CN105956487A - Data eliminating method and device - Google Patents

Data eliminating method and device Download PDF

Info

Publication number
CN105956487A
CN105956487A CN201610282530.9A CN201610282530A CN105956487A CN 105956487 A CN105956487 A CN 105956487A CN 201610282530 A CN201610282530 A CN 201610282530A CN 105956487 A CN105956487 A CN 105956487A
Authority
CN
China
Prior art keywords
state
data
user
software
encryption
Prior art date
Application number
CN201610282530.9A
Other languages
Chinese (zh)
Inventor
许帅群
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Priority to CN201610282530.9A priority Critical patent/CN105956487A/en
Publication of CN105956487A publication Critical patent/CN105956487A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1438Restarting or rejuvenating
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Abstract

The embodiment of the invention provides a data eliminating method and device. The data eliminating method comprises the steps of, in a recovery mode, identifying an encryption state of a software system in a user mode; and if the software system is in an unencrypted state, reserving the user data while carrying out a data elimination process in the recovery mode. Therefore, a user is unnecessary to copy the user data which are required to be reserved in advance, and the technical problem of operational inconvenience due to that the user is required to copy the user data in advance as data elimination in the prior art is to eliminate all the user data is solved. Meanwhile, the user data are reserved only when the software system in the user mode is in the unencrypted state; that is to say, when the user data are routine data which are not required to be encrypted, the user data are reserved; and if the user data are sensitive data, the processing way of eliminating all the data, which is relatively high in security, is stilled adopted to avoid leakage, so that the leakage risk of the sensitive user data is reduced.

Description

Data clearing method and device

Technical field

The present invention relates to information technology, particularly relate to a kind of data clearing method and device.

Background technology

In the software system of mobile terminal, such as Android system, recovers (Recovery) pattern and refers to Be a kind of pattern data within mobile terminal or system can modified.At this mould New software system can be write under formula, or existing software system is backed up or upgrades, Factory reset can also be carried out.For the software system of mobile terminal, at reforestation practices Under be capable of the function of software system updating and data dump.

Inventor, during realizing the present invention, finds that prior art has following defects that

That whole user data is deleted when carrying out data dump, thus user need by Need the user data retained to back up in advance, such as, the file such as address list, photo is copied Shellfish operation is the most convenient.

Summary of the invention

The present invention provides a kind of data clearing method and device, be used for solving in prior art due to Carry out being whole user data to be deleted caused user need to copy in advance during data dump Shellfish user data, operation technical problem the most easily.

For reaching above-mentioned purpose, embodiments of the invention adopt the following technical scheme that

First aspect, it is provided that a kind of data clearing method, including:

In recovery mode, the encryption of software system state under user model is identified;

If being in unencrypted state, in recovery mode, when performing the flow process cleared data, externally The user data connect in storage device retains.

Second aspect, it is provided that a kind of data dump device, including:

Identification module, in recovery mode, identifies the encryption of software system shape under user model State;

Reservation module, if for being in unencrypted state, in recovery mode, performing to clear data Flow process time, the user data in external storage equipment is retained.

The data clearing method of embodiment of the present invention offer and device, by recovery mode, know Encryption of software system state under other user model, if being in unencrypted state, in recovery mode, When performing the flow process cleared data, user data is retained, thus user is without in advance to institute The user data that need to retain copies, and solves in prior art due to when carrying out data dump It is whole user data to be deleted caused user need to copy in advance user data, behaviour Make technical problem the most easily.During simultaneously as be unencrypted state the most in the user mode, Retain user data, say, that when the routine data that user data is without being encrypted, User data is retained, still uses higher complete of safety if user data is sensitive data Portion removes to avoid the processing mode leaked, and reduces the risk that the user data of sensitivity leaks.

Described above is only the general introduction of technical solution of the present invention, in order to better understand the present invention Technological means, and can be practiced according to the content of description, and the present invention's be upper in order to allow State and can become apparent with other objects, features and advantages, below especially exemplified by the concrete reality of the present invention Execute mode.

Accompanying drawing explanation

By reading the detailed description of hereafter preferred implementation, various other advantage and benefit Place will be clear from understanding for those of ordinary skill in the art.Accompanying drawing is only used for illustrating preferably The purpose of embodiment, and it is not considered as limitation of the present invention.And at whole accompanying drawing In, it is denoted by the same reference numerals identical parts.In the accompanying drawings:

The schematic flow sheet of a kind of data clearing method that Fig. 1 provides for the embodiment of the present invention one;

The structural representation of a kind of data dump device that Fig. 2 provides for the embodiment of the present invention two;

The structural representation of a kind of data dump device that Fig. 3 provides for the embodiment of the present invention three;

The structural representation of the another kind of data dump device that Fig. 4 provides for the embodiment of the present invention three;

The structural representation of another data dump device that Fig. 5 provides for the embodiment of the present invention three.

Detailed description of the invention

It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although it is attached Figure shows the exemplary embodiment of the disclosure, it being understood, however, that can be with various shapes Formula realizes the disclosure and should not limited by embodiments set forth here.On the contrary, it is provided that these Embodiment is able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.

The data clearing method and the device that there is provided the embodiment of the present invention below in conjunction with the accompanying drawings are carried out Describe in detail.

Embodiment one

The schematic flow sheet of a kind of data clearing method that Fig. 1 provides for the embodiment of the present invention one, as Shown in Fig. 1, the method that the present embodiment is provided can be performed by mobile terminal, and method includes:

Step 101, in recovery mode, identifies the encryption of software system state under user model.

Concrete, software system has user model and reforestation practices, separately below to both of which It is briefly described.

Wherein, user model refers to one for user under normal circumstances, uses mobile terminal Pattern, user model has two kinds of encrypted states, and one is encrypted state, and another kind is non-encrypted State.In an encrypted state, need first to be decrypted, user data can be accessed;Another Plant as non-encrypted state, it is not necessary to deciphering, just can access user data.Under normal circumstances, if using User data relates to more sensitive information, then user model can be set to encrypted state.Phase Anti-, if user data is general information, it is not necessary to be encrypted, then user model can be arranged For unencrypted state, thus save the operation expense that encryption and decryption is brought, improve the speed of service.

Reforestation practices refers to a kind of mould can modified the data within Android machine or system Formula.We can write new Android system under this scheme, or carries out existing system Backup or upgrading, it is also possible to carry out factory reset and data dump etc..

As a kind of possible implementation, in recovery mode, reading preset state position, wherein, Preset state position is to be write during the encrypted state arranging software system under user model, is used for referring to Show the encrypted state of described software system under user model.Specifically, under user model, permissible Whether software system is encrypted and is configured, after encrypted state is provided with, in advance If mode bit write is used to indicate whether the value of encryption, and then in recovery mode, by pre-to this If mode bit is read out, determine whether user model enters according to the value that this is used to indicate whether encryption Go encryption.

As alternatively possible implementation, in recovery mode, access user data, if visiting Ask successfully, determine that the encryption of software system state under user model is unencryption, if accessing unsuccessfully, Determine that the encryption of software system state under user model is for encrypt.This is due at user model Time under encrypted state, the process under reforestation practices can not directly read user data, must User data can be conducted interviews after it must being decrypted, thus user can be determined therefrom that Encryption of software system state under pattern.

If step 102 is in unencrypted state, in recovery mode, the flow process cleared data is performed Time, user data is retained.

Concrete, according to encrypted state, user data is retained.If being in unencrypted state, In recovery mode, when performing the flow process cleared data, to the user data in external storage equipment Retain.

Further, if being in encrypted state, in recovery mode, the flow process cleared data is performed Time, the user data in external storage equipment is purged.

Wherein, external storage equipment can be safe digital card (Secure Digital Memory Card, SD card).

By in recovery mode, identify the encryption of software system state under user model, if being in Unencrypted state, in recovery mode, when performing the flow process cleared data, is carried out user data Retain, thus user is without copying the user data of required reservation in advance, solves existing Owing to being that whole user data is deleted caused use when carrying out data dump in technology Family needs to copy in advance user data, operation technical problem the most easily.

During simultaneously as be unencrypted state the most in the user mode, just retain user data, also That is, when the routine data that user data is without being encrypted, user data is protected Stay, remain unchanged the whole removings using safety higher to avoid leaking if user data is sensitive data Processing mode, reduce the risk that leaks of user data of sensitivity.

Therefore, the method that the embodiment of the present invention is provided, ensure that the same of user operation convenience Time, improve the safety of user data.

Embodiment two

The structural representation of a kind of data dump device that Fig. 2 provides for the embodiment of the present invention two, this The data dump device that embodiment is provided can be arranged in mobile terminal, as in figure 2 it is shown, should Device includes: identification module 31 and reservation module 32.

Identification module 31, in recovery mode, identifies the encryption of software system under user model State.

Reservation module 32, if for being in unencrypted state, in recovery mode, performs to remove number According to flow process time, user data is retained.

The device that the present embodiment is provided by identification module 31 in recovery mode, identifies user's mould Encryption of software system state under formula, if being in unencrypted state, in recovery mode, performs clear During the flow process of divisor evidence, user data is retained by reservation module 32, thus user is without in advance The user data of required reservation is copied, solves in prior art due to carry out data clear Except time be whole user data to be deleted caused user need to copy in advance user data, Operation technical problem the most easily.

During simultaneously as reservation module 32 is unencrypted state the most in the user mode, just retains and use User data, say, that when the routine data that user data is without being encrypted, to user Data retain, if user data is whole removings that sensitive data still employing safety is higher To avoid the processing mode leaked, reduce the risk that the user data of sensitivity leaks.

Therefore, the device that the embodiment of the present invention is provided, ensure that the same of user operation convenience Time, improve the safety of user data.

Embodiment three

The structural representation of a kind of data dump device that Fig. 3 provides for the embodiment of the present invention three, as Shown in Fig. 3, on the basis of the data dump device that Fig. 2 is provided, this device farther includes: Remove module 33.

Remove module 33, if for being in encrypted state, in recovery mode, perform to remove number According to flow process time, the user data in external storage equipment is purged.

Further, in order to understand the data dump device that explanation the present embodiment is provided, the present embodiment In provide two kinds of possible implementations of data dump device.

As a kind of possible implementation, the another kind of number that Fig. 4 provides for the embodiment of the present invention three According to the structural representation of removing device, as shown in Figure 4, on the basis of Fig. 3, identification module 31, Farther include: read unit 311 and determine unit 312.

Read unit 311, in recovery mode, read preset state position.

Wherein, preset state position is the encrypted state time institute arranging described software system under user model Write, for indicating the encrypted state of described software system under user model.

Determine unit 312, for according to the preset state position read, determine the institute under user model State encryption of software system state.

As alternatively possible implementation, Fig. 5 provide for the embodiment of the present invention three another The structural representation of data dump device, as it is shown in figure 5, on the basis of Fig. 3, identification module 31, farther include: access unit 313 and processing unit 314.

Access unit 313, in recovery mode, access user data.

Processing unit 314, if for accessing successfully, determining that the described software system under user model adds Close state is unencryption;If accessing unsuccessfully, determine the described encryption of software system shape under user model State is for encrypt.

One of ordinary skill in the art will appreciate that: realize the whole of above-mentioned each method embodiment Or part steps can be completed by the hardware that programmed instruction is relevant.Aforesaid program is permissible It is stored in a computer read/write memory medium.This program upon execution, performs to include State the step of each method embodiment;And aforesaid storage medium includes: ROM, RAM, magnetic The various medium that can store program code such as dish or CD.

It is last it is noted that various embodiments above is only in order to illustrate technical scheme, It is not intended to limit;Although the present invention being described in detail with reference to foregoing embodiments, It will be understood by those within the art that: foregoing embodiments still can be remembered by it The technical scheme carried is modified, or carries out the most some or all of technical characteristic With replacing;And these amendments or replacement, do not make the essence of appropriate technical solution depart from this Invent the scope of each embodiment technical scheme.

Claims (10)

1. a data clearing method, it is characterised in that including:
In recovery mode, the encryption of software system state under user model is identified;
If being in unencrypted state, in recovery mode, perform clear data flow process time, to User data retains.
Data clearing method the most according to claim 1, it is characterised in that described identification is used Encryption of software system state under the pattern of family includes:
In recovery mode, preset state position is read;Wherein, described preset state position is user's mould Write when the encrypted state of described software system is set under formula, be used for indicating institute under user model State the encrypted state of software system;
According to the preset state position read, determine the described encryption of software system shape under user model State.
Data clearing method the most according to claim 1, it is characterised in that described identification is used Encryption of software system state under the pattern of family includes:
In recovery mode, user data is accessed;
If accessing successfully, determine that the described encryption of software system state under user model is unencryption;
If accessing unsuccessfully, determine that the described encryption of software system state under user model is for encrypt.
4. according to the data clearing method described in any one of claim 1-3, it is characterised in that institute After stating the encryption of software system state identified under user model, also include:
If being in encrypted state, in recovery mode, when performing the flow process cleared data, externally The user data connect in storage device is purged.
5. according to the data clearing method described in any one of claim 1-3, it is characterised in that institute State user data to be stored in external storage equipment.
6. a data dump device, it is characterised in that including:
Identification module, in recovery mode, identifies the encryption of software system shape under user model State;
Reservation module, if for being in unencrypted state, in recovery mode, performing to clear data Flow process time, user data is retained.
Data dump device the most according to claim 6, it is characterised in that described identification mould Block, including:
Read unit, in recovery mode, read preset state position;Wherein, described default Mode bit is to be write during the encrypted state arranging described software system under user model, is used for referring to Show the encrypted state of described software system under user model;
Determining unit, for according to the preset state position read, determine under user model is described Encryption of software system state.
Data dump device the most according to claim 7, it is characterised in that described identification mould Block, including:
Access unit, in recovery mode, access user data;
Processing unit, if for accessing successfully, determining the described encryption of software system under user model State is unencryption;If accessing unsuccessfully, determine the described encryption of software system state under user model For encrypting.
9. according to the data dump device described in any one of claim 6-8, it is characterised in that institute State device, also include:
Remove module, if for being in encrypted state, in recovery mode, performing to clear data Flow process time, the user data in external storage equipment is purged.
10. according to the data dump device described in any one of claim 6-8, it is characterised in that institute State user data to be stored in external storage equipment.
CN201610282530.9A 2016-04-29 2016-04-29 Data eliminating method and device CN105956487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610282530.9A CN105956487A (en) 2016-04-29 2016-04-29 Data eliminating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610282530.9A CN105956487A (en) 2016-04-29 2016-04-29 Data eliminating method and device

Publications (1)

Publication Number Publication Date
CN105956487A true CN105956487A (en) 2016-09-21

Family

ID=56914513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610282530.9A CN105956487A (en) 2016-04-29 2016-04-29 Data eliminating method and device

Country Status (1)

Country Link
CN (1) CN105956487A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186741A (en) * 2011-12-30 2013-07-03 深圳市金正方科技有限公司 Method for recovering personalized settings of intelligent terminal
CN103246617A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data saving method based on Android system
WO2015060690A1 (en) * 2013-10-24 2015-04-30 Samsung Electronics Co., Ltd. Method and apparatus for upgrading operating system of electronic device
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186741A (en) * 2011-12-30 2013-07-03 深圳市金正方科技有限公司 Method for recovering personalized settings of intelligent terminal
CN103246617A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data saving method based on Android system
WO2015060690A1 (en) * 2013-10-24 2015-04-30 Samsung Electronics Co., Ltd. Method and apparatus for upgrading operating system of electronic device
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device

Similar Documents

Publication Publication Date Title
US9230099B1 (en) Systems and methods for combining static and dynamic code analysis
EP3374922B1 (en) Systems and methods for protecting backed-up data from ransomware attacks
AU2012347883B2 (en) System and method for restoring application data
US10148625B2 (en) Secure transfer and tracking of data using removable nonvolatile memory devices
JP5879527B2 (en) Information processing apparatus and information processing method
JP5648209B2 (en) Storage system having encryption key selection device and encryption key selection method
RU2298824C2 (en) Method and device for encoding/decoding data in high capacity memory device
US8341430B2 (en) External encryption and recovery management with hardware encrypted storage devices
CN1647443B (en) Method and aystem for helping secure operation within an integrated system employing a data access control function
EP2545435B1 (en) Systems and methods for garbage collection in deduplicated data systems
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
US8161524B2 (en) Method and portable storage device for allocating secure area in insecure area
KR101483839B1 (en) Protecting video content using virtualization
US20080022415A1 (en) Authority limit management method
KR101699998B1 (en) Secure storage of temporary secrets
US20070101158A1 (en) Security region in a non-volatile memory
US20080229428A1 (en) System and Method For a Dynamic Policies Enforced File System For a Data Storage Device
US20090307783A1 (en) Data processing device, method, program, integrated circuit, and program generating device
US20110185435A1 (en) Flash memory storage system, and controller and anti-falsifying method thereof
CN106796634B (en) Code pointer verification for hardware flow control
US20150081644A1 (en) Method and system for backing up and restoring a virtual file system
JP4717398B2 (en) Method for controlling data processing apparatus
US8051053B2 (en) System and method for data storage firewall on data storage unit
US20020026580A1 (en) System for access control to hidden storage area in a disk drive
US10592641B2 (en) Encryption method for digital data memory card and assembly for performing the same

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160921

WD01 Invention patent application deemed withdrawn after publication