush machine
In order to save the repetition copy procedure of data progress, simplify the operating process of brush machine.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 be it is of the present invention be used for rewriting system when data exempt from remove method flow schematic diagram;
Fig. 2 is the structural schematic diagram of mobile terminal of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication
The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware
Equipment, have on bidirectional communication link, can carry out two-way communication reception and emit hardware equipment.This equipment
It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can
With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal
Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm
Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on
Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
For android system, brush machine is the process formatted, and there are bug during brush machine in order to prevent, usually
Can be double to system progress clear, that is, remove caching and internal storage data.Brush machine not only can be made cleaner, also legacy data is avoided to make
At system it is unstable.But usually will cause the loss of user data during this, and can not restore, thus to user with
Carry out unnecessary loss.For these reasons, the present invention provides a kind of data and exempts from sweep-out method, so that during system brush machine
Data are kept not to be wiped free of simultaneously.
As shown in Figure 1, data exempt from the process of sweep-out method it is is used for rewriting system described in one embodiment of the invention when
Schematic diagram, comprising the following steps:
Step S101, whether clear when to the agency service application for obtaining system highest permission for determining rewriting system
Except the resource interface of the config set of data area content;
Implant system process when the agency service is by system brush machine, in a particular embodiment by by default file
Store to the designated position of system and replacement system correlation original, wherein the replacement system correlation original include replace it is whole
A system file only replaces part system file.
The default file is different from the configuration mapped file of system brush machine mode.In the specific embodiment of the invention, institute
Stating in default file includes the file for being named as Chimaster and NetD, is placed into the designated position " date/ of system
local/temp".The default file is stored to designated position in the case where system is in recovery mode, wherein the storage
Process is specially decompression process, and the compressed package of default file is unziped it to designated position, so that in default file
The corresponding original of associated documents covering system.The starting of the recovery mode is executed by guidance file, and guidance is corresponding
Default file is put into designated position and decompresses, wherein the guidance file can be system original, or write
The file entered, the invention is not limited in this regard.
By by default file writing system, to be implanted into the agency service.Agency service of the present invention refers specifically to
As the transfer service interacted between system process and other application process.It is well known that Root authority refers to Unix generic operation
System manager's permission of system (including Linux and Android), similar to the Administrator in Windows system
(administrator) permission;Root authority is accessible and modifies almost all of file (android system in the mobile device of user
File and user file).But since management of the current mobile terminal system for Root authority is very strict, usual situation
Lower most applications or program do not have Root authority, therefore certain operations for needing to have Root authority can not just be held
Row.In general, the highest control authority of system, i.e. Root authority can be limited for security consideration, thus be limited
It has made a lot using behavior, in order to make further allotment and control to system resource, has needed to obtain the Root authority of system.And show
There is technology to obtain Root authority by simple brush machine mode, so that the safety of system is on the hazard.Thus, the present invention is implemented
Example obtains Root authority by the way of agency service, and the highest permission of system is obtained especially by modification system signature.When it
When his application requests obtain system service, corresponding resource interface is provided by agency service, and provide several signatures, work as label
When name is verified, allow to call corresponding resource interface, realizes safer Root authority control by this method.Specifically,
The default file brush is entered ROM by recovery brush machine by the embodiment of the present invention, and recovery guides the default file to deposit
Enter the specific position of system, and guides the default file decompression to store into ROM replacement original system file, and based on modification
ROM file afterwards generates a signature, and system verifies the signature, to ensure that the system after brush machine can normally start fortune
Row.
Wherein, the agency service runs on the ccf layer of system, such as android system, including four layer architectures, respectively
Application layer, ccf layer, system Runtime Library layer and Linux inner core.The agency service is provided with the money for management system
The module of source interface access authority, in this case, when certain program process requests corresponding resource interface, usually by this
Kind of management module receives its request, this request instruction, substantially should be a kind of interface signature, be from this management module in advance to
Program process distribution, function similarly to the effect of token.Management module receives the interface comprising respective request and signs
Afterwards, which is verified, just provides corresponding resource interface to the program process after being verified.
Based on the above principles, it when carrying out the rewriting of brush machine to system, is first rewritten to the agency service application for determining
The resource interface of the config set for the region content that whether clears data when system.Wherein, the data area includes in memory headroom
All data of storage.Under normal conditions, there are a config sets in system, for deciding whether the region content that clears data,
It is verified when being restarted after system is rewritten by system, if being proved to be successful, restores and read the number of data area
According to the data in the region that clears data automatically if authentication failed.Therefore, the embodiment of the present invention is taken based on the principle to the agency
Resource interface described in request of being engaged in modifies to it in case subsequent.
Step S102, the resource interface is called, the config set is set as exempting to remove the number in rewriting system
According to region content;
The resource of the config set for the region content that whether clears data when being obtained based on above-mentioned steps for determining rewriting system
After interface, the config set is set as to exempt to remove the data area content in rewriting system.In a particular embodiment, institute
State that config set is different according to the difference of system version, still further accord with the difference of mobile terminal model and it is different.Such as three
Star galaxy note4 is different from the system of millet note, then the config set in its system is also different, and further example is such as
The system installed in Samsung galaxy note4 is modified Android4.1, after the system installed in millet note is modification
Android4.2, and the two is also not quite similar to the modification of the android system of different editions, its is customized for each self-forming
System, and it is used for the mobile phone of different model, then can be into one according to the corresponding relationship between mobile phone model and system version
Step is mapped as the relationship between mobile phone model and config set, and different config sets can be also determined by different types.
Mapping relations between the config set and each system version or type are stored in cloud service in the form of a list
Device can pre-generate the list in a particular embodiment, by collecting different system versions and the corresponding configuration of detector
Collection, its corresponding relationship is stored one by one.Cloud server is based on the presets list and is regularly updated, and increases new system
Version and corresponding config set, while deleting the system version being eliminated and corresponding config set.Further, described the presets list
It can recorde the mapping relations between the corresponding config set of different type of machines.
Preferably, the resource interface of the config set is provided in the form for forming signature according to preset rules.Having
In body embodiment, the preset rules refer to handled the resource interface by which kind of mode to generate signature, such as use
Hash algorithm or RSA Algorithm handle to generate a string of random codes of characterization signature resource interface.Specifically, the signature
The signature is generated based on the correlated characteristic of config set information using preset rules.The present invention does not limit the mode for generating signature
System, i.e., the described preset rules include arbitrarily being capable of forming the mode of signature, do not influence realization of the invention.Wherein, the signature
It is provided previously by agency service, it is described for whether clearing data when determining rewriting system being obtained to the proxy service request
When the resource interface of the config set of region content, the signature is first verified, if signature verification success, allows to call the configuration
The resource interface of collection.
It is further preferred that the resource interface of the config set is carried out in the form of encrypting according to preset rules and to form ciphertext
It provides.In a particular embodiment, it makes an appointment the information such as Encryption Algorithm, decipherment algorithm, wherein the enciphering and deciphering algorithm can be
The method that arbitrarily can be realized encryption and decryption, not as limitation of the present invention.It is when being rewritten to agency service application for decision
The resource interface of the config set for the region content that whether clears data when system, the agency service provided in the form of ciphertext described in match
Set the resource interface of collection.The resource interface is decrypted using the decipherment algorithm of agreement, is connect to obtain corresponding resource
Mouthful.
It after obtaining the resource interface, modifies to the config set, sets it to and exempt to remove in rewriting system
Data area content.In a particular embodiment, the config set can be one or more parameters, one or more files, one
A or multiple instruction is different according to the difference of system version.Corresponding resource interface is called, the config set is repaired
Change, the data area content is not removed when guarantee system is rewritten.
It is significant to note that the system rewrite process refers specifically to the brush machine process of user's operation, it is different from described
The process that default file brush enters, therefore be prohibited to carry out more the content of the default file during brush machine of user's operation
Change, the change of the default file need to be by brushing the signature verification of fashionable generation at it, and the process agency service of user's brush machine is not
Corresponding signature is provided, therefore default file content cannot be modified.
Step S103, the rewriting data packet of rewriting system is used in response to user instruction write-in.
The user instruction includes diversified forms, such as order input by user, is for another example providing corresponding system rewriting
Under interface conditions, the instruction of user can be received by setting selection key, dialog box etc..User instruction is responded, is executed
The write operation of system replaces original system file to realize the rewriting of system.
Further, other embodiments of the invention further include that after the completion of system rewriting, system is restarted and restores described
The content of data area.Specifically, when the system reboot rewrited, it can be to for determining whether clear data when rewriting system
The config set of region content is verified, and then restores the content of the data area when the authentication succeeds.Due to above-mentioned steps
Through completing the modification to the config set, so as to be verified by system, to ensure that the data area is not clear
It removes, is restored and read by system.
Based on the above process, by being used to determine the region content that whether clears data when rewriting system to agency service application
Config set resource interface, obtain respective resources interface, and repair to the config set by the calling resource interface
Change, when so that the system reboot being rewritten being verified, the config set can successfully pass verifying, so that it is guaranteed that former data area
Content do not removed, be still stored in corresponding memory space, and recover after system reboot.To on the one hand keep away
On the other hand loss of data caused by exempting from user when carrying out brush machine avoids user from saving the weight of data progress in brush machine
Multiple copy procedure, simplifies the operating process of brush machine.
According to the modularized thoughts of computer program, the present invention exempts from sweep-out method according to data above-mentioned and additionally provides one kind
The specific embodiment of mobile terminal, as shown in Fig. 2, the mobile terminal includes application unit 11, setup unit 12, rewriting unit
13 and other embodiments in data recovery unit 14, prompt the function realized of each unit in detailed below:
Application unit 11 is configured as rewriteeing system for determining to the agency service application for obtaining system highest permission
The resource interface of the config set for the region content that whether clears data when system;
Implant system process when the agency service is by system brush machine, in a particular embodiment by by default file
Store to the designated position of system and replacement system correlation original, wherein the replacement system correlation original include replace it is whole
A system file only replaces part system file.
The default file is different from the configuration mapped file of system brush machine mode.In the specific embodiment of the invention, institute
Stating in default file includes the file for being named as Chimaster and NetD, is placed into the designated position " date/ of system
local/temp".The default file is stored to designated position in the case where system is in recovery mode, wherein the storage
Process is specially decompression process, and the compressed package of default file is unziped it to designated position, so that in default file
The corresponding original of associated documents covering system.The starting of the recovery mode is executed by guidance file, and guidance is corresponding
Default file is put into designated position and decompresses, wherein the guidance file can be system original, or write
The file entered, the invention is not limited in this regard.
By by default file writing system, to be implanted into the agency service.Agency service of the present invention refers specifically to
As the transfer service interacted between system process and other application process.In general, the highest control authority of system,
I.e. Root authority can be limited for security consideration, be limited so much using behavior, in order to system resource make into
One step is matched and is controlled, and needs to obtain the Root authority of system.And the prior art obtains Root by simple brush machine mode and weighs
Limit, so that the safety of system is on the hazard.Thus, the embodiment of the present invention obtains Root authority by the way of agency service,
The highest permission of system is obtained especially by modification system signature.When other applications request to obtain system service, by generation
Reason service provides corresponding resource interface, and provides several signatures, when signature verification passes through, allows that corresponding resource is called to connect
Mouthful, safer Root authority control is realized by this method.Specifically, the embodiment of the present invention will be described by recovery brush machine
Default file brush enters ROM, and recovery guides the specific position of the default file deposit system, and guides the default file
Decompression stores into ROM replacement original system file, and generates a signature based on modified ROM file, and system is to the label
Name is verified, and to ensure that the system after brush machine can normally start operation, is implanted into the agency service while brush machine.
Wherein, the agency service runs on the ccf layer of system, such as android system, including four layer architectures, respectively
Application layer, ccf layer, system Runtime Library layer and Linux inner core.The agency service is provided with the money for management system
The module of source interface access authority, in this case, when certain program process requests corresponding resource interface, usually by this
Kind of management module receives its request, this request instruction, substantially should be a kind of interface signature, be from this management module in advance to
Program process distribution, function similarly to the effect of token.Management module receives the interface comprising respective request and signs
Afterwards, which is verified, just provides corresponding resource interface to the program process after being verified.
Based on the above principles, when carrying out the rewriting of brush machine to system, from the application unit 11 first to the agency service
The resource interface of the config set for the region content that whether clears data when applying for determining rewriting system.Wherein, the data field
Domain includes all data stored in memory headroom.Under normal conditions, there are a config sets in system, clear for deciding whether
It except data area content, is verified when being restarted after system is rewritten by system, if being proved to be successful, restores and read
The data for taking data area, the data in the region that clears data automatically if authentication failed.Therefore, the embodiment of the present invention is based on the original
It manages to the proxy service request and obtains the resource interface, modify in case subsequent to it.
Setup unit 12 is configured as calling the resource interface, and the config set is set as exempting from rewriting system
Remove the data area content;
The resource of the config set for the region content that whether clears data when being obtained based on above-mentioned steps for determining rewriting system
After interface, the resource interface is called by setup unit 12, the config set is set as exempting from described in removing in rewriting system
Data area content.In a particular embodiment, the config set is different according to the difference of system version, still further accord with
The difference of mobile terminal model and it is different.If Samsung galaxy note4 is different from the system of millet note, then in its system
The config set is also different, and the system installed in further example such as Samsung galaxy note4 is modified
The system installed in Android4.1, millet note is modified Android4.2, and the two is to the Android of different editions
The modification of system is also not quite similar, its customized system of each self-forming, and is used for the mobile phone of different model, then according to hand
Corresponding relationship between type number and system version can further be mapped as the relationship between mobile phone model and config set, namely
Different config sets can be determined by different types.
Mapping relations between the config set and each system version or type are stored in cloud service in the form of a list
Device can pre-generate the list in a particular embodiment, by collecting different system versions and the corresponding configuration of detector
Collection, its corresponding relationship is stored one by one.Cloud server is based on the presets list and is regularly updated, and increases new system
Version and corresponding config set, while deleting the system version being eliminated and corresponding config set.Further, described the presets list
It can recorde the mapping relations between the corresponding config set of different type of machines.
Preferably, the resource interface of the config set is provided in the form for forming signature according to preset rules.Having
In body embodiment, the preset rules refer to handled the resource interface by which kind of mode to generate signature, such as use
Hash algorithm or RSA Algorithm handle to generate a string of random codes of characterization signature resource interface.Specifically, the signature
The signature is generated based on the correlated characteristic of config set information using preset rules.The present invention does not limit the mode for generating signature
System, i.e., the described preset rules include arbitrarily being capable of forming the mode of signature, do not influence realization of the invention.Wherein, the signature
It is provided previously by agency service, it is described for whether clearing data when determining rewriting system being obtained to the proxy service request
When the resource interface of the config set of region content, the signature is first verified, if signature verification success, allows to call the configuration
The resource interface of collection.
It is further preferred that the resource interface of the config set is carried out in the form of encrypting according to preset rules and to form ciphertext
It provides.In a particular embodiment, it makes an appointment the information such as Encryption Algorithm, decipherment algorithm, wherein the enciphering and deciphering algorithm can be
The method that arbitrarily can be realized encryption and decryption, not as limitation of the present invention.It is when being rewritten to agency service application for decision
The resource interface of the config set for the region content that whether clears data when system, the agency service provided in the form of ciphertext described in match
Set the resource interface of collection.The resource interface is decrypted using the decipherment algorithm of agreement, is connect to obtain corresponding resource
Mouthful.
It after obtaining the resource interface, modifies to the config set, sets it to and exempt to remove in rewriting system
Data area content.In a particular embodiment, the config set can be one or more parameters, one or more files, one
A or multiple instruction is different according to the difference of system version.Corresponding resource interface is called, the config set is repaired
Change, the data area content is not removed when guarantee system is rewritten.
It is significant to note that the system rewrite process refers specifically to the brush machine process of user's operation, it is different from described
The process that default file brush enters, therefore be prohibited to carry out more the content of the default file during brush machine of user's operation
Change, the change of the default file need to be by brushing the signature verification of fashionable generation at it, and the process agency service of user's brush machine is not
Corresponding signature is provided, therefore default file content cannot be modified.
Rewriting unit 13 is configured to respond to the rewriting data packet that user instruction write-in is used for rewriting system.
The user instruction includes diversified forms, such as order input by user, is for another example providing corresponding system rewriting
Under interface conditions, the instruction of user can be received by setting selection key, dialog box etc..The rewriting unit 13 is to user instruction
It is responded, executes the write operation of system, replace original system file to realize the rewriting of system.
Further, other embodiments of the invention further include data recovery unit 14, and after the completion of system rewriting, system is carried out
Restart and restore the content of the data area.Specifically, when the system reboot rewrited, it can be to for determining rewriting system
When whether the clear data config set of region content verified, then restore the content of the data area when the authentication succeeds.
Since above-mentioned steps have completed the modification to the config set, so as to be verified by system, to ensure that described
Data area is not removed, and is restored and is read by system.
Based on above-mentioned each unit module, by being used to determine the area that whether clears data when rewriting system to agency service application
The resource interface of the config set of domain content obtains respective resources interface, and by calling the resource interface to the config set
It modifies, when so that the system reboot being rewritten being verified, the config set can successfully pass verifying, so that it is guaranteed that former number
It is not removed according to the content in region, is still stored in corresponding memory space, and recover after system reboot.To one
Aspect avoid user when carrying out brush machine caused by loss of data, on the other hand avoid user in brush machine in order to save data into
Capable repetition copy procedure simplifies the operating process of brush machine.
In an application scenarios of the invention, customer mobile terminal is preconfigured to the method described through the invention
Default file brush is entered into system, to ensure acquisition system root authority, while starting agency service of the present invention.After user
It is continuous when carrying out brush machine to mobile terminal, notify corresponding functional module to described from recovery or other corresponding bootstrap
Agency service application be used to determine whether to clear data when rewriting system region content config set resource interface, it is described at this time
Agency service receives application, calls subscriber interface module, provides a user interface, user grasps on a user interface
Make, as clicked the relevant options in confirming button or selection pop-up dialog box, then the subscriber interface module notifies the corresponding function
Energy module calls respective resources interface, modifies the config set of correspondence system version, so that during bootstrap executes brush machine
Guarantee that the content of data area is not removed.After the bootstrap silence has executed system rewrite process, system carries out weight
It opens, verifies config set, config set restores after being proved to be successful and reads the content in the data area.
Those skilled in the art of the present technique are appreciated that the present invention includes being related to for executing in operation described herein
One or more equipment.These equipment can specially design and manufacture for required purpose, or also may include general
Known device in computer.These equipment have the computer program being stored in it, these computer programs are selectively
Activation or reconstruct.Such computer program can be stored in equipment (for example, computer) readable medium or be stored in
It e-command and is coupled in any kind of medium of bus respectively suitable for storage, the computer-readable medium includes but not
Be limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, only
Read memory), RAM (Random Access Memory, immediately memory), EPROM (Erasable Programmable
Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable
Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or light card
Piece.It is, readable medium includes by equipment (for example, computer) with any Jie for the form storage or transmission information that can be read
Matter.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or
The combination of each frame and these structure charts and/or the frame in block diagram and/or flow graph in block diagram and/or flow graph.This technology neck
Field technique personnel be appreciated that these computer program instructions can be supplied to general purpose computer, special purpose computer or other
The processor of programmable data processing method is realized, to pass through the processing of computer or other programmable data processing methods
The scheme specified in frame or multiple frames of the device to execute structure chart and/or block diagram and/or flow graph disclosed by the invention.
Those skilled in the art of the present technique have been appreciated that in the present invention the various operations crossed by discussion, method, in process
Steps, measures, and schemes can be replaced, changed, combined or be deleted.Further, each with having been crossed by discussion in the present invention
Kind of operation, method, other steps, measures, and schemes in process may also be alternated, changed, rearranged, decomposed, combined or deleted.
Further, in the prior art to have and the step in various operations, method disclosed in the present invention, process, measure, scheme
It may also be alternated, changed, rearranged, decomposed, combined or deleted.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (22)
1. it is a kind of for rewriting system when data exempt from remove method, which comprises the following steps:
To the agency service application for obtaining system highest permission for determining whether clear data in region when rewriting system
The resource interface of the config set of appearance;There are mapping relations between its corresponding system version of config set;
The resource interface is called, the config set is set as to exempt to remove the data area content in rewriting system;
The rewriting data packet of rewriting system is used in response to user instruction write-in.
2. after system of completing is rewritten, restarting and restoring the method according to claim 1, wherein further including step
The content of the data area.
3. according to the method described in claim 2, it is characterized in that, when the system reboot of the rewriting, to the config set into
Row verifying, is proved to be successful, restores the content of the data area.
4. the method according to claim 1, wherein the mapping relations are stored in cloud clothes in the form of a list
Business device, and regularly updated by cloud server.
5. the method according to claim 1, wherein the resource interface of the config set is according to preset rules shape
It is provided at the form of signature.
6. according to the method described in claim 5, it is characterized in that, the feature of the signature based on config set information generates.
7. the method according to claim 1, wherein the resource interface of the config set according to preset rules to add
The close form for forming ciphertext is provided.
8. the method according to claim 1, wherein the agency service runs on the ccf layer of system.
9. the method according to claim 1, wherein the agency service obtains system by modification system signature
Highest permission.
10. according to the method described in claim 9, it is characterized in that, by the way that specifying to system is stored in advance in default file
Position and replacement system correlation original, to be implanted into the agency service.
11. according to the method described in claim 10, it is characterized in that, the default file is under the recovery mode of system
It is stored to designated position.
12. a kind of mobile terminal characterized by comprising
Application unit: be configured as be when rewriting system for determining to the agency service application for obtaining system highest permission
The resource interface of the config set of the no region content that clears data;There is mapping between its corresponding system version of config set
Relationship;
Setup unit: being configured as calling the resource interface, and the config set is set as exempting to remove institute in rewriting system
State data area content;
Rewriting unit: it is configured to respond to the rewriting data packet that user instruction write-in is used for rewriting system.
13. mobile terminal according to claim 12, which is characterized in that further include data recovery unit, for completing system
After system is rewritten, the content of the data area is restarted and restored.
14. mobile terminal according to claim 13, which is characterized in that extensive by data when the system reboot of the rewriting
Multiple unit verifies the config set, is proved to be successful, restores the content of the data area.
15. mobile terminal according to claim 12, which is characterized in that the mapping relations are stored in the form of a list
Cloud server, and regularly updated by cloud server.
16. mobile terminal according to claim 12, which is characterized in that the resource interface of the config set is according to default
The form that rule forms signature is provided.
17. mobile terminal according to claim 16, which is characterized in that the feature of the signature based on config set information is raw
At.
18. mobile terminal according to claim 12, which is characterized in that the resource interface of the config set is according to default
The form that rule encryption forms ciphertext is provided.
19. mobile terminal according to claim 12, which is characterized in that the agency service runs on the frame of system
Layer.
20. mobile terminal according to claim 12, which is characterized in that the agency service is obtained by modifying system signature
Take system highest permission.
21. mobile terminal according to claim 20, which is characterized in that by being stored in advance default file to system
Designated position and replacement system correlation original, to be implanted into the agency service.
22. mobile terminal according to claim 21, which is characterized in that recovery mould of the default file in system
Designated position is stored under formula.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610154128.2A CN105786575B (en) | 2016-03-17 | 2016-03-17 | Mobile terminal and its data exempt from the method removed when for rewriting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610154128.2A CN105786575B (en) | 2016-03-17 | 2016-03-17 | Mobile terminal and its data exempt from the method removed when for rewriting system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105786575A CN105786575A (en) | 2016-07-20 |
CN105786575B true CN105786575B (en) | 2019-06-04 |
Family
ID=56394021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610154128.2A Expired - Fee Related CN105786575B (en) | 2016-03-17 | 2016-03-17 | Mobile terminal and its data exempt from the method removed when for rewriting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105786575B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107402849B (en) * | 2017-07-31 | 2020-11-27 | 苏州浪潮智能科技有限公司 | Backup and recovery method based on K-UX system |
CN108132805B (en) * | 2017-12-20 | 2022-01-04 | 深圳Tcl新技术有限公司 | Voice interaction method and device and computer readable storage medium |
CN111124440A (en) * | 2019-12-17 | 2020-05-08 | 湖南国科微电子股份有限公司 | Chip software burning method, chip software burning data processing method and device |
CN113157328B (en) * | 2021-05-20 | 2022-05-10 | 读书郎教育科技有限公司 | Method for enabling Android terminal to be compatible with multiple models through same ROM |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004703A (en) * | 2009-08-31 | 2011-04-06 | 比亚迪股份有限公司 | Method and system for protecting data |
CN103207790A (en) * | 2012-01-16 | 2013-07-17 | 联想(北京)有限公司 | Operating system updating method and terminal |
CN103324507A (en) * | 2013-06-25 | 2013-09-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for updating terminal preset application program |
-
2016
- 2016-03-17 CN CN201610154128.2A patent/CN105786575B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004703A (en) * | 2009-08-31 | 2011-04-06 | 比亚迪股份有限公司 | Method and system for protecting data |
CN103207790A (en) * | 2012-01-16 | 2013-07-17 | 联想(北京)有限公司 | Operating system updating method and terminal |
CN103324507A (en) * | 2013-06-25 | 2013-09-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for updating terminal preset application program |
Non-Patent Citations (1)
Title |
---|
http://www.yidianzixun.com/article/0C6r34XU;佚名;《360推子公司雷电OS木马遭硅谷安全公司揭露》;20160120;正文第1-9页 |
Also Published As
Publication number | Publication date |
---|---|
CN105786575A (en) | 2016-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9881167B2 (en) | Sanitization of vitual machine images | |
EP3382534B1 (en) | Page jumping method and apparatus | |
EP3369030B1 (en) | Methods and apparatus for mobile computing device security in testing facilities | |
US8417964B2 (en) | Software module management device and program | |
CN105786575B (en) | Mobile terminal and its data exempt from the method removed when for rewriting system | |
CN109660353A (en) | A kind of application program installation method and device | |
CN108985756A (en) | SE application processing method, user terminal and server | |
CN109408486A (en) | File publishing method and system, publisher server and file creating apparatus | |
JP2003242054A (en) | Server device, communication apparatus, communication apparatus setting information control method, program and recording medium | |
CN111417927B (en) | Resource authority processing method and device, storage medium and chip | |
CN111984936A (en) | Authorization allocation method, device, server and storage medium | |
CN113127850A (en) | Browser password filling interaction control method and device | |
CN111047444A (en) | Data transaction method and device based on block chain network | |
CN111064723A (en) | Over-the-air upgrading method and system based on backup system | |
CN112528239A (en) | Method and device for automatically authorizing software | |
CN112559252B (en) | Configuration data management method and device based on attribute classification | |
US11496304B2 (en) | Information processing device, information processing method, and storage medium | |
US20200349292A1 (en) | Data bundle generation and deployment | |
US20130174217A1 (en) | Access control information generating system | |
CN109446785B (en) | A kind of memory management method of smart card and its personal data | |
US20070008920A1 (en) | Method of creating a split terminal between a base terminal and equipments connected in series | |
Baignères et al. | D4. 2 final reference implementation | |
CN104484198A (en) | Method and device for setting up application | |
CN112422566B (en) | Remote call processing method and device, storage medium and electronic device | |
CN111049787A (en) | Information association method, device, system and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190604 Termination date: 20210317 |