CN105956487A - Data eliminating method and device - Google Patents

Data eliminating method and device Download PDF

Info

Publication number
CN105956487A
CN105956487A CN201610282530.9A CN201610282530A CN105956487A CN 105956487 A CN105956487 A CN 105956487A CN 201610282530 A CN201610282530 A CN 201610282530A CN 105956487 A CN105956487 A CN 105956487A
Authority
CN
China
Prior art keywords
data
state
user
software
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610282530.9A
Other languages
Chinese (zh)
Inventor
许帅群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lemobile Information Technology (Beijing) Co Ltd
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610282530.9A priority Critical patent/CN105956487A/en
Publication of CN105956487A publication Critical patent/CN105956487A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1438Restarting or rejuvenating
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Abstract

The embodiment of the invention provides a data eliminating method and device. The data eliminating method comprises the steps of, in a recovery mode, identifying an encryption state of a software system in a user mode; and if the software system is in an unencrypted state, reserving the user data while carrying out a data elimination process in the recovery mode. Therefore, a user is unnecessary to copy the user data which are required to be reserved in advance, and the technical problem of operational inconvenience due to that the user is required to copy the user data in advance as data elimination in the prior art is to eliminate all the user data is solved. Meanwhile, the user data are reserved only when the software system in the user mode is in the unencrypted state; that is to say, when the user data are routine data which are not required to be encrypted, the user data are reserved; and if the user data are sensitive data, the processing way of eliminating all the data, which is relatively high in security, is stilled adopted to avoid leakage, so that the leakage risk of the sensitive user data is reduced.

Description

Data clearing method and device
Technical field
The present invention relates to information technology, particularly relate to a kind of data clearing method and device.
Background technology
In the software system of mobile terminal, such as Android system, recovers (Recovery) pattern and refers to Be a kind of pattern data within mobile terminal or system can modified.At this mould New software system can be write under formula, or existing software system is backed up or upgrades, Factory reset can also be carried out.For the software system of mobile terminal, at reforestation practices Under be capable of the function of software system updating and data dump.
Inventor, during realizing the present invention, finds that prior art has following defects that
That whole user data is deleted when carrying out data dump, thus user need by Need the user data retained to back up in advance, such as, the file such as address list, photo is copied Shellfish operation is the most convenient.
Summary of the invention
The present invention provides a kind of data clearing method and device, be used for solving in prior art due to Carry out being whole user data to be deleted caused user need to copy in advance during data dump Shellfish user data, operation technical problem the most easily.
For reaching above-mentioned purpose, embodiments of the invention adopt the following technical scheme that
First aspect, it is provided that a kind of data clearing method, including:
In recovery mode, the encryption of software system state under user model is identified;
If being in unencrypted state, in recovery mode, when performing the flow process cleared data, externally The user data connect in storage device retains.
Second aspect, it is provided that a kind of data dump device, including:
Identification module, in recovery mode, identifies the encryption of software system shape under user model State;
Reservation module, if for being in unencrypted state, in recovery mode, performing to clear data Flow process time, the user data in external storage equipment is retained.
The data clearing method of embodiment of the present invention offer and device, by recovery mode, know Encryption of software system state under other user model, if being in unencrypted state, in recovery mode, When performing the flow process cleared data, user data is retained, thus user is without in advance to institute The user data that need to retain copies, and solves in prior art due to when carrying out data dump It is whole user data to be deleted caused user need to copy in advance user data, behaviour Make technical problem the most easily.During simultaneously as be unencrypted state the most in the user mode, Retain user data, say, that when the routine data that user data is without being encrypted, User data is retained, still uses higher complete of safety if user data is sensitive data Portion removes to avoid the processing mode leaked, and reduces the risk that the user data of sensitivity leaks.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the present invention Technological means, and can be practiced according to the content of description, and the present invention's be upper in order to allow State and can become apparent with other objects, features and advantages, below especially exemplified by the concrete reality of the present invention Execute mode.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit Place will be clear from understanding for those of ordinary skill in the art.Accompanying drawing is only used for illustrating preferably The purpose of embodiment, and it is not considered as limitation of the present invention.And at whole accompanying drawing In, it is denoted by the same reference numerals identical parts.In the accompanying drawings:
The schematic flow sheet of a kind of data clearing method that Fig. 1 provides for the embodiment of the present invention one;
The structural representation of a kind of data dump device that Fig. 2 provides for the embodiment of the present invention two;
The structural representation of a kind of data dump device that Fig. 3 provides for the embodiment of the present invention three;
The structural representation of the another kind of data dump device that Fig. 4 provides for the embodiment of the present invention three;
The structural representation of another data dump device that Fig. 5 provides for the embodiment of the present invention three.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although it is attached Figure shows the exemplary embodiment of the disclosure, it being understood, however, that can be with various shapes Formula realizes the disclosure and should not limited by embodiments set forth here.On the contrary, it is provided that these Embodiment is able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
The data clearing method and the device that there is provided the embodiment of the present invention below in conjunction with the accompanying drawings are carried out Describe in detail.
Embodiment one
The schematic flow sheet of a kind of data clearing method that Fig. 1 provides for the embodiment of the present invention one, as Shown in Fig. 1, the method that the present embodiment is provided can be performed by mobile terminal, and method includes:
Step 101, in recovery mode, identifies the encryption of software system state under user model.
Concrete, software system has user model and reforestation practices, separately below to both of which It is briefly described.
Wherein, user model refers to one for user under normal circumstances, uses mobile terminal Pattern, user model has two kinds of encrypted states, and one is encrypted state, and another kind is non-encrypted State.In an encrypted state, need first to be decrypted, user data can be accessed;Another Plant as non-encrypted state, it is not necessary to deciphering, just can access user data.Under normal circumstances, if using User data relates to more sensitive information, then user model can be set to encrypted state.Phase Anti-, if user data is general information, it is not necessary to be encrypted, then user model can be arranged For unencrypted state, thus save the operation expense that encryption and decryption is brought, improve the speed of service.
Reforestation practices refers to a kind of mould can modified the data within Android machine or system Formula.We can write new Android system under this scheme, or carries out existing system Backup or upgrading, it is also possible to carry out factory reset and data dump etc..
As a kind of possible implementation, in recovery mode, reading preset state position, wherein, Preset state position is to be write during the encrypted state arranging software system under user model, is used for referring to Show the encrypted state of described software system under user model.Specifically, under user model, permissible Whether software system is encrypted and is configured, after encrypted state is provided with, in advance If mode bit write is used to indicate whether the value of encryption, and then in recovery mode, by pre-to this If mode bit is read out, determine whether user model enters according to the value that this is used to indicate whether encryption Go encryption.
As alternatively possible implementation, in recovery mode, access user data, if visiting Ask successfully, determine that the encryption of software system state under user model is unencryption, if accessing unsuccessfully, Determine that the encryption of software system state under user model is for encrypt.This is due at user model Time under encrypted state, the process under reforestation practices can not directly read user data, must User data can be conducted interviews after it must being decrypted, thus user can be determined therefrom that Encryption of software system state under pattern.
If step 102 is in unencrypted state, in recovery mode, the flow process cleared data is performed Time, user data is retained.
Concrete, according to encrypted state, user data is retained.If being in unencrypted state, In recovery mode, when performing the flow process cleared data, to the user data in external storage equipment Retain.
Further, if being in encrypted state, in recovery mode, the flow process cleared data is performed Time, the user data in external storage equipment is purged.
Wherein, external storage equipment can be safe digital card (Secure Digital Memory Card, SD card).
By in recovery mode, identify the encryption of software system state under user model, if being in Unencrypted state, in recovery mode, when performing the flow process cleared data, is carried out user data Retain, thus user is without copying the user data of required reservation in advance, solves existing Owing to being that whole user data is deleted caused use when carrying out data dump in technology Family needs to copy in advance user data, operation technical problem the most easily.
During simultaneously as be unencrypted state the most in the user mode, just retain user data, also That is, when the routine data that user data is without being encrypted, user data is protected Stay, remain unchanged the whole removings using safety higher to avoid leaking if user data is sensitive data Processing mode, reduce the risk that leaks of user data of sensitivity.
Therefore, the method that the embodiment of the present invention is provided, ensure that the same of user operation convenience Time, improve the safety of user data.
Embodiment two
The structural representation of a kind of data dump device that Fig. 2 provides for the embodiment of the present invention two, this The data dump device that embodiment is provided can be arranged in mobile terminal, as in figure 2 it is shown, should Device includes: identification module 31 and reservation module 32.
Identification module 31, in recovery mode, identifies the encryption of software system under user model State.
Reservation module 32, if for being in unencrypted state, in recovery mode, performs to remove number According to flow process time, user data is retained.
The device that the present embodiment is provided by identification module 31 in recovery mode, identifies user's mould Encryption of software system state under formula, if being in unencrypted state, in recovery mode, performs clear During the flow process of divisor evidence, user data is retained by reservation module 32, thus user is without in advance The user data of required reservation is copied, solves in prior art due to carry out data clear Except time be whole user data to be deleted caused user need to copy in advance user data, Operation technical problem the most easily.
During simultaneously as reservation module 32 is unencrypted state the most in the user mode, just retains and use User data, say, that when the routine data that user data is without being encrypted, to user Data retain, if user data is whole removings that sensitive data still employing safety is higher To avoid the processing mode leaked, reduce the risk that the user data of sensitivity leaks.
Therefore, the device that the embodiment of the present invention is provided, ensure that the same of user operation convenience Time, improve the safety of user data.
Embodiment three
The structural representation of a kind of data dump device that Fig. 3 provides for the embodiment of the present invention three, as Shown in Fig. 3, on the basis of the data dump device that Fig. 2 is provided, this device farther includes: Remove module 33.
Remove module 33, if for being in encrypted state, in recovery mode, perform to remove number According to flow process time, the user data in external storage equipment is purged.
Further, in order to understand the data dump device that explanation the present embodiment is provided, the present embodiment In provide two kinds of possible implementations of data dump device.
As a kind of possible implementation, the another kind of number that Fig. 4 provides for the embodiment of the present invention three According to the structural representation of removing device, as shown in Figure 4, on the basis of Fig. 3, identification module 31, Farther include: read unit 311 and determine unit 312.
Read unit 311, in recovery mode, read preset state position.
Wherein, preset state position is the encrypted state time institute arranging described software system under user model Write, for indicating the encrypted state of described software system under user model.
Determine unit 312, for according to the preset state position read, determine the institute under user model State encryption of software system state.
As alternatively possible implementation, Fig. 5 provide for the embodiment of the present invention three another The structural representation of data dump device, as it is shown in figure 5, on the basis of Fig. 3, identification module 31, farther include: access unit 313 and processing unit 314.
Access unit 313, in recovery mode, access user data.
Processing unit 314, if for accessing successfully, determining that the described software system under user model adds Close state is unencryption;If accessing unsuccessfully, determine the described encryption of software system shape under user model State is for encrypt.
One of ordinary skill in the art will appreciate that: realize the whole of above-mentioned each method embodiment Or part steps can be completed by the hardware that programmed instruction is relevant.Aforesaid program is permissible It is stored in a computer read/write memory medium.This program upon execution, performs to include State the step of each method embodiment;And aforesaid storage medium includes: ROM, RAM, magnetic The various medium that can store program code such as dish or CD.
It is last it is noted that various embodiments above is only in order to illustrate technical scheme, It is not intended to limit;Although the present invention being described in detail with reference to foregoing embodiments, It will be understood by those within the art that: foregoing embodiments still can be remembered by it The technical scheme carried is modified, or carries out the most some or all of technical characteristic With replacing;And these amendments or replacement, do not make the essence of appropriate technical solution depart from this Invent the scope of each embodiment technical scheme.

Claims (10)

1. a data clearing method, it is characterised in that including:
In recovery mode, the encryption of software system state under user model is identified;
If being in unencrypted state, in recovery mode, perform clear data flow process time, to User data retains.
Data clearing method the most according to claim 1, it is characterised in that described identification is used Encryption of software system state under the pattern of family includes:
In recovery mode, preset state position is read;Wherein, described preset state position is user's mould Write when the encrypted state of described software system is set under formula, be used for indicating institute under user model State the encrypted state of software system;
According to the preset state position read, determine the described encryption of software system shape under user model State.
Data clearing method the most according to claim 1, it is characterised in that described identification is used Encryption of software system state under the pattern of family includes:
In recovery mode, user data is accessed;
If accessing successfully, determine that the described encryption of software system state under user model is unencryption;
If accessing unsuccessfully, determine that the described encryption of software system state under user model is for encrypt.
4. according to the data clearing method described in any one of claim 1-3, it is characterised in that institute After stating the encryption of software system state identified under user model, also include:
If being in encrypted state, in recovery mode, when performing the flow process cleared data, externally The user data connect in storage device is purged.
5. according to the data clearing method described in any one of claim 1-3, it is characterised in that institute State user data to be stored in external storage equipment.
6. a data dump device, it is characterised in that including:
Identification module, in recovery mode, identifies the encryption of software system shape under user model State;
Reservation module, if for being in unencrypted state, in recovery mode, performing to clear data Flow process time, user data is retained.
Data dump device the most according to claim 6, it is characterised in that described identification mould Block, including:
Read unit, in recovery mode, read preset state position;Wherein, described default Mode bit is to be write during the encrypted state arranging described software system under user model, is used for referring to Show the encrypted state of described software system under user model;
Determining unit, for according to the preset state position read, determine under user model is described Encryption of software system state.
Data dump device the most according to claim 7, it is characterised in that described identification mould Block, including:
Access unit, in recovery mode, access user data;
Processing unit, if for accessing successfully, determining the described encryption of software system under user model State is unencryption;If accessing unsuccessfully, determine the described encryption of software system state under user model For encrypting.
9. according to the data dump device described in any one of claim 6-8, it is characterised in that institute State device, also include:
Remove module, if for being in encrypted state, in recovery mode, performing to clear data Flow process time, the user data in external storage equipment is purged.
10. according to the data dump device described in any one of claim 6-8, it is characterised in that institute State user data to be stored in external storage equipment.
CN201610282530.9A 2016-04-29 2016-04-29 Data eliminating method and device Pending CN105956487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610282530.9A CN105956487A (en) 2016-04-29 2016-04-29 Data eliminating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610282530.9A CN105956487A (en) 2016-04-29 2016-04-29 Data eliminating method and device

Publications (1)

Publication Number Publication Date
CN105956487A true CN105956487A (en) 2016-09-21

Family

ID=56914513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610282530.9A Pending CN105956487A (en) 2016-04-29 2016-04-29 Data eliminating method and device

Country Status (1)

Country Link
CN (1) CN105956487A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186741A (en) * 2011-12-30 2013-07-03 深圳市金正方科技有限公司 Method for recovering personalized settings of intelligent terminal
CN103246617A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data saving method based on Android system
WO2015060690A1 (en) * 2013-10-24 2015-04-30 Samsung Electronics Co., Ltd. Method and apparatus for upgrading operating system of electronic device
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186741A (en) * 2011-12-30 2013-07-03 深圳市金正方科技有限公司 Method for recovering personalized settings of intelligent terminal
CN103246617A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data saving method based on Android system
WO2015060690A1 (en) * 2013-10-24 2015-04-30 Samsung Electronics Co., Ltd. Method and apparatus for upgrading operating system of electronic device
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device

Similar Documents

Publication Publication Date Title
US9853953B2 (en) Method of transferring rights object and electronic device
US7216207B1 (en) System and method for fast, secure removal of objects from disk storage
US8120997B2 (en) Information processing apparatus including a communication unit that communicates with an IC chip and associated methodology
US10146461B2 (en) Automatic back-up system with verification key and method of operation thereof
CN106599629B (en) Android application program reinforcing method and device
CN102436388A (en) Method and device for upgrading software of embedded system
JP5645725B2 (en) Data processing apparatus, data processing system, and control method therefor
US20110061112A1 (en) System and method for enforcing data encryption on removable media devices
JP2007213405A (en) Method and apparatus for managing tally information
CN101236531B (en) Memory and its automatic protection realization method
CN105786404A (en) Protective method and device for Flash storage
US9384353B2 (en) System and method for encryption of disk based on pre-boot compatibility testing
CN101853345B (en) Method and apparatus for processing data stored in external storage device
CN107563192B (en) Lesso software protection method and device, electronic equipment and storage medium
CN106326782A (en) Information processing method and electronic device
CN105956487A (en) Data eliminating method and device
JP4972994B2 (en) Information processing apparatus, information processing method, and program
JP6798669B2 (en) Methods and devices for hiding user information contained in applications
AU2008344947B2 (en) System and method for securely storing information
CN107085900A (en) Data processing method, device, system and POS terminal
CN107967118A (en) A kind of method and apparatus realized hard disc data high speed dump and checked
CN109598154B (en) Credible full-disk encryption and decryption method
JP2009169868A (en) Storage area access device and method for accessing storage area
KR101161686B1 (en) Memory device with security function and security method thereof
CN109598119B (en) Credible encryption and decryption method

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160921

WD01 Invention patent application deemed withdrawn after publication