CN109117645A - Data clearing method and its device - Google Patents
Data clearing method and its device Download PDFInfo
- Publication number
- CN109117645A CN109117645A CN201710496609.6A CN201710496609A CN109117645A CN 109117645 A CN109117645 A CN 109117645A CN 201710496609 A CN201710496609 A CN 201710496609A CN 109117645 A CN109117645 A CN 109117645A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- user data
- user
- controlling terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The present invention provides data clearing method and its devices.Wherein, data clearing method includes: and receives user to determine the information for selling terminal;The information for selling terminal is determined based on user, generates data dump instruction;It is instructed according to data dump, controlling terminal removes user data.The safety of user data can be improved in the present invention.
Description
Technical field
The invention belongs to equipment recovery technology field more particularly to data clearing methods and its device.
Background technique
Currently, the user data in some terminals will lead to there is no being deleted in advance by user before recycling to terminal
User data is also stored in the terminal of recycling.Wherein, terminal includes but is not limited to that mobile phone, tablet computer or intelligence wearing are set
It is standby.Since user data can be related to for example various accounts (especially financial account number information) of individual subscriber private data, individual
Photo, communicating data etc..In this way, the recycling behavior to terminal can be made to reduce the safety of user data.
Summary of the invention
In view of this, the embodiment of the invention provides data clearing method and its devices.
The first aspect of the embodiment of the present invention provides a kind of data clearing method, comprising:
It receives user and determines the information for selling terminal;
The information for selling terminal is determined based on the user, generates data dump instruction;
It is instructed according to the data dump, controlling terminal removes user data.
Preferably, described to be instructed according to the data dump, controlling terminal removes user data, comprising:
Data dump instruction is sent to terminal, user data is removed with controlling terminal.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, the encryption key of the user data is removed with controlling terminal.
Preferably, the encryption key is stored in the encryption key of the central processing unit of terminal;
It is described that data dump instruction is sent to terminal, it is close with the encryption that controlling terminal removes the user data
Key specifically includes:
Data dump instruction is sent to terminal, obtains depositing for the encryption key to control the central processing unit
Storage address, and the control central processing unit are different from the encryption key in the storage address write-in of the encryption key
First preset data.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, is detecting that the user data is not encrypted with controlling terminal
When, the user data is encrypted, and controlling terminal generate the user data encryption key and controlling terminal it is clear
Except the encryption key.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
By the data dump instruction be sent to terminal, with controlling terminal detect the terminal do not support encryption user
When data, obtain the user data storage address and controlling terminal the storage address be written the second preset data,
The user data is completely covered.
Preferably, described that data dump instruction is sent to terminal, user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, data dump interface, the data dump are shown with controlling terminal
Interface includes the interface element for removing user data;Controlling terminal parses the data dump interface, to identify the boundary
Surface element and controlling terminal execute operation corresponding with the interface element, to remove user data.
Preferably, the data clearing method is used for terminal detection device, and the detection device includes being used for touch control operation
Operating device;
The controlling terminal removes user data, comprising:
It obtains and clears data the operating position of operation for controlling terminal;
The operating device is controlled in the operating position, to execute touch control operation, so that terminal removes the number of users
According to.
Preferably, described obtain clears data the operating position of operation for controlling terminal, comprising:
The terminal screen is shot, shooting image is obtained;
The shooting image is parsed, determines the operating position for removing user data for controlling terminal.
Preferably, the terminal display interface includes that the interface element of user data is removed for controlling terminal;
The parsing shooting image, determines the operating position that user data is removed for controlling terminal, comprising:
The shooting image is parsed, determines the position of interface element;
Based on the position of the interface element, the operating position is determined.
Preferably, described that the terminal display interface is shot, obtain shooting image before, further includes:
Interface element idsplay order is sent to terminal, the interface display instruction shows the boundary for controlling the terminal
Surface element.
The second aspect of the embodiment of the present invention provides a kind of data clearing method, comprising:
Data dump instruction is received, the data dump instruction is the finger for determining the information for selling terminal according to user and generating
It enables;
It is instructed according to the data dump, removes user data.
The third aspect of the embodiment of the present invention provides a kind of terminal reclaimer, including memory, processor and deposits
The computer program that can be run in the memory and on the processor is stored up, the processor executes the computer journey
Above-mentioned data clearing method is realized when sequence.
The fourth aspect of the embodiment of the present invention provides a kind of terminal, including memory, processor and is stored in described
In memory and the computer program that can run on the processor, the processor are realized when executing the computer program
Above-mentioned data clearing method.
5th aspect of the embodiment of the present invention provides a kind of terminal recovery system, including above-mentioned terminal reclaimer and upper
State terminal.
6th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the computer program realizes above-mentioned data clearing method when being executed by processor.
Existing beneficial effect is the embodiment of the present invention compared with prior art: the embodiment of the present invention is to receive user true
After making the information for selling terminal, terminal data clearance order can be generated, user data is removed with controlling terminal, user can be improved
The safety of data.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability
For the those of ordinary skill of domain, without any creative labor, it can also be obtained according to these attached drawings others
Attached drawing.
Fig. 1 is the first pass schematic diagram of data clearing method provided in an embodiment of the present invention;
Fig. 2 is the second procedure schematic diagram of data clearing method provided in an embodiment of the present invention;
Fig. 3 is the third flow diagram of data clearing method provided in an embodiment of the present invention;
Fig. 4 is the 4th flow diagram of data clearing method provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of terminal reclaimer provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 is please referred to, is the first pass schematic diagram of the data clearing method of the embodiment of the present invention.Specifically, data are clear
Except method includes:
Step 101, it receives user and determines the information for selling terminal.In the present embodiment, data clearing method is returned for terminal
Receiving unit, terminal reclaimer are the equipment for being traded and being recycled to terminal.Wherein, terminal includes but is not limited to hand
Machine, tablet computer or intelligent wearable device.User determines that the information for selling terminal is specially that user determines that sale disappears to terminal
Breath or user determine the instruction for selling terminal, wherein the voice that user determines that the instruction for selling terminal can generate for user refers to
It enables, touch command etc..User determines that the information for selling terminal can be the information that user directly transmits, and is also possible to user
The information sended over by third party, third party can be terminal or server etc..Wherein, server can be cloud service
Device.
Step 102, the information for selling terminal is determined based on user, generates data dump instruction.Data dump instruction is used for
It controls user and determines that the terminal sold removes user data.Terminal reclaimer determines the information of sale terminal receiving user
Afterwards, data dump instruction can be generated, determines that the terminal sold removes user data to control user.User data refers to by user
The data for generating terminal the operation behavior of terminal.User data includes but is not limited to the motor program of user installation, user
Account information, user setup data, the communication data of user, picture data of user etc..
Step 103, it is instructed according to data dump, controlling terminal removes user data.
As an implementation, this step includes: that data dump instruction is sent to terminal, is removed and is used with controlling terminal
User data.The terminal of this step refers to that user determines the terminal sold.Controlling terminal is instructed according to data dump, removes number of users
According to mode include it is a variety of, for example, controlling terminal delete user data index information;Or controlling terminal is used for storing
The memory of user data is formatted;The encryption key of controlling terminal removing user data;Or controlling terminal is in number of users
According to address on the second preset data is written, user data is completely covered, wherein the second preset data is different from user data;
Either controlling terminal identifies the interface element for removing user data, and controlling terminal executes behaviour corresponding with interface element
Make, to remove user data.Three of the above mode will be described in detail hereinafter, and and therefore not to repeat here.
As another embodiment, this step includes: and obtains to clear data the operating position of operation for controlling terminal;
Operating device is controlled in operating position, to execute touch control operation, so that terminal removes user data.Wherein, it obtains for controlling
Terminal clears data the operating position of operation, comprising: shoots to terminal display interface, obtains shooting image;Parsing shooting
Image determines the operating position that user data is removed for controlling terminal.Above each step will be described in detail hereinafter,
And therefore not to repeat here.It clears data the operative position of operation further, it is also possible to obtain by another way for controlling terminal
It sets, such as terminal reclaimer detects the position of terminal by position sensor, according to the position of terminal, determines for controlling end
Hold the operating position for the operation that clears data.For supporting the terminal of space-by-space operation, operating position can be offset terminal one
The position of set a distance.
The embodiment of the present invention can generate terminal data clearance order after receiving user and determining the information for selling terminal,
User data is removed with controlling terminal, it is ensured that improves the safety of user data.
Referring to figure 2., be the embodiment of the present invention data clearing method second procedure schematic diagram.Specifically, data are clear
Except method includes:
Step 201, it receives user and determines the information for selling terminal.This step hereinbefore describes in detail, therefore herein
It does not repeat.
Step 202, the information for selling terminal is determined based on user, generates data dump instruction.Step is hereinbefore made
It is discussed in detail, and therefore not to repeat here.
Step 203, data dump instruction is sent to terminal, user data is removed with controlling terminal.End in this step
End refers to that user determines the terminal sold.There are many embodiments of step 203.
The first embodiment, step 203 include: that data dump instruction is sent to terminal, are removed and are used with controlling terminal
The encryption key of user data.Wherein, encryption key is a kind of transformation rule information that user data is converted to ciphertext by plaintext.It adopts
User data can be quickly removed with present embodiment.
Second of embodiment, step 203 include: that data dump instruction is sent to terminal, are being detected with controlling terminal
When not being encrypted to user data, controlling terminal encrypts user data, and controlling terminal generates the encryption of user data
Key and controlling terminal remove the encryption key.Specifically, controlling terminal removes the encryption key, comprising: controlling terminal obtains
New data are written in the storage address of the encryption key for the storage address and controlling terminal for taking the encryption key, with covering
The encryption key.User data can quickly be removed using present embodiment.
Further, step 203 includes: that data dump instruction is sent to terminal, detects user data with controlling terminal
Whether it is encrypted, if detecting, user data has been encrypted, and controlling terminal removes the encryption key of user data;If detecting
User data is not encrypted, then controlling terminal encrypts user data, and the encryption of controlling terminal generation user data is close
Key and controlling terminal remove the encryption key.
Further, step 203 includes: that data dump instruction is sent to terminal, detects number of users with controlling terminal
Whether according to being encrypted, if detecting, user data is not encrypted, detects whether terminal supports encryption user data;If detecting
Terminal supports encryption user data, then controlling terminal encrypts user data, and controlling terminal generates adding for user data
Key.In addition, the first embodiment further include: if detecting, terminal does not support encryption user data, obtains number of users
According to storage address and controlling terminal storage address be written the second preset data, user data is completely covered.Wherein,
Whether detection terminal supports encryption user data specifically: whether detection terminal has to for being encrypted to user data
Control, control can be the application program for encryption, or the hardware and software for being encrypted to user data.
The third embodiment, step 203 include: that data dump instruction is sent to terminal, are being detected with controlling terminal
When not supporting encryption user data to terminal, the storage address and controlling terminal for obtaining user data are written in storage address
Second preset data, user data is completely covered.Wherein, the second preset data is the data different from user data.When
When the size of two preset datas is less than user data, specifically, the second preset data is written in storage address in controlling terminal, with complete
The step of all standing user data, comprising: controlling terminal is continuously written into multiple second preset datas in storage address, to cover completely
Lid user data.By the way that the second preset data is written in a manner of covering user data, compared to the encryption for removing user data
For key, user data can be more thoroughly removed, the safety of user data is further improved.
Further, step 203 includes: that data dump instruction is sent to terminal, whether detects terminal with controlling terminal
It supports encryption user data, if terminal does not support encryption user data, obtains the storage address of user data, and control
The second preset data is written in storage address in terminal, user data is completely covered.In addition, second of embodiment further include:
If detecting, terminal supports encryption user data, and whether controlling terminal detection user data is encrypted, if detecting number of users
According to unencryption, then controlling terminal encrypts user data, and controlling terminal generates the encryption key of user data, and control
Terminal processed removes the encryption key;If detecting, user data has been encrypted, and controlling terminal removes the encryption key.
4th kind of embodiment, the encryption key of user data are stored in the encryption key of the central processing unit of terminal,
In such cases, step 203 includes: that data dump instruction is sent to terminal, obtains user data to control central processing unit
Encryption key storage address, and control central processing unit the storage address be written the first preset data, wherein first
Preset data is the data different from the encryption key of user data.It can be to user data by the first preset data of write-in
Encryption key is covered, to achieve the purpose that the encryption key for removing user data.Due to what is removed in central processing unit
The encryption key of user data is difficult to restore it, and therefore, the 4th kind of mode can further improve user
The safety of data.
Further, step 203 includes: that data dump instruction is sent to terminal, obtains user data with controlling terminal
The storage address of encryption key;And controlling terminal parses the storage address, to judge whether the encryption key is stored in terminal
Central processing unit;If the encryption key is stored in central processing unit, central processing unit is controlled in the storage address and is written first
Preset data, wherein the first preset data is the data different from the encryption key of user data.
Data dump instruction is sent to terminal, shows data dump interface with controlling terminal by the 5th kind of embodiment,
In, data dump interface includes the interface element for removing user data;Controlling terminal parses data dump interface, with identification
Interface element;And controlling terminal executes operation corresponding with the interface element, to remove user data.Wherein, interface element
It can be icon, widget or the function choosing-item column etc. shown on end-user interface.Terminal executes and the interface element
Corresponding operation is the operation for removing user data.When data dump interface is specifically as follows factory reset interface
When, the interface element for removing user data is specifically as follows function choosing-item column, terminal corresponding to factory reset and holds
Capable operation corresponding with the interface element can be specially the operation to terminal progress factory reset.
Preferably, data dump instruction is sent to terminal, data dump interface is shown with controlling terminal, comprising: will count
It is sent to terminal according to clearance order, the operating process for being switched to data dump interface from current display interface is obtained with controlling terminal
Information, and controlling terminal shows data dump interface according to the operating process information.Specifically, as an implementation, it grasps
It include: opening system set interface as procedure information;The interface element of " factory reset " is searched in system set interface;It holds
The corresponding operation of interface element of row " factory reset ", to open factory reset interface.For different types of end
End, the operating process information that controlling terminal is switched to data dump interface is different, does not enumerate herein.
The embodiment of the present invention can generate terminal data clearance order after receiving user and determining the information for selling terminal,
And data dump instruction is sent to terminal, it is instructed with controlling terminal based on data dump, removes user data automatically, can be improved
The safety of user data.
Referring to figure 3., be the embodiment of the present invention data clearing method third flow diagram.In the present embodiment, number
It is used for terminal reclaimer according to sweep-out method, terminal reclaimer to be the equipment for being traded and being recycled to terminal.Terminal
Reclaimer includes the operating device for touch control operation.Specifically, data clearing method includes:
Step 301, it receives user and determines the information for selling terminal.This step hereinbefore describes in detail, therefore herein
It does not repeat.
Step 302, the information for selling terminal is determined based on user, generates data dump instruction.Step is hereinbefore made
It is discussed in detail, and therefore not to repeat here.
Step 303, it is instructed according to data dump, terminal screen is shot, obtain shooting image.Shooting figure seems pair
What terminal screen was shot obtains original shooting image.Shooting image includes the image of terminal screen.Specifically, terminal recycles
Equipment includes the camera for being shot to terminal.Step 203 is specifically, terminal reclaimer is referred to based on data dump
It enables, control camera shoots terminal display interface, obtains shooting image.
Step 304, parsing shooting image, determines the operating position that user data is removed for controlling terminal.
As an implementation, terminal screen includes the operation element that user data is removed for triggering terminal.Wherein
Operating element can be the Touch control key on terminal screen, or the interface for being used to remove user data that terminal screen is shown
Element.Interface element can be icon, widget or the function choosing-item column etc. shown on end-user interface.
Specifically, step 304 includes: parsing shooting image, to determine the position of operation element;Position based on operation element
It sets, determines the operating position of operating device.Wherein, operating position can be the position of operation element, be also possible to opposite operate
The position of the positional shift certain distance of element.Wherein, parsing shooting image, with determine operation element position the step of, packet
Include: analysis shooting image identifies the operation element for removing user data;Determine the position of operation element.Further, divide
The step of analysis shoots image, identifies the operation element for removing user data, comprising: obtain the feature letter of the operation element
Breath;The region that inquiry matches with this feature information in shooting image, is determined as the operation element for the region.Specifically,
Characteristic information includes color characteristic information, texture feature information, spatial relation characteristics information and/or shape feature information.
It is worth noting that, in order to make terminal screen show the interface element for removing user data, terminal recycling is set
Standby that interface element idsplay order can be sent to terminal, interface element idsplay order is shown for controlling terminal for removing user
The interface element of data.
As another embodiment, can be by touch control operation that is specific, not needing trigger action element, control is eventually
User data is removed at end, which can be specific space-by-space operation.Step 304 can parse shooting image, to analyze use
In the position for the touch control operation for removing user data, and the position that this is analyzed is determined as the operating position of operating device.Tool
Body, for Proximity operation, operating position can be any position in the range of terminal screen, or can also be with
For position of the space-by-space operation sensing device as where front camera of terminal.Therefore, it can parse shooting image, to identify end
The position for holding screen or space-by-space operation sensing device determines operation according to the position of terminal screen or space-by-space operation sensing device
The operating position of device.
Step 305, control operating device executes touch control operation in operating position, so that terminal removes user data.Wherein,
Operating device is specifically as follows stylus, and stylus is specifically as follows capacitance pen, and wherein capacitance pen is made using conductor material
With conductive characteristic, for touch control capacitance formula screen complete human-computer dialogue operation pen.In addition, on terminal reclaimer also
Equipped with the driving mechanism moved for controlling operating device, operating device is located in driving mechanism, and terminal reclaimer is logical
It crosses control driving mechanism to be moved accordingly, to drive operating device to execute corresponding touch control operation.Touch control operation can be
Touch operation to terminal, or to the Proximity operation (such as space-by-space operation) of terminal.Operation element relative to touch screen
For, touch control operation can be clicking operation.
Specifically, when the position when operating device before implementation steps 305 is with operating position difference, step 305 includes:
Control operating device is moved to operating position;It controls operating device and executes touch control operation in operating position, used so that terminal is removed
User data.
The embodiment of the present invention can generate terminal data clearance order after receiving user and determining the information for selling terminal,
And the safety of user data can be improved so that terminal removes user data by executing manipulation operation to terminal.
Referring to figure 4., be the embodiment of the present invention data clearing method the 4th flow diagram.In the present embodiment, number
Terminal is used for according to sweep-out method.Wherein, terminal includes but is not limited to mobile phone, tablet computer or intelligent wearable device.Specifically, number
According to sweep-out method, comprising:
Step 401, data dump instruction is received.Wherein, data dump instruction is that the letter for selling terminal is determined according to user
Cease the instruction generated.Specifically, data dump instruction is terminal reclaimer or server according to the determining sale terminal of user
The instruction that information generates.Specifically, the data dump that step 401 can send over for reception terminal reclaimer or server
Instruction.Server is specifically as follows Cloud Server.
Step 402, it is instructed according to data dump, removes user data.There are many embodiments of step 402.
The first embodiment, step 402 include: to be instructed according to data dump, remove the encryption key of user data.Its
In, encryption key is a kind of transformation rule information that user data is converted to ciphertext by plaintext.It can be fast using present embodiment
The removing user data of speed.
Second of embodiment, step 402 include: to be instructed according to data dump, are detecting that user data is not encrypted
When, user data is encrypted, and generate the encryption key of user data, and the encryption key is removed in control.Specifically, clearly
Except the encryption key, comprising: obtain the storage address of the encryption key, and be written newly in the storage address of the encryption key
Data, to cover the encryption key.User data can quickly be removed using present embodiment.
Further, step 402 includes: to be instructed according to data dump, and whether detection user data is encrypted, if detecting
User data has been encrypted, then removes the encryption key of user data;If detecting, user data is not encrypted, to number of users
According to being encrypted, and the encryption key of user data is generated, and remove the encryption key.
Further, step 402 includes: to be instructed according to data dump, and whether detection user data is encrypted, if detection
It is not encrypted to user data, then detects whether terminal supports encryption user data;If detecting, terminal supports encryption number of users
According to then being encrypted to user data, and generate the encryption key of user data.In addition, the first embodiment further include: if
Detect that terminal does not support encryption user data, then the storage address and controlling terminal for obtaining user data are in storage address
The second preset data is written, user data is completely covered.Wherein, whether detection terminal supports encryption user data specifically:
Whether detection terminal has to the control for being encrypted to user data, and control can be the application program for encryption,
Or the hardware and software for being encrypted to user data.
The third embodiment, step 402 include: to be instructed according to data dump, are used detecting that terminal is not supported to encrypt
When user data, the storage address of user data is obtained, and the second preset data is written in storage address, user is completely covered
Data.Wherein, the second preset data is the data different from user data.When the size of the second preset data is less than user data
When, specifically, the second preset data is written in storage address, the step of user data is completely covered, comprising: in storage address
Multiple second preset datas are continuously written into, user data is completely covered.By the second preset data of write-in to cover number of users
According to mode, compared to remove user data encryption key for, can more thoroughly remove user data, further
Improve the safety of user data.
Further, step 402 includes: to be instructed according to data dump, and whether detection terminal supports encryption user data, if
When terminal does not support encryption user data, then the storage address of user data is obtained, and default in storage address write-in second
Data, user data is completely covered.In addition, second of embodiment further include: if detecting, terminal supports encryption number of users
According to then detecting whether user data is encrypted, if detecting user data unencryption, encrypted to user data, and is raw
At the encryption key of user data, and remove the encryption key;If detecting, user data has been encrypted, and it is close to remove the encryption
Key.
4th kind of embodiment, the encryption key of user data are stored in the encryption key of the central processing unit of terminal,
In such cases, step 402 includes: to be instructed according to data dump, and control central processing unit obtains the encryption key of user data
Storage address, and control central processing unit the storage address be written the first preset data, wherein the first preset data is
The data different from the encryption key of user data.By the first preset data of write-in can encryption key to user data into
Row covering, to achieve the purpose that the encryption key for removing user data.Due to the user data removed in central processing unit
Encryption key is difficult to restore it, and therefore, the 4th kind of mode can further improve the safety of user data
Property.
Further, step 402 includes: to be instructed according to data dump, obtains the storage address of the encryption key of user data;
And the storage address is parsed, to judge whether the encryption key is stored in the central processing unit of terminal;If the encryption key stores
In central processing unit, then central processing unit is controlled in the storage address, the first preset data is written, wherein the first preset data is
The data different from the encryption key of user data.
5th kind of embodiment, instructs according to data dump, shows data dump interface, wherein data dump interface packet
Include the interface element for removing user data;Data dump interface is parsed, to identify interface element;And it executes and the interface
The corresponding operation of element, to remove user data.Wherein, interface element can be icon, the window shown on end-user interface
Mouth widget or function choosing-item column etc..Terminal executes operation corresponding with the interface element as the behaviour for removing user data
Make.When data dump interface is specifically as follows factory reset interface, the interface element for removing user data is specific
It can be function choosing-item column corresponding to factory reset, the operation corresponding with the interface element that terminal executes is specially can
For the operation for carrying out factory reset to terminal.
Preferably, instructed according to data dump, show data dump interface, comprising: instructed according to data dump, obtain from
Current display interface is switched to the operating process information at data dump interface, and according to the operating process information, shows that data are clear
Except interface.Specifically, as an implementation, operating process information includes: opening system set interface;In system, circle is set
Search the interface element of " factory reset " in face;The corresponding operation of interface element of " factory reset " is executed, to open
Factory reset interface.For different types of terminal, controlling terminal is switched to the operating process information at data dump interface
It is different, it does not enumerate herein.
Further, it is also possible to instruct according to data dump, the index information of user data is removed, or to for storing number of users
According to memory be formatted.
The embodiment of the present invention receives data dump instruction by terminal, and is instructed according to data dump, removes user data,
The safety of user data can be improved.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
The embodiment of the present invention provides a kind of terminal reclaimer, including memory, processor and storage are in memory
And the computer program that can be run on a processor, processor realize above-mentioned data clearing method when executing computer program.
The embodiment of the present invention provides a kind of terminal, including memory, processor and storage in memory and can located
The computer program run on reason device, processor realize above-mentioned data clearing method when executing the computer program.
The embodiment of the present invention provides a kind of terminal reclaimer, including above-mentioned terminal reclaimer and above-mentioned terminal.
The embodiment of the present invention provides a kind of computer readable storage medium, and computer-readable recording medium storage has computer
Program realizes above-mentioned data clearing method when computer program is executed by processor.
Fig. 5 is the structural schematic diagram for the terminal reclaimer that one embodiment of the invention provides.As shown in figure 5, the embodiment
Terminal reclaimer 5 include: processor 50, memory 51 and be stored in the memory 51 and can be in the processor
The computer program 52 run on 50.The processor 50 realizes above-mentioned each data dump when executing the computer program 52
Step in embodiment of the method, such as step 101 shown in FIG. 1 is to 103.
Illustratively, the computer program 52 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 51, and are executed by the processor 50, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 52 in the terminal reclaimer 5 is described.For example, the computer program 52 can be with
Be divided into receiving module, directive generation module and control module, each module concrete function is as follows: receiving module is for receiving
User determines the information for selling terminal;Directive generation module is used to determine that the information for selling terminal, generation data are clear based on user
Except instruction;For control module for being instructed according to data dump, controlling terminal removes user data.
It will be understood by those skilled in the art that Fig. 5 is only the example of terminal reclaimer 5, structure paired terminal is not returned
The restriction of receiving unit 5 may include perhaps combining certain components or different components than illustrating more or fewer components,
Such as the terminal reclaimer can also include input-output equipment, network access equipment, bus etc..
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 51 can be the storage equipment built in the terminal reclaimer, such as hard disk or memory.It is described
What memory 51 was also possible to be equipped on the External memory equipment of the terminal reclaimer 5, such as the terminal reclaimer 5
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 51 can also have been deposited both the inside including the terminal reclaimer 5
Storage unit also includes External memory equipment.The memory 51 is for storing the computer program and terminal recycling
Other programs and data needed for equipment.The memory 51, which can be also used for temporarily storing, have been exported or will export
Data.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed each device and method can pass through it
Its mode is realized.For example, the embodiment of each device described above is only schematical, for example, the module or
The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling or direct-coupling or communication connection discussed can be through some interfaces, device or unit
INDIRECT COUPLING or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..Computer-readable Jie
Matter may include: can carry the computer program code any entity or device, recording medium, USB flash disk, mobile hard disk,
Magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (16)
1. a kind of data clearing method characterized by comprising
It receives user and determines the information for selling terminal;
The information for selling terminal is determined based on the user, generates data dump instruction;
It is instructed according to the data dump, controlling terminal removes user data.
2. data clearing method as described in claim 1, which is characterized in that described to be instructed according to the data dump, control
Terminal removes user data, comprising:
Data dump instruction is sent to terminal, user data is removed with controlling terminal.
3. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end
End user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, the encryption key of the user data is removed with controlling terminal.
4. data clearing method as claimed in claim 3, which is characterized in that the encryption key is stored in the center of terminal
The encryption key of processor;
It is described that data dump instruction is sent to terminal, the encryption key of the user data is removed with controlling terminal, is had
Body includes:
Data dump instruction is sent to terminal, to control the storage that the central processing unit obtains the encryption key
First different from the encryption key are written in the storage address of the encryption key in location, and the control central processing unit
Preset data.
5. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end
End user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, it is right with controlling terminal when detecting that the user data is not encrypted
The user data is encrypted, and controlling terminal generates the encryption key of the user data and controlling terminal removes institute
State encryption key.
6. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end
End user data is removed with controlling terminal, comprising:
By the data dump instruction be sent to terminal, with controlling terminal detect the terminal do not support encryption user data
When, the storage address and controlling terminal for obtaining the user data are in the storage address the second preset data of write-in, with complete
User data described in all standing.
7. data clearing method as claimed in claim 2, which is characterized in that described that data dump instruction is sent to end
End user data is removed with controlling terminal, comprising:
Data dump instruction is sent to terminal, data dump interface, the data dump interface are shown with controlling terminal
Including the interface element for removing user data;Controlling terminal parses the data dump interface, to identify the Interface Element
Element and controlling terminal execute operation corresponding with the interface element, to remove user data.
8. data clearing method as described in claim 1, which is characterized in that the data clearing method is set for terminal detection
Standby, the detection device includes the operating device for touch control operation;
The controlling terminal removes user data, comprising:
It obtains and clears data the operating position of operation for controlling terminal;
The operating device is controlled in the operating position, to execute touch control operation, so that terminal removes the user data.
9. data clearing method as claimed in claim 8, which is characterized in that described obtain clears data behaviour for controlling terminal
The operating position of work, comprising:
The terminal screen is shot, shooting image is obtained;
The shooting image is parsed, determines the operating position for removing user data for controlling terminal.
10. data clearing method as claimed in claim 9, which is characterized in that the terminal display interface includes for controlling
The interface element of terminal removing user data;
The parsing shooting image, determines the operating position that user data is removed for controlling terminal, comprising:
The shooting image is parsed, determines the position of interface element;
Based on the position of the interface element, the operating position is determined.
11. data clearing method as claimed in claim 10, which is characterized in that described to clap the terminal display interface
Take the photograph, obtain shooting image before, further includes:
Interface element idsplay order is sent to terminal, the interface display instruction shows the Interface Element for controlling the terminal
Element.
12. a kind of data clearing method characterized by comprising
Data dump instruction is received, the data dump instruction is the instruction for determining the information for selling terminal according to user and generating;
It is instructed according to the data dump, removes user data.
13. a kind of terminal reclaimer, which is characterized in that including memory, processor and store in the memory simultaneously
The computer program that can be run on the processor, the processor realize such as claim when executing the computer program
1 to 11 described in any item data clearing methods.
14. a kind of terminal, which is characterized in that in the memory and can be described including memory, processor and storage
The computer program run on processor, the processor are realized as claimed in claim 12 when executing the computer program
Data clearing method.
15. a kind of terminal recovery system, which is characterized in that including as claimed in claim 13 and terminal reclaimer and such as right
It is required that terminal described in 14.
16. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In realization such as claim 1 to 12 described in any item data clearing methods when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710496609.6A CN109117645A (en) | 2017-06-26 | 2017-06-26 | Data clearing method and its device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710496609.6A CN109117645A (en) | 2017-06-26 | 2017-06-26 | Data clearing method and its device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109117645A true CN109117645A (en) | 2019-01-01 |
Family
ID=64822255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710496609.6A Pending CN109117645A (en) | 2017-06-26 | 2017-06-26 | Data clearing method and its device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109117645A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110333876A (en) * | 2019-07-09 | 2019-10-15 | 上海悦易网络信息技术有限公司 | A kind of data clearing method and control equipment |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101483697A (en) * | 2009-02-23 | 2009-07-15 | 惠州Tcl移动通信有限公司 | Mobile communication terminal and message automatic cleaning method thereof |
CN101505335A (en) * | 2008-06-05 | 2009-08-12 | 华为技术有限公司 | Method and terminal device for erasing terminal data and terminal equipment |
CN101651864A (en) * | 2008-08-14 | 2010-02-17 | 比亚迪股份有限公司 | Method for managing file in mobile terminal and mobile terminal |
CN101764885A (en) * | 2009-12-22 | 2010-06-30 | 中兴通讯股份有限公司 | Data deletion method and device on mobile terminal |
CN102209149A (en) * | 2011-05-25 | 2011-10-05 | 惠州Tcl移动通信有限公司 | Wireless communication equipment and information clearing method |
CN102387232A (en) * | 2010-09-03 | 2012-03-21 | 宁波普天通信技术有限公司 | General mobile phone testing system based on triaxial pushbutton and pattern recognition |
CN103473442A (en) * | 2013-08-26 | 2013-12-25 | 深圳市海目星激光科技有限公司 | Visual positioning method, device and system for assembly line work |
CN103678100A (en) * | 2012-09-10 | 2014-03-26 | 联芯科技有限公司 | Application automatic testing method and system of terminal |
CN104182254A (en) * | 2014-08-21 | 2014-12-03 | 上海瀚银信息技术有限公司 | Method and system for resetting mobile payment card reader to factory state |
CN104488300A (en) * | 2014-06-24 | 2015-04-01 | 华为技术有限公司 | Equipment management method and device, system |
US20150242851A1 (en) * | 2012-04-06 | 2015-08-27 | Google Inc. | Secure reset of personal and service provider information on mobile devices |
CN105630965A (en) * | 2015-12-24 | 2016-06-01 | 西安电子科技大学 | System and method for securely deleting file from user space on mobile terminal flash medium |
CN105653397A (en) * | 2015-09-30 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Recovery processing method, apparatus and electronic device |
CN105872192A (en) * | 2015-12-08 | 2016-08-17 | 乐视移动智能信息技术(北京)有限公司 | Control method and device for mobile terminals |
CN105956442A (en) * | 2016-04-29 | 2016-09-21 | 宇龙计算机通信科技(深圳)有限公司 | Data clearing method and terminal device |
CN106201796A (en) * | 2016-07-04 | 2016-12-07 | 珠海市魅族科技有限公司 | The collocation method of a kind of test and device |
-
2017
- 2017-06-26 CN CN201710496609.6A patent/CN109117645A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101505335A (en) * | 2008-06-05 | 2009-08-12 | 华为技术有限公司 | Method and terminal device for erasing terminal data and terminal equipment |
CN101651864A (en) * | 2008-08-14 | 2010-02-17 | 比亚迪股份有限公司 | Method for managing file in mobile terminal and mobile terminal |
CN101483697A (en) * | 2009-02-23 | 2009-07-15 | 惠州Tcl移动通信有限公司 | Mobile communication terminal and message automatic cleaning method thereof |
CN101764885A (en) * | 2009-12-22 | 2010-06-30 | 中兴通讯股份有限公司 | Data deletion method and device on mobile terminal |
CN102387232A (en) * | 2010-09-03 | 2012-03-21 | 宁波普天通信技术有限公司 | General mobile phone testing system based on triaxial pushbutton and pattern recognition |
CN102209149A (en) * | 2011-05-25 | 2011-10-05 | 惠州Tcl移动通信有限公司 | Wireless communication equipment and information clearing method |
US20150242851A1 (en) * | 2012-04-06 | 2015-08-27 | Google Inc. | Secure reset of personal and service provider information on mobile devices |
CN103678100A (en) * | 2012-09-10 | 2014-03-26 | 联芯科技有限公司 | Application automatic testing method and system of terminal |
CN103473442A (en) * | 2013-08-26 | 2013-12-25 | 深圳市海目星激光科技有限公司 | Visual positioning method, device and system for assembly line work |
CN104488300A (en) * | 2014-06-24 | 2015-04-01 | 华为技术有限公司 | Equipment management method and device, system |
CN104182254A (en) * | 2014-08-21 | 2014-12-03 | 上海瀚银信息技术有限公司 | Method and system for resetting mobile payment card reader to factory state |
CN105653397A (en) * | 2015-09-30 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Recovery processing method, apparatus and electronic device |
CN105872192A (en) * | 2015-12-08 | 2016-08-17 | 乐视移动智能信息技术(北京)有限公司 | Control method and device for mobile terminals |
CN105630965A (en) * | 2015-12-24 | 2016-06-01 | 西安电子科技大学 | System and method for securely deleting file from user space on mobile terminal flash medium |
CN105956442A (en) * | 2016-04-29 | 2016-09-21 | 宇龙计算机通信科技(深圳)有限公司 | Data clearing method and terminal device |
CN106201796A (en) * | 2016-07-04 | 2016-12-07 | 珠海市魅族科技有限公司 | The collocation method of a kind of test and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110333876A (en) * | 2019-07-09 | 2019-10-15 | 上海悦易网络信息技术有限公司 | A kind of data clearing method and control equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104992094A (en) | Terminal operation method and terminal | |
CN105242870A (en) | False touch method and device of terminal with touch screen | |
CN109656608A (en) | A kind of MCU firmware upgrade method and its relevant device | |
CN105487641B (en) | Control method and device of terminal equipment | |
CN104808940B (en) | Inter-terminal data transmission method and device | |
CN106096043B (en) | A kind of photographic method and mobile terminal | |
US20210150243A1 (en) | Efficient image sharing | |
CN110457963A (en) | Display control method, device, mobile terminal and computer readable storage medium | |
CN109151337A (en) | Recognition of face light compensation method, recognition of face light compensating apparatus and mobile terminal | |
CN112949172A (en) | Data processing method and device, machine readable medium and equipment | |
CN107317928B (en) | Information processing method, mobile terminal and computer readable storage medium | |
CN109359582A (en) | Information search method, information search device and mobile terminal | |
CN108334267A (en) | A kind of cursor-moving method, system and terminal device | |
CN108733799A (en) | A kind of method for processing report data, device and terminal | |
CN107272989B (en) | Using starting method, apparatus and terminal device | |
CN107678788A (en) | Five application page display methods, device, computer installation and storage medium | |
CN110174946A (en) | Mouse action analogy method, simulation system, storage medium and electronic equipment | |
CN109117645A (en) | Data clearing method and its device | |
US20160379033A1 (en) | Interaction method and apparatus | |
CN109146495A (en) | Method and device for quickly and safely starting payment and terminal equipment | |
CN109358927A (en) | The method, apparatus and terminal device that application program is shown | |
CN106020712B (en) | Touch gesture recognition method and device | |
CN104750401A (en) | Touch method and related device as well as terminal equipment | |
CN109144379A (en) | Method, terminal detection device, system and the storage medium that terminal is operated | |
CN105069332A (en) | Fingerprint-based password authentication method and password authentication apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190101 |
|
RJ01 | Rejection of invention patent application after publication |