CN107765988A - The method of the long-range revoked device in high in the clouds - Google Patents
The method of the long-range revoked device in high in the clouds Download PDFInfo
- Publication number
- CN107765988A CN107765988A CN201610674391.4A CN201610674391A CN107765988A CN 107765988 A CN107765988 A CN 107765988A CN 201610674391 A CN201610674391 A CN 201610674391A CN 107765988 A CN107765988 A CN 107765988A
- Authority
- CN
- China
- Prior art keywords
- clouds
- abolishment
- designated equipment
- operation requests
- control device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method of the long-range revoked device in high in the clouds, comprises the following steps:High in the clouds control device obtains abolishment operation requests of the user to designated equipment;High in the clouds control device will abolish operation requests and notify designated equipment by instruction mode, so that designated equipment does abolishment operation according to operation requests are abolished;Receipt instruction is abolished in high in the clouds control device reception, according to the instruction in abolishment receipt instruction deletion designated equipment beyond the clouds synchronous list.The present invention obtains abolishment operation requests of the user to designated equipment by high in the clouds control device, and designated equipment is notified by instruction mode by operation requests are abolished, so that designated equipment does abolishment operation according to operation requests are abolished, so as to realize by the long-range revoked device data in high in the clouds, prevent the important information of equipment from revealing, not only ensured the interests of user, and have the function that suppressing theft benefits, so as to lift the safety of user, loss is reduced.
Description
Technical field
The present invention relates to the technical field of the long-range revoked device in high in the clouds, more particularly to a kind of side of the long-range revoked device in high in the clouds
Method.
Background technology
With the continuous development of mobile communication technology, various intelligent terminals are gradually popularized, it has also become the daily life of people
Indispensable part in work.And the importance and economy of intelligent terminal constantly embody, often go out in daily life
Existing intelligent terminal is stolen thing, can not only seriously affect normal work and the life of intelligent terminal loser,
If some data of intelligent terminal memory storage leak, serious warp can be also caused to intelligent terminal loser
Ji loss.
The content of the invention
It is an object of the invention to provide a kind of method of the long-range revoked device in high in the clouds, to solve intelligence in the prior art
Terminal device, which is lost, causes data to leak the problem of causing.
To achieve these goals, the invention provides a kind of method of the long-range revoked device in high in the clouds, comprise the following steps:
High in the clouds control device obtains abolishment operation requests of the user to designated equipment;
High in the clouds control device will abolish operation requests and notify designated equipment by instruction mode, so that designated equipment is according to useless
Abolishment operation is done in division operation request;
High in the clouds control device, which receives, abolishes receipt instruction, and delete designated equipment according to abolishment receipt instruction synchronously arranges beyond the clouds
Instruction in table.
Further, high in the clouds control device also includes after obtaining abolishment operation requests of the user to designated equipment:High in the clouds
Control device is stored in operation requests are abolished in the high in the clouds synchronization list of designated equipment by instruction mode.
Further, abolishing operation requests includes the device number and high in the clouds abolishment function command of designated equipment.
Further, abolishing receipt instruction includes the device number of designated equipment.
Further, designated equipment does abolishment operation according to abolishment operation requests and specifically included:Designated equipment is according to abolishment
Operation requests destroy user data, system data, and do damage processing to the hardware of equipment.
Beneficial effect using the invention described above technical scheme is:User is obtained to designated equipment by high in the clouds control device
Abolishment operation requests, and will abolish operation requests by instruction mode notify designated equipment so that designated equipment is according to abolishment
Operation requests do abolishment operation, so as to realize by the long-range revoked device data in high in the clouds, prevent the important information of equipment from revealing, no
The interests of user have only been ensured, and have had the function that suppressing theft benefits, and so as to lift the safety of user, reduces loss.
Brief description of the drawings
Fig. 1 is a kind of method flow diagram of the long-range revoked device in high in the clouds of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.
The invention discloses a kind of method of the long-range revoked device in high in the clouds, as shown in figure 1, comprising the following steps:
Step S101, high in the clouds control device obtain abolishment operation requests of the user to designated equipment;
In the present embodiment, when needing abolish operation to designated equipment, user can login Vcloud high in the clouds, and
The operation of function is abolished by the device number triggering for the equipment for needing to abolish.Specifically, abolishing can include needing in operation requests
The device number of the equipment to be abolished.
Step S102, high in the clouds control device will abolish operation requests and notify designated equipment by instruction mode, so as to specify
Equipment does abolishment operation according to operation requests are abolished;
Specifically, high in the clouds control device will abolish operation requests by instruction mode notifies designated equipment, at the same by this
Behavior is stored in a manner of instructing in the high in the clouds synchronization list of the equipment, wherein, record has device number, high in the clouds in synchronous list
Abolish function command.Intelligent terminal receives the abolishment operation of progress data after the instruction that high in the clouds pushes, and specifically includes pin
User data, system data are ruined, destroys the system architecture of intelligent terminal, permanent empty piece state is at, cannot be started up,
And damage processing is done to the hardware of equipment, its paralysis is turned into useless machine, so that intelligent terminal can not again use.
In the present embodiment, only equipment can just receive what high in the clouds control device was sent in the case of being in WIFI or mobile data flow
Abolish operation requests instruction.
Step S103, high in the clouds control device, which receives, abolishes receipt instruction, and deleting designated equipment according to abolishment receipt instruction exists
Instruction in the synchronization list of high in the clouds.
In the present embodiment, abolishing receipt instruction includes the device number of designated equipment.Touched when user logins Vcloud high in the clouds
After hair abolishes the operation of function, it will sent by instruction mode to high in the clouds and abolish receipt instruction, when high in the clouds control device receives
To after abolishing receipt instruction, instruction of the equipment beyond the clouds in synchronous list is deleted.
It should be noted that in the present embodiment, the synchronous list if intelligent terminal performs multiple same instructions
In only can record an instruction, receive the multiple data of deletion caused by multi-pass operation so as to prevent intelligent terminal.
The present invention obtains abolishment operation requests of the user to designated equipment by high in the clouds control device, and will abolish operation and ask
Ask and designated equipment is notified by instruction mode, so that designated equipment does abolishment operation according to operation requests are abolished, it is logical so as to realize
The long-range revoked device data in high in the clouds are crossed, prevent the important information of equipment from revealing, have not only ensured the interests of user, and with suppression
The effect that system theft benefits, so as to lift the safety of user, reduce loss.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to
The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey
Sequence upon execution, execution the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (5)
- A kind of 1. method of the long-range revoked device in high in the clouds, it is characterised in that comprise the following steps:High in the clouds control device obtains abolishment operation requests of the user to designated equipment;The abolishment operation requests are notified the designated equipment by the high in the clouds control device by instruction mode, so that the finger Locking equipment does abolishment operation according to the abolishment operation requests;The high in the clouds control device, which receives, abolishes receipt instruction, and the designated equipment is deleted in cloud according to the abolishment receipt instruction Hold the instruction in synchronous list.
- 2. the method for the long-range revoked device in high in the clouds according to claim 1, it is characterised in that the high in the clouds control device obtains Take abolishment operation requests of the family to designated equipment also includes afterwards:The high in the clouds control device leads to the abolishment operation requests Instruction mode is crossed to be stored in the high in the clouds synchronization list of the designated equipment.
- 3. the method for the long-range revoked device in high in the clouds according to claim 1 or 2, it is characterised in that the abolishment operation please The device number including the designated equipment and high in the clouds is asked to abolish function command.
- 4. the method for the long-range revoked device in high in the clouds according to claim 1 or 2, it is characterised in that the abolishment receipt refers to Order includes the device number of the designated equipment.
- 5. the method for the long-range revoked device in high in the clouds according to claim 1 or 2, it is characterised in that the designated equipment root Abolishment operation is done according to the abolishment operation requests to specifically include:The designated equipment destroys user according to the abolishment operation requests Data, system data, and damage processing is done to the hardware of the equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610674391.4A CN107765988A (en) | 2016-08-16 | 2016-08-16 | The method of the long-range revoked device in high in the clouds |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610674391.4A CN107765988A (en) | 2016-08-16 | 2016-08-16 | The method of the long-range revoked device in high in the clouds |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107765988A true CN107765988A (en) | 2018-03-06 |
Family
ID=61260530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610674391.4A Pending CN107765988A (en) | 2016-08-16 | 2016-08-16 | The method of the long-range revoked device in high in the clouds |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107765988A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104035891A (en) * | 2014-06-26 | 2014-09-10 | 福州大学 | Android mobile terminal data security protection system |
WO2014138120A1 (en) * | 2013-03-04 | 2014-09-12 | Docusign, Inc. | Systems and methods for cloud data security |
CN104796532A (en) * | 2015-03-13 | 2015-07-22 | 广东欧珀移动通信有限公司 | Method and device for destroying mobile terminal |
CN104881612A (en) * | 2015-05-06 | 2015-09-02 | 百度在线网络技术(北京)有限公司 | Data deleting method and apparatus |
-
2016
- 2016-08-16 CN CN201610674391.4A patent/CN107765988A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014138120A1 (en) * | 2013-03-04 | 2014-09-12 | Docusign, Inc. | Systems and methods for cloud data security |
CN104035891A (en) * | 2014-06-26 | 2014-09-10 | 福州大学 | Android mobile terminal data security protection system |
CN104796532A (en) * | 2015-03-13 | 2015-07-22 | 广东欧珀移动通信有限公司 | Method and device for destroying mobile terminal |
CN104881612A (en) * | 2015-05-06 | 2015-09-02 | 百度在线网络技术(北京)有限公司 | Data deleting method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10715509B2 (en) | Encryption key shredding to protect non-persistent data | |
US9077728B1 (en) | Systems and methods for managing access-control groups | |
US9122692B1 (en) | Systems and methods for reducing file-system fragmentation when restoring block-level backups utilizing an identification module, an optimization module, and a restore module | |
US9256612B1 (en) | Systems and methods for managing references in deduplicating data systems | |
US10032038B2 (en) | File system support for rolling keys | |
US10182048B1 (en) | Systems and methods for automatically populating one-time-password input fields | |
US10956383B2 (en) | Device backup and wipe | |
CN102867035B (en) | A kind of distributed file system cluster high availability method and device | |
CN103729470A (en) | Secure storage method based on different cloud storage ends | |
US20150012846A1 (en) | Method, System and Mobile Terminal for Deleting Chat Record | |
US20170269859A1 (en) | Method and apparatus for storage system | |
WO2017113317A1 (en) | File editing method and file editor | |
US9235588B1 (en) | Systems and methods for protecting deduplicated data | |
US9195398B2 (en) | Information storage device and method | |
US8364955B1 (en) | Systems and methods for effectively removing access to individual files on magnetic tape media | |
US8452931B1 (en) | Systems and methods for simultaneously providing multiple data protection functions | |
US9442940B1 (en) | Systems and methods for adaptively selecting file-recall modes | |
CN106254806B (en) | A kind of Video data guard method and device | |
CN107765988A (en) | The method of the long-range revoked device in high in the clouds | |
US8407301B1 (en) | Systems and methods for creating incremental images of cluster volumes | |
EP2045751A1 (en) | Methods and systems for configuring a specific-use computing systems | |
CN109976953A (en) | A kind of data back up method | |
CN106331069A (en) | Method for remotely deleting data through cloud | |
CN106557385B (en) | Data snapshot method and storage device | |
CN111045787B (en) | Rapid continuous experiment method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180306 |
|
RJ01 | Rejection of invention patent application after publication |