CN109831575A - The method for deleting and erasing system of private data in Android mobile phone - Google Patents
The method for deleting and erasing system of private data in Android mobile phone Download PDFInfo
- Publication number
- CN109831575A CN109831575A CN201811603097.XA CN201811603097A CN109831575A CN 109831575 A CN109831575 A CN 109831575A CN 201811603097 A CN201811603097 A CN 201811603097A CN 109831575 A CN109831575 A CN 109831575A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- sensitive information
- data
- random
- private data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of method for deleting of private data in Android mobile phone comprising: the preliminary data and application deleted on mobile phone;Obtain the access limit of sensitive information in mobile phone;It reads and deletes the sensitive information;Imaginary random sensitive information, covering to the position of the deleted sensitive information are generated, the quantity of the random sensitive information is greater than the quantity of deleted sensitive information;The imaginary random sensitive information is deleted after the completion of covering;Obtain the access limit of mobile phone EMS memory;Random data is generated, mobile phone residue free memory is filled up;It completes to remove.The present invention is in Android mobile phone by way of the data write-in and erasing of storage content repeatedly, to ensure that legacy data can not be resumed and restore, so as to thoroughly remove the private data in Android mobile phone, user can autonomous one-touch removing privacy, after the present invention, by data reduction tool or software, the private data of original subscriber can not be gone back.
Description
Technical field
The present invention relates to a kind of erasings of private data in data erasing and recovery technology field more particularly to Android mobile phone
Method and erasing system.
Background technique
After mobile phone recycling at present, all it is the factory reset provided by producer, carries out the removing of Android mobile phone data
And reduction.
Restore factory to be only only marked for original data in disk, there is no really dispose Android mobile phone
Private data in disk still can be restored to a large amount of private data by data recovery ways, to cause user's
Privacy compromise
Summary of the invention
In view of this, being allowed the embodiment of the invention provides the method for deleting of private data in Android mobile phone and erasing system
Android mobile phone user can independently thoroughly remove the private data in mobile phone, can be resumed and restore without concern of data.
The first aspect of the present invention provides a kind of method for deleting of private data in Android mobile phone, and described includes erasing side
Method step:
The preliminary data and application deleted on mobile phone;
Obtain the access limit of sensitive information in mobile phone;
It reads and deletes the sensitive information;
Generate imaginary random sensitive information, covering to the position of the deleted sensitive information, the random sensitivity
The quantity of information is greater than the quantity of deleted sensitive information;
The imaginary random sensitive information is deleted after the completion of covering;
Obtain the access limit of mobile phone EMS memory;
Random data is generated, mobile phone residue free memory is filled up;And
It completes to remove.
Preferably, when the step of preliminary data and application deleted on mobile phone is factory reset, in mobile phone
The access limit for obtaining mobile phone EMS memory is jumped directly to after factory reset, generates random data, fills up mobile phone residue
The step of free memory, completes to remove.
Preferably, it is described it is preliminary delete mobile phone on data and application the step of operated by software, the software loading in
The delete operation is carried out in the mobile phone and after obtaining mobile phone authorization
Preferably, the sensitive information includes: contact information, short message, message registration information, calendar information.
Preferably, described the step of obtaining the access limit of sensitive information in mobile phone, includes:
Set the stored items of sensitive information in mobile phone;
It searches for the stored items and generates the inquiry page of confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of the stored items.
Preferably, the step of access limit for obtaining mobile phone EMS memory, includes:
Searching handset memory and the inquiry page for generating confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of mobile phone EMS memory.
Preferably, the generation random data, the step of filling up mobile phone residue free memory, includes:
Read the size of mobile phone residue free memory;
Generate random data identical with the free memory size;
The random data is covered to the position of the free memory.
Preferably, the random sensitive information and the random data include but is not limited to: text, punctuation mark, character,
Number, figure, picture.
The second aspect of the present invention provides a kind of erasing system of private data in Android mobile phone, the erasing system packet
It includes:
Authority acquiring module, for obtaining the read-write of the access limit of sensitive information and/or the mobile phone EMS memory in mobile phone
Permission;
First module for reading and writing generates imaginary random sensitive information, covering is extremely for reading and deleting the sensitive information
The position of the deleted sensitive information;And
Second module for reading and writing fills up mobile phone residue free memory for generating random data.
Preferably, the erasing system further includes abnormal show module, it is abnormal for being shown in the improper interruption of system
The information of interruption.
The present invention due to the adoption of the above technical scheme, passes through the data write-in and wiping to storage content in Android mobile phone repeatedly
The mode removed, to ensure that legacy data can not be resumed and restore, so as to thoroughly remove the private data in Android mobile phone,
User can autonomous one-touch removing privacy, by data reduction tool or software, use can not be restored after the present invention
The private data at family.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 shows the exemplary main step of the method for deleting of private data in Android mobile phone according to an embodiment of the present invention
Rapid figure.
Fig. 2 shows the exemplary flow of the method for deleting of private data in Android mobile phone according to an embodiment of the present invention
Figure.
Fig. 3 shows the module map of the erasing system of private data in Android mobile phone according to an embodiment of the present invention.
Fig. 4 shows the module map of the erasing system of private data in the Android mobile phone of another embodiment of the present invention.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will
Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.It is identical attached in figure
Icon note indicates same or similar structure, thus will omit repetition thereof.
Described feature, structure or characteristic can be incorporated in one or more embodiments in any suitable manner
In.In the following description, many details are provided to provide and fully understand to embodiments of the present invention.However,
One of ordinary skill in the art would recognize that without one or more in specific detail, or using other methods, constituent element, material
Material etc., can also practice technical solution of the present invention.In some cases, be not shown in detail or describe known features, material or
Person operates to avoid the fuzzy present invention.
Technology contents of the invention are described further with reference to the accompanying drawings and examples.
Referring to Figure 1 and shown in Fig. 2, wherein Fig. 1 shows private data in Android mobile phone according to an embodiment of the present invention
Method for deleting exemplary key step figure, Fig. 2 shows private data in Android mobile phone according to an embodiment of the present invention
The exemplary process diagram of method for deleting, as shown, the method for deleting of private data mainly includes following step in the Android mobile phone
It is rapid:
Step S10: the preliminary data and application deleted on mobile phone;
Step S20: the access limit of sensitive information in mobile phone is obtained;
Step S30: reading and deletes the sensitive information;
Step S40: generating imaginary random sensitive information, covers to the position of the deleted sensitive information, described
The quantity of random sensitive information is greater than the quantity of deleted sensitive information;
Step S50: the imaginary random sensitive information is deleted after the completion of covering;
Step S60: the access limit of mobile phone EMS memory is obtained;And
Step S70: random data is generated, mobile phone residue free memory is filled up;
Step S80: it completes to remove.
The reservoir of Android mobile phone has been divided multiple subregions, including system partitioning, data subregion etc., wherein system point
Area stores mobile phone operating system;Data subregion is then used to store user file, such as contact person, short message, photo, recording and user
The APP etc. of downloading.
All subregions can all be divided into two regions: (index) area Inode and Data (data) area after formatting.
The area Data stores file itself;The area Inode stores the satellite information of this document, such as filename, size, founder, modification
The information such as date and file memory address pointer, wherein address pointer stores location information of the file in the area Data, passes through
Address pointer operation, system can position this document and be written and read.When deleting file, operating system is only by Inode
The information erasings such as filename and its address pointer (being written into full 0) in area.And the file ontology in the area Data will not be then wiped free of,
The region for wiping this document at this time is identified as Free Region by operating system, for storing new file.The region not yet
When being written into new data, initial data can be accessed with workaround system using disk tools, lead to the privacy information of user
It is leaked.
The method for deleting of private data in a kind of Android mobile phone provided by the invention is exactly stored for above-mentioned Android mobile phone
System is easy the security risk being resumed there are private data, by adopting the above technical scheme, in storing in Android mobile phone
The mode for holding data write-in and erasing repeatedly, to ensure that legacy data can not be resumed and restore, so as to thoroughly remove
Private data in Android mobile phone, user can autonomous one-touch removing privacy, use the erasing side of private data of the present invention
After method, by data reduction tool or software, the private data of original subscriber can not be gone back.
Specifically, in step slo, the mode of " opening factory reset " or " installation software " can be used to complete
The preliminary data and application deleted on mobile phone.
As shown in Fig. 2, " factory reset " function when using " factory reset " operation, directly on unlatching mobile phone
Can, mobile phone resetting is carried out, the data stored on mobile phone is deleted and application can be deleted, jumped directly to after mobile phone factory reset
The step of obtaining the access limit of mobile phone EMS memory generates random data after obtaining permission, and filling up mobile phone residue can be empty with storage
Between, complete data erasing.
It when using " installation software " operation, is installed on mobile phone and suitably deletes software, software can be awarded obtaining mobile phone
Delete operation is carried out after power, executes the operation of " factory reset " function being equivalent on mobile phone, which can be for operation originally
The software of the method for deleting of invention private data, system use the erasing system of private data of the present invention.The software is also possible to
Have the resetting class software of same or similar function in the market.
Alternatively, the software can also start mobile phone after obtaining authorization when carrying out delete operation by " installation software "
On " factory reset " function, realize the operation tentatively deleted, " factory reset " function opened instead of manpower.
As shown in Fig. 2, the step of preliminary deletion in step slo, can not also select factory reset, but only
The application on mobile phone is deleted, there can be software or be deleted manually.In such cases, it is also necessary to on mobile phone include sensitive information
Private data separately process, to ensure that this part sensitive information will not be resumed.
Specifically, these sensitive informations include but is not limited to: contact information, short message, message registration information, day
Go through information.These data are stored in the data field of mobile phone, these database files with USB line because that can not be uploaded on computer, i.e.,
Computer can not recognize these database files, and therefore, privacy on computer destroys software can not complete deletion this part privacy
Data, computer can only be read out and operate to media files such as photo, video, music, recording.In addition, these sensitive informations
Different from the other application on mobile phone, general mobile phone resetting can only delete them in the index part of mobile phone index area, not
Them can be deleted in the main part in data in mobile phone area.Therefore, after mobile phone resetting, this partial information is probably resumed.
For these sensitive informations, the method for deleting of the embodiment of the present invention is in the access limit for obtaining these sensitive informations
Afterwards, it first reads and deletes these sensitive informations, imaginary random sensitive information is then generated, such as by text, punctuation mark, word
The random data of the compositions such as symbol, number covers the position of deleted sensitive information with these imaginary random sensitive informations,
Also, the quantity of imaginary random sensitive information should be far longer than the quantity of deleted sensitive information, and what is be such as deleted is quick
Sense information has 100, it may be necessary to generate random sensitive information as 150-300 item, the random sensitive information of generation is added
It is added in the modules such as contact person, short message, message registration or calendar, fills up these modules as far as possible, to guarantee that original record is deleted
The position of sensitive information covering is filled up by random sensitive data, even if the information after then on these positions is resumed again,
Also it can only be restored to the imaginary random sensitive information being covered on above, the original sensitive letter being capped can not be restored
Breath, it is ensured that private data is not leaked.
Wherein, in step S20, in acquisition mobile phone the step of the access limit of sensitive information can include:
Step 1: setting the stored items of sensitive information in mobile phone, such as pre-set needs carry out sensitivity in systems
The mobile module of erasing of information, such as contact person, short message, message registration or calendar;
Step 2: searching for stored items and generating the inquiry page of confirmation authorization, system is searched for automatically on mobile phone and has been set
The storage location of fixed mobile module generates the page after searching to be confirmed whether authorization access;
The confirmation of the inquiry page is instructed step 3: obtaining, obtains the read-write authorization of stored items, clicks and inquires in user
After confirmation frame on the page, system obtains the confirmation instruction of feedback, obtains the access limit of the mobile module.
System can carry out the sensitive information in the mobile module subsequent after the access limit for obtaining corresponding mobile module
" reading ", " deletion ", " covering " and the operation of " deleting again ".After the access limit for obtaining all preset mobile modules,
The covering and deletion of the sensitive information in all mobile modules are completed, also, completes the sensitive letter of all presetting modules in confirmation
After the processing of breath, Returning process main line obtains the access limit of mobile phone EMS memory, enters step S60.
In step S60, the step of obtaining the access limit of mobile phone EMS memory, includes:
Step 1: searching handset memory and generate confirmation authorization the inquiry page;
The confirmation of the inquiry page is instructed step 2: obtaining, obtains the read-write authorization of mobile phone EMS memory.
In step S70, random data is generated, the step of filling up mobile phone residue free memory includes:
Step 1: the size of mobile phone residue free memory is read, due to having carried out a mobile phone resetting at this time
Or covering is once deleted excessively to sensitive information, the remaining free memory of mobile phone can achieve maximum at this time;
Step 2: generating random data identical with free memory size, the random data of generation also be can achieve
It is maximum;
Step 3: random data to be covered to the position of free memory, use the random data of maximum space can be with
Initial data is completely covered in guarantee.
Wherein, random data includes but is not limited to: text, punctuation mark, character, number, figure, picture.
The present invention also provides a kind of embodiments of storage medium, are stored thereon with computer program, and the program is processed
The step of method for deleting of private data in the Android mobile phone of aforementioned present invention is realized when device executes.The storage medium can be
ROM, RAM etc..
Cooperate shown in Fig. 3, the erasing system of private data in Fig. 3 paraphrase Android mobile phone of one embodiment of the invention
Module map runs wiping of the invention after loading the APP system on mobile phone as shown, the erasing system can be APP system
Except method, the erasing of private data in Android mobile phone is realized.The erasing system specifically includes that an authority acquiring module 13,1
One module for reading and writing 12 and one second module for reading and writing 13.
Specifically, authority acquiring module 13 is used for authority acquiring module, for obtaining the read-write of sensitive information in mobile phone
The access limit of permission and/or mobile phone EMS memory;
First module for reading and writing 11 generates imaginary random sensitive information, covers for reading and deleting the sensitive information
To the position of deleted sensitive information, wherein the quantity of the random sensitive information of generation is greater than deleted sensitive information
Quantity;And
Second module for reading and writing fills up mobile phone residue free memory for generating random data.
Further, cooperate shown in Fig. 4, private data in the paraphrase Android mobile phone of another embodiment of the present invention in figure
Erasing system module map.Wherein, in addition to the basic module comprising the erasing of private data in above-mentioned realization Android mobile phone: power
Limit obtains except module 13, the first module for reading and writing 12 and the second module for reading and writing 13, further includes an abnormal show module 14.
Specifically, abnormal show module 16 is used to show the information of abnormal interrupt in the improper interruption of system.Wherein,
The case where improper interruption, includes:
Situation 1: cause follow-up process that can not promote because authority acquiring module 13 obtains permission not successfully, in such cases
By showing the inquiry page of confirmation authorization repeatedly, until obtaining authorization, continue process;
Situation 2: because the reasons such as artificial, fault of mobile phone, not enough power supply lead to the first module for reading and writing 11 and the second module for reading and writing
12 are forced to interrupt when carrying out data processing, in such cases, need to re-start from new startup program after removing obstacles
Erasing processing;
Situation 3: causing data processing to be interrupted because system program reports an error, in such cases, can restarting systems program,
Erasing processing is carried out from new.
When there is the case where above-mentioned any abnormal interrupt, system can generate one and include printed words such as " abnormal interrupts "
Signal language is shown on mobile phone screen.
It should be noted that this specification structure depicted in this specification institute accompanying drawings, ratio, size etc., only to cooperate
The bright revealed content of book is not intended to limit the invention enforceable limit so that those skilled in the art understands and reads
Fixed condition, therefore do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size, not
It influences still fall in disclosed technology contents under the effect of present invention can be generated and the purpose that can reach and obtain
In the range of capable of covering.Meanwhile it is cited such as "upper", "lower", "left", "right", " centre " and " one " in this specification
Term is merely convenient to being illustrated for narration, rather than to limit the scope of the invention, the change of relativeness or tune
It is whole, under the content of no substantial changes in technology, when being also considered as the enforceable scope of the present invention.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, though
So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession
Member, in the range of not departing from technical solution of the present invention, when the technology contents using the disclosure above make a little change or repair
Decorations are the equivalent embodiment of equivalent variations, but anything that does not depart from the technical scheme of the invention content, technology according to the present invention are real
Matter any simple modification, equivalent change and modification to the above embodiments, still fall within the range of technical solution of the present invention
It is interior.
Claims (10)
1. the method for deleting of private data in a kind of Android mobile phone, which is characterized in that comprising steps of
The preliminary data and application deleted on mobile phone;
Obtain the access limit of sensitive information in mobile phone;
It reads and deletes the sensitive information;
Generate imaginary random sensitive information, covering to the position of the deleted sensitive information, the random sensitive information
Quantity be greater than the quantity of deleted sensitive information;
The imaginary random sensitive information is deleted after the completion of covering;
Obtain the access limit of mobile phone EMS memory;
Random data is generated, mobile phone residue free memory is filled up;And
It completes to remove.
2. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that when the preliminary deletion
When the step of data and application on mobile phone is factory reset, described obtain is jumped directly to after mobile phone factory reset
The step of taking the access limit of mobile phone EMS memory, generating random data, fill up mobile phone residue free memory completes to remove.
3. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that the preliminary deletion hand
The step of data and application on machine, is operated by software, and the software loading is in the mobile phone and laggard obtaining mobile phone authorization
The row delete operation
4. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that the sensitive information packet
It includes: contact information, short message, message registration information, calendar information.
5. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that in the acquisition mobile phone
The step of access limit of sensitive information includes:
Set the stored items of sensitive information in mobile phone;
It searches for the stored items and generates the inquiry page of confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of the stored items.
6. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that in the acquisition mobile phone
The step of access limit deposited includes:
Searching handset memory and the inquiry page for generating confirmation authorization;
It obtains and the confirmation of the inquiry page is instructed, obtain the read-write authorization of mobile phone EMS memory.
7. the method for deleting of private data in Android mobile phone as described in claim 1, which is characterized in that the generation random number
Include: according to, the step of filling up mobile phone residue free memory
Read the size of mobile phone residue free memory;
Generate random data identical with the free memory size;
The random data is covered to the position of the free memory.
8. such as the method for deleting of private data in Android mobile phone according to any one of claims 1 to 7, which is characterized in that institute
It states random sensitive information and the random data includes but is not limited to: text, punctuation mark, character, number, figure, picture.
9. the erasing system of private data in a kind of Android mobile phone characterized by comprising
Authority acquiring module, for obtaining the access limit of sensitive information and/or the access limit of the mobile phone EMS memory in mobile phone;
First module for reading and writing generates imaginary random sensitive information, covering is extremely deleted for reading and deleting the sensitive information
The position of the sensitive information removed;And
Second module for reading and writing fills up mobile phone residue free memory for generating random data.
10. the erasing system of private data in Android mobile phone as claimed in claim 9, which is characterized in that the erasing system
It further include abnormal show module, for showing the information of abnormal interrupt in the improper interruption of system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811603097.XA CN109831575A (en) | 2018-12-26 | 2018-12-26 | The method for deleting and erasing system of private data in Android mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811603097.XA CN109831575A (en) | 2018-12-26 | 2018-12-26 | The method for deleting and erasing system of private data in Android mobile phone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109831575A true CN109831575A (en) | 2019-05-31 |
Family
ID=66861194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811603097.XA Pending CN109831575A (en) | 2018-12-26 | 2018-12-26 | The method for deleting and erasing system of private data in Android mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109831575A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110347341A (en) * | 2019-07-09 | 2019-10-18 | 上海悦易网络信息技术有限公司 | Data clearing method and control equipment |
US11798250B2 (en) | 2019-02-18 | 2023-10-24 | Ecoatm, Llc | Neural network based physical condition evaluation of electronic devices, and associated systems and methods |
US11843206B2 (en) | 2019-02-12 | 2023-12-12 | Ecoatm, Llc | Connector carrier for electronic device kiosk |
US11922467B2 (en) | 2020-08-17 | 2024-03-05 | ecoATM, Inc. | Evaluating an electronic device using optical character recognition |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683336A (en) * | 2015-02-12 | 2015-06-03 | 中国科学院信息工程研究所 | Security-region-based method and system for protecting Android private data |
CN106776908A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Data clearing method, device and terminal |
-
2018
- 2018-12-26 CN CN201811603097.XA patent/CN109831575A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683336A (en) * | 2015-02-12 | 2015-06-03 | 中国科学院信息工程研究所 | Security-region-based method and system for protecting Android private data |
CN106776908A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Data clearing method, device and terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11843206B2 (en) | 2019-02-12 | 2023-12-12 | Ecoatm, Llc | Connector carrier for electronic device kiosk |
US11798250B2 (en) | 2019-02-18 | 2023-10-24 | Ecoatm, Llc | Neural network based physical condition evaluation of electronic devices, and associated systems and methods |
CN110347341A (en) * | 2019-07-09 | 2019-10-18 | 上海悦易网络信息技术有限公司 | Data clearing method and control equipment |
CN110347341B (en) * | 2019-07-09 | 2023-07-04 | 上海万物新生环保科技集团有限公司 | Data clearing method and control equipment |
US11922467B2 (en) | 2020-08-17 | 2024-03-05 | ecoATM, Inc. | Evaluating an electronic device using optical character recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109831575A (en) | The method for deleting and erasing system of private data in Android mobile phone | |
US10699061B2 (en) | Application page quick access | |
US6957384B2 (en) | Document management system | |
US10108928B2 (en) | Systems, methods and apparatus for form building | |
US9189608B2 (en) | Permission management method for applications, electronic device thereof, and computer readable medium | |
CN104915268A (en) | Desktop layout storage and recovery method and device thereof, terminal equipment and system | |
US8488178B2 (en) | Image forming apparatus storage files with file attribution table having deletion date and flag | |
CN103581318A (en) | Data backup and restoration method and device for mobile device | |
US20140236902A1 (en) | User Data Backup Method and Apparatus | |
US20200159460A1 (en) | Method and Apparatus for Selective Erase of Persistent and Non-Volatile Memory Devices | |
CN103377277A (en) | Document management apparatus and document management method | |
US10027839B2 (en) | Business customized multifunction peripherals | |
CN100483418C (en) | Image forming apparatus equiped with auxiliary storage having files to be managed | |
CN103176920A (en) | Nor flash power down protection method and Nor flash power down protection device | |
US7680980B2 (en) | Image forming apparatus | |
Karle | Managing the digital you: Where and how to keep and organize your digital life | |
CN112749406A (en) | Shared image cleaning method and system | |
CN112749372A (en) | Method and system for detecting privacy violation of stored image | |
JP6167541B2 (en) | Content data processing apparatus and content data processing method | |
EP2413233B1 (en) | Android phone with an application for content display | |
TW201401075A (en) | Calendar recording process for mobile appliance capable of receiving emails and text messages | |
CN112100126A (en) | Excel file-based picture storage and content display method and device | |
US20070211289A1 (en) | Print program, information recording medium and print system | |
US10097718B2 (en) | System and method for tracking application information in customizable multifunction peripherals | |
CN113900996A (en) | File processing method and device, storage medium and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190531 |