CN106776908B - Data cleaning method and device and terminal - Google Patents

Data cleaning method and device and terminal Download PDF

Info

Publication number
CN106776908B
CN106776908B CN201611083858.4A CN201611083858A CN106776908B CN 106776908 B CN106776908 B CN 106776908B CN 201611083858 A CN201611083858 A CN 201611083858A CN 106776908 B CN106776908 B CN 106776908B
Authority
CN
China
Prior art keywords
data
storage space
target data
writing
deleted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611083858.4A
Other languages
Chinese (zh)
Other versions
CN106776908A (en
Inventor
刘黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611083858.4A priority Critical patent/CN106776908B/en
Publication of CN106776908A publication Critical patent/CN106776908A/en
Application granted granted Critical
Publication of CN106776908B publication Critical patent/CN106776908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1737Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Abstract

The invention discloses a data cleaning method, a data cleaning device and a terminal. The data cleaning method comprises the following steps: according to the invention, the target data in the storage space is deleted, when the system is restarted, the deep cleaning mode is entered by identifying the data security identifier, and repeated data writing and cleaning operations are carried out on the storage space of the deleted target data, so that the deep cleaning of the target data is realized, the deleted data is prevented from being restored by recovery software, and the privacy data of a user is protected.

Description

Data cleaning method and device and terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data cleaning method, apparatus, and terminal.
Background
With the rapid development of mobile terminal technology, the frequency of replacing the mobile terminal by the user is faster and faster. When the user changes the new mobile terminal, the old mobile terminal also stores user privacy data related to the life work information of the user, such as privacy data of photos, important files, contacts and the like. When a user adds an old mobile terminal to another person or sells the old mobile terminal, the privacy data needs to be cleaned in order to not reveal the privacy of the person, but the current privacy data can be restored through recovery software after being subjected to common deletion or formatting, so that the hidden danger that the privacy data is easily stolen by other persons exists. Therefore, further improvement is required.
Disclosure of Invention
The invention provides a data cleaning method, a data cleaning device and a terminal, which can improve the security of private data.
The embodiment of the invention provides a data cleaning method, which comprises the following steps:
deleting the target data in the storage space;
when the system is restarted, entering a deep cleaning mode by identifying a data security identifier;
and repeatedly writing and clearing data in the storage space of the deleted target data to realize deep clearing of the target data.
An embodiment of the present invention further provides a data cleaning apparatus, where the apparatus includes:
the data deleting module is used for deleting the target data in the storage space;
the identification module is used for entering a deep cleaning mode by identifying a data security identifier when the system is restarted;
and the deep cleaning module is used for repeatedly writing and cleaning the data in the storage space of the deleted target data so as to realize the deep cleaning of the target data.
An embodiment of the present invention further provides a terminal, including: the processor is coupled with the memory, and calls the executable program code stored in the memory to execute the data cleaning method of any embodiment of the invention.
According to the invention, the target data in the storage space is deleted, when the system is restarted, the deep cleaning mode is entered by identifying the data security identifier, and repeated data writing and cleaning operations are carried out on the storage space of the deleted target data, so that the deep cleaning of the target data is realized, the deleted data is prevented from being restored by recovery software, and the privacy data of a user is protected.
Drawings
The technical solution and other advantages of the present invention will become apparent from the following detailed description of specific embodiments of the present invention, which is to be read in connection with the accompanying drawings.
Fig. 1 is a schematic flow chart of a data cleaning method according to an embodiment of the present invention.
Fig. 2 is a usage state diagram of a data cleansing method according to an embodiment of the present invention.
Fig. 3 is another schematic flow chart of a data cleaning method according to an embodiment of the present invention.
Fig. 4 is a schematic flowchart of a data cleaning method according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a data cleansing apparatus according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first", "second", and "third", etc. in the present invention are used for distinguishing different objects, not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The execution main body of the data cleaning method provided by the embodiment of the present invention may be a data cleaning device provided by the embodiment of the present invention, or a mobile terminal (such as a desktop computer, a notebook computer, a palm computer, a tablet computer, a smart phone, a mobile hard disk, etc.) integrated with the data cleaning device, where the data cleaning device may be implemented in a hardware or software manner.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a data cleaning method according to an embodiment of the present invention. The method comprises the following steps:
step S101, deleting the target data in the storage space.
It is understood that the mobile terminal has a storage space for storing terminal data, and the storage space may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a Secure Digital Card (SD Card), or the like. The terminal data stored in the storage space comprises system data and non-system data. The system data is a system file generated when the mobile terminal installs the system and is used for maintaining the normal operation of the mobile terminal; the non-system data comprises privacy data such as photos, videos, important files, contacts and user information of a login client, which are generated in the process of using the mobile terminal by a user.
And when the user needs to restore factory settings or inputs an operation instruction for deleting the target data, deleting the non-system data serving as the target data in the storage space. Such as deleting photos and videos in the storage space.
Taking a hard disk as an example, when some target data is saved in the hard disk, firstly, the data information of the target data is saved in a directory storage area in the hard disk, wherein the data information may include a data name, a data size, a creation date, a modification date and the like, and meanwhile, an idle storage position is selected in the data storage area of the hard disk to save the target data, and then the storage position is saved in the directory storage area. When an operation instruction for deleting the target data is received, deleting the data information in the directory storage area, wherein the target data cannot be found in an operating system at the moment, but the target data in the corresponding storage position in the data storage area still exists, and only the storage position for storing the deleted target data is marked as writable new data.
And step S102, when the system is restarted, entering a deep cleaning mode by identifying the data security identifier.
It is understood that a data security flag may be further set in the system for the data generated by the delete operation, and the data security flag is used to trigger the deep cleaning mode. When the system is restarted, starting a service of a background of the mobile terminal, pushing a selection interface containing the data security identification to a system restart interface by the service for selection by a user, and when the mobile terminal identifies that the user selects the data security identification, entering a deep cleaning mode by the system; and when the mobile terminal identifies that the user does not select the data security identifier, the system enters a normal restart stage.
Referring to fig. 2, fig. 2 is a usage state diagram of a data cleaning method according to an embodiment of the present invention. When the system is restarted, starting a service of a background of the mobile terminal, displaying a 'ignore' selection button and a 'deep cleaning' selection button as a data security identifier in a restart interface by the mobile terminal, and when the mobile terminal identifies that a user selects the data security identifier 'deep cleaning', entering a deep cleaning mode by the system; when the mobile terminal recognizes that the user selects ignore or does not select the data security label deep clean and the countdown in the ignore selection button changes from 10 seconds to 0 seconds, the system enters a normal restart phase.
And step S103, repeatedly writing and clearing data in the storage space of the deleted target data to realize deep clearing of the target data.
Taking a hard disk as an example, repeatedly writing and clearing data to the storage position of the target data in the data storage area of the deleted target data to cover the storage trace of the target data at the storage position, so as to realize deep clearing of the target data and prevent others from recovering the deleted target data.
For example, the storage amount of the storage space in which the target data has been deleted is 30M (megabyte), for example, 30M of data a is written into the storage space, after the data a is completely written into the storage space, the data a is completely removed from the storage space, then the data a is written into the storage space, and after the data a is completely written into the storage space, the data a is removed, and the data a is written into the storage space and then removed, so as to cover a storage trace of the target data in the storage space, thereby implementing deep cleaning of the target data.
In the embodiment, target data in a storage space is deleted, when a system is restarted, a deep cleaning mode is entered by identifying a data security identifier, and repeated operations of writing and cleaning data are performed on the storage space in which the target data is deleted, so that the deep cleaning of the target data is realized. The data security identification selected by one key of the user is identified to enter a deep cleaning mode, so that the privacy data of the user is automatically protected, the deleted data is prevented from being restored by others, and the security of data protection is improved.
In some embodiments, the step S103 may also be implemented by steps S1031 to S1033, specifically:
and step S1031, writing random data into the storage space of the deleted target data.
It is understood that writing random data into the memory space of deleted target data overwrites or fills the target data originally stored in the memory space. Random data is used for writing in order to make written traces irregularly searchable, increasing the complexity of data recovery that may exist.
Step S1032, when the random data storage amount written in the storage space reaches a preset storage threshold, perform a data clearing operation.
It is understood that the preset storage threshold may be set to a maximum storage value of the storage space. And when the random data storage amount written in the storage space reaches the storage maximum value of the storage space, performing data clearing operation.
Step S1033, when the number of times of the repeated operations of writing and erasing the random data reaches a preset number, erasing the storage space to achieve deep cleaning of the target data.
For example, the preset number is not less than 10. For example, the preset number is 10, and when the number of the repeated operations of writing and erasing of the random data reaches 10, the data fragments which may remain after the last data erasing in the storage space are cleared, so as to achieve deep cleaning of the target data.
In the embodiment, target data in a storage space is deleted, when a system is restarted, a deep cleaning mode is entered through identifying a data security identifier, the storage space in which the target data is deleted is repeatedly written and cleaned with random data, and when the number of times of repeated operation reaches a preset number, the storage space is cleaned, so that the deep cleaning of the target data is realized, recovery of the deleted data by recovery software is prevented, and privacy data of a user is protected.
Referring to fig. 3, fig. 3 is another schematic flow chart of a data cleaning method according to an embodiment of the present invention. The method comprises the following steps:
in step S201, the target data in the storage space is deleted.
And when the user needs to restore factory settings or inputs an operation instruction for deleting the target data, deleting the target data in the storage space. Such as deleting photos and videos in the storage space.
Taking a hard disk as an example, when some target data is saved in the hard disk, firstly, the data information of the target data is saved in a directory storage area in the hard disk, wherein the data information may include a data name, a data size, a creation date, a modification date and the like, and meanwhile, an idle storage position is selected in the data storage area of the hard disk to save the target data, and then the storage position is saved in the directory storage area. When an operation instruction for deleting the target data is received, deleting the data information in the directory storage area, wherein the target data cannot be found in an operating system at the moment, but the target data in the corresponding storage position in the data storage area still exists, and only the storage position for storing the deleted target data is marked as writable new data.
And step S202, when the system is restarted, entering a deep cleaning mode by identifying the data security identifier.
It is understood that a data security flag may be further set in the system for the data generated by the delete operation, and the data security flag is used to trigger the deep cleaning mode. When the system is restarted, starting a service of a background of the mobile terminal, pushing a selection interface containing the data security identification to a system restart interface by the service for selection by a user, and when the mobile terminal identifies that the user selects the data security identification, entering a deep cleaning mode by the system; and when the mobile terminal identifies that the user does not select the data security identifier, the system enters a normal restart stage.
Step S203, repeatedly writing and clearing data into the storage space of the deleted target data to implement deep clearing of the target data.
Taking a hard disk as an example, repeatedly writing and clearing data to the storage position of the target data in the data storage area of the deleted target data to cover the storage trace of the target data at the storage position, so as to realize deep clearing of the target data and prevent others from recovering the deleted target data.
In some embodiments, the step S203 may be further implemented by steps S2031 to S2034, including:
step S2031, a folder is established in the storage space of the deleted target data.
It is to be understood that a folder is created in the storage space of the deleted target data for managing new data.
Step S2032, performing a random data writing operation in the folder.
It is understood that writing random data into the folder created in the storage space from which the target data has been deleted overwrites or fills the target data originally stored in the storage space.
And step S2033, when the random data storage amount written in the storage space reaches a preset storage threshold, performing data clearing operation.
It is understood that the preset storage threshold may be set to a maximum storage value of the storage space. And the storage size occupied by the general empty folder is 0 byte, and when the random data storage amount written in the folder in the storage space reaches the storage maximum value of the storage space, data clearing operation is carried out.
Step S2034, when the number of times of the repeated operations of writing and erasing the random data reaches a preset number, deleting the folder in the storage space to achieve deep cleaning of the target data.
For example, the preset number is not less than 10. For example, the preset number of times is 10, and when the number of times of the repeated operations of writing and erasing of the random data reaches 10 times, deleting the folder in the storage space, that is, emptying data fragments possibly remaining after the last data erasing in the folder, so as to achieve deep cleaning of the target data.
In the embodiment, target data in a storage space is deleted, when a system is restarted, a deep cleaning mode is entered through identifying a data security identifier, repeated operations of writing and cleaning random data are performed on a folder established in the storage space where the target data are deleted, and when the number of times of the repeated operations reaches a preset number, the folder is deleted to achieve deep cleaning of the target data, so that recovery software is prevented from restoring the deleted data, and privacy data of a user are protected.
Referring to fig. 4, fig. 4 is a schematic flow chart of a data cleaning method according to an embodiment of the present invention. The method comprises the following steps:
step S301, performing type division on the target data, wherein the types comprise a common type and a privacy type.
It is to be understood that, when the target data is established or before the target data is deleted, the target data is subjected to type division, where the types include a normal type and a privacy type.
For example, when a user manages an album of a mobile terminal, the wallpaper photo and the scene photo are set as a common type, and the people photo and the video related to the user are set as a privacy type.
Step S302, deleting the target data in the storage space.
For example, when the user needs to restore factory settings or input an operation instruction to delete target data, the target data in the storage space is deleted. Such as deleting photos and videos in the storage space.
And step S303, when the deleted target data is of a privacy type and the system is restarted, entering a deep cleaning mode by automatically acquiring a data security identifier.
For example, when the deleted video is of a privacy type and the system is restarted, starting a service in the background of the mobile terminal, and automatically acquiring the data security identifier to enter a deep cleaning mode.
Step S304, repeatedly writing and clearing data into and from the storage space of the deleted target data, so as to implement deep clearing of the target data.
For example, the operations of writing and clearing data are repeatedly performed on the storage position of the video in the data storage space of the deleted video, so as to cover the storage trace of the video at the storage position, so that the deep clearing of the target data is realized, and the deleted target data is prevented from being restored by others.
In this embodiment, the target data is divided into a common type and a privacy type, the target data in the storage space is deleted, when the deleted target data is the privacy type and the system is restarted, the deep cleaning mode is entered by automatically acquiring the data security identifier, and the repeated operations of writing and cleaning the data are performed on the storage space in which the target data has been deleted, so as to realize the deep cleaning of the target data. The data security identification is automatically acquired when the type of the target data is distinguished to be the privacy type, and the deep cleaning mode is entered, so that the data cleaning is more intelligent, the recovery software is prevented from restoring the deleted data, and the privacy data of the user is protected.
An embodiment of the present invention further provides a data cleaning device, as shown in fig. 5, and fig. 5 is a schematic structural diagram of the data cleaning device provided in the embodiment of the present invention. The data cleaning device 40 includes a type dividing module 41, a data deleting module 42, an identifying module 43, and a deep cleaning module 44.
The data deleting module 42 is configured to delete the target data in the storage space.
It is understood that the mobile terminal has a storage space for storing terminal data, and the storage space may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a Secure Digital Card (SD Card), or the like. The terminal data stored in the storage space comprises system data and non-system data. The system data is a system file generated when the mobile terminal installs the system and is used for maintaining the normal operation of the mobile terminal; the non-system data comprises privacy data such as photos, videos, important files, contacts and user information of a login client, which are generated in the process of using the mobile terminal by a user.
When the user needs to restore the factory settings or input an operation instruction for deleting the target data, the data deleting module 42 deletes the non-system data in the storage space as the target data. Such as the data deletion module 42, deletes photos and videos in the storage space.
Taking a hard disk as an example, when some target data is saved in the hard disk, firstly, the data information of the target data is saved in a directory storage area in the hard disk, wherein the data information may include a data name, a data size, a creation date, a modification date and the like, and meanwhile, an idle storage position is selected in the data storage area of the hard disk to save the target data, and then the storage position is saved in the directory storage area. When the data deleting module 42 deletes the target data, the data information in the directory storage area is deleted, at this time, the target data cannot be found in the operating system, but the target data in the corresponding storage location in the data storage area still exists, and only the storage location for storing the deleted target data is marked as writable new data.
The identification module 43 is configured to enter a deep cleaning mode by identifying a data security identifier when the system is restarted.
It is understood that a data security flag may be further set in the system for the data generated by the delete operation, and the data security flag is used to trigger the deep cleaning mode. When the system is restarted, the recognition module 43 starts a service of the background of the mobile terminal, and pushes a selection interface containing the data security identifier to the system restart interface for selection by a user, and when the recognition module 43 recognizes that the user selects the data security identifier, the system enters a deep cleaning mode; when the recognition module 43 recognizes that the user does not select the data security identifier, the system enters a normal restart phase.
The deep cleaning module 44 is configured to perform repeated operations of writing and cleaning data to the storage space of the deleted target data, so as to implement deep cleaning of the target data.
Taking a hard disk as an example, the deep cleaning module 44 repeats the operations of writing and cleaning data to and from the storage location of the target data in the data storage area of the deleted target data to cover the storage trace of the target data at the storage location, so as to implement deep cleaning of the target data and prevent others from recovering the deleted target data.
In some embodiments, the deep cleaning module 44 further includes a writing unit 442, a cleaning unit 443, and a deep cleaning unit 444.
The writing unit 442 is configured to perform a random data writing operation on the storage space of the deleted target data.
It is understood that the writing unit 442 writes random data into the storage space of the deleted target data, and overwrites or fills the target data originally stored in the storage space. Random data is used for writing in order to make written traces irregularly searchable, increasing the complexity of data recovery that may exist.
The clearing unit 443 is configured to perform a data clearing operation when the random data storage amount written in the storage space reaches a preset storage threshold.
It is understood that the preset storage threshold may be set to a maximum storage value of the storage space. When the random data storage amount written in the storage space reaches the storage maximum value of the storage space, the clearing unit 443 performs a data clearing operation.
The deep cleaning unit 444 is configured to empty the storage space when the number of times of the repeated operations of writing and cleaning of the random data reaches a preset number, so as to achieve deep cleaning of the target data.
For example, the preset number is not less than 10. For example, the preset number is 10, and when the number of the repeated operations of writing and erasing of the random data reaches 10, the deep cleaning unit 444 cleans up data fragments that may remain in the storage space after the last data erasing, so as to achieve deep cleaning of the target data.
In some embodiments, the deep cleaning module 44 further includes a creating unit 441.
The creating unit 441 is configured to create a folder in the storage space of the deleted target data.
It is to be understood that the creating unit 441 creates a folder in the storage space of the deleted target data for managing new data.
The writing unit 442 is further configured to perform a random data writing operation in the folder.
It is to be understood that the writing unit 442 writes random data into a folder created in the storage space of the deleted target data, and overwrites or fills the target data originally stored in the storage space.
The deep cleaning unit 444 is further configured to delete the folder in the storage space when the number of times of the repeated operations of writing and cleaning of the random data reaches a preset number of times, so as to achieve deep cleaning of the target data.
For example, the preset number is not less than 10. For example, the preset number of times is 10, and when the number of times of the repeated operations of writing and erasing of the random data reaches 10 times, the deep cleaning unit 444 deletes the folder in the storage space, that is, may empty the data fragment that may remain after the last data erasing in the folder, so as to implement deep cleaning of the target data.
In some embodiments, the type dividing module 41 is configured to perform type division on the target data, where the types include a normal type and a privacy type.
It is understood that, when the target data is established or before the target data is deleted, the type division module 41 performs type division on the target data, where the types include a normal type and a privacy type.
In some embodiments, the identifying module 43 is further configured to enter a deep cleaning mode by automatically obtaining a data security identifier when the deleted target data is of a privacy type and the system is restarted.
For example, when the deleted video is of a privacy type and the system is restarted, the recognition module 43 starts a service in the background of the mobile terminal, and automatically acquires the data security identifier to enter a deep cleaning mode.
An embodiment of the present invention further provides a terminal, as shown in fig. 6, and fig. 6 is a schematic structural diagram of the terminal provided in the embodiment of the present invention. The terminal 500 may include Radio Frequency (RF) circuitry 501, memory 502 including one or more computer-readable storage media, input unit 503, display unit 504, sensor 505, audio circuitry 506, Wireless Fidelity (WiFi) module 507, processor 508 including one or more processing cores, and power supply 509. Those skilled in the art will appreciate that the terminal structure shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The rf circuit 501 may be used for transmitting and receiving information, or receiving and transmitting signals during a call.
The memory 502 may be used to store applications and data. The memory 502 stores applications containing executable program code.
The input unit 503 may be used to receive input numbers, character information, or user characteristic information (such as a fingerprint), and generate a keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control.
The display unit 504 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal, which may be made up of graphics, text, icons, video, and any combination thereof.
The terminal may also include at least one sensor 505, such as light sensors, motion sensors, and other sensors.
The audio circuit 506 may provide an audio interface between the user and the terminal through a speaker, microphone.
Wireless fidelity (WiFi) module 507 may be used for short-range wireless transmission, may assist users in sending and receiving e-mail, browsing web pages, accessing streaming media, etc., and provides wireless broadband internet access for users.
The processor 508 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal and processes data by running or executing an application program stored in the memory 502 and calling data stored in the memory 502, thereby performing overall monitoring of the terminal.
The terminal also includes a power supply 509 (such as a battery) for powering the various components.
Although not shown in fig. 6, the terminal may further include a camera, a bluetooth module, and the like, which are not described in detail herein.
In this embodiment, the processor 508 in the terminal loads the executable program code corresponding to the process of one or more application programs into the memory 502 according to the following instructions, and the processor 508 runs the application programs stored in the memory 502, and performs the following operations:
deleting the target data in the storage space;
when the system is restarted, entering a deep cleaning mode by identifying a data security identifier;
and repeatedly writing and clearing data in the storage space of the deleted target data to realize deep clearing of the target data.
In some embodiments, the processor 508 is configured to perform an iterative operation of writing and cleaning data to the storage space of the deleted target data to implement deep cleaning of the target data, including:
performing random data writing operation on the storage space of the deleted target data;
when the random data storage amount written in the storage space reaches a preset storage threshold value, performing data clearing operation;
and when the repeated operation times of writing and clearing of the random data reach preset times, clearing the storage space to realize deep clearing of the target data.
In some embodiments, the processor 508 is configured to, before the writing of the random data to the storage space of the deleted target data, further include:
establishing a folder in the storage space of the deleted target data;
the random data writing operation on the storage space of the deleted target data comprises the following steps: writing random data in the folder;
when the repeated operation times of writing and clearing of the random data reach preset times, clearing the storage space to realize deep clearing of the target data, and the method comprises the following steps: and when the repeated operation times of writing and clearing of the random data reach preset times, deleting the folder in the storage space so as to realize deep clearing of the target data.
In some embodiments, the processor 508 is configured to, before the deleting the target data in the storage space, further include:
and performing type division on the target data, wherein the types comprise a common type and a privacy type.
In some embodiments, the processor 508 is configured to enter the deep cleaning mode by selecting the data security identifier when the system is restarted, and includes:
and when the deleted target data is of a privacy type and the system is restarted, entering a deep cleaning mode by automatically acquiring a data security identifier.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiment of the present invention, the data cleaning apparatus and the data cleaning method in the above embodiment belong to the same concept, and any method provided in the data cleaning method embodiment may be run on the data cleaning apparatus, and a specific implementation process thereof is described in the data cleaning method embodiment, and is not described herein again.
It should be noted that, for the data cleaning method of the present invention, it can be understood by a person skilled in the art that all or part of the process of implementing the data cleaning method of the embodiment of the present invention can be completed by controlling the relevant hardware through a computer program, where the computer program can be stored in a computer readable storage medium, such as a memory of the terminal, and executed by at least one processor in the terminal, and the process of executing the process may include the process of the embodiment of the data cleaning method. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
For the data cleaning device according to the embodiment of the present invention, each functional module may be integrated into one processing chip, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, or the like.
The data cleaning method, the data cleaning device and the terminal provided by the embodiment of the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the technical scheme and the core idea of the invention; those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. A method of data scrubbing, the method comprising:
deleting the target data in the storage space;
when the system is restarted, pushing a selection interface containing a data security identifier corresponding to the target data to the system restart interface for selection by a user, and when the data security identifier selected by the user is identified, entering a deep cleaning mode;
performing random data writing operation on the storage space of the deleted target data;
when the random data storage amount written in the storage space reaches a preset storage threshold value, performing data clearing operation, wherein the preset storage threshold value is the maximum storage value of the storage space;
and when the repeated operation times of writing and clearing of the random data reach preset times, clearing the storage space to realize deep clearing of the target data.
2. The data scrubbing method according to claim 1, wherein before said writing random data into said storage space of deleted target data, further comprising:
establishing a folder in the storage space of the deleted target data;
the random data writing operation on the storage space of the deleted target data comprises the following steps: writing random data in the folder;
when the repeated operation times of writing and clearing of the random data reach preset times, clearing the storage space to realize deep clearing of the target data, and the method comprises the following steps: and when the repeated operation times of writing and clearing of the random data reach preset times, deleting the folder in the storage space so as to realize deep clearing of the target data.
3. The data cleaning method according to claim 1, further comprising, before the deleting the target data in the storage space:
and performing type division on the target data, wherein the types comprise a common type and a privacy type.
4. The data cleaning method of claim 3, wherein when the system is restarted, the deep cleaning mode is entered by selecting the data security identifier, and the method comprises the following steps:
and when the deleted target data is of a privacy type and the system is restarted, entering a deep cleaning mode by automatically acquiring a data security identifier.
5. A data cleansing apparatus, characterized in that the apparatus comprises:
the data deleting module is used for deleting the target data in the storage space;
the identification module is used for pushing a selection interface containing a data security identifier corresponding to the target data to a system restart interface for a user to select when the system is restarted, and entering a deep cleaning mode when the user selects the data security identifier;
the writing unit is used for writing random data into the storage space of the deleted target data;
the clearing unit is used for carrying out data clearing operation when the random data storage amount written in the storage space reaches a preset storage threshold value, wherein the preset storage threshold value is the maximum storage value of the storage space;
and the deep cleaning unit is used for emptying the storage space when the repeated operation times of writing and cleaning of the random data reach preset times so as to realize deep cleaning of the target data.
6. The data cleansing apparatus according to claim 5, wherein the deep cleansing module further comprises:
an establishing unit configured to establish a folder in the storage space from which the target data has been deleted;
the writing unit is used for writing random data in the folder;
and the deep cleaning unit is used for deleting the folder in the storage space when the repeated operation times of writing and cleaning of the random data reach preset times so as to realize deep cleaning of the target data.
7. The data cleansing apparatus of claim 5, further comprising:
and the type division module is used for carrying out type division on the target data, wherein the types comprise a common type and a privacy type.
8. The data cleaning device of claim 7, wherein the identification module is further configured to enter a deep cleaning mode by automatically obtaining a data security identifier when the deleted target data is of a privacy type and the system is restarted.
9. A terminal, comprising: a memory and a processor coupled to the memory, wherein the processor invokes executable program code stored in the memory to perform the data cleansing method of any of claims 1 to 4.
CN201611083858.4A 2016-11-30 2016-11-30 Data cleaning method and device and terminal Active CN106776908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611083858.4A CN106776908B (en) 2016-11-30 2016-11-30 Data cleaning method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611083858.4A CN106776908B (en) 2016-11-30 2016-11-30 Data cleaning method and device and terminal

Publications (2)

Publication Number Publication Date
CN106776908A CN106776908A (en) 2017-05-31
CN106776908B true CN106776908B (en) 2020-02-14

Family

ID=58913684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611083858.4A Active CN106776908B (en) 2016-11-30 2016-11-30 Data cleaning method and device and terminal

Country Status (1)

Country Link
CN (1) CN106776908B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522756A (en) * 2018-09-27 2019-03-26 中国科学院信息工程研究所 A kind of data method for deleting and device
CN109831575A (en) * 2018-12-26 2019-05-31 上海悦易网络信息技术有限公司 The method for deleting and erasing system of private data in Android mobile phone
CN109948361A (en) * 2019-03-06 2019-06-28 上海悦易网络信息技术有限公司 Computer private data sweep-out method based on external memorizer
CN113138723B (en) * 2021-05-12 2022-04-19 湖北央中巨石信息技术有限公司 Data soft destroying method, system, device and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013119401A1 (en) * 2012-02-09 2013-08-15 Microsoft Corporation Security policy for device data
CN105824839A (en) * 2015-01-06 2016-08-03 中兴通讯股份有限公司 Method and apparatus for safe deletion of data in mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989310B (en) * 2015-03-03 2019-11-26 联想(北京)有限公司 A kind of data destruction method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013119401A1 (en) * 2012-02-09 2013-08-15 Microsoft Corporation Security policy for device data
CN105824839A (en) * 2015-01-06 2016-08-03 中兴通讯股份有限公司 Method and apparatus for safe deletion of data in mobile terminal

Also Published As

Publication number Publication date
CN106776908A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US11337042B2 (en) Short message processing method and apparatus, and electronic device
CN102999263B (en) Electronic installation and the method for background of electronic installation is provided
CN106776908B (en) Data cleaning method and device and terminal
CN106909855B (en) File hiding method and device
CN104536848A (en) Firmware recovery method, device and terminal
CN104040496A (en) Terminal And Application Program Restoration Method
CN107729764A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN104601683A (en) File download management method, mobile terminal and communication system
CN102929980A (en) Folder cleaning method and device
CN104572348A (en) Terminal
CN105022955A (en) Locking method and mobile terminal of application program
CN106790581A (en) Application data processing method, device and terminal
CN107291472A (en) The processing method and processing device of the prompting message of application program
CN105786535B (en) information processing method and electronic equipment
CN111666227B (en) Page bump protection method and device for memory recovery of operating system
CN107704337B (en) Factory setting restoring method, mobile terminal and device with storage function
WO2023030116A1 (en) Display method and apparatus
CN108958824A (en) Starting method, apparatus, electronic equipment and the storage medium of application program
CN103150083A (en) Display method and device for user-defined desktop icons
CN104572349A (en) Data backup method
CN112083843B (en) Control method and device of application icons
CN110471793B (en) Data backup method, data recovery method, first terminal and second terminal
CN106469178B (en) Information processing method, terminal and electronic equipment
CN111880701A (en) Page switching method and device and electronic equipment
CN102968328A (en) Method for uninstalling terminal application and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant