CN111316277A - Mobile terminal and computer readable storage medium for data erasure - Google Patents

Mobile terminal and computer readable storage medium for data erasure Download PDF

Info

Publication number
CN111316277A
CN111316277A CN201780096648.5A CN201780096648A CN111316277A CN 111316277 A CN111316277 A CN 111316277A CN 201780096648 A CN201780096648 A CN 201780096648A CN 111316277 A CN111316277 A CN 111316277A
Authority
CN
China
Prior art keywords
mobile terminal
factory
password
mode
capturing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780096648.5A
Other languages
Chinese (zh)
Other versions
CN111316277B (en
Inventor
木魁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Publication of CN111316277A publication Critical patent/CN111316277A/en
Application granted granted Critical
Publication of CN111316277B publication Critical patent/CN111316277B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

A mobile terminal and a computer readable storage medium for data erasure, the computer readable medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the steps of: capturing a first operation instruction, starting a safety mode, selecting and entering a factory setting restoration protection program in the safety mode, selecting and erasing factory setting restoration protection data in the factory setting restoration protection program, capturing a second operation instruction, inputting password information, comparing the password information with a preset password, and erasing factory setting restoration protection data when the password information is matched with the preset password. According to the method and the device, the entry of the FRP is written into the recovery mode, and a user can erase personal information data in the FRP partition by inputting a correct FRP password in the recovery mode.

Description

Mobile terminal and computer readable storage medium for data erasure Technical Field
The present invention relates to the field of data erasure in mobile terminals, and in particular, to a mobile terminal and a computer-readable storage medium for data erasure.
Background
The Factory setting Protection (FRP) is recovered, is a Protection measure in the android device developed by Google, can protect the device after the device is stolen and lost, and prevents unauthorized user from logging in or using. If the electronic device runs an android OS 5.1 or higher version, after the device logs in a google account and starts the FRP lock, the related account information is stored in an independent partition. If the mobile terminal of the user is lost or stolen, the user can abnormally refresh the mobile terminal or restore the factory settings, and after the device is restarted, the information of the Google account of the user needs to be filled in to complete the boot-up bootstrap program. If the account password is forgotten, the mobile terminal cannot activate the access interface. Meanwhile, the user can also erase the personal information of the user by erasing the data in the FRP partition.
However, in the prior art, the function of erasing the FRP partition by one key implemented by the mobile terminal has a disadvantage that the system cannot be accessed if the password of the mobile terminal is unknown, so the FRP partition cannot be erased. When the user forgets the password, but needs to clear the personal information in the intelligent terminal, the implementation is difficult.
Disclosure of Invention
To solve the above problems, the present invention provides a mobile terminal and a computer-readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
In particular, a computer-readable storage medium for data erasure, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the following steps: capturing a first operation instruction, starting a safety mode, selecting and entering a factory setting restoration protection program in the safety mode, selecting and erasing factory setting restoration protection data in the factory setting restoration protection program, capturing a second operation instruction, inputting password information, comparing the password information with a preset password, and erasing factory setting restoration protection data when the password information is matched with the preset password.
Preferably, the step of capturing a first operation instruction and starting the security mode includes capturing a pair of operation instructions input by the mobile terminal, analyzing the operation instructions to obtain an operation content, and controlling the mobile terminal to enter the security mode according to the operation content.
Preferably, the password information is an unlock code of the factory-reset protection program.
Preferably, the acquiring method of the unlocking code includes reading an international mobile equipment identity of the mobile terminal, and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity.
Preferably, the computer program further implements a step of analyzing the security mode, obtaining a setting authority, and writing an entry for restoring the factory setting protection program into the security mode when executed by the processor.
Preferably, a mobile terminal includes a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program: capturing a first operation instruction, starting a safety mode, selecting and entering a factory setting restoration protection program in the safety mode, selecting and erasing factory setting restoration protection data in the factory setting restoration protection program, capturing a second operation instruction, inputting password information, comparing the password information with a preset password, and erasing factory setting restoration protection data when the password information is matched with the preset password.
Preferably, the step of capturing a first operation instruction and starting the security mode includes capturing a pair of operation instructions input by the mobile terminal, analyzing the operation instructions to obtain an operation content, and controlling the mobile terminal to enter the security mode according to the operation content.
Preferably, the password information is an unlock code of the factory-reset protection program.
Preferably, the acquiring method of the unlocking code includes reading an international mobile equipment identity of the mobile terminal, and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity.
Preferably, the processor implements the following steps when executing the computer program, analyzes the security mode, obtains the setting authority, and writes the entry of the factory-reset protection program into the security mode.
Compared with the prior art, the invention has the technical advantages that: the invention provides a mobile terminal and a computer readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
Drawings
FIG. 1 is a flowchart illustrating steps implemented by a processor in a computer program stored on a computer-readable storage medium for data erasure according to a preferred embodiment of the present invention;
FIG. 2 is a flowchart illustrating the steps of preferably capturing a first operating command to initiate secure mode, in accordance with the present invention;
FIG. 3 is a flowchart illustrating a preferred step of obtaining an unlock code for restoring factory settings of the protected program in FIG. 1;
fig. 4 is a flowchart illustrating a procedure for writing an entry to the secure mode, which preferably restores the factory set protection program, in accordance with fig. 1.
Detailed Description
The advantages of the invention are explained in detail below with reference to the drawings and the embodiments.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. Depending on context, the word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination"
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In the prior art, the disadvantage of the function of erasing the FRP partition by one key implemented by the mobile terminal is that the system cannot be accessed if the password of the mobile terminal is unknown, so the FRP partition cannot be erased. When the user forgets the password, but needs to clear the personal information in the intelligent terminal, the implementation is difficult.
To solve the above problems, in one aspect of the present invention, a computer-readable storage medium for data erasure is provided. Referring to fig. 1, a flowchart illustrating steps implemented by a processor when a computer program stored on a computer-readable storage medium for data erasure according to a preferred embodiment of the present invention is executed is shown. As can be seen from the figure, in this embodiment, the steps implemented by the computer program when executed by the processor mainly include: s1: capturing a first operation instruction, and starting a safety mode; s2: under the safety mode, selecting and entering a factory reset protection program; s3: in the factory setting restoration protection program, selecting to erase factory setting restoration protection data; s4: capturing a second operation instruction and inputting password information; s5: comparing the password information with a preset password; s6: and when the password information is matched with the preset password, erasing and recovering factory setting protection data.
Specifically, in this embodiment, the steps implemented when the computer program is executed by the processor are as follows:
s1: capturing a first operation instruction, and starting the security mode
Preferably, when the mobile terminal is a mobile terminal with an Android system, the security mode is as follows: the Recovery mode is an Android mobile terminal backup function, and refers to a mode (similar to windows PE or DOS) capable of modifying data or a system inside an Android machine. In this mode, the user can back up or upgrade the existing system, and can restore factory settings. The usage principle of recovery is the same as that of GHOST software on a computer, and the recovery plays a role in system backup and recovery. Of course, the kernel may be upgraded, patched, etc. The recovery is written together with the system baseband, and different baseband versions cannot be flushed. Entering the recovery interface, the user can directly use rom in zip format on the sd card to upgrade (downgrade) the user's system.
Therefore, in this embodiment, when the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
Referring now to FIG. 2, a flowchart illustrating steps for initiating secure mode, preferably capturing a first operating command, is shown, in accordance with the present invention. As can be seen from the figure, in the embodiment, the step of capturing a first operation instruction and starting the security mode includes:
-capturing a pair of operating instructions input by the mobile terminal
-parsing the operation command to obtain an operation content
-controlling the mobile terminal to enter a secure mode in dependence of the content of the operation
In this embodiment, a user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, the operation instruction is further analyzed, for example, the key position, the key force and the like of the user are obtained, and the operation content pointed by the operation instruction is obtained according to the analyzed operation instruction, so that the mobile terminal is further controlled to enter a safe mode.
More preferably, in this embodiment, the method for recovering includes:
1. after the mobile terminal is completely powered off, pressing a volume key down (up) and a power key, and entering a bootloader interface;
2. pressing a volume key to move a cursor to a recovery row;
3. and pressing a power key, and then automatically restarting the mobile terminal to enter a recovery mode.
The volume key is a cursor selection key and can be used for moving a cursor, and the power key is a confirmation key.
S2: under the safety mode, selecting and entering a factory reset protection program
Preferably, when the mobile terminal is a mobile terminal with an Android system, Factory set Protection (FRP) is restored, and a Protection measure in an Android device developed for google can protect the device after the device is stolen or lost, thereby preventing unauthorized user from logging in or using the device.
In order to prevent user information from leaking after the mobile terminal is lost, Google requires that the Android 5.1 version and later versions have the FRP function and are started by default. This security feature may prevent unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is in the enabled state, the user may perform an operation of clearing user data by logging in the Google account remotely, so as to avoid information leakage, and after the method is performed to recover and leave the factory, the user needs to verify that the last logged-in Google account can enter the system by booting, navigating and verifying, and the mobile terminal is normally used. The user can control the FRP function to be turned on and off through a menu of 'setting-developer option-turning on OEM unlocking', and an OEM switch is in a turn-off state, which represents that the FRP function is in a turn-on state. When the FRP is started, the Secureboot can not be unlocked, and the fastboot flush command can not be executed.
In the prior art, the use method and the steps of the basic functions of the FRP comprise the following steps: the FRP use method comprises the following steps of supporting FRP, opening FRP and having a Google account, and comprises the following steps: a. enter setting- > developer option- > OEM unlock, close "OEM unlock" switch (turn on FRP); b. connecting the testing machine with the VPN, and logging in a Google account (a Google account number exists); c. and setting a screen locking password. Therefore, in the prior art, the user can process the data in the FRP only when the user has and knows the Google account and the password thereof.
With reference to fig. 1, in this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal in a secure mode, and after the mobile terminal analyzes the operation instruction, the user may enter a factory-reset protection program of the mobile terminal according to the operation instruction. Therefore, the factory setting restoration protection program can be normally used without logging in the Google account.
S3: in the factory setting restoration protection program, the factory setting restoration protection data is selectively erased
With reference to fig. 1, in this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal when the factory setting restoration protection program is restored, and after the mobile terminal analyzes the operation instruction, the mobile terminal may select to erase and restore the factory setting protection data according to the operation instruction.
S4: capturing a second operation instruction, inputting a password information
Referring to fig. 1, in this embodiment, after the mobile terminal senses that the user selects to erase the factory-reset protection data, a password request is sent, for example, in a form of popping up a dialog box in a display screen of the mobile terminal. The user inputs password information to the mobile terminal by means of a keyboard and the like of the mobile terminal, namely a second operation instruction is sent; after the mobile terminal reads the password information input by the user, the password information is converted into digital information readable by a computer, for example, decimal digits are converted into binary digital information, and the binary digital information is sent out.
Specifically, the password information is an unlock code of the factory-reset protection program.
More preferably, referring to fig. 3, it is a schematic flowchart of a step of preferably obtaining the unlock code of the factory reset protection program in fig. 1. As can be seen from the figure, in this embodiment, the method for acquiring the unlock code includes:
-reading the international mobile equipment identity of the mobile terminal
In this embodiment, an International Mobile Equipment Identity (IMEI) is an abbreviation of the International Mobile Equipment Identity, and an International Mobile Equipment Identity is an "electronic serial number" composed of 15 digits and corresponding to each Mobile phone one by one, and the code is unique throughout the world. Each handset, when assembled, is assigned a globally unique set of numbers that are recorded by the manufacturer from production to delivery.
The IMEI is TAC + FAC + SNR + SP and consists of:
1. the first 6 digits (TAC) is a "model approval number", which generally represents a model.
2. The next 2 digits (FAC) is the "last assembly number", which generally represents the source.
3. The next 6 digits (SNR) is the "string number," which generally represents the production sequence number.
4. The last 1-bit number (SP) is usually "0", which is now on standby for the purpose of checking codes.
The IMEI code is attached to a label on the back of the mobile phone (also stored in the phone, available on the mobile phone as "# 06 #"), and is read from and written to the memory of the mobile phone. It is also the "file" and "identification number" of the mobile phone at the manufacturer.
Therefore, in this embodiment, the international mobile equipment identity of the mobile terminal may be obtained by reading the identification information on the mobile terminal or by pressing "# 06 #" on the mobile terminal.
-retrieving an unlock code of a factory reset protection program of the mobile terminal based on the international mobile equipment identity code
With reference to fig. 3, in the present embodiment, the FRP unlocking code may be queried by using IMEI in the "query unlocking code" function of the FRP unlocking tool, such as the combertner platform.
S5: comparing the password information with a preset password
With reference to fig. 1, in this embodiment, after the mobile terminal captures a password information input by a user to the mobile terminal, the mobile terminal further compares the password information with a preset password stored in the mobile terminal in advance.
S6: when the password information is matched with the preset password, erasing and restoring factory setting protection data
Referring to fig. 1, in this embodiment, when the comparison result of the mobile terminal is that the password information matches the preset password, the mobile terminal may obtain the authority to erase and restore the factory setting protection data. Therefore, the technical effect that the Google account number password is bypassed and the FRP partition data is erased by one key is achieved.
Referring preferably to fig. 4, a flowchart is shown that conforms to a step in fig. 1 in which the entry to the factory reset protection program is preferably written into secure mode. As can be seen from the figure, in this embodiment, the proposed step of writing the entry for restoring the factory setting protection program into the secure mode includes:
-a set permission to initiate a secure mode;
-writing an entry to the factory-set-restore-protection-program into the secure mode.
Specifically, rewriting recovery.img under linux environment, downloading split _ bootimg.zip file, where the zip file includes a perl file, and a split _ bootimg.pl script, where the script can read recovery.img, read kernel and ramdisk, and also output kernel command line and board name. Unpacking recovery.img; recreating ramdisk using mkbootfs tool; and (3) recreating recovery-new.img by using mkbootimg to obtain a new recovery-new.img, and then brushing in the third party recovery.
Preferably, in this embodiment, a recovery that satisfies the condition may be newly created and written into the original recovery, and the specific steps are as follows:
1. decompressing native recovery.img from the official package;
2. solving the core recovery, img-kernel and ramdisk memory mirror images of the primary recovery package, and then unpacking the ramdisk memory mirror images;
3. finding a suitable third party recovery package with better function, for example, taking recovery-clock work-5.0.2.0.img of G6 as an example, similarly solving the kernel memory mirror and the ramdisk memory mirror image, and then unpacking the ramdisk memory mirror image;
4. preparing a new recovery kernel, wherein in the embodiment, by using recovery.img-kernel of an official native package, only the native kernel can be matched with hardware of the mobile terminal;
5. the memory disc of the ramdisk is modified,
6. packing the new ramdisk memory according to the method for packing the ramdisk;
7. packing according to the above method to generate new recovery-new.img;
8. brushing the new recovery-new.img into the mobile phone;
9. img, opening the native recovery of the mobile phone, comparing file headers of the two files, and copying the first 16 native lines (000h-100h) to the new recovery for covering.
10. And finally, changing the first three bytes of the new recovery-new.img and the second line back to the three values just recorded and storing.
Img-kernel is a new kernel; the ram disk-new.gz is a new memory disk; the boot-new.img is the new img generated, and the boot.img or recovery.img packed according to the method can be directly used on the mobile terminal because the base address and the kernel parameter are correct.
In summary, the present invention provides a mobile terminal and a computer-readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
Another aspect of the present invention provides a mobile terminal, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
s' 1: capturing a first operation instruction, and starting a safety mode; s' 2: under the safety mode, selecting and entering a factory reset protection program; s' 3: in the factory setting restoration protection program, selecting to erase factory setting restoration protection data; s' 4: capturing a second operation instruction and inputting password information; s' 5: comparing the password information with a preset password; s' 6: and when the password information is matched with the preset password, erasing and recovering factory setting protection data.
Specifically, in this embodiment, when the processor executes the computer program, the following steps are implemented:
s' 1: capturing a first operation instruction, and starting the security mode
Preferably, when the mobile terminal is a mobile terminal with an Android system, the security mode is as follows: the Recovery mode is an Android mobile terminal backup function, and refers to a mode (similar to windows PE or DOS) capable of modifying data or a system inside an Android machine. In this mode, the user can back up or upgrade the existing system, and can restore factory settings. The usage principle of recovery is the same as that of GHOST software on a computer, and the recovery plays a role in system backup and recovery. Of course, the kernel may be upgraded, patched, etc. The recovery is written together with the system baseband, and different baseband versions cannot be flushed. Entering the recovery interface, the user can directly use rom in zip format on the sd card to upgrade (downgrade) the user's system.
Therefore, in this embodiment, when the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
Preferably, in this embodiment, the step of capturing a first operation instruction and starting the security mode includes:
-capturing a pair of operating instructions input by the mobile terminal
-parsing the operation command to obtain an operation content
-controlling the mobile terminal to enter a secure mode in dependence of the content of the operation
In this embodiment, a user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, the operation instruction is further analyzed, for example, the key position, the key force and the like of the user are obtained, and the operation content pointed by the operation instruction is obtained according to the analyzed operation instruction, so that the mobile terminal is further controlled to enter a safe mode.
More preferably, in this embodiment, the method for recovering includes:
1. after the mobile terminal is completely powered off, pressing a volume key down (up) and a power key, and entering a bootloader interface;
2. pressing a volume key to move a cursor to a recovery row;
3. and pressing a power key, and then automatically restarting the mobile terminal to enter a recovery mode.
The volume key is a cursor selection key and can be used for moving a cursor, and the power key is a confirmation key.
S' 2: under the safety mode, selecting and entering a factory reset protection program
Preferably, when the mobile terminal is a mobile terminal with an Android system, Factory set Protection (FRP) is restored, and a Protection measure in an Android device developed for google can protect the device after the device is stolen or lost, thereby preventing unauthorized user from logging in or using the device.
In order to prevent user information from leaking after the mobile terminal is lost, Google requires that the Android 5.1 version and later versions have the FRP function and are started by default. This security feature may prevent unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is in the enabled state, the user may perform an operation of clearing user data by logging in the Google account remotely, so as to avoid information leakage, and after the method is performed to recover and leave the factory, the user needs to verify that the last logged-in Google account can enter the system by booting, navigating and verifying, and the mobile terminal is normally used. The user can control the FRP function to be turned on and off through a menu of 'setting-developer option-turning on OEM unlocking', and an OEM switch is in a turn-off state, which represents that the FRP function is in a turn-on state. When the FRP is started, the Secureboot can not be unlocked, and the fastboot flush command can not be executed.
In the prior art, the use method and the steps of the basic functions of the FRP comprise the following steps: the FRP use method comprises the following steps of supporting FRP, opening FRP and having a Google account, and comprises the following steps: a. enter setting- > developer option- > OEM unlock, close "OEM unlock" switch (turn on FRP); b. connecting the testing machine with the VPN, and logging in a Google account (a Google account number exists); c. and setting a screen locking password. Therefore, in the prior art, the user can process the data in the FRP only when the user has and knows the Google account and the password thereof.
Preferably, in this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal in a secure mode, and after the mobile terminal analyzes the operation instruction, the user may enter a factory-reset protection program of the mobile terminal according to the operation instruction. Therefore, the factory setting restoration protection program can be normally used without logging in the Google account.
S' 3: in the factory setting restoration protection program, the factory setting restoration protection data is selectively erased
In this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal when a factory-setting restoration protection program is restored, and after the mobile terminal analyzes the operation instruction, the mobile terminal may select to erase and restore factory-setting protection data according to the operation instruction.
S' 4: capturing a second operation instruction, inputting a password information
In this embodiment, after the mobile terminal senses that the user selects to erase and restore factory-set protection data, a password request is sent, for example, in a form of popping up a dialog box in a display screen of the mobile terminal. The user inputs password information to the mobile terminal by means of a keyboard and the like of the mobile terminal, namely a second operation instruction is sent; after the mobile terminal reads the password information input by the user, the password information is converted into digital information readable by a computer, for example, decimal digits are converted into binary digital information, and the binary digital information is sent out.
Specifically, the password information is an unlock code of the factory-reset protection program.
More preferably, in this embodiment, the method for acquiring the unlock code includes:
-reading the international mobile equipment identity of the mobile terminal
In this embodiment, an International Mobile Equipment Identity (IMEI) is an abbreviation of the International Mobile Equipment Identity, and an International Mobile Equipment Identity is an "electronic serial number" composed of 15 digits and corresponding to each Mobile phone one by one, and the code is unique throughout the world. Each handset, when assembled, is assigned a globally unique set of numbers that are recorded by the manufacturer from production to delivery.
The IMEI is TAC + FAC + SNR + SP and consists of:
1. the first 6 digits (TAC) is a "model approval number", which generally represents a model.
2. The next 2 digits (FAC) is the "last assembly number", which generally represents the source.
3. The next 6 digits (SNR) is the "string number," which generally represents the production sequence number.
4. The last 1-bit number (SP) is usually "0", which is now on standby for the purpose of checking codes.
The IMEI code is attached to a label on the back of the mobile phone (also stored in the phone, available on the mobile phone as "# 06 #"), and is read from and written to the memory of the mobile phone. It is also the "file" and "identification number" of the mobile phone at the manufacturer.
Therefore, in this embodiment, the international mobile equipment identity of the mobile terminal may be obtained by reading the identification information on the mobile terminal or by pressing "# 06 #" on the mobile terminal.
-retrieving an unlock code of a factory reset protection program of the mobile terminal based on the international mobile equipment identity code
In this embodiment, the FRP unlocking code may be queried by using the IMEI in the "query unlocking code" function of the FRP unlocking tool, such as the ComPartner platform.
S' 5: comparing the password information with a preset password
In this implementation, after the mobile terminal captures password information input by a user to the mobile terminal, the mobile terminal further compares the password information with a preset password stored in the mobile terminal in advance.
S' 6: when the password information is matched with the preset password, erasing and restoring factory setting protection data
In this embodiment, when the comparison result of the mobile terminal is that the password information matches the preset password, the mobile terminal may obtain the permission to erase and restore the factory-set protection data. Therefore, the technical effect that the Google account number password is bypassed and the FRP partition data is erased by one key is achieved.
Preferably, in this embodiment, the step of writing the entry for restoring the factory setting protection program into the secure mode includes:
-a set permission to initiate a secure mode;
-writing an entry to the factory-set-restore-protection-program into the secure mode.
Specifically, rewriting recovery.img under linux environment, downloading split _ bootimg.zip file, where the zip file includes a perl file, and a split _ bootimg.pl script, where the script can read recovery.img, read kernel and ramdisk, and also output kernel command line and board name. Unpacking recovery.img; recreating ramdisk using mkbootfs tool; and (3) recreating recovery-new.img by using mkbootimg to obtain a new recovery-new.img, and then brushing in the third party recovery.
Preferably, in this embodiment, a recovery that satisfies the condition may be newly created and written into the original recovery, and the specific steps are as follows:
1. decompressing native recovery.img from the official package;
2. solving the core recovery, img-kernel and ramdisk memory mirror images of the primary recovery package, and then unpacking the ramdisk memory mirror images;
3. finding a suitable third party recovery package with better function, for example, taking recovery-clock work-5.0.2.0.img of G6 as an example, similarly solving the kernel memory mirror and the ramdisk memory mirror image, and then unpacking the ramdisk memory mirror image;
4. preparing a new recovery kernel, wherein in the embodiment, by using recovery.img-kernel of an official native package, only the native kernel can be matched with hardware of the mobile terminal;
5. the memory disc of the ramdisk is modified,
6. packing the new ramdisk memory according to the method for packing the ramdisk;
7. packing according to the above method to generate new recovery-new.img;
8. brushing the new recovery-new.img into the mobile phone;
9. img, opening the native recovery of the mobile phone, comparing file headers of the two files, and copying the first 16 native lines (000h-100h) to the new recovery for covering.
10. And finally, changing the first three bytes of the new recovery-new.img and the second line back to the three values just recorded and storing.
Img-kernel is a new kernel; the ram disk-new.gz is a new memory disk; the boot-new.img is the new img generated, and the boot.img or recovery.img packed according to the method can be directly used on the mobile terminal because the base address and the kernel parameter are correct.
In summary, the present invention provides a mobile terminal. The invention writes the entry of the FRP into the recovery mode of the mobile terminal, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
It should be noted that the embodiments of the present invention have been described in terms of preferred embodiments, and not by way of limitation, and that those skilled in the art can make modifications and variations of the embodiments described above without departing from the spirit of the invention.

Claims (10)

  1. A computer-readable storage medium for data erasure, having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the steps of:
    capturing a first operation instruction, starting the safety mode,
    under the safe mode, selecting and entering a factory resetting protection program,
    in the factory reset protection program, the factory reset protection data is selected to be erased,
    capturing a second operation command, inputting a password information,
    comparing the password information with a preset password,
    when the password information matches the preset password,
    and erasing and restoring factory setting protection data.
  2. The computer-readable storage medium of claim 1,
    capturing a first operating command, the step of initiating the secure mode comprising,
    capturing a pair of operation instructions input by the mobile terminal,
    analyzing the operation instruction to obtain an operation content,
    and controlling the mobile terminal to enter a safe mode according to the operation content.
  3. The computer-readable storage medium of claim 1,
    and the password information is an unlocking code for restoring the factory-set protection program.
  4. The computer-readable storage medium of claim 3,
    the acquisition method of the unlocking code comprises the following steps,
    reading the international mobile equipment identity of the mobile terminal,
    and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity code.
  5. The computer-readable storage medium of claim 1,
    the computer program when executed by a processor further realizes the following steps,
    the security mode is analyzed, and the security mode is analyzed,
    the set-up right is obtained and,
    and writing the entry of the factory-setting restoration protection program into the safety mode.
  6. A mobile terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of:
    capturing a first operation instruction, starting the safety mode,
    under the safe mode, selecting and entering a factory resetting protection program,
    in the factory reset protection program, the factory reset protection data is selected to be erased,
    capturing a second operation command, inputting a password information,
    comparing the password information with a preset password,
    when the password information matches the preset password,
    and erasing and restoring factory setting protection data.
  7. The mobile terminal of claim 1,
    capturing a first operating command, the step of initiating the secure mode comprising,
    capturing a pair of operation instructions input by the mobile terminal,
    analyzing the operation instruction to obtain an operation content,
    and controlling the mobile terminal to enter a safe mode according to the operation content.
  8. The mobile terminal of claim 1,
    and the password information is an unlocking code for restoring the factory-set protection program.
  9. The mobile terminal of claim 3,
    the acquisition method of the unlocking code comprises the following steps,
    reading the international mobile equipment identity of the mobile terminal,
    and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity code.
  10. The mobile terminal of claim 1,
    the processor realizes the following steps when executing the computer program,
    the security mode is analyzed, and the security mode is analyzed,
    the set-up right is obtained and,
    and writing the entry of the factory-setting restoration protection program into the safety mode.
CN201780096648.5A 2017-11-09 2017-11-09 Mobile terminal and computer readable storage medium for data erasure Active CN111316277B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/110164 WO2019090586A1 (en) 2017-11-09 2017-11-09 Mobile terminal, and computer readable storage medium for data wiping

Publications (2)

Publication Number Publication Date
CN111316277A true CN111316277A (en) 2020-06-19
CN111316277B CN111316277B (en) 2024-07-23

Family

ID=66437523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780096648.5A Active CN111316277B (en) 2017-11-09 2017-11-09 Mobile terminal and computer readable storage medium for data erasure

Country Status (2)

Country Link
CN (1) CN111316277B (en)
WO (1) WO2019090586A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11334662B2 (en) * 2020-07-14 2022-05-17 Bank Of America Corporation Tamper-evident travel devices equipped with secure re-image file (s)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100198791A1 (en) * 2009-02-05 2010-08-05 Grace Zhanglei Wu System, method, and computer program product for allowing access to backup data
CN102883026A (en) * 2012-09-07 2013-01-16 广东欧珀移动通信有限公司 Method for implementing start-up protection on mobile terminal
EP2574022A1 (en) * 2011-09-23 2013-03-27 Lg Electronics Inc. Mobile terminal and method of providing security thereto
WO2014123758A1 (en) * 2013-02-08 2014-08-14 Sprint Communications Company, L.P. System and method of storing service brand packages on a mobile device
CN104615951A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device
CN106778359A (en) * 2015-11-20 2017-05-31 宏碁股份有限公司 Reset the release method and its electronic installation of protection of dispatching from the factory

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150154002A1 (en) * 2013-12-04 2015-06-04 Google Inc. User interface customization based on speaker characteristics
CN104348979B (en) * 2014-11-13 2016-03-30 努比亚技术有限公司 Mobile terminal and note thereof display packing in an encrypted mode and device
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100198791A1 (en) * 2009-02-05 2010-08-05 Grace Zhanglei Wu System, method, and computer program product for allowing access to backup data
EP2574022A1 (en) * 2011-09-23 2013-03-27 Lg Electronics Inc. Mobile terminal and method of providing security thereto
CN102883026A (en) * 2012-09-07 2013-01-16 广东欧珀移动通信有限公司 Method for implementing start-up protection on mobile terminal
WO2014123758A1 (en) * 2013-02-08 2014-08-14 Sprint Communications Company, L.P. System and method of storing service brand packages on a mobile device
CN104615951A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal
CN105224423A (en) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 Terminal data backup method and device
CN106778359A (en) * 2015-11-20 2017-05-31 宏碁股份有限公司 Reset the release method and its electronic installation of protection of dispatching from the factory

Also Published As

Publication number Publication date
CN111316277B (en) 2024-07-23
WO2019090586A1 (en) 2019-05-16

Similar Documents

Publication Publication Date Title
US7840794B2 (en) OS starting method and apparatus using the same
JP6054908B2 (en) Method for repairing variable sets, computer program and computer
US9292680B2 (en) Mobile terminal detection method and mobile terminal
US20140115316A1 (en) Boot loading of secure operating system from external device
CN104506639A (en) Root right acquiring method and device
JP2004151785A (en) Detachable device and method for starting program
JP2006092547A (en) Computer system with basic input-output system and control method thereof
US20160004648A1 (en) Data erasing apparatus, data erasing method, and computer-readable storage medium
CN113626822B (en) UEFI firmware starting method and device integrating LinuxBoot
TW200305807A (en) Basic input/output system (BIOS) shadowed small-print hard disk drive as robust, always on, backup for hard disk image & software failure
KR20200141560A (en) Security system and method for computer using usb storage medium
KR102459774B1 (en) Method of encrypting dll file, system of encrypting dll file performing the same, and storage medium storing the same
CN105786545B (en) Breakpoint recovery method and system based on heterogeneous hybrid memory
WO2018049798A1 (en) Method and apparatus for reconstructing cache partition
US20050193195A1 (en) Method and system for protecting data of storage unit
Gómez-Miralles et al. Versatile iPad forensic acquisition using the apple camera connection kit
JP4653497B2 (en) Portable storage device
CN111316277B (en) Mobile terminal and computer readable storage medium for data erasure
CN107818272A (en) Hard disk secure starts and hard disk binding method, device and industrial computer
JP5304229B2 (en) Terminal device
US8924306B2 (en) Remote computer rebooting tool
CN109522174B (en) Method, device, terminal and storage medium for controlling adb enabling
CN105488436A (en) Mobile storage equipment access method and device
CN113721837B (en) Storage medium information elimination method and device based on BIOS
CN106227665B (en) A kind of equipment starting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant