CN106548089A - The method and device of protection terminal data - Google Patents

The method and device of protection terminal data Download PDF

Info

Publication number
CN106548089A
CN106548089A CN201610922178.0A CN201610922178A CN106548089A CN 106548089 A CN106548089 A CN 106548089A CN 201610922178 A CN201610922178 A CN 201610922178A CN 106548089 A CN106548089 A CN 106548089A
Authority
CN
China
Prior art keywords
data
identity information
information
correct
data base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610922178.0A
Other languages
Chinese (zh)
Inventor
谭康喜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610922178.0A priority Critical patent/CN106548089A/en
Publication of CN106548089A publication Critical patent/CN106548089A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The disclosure provides a kind of method and device of protection terminal data, protects the method for terminal data to include, under Recovery patterns:When the deletion action for the data in data base is detected, user input identity information is pointed out;The identity information of receiving user's input;Whether checking identity information is correct;Only when identity information is correct, the data in data base are deleted.The data in data base only can be deleted in the case of subscriber identity information is correct, other people is avoiding problems and is maliciously deleted the data that user is stored in data base, the impact of various inconvenience is caused to user.

Description

The method and device of protection terminal data
Technical field
It relates to technical field of electronic communication, more particularly to the method and device of protection terminal data.
Background technology
Electronic equipment is usually provided with recovery (English:Recovery) pattern, is broken down using electronic equipment in user When, Recovery pattern recovery Default Values can be passed through, it is generally the case that can have multiple options, example into Recovery Such as:Factory reset, can also switched system, system upgrade etc., in these operating process are performed, it is more likely that can delete Data in user data, i.e. electronic device data storehouse, many electronic equipments are performing the process of the operations such as factory reset In can prompt the user whether delete user data, it is to avoid user data loss.But, if the electronic equipment quilt used by user Others takes away, and enters Recovery, deletes user data, then user can be made a big impact.
The content of the invention
The embodiment of the present disclosure provides a kind of method and device of protection terminal data.The technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of method of protection terminal data, it is applied to protect terminal The device of data, the method include, in the case where (Recovery) pattern is recovered:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
Generally, after into reforestation practices, carry out the operations such as factory reset, system switching, system upgrade when Wait, can all relate to whether the user data in retention data storehouse, therefore, when into reforestation practices, user's checking identity is pointed out, Only when subscriber identity information is correct, i.e., user identity it is errorless in the case of can delete data in data base, it is to avoid other People's malice deletes the data that user is stored in data base, and the impact of various inconvenience is caused to user.
In one embodiment, when the identity information mistake of user input, the data in deletion disabled data base.
In one embodiment, verify whether identity information is correct, including:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information In at least one;
Verify whether identity information is correct according to key information.
Key information is not stored in data base, therefore, when user identity is verified, it is not necessary to access data base, After being verified, data base is just had permission to access, the data in data base is protected, it is to avoid maliciously deleted by others.
In one embodiment, when key information includes finger print information, if the finger print information in key information and body Finger print information in part information is identical, then judge that the identity information of user input is correct;
When key information includes character information, if the character information in key information is believed with the character in identity information Manner of breathing is same, then judge that the identity information of user input is correct.
In one embodiment, the method also includes, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, the key information of user input is stored in into default storage location, including:
Add key identification in key information, and be stored in default storage location.
Key information can be obtained according to the address of key identification and default memory space.
In one embodiment, the method also includes, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of device of protection terminal data, including:Reminding module, First receiver module, authentication module and data management module, under Recovery patterns:
Reminding module, for when the deletion action for the data in data base is detected, pointing out user input identity Information;
First receiver module, for the identity information of receiving user's input;
Authentication module, for verifying whether identity information is correct;
Data management module, for, only when identity information is correct, deleting the data in data base.
In one embodiment, authentication module includes acquisition submodule and judging submodule;
Acquisition submodule, for obtaining key information, key information is not stored in data base, and key information includes fingerprint At least one in information and character information;
Judging submodule, for verifying whether identity information is correct according to key information.
In one embodiment, the device of terminal data is protected also to include the second receiver module and memory module, normal Under mode of operation:
Second receiver module, for the key information of receiving user's input;
Memory module, for the key information of user input is stored in default storage location.
In one embodiment, reminding module, when into reforestation practices, points out user's checking identity.
In one embodiment, the device of terminal data is protected also to include the 3rd receiver module, in the normal mode of operation:
3rd receiver module, for the Recovery mode datas protection instruction of receiving user's input, Recovery patterns When data protection is instructed for indicating the deletion action for the data in data base is detected under Recovery patterns, point out User input identity information is verifying that whether correct identity information and the number only when identity information is correct in deletion data base According to.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of device of protection terminal data, including:
Processor;
For storing the memorizer of processor executable;
Wherein, processor is configured to, under Recovery patterns:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
In one embodiment, processor can be additionally configured to:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information In at least one;
Verify whether identity information is correct according to key information.
In one embodiment, processor can be additionally configured to, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, processor can be additionally configured to, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in description and the part of this specification is constituted, show the enforcement for meeting the disclosure Example, and be used for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart of the method for the protection terminal data according to an exemplary embodiment;
Fig. 2 is the flow chart of the method for the protection terminal data according to an exemplary embodiment;
Fig. 3 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 4 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 5 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 6 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 7 is the block diagram of the device of the protection terminal data according to an exemplary embodiment.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
The technical scheme that the embodiment of the present disclosure is provided, is applied to protect the device of terminal data, the protection terminal data Device can be smart mobile phone, panel computer etc..The device of protection terminal data is usually provided with Recovery patterns, In Recovery patterns, the data in data base can be deleted, the data in data base can include various application (English: Application, APP) in user data, user for protection terminal data device personal settings record etc., if The device of the used protection terminal data of user is entered Recovery patterns by other people, and malice deletes the data in data base, meeting User is made a big impact, is the data in protection customer data base, the protection terminal data that the embodiment of the present disclosure is provided Method, before the data in data base is deleted, points out user's checking identity;Just whether the identity information of checking user input Really;When the identity information of user input is correct, the data in data base are deleted.Only when the correct situation of subscriber identity information The data in data base can be deleted down, other people is avoiding problems and is maliciously deleted the data that user is stored in data base, it is right User causes the impact of various inconvenience.
Fig. 1 is a kind of flow chart of the method for the protection terminal data according to an exemplary embodiment, such as Fig. 1 institutes Show, the method for the protection terminal data includes step 101-104, under Recovery patterns:
In a step 101, when the deletion action for the data in data base is detected, point out user input identity letter Breath.
Data base's (English:Database it is) organizing, store and manage data, to set up in computer according to data structure Warehouse in storage device.Data in data base can include the user data in various APP, and user is for protection number of terminals According to device personal settings record etc..For example, user uses video jukebox software using the chat record of chat software, user Video playback record, user for protection terminal data device desktop arrange etc..
In one embodiment, prompting prompting user input identity information, can pass through text prompt, it is also possible to by language Sound point out, for example, when detect user select delete data base in data when, eject prompting frame, prompting frame include point out The word of user input identity information;Or, when detect user select delete data base in data when, voice broadcast prompting User input identity information.
Prompting user's checking identity can be just verified when into reforestation practices, it is also possible to after into reforestation practices, when The operation of user is verified when can delete the data in data base.Generally, after into reforestation practices, dispatch from the factory recovery is carried out When setting, system switching, system upgrade etc. are operated, the user data in retention data storehouse can be all related to whether, therefore, when During into reforestation practices, user's checking identity is pointed out, other people malicious operations can be avoided to delete the data in data base.
Before data in data base is deleted, user needs to verify identity, only when subscriber identity information is correct, that is, uses The data in data base can be deleted in the case that family identity is errorless, it is to avoid other people maliciously delete user and store in data base Data, user is caused it is various inconvenience impacts.
In a step 102, the identity information of receiving user's input.
The identity information of receiving user's input can for example detect user to protecting by detecting that the operation of user is received The pressing of physical button or detection user touch control operation on the touchscreen or detection on the device of shield terminal data is used Family fingerprint of typing etc. on fingerprint capturer.
In step 103, verify whether identity information is correct;
In one embodiment, whether checking is correct with identity information, including:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information In at least one;Verify whether identity information is correct according to key information.
During the identity information of user input can also include the character information of finger print information and user input of user input At least one, it is and corresponding in key information.Identity information can only include the character information of user input, only carry out close Code checking;Or identity information can only include the finger print information of user input, a fingerprint authentication;Or identity information can To include that the finger print information of the character information and user input of user input, password authentification and fingerprint authentication will be carried out.
In one embodiment, when key information includes finger print information, if the finger print information in key information and body Finger print information in part information is identical, then judge that the identity information of user input is correct;When key information includes character information, If the character information in key information is identical with the character information in identity information, just the identity information of user input is being judged Really.
Key information is not stored in data base, therefore, when user identity is verified, it is not necessary to access data base, After being verified, data base is just had permission to access, the data in data base is protected, it is to avoid maliciously deleted by others.
At step 104, only when identity information is correct, the data in data base are deleted.
In one embodiment, when the identity information mistake of user input, the data in deletion disabled data base.
The method of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
The method of the protection terminal data provided based on the corresponding embodiments of above-mentioned Fig. 1, Fig. 2 is according to an exemplary enforcement A kind of flow chart of the method for the protection terminal data for exemplifying, with reference to shown in Fig. 2, the protection terminal data that the present embodiment is provided Method include step 201-207:
In step 201, the key information of receiving user's input.
In step 202., the key information of user input is stored in into default storage location.
In one embodiment, add key identification in key information, and be stored in default storage location.According to key The address of mark and default memory space can obtain key information.
It should be noted that the key information is not stored in data base.
In step 203, the Recovery mode datas protection instruction of receiving user's input.
The protection instruction of Recovery mode datas is detected in data base under Recovery patterns for instruction During the deletion action of data, point out user input identity information to verify identity information whether correctly and only when identity information is correct When delete data base in the data.
In step 204, when into Recovery patterns, point out user input identity information.
In step 205, obtain key information, and according to key information verify user input identity information whether just Really.
When the identity information of user input is correct, execution step 206, when the identity information mistake of user input, is held Row step 207.
In step 206, when the identity information of user input is correct, the data in data base are deleted.
In step 207, when the identity information mistake of user input, the data in deletion disabled data base.
The method of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
It is following for disclosure device embodiment, can be used for performing method of disclosure embodiment.
Fig. 3 is a kind of block diagram of the device of the protection terminal data according to an exemplary embodiment, and the equipment can be with By some or all of, protection end for being implemented in combination with the device for becoming protection terminal data of software, hardware or both The device of end data is used for the method for performing the protection terminal data described in the corresponding embodiments of above-mentioned Fig. 1 and Fig. 2, such as schemes Shown in 3, the device 30 of the protection terminal data includes:Reminding module 301, the first receiver module 302,303 sum of authentication module According to management module 304, under Recovery patterns:;
Reminding module 301, for when the deletion action for the data in data base is detected, pointing out user input body Part information;
First receiver module 302, for the identity information of receiving user's input;
Authentication module 303, for verifying whether identity information is correct;
Data management module 304, for, only when identity information is correct, deleting the data in data base.
In one embodiment, as shown in figure 4, authentication module 303 includes acquisition submodule 3031 and judging submodule 3032;
Acquisition submodule 3031, for obtaining key information, key information is not stored in data base, and key information includes At least one in finger print information and character information;
Judging submodule 3032, for verifying whether identity information is correct according to key information.
In one embodiment, as shown in figure 5, the device 30 of protection terminal data also includes 305 He of the second receiver module Memory module 306, in the normal mode of operation:;
Second receiver module 305, for the key information of receiving user's input;
Memory module 306, for the key information of user input is stored in default storage location.
In one embodiment, as shown in fig. 6, the device 30 of protection terminal data also includes the 3rd receiver module 307, Under normal mode of operation:
3rd receiver module 307, for the Recovery mode datas protection instruction of receiving user's input, Recovery moulds When formula data protection is instructed for indicating the deletion action for the data in data base is detected under Recovery patterns, carry Show user input identity information to verify that identity information is whether correct and delete in data base only when identity information is correct this Data.
The device of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
Fig. 7 is a kind of block diagram of the device of the protection terminal data according to an exemplary embodiment, the guarantor shown in Fig. 7 The device of shield terminal data can be a terminal unit, for example, smart mobile phone, panel computer etc..
The device 70 of protection terminal data can include following one or more parts:Processor 701, memorizer 702, electricity Source component 703, multimedia groupware 704, audio-frequency assembly 705, the interface 706 of input/output (I/O), sensor cluster 707, with And communication component 708.
The integrated operation of the generally device 70 of control protection terminal data of processor 701, such as with display, call, Data communication, the associated operation of camera operation and record operation.Processor 701 can include one or more modules, be easy to Interaction between processor 701 and other assemblies.For example, processing processor 701 can include multi-media module, to facilitate many matchmakers Interaction between body component 704 and processor 701.
Memorizer 702 is configured to store behaviour of various types of data to support the device 70 in protection terminal data Make.The example of these data includes the finger of any application program or method for operating on the device 70 of protection terminal data Order, contact data, telephone book data, message, picture, video etc..Memorizer 702 can be by any kind of volatibility or non- Volatile storage devices or combinations thereof realize that such as static RAM is (English:Static Random Access Memory, SRAM), Electrically Erasable Read Only Memory (English:Electrically Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory EPROM (English:Erasable Programmable Read Only Memory, EPROM), programmable read only memory (English:Programmable Read Only Memory, PROM), read only memory (English:Read Only Memory, ROM), magnetic memory, flash memory, Disk or CD.
Power supply module 703 provides electric power for the various assemblies for protecting the device 70 of terminal data.Power supply module 703 can be wrapped Include power-supply management system, one or more power supplys, and other with for protect terminal data device 70 generate, manage and distribute electricity The associated component of power.
Multimedia groupware 704 is included in one output interface of offer between the device 70 of protection terminal data and user Screen.In certain embodiments, screen can include liquid crystal display (English:Liquid Crystal Display, LCD) and Touch panel (English:Touch Panel, TP).If screen includes touch panel, screen may be implemented as touch screen, with Receive the input signal from user.Touch panel includes one or more touch sensors with sensing touch, slip and touches Gesture on panel.Touch sensor can not only sensing touch or sliding action border, but also detect and touch or sliding Dynamic operation related persistent period and pressure.In certain embodiments, multimedia groupware 704 include a front-facing camera and/ Or post-positioned pick-up head.When the device 70 of protection terminal data is in operator scheme, such as screening-mode or during video mode is preposition to take the photograph As head and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and post-positioned pick-up head can be One fixed optical lens system has focusing and optical zoom capabilities.
Audio-frequency assembly 705 is configured to output and/or input audio signal.For example, audio-frequency assembly 705 includes a Mike Wind (English:Microphone, MIC), when the device 70 of protection terminal data is in operator scheme, such as call model, record mould When formula and speech recognition mode, mike is configured to receive external audio signal.The audio signal for being received can be entered one Step is stored in memorizer 702 or sends via communication component 708.In certain embodiments, audio-frequency assembly 705 is also raised including one Sound device, for exports audio signal.
, for interface is provided between process assembly 701 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 706 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 707 includes one or more sensors, provides each for the device 70 to protect terminal data The state estimation of aspect.For example, sensor cluster 707 can detect the device 70 of protection terminal data and beat opening/closing shape State, the relative localization of component, such as described component be protect terminal data device 70 display and keypad, sensor group Part 707 can also detect the position change of 70 1 components of device of the device 70 of protection terminal data or protection terminal data, User with protection terminal data device 70 contact it is presence or absence of, protection terminal data 70 orientation of device or acceleration/ Slow down and protect the temperature change of the device 70 of terminal data.Sensor cluster 707 can include proximity transducer, be configured to use Carry out the presence of the object near detection when not having any physical contact.Sensor cluster 707 can also include optical sensor, such as Complementary metal oxide semiconductors (CMOS) (English:Complementary Metal Oxide Semiconductor, CMOS) or electric charge Coupling element (English:Charge Coupled Device, CCD) imageing sensor, for used in imaging applications.One In a little embodiments, the sensor cluster 707 can also include acceleration transducer, and gyro sensor, Magnetic Sensor, pressure are passed Sensor or temperature sensor.
Communication component 708 is configured to facilitate wired or wireless side between the device 70 and other equipment of protection terminal data The communication of formula.The device 70 of protection terminal data can access the wireless network based on communication standard, such as Wireless Fidelity (English: Wireless-Fidelity, WiFi), 2G or 3G, or combinations thereof.In one exemplary embodiment, communication component 708 The broadcast singal or broadcast related information from external broadcasting management system is received via broadcast channel.In an exemplary enforcement In example, communication component 708 also includes near-field communication (English:Near Field Communication, NFC) module, to promote Junction service.For example, can be based on RF identification (English in NFC module:Radio Frequency Identification, RFID) technology, Infrared Data Association's (English:Infrared Data Association, IrDA) technology, ultra broadband (English: Ultra Wideband, UWB) technology, bluetooth (English:Bluetooth, BT) technology and other technologies to be realizing.
In the exemplary embodiment, the device 70 of protection terminal data can be by one or more application specific integrated circuits (English:Application Specific Integrated Circuit, ASIC), digital signal processor (English: Digital Signal Processing, DSP), digital signal processing appts (English:Digital Signal Processing Device, DSPD), PLD (English:Programmable Logic Device, PLD), it is existing Field programmable gate array (English:Field Programmable Gate Array, FPGA), controller, microcontroller, Wei Chu Reason device or other electronic components are realized, for performing the protection terminal data described in the corresponding embodiments of above-mentioned Fig. 1 and Fig. 2 Method.
In one embodiment, processor 701 is configured to, under Recovery patterns:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
In one embodiment, processor 701 can be additionally configured to:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information In at least one;
Verify whether identity information is correct according to key information.
In one embodiment, processor 701 can be additionally configured to, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, processor 701 can be additionally configured to, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memorizer 702 of instruction, above-mentioned instruction can be performed on to complete by the processor 701 of the device 70 of protection terminal data State method.For example, non-transitorycomputer readable storage medium can be ROM, random access memory (English:Random Access Memory, RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..Instruction in the storage medium When being performed by the processor 701 of the device 70 of protection terminal data so that the device 70 of protection terminal data is able to carry out above-mentioned The method of the protection terminal data described in the corresponding embodiments of Fig. 1 and Fig. 2, the method includes, under Recovery patterns:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
In one embodiment, verify whether identity information is correct, including:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information In at least one;
Verify whether identity information is correct according to key information.
In one embodiment, the method also includes, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, the method also includes, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
The device of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
Those skilled in the art will readily occur to its of the disclosure after considering description and putting into practice disclosure disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is limited only by appended claim.

Claims (9)

1. it is a kind of protection terminal data method, it is characterised in that methods described includes, under Recovery reforestation practices:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Verify whether the identity information is correct;
Only when the identity information is correct, the data in the data base are deleted.
2. method according to claim 1, it is characterised in that whether the checking identity information is correct, including:
Obtain key information, the key information is not stored in the data base, the key information include finger print information and At least one in character information;
Verify whether the identity information is correct according to the key information.
3. method according to claim 2, it is characterised in that methods described also includes, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
4. the method according to any one of claim 1-3, it is characterised in that methods described also includes, in normal work mould Under formula:
The Recovery mode datas protection instruction of receiving user's input, the Recovery mode datas protection instruction are used to refer to Show when the deletion action for the data in the data base is detected under Recovery patterns, point out body described in user input Part information with verify whether the identity information correct and only delete when the identity information is correct in the data base should Data.
5. it is a kind of protection terminal data device, it is characterised in that include:Reminding module, the first receiver module, authentication module and Data management module, under Recovery reforestation practices:
The reminding module, for when the deletion action for the data in data base is detected, pointing out user input identity Information;
First receiver module, for the identity information of receiving user's input;
The authentication module, for verifying whether the identity information is correct;
The data management module, for, only when the identity information is correct, deleting the data in the data base.
6. equipment according to claim 5, it is characterised in that the authentication module includes acquisition submodule and judges submodule Block;
The acquisition submodule, for obtaining key information, the key information is not stored in the data base, the key Information includes at least one in finger print information and character information;
The judging submodule, for verifying whether the identity information is correct according to the key information.
7. equipment according to claim 6, it is characterised in that the device of the protection terminal data is also received including second Module and memory module, in the normal mode of operation:
Second receiver module, for the key information of receiving user's input;
The memory module, for the key information of user input is stored in default storage location.
8. the equipment according to any one of claim 5-7, it is characterised in that the device of the protection terminal data also includes 3rd receiver module, in the normal mode of operation:
3rd receiver module, for the Recovery mode datas protection instruction of receiving user's input, the Recovery Mode data protection instruction detects the deletion behaviour for the data in the data base under Recovery patterns for instruction When making, point out identity information described in user input whether to verify the identity information correctly and only when the identity information is correct When delete the data in the data base.
9. it is a kind of protection terminal data device, it is characterised in that include:
Processor;
For storing the memorizer of processor executable;
Wherein, the processor is configured to, under Recovery reforestation practices:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Verify whether the identity information is correct;
Only when the identity information is correct, the data in the data base are deleted.
CN201610922178.0A 2016-10-21 2016-10-21 The method and device of protection terminal data Pending CN106548089A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610922178.0A CN106548089A (en) 2016-10-21 2016-10-21 The method and device of protection terminal data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610922178.0A CN106548089A (en) 2016-10-21 2016-10-21 The method and device of protection terminal data

Publications (1)

Publication Number Publication Date
CN106548089A true CN106548089A (en) 2017-03-29

Family

ID=58392241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610922178.0A Pending CN106548089A (en) 2016-10-21 2016-10-21 The method and device of protection terminal data

Country Status (1)

Country Link
CN (1) CN106548089A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508522A (en) * 2018-11-16 2019-03-22 Oppo广东移动通信有限公司 A kind of data clearing method, device, storage medium and terminal
CN114422150A (en) * 2022-03-29 2022-04-29 飞狐信息技术(天津)有限公司 Method for preventing passive deletion, client and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6502133B1 (en) * 1999-03-25 2002-12-31 Lucent Technologies Inc. Real-time event processing system with analysis engine using recovery information
CN104199688A (en) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 Mobile terminal and system reinstallation control method and device thereof
CN106021027A (en) * 2016-05-24 2016-10-12 广东欧珀移动通信有限公司 Terminal data processing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6502133B1 (en) * 1999-03-25 2002-12-31 Lucent Technologies Inc. Real-time event processing system with analysis engine using recovery information
CN104199688A (en) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 Mobile terminal and system reinstallation control method and device thereof
CN106021027A (en) * 2016-05-24 2016-10-12 广东欧珀移动通信有限公司 Terminal data processing method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508522A (en) * 2018-11-16 2019-03-22 Oppo广东移动通信有限公司 A kind of data clearing method, device, storage medium and terminal
WO2020098412A1 (en) * 2018-11-16 2020-05-22 Oppo广东移动通信有限公司 Data cleaning method and apparatus, and storage medium and terminal
CN114422150A (en) * 2022-03-29 2022-04-29 飞狐信息技术(天津)有限公司 Method for preventing passive deletion, client and server
CN114422150B (en) * 2022-03-29 2022-07-12 飞狐信息技术(天津)有限公司 Method for preventing passive deletion, client and server

Similar Documents

Publication Publication Date Title
CN104765552B (en) Right management method and device
CN102467462B (en) Method for protecting data stored in device and corresponding device
CN106709399A (en) Fingerprint identification method and device
CN104933351A (en) Information security processing method and information security processing device
CN105407098A (en) Identity verification method and device
CN104866750A (en) Method and device for starting application
CN104503689A (en) Method and device for displaying application interface
CN104866749A (en) Operation responding method and device
CN105654302A (en) Payment method and device
CN105513179A (en) Unlocking method and device, as well as intelligent lock
CN104571709B (en) The processing method of mobile terminal and virtual key
CN104573550A (en) Method and device for protecting data
CN104216742A (en) Upgrade control method and device based on password
CN104376248A (en) Method and device for carrying out user authentication on password input interface
CN105677214A (en) Application management method and apparatus
CN108319832A (en) Unlocking method and device
CN108319836A (en) The method and apparatus for executing processing based on fingerprint recognition
CN104331228A (en) Screen locking method and device
CN108537096A (en) Reminding method, device and the electronic equipment of fingerprint collecting position
CN105335062A (en) Information editing operation processing method and apparatus
CN105511922A (en) Application startup controlling method and device
CN106845199A (en) Object authentication method and device
CN106372943A (en) Message processing method and device
CN106484296A (en) Mobile terminal prevents processing method, device and the equipment of false touch
CN105975283A (en) Starting method and device for operating system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170329