CN109117645A - Data clearing method and its device - Google Patents

Data clearing method and its device Download PDF

Info

Publication number
CN109117645A
CN109117645A CN201710496609.6A CN201710496609A CN109117645A CN 109117645 A CN109117645 A CN 109117645A CN 201710496609 A CN201710496609 A CN 201710496609A CN 109117645 A CN109117645 A CN 109117645A
Authority
CN
China
Prior art keywords
data
terminal
user data
user
controlling terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710496609.6A
Other languages
Chinese (zh)
Inventor
叶飞
何帆
孙昶
王颢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Recycling Technology Co Ltd
Original Assignee
Shenzhen Recycling Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Recycling Technology Co Ltd filed Critical Shenzhen Recycling Technology Co Ltd
Priority to CN201710496609.6A priority Critical patent/CN109117645A/en
Publication of CN109117645A publication Critical patent/CN109117645A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention provides data clearing method and its devices.Wherein, data clearing method includes: and receives user to determine the information for selling terminal;The information for selling terminal is determined based on user, generates data dump instruction;It is instructed according to data dump, controlling terminal removes user data.The safety of user data can be improved in the present invention.

Description

Data clearing method and its device
Technical field
The invention belongs to equipment recovery technology field more particularly to data clearing methods and its device.
Background technique
Currently, the user data in some terminals will lead to there is no being deleted in advance by user before recycling to terminal User data is also stored in the terminal of recycling.Wherein, terminal includes but is not limited to that mobile phone, tablet computer or intelligence wearing are set It is standby.Since user data can be related to for example various accounts (especially financial account number information) of individual subscriber private data, individual Photo, communicating data etc..In this way, the recycling behavior to terminal can be made to reduce the safety of user data.
Summary of the invention
In view of this, the embodiment of the invention provides data clearing method and its devices.
The first aspect of the embodiment of the present invention provides a kind of data clearing method, comprising:
It receives user and determines the information for selling terminal;
The information for selling terminal is determined based on the user, generates data dump instruction;
It is instructed according to the data dump, controlling terminal removes user data.
Preferably, described to be instructed according to the data dump, controlling terminal removes user data, comprising:
Data dump instruction is sent to terminal, user data is removed with controlling terminal.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, the encryption key of the user data is removed with controlling terminal.
Preferably, the encryption key is stored in the encryption key of the central processing unit of terminal;
It is described that data dump instruction is sent to terminal, it is close with the encryption that controlling terminal removes the user data Key specifically includes:
Data dump instruction is sent to terminal, obtains depositing for the encryption key to control the central processing unit Storage address, and the control central processing unit are different from the encryption key in the storage address write-in of the encryption key First preset data.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, is detecting that the user data is not encrypted with controlling terminal When, the user data is encrypted, and controlling terminal generate the user data encryption key and controlling terminal it is clear Except the encryption key.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
By the data dump instruction be sent to terminal, with controlling terminal detect the terminal do not support encryption user When data, obtain the user data storage address and controlling terminal the storage address be written the second preset data, The user data is completely covered.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, data dump interface, the data dump are shown with controlling terminal Interface includes the interface element for removing user data;Controlling terminal parses the data dump interface, to identify the boundary Surface element and controlling terminal execute operation corresponding with the interface element, to remove user data.
Preferably, the data clearing method is used for terminal detection device, and the detection device includes being used for touch control operation Operating device;
The controlling terminal removes user data, comprising:
It obtains and clears data the operating position of operation for controlling terminal;
The operating device is controlled in the operating position, to execute touch control operation, so that terminal removes the number of users According to.
Preferably, described obtain clears data the operating position of operation for controlling terminal, comprising:
The terminal screen is shot, shooting image is obtained;
The shooting image is parsed, determines the operating position for removing user data for controlling terminal.
Preferably, the terminal display interface includes that the interface element of user data is removed for controlling terminal;
The parsing shooting image, determines the operating position that user data is removed for controlling terminal, comprising:
The shooting image is parsed, determines the position of interface element;
Based on the position of the interface element, the operating position is determined.
Preferably, described that the terminal display interface is shot, obtain shooting image before, further includes:
Interface element idsplay order is sent to terminal, the interface display instruction shows the boundary for controlling the terminal Surface element.
The second aspect of the embodiment of the present invention provides a kind of data clearing method, comprising:
Data dump instruction is received, the data dump instruction is the finger for determining the information for selling terminal according to user and generating It enables;
It is instructed according to the data dump, removes user data.
The third aspect of the embodiment of the present invention provides a kind of terminal reclaimer, including memory, processor and deposits The computer program that can be run in the memory and on the processor is stored up, the processor executes the computer journey Above-mentioned data clearing method is realized when sequence.
The fourth aspect of the embodiment of the present invention provides a kind of terminal, including memory, processor and is stored in described In memory and the computer program that can run on the processor, the processor are realized when executing the computer program Above-mentioned data clearing method.
5th aspect of the embodiment of the present invention provides a kind of terminal recovery system, including above-mentioned terminal reclaimer and upper State terminal.
6th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the computer program realizes above-mentioned data clearing method when being executed by processor.
Existing beneficial effect is the embodiment of the present invention compared with prior art: the embodiment of the present invention is to receive user true After making the information for selling terminal, terminal data clearance order can be generated, user data is removed with controlling terminal, user can be improved The safety of data.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without any creative labor, it can also be obtained according to these attached drawings others Attached drawing.
Fig. 1 is the first pass schematic diagram of data clearing method provided in an embodiment of the present invention;
Fig. 2 is the second procedure schematic diagram of data clearing method provided in an embodiment of the present invention;
Fig. 3 is the third flow diagram of data clearing method provided in an embodiment of the present invention;
Fig. 4 is the 4th flow diagram of data clearing method provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of terminal reclaimer provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 is please referred to, is the first pass schematic diagram of the data clearing method of the embodiment of the present invention.Specifically, data are clear Except method includes:
Step 101, it receives user and determines the information for selling terminal.In the present embodiment, data clearing method is returned for terminal Receiving unit, terminal reclaimer are the equipment for being traded and being recycled to terminal.Wherein, terminal includes but is not limited to hand Machine, tablet computer or intelligent wearable device.User determines that the information for selling terminal is specially that user determines that sale disappears to terminal Breath or user determine the instruction for selling terminal, wherein the voice that user determines that the instruction for selling terminal can generate for user refers to It enables, touch command etc..User determines that the information for selling terminal can be the information that user directly transmits, and is also possible to user The information sended over by third party, third party can be terminal or server etc..Wherein, server can be cloud service Device.
Step 102, the information for selling terminal is determined based on user, generates data dump instruction.Data dump instruction is used for It controls user and determines that the terminal sold removes user data.Terminal reclaimer determines the information of sale terminal receiving user Afterwards, data dump instruction can be generated, determines that the terminal sold removes user data to control user.User data refers to by user The data for generating terminal the operation behavior of terminal.User data includes but is not limited to the motor program of user installation, user Account information, user setup data, the communication data of user, picture data of user etc..
Step 103, it is instructed according to data dump, controlling terminal removes user data.
As an implementation, this step includes: that data dump instruction is sent to terminal, is removed and is used with controlling terminal User data.The terminal of this step refers to that user determines the terminal sold.Controlling terminal is instructed according to data dump, removes number of users According to mode include it is a variety of, for example, controlling terminal delete user data index information;Or controlling terminal is used for storing The memory of user data is formatted;The encryption key of controlling terminal removing user data;Or controlling terminal is in number of users According to address on the second preset data is written, user data is completely covered, wherein the second preset data is different from user data; Either controlling terminal identifies the interface element for removing user data, and controlling terminal executes behaviour corresponding with interface element Make, to remove user data.Three of the above mode will be described in detail hereinafter, and and therefore not to repeat here.
As another embodiment, this step includes: and obtains to clear data the operating position of operation for controlling terminal; Operating device is controlled in operating position, to execute touch control operation, so that terminal removes user data.Wherein, it obtains for controlling Terminal clears data the operating position of operation, comprising: shoots to terminal display interface, obtains shooting image;Parsing shooting Image determines the operating position that user data is removed for controlling terminal.Above each step will be described in detail hereinafter, And therefore not to repeat here.It clears data the operative position of operation further, it is also possible to obtain by another way for controlling terminal It sets, such as terminal reclaimer detects the position of terminal by position sensor, according to the position of terminal, determines for controlling end Hold the operating position for the operation that clears data.For supporting the terminal of space-by-space operation, operating position can be offset terminal one The position of set a distance.
The embodiment of the present invention can generate terminal data clearance order after receiving user and determining the information for selling terminal, User data is removed with controlling terminal, it is ensured that improves the safety of user data.
Referring to figure 2., be the embodiment of the present invention data clearing method second procedure schematic diagram.Specifically, data are clear Except method includes:
Step 201, it receives user and determines the information for selling terminal.This step hereinbefore describes in detail, therefore herein It does not repeat.
Step 202, the information for selling terminal is determined based on user, generates data dump instruction.Step is hereinbefore made It is discussed in detail, and therefore not to repeat here.
Step 203, data dump instruction is sent to terminal, user data is removed with controlling terminal.End in this step End refers to that user determines the terminal sold.There are many embodiments of step 203.
The first embodiment, step 203 include: that data dump instruction is sent to terminal, are removed and are used with controlling terminal The encryption key of user data.Wherein, encryption key is a kind of transformation rule information that user data is converted to ciphertext by plaintext.It adopts User data can be quickly removed with present embodiment.
Second of embodiment, step 203 include: that data dump instruction is sent to terminal, are being detected with controlling terminal When not being encrypted to user data, controlling terminal encrypts user data, and controlling terminal generates the encryption of user data Key and controlling terminal remove the encryption key.Specifically, controlling terminal removes the encryption key, comprising: controlling terminal obtains New data are written in the storage address of the encryption key for the storage address and controlling terminal for taking the encryption key, with covering The encryption key.User data can quickly be removed using present embodiment.
Further, step 203 includes: that data dump instruction is sent to terminal, detects user data with controlling terminal Whether it is encrypted, if detecting, user data has been encrypted, and controlling terminal removes the encryption key of user data;If detecting User data is not encrypted, then controlling terminal encrypts user data, and the encryption of controlling terminal generation user data is close Key and controlling terminal remove the encryption key.
Further, step 203 includes: that data dump instruction is sent to terminal, detects number of users with controlling terminal Whether according to being encrypted, if detecting, user data is not encrypted, detects whether terminal supports encryption user data;If detecting Terminal supports encryption user data, then controlling terminal encrypts user data, and controlling terminal generates adding for user data Key.In addition, the first embodiment further include: if detecting, terminal does not support encryption user data, obtains number of users According to storage address and controlling terminal storage address be written the second preset data, user data is completely covered.Wherein, Whether detection terminal supports encryption user data specifically: whether detection terminal has to for being encrypted to user data Control, control can be the application program for encryption, or the hardware and software for being encrypted to user data.
The third embodiment, step 203 include: that data dump instruction is sent to terminal, are being detected with controlling terminal When not supporting encryption user data to terminal, the storage address and controlling terminal for obtaining user data are written in storage address Second preset data, user data is completely covered.Wherein, the second preset data is the data different from user data.When When the size of two preset datas is less than user data, specifically, the second preset data is written in storage address in controlling terminal, with complete The step of all standing user data, comprising: controlling terminal is continuously written into multiple second preset datas in storage address, to cover completely Lid user data.By the way that the second preset data is written in a manner of covering user data, compared to the encryption for removing user data For key, user data can be more thoroughly removed, the safety of user data is further improved.
Further, step 203 includes: that data dump instruction is sent to terminal, whether detects terminal with controlling terminal It supports encryption user data, if terminal does not support encryption user data, obtains the storage address of user data, and control The second preset data is written in storage address in terminal, user data is completely covered.In addition, second of embodiment further include: If detecting, terminal supports encryption user data, and whether controlling terminal detection user data is encrypted, if detecting number of users According to unencryption, then controlling terminal encrypts user data, and controlling terminal generates the encryption key of user data, and control Terminal processed removes the encryption key;If detecting, user data has been encrypted, and controlling terminal removes the encryption key.
4th kind of embodiment, the encryption key of user data are stored in the encryption key of the central processing unit of terminal, In such cases, step 203 includes: that data dump instruction is sent to terminal, obtains user data to control central processing unit Encryption key storage address, and control central processing unit the storage address be written the first preset data, wherein first Preset data is the data different from the encryption key of user data.It can be to user data by the first preset data of write-in Encryption key is covered, to achieve the purpose that the encryption key for removing user data.Due to what is removed in central processing unit The encryption key of user data is difficult to restore it, and therefore, the 4th kind of mode can further improve user The safety of data.
Further, step 203 includes: that data dump instruction is sent to terminal, obtains user data with controlling terminal The storage address of encryption key;And controlling terminal parses the storage address, to judge whether the encryption key is stored in terminal Central processing unit;If the encryption key is stored in central processing unit, central processing unit is controlled in the storage address and is written first Preset data, wherein the first preset data is the data different from the encryption key of user data.
Data dump instruction is sent to terminal, shows data dump interface with controlling terminal by the 5th kind of embodiment, In, data dump interface includes the interface element for removing user data;Controlling terminal parses data dump interface, with identification Interface element;And controlling terminal executes operation corresponding with the interface element, to remove user data.Wherein, interface element It can be icon, widget or the function choosing-item column etc. shown on end-user interface.Terminal executes and the interface element Corresponding operation is the operation for removing user data.When data dump interface is specifically as follows factory reset interface When, the interface element for removing user data is specifically as follows function choosing-item column, terminal corresponding to factory reset and holds Capable operation corresponding with the interface element can be specially the operation to terminal progress factory reset.
Preferably, data dump instruction is sent to terminal, data dump interface is shown with controlling terminal, comprising: will count It is sent to terminal according to clearance order, the operating process for being switched to data dump interface from current display interface is obtained with controlling terminal Information, and controlling terminal shows data dump interface according to the operating process information.Specifically, as an implementation, it grasps It include: opening system set interface as procedure information;The interface element of " factory reset " is searched in system set interface;It holds The corresponding operation of interface element of row " factory reset ", to open factory reset interface.For different types of end End, the operating process information that controlling terminal is switched to data dump interface is different, does not enumerate herein.
The embodiment of the present invention can generate terminal data clearance order after receiving user and determining the information for selling terminal, And data dump instruction is sent to terminal, it is instructed with controlling terminal based on data dump, removes user data automatically, can be improved The safety of user data.
Referring to figure 3., be the embodiment of the present invention data clearing method third flow diagram.In the present embodiment, number It is used for terminal reclaimer according to sweep-out method, terminal reclaimer to be the equipment for being traded and being recycled to terminal.Terminal Reclaimer includes the operating device for touch control operation.Specifically, data clearing method includes:
Step 301, it receives user and determines the information for selling terminal.This step hereinbefore describes in detail, therefore herein It does not repeat.
Step 302, the information for selling terminal is determined based on user, generates data dump instruction.Step is hereinbefore made It is discussed in detail, and therefore not to repeat here.
Step 303, it is instructed according to data dump, terminal screen is shot, obtain shooting image.Shooting figure seems pair What terminal screen was shot obtains original shooting image.Shooting image includes the image of terminal screen.Specifically, terminal recycles Equipment includes the camera for being shot to terminal.Step 203 is specifically, terminal reclaimer is referred to based on data dump It enables, control camera shoots terminal display interface, obtains shooting image.
Step 304, parsing shooting image, determines the operating position that user data is removed for controlling terminal.
As an implementation, terminal screen includes the operation element that user data is removed for triggering terminal.Wherein Operating element can be the Touch control key on terminal screen, or the interface for being used to remove user data that terminal screen is shown Element.Interface element can be icon, widget or the function choosing-item column etc. shown on end-user interface.
Specifically, step 304 includes: parsing shooting image, to determine the position of operation element;Position based on operation element It sets, determines the operating position of operating device.Wherein, operating position can be the position of operation element, be also possible to opposite operate The position of the positional shift certain distance of element.Wherein, parsing shooting image, with determine operation element position the step of, packet Include: analysis shooting image identifies the operation element for removing user data;Determine the position of operation element.Further, divide The step of analysis shoots image, identifies the operation element for removing user data, comprising: obtain the feature letter of the operation element Breath;The region that inquiry matches with this feature information in shooting image, is determined as the operation element for the region.Specifically, Characteristic information includes color characteristic information, texture feature information, spatial relation characteristics information and/or shape feature information.
It is worth noting that, in order to make terminal screen show the interface element for removing user data, terminal recycling is set Standby that interface element idsplay order can be sent to terminal, interface element idsplay order is shown for controlling terminal for removing user The interface element of data.
As another embodiment, can be by touch control operation that is specific, not needing trigger action element, control is eventually User data is removed at end, which can be specific space-by-space operation.Step 304 can parse shooting image, to analyze use In the position for the touch control operation for removing user data, and the position that this is analyzed is determined as the operating position of operating device.Tool Body, for Proximity operation, operating position can be any position in the range of terminal screen, or can also be with For position of the space-by-space operation sensing device as where front camera of terminal.Therefore, it can parse shooting image, to identify end The position for holding screen or space-by-space operation sensing device determines operation according to the position of terminal screen or space-by-space operation sensing device The operating position of device.
Step 305, control operating device executes touch control operation in operating position, so that terminal removes user data.Wherein, Operating device is specifically as follows stylus, and stylus is specifically as follows capacitance pen, and wherein capacitance pen is made using conductor material With conductive characteristic, for touch control capacitance formula screen complete human-computer dialogue operation pen.In addition, on terminal reclaimer also Equipped with the driving mechanism moved for controlling operating device, operating device is located in driving mechanism, and terminal reclaimer is logical It crosses control driving mechanism to be moved accordingly, to drive operating device to execute corresponding touch control operation.Touch control operation can be Touch operation to terminal, or to the Proximity operation (such as space-by-space operation) of terminal.Operation element relative to touch screen For, touch control operation can be clicking operation.
Specifically, when the position when operating device before implementation steps 305 is with operating position difference, step 305 includes: Control operating device is moved to operating position;It controls operating device and executes touch control operation in operating position, used so that terminal is removed User data.
The embodiment of the present invention can generate terminal data clearance order after receiving user and determining the information for selling terminal, And the safety of user data can be improved so that terminal removes user data by executing manipulation operation to terminal.
Referring to figure 4., be the embodiment of the present invention data clearing method the 4th flow diagram.In the present embodiment, number Terminal is used for according to sweep-out method.Wherein, terminal includes but is not limited to mobile phone, tablet computer or intelligent wearable device.Specifically, number According to sweep-out method, comprising:
Step 401, data dump instruction is received.Wherein, data dump instruction is that the letter for selling terminal is determined according to user Cease the instruction generated.Specifically, data dump instruction is terminal reclaimer or server according to the determining sale terminal of user The instruction that information generates.Specifically, the data dump that step 401 can send over for reception terminal reclaimer or server Instruction.Server is specifically as follows Cloud Server.
Step 402, it is instructed according to data dump, removes user data.There are many embodiments of step 402.
The first embodiment, step 402 include: to be instructed according to data dump, remove the encryption key of user data.Its In, encryption key is a kind of transformation rule information that user data is converted to ciphertext by plaintext.It can be fast using present embodiment The removing user data of speed.
Second of embodiment, step 402 include: to be instructed according to data dump, are detecting that user data is not encrypted When, user data is encrypted, and generate the encryption key of user data, and the encryption key is removed in control.Specifically, clearly Except the encryption key, comprising: obtain the storage address of the encryption key, and be written newly in the storage address of the encryption key Data, to cover the encryption key.User data can quickly be removed using present embodiment.
Further, step 402 includes: to be instructed according to data dump, and whether detection user data is encrypted, if detecting User data has been encrypted, then removes the encryption key of user data;If detecting, user data is not encrypted, to number of users According to being encrypted, and the encryption key of user data is generated, and remove the encryption key.
Further, step 402 includes: to be instructed according to data dump, and whether detection user data is encrypted, if detection It is not encrypted to user data, then detects whether terminal supports encryption user data;If detecting, terminal supports encryption number of users According to then being encrypted to user data, and generate the encryption key of user data.In addition, the first embodiment further include: if Detect that terminal does not support encryption user data, then the storage address and controlling terminal for obtaining user data are in storage address The second preset data is written, user data is completely covered.Wherein, whether detection terminal supports encryption user data specifically: Whether detection terminal has to the control for being encrypted to user data, and control can be the application program for encryption, Or the hardware and software for being encrypted to user data.
The third embodiment, step 402 include: to be instructed according to data dump, are used detecting that terminal is not supported to encrypt When user data, the storage address of user data is obtained, and the second preset data is written in storage address, user is completely covered Data.Wherein, the second preset data is the data different from user data.When the size of the second preset data is less than user data When, specifically, the second preset data is written in storage address, the step of user data is completely covered, comprising: in storage address Multiple second preset datas are continuously written into, user data is completely covered.By the second preset data of write-in to cover number of users According to mode, compared to remove user data encryption key for, can more thoroughly remove user data, further Improve the safety of user data.
Further, step 402 includes: to be instructed according to data dump, and whether detection terminal supports encryption user data, if When terminal does not support encryption user data, then the storage address of user data is obtained, and default in storage address write-in second Data, user data is completely covered.In addition, second of embodiment further include: if detecting, terminal supports encryption number of users According to then detecting whether user data is encrypted, if detecting user data unencryption, encrypted to user data, and is raw At the encryption key of user data, and remove the encryption key;If detecting, user data has been encrypted, and it is close to remove the encryption Key.
4th kind of embodiment, the encryption key of user data are stored in the encryption key of the central processing unit of terminal, In such cases, step 402 includes: to be instructed according to data dump, and control central processing unit obtains the encryption key of user data Storage address, and control central processing unit the storage address be written the first preset data, wherein the first preset data is The data different from the encryption key of user data.By the first preset data of write-in can encryption key to user data into Row covering, to achieve the purpose that the encryption key for removing user data.Due to the user data removed in central processing unit Encryption key is difficult to restore it, and therefore, the 4th kind of mode can further improve the safety of user data Property.
Further, step 402 includes: to be instructed according to data dump, obtains the storage address of the encryption key of user data; And the storage address is parsed, to judge whether the encryption key is stored in the central processing unit of terminal;If the encryption key stores In central processing unit, then central processing unit is controlled in the storage address, the first preset data is written, wherein the first preset data is The data different from the encryption key of user data.
5th kind of embodiment, instructs according to data dump, shows data dump interface, wherein data dump interface packet Include the interface element for removing user data;Data dump interface is parsed, to identify interface element;And it executes and the interface The corresponding operation of element, to remove user data.Wherein, interface element can be icon, the window shown on end-user interface Mouth widget or function choosing-item column etc..Terminal executes operation corresponding with the interface element as the behaviour for removing user data Make.When data dump interface is specifically as follows factory reset interface, the interface element for removing user data is specific It can be function choosing-item column corresponding to factory reset, the operation corresponding with the interface element that terminal executes is specially can For the operation for carrying out factory reset to terminal.
Preferably, instructed according to data dump, show data dump interface, comprising: instructed according to data dump, obtain from Current display interface is switched to the operating process information at data dump interface, and according to the operating process information, shows that data are clear Except interface.Specifically, as an implementation, operating process information includes: opening system set interface;In system, circle is set Search the interface element of " factory reset " in face;The corresponding operation of interface element of " factory reset " is executed, to open Factory reset interface.For different types of terminal, controlling terminal is switched to the operating process information at data dump interface It is different, it does not enumerate herein.
Further, it is also possible to instruct according to data dump, the index information of user data is removed, or to for storing number of users According to memory be formatted.
The embodiment of the present invention receives data dump instruction by terminal, and is instructed according to data dump, removes user data, The safety of user data can be improved.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
The embodiment of the present invention provides a kind of terminal reclaimer, including memory, processor and storage are in memory And the computer program that can be run on a processor, processor realize above-mentioned data clearing method when executing computer program.
The embodiment of the present invention provides a kind of terminal, including memory, processor and storage in memory and can located The computer program run on reason device, processor realize above-mentioned data clearing method when executing the computer program.
The embodiment of the present invention provides a kind of terminal reclaimer, including above-mentioned terminal reclaimer and above-mentioned terminal.
The embodiment of the present invention provides a kind of computer readable storage medium, and computer-readable recording medium storage has computer Program realizes above-mentioned data clearing method when computer program is executed by processor.
Fig. 5 is the structural schematic diagram for the terminal reclaimer that one embodiment of the invention provides.As shown in figure 5, the embodiment Terminal reclaimer 5 include: processor 50, memory 51 and be stored in the memory 51 and can be in the processor The computer program 52 run on 50.The processor 50 realizes above-mentioned each data dump when executing the computer program 52 Step in embodiment of the method, such as step 101 shown in FIG. 1 is to 103.
Illustratively, the computer program 52 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 51, and are executed by the processor 50, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 52 in the terminal reclaimer 5 is described.For example, the computer program 52 can be with Be divided into receiving module, directive generation module and control module, each module concrete function is as follows: receiving module is for receiving User determines the information for selling terminal;Directive generation module is used to determine that the information for selling terminal, generation data are clear based on user Except instruction;For control module for being instructed according to data dump, controlling terminal removes user data.
It will be understood by those skilled in the art that Fig. 5 is only the example of terminal reclaimer 5, structure paired terminal is not returned The restriction of receiving unit 5 may include perhaps combining certain components or different components than illustrating more or fewer components, Such as the terminal reclaimer can also include input-output equipment, network access equipment, bus etc..
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 51 can be the storage equipment built in the terminal reclaimer, such as hard disk or memory.It is described What memory 51 was also possible to be equipped on the External memory equipment of the terminal reclaimer 5, such as the terminal reclaimer 5 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 51 can also have been deposited both the inside including the terminal reclaimer 5 Storage unit also includes External memory equipment.The memory 51 is for storing the computer program and terminal recycling Other programs and data needed for equipment.The memory 51, which can be also used for temporarily storing, have been exported or will export Data.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed each device and method can pass through it Its mode is realized.For example, the embodiment of each device described above is only schematical, for example, the module or The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute Display or the mutual coupling or direct-coupling or communication connection discussed can be through some interfaces, device or unit INDIRECT COUPLING or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program Code can be source code form, object identification code form, executable file or certain intermediate forms etc..Computer-readable Jie Matter may include: can carry the computer program code any entity or device, recording medium, USB flash disk, mobile hard disk, Magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (16)

1. a kind of data clearing method characterized by comprising
It receives user and determines the information for selling terminal;
The information for selling terminal is determined based on the user, generates data dump instruction;
It is instructed according to the data dump, controlling terminal removes user data.
2. data clearing method as described in claim 1, which is characterized in that described to be instructed according to the data dump, control Terminal removes user data, comprising:
Data dump instruction is sent to terminal, user data is removed with controlling terminal.
3. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end End user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, the encryption key of the user data is removed with controlling terminal.
4. data clearing method as claimed in claim 3, which is characterized in that the encryption key is stored in the center of terminal The encryption key of processor;
It is described that data dump instruction is sent to terminal, the encryption key of the user data is removed with controlling terminal, is had Body includes:
Data dump instruction is sent to terminal, to control the storage that the central processing unit obtains the encryption key First different from the encryption key are written in the storage address of the encryption key in location, and the control central processing unit Preset data.
5. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end End user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, it is right with controlling terminal when detecting that the user data is not encrypted The user data is encrypted, and controlling terminal generates the encryption key of the user data and controlling terminal removes institute State encryption key.
6. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end End user data is removed with controlling terminal, comprising:
By the data dump instruction be sent to terminal, with controlling terminal detect the terminal do not support encryption user data When, the storage address and controlling terminal for obtaining the user data are in the storage address the second preset data of write-in, with complete User data described in all standing.
7. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end End user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, data dump interface, the data dump interface are shown with controlling terminal Including the interface element for removing user data;Controlling terminal parses the data dump interface, to identify the Interface Element Element and controlling terminal execute operation corresponding with the interface element, to remove user data.
8. data clearing method as described in claim 1, which is characterized in that the data clearing method is set for terminal detection Standby, the detection device includes the operating device for touch control operation;
The controlling terminal removes user data, comprising:
It obtains and clears data the operating position of operation for controlling terminal;
The operating device is controlled in the operating position, to execute touch control operation, so that terminal removes the user data.
9. data clearing method as claimed in claim 8, which is characterized in that described obtain clears data behaviour for controlling terminal The operating position of work, comprising:
The terminal screen is shot, shooting image is obtained;
The shooting image is parsed, determines the operating position for removing user data for controlling terminal.
10. data clearing method as claimed in claim 9, which is characterized in that the terminal display interface includes for controlling The interface element of terminal removing user data;
The parsing shooting image, determines the operating position that user data is removed for controlling terminal, comprising:
The shooting image is parsed, determines the position of interface element;
Based on the position of the interface element, the operating position is determined.
11. data clearing method as claimed in claim 10, which is characterized in that described to clap the terminal display interface Take the photograph, obtain shooting image before, further includes:
Interface element idsplay order is sent to terminal, the interface display instruction shows the Interface Element for controlling the terminal Element.
12. a kind of data clearing method characterized by comprising
Data dump instruction is received, the data dump instruction is the instruction for determining the information for selling terminal according to user and generating;
It is instructed according to the data dump, removes user data.
13. a kind of terminal reclaimer, which is characterized in that including memory, processor and store in the memory simultaneously The computer program that can be run on the processor, the processor realize such as claim when executing the computer program 1 to 11 described in any item data clearing methods.
14. a kind of terminal, which is characterized in that in the memory and can be described including memory, processor and storage The computer program run on processor, the processor are realized as claimed in claim 12 when executing the computer program Data clearing method.
15. a kind of terminal recovery system, which is characterized in that including as claimed in claim 13 and terminal reclaimer and such as right It is required that terminal described in 14.
16. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realization such as claim 1 to 12 described in any item data clearing methods when the computer program is executed by processor.
CN201710496609.6A 2017-06-26 2017-06-26 Data clearing method and its device Pending CN109117645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710496609.6A CN109117645A (en) 2017-06-26 2017-06-26 Data clearing method and its device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710496609.6A CN109117645A (en) 2017-06-26 2017-06-26 Data clearing method and its device

Publications (1)

Publication Number Publication Date
CN109117645A true CN109117645A (en) 2019-01-01

Family

ID=64822255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710496609.6A Pending CN109117645A (en) 2017-06-26 2017-06-26 Data clearing method and its device

Country Status (1)

Country Link
CN (1) CN109117645A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110333876A (en) * 2019-07-09 2019-10-15 上海悦易网络信息技术有限公司 A kind of data clearing method and control equipment

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483697A (en) * 2009-02-23 2009-07-15 惠州Tcl移动通信有限公司 Mobile communication terminal and message automatic cleaning method thereof
CN101505335A (en) * 2008-06-05 2009-08-12 华为技术有限公司 Method and terminal device for erasing terminal data and terminal equipment
CN101651864A (en) * 2008-08-14 2010-02-17 比亚迪股份有限公司 Method for managing file in mobile terminal and mobile terminal
CN101764885A (en) * 2009-12-22 2010-06-30 中兴通讯股份有限公司 Data deletion method and device on mobile terminal
CN102209149A (en) * 2011-05-25 2011-10-05 惠州Tcl移动通信有限公司 Wireless communication equipment and information clearing method
CN102387232A (en) * 2010-09-03 2012-03-21 宁波普天通信技术有限公司 General mobile phone testing system based on triaxial pushbutton and pattern recognition
CN103473442A (en) * 2013-08-26 2013-12-25 深圳市海目星激光科技有限公司 Visual positioning method, device and system for assembly line work
CN103678100A (en) * 2012-09-10 2014-03-26 联芯科技有限公司 Application automatic testing method and system of terminal
CN104182254A (en) * 2014-08-21 2014-12-03 上海瀚银信息技术有限公司 Method and system for resetting mobile payment card reader to factory state
CN104488300A (en) * 2014-06-24 2015-04-01 华为技术有限公司 Equipment management method and device, system
US20150242851A1 (en) * 2012-04-06 2015-08-27 Google Inc. Secure reset of personal and service provider information on mobile devices
CN105630965A (en) * 2015-12-24 2016-06-01 西安电子科技大学 System and method for securely deleting file from user space on mobile terminal flash medium
CN105653397A (en) * 2015-09-30 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Recovery processing method, apparatus and electronic device
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
CN105956442A (en) * 2016-04-29 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Data clearing method and terminal device
CN106201796A (en) * 2016-07-04 2016-12-07 珠海市魅族科技有限公司 The collocation method of a kind of test and device

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101505335A (en) * 2008-06-05 2009-08-12 华为技术有限公司 Method and terminal device for erasing terminal data and terminal equipment
CN101651864A (en) * 2008-08-14 2010-02-17 比亚迪股份有限公司 Method for managing file in mobile terminal and mobile terminal
CN101483697A (en) * 2009-02-23 2009-07-15 惠州Tcl移动通信有限公司 Mobile communication terminal and message automatic cleaning method thereof
CN101764885A (en) * 2009-12-22 2010-06-30 中兴通讯股份有限公司 Data deletion method and device on mobile terminal
CN102387232A (en) * 2010-09-03 2012-03-21 宁波普天通信技术有限公司 General mobile phone testing system based on triaxial pushbutton and pattern recognition
CN102209149A (en) * 2011-05-25 2011-10-05 惠州Tcl移动通信有限公司 Wireless communication equipment and information clearing method
US20150242851A1 (en) * 2012-04-06 2015-08-27 Google Inc. Secure reset of personal and service provider information on mobile devices
CN103678100A (en) * 2012-09-10 2014-03-26 联芯科技有限公司 Application automatic testing method and system of terminal
CN103473442A (en) * 2013-08-26 2013-12-25 深圳市海目星激光科技有限公司 Visual positioning method, device and system for assembly line work
CN104488300A (en) * 2014-06-24 2015-04-01 华为技术有限公司 Equipment management method and device, system
CN104182254A (en) * 2014-08-21 2014-12-03 上海瀚银信息技术有限公司 Method and system for resetting mobile payment card reader to factory state
CN105653397A (en) * 2015-09-30 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Recovery processing method, apparatus and electronic device
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
CN105630965A (en) * 2015-12-24 2016-06-01 西安电子科技大学 System and method for securely deleting file from user space on mobile terminal flash medium
CN105956442A (en) * 2016-04-29 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Data clearing method and terminal device
CN106201796A (en) * 2016-07-04 2016-12-07 珠海市魅族科技有限公司 The collocation method of a kind of test and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110333876A (en) * 2019-07-09 2019-10-15 上海悦易网络信息技术有限公司 A kind of data clearing method and control equipment

Similar Documents

Publication Publication Date Title
CN104992094A (en) Terminal operation method and terminal
CN105242870A (en) False touch method and device of terminal with touch screen
CN109656608A (en) A kind of MCU firmware upgrade method and its relevant device
CN105487641B (en) Control method and device of terminal equipment
CN104808940B (en) Inter-terminal data transmission method and device
CN106096043B (en) A kind of photographic method and mobile terminal
US20210150243A1 (en) Efficient image sharing
CN110457963A (en) Display control method, device, mobile terminal and computer readable storage medium
CN109151337A (en) Recognition of face light compensation method, recognition of face light compensating apparatus and mobile terminal
CN112949172A (en) Data processing method and device, machine readable medium and equipment
CN107317928B (en) Information processing method, mobile terminal and computer readable storage medium
CN109359582A (en) Information search method, information search device and mobile terminal
CN108334267A (en) A kind of cursor-moving method, system and terminal device
CN108733799A (en) A kind of method for processing report data, device and terminal
CN107272989B (en) Using starting method, apparatus and terminal device
CN107678788A (en) Five application page display methods, device, computer installation and storage medium
CN110174946A (en) Mouse action analogy method, simulation system, storage medium and electronic equipment
CN109117645A (en) Data clearing method and its device
US20160379033A1 (en) Interaction method and apparatus
CN109146495A (en) Method and device for quickly and safely starting payment and terminal equipment
CN109358927A (en) The method, apparatus and terminal device that application program is shown
CN106020712B (en) Touch gesture recognition method and device
CN104750401A (en) Touch method and related device as well as terminal equipment
CN109144379A (en) Method, terminal detection device, system and the storage medium that terminal is operated
CN105069332A (en) Fingerprint-based password authentication method and password authentication apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190101

RJ01 Rejection of invention patent application after publication