CN109831575A - The method for deleting and erasing system of private data in Android mobile phone - Google Patents

The method for deleting and erasing system of private data in Android mobile phone Download PDF

Info

Publication number
CN109831575A
CN109831575A CN201811603097.XA CN201811603097A CN109831575A CN 109831575 A CN109831575 A CN 109831575A CN 201811603097 A CN201811603097 A CN 201811603097A CN 109831575 A CN109831575 A CN 109831575A
Authority
CN
China
Prior art keywords
mobile phone
sensitive information
data
random
private data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811603097.XA
Other languages
Chinese (zh)
Inventor
常树林
咸睿
单志锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yueyi Network Information Technology Co Ltd
Original Assignee
Shanghai Yueyi Network Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yueyi Network Information Technology Co Ltd filed Critical Shanghai Yueyi Network Information Technology Co Ltd
Priority to CN201811603097.XA priority Critical patent/CN109831575A/en
Publication of CN109831575A publication Critical patent/CN109831575A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of method for deleting of private data in Android mobile phone comprising: the preliminary data and application deleted on mobile phone;Obtain the access limit of sensitive information in mobile phone;It reads and deletes the sensitive information;Imaginary random sensitive information, covering to the position of the deleted sensitive information are generated, the quantity of the random sensitive information is greater than the quantity of deleted sensitive information;The imaginary random sensitive information is deleted after the completion of covering;Obtain the access limit of mobile phone EMS memory;Random data is generated, mobile phone residue free memory is filled up;It completes to remove.The present invention is in Android mobile phone by way of the data write-in and erasing of storage content repeatedly, to ensure that legacy data can not be resumed and restore, so as to thoroughly remove the private data in Android mobile phone, user can autonomous one-touch removing privacy, after the present invention, by data reduction tool or software, the private data of original subscriber can not be gone back.

Description

The method for deleting and erasing system of private data in Android mobile phone
Technical field
The present invention relates to a kind of erasings of private data in data erasing and recovery technology field more particularly to Android mobile phone Method and erasing system.
Background technique
After mobile phone recycling at present, all it is the factory reset provided by producer, carries out the removing of Android mobile phone data And reduction.
Restore factory to be only only marked for original data in disk, there is no really dispose Android mobile phone Private data in disk still can be restored to a large amount of private data by data recovery ways, to cause user's Privacy compromise
Summary of the invention
In view of this, being allowed the embodiment of the invention provides the method for deleting of private data in Android mobile phone and erasing system Android mobile phone user can independently thoroughly remove the private data in mobile phone, can be resumed and restore without concern of data.
The first aspect of the present invention provides a kind of method for deleting of private data in Android mobile phone, and described includes erasing side Method step:
The preliminary data and application deleted on mobile phone;
Obtain the access limit of sensitive information in mobile phone;
It reads and deletes the sensitive information;
Generate imaginary random sensitive information, covering to the position of the deleted sensitive information, the random sensitivity The quantity of information is greater than the quantity of deleted sensitive information;
The imaginary random sensitive information is deleted after the completion of covering;
Obtain the access limit of mobile phone EMS memory;
Random data is generated, mobile phone residue free memory is filled up;And
It completes to remove.
Preferably, when the step of preliminary data and application deleted on mobile phone is factory reset, in mobile phone The access limit for obtaining mobile phone EMS memory is jumped directly to after factory reset, generates random data, fills up mobile phone residue The step of free memory, completes to remove.
Preferably, it is described it is preliminary delete mobile phone on data and application the step of operated by software, the software loading in The delete operation is carried out in the mobile phone and after obtaining mobile phone authorization
Preferably, the sensitive information includes: contact information, short message, message registration information, calendar information.
Preferably, described the step of obtaining the access limit of sensitive information in mobile phone, includes:
Set the stored items of sensitive information in mobile phone;
It searches for the stored items and generates the inquiry page of confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of the stored items.
Preferably, the step of access limit for obtaining mobile phone EMS memory, includes:
Searching handset memory and the inquiry page for generating confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of mobile phone EMS memory.
Preferably, the generation random data, the step of filling up mobile phone residue free memory, includes:
Read the size of mobile phone residue free memory;
Generate random data identical with the free memory size;
The random data is covered to the position of the free memory.
Preferably, the random sensitive information and the random data include but is not limited to: text, punctuation mark, character, Number, figure, picture.
The second aspect of the present invention provides a kind of erasing system of private data in Android mobile phone, the erasing system packet It includes:
Authority acquiring module, for obtaining the read-write of the access limit of sensitive information and/or the mobile phone EMS memory in mobile phone Permission;
First module for reading and writing generates imaginary random sensitive information, covering is extremely for reading and deleting the sensitive information The position of the deleted sensitive information;And
Second module for reading and writing fills up mobile phone residue free memory for generating random data.
Preferably, the erasing system further includes abnormal show module, it is abnormal for being shown in the improper interruption of system The information of interruption.
The present invention due to the adoption of the above technical scheme, passes through the data write-in and wiping to storage content in Android mobile phone repeatedly The mode removed, to ensure that legacy data can not be resumed and restore, so as to thoroughly remove the private data in Android mobile phone, User can autonomous one-touch removing privacy, by data reduction tool or software, use can not be restored after the present invention The private data at family.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 shows the exemplary main step of the method for deleting of private data in Android mobile phone according to an embodiment of the present invention Rapid figure.
Fig. 2 shows the exemplary flow of the method for deleting of private data in Android mobile phone according to an embodiment of the present invention Figure.
Fig. 3 shows the module map of the erasing system of private data in Android mobile phone according to an embodiment of the present invention.
Fig. 4 shows the module map of the erasing system of private data in the Android mobile phone of another embodiment of the present invention.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.It is identical attached in figure Icon note indicates same or similar structure, thus will omit repetition thereof.
Described feature, structure or characteristic can be incorporated in one or more embodiments in any suitable manner In.In the following description, many details are provided to provide and fully understand to embodiments of the present invention.However, One of ordinary skill in the art would recognize that without one or more in specific detail, or using other methods, constituent element, material Material etc., can also practice technical solution of the present invention.In some cases, be not shown in detail or describe known features, material or Person operates to avoid the fuzzy present invention.
Technology contents of the invention are described further with reference to the accompanying drawings and examples.
Referring to Figure 1 and shown in Fig. 2, wherein Fig. 1 shows private data in Android mobile phone according to an embodiment of the present invention Method for deleting exemplary key step figure, Fig. 2 shows private data in Android mobile phone according to an embodiment of the present invention The exemplary process diagram of method for deleting, as shown, the method for deleting of private data mainly includes following step in the Android mobile phone It is rapid:
Step S10: the preliminary data and application deleted on mobile phone;
Step S20: the access limit of sensitive information in mobile phone is obtained;
Step S30: reading and deletes the sensitive information;
Step S40: generating imaginary random sensitive information, covers to the position of the deleted sensitive information, described The quantity of random sensitive information is greater than the quantity of deleted sensitive information;
Step S50: the imaginary random sensitive information is deleted after the completion of covering;
Step S60: the access limit of mobile phone EMS memory is obtained;And
Step S70: random data is generated, mobile phone residue free memory is filled up;
Step S80: it completes to remove.
The reservoir of Android mobile phone has been divided multiple subregions, including system partitioning, data subregion etc., wherein system point Area stores mobile phone operating system;Data subregion is then used to store user file, such as contact person, short message, photo, recording and user The APP etc. of downloading.
All subregions can all be divided into two regions: (index) area Inode and Data (data) area after formatting. The area Data stores file itself;The area Inode stores the satellite information of this document, such as filename, size, founder, modification The information such as date and file memory address pointer, wherein address pointer stores location information of the file in the area Data, passes through Address pointer operation, system can position this document and be written and read.When deleting file, operating system is only by Inode The information erasings such as filename and its address pointer (being written into full 0) in area.And the file ontology in the area Data will not be then wiped free of, The region for wiping this document at this time is identified as Free Region by operating system, for storing new file.The region not yet When being written into new data, initial data can be accessed with workaround system using disk tools, lead to the privacy information of user It is leaked.
The method for deleting of private data in a kind of Android mobile phone provided by the invention is exactly stored for above-mentioned Android mobile phone System is easy the security risk being resumed there are private data, by adopting the above technical scheme, in storing in Android mobile phone The mode for holding data write-in and erasing repeatedly, to ensure that legacy data can not be resumed and restore, so as to thoroughly remove Private data in Android mobile phone, user can autonomous one-touch removing privacy, use the erasing side of private data of the present invention After method, by data reduction tool or software, the private data of original subscriber can not be gone back.
Specifically, in step slo, the mode of " opening factory reset " or " installation software " can be used to complete The preliminary data and application deleted on mobile phone.
As shown in Fig. 2, " factory reset " function when using " factory reset " operation, directly on unlatching mobile phone Can, mobile phone resetting is carried out, the data stored on mobile phone is deleted and application can be deleted, jumped directly to after mobile phone factory reset The step of obtaining the access limit of mobile phone EMS memory generates random data after obtaining permission, and filling up mobile phone residue can be empty with storage Between, complete data erasing.
It when using " installation software " operation, is installed on mobile phone and suitably deletes software, software can be awarded obtaining mobile phone Delete operation is carried out after power, executes the operation of " factory reset " function being equivalent on mobile phone, which can be for operation originally The software of the method for deleting of invention private data, system use the erasing system of private data of the present invention.The software is also possible to Have the resetting class software of same or similar function in the market.
Alternatively, the software can also start mobile phone after obtaining authorization when carrying out delete operation by " installation software " On " factory reset " function, realize the operation tentatively deleted, " factory reset " function opened instead of manpower.
As shown in Fig. 2, the step of preliminary deletion in step slo, can not also select factory reset, but only The application on mobile phone is deleted, there can be software or be deleted manually.In such cases, it is also necessary to on mobile phone include sensitive information Private data separately process, to ensure that this part sensitive information will not be resumed.
Specifically, these sensitive informations include but is not limited to: contact information, short message, message registration information, day Go through information.These data are stored in the data field of mobile phone, these database files with USB line because that can not be uploaded on computer, i.e., Computer can not recognize these database files, and therefore, privacy on computer destroys software can not complete deletion this part privacy Data, computer can only be read out and operate to media files such as photo, video, music, recording.In addition, these sensitive informations Different from the other application on mobile phone, general mobile phone resetting can only delete them in the index part of mobile phone index area, not Them can be deleted in the main part in data in mobile phone area.Therefore, after mobile phone resetting, this partial information is probably resumed.
For these sensitive informations, the method for deleting of the embodiment of the present invention is in the access limit for obtaining these sensitive informations Afterwards, it first reads and deletes these sensitive informations, imaginary random sensitive information is then generated, such as by text, punctuation mark, word The random data of the compositions such as symbol, number covers the position of deleted sensitive information with these imaginary random sensitive informations, Also, the quantity of imaginary random sensitive information should be far longer than the quantity of deleted sensitive information, and what is be such as deleted is quick Sense information has 100, it may be necessary to generate random sensitive information as 150-300 item, the random sensitive information of generation is added It is added in the modules such as contact person, short message, message registration or calendar, fills up these modules as far as possible, to guarantee that original record is deleted The position of sensitive information covering is filled up by random sensitive data, even if the information after then on these positions is resumed again, Also it can only be restored to the imaginary random sensitive information being covered on above, the original sensitive letter being capped can not be restored Breath, it is ensured that private data is not leaked.
Wherein, in step S20, in acquisition mobile phone the step of the access limit of sensitive information can include:
Step 1: setting the stored items of sensitive information in mobile phone, such as pre-set needs carry out sensitivity in systems The mobile module of erasing of information, such as contact person, short message, message registration or calendar;
Step 2: searching for stored items and generating the inquiry page of confirmation authorization, system is searched for automatically on mobile phone and has been set The storage location of fixed mobile module generates the page after searching to be confirmed whether authorization access;
The confirmation of the inquiry page is instructed step 3: obtaining, obtains the read-write authorization of stored items, clicks and inquires in user After confirmation frame on the page, system obtains the confirmation instruction of feedback, obtains the access limit of the mobile module.
System can carry out the sensitive information in the mobile module subsequent after the access limit for obtaining corresponding mobile module " reading ", " deletion ", " covering " and the operation of " deleting again ".After the access limit for obtaining all preset mobile modules, The covering and deletion of the sensitive information in all mobile modules are completed, also, completes the sensitive letter of all presetting modules in confirmation After the processing of breath, Returning process main line obtains the access limit of mobile phone EMS memory, enters step S60.
In step S60, the step of obtaining the access limit of mobile phone EMS memory, includes:
Step 1: searching handset memory and generate confirmation authorization the inquiry page;
The confirmation of the inquiry page is instructed step 2: obtaining, obtains the read-write authorization of mobile phone EMS memory.
In step S70, random data is generated, the step of filling up mobile phone residue free memory includes:
Step 1: the size of mobile phone residue free memory is read, due to having carried out a mobile phone resetting at this time Or covering is once deleted excessively to sensitive information, the remaining free memory of mobile phone can achieve maximum at this time;
Step 2: generating random data identical with free memory size, the random data of generation also be can achieve It is maximum;
Step 3: random data to be covered to the position of free memory, use the random data of maximum space can be with Initial data is completely covered in guarantee.
Wherein, random data includes but is not limited to: text, punctuation mark, character, number, figure, picture.
The present invention also provides a kind of embodiments of storage medium, are stored thereon with computer program, and the program is processed The step of method for deleting of private data in the Android mobile phone of aforementioned present invention is realized when device executes.The storage medium can be ROM, RAM etc..
Cooperate shown in Fig. 3, the erasing system of private data in Fig. 3 paraphrase Android mobile phone of one embodiment of the invention Module map runs wiping of the invention after loading the APP system on mobile phone as shown, the erasing system can be APP system Except method, the erasing of private data in Android mobile phone is realized.The erasing system specifically includes that an authority acquiring module 13,1 One module for reading and writing 12 and one second module for reading and writing 13.
Specifically, authority acquiring module 13 is used for authority acquiring module, for obtaining the read-write of sensitive information in mobile phone The access limit of permission and/or mobile phone EMS memory;
First module for reading and writing 11 generates imaginary random sensitive information, covers for reading and deleting the sensitive information To the position of deleted sensitive information, wherein the quantity of the random sensitive information of generation is greater than deleted sensitive information Quantity;And
Second module for reading and writing fills up mobile phone residue free memory for generating random data.
Further, cooperate shown in Fig. 4, private data in the paraphrase Android mobile phone of another embodiment of the present invention in figure Erasing system module map.Wherein, in addition to the basic module comprising the erasing of private data in above-mentioned realization Android mobile phone: power Limit obtains except module 13, the first module for reading and writing 12 and the second module for reading and writing 13, further includes an abnormal show module 14.
Specifically, abnormal show module 16 is used to show the information of abnormal interrupt in the improper interruption of system.Wherein, The case where improper interruption, includes:
Situation 1: cause follow-up process that can not promote because authority acquiring module 13 obtains permission not successfully, in such cases By showing the inquiry page of confirmation authorization repeatedly, until obtaining authorization, continue process;
Situation 2: because the reasons such as artificial, fault of mobile phone, not enough power supply lead to the first module for reading and writing 11 and the second module for reading and writing 12 are forced to interrupt when carrying out data processing, in such cases, need to re-start from new startup program after removing obstacles Erasing processing;
Situation 3: causing data processing to be interrupted because system program reports an error, in such cases, can restarting systems program, Erasing processing is carried out from new.
When there is the case where above-mentioned any abnormal interrupt, system can generate one and include printed words such as " abnormal interrupts " Signal language is shown on mobile phone screen.
It should be noted that this specification structure depicted in this specification institute accompanying drawings, ratio, size etc., only to cooperate The bright revealed content of book is not intended to limit the invention enforceable limit so that those skilled in the art understands and reads Fixed condition, therefore do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size, not It influences still fall in disclosed technology contents under the effect of present invention can be generated and the purpose that can reach and obtain In the range of capable of covering.Meanwhile it is cited such as "upper", "lower", "left", "right", " centre " and " one " in this specification Term is merely convenient to being illustrated for narration, rather than to limit the scope of the invention, the change of relativeness or tune It is whole, under the content of no substantial changes in technology, when being also considered as the enforceable scope of the present invention.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, though So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession Member, in the range of not departing from technical solution of the present invention, when the technology contents using the disclosure above make a little change or repair Decorations are the equivalent embodiment of equivalent variations, but anything that does not depart from the technical scheme of the invention content, technology according to the present invention are real Matter any simple modification, equivalent change and modification to the above embodiments, still fall within the range of technical solution of the present invention It is interior.

Claims (10)

1. the method for deleting of private data in a kind of Android mobile phone, which is characterized in that comprising steps of
The preliminary data and application deleted on mobile phone;
Obtain the access limit of sensitive information in mobile phone;
It reads and deletes the sensitive information;
Generate imaginary random sensitive information, covering to the position of the deleted sensitive information, the random sensitive information Quantity be greater than the quantity of deleted sensitive information;
The imaginary random sensitive information is deleted after the completion of covering;
Obtain the access limit of mobile phone EMS memory;
Random data is generated, mobile phone residue free memory is filled up;And
It completes to remove.
2. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that when the preliminary deletion When the step of data and application on mobile phone is factory reset, described obtain is jumped directly to after mobile phone factory reset The step of taking the access limit of mobile phone EMS memory, generating random data, fill up mobile phone residue free memory completes to remove.
3. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that the preliminary deletion hand The step of data and application on machine, is operated by software, and the software loading is in the mobile phone and laggard obtaining mobile phone authorization The row delete operation
4. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that the sensitive information packet It includes: contact information, short message, message registration information, calendar information.
5. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that in the acquisition mobile phone The step of access limit of sensitive information includes:
Set the stored items of sensitive information in mobile phone;
It searches for the stored items and generates the inquiry page of confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of the stored items.
6. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that in the acquisition mobile phone The step of access limit deposited includes:
Searching handset memory and the inquiry page for generating confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of mobile phone EMS memory.
7. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that the generation random number Include: according to, the step of filling up mobile phone residue free memory
Read the size of mobile phone residue free memory;
Generate random data identical with the free memory size;
The random data is covered to the position of the free memory.
8. such as the method for deleting of private data in Android mobile phone according to any one of claims 1 to 7, which is characterized in that institute It states random sensitive information and the random data includes but is not limited to: text, punctuation mark, character, number, figure, picture.
9. the erasing system of private data in a kind of Android mobile phone characterized by comprising
Authority acquiring module, for obtaining the access limit of sensitive information and/or the access limit of the mobile phone EMS memory in mobile phone;
First module for reading and writing generates imaginary random sensitive information, covering is extremely deleted for reading and deleting the sensitive information The position of the sensitive information removed;And
Second module for reading and writing fills up mobile phone residue free memory for generating random data.
10. the erasing system of private data in Android mobile phone as claimed in claim 9, which is characterized in that the erasing system It further include abnormal show module, for showing the information of abnormal interrupt in the improper interruption of system.
CN201811603097.XA 2018-12-26 2018-12-26 The method for deleting and erasing system of private data in Android mobile phone Pending CN109831575A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811603097.XA CN109831575A (en) 2018-12-26 2018-12-26 The method for deleting and erasing system of private data in Android mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811603097.XA CN109831575A (en) 2018-12-26 2018-12-26 The method for deleting and erasing system of private data in Android mobile phone

Publications (1)

Publication Number Publication Date
CN109831575A true CN109831575A (en) 2019-05-31

Family

ID=66861194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811603097.XA Pending CN109831575A (en) 2018-12-26 2018-12-26 The method for deleting and erasing system of private data in Android mobile phone

Country Status (1)

Country Link
CN (1) CN109831575A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110347341A (en) * 2019-07-09 2019-10-18 上海悦易网络信息技术有限公司 Data clearing method and control equipment
US11798250B2 (en) 2019-02-18 2023-10-24 Ecoatm, Llc Neural network based physical condition evaluation of electronic devices, and associated systems and methods
US11843206B2 (en) 2019-02-12 2023-12-12 Ecoatm, Llc Connector carrier for electronic device kiosk
US11922467B2 (en) 2020-08-17 2024-03-05 ecoATM, Inc. Evaluating an electronic device using optical character recognition

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683336A (en) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 Security-region-based method and system for protecting Android private data
CN106776908A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Data clearing method, device and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683336A (en) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 Security-region-based method and system for protecting Android private data
CN106776908A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Data clearing method, device and terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11843206B2 (en) 2019-02-12 2023-12-12 Ecoatm, Llc Connector carrier for electronic device kiosk
US11798250B2 (en) 2019-02-18 2023-10-24 Ecoatm, Llc Neural network based physical condition evaluation of electronic devices, and associated systems and methods
CN110347341A (en) * 2019-07-09 2019-10-18 上海悦易网络信息技术有限公司 Data clearing method and control equipment
CN110347341B (en) * 2019-07-09 2023-07-04 上海万物新生环保科技集团有限公司 Data clearing method and control equipment
US11922467B2 (en) 2020-08-17 2024-03-05 ecoATM, Inc. Evaluating an electronic device using optical character recognition

Similar Documents

Publication Publication Date Title
CN109831575A (en) The method for deleting and erasing system of private data in Android mobile phone
US10699061B2 (en) Application page quick access
US6957384B2 (en) Document management system
US10108928B2 (en) Systems, methods and apparatus for form building
US9189608B2 (en) Permission management method for applications, electronic device thereof, and computer readable medium
CN104915268A (en) Desktop layout storage and recovery method and device thereof, terminal equipment and system
US8488178B2 (en) Image forming apparatus storage files with file attribution table having deletion date and flag
CN103581318A (en) Data backup and restoration method and device for mobile device
US20140236902A1 (en) User Data Backup Method and Apparatus
US20200159460A1 (en) Method and Apparatus for Selective Erase of Persistent and Non-Volatile Memory Devices
CN103377277A (en) Document management apparatus and document management method
US10027839B2 (en) Business customized multifunction peripherals
CN100483418C (en) Image forming apparatus equiped with auxiliary storage having files to be managed
CN103176920A (en) Nor flash power down protection method and Nor flash power down protection device
US7680980B2 (en) Image forming apparatus
Karle Managing the digital you: Where and how to keep and organize your digital life
CN112749406A (en) Shared image cleaning method and system
CN112749372A (en) Method and system for detecting privacy violation of stored image
JP6167541B2 (en) Content data processing apparatus and content data processing method
EP2413233B1 (en) Android phone with an application for content display
TW201401075A (en) Calendar recording process for mobile appliance capable of receiving emails and text messages
CN112100126A (en) Excel file-based picture storage and content display method and device
US20070211289A1 (en) Print program, information recording medium and print system
US10097718B2 (en) System and method for tracking application information in customizable multifunction peripherals
CN113900996A (en) File processing method and device, storage medium and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190531