CN106548089A - The method and device of protection terminal data - Google Patents
The method and device of protection terminal data Download PDFInfo
- Publication number
- CN106548089A CN106548089A CN201610922178.0A CN201610922178A CN106548089A CN 106548089 A CN106548089 A CN 106548089A CN 201610922178 A CN201610922178 A CN 201610922178A CN 106548089 A CN106548089 A CN 106548089A
- Authority
- CN
- China
- Prior art keywords
- data
- identity information
- information
- correct
- data base
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure provides a kind of method and device of protection terminal data, protects the method for terminal data to include, under Recovery patterns:When the deletion action for the data in data base is detected, user input identity information is pointed out;The identity information of receiving user's input;Whether checking identity information is correct;Only when identity information is correct, the data in data base are deleted.The data in data base only can be deleted in the case of subscriber identity information is correct, other people is avoiding problems and is maliciously deleted the data that user is stored in data base, the impact of various inconvenience is caused to user.
Description
Technical field
It relates to technical field of electronic communication, more particularly to the method and device of protection terminal data.
Background technology
Electronic equipment is usually provided with recovery (English:Recovery) pattern, is broken down using electronic equipment in user
When, Recovery pattern recovery Default Values can be passed through, it is generally the case that can have multiple options, example into Recovery
Such as:Factory reset, can also switched system, system upgrade etc., in these operating process are performed, it is more likely that can delete
Data in user data, i.e. electronic device data storehouse, many electronic equipments are performing the process of the operations such as factory reset
In can prompt the user whether delete user data, it is to avoid user data loss.But, if the electronic equipment quilt used by user
Others takes away, and enters Recovery, deletes user data, then user can be made a big impact.
The content of the invention
The embodiment of the present disclosure provides a kind of method and device of protection terminal data.The technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of method of protection terminal data, it is applied to protect terminal
The device of data, the method include, in the case where (Recovery) pattern is recovered:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
Generally, after into reforestation practices, carry out the operations such as factory reset, system switching, system upgrade when
Wait, can all relate to whether the user data in retention data storehouse, therefore, when into reforestation practices, user's checking identity is pointed out,
Only when subscriber identity information is correct, i.e., user identity it is errorless in the case of can delete data in data base, it is to avoid other
People's malice deletes the data that user is stored in data base, and the impact of various inconvenience is caused to user.
In one embodiment, when the identity information mistake of user input, the data in deletion disabled data base.
In one embodiment, verify whether identity information is correct, including:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information
In at least one;
Verify whether identity information is correct according to key information.
Key information is not stored in data base, therefore, when user identity is verified, it is not necessary to access data base,
After being verified, data base is just had permission to access, the data in data base is protected, it is to avoid maliciously deleted by others.
In one embodiment, when key information includes finger print information, if the finger print information in key information and body
Finger print information in part information is identical, then judge that the identity information of user input is correct;
When key information includes character information, if the character information in key information is believed with the character in identity information
Manner of breathing is same, then judge that the identity information of user input is correct.
In one embodiment, the method also includes, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, the key information of user input is stored in into default storage location, including:
Add key identification in key information, and be stored in default storage location.
Key information can be obtained according to the address of key identification and default memory space.
In one embodiment, the method also includes, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to
Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with
Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of device of protection terminal data, including:Reminding module,
First receiver module, authentication module and data management module, under Recovery patterns:
Reminding module, for when the deletion action for the data in data base is detected, pointing out user input identity
Information;
First receiver module, for the identity information of receiving user's input;
Authentication module, for verifying whether identity information is correct;
Data management module, for, only when identity information is correct, deleting the data in data base.
In one embodiment, authentication module includes acquisition submodule and judging submodule;
Acquisition submodule, for obtaining key information, key information is not stored in data base, and key information includes fingerprint
At least one in information and character information;
Judging submodule, for verifying whether identity information is correct according to key information.
In one embodiment, the device of terminal data is protected also to include the second receiver module and memory module, normal
Under mode of operation:
Second receiver module, for the key information of receiving user's input;
Memory module, for the key information of user input is stored in default storage location.
In one embodiment, reminding module, when into reforestation practices, points out user's checking identity.
In one embodiment, the device of terminal data is protected also to include the 3rd receiver module, in the normal mode of operation:
3rd receiver module, for the Recovery mode datas protection instruction of receiving user's input, Recovery patterns
When data protection is instructed for indicating the deletion action for the data in data base is detected under Recovery patterns, point out
User input identity information is verifying that whether correct identity information and the number only when identity information is correct in deletion data base
According to.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of device of protection terminal data, including:
Processor;
For storing the memorizer of processor executable;
Wherein, processor is configured to, under Recovery patterns:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
In one embodiment, processor can be additionally configured to:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information
In at least one;
Verify whether identity information is correct according to key information.
In one embodiment, processor can be additionally configured to, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, processor can be additionally configured to, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to
Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with
Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in description and the part of this specification is constituted, show the enforcement for meeting the disclosure
Example, and be used for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart of the method for the protection terminal data according to an exemplary embodiment;
Fig. 2 is the flow chart of the method for the protection terminal data according to an exemplary embodiment;
Fig. 3 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 4 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 5 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 6 is the block diagram of the device of the protection terminal data according to an exemplary embodiment;
Fig. 7 is the block diagram of the device of the protection terminal data according to an exemplary embodiment.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by
The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
The technical scheme that the embodiment of the present disclosure is provided, is applied to protect the device of terminal data, the protection terminal data
Device can be smart mobile phone, panel computer etc..The device of protection terminal data is usually provided with Recovery patterns,
In Recovery patterns, the data in data base can be deleted, the data in data base can include various application (English:
Application, APP) in user data, user for protection terminal data device personal settings record etc., if
The device of the used protection terminal data of user is entered Recovery patterns by other people, and malice deletes the data in data base, meeting
User is made a big impact, is the data in protection customer data base, the protection terminal data that the embodiment of the present disclosure is provided
Method, before the data in data base is deleted, points out user's checking identity;Just whether the identity information of checking user input
Really;When the identity information of user input is correct, the data in data base are deleted.Only when the correct situation of subscriber identity information
The data in data base can be deleted down, other people is avoiding problems and is maliciously deleted the data that user is stored in data base, it is right
User causes the impact of various inconvenience.
Fig. 1 is a kind of flow chart of the method for the protection terminal data according to an exemplary embodiment, such as Fig. 1 institutes
Show, the method for the protection terminal data includes step 101-104, under Recovery patterns:
In a step 101, when the deletion action for the data in data base is detected, point out user input identity letter
Breath.
Data base's (English:Database it is) organizing, store and manage data, to set up in computer according to data structure
Warehouse in storage device.Data in data base can include the user data in various APP, and user is for protection number of terminals
According to device personal settings record etc..For example, user uses video jukebox software using the chat record of chat software, user
Video playback record, user for protection terminal data device desktop arrange etc..
In one embodiment, prompting prompting user input identity information, can pass through text prompt, it is also possible to by language
Sound point out, for example, when detect user select delete data base in data when, eject prompting frame, prompting frame include point out
The word of user input identity information;Or, when detect user select delete data base in data when, voice broadcast prompting
User input identity information.
Prompting user's checking identity can be just verified when into reforestation practices, it is also possible to after into reforestation practices, when
The operation of user is verified when can delete the data in data base.Generally, after into reforestation practices, dispatch from the factory recovery is carried out
When setting, system switching, system upgrade etc. are operated, the user data in retention data storehouse can be all related to whether, therefore, when
During into reforestation practices, user's checking identity is pointed out, other people malicious operations can be avoided to delete the data in data base.
Before data in data base is deleted, user needs to verify identity, only when subscriber identity information is correct, that is, uses
The data in data base can be deleted in the case that family identity is errorless, it is to avoid other people maliciously delete user and store in data base
Data, user is caused it is various inconvenience impacts.
In a step 102, the identity information of receiving user's input.
The identity information of receiving user's input can for example detect user to protecting by detecting that the operation of user is received
The pressing of physical button or detection user touch control operation on the touchscreen or detection on the device of shield terminal data is used
Family fingerprint of typing etc. on fingerprint capturer.
In step 103, verify whether identity information is correct;
In one embodiment, whether checking is correct with identity information, including:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information
In at least one;Verify whether identity information is correct according to key information.
During the identity information of user input can also include the character information of finger print information and user input of user input
At least one, it is and corresponding in key information.Identity information can only include the character information of user input, only carry out close
Code checking;Or identity information can only include the finger print information of user input, a fingerprint authentication;Or identity information can
To include that the finger print information of the character information and user input of user input, password authentification and fingerprint authentication will be carried out.
In one embodiment, when key information includes finger print information, if the finger print information in key information and body
Finger print information in part information is identical, then judge that the identity information of user input is correct;When key information includes character information,
If the character information in key information is identical with the character information in identity information, just the identity information of user input is being judged
Really.
Key information is not stored in data base, therefore, when user identity is verified, it is not necessary to access data base,
After being verified, data base is just had permission to access, the data in data base is protected, it is to avoid maliciously deleted by others.
At step 104, only when identity information is correct, the data in data base are deleted.
In one embodiment, when the identity information mistake of user input, the data in deletion disabled data base.
The method of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use
Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems
Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
The method of the protection terminal data provided based on the corresponding embodiments of above-mentioned Fig. 1, Fig. 2 is according to an exemplary enforcement
A kind of flow chart of the method for the protection terminal data for exemplifying, with reference to shown in Fig. 2, the protection terminal data that the present embodiment is provided
Method include step 201-207:
In step 201, the key information of receiving user's input.
In step 202., the key information of user input is stored in into default storage location.
In one embodiment, add key identification in key information, and be stored in default storage location.According to key
The address of mark and default memory space can obtain key information.
It should be noted that the key information is not stored in data base.
In step 203, the Recovery mode datas protection instruction of receiving user's input.
The protection instruction of Recovery mode datas is detected in data base under Recovery patterns for instruction
During the deletion action of data, point out user input identity information to verify identity information whether correctly and only when identity information is correct
When delete data base in the data.
In step 204, when into Recovery patterns, point out user input identity information.
In step 205, obtain key information, and according to key information verify user input identity information whether just
Really.
When the identity information of user input is correct, execution step 206, when the identity information mistake of user input, is held
Row step 207.
In step 206, when the identity information of user input is correct, the data in data base are deleted.
In step 207, when the identity information mistake of user input, the data in deletion disabled data base.
The method of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use
Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems
Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
It is following for disclosure device embodiment, can be used for performing method of disclosure embodiment.
Fig. 3 is a kind of block diagram of the device of the protection terminal data according to an exemplary embodiment, and the equipment can be with
By some or all of, protection end for being implemented in combination with the device for becoming protection terminal data of software, hardware or both
The device of end data is used for the method for performing the protection terminal data described in the corresponding embodiments of above-mentioned Fig. 1 and Fig. 2, such as schemes
Shown in 3, the device 30 of the protection terminal data includes:Reminding module 301, the first receiver module 302,303 sum of authentication module
According to management module 304, under Recovery patterns:;
Reminding module 301, for when the deletion action for the data in data base is detected, pointing out user input body
Part information;
First receiver module 302, for the identity information of receiving user's input;
Authentication module 303, for verifying whether identity information is correct;
Data management module 304, for, only when identity information is correct, deleting the data in data base.
In one embodiment, as shown in figure 4, authentication module 303 includes acquisition submodule 3031 and judging submodule
3032;
Acquisition submodule 3031, for obtaining key information, key information is not stored in data base, and key information includes
At least one in finger print information and character information;
Judging submodule 3032, for verifying whether identity information is correct according to key information.
In one embodiment, as shown in figure 5, the device 30 of protection terminal data also includes 305 He of the second receiver module
Memory module 306, in the normal mode of operation:;
Second receiver module 305, for the key information of receiving user's input;
Memory module 306, for the key information of user input is stored in default storage location.
In one embodiment, as shown in fig. 6, the device 30 of protection terminal data also includes the 3rd receiver module 307,
Under normal mode of operation:
3rd receiver module 307, for the Recovery mode datas protection instruction of receiving user's input, Recovery moulds
When formula data protection is instructed for indicating the deletion action for the data in data base is detected under Recovery patterns, carry
Show user input identity information to verify that identity information is whether correct and delete in data base only when identity information is correct this
Data.
The device of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use
Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems
Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
Fig. 7 is a kind of block diagram of the device of the protection terminal data according to an exemplary embodiment, the guarantor shown in Fig. 7
The device of shield terminal data can be a terminal unit, for example, smart mobile phone, panel computer etc..
The device 70 of protection terminal data can include following one or more parts:Processor 701, memorizer 702, electricity
Source component 703, multimedia groupware 704, audio-frequency assembly 705, the interface 706 of input/output (I/O), sensor cluster 707, with
And communication component 708.
The integrated operation of the generally device 70 of control protection terminal data of processor 701, such as with display, call,
Data communication, the associated operation of camera operation and record operation.Processor 701 can include one or more modules, be easy to
Interaction between processor 701 and other assemblies.For example, processing processor 701 can include multi-media module, to facilitate many matchmakers
Interaction between body component 704 and processor 701.
Memorizer 702 is configured to store behaviour of various types of data to support the device 70 in protection terminal data
Make.The example of these data includes the finger of any application program or method for operating on the device 70 of protection terminal data
Order, contact data, telephone book data, message, picture, video etc..Memorizer 702 can be by any kind of volatibility or non-
Volatile storage devices or combinations thereof realize that such as static RAM is (English:Static Random
Access Memory, SRAM), Electrically Erasable Read Only Memory (English:Electrically Erasable
Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory EPROM (English:Erasable
Programmable Read Only Memory, EPROM), programmable read only memory (English:Programmable Read
Only Memory, PROM), read only memory (English:Read Only Memory, ROM), magnetic memory, flash memory,
Disk or CD.
Power supply module 703 provides electric power for the various assemblies for protecting the device 70 of terminal data.Power supply module 703 can be wrapped
Include power-supply management system, one or more power supplys, and other with for protect terminal data device 70 generate, manage and distribute electricity
The associated component of power.
Multimedia groupware 704 is included in one output interface of offer between the device 70 of protection terminal data and user
Screen.In certain embodiments, screen can include liquid crystal display (English:Liquid Crystal Display, LCD) and
Touch panel (English:Touch Panel, TP).If screen includes touch panel, screen may be implemented as touch screen, with
Receive the input signal from user.Touch panel includes one or more touch sensors with sensing touch, slip and touches
Gesture on panel.Touch sensor can not only sensing touch or sliding action border, but also detect and touch or sliding
Dynamic operation related persistent period and pressure.In certain embodiments, multimedia groupware 704 include a front-facing camera and/
Or post-positioned pick-up head.When the device 70 of protection terminal data is in operator scheme, such as screening-mode or during video mode is preposition to take the photograph
As head and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and post-positioned pick-up head can be
One fixed optical lens system has focusing and optical zoom capabilities.
Audio-frequency assembly 705 is configured to output and/or input audio signal.For example, audio-frequency assembly 705 includes a Mike
Wind (English:Microphone, MIC), when the device 70 of protection terminal data is in operator scheme, such as call model, record mould
When formula and speech recognition mode, mike is configured to receive external audio signal.The audio signal for being received can be entered one
Step is stored in memorizer 702 or sends via communication component 708.In certain embodiments, audio-frequency assembly 705 is also raised including one
Sound device, for exports audio signal.
, for interface is provided between process assembly 701 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 706
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 707 includes one or more sensors, provides each for the device 70 to protect terminal data
The state estimation of aspect.For example, sensor cluster 707 can detect the device 70 of protection terminal data and beat opening/closing shape
State, the relative localization of component, such as described component be protect terminal data device 70 display and keypad, sensor group
Part 707 can also detect the position change of 70 1 components of device of the device 70 of protection terminal data or protection terminal data,
User with protection terminal data device 70 contact it is presence or absence of, protection terminal data 70 orientation of device or acceleration/
Slow down and protect the temperature change of the device 70 of terminal data.Sensor cluster 707 can include proximity transducer, be configured to use
Carry out the presence of the object near detection when not having any physical contact.Sensor cluster 707 can also include optical sensor, such as
Complementary metal oxide semiconductors (CMOS) (English:Complementary Metal Oxide Semiconductor, CMOS) or electric charge
Coupling element (English:Charge Coupled Device, CCD) imageing sensor, for used in imaging applications.One
In a little embodiments, the sensor cluster 707 can also include acceleration transducer, and gyro sensor, Magnetic Sensor, pressure are passed
Sensor or temperature sensor.
Communication component 708 is configured to facilitate wired or wireless side between the device 70 and other equipment of protection terminal data
The communication of formula.The device 70 of protection terminal data can access the wireless network based on communication standard, such as Wireless Fidelity (English:
Wireless-Fidelity, WiFi), 2G or 3G, or combinations thereof.In one exemplary embodiment, communication component 708
The broadcast singal or broadcast related information from external broadcasting management system is received via broadcast channel.In an exemplary enforcement
In example, communication component 708 also includes near-field communication (English:Near Field Communication, NFC) module, to promote
Junction service.For example, can be based on RF identification (English in NFC module:Radio Frequency Identification,
RFID) technology, Infrared Data Association's (English:Infrared Data Association, IrDA) technology, ultra broadband (English:
Ultra Wideband, UWB) technology, bluetooth (English:Bluetooth, BT) technology and other technologies to be realizing.
In the exemplary embodiment, the device 70 of protection terminal data can be by one or more application specific integrated circuits
(English:Application Specific Integrated Circuit, ASIC), digital signal processor (English:
Digital Signal Processing, DSP), digital signal processing appts (English:Digital Signal
Processing Device, DSPD), PLD (English:Programmable Logic Device, PLD), it is existing
Field programmable gate array (English:Field Programmable Gate Array, FPGA), controller, microcontroller, Wei Chu
Reason device or other electronic components are realized, for performing the protection terminal data described in the corresponding embodiments of above-mentioned Fig. 1 and Fig. 2
Method.
In one embodiment, processor 701 is configured to, under Recovery patterns:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
In one embodiment, processor 701 can be additionally configured to:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information
In at least one;
Verify whether identity information is correct according to key information.
In one embodiment, processor 701 can be additionally configured to, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, processor 701 can be additionally configured to, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to
Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with
Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
Such as include the memorizer 702 of instruction, above-mentioned instruction can be performed on to complete by the processor 701 of the device 70 of protection terminal data
State method.For example, non-transitorycomputer readable storage medium can be ROM, random access memory (English:Random
Access Memory, RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..Instruction in the storage medium
When being performed by the processor 701 of the device 70 of protection terminal data so that the device 70 of protection terminal data is able to carry out above-mentioned
The method of the protection terminal data described in the corresponding embodiments of Fig. 1 and Fig. 2, the method includes, under Recovery patterns:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Whether checking identity information is correct;
Only when identity information is correct, the data in data base are deleted.
In one embodiment, verify whether identity information is correct, including:
Key information is obtained, key information is not stored in data base, and key information includes finger print information and character information
In at least one;
Verify whether identity information is correct according to key information.
In one embodiment, the method also includes, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
In one embodiment, the method also includes, in the normal mode of operation:
The Recovery mode datas protection instruction of receiving user's input, the protection instruction of Recovery mode datas are used to refer to
Show when the deletion action for the data in data base is detected under Recovery patterns, point out user input identity information with
Whether checking identity information is correct and the data in data base are deleted only when identity information is correct.
The device of the protection terminal data that the embodiment of the present disclosure is provided, before the data in data base is deleted, needs to use
Identity is verified at family, only when the identity information of user input is correct, can just be deleted the data in data base, be avoiding problems
Other people maliciously delete the data that user is stored in data base, and the impact of various inconvenience is caused to user.
Those skilled in the art will readily occur to its of the disclosure after considering description and putting into practice disclosure disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is limited only by appended claim.
Claims (9)
1. it is a kind of protection terminal data method, it is characterised in that methods described includes, under Recovery reforestation practices:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Verify whether the identity information is correct;
Only when the identity information is correct, the data in the data base are deleted.
2. method according to claim 1, it is characterised in that whether the checking identity information is correct, including:
Obtain key information, the key information is not stored in the data base, the key information include finger print information and
At least one in character information;
Verify whether the identity information is correct according to the key information.
3. method according to claim 2, it is characterised in that methods described also includes, in the normal mode of operation:
The key information of receiving user's input;
The key information of user input is stored in into default storage location.
4. the method according to any one of claim 1-3, it is characterised in that methods described also includes, in normal work mould
Under formula:
The Recovery mode datas protection instruction of receiving user's input, the Recovery mode datas protection instruction are used to refer to
Show when the deletion action for the data in the data base is detected under Recovery patterns, point out body described in user input
Part information with verify whether the identity information correct and only delete when the identity information is correct in the data base should
Data.
5. it is a kind of protection terminal data device, it is characterised in that include:Reminding module, the first receiver module, authentication module and
Data management module, under Recovery reforestation practices:
The reminding module, for when the deletion action for the data in data base is detected, pointing out user input identity
Information;
First receiver module, for the identity information of receiving user's input;
The authentication module, for verifying whether the identity information is correct;
The data management module, for, only when the identity information is correct, deleting the data in the data base.
6. equipment according to claim 5, it is characterised in that the authentication module includes acquisition submodule and judges submodule
Block;
The acquisition submodule, for obtaining key information, the key information is not stored in the data base, the key
Information includes at least one in finger print information and character information;
The judging submodule, for verifying whether the identity information is correct according to the key information.
7. equipment according to claim 6, it is characterised in that the device of the protection terminal data is also received including second
Module and memory module, in the normal mode of operation:
Second receiver module, for the key information of receiving user's input;
The memory module, for the key information of user input is stored in default storage location.
8. the equipment according to any one of claim 5-7, it is characterised in that the device of the protection terminal data also includes
3rd receiver module, in the normal mode of operation:
3rd receiver module, for the Recovery mode datas protection instruction of receiving user's input, the Recovery
Mode data protection instruction detects the deletion behaviour for the data in the data base under Recovery patterns for instruction
When making, point out identity information described in user input whether to verify the identity information correctly and only when the identity information is correct
When delete the data in the data base.
9. it is a kind of protection terminal data device, it is characterised in that include:
Processor;
For storing the memorizer of processor executable;
Wherein, the processor is configured to, under Recovery reforestation practices:
When the deletion action for the data in data base is detected, user input identity information is pointed out;
The identity information of receiving user's input;
Verify whether the identity information is correct;
Only when the identity information is correct, the data in the data base are deleted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610922178.0A CN106548089A (en) | 2016-10-21 | 2016-10-21 | The method and device of protection terminal data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610922178.0A CN106548089A (en) | 2016-10-21 | 2016-10-21 | The method and device of protection terminal data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106548089A true CN106548089A (en) | 2017-03-29 |
Family
ID=58392241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610922178.0A Pending CN106548089A (en) | 2016-10-21 | 2016-10-21 | The method and device of protection terminal data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106548089A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508522A (en) * | 2018-11-16 | 2019-03-22 | Oppo广东移动通信有限公司 | A kind of data clearing method, device, storage medium and terminal |
CN114422150A (en) * | 2022-03-29 | 2022-04-29 | 飞狐信息技术(天津)有限公司 | Method for preventing passive deletion, client and server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6502133B1 (en) * | 1999-03-25 | 2002-12-31 | Lucent Technologies Inc. | Real-time event processing system with analysis engine using recovery information |
CN104199688A (en) * | 2014-08-15 | 2014-12-10 | 深圳市中兴移动通信有限公司 | Mobile terminal and system reinstallation control method and device thereof |
CN106021027A (en) * | 2016-05-24 | 2016-10-12 | 广东欧珀移动通信有限公司 | Terminal data processing method and system |
-
2016
- 2016-10-21 CN CN201610922178.0A patent/CN106548089A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6502133B1 (en) * | 1999-03-25 | 2002-12-31 | Lucent Technologies Inc. | Real-time event processing system with analysis engine using recovery information |
CN104199688A (en) * | 2014-08-15 | 2014-12-10 | 深圳市中兴移动通信有限公司 | Mobile terminal and system reinstallation control method and device thereof |
CN106021027A (en) * | 2016-05-24 | 2016-10-12 | 广东欧珀移动通信有限公司 | Terminal data processing method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508522A (en) * | 2018-11-16 | 2019-03-22 | Oppo广东移动通信有限公司 | A kind of data clearing method, device, storage medium and terminal |
WO2020098412A1 (en) * | 2018-11-16 | 2020-05-22 | Oppo广东移动通信有限公司 | Data cleaning method and apparatus, and storage medium and terminal |
CN114422150A (en) * | 2022-03-29 | 2022-04-29 | 飞狐信息技术(天津)有限公司 | Method for preventing passive deletion, client and server |
CN114422150B (en) * | 2022-03-29 | 2022-07-12 | 飞狐信息技术(天津)有限公司 | Method for preventing passive deletion, client and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104765552B (en) | Right management method and device | |
CN102467462B (en) | Method for protecting data stored in device and corresponding device | |
CN106709399A (en) | Fingerprint identification method and device | |
CN105407098A (en) | Identity verification method and device | |
CN104503689A (en) | Method and device for displaying application interface | |
CN105654302A (en) | Payment method and device | |
CN105513179A (en) | Unlocking method and device, as well as intelligent lock | |
CN104850827A (en) | Fingerprint identification method and apparatus | |
CN104571709B (en) | The processing method of mobile terminal and virtual key | |
CN104573550A (en) | Method and device for protecting data | |
CN104216742A (en) | Upgrade control method and device based on password | |
CN108319836A (en) | The method and apparatus for executing processing based on fingerprint recognition | |
CN104376248A (en) | Method and device for carrying out user authentication on password input interface | |
CN105677214A (en) | Application management method and apparatus | |
CN108319832A (en) | Unlocking method and device | |
CN104331228A (en) | Screen locking method and device | |
CN108537096A (en) | Reminding method, device and the electronic equipment of fingerprint collecting position | |
CN105335062A (en) | Information editing operation processing method and apparatus | |
CN106650569B (en) | Fingerprint input method and device | |
CN106845199A (en) | Object authentication method and device | |
CN107197107A (en) | Enabled instruction processing method and processing device | |
CN105069344B (en) | mobile terminal locking method and device | |
CN105975283A (en) | Starting method and device for operating system | |
EP3264308B1 (en) | Method and device for fingerprint verification | |
CN106548089A (en) | The method and device of protection terminal data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170329 |