CN111316277A - Mobile terminal and computer readable storage medium for data erasure - Google Patents
Mobile terminal and computer readable storage medium for data erasure Download PDFInfo
- Publication number
- CN111316277A CN111316277A CN201780096648.5A CN201780096648A CN111316277A CN 111316277 A CN111316277 A CN 111316277A CN 201780096648 A CN201780096648 A CN 201780096648A CN 111316277 A CN111316277 A CN 111316277A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- factory
- password
- mode
- capturing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003860 storage Methods 0.000 title claims abstract description 16
- 238000000034 method Methods 0.000 claims abstract description 25
- 238000004590 computer program Methods 0.000 claims abstract description 21
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 238000011084 recovery Methods 0.000 abstract description 56
- 238000005192 partition Methods 0.000 abstract description 13
- 230000006870 function Effects 0.000 description 20
- 238000003825 pressing Methods 0.000 description 10
- 238000012856 packing Methods 0.000 description 6
- 230000001680 brushing effect Effects 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000011022 operating instruction Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
A mobile terminal and a computer readable storage medium for data erasure, the computer readable medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the steps of: capturing a first operation instruction, starting a safety mode, selecting and entering a factory setting restoration protection program in the safety mode, selecting and erasing factory setting restoration protection data in the factory setting restoration protection program, capturing a second operation instruction, inputting password information, comparing the password information with a preset password, and erasing factory setting restoration protection data when the password information is matched with the preset password. According to the method and the device, the entry of the FRP is written into the recovery mode, and a user can erase personal information data in the FRP partition by inputting a correct FRP password in the recovery mode.
Description
The present invention relates to the field of data erasure in mobile terminals, and in particular, to a mobile terminal and a computer-readable storage medium for data erasure.
The Factory setting Protection (FRP) is recovered, is a Protection measure in the android device developed by Google, can protect the device after the device is stolen and lost, and prevents unauthorized user from logging in or using. If the electronic device runs an android OS 5.1 or higher version, after the device logs in a google account and starts the FRP lock, the related account information is stored in an independent partition. If the mobile terminal of the user is lost or stolen, the user can abnormally refresh the mobile terminal or restore the factory settings, and after the device is restarted, the information of the Google account of the user needs to be filled in to complete the boot-up bootstrap program. If the account password is forgotten, the mobile terminal cannot activate the access interface. Meanwhile, the user can also erase the personal information of the user by erasing the data in the FRP partition.
However, in the prior art, the function of erasing the FRP partition by one key implemented by the mobile terminal has a disadvantage that the system cannot be accessed if the password of the mobile terminal is unknown, so the FRP partition cannot be erased. When the user forgets the password, but needs to clear the personal information in the intelligent terminal, the implementation is difficult.
Disclosure of Invention
To solve the above problems, the present invention provides a mobile terminal and a computer-readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
In particular, a computer-readable storage medium for data erasure, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the following steps: capturing a first operation instruction, starting a safety mode, selecting and entering a factory setting restoration protection program in the safety mode, selecting and erasing factory setting restoration protection data in the factory setting restoration protection program, capturing a second operation instruction, inputting password information, comparing the password information with a preset password, and erasing factory setting restoration protection data when the password information is matched with the preset password.
Preferably, the step of capturing a first operation instruction and starting the security mode includes capturing a pair of operation instructions input by the mobile terminal, analyzing the operation instructions to obtain an operation content, and controlling the mobile terminal to enter the security mode according to the operation content.
Preferably, the password information is an unlock code of the factory-reset protection program.
Preferably, the acquiring method of the unlocking code includes reading an international mobile equipment identity of the mobile terminal, and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity.
Preferably, the computer program further implements a step of analyzing the security mode, obtaining a setting authority, and writing an entry for restoring the factory setting protection program into the security mode when executed by the processor.
Preferably, a mobile terminal includes a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program: capturing a first operation instruction, starting a safety mode, selecting and entering a factory setting restoration protection program in the safety mode, selecting and erasing factory setting restoration protection data in the factory setting restoration protection program, capturing a second operation instruction, inputting password information, comparing the password information with a preset password, and erasing factory setting restoration protection data when the password information is matched with the preset password.
Preferably, the step of capturing a first operation instruction and starting the security mode includes capturing a pair of operation instructions input by the mobile terminal, analyzing the operation instructions to obtain an operation content, and controlling the mobile terminal to enter the security mode according to the operation content.
Preferably, the password information is an unlock code of the factory-reset protection program.
Preferably, the acquiring method of the unlocking code includes reading an international mobile equipment identity of the mobile terminal, and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity.
Preferably, the processor implements the following steps when executing the computer program, analyzes the security mode, obtains the setting authority, and writes the entry of the factory-reset protection program into the security mode.
Compared with the prior art, the invention has the technical advantages that: the invention provides a mobile terminal and a computer readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
FIG. 1 is a flowchart illustrating steps implemented by a processor in a computer program stored on a computer-readable storage medium for data erasure according to a preferred embodiment of the present invention;
FIG. 2 is a flowchart illustrating the steps of preferably capturing a first operating command to initiate secure mode, in accordance with the present invention;
FIG. 3 is a flowchart illustrating a preferred step of obtaining an unlock code for restoring factory settings of the protected program in FIG. 1;
fig. 4 is a flowchart illustrating a procedure for writing an entry to the secure mode, which preferably restores the factory set protection program, in accordance with fig. 1.
The advantages of the invention are explained in detail below with reference to the drawings and the embodiments.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. Depending on context, the word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination"
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In the prior art, the disadvantage of the function of erasing the FRP partition by one key implemented by the mobile terminal is that the system cannot be accessed if the password of the mobile terminal is unknown, so the FRP partition cannot be erased. When the user forgets the password, but needs to clear the personal information in the intelligent terminal, the implementation is difficult.
To solve the above problems, in one aspect of the present invention, a computer-readable storage medium for data erasure is provided. Referring to fig. 1, a flowchart illustrating steps implemented by a processor when a computer program stored on a computer-readable storage medium for data erasure according to a preferred embodiment of the present invention is executed is shown. As can be seen from the figure, in this embodiment, the steps implemented by the computer program when executed by the processor mainly include: s1: capturing a first operation instruction, and starting a safety mode; s2: under the safety mode, selecting and entering a factory reset protection program; s3: in the factory setting restoration protection program, selecting to erase factory setting restoration protection data; s4: capturing a second operation instruction and inputting password information; s5: comparing the password information with a preset password; s6: and when the password information is matched with the preset password, erasing and recovering factory setting protection data.
Specifically, in this embodiment, the steps implemented when the computer program is executed by the processor are as follows:
s1: capturing a first operation instruction, and starting the security mode
Preferably, when the mobile terminal is a mobile terminal with an Android system, the security mode is as follows: the Recovery mode is an Android mobile terminal backup function, and refers to a mode (similar to windows PE or DOS) capable of modifying data or a system inside an Android machine. In this mode, the user can back up or upgrade the existing system, and can restore factory settings. The usage principle of recovery is the same as that of GHOST software on a computer, and the recovery plays a role in system backup and recovery. Of course, the kernel may be upgraded, patched, etc. The recovery is written together with the system baseband, and different baseband versions cannot be flushed. Entering the recovery interface, the user can directly use rom in zip format on the sd card to upgrade (downgrade) the user's system.
Therefore, in this embodiment, when the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
Referring now to FIG. 2, a flowchart illustrating steps for initiating secure mode, preferably capturing a first operating command, is shown, in accordance with the present invention. As can be seen from the figure, in the embodiment, the step of capturing a first operation instruction and starting the security mode includes:
-capturing a pair of operating instructions input by the mobile terminal
-parsing the operation command to obtain an operation content
-controlling the mobile terminal to enter a secure mode in dependence of the content of the operation
In this embodiment, a user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, the operation instruction is further analyzed, for example, the key position, the key force and the like of the user are obtained, and the operation content pointed by the operation instruction is obtained according to the analyzed operation instruction, so that the mobile terminal is further controlled to enter a safe mode.
More preferably, in this embodiment, the method for recovering includes:
1. after the mobile terminal is completely powered off, pressing a volume key down (up) and a power key, and entering a bootloader interface;
2. pressing a volume key to move a cursor to a recovery row;
3. and pressing a power key, and then automatically restarting the mobile terminal to enter a recovery mode.
The volume key is a cursor selection key and can be used for moving a cursor, and the power key is a confirmation key.
S2: under the safety mode, selecting and entering a factory reset protection program
Preferably, when the mobile terminal is a mobile terminal with an Android system, Factory set Protection (FRP) is restored, and a Protection measure in an Android device developed for google can protect the device after the device is stolen or lost, thereby preventing unauthorized user from logging in or using the device.
In order to prevent user information from leaking after the mobile terminal is lost, Google requires that the Android 5.1 version and later versions have the FRP function and are started by default. This security feature may prevent unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is in the enabled state, the user may perform an operation of clearing user data by logging in the Google account remotely, so as to avoid information leakage, and after the method is performed to recover and leave the factory, the user needs to verify that the last logged-in Google account can enter the system by booting, navigating and verifying, and the mobile terminal is normally used. The user can control the FRP function to be turned on and off through a menu of 'setting-developer option-turning on OEM unlocking', and an OEM switch is in a turn-off state, which represents that the FRP function is in a turn-on state. When the FRP is started, the Secureboot can not be unlocked, and the fastboot flush command can not be executed.
In the prior art, the use method and the steps of the basic functions of the FRP comprise the following steps: the FRP use method comprises the following steps of supporting FRP, opening FRP and having a Google account, and comprises the following steps: a. enter setting- > developer option- > OEM unlock, close "OEM unlock" switch (turn on FRP); b. connecting the testing machine with the VPN, and logging in a Google account (a Google account number exists); c. and setting a screen locking password. Therefore, in the prior art, the user can process the data in the FRP only when the user has and knows the Google account and the password thereof.
With reference to fig. 1, in this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal in a secure mode, and after the mobile terminal analyzes the operation instruction, the user may enter a factory-reset protection program of the mobile terminal according to the operation instruction. Therefore, the factory setting restoration protection program can be normally used without logging in the Google account.
S3: in the factory setting restoration protection program, the factory setting restoration protection data is selectively erased
With reference to fig. 1, in this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal when the factory setting restoration protection program is restored, and after the mobile terminal analyzes the operation instruction, the mobile terminal may select to erase and restore the factory setting protection data according to the operation instruction.
S4: capturing a second operation instruction, inputting a password information
Referring to fig. 1, in this embodiment, after the mobile terminal senses that the user selects to erase the factory-reset protection data, a password request is sent, for example, in a form of popping up a dialog box in a display screen of the mobile terminal. The user inputs password information to the mobile terminal by means of a keyboard and the like of the mobile terminal, namely a second operation instruction is sent; after the mobile terminal reads the password information input by the user, the password information is converted into digital information readable by a computer, for example, decimal digits are converted into binary digital information, and the binary digital information is sent out.
Specifically, the password information is an unlock code of the factory-reset protection program.
More preferably, referring to fig. 3, it is a schematic flowchart of a step of preferably obtaining the unlock code of the factory reset protection program in fig. 1. As can be seen from the figure, in this embodiment, the method for acquiring the unlock code includes:
-reading the international mobile equipment identity of the mobile terminal
In this embodiment, an International Mobile Equipment Identity (IMEI) is an abbreviation of the International Mobile Equipment Identity, and an International Mobile Equipment Identity is an "electronic serial number" composed of 15 digits and corresponding to each Mobile phone one by one, and the code is unique throughout the world. Each handset, when assembled, is assigned a globally unique set of numbers that are recorded by the manufacturer from production to delivery.
The IMEI is TAC + FAC + SNR + SP and consists of:
1. the first 6 digits (TAC) is a "model approval number", which generally represents a model.
2. The next 2 digits (FAC) is the "last assembly number", which generally represents the source.
3. The next 6 digits (SNR) is the "string number," which generally represents the production sequence number.
4. The last 1-bit number (SP) is usually "0", which is now on standby for the purpose of checking codes.
The IMEI code is attached to a label on the back of the mobile phone (also stored in the phone, available on the mobile phone as "# 06 #"), and is read from and written to the memory of the mobile phone. It is also the "file" and "identification number" of the mobile phone at the manufacturer.
Therefore, in this embodiment, the international mobile equipment identity of the mobile terminal may be obtained by reading the identification information on the mobile terminal or by pressing "# 06 #" on the mobile terminal.
-retrieving an unlock code of a factory reset protection program of the mobile terminal based on the international mobile equipment identity code
With reference to fig. 3, in the present embodiment, the FRP unlocking code may be queried by using IMEI in the "query unlocking code" function of the FRP unlocking tool, such as the combertner platform.
S5: comparing the password information with a preset password
With reference to fig. 1, in this embodiment, after the mobile terminal captures a password information input by a user to the mobile terminal, the mobile terminal further compares the password information with a preset password stored in the mobile terminal in advance.
S6: when the password information is matched with the preset password, erasing and restoring factory setting protection data
Referring to fig. 1, in this embodiment, when the comparison result of the mobile terminal is that the password information matches the preset password, the mobile terminal may obtain the authority to erase and restore the factory setting protection data. Therefore, the technical effect that the Google account number password is bypassed and the FRP partition data is erased by one key is achieved.
Referring preferably to fig. 4, a flowchart is shown that conforms to a step in fig. 1 in which the entry to the factory reset protection program is preferably written into secure mode. As can be seen from the figure, in this embodiment, the proposed step of writing the entry for restoring the factory setting protection program into the secure mode includes:
-a set permission to initiate a secure mode;
-writing an entry to the factory-set-restore-protection-program into the secure mode.
Specifically, rewriting recovery.img under linux environment, downloading split _ bootimg.zip file, where the zip file includes a perl file, and a split _ bootimg.pl script, where the script can read recovery.img, read kernel and ramdisk, and also output kernel command line and board name. Unpacking recovery.img; recreating ramdisk using mkbootfs tool; and (3) recreating recovery-new.img by using mkbootimg to obtain a new recovery-new.img, and then brushing in the third party recovery.
Preferably, in this embodiment, a recovery that satisfies the condition may be newly created and written into the original recovery, and the specific steps are as follows:
1. decompressing native recovery.img from the official package;
2. solving the core recovery, img-kernel and ramdisk memory mirror images of the primary recovery package, and then unpacking the ramdisk memory mirror images;
3. finding a suitable third party recovery package with better function, for example, taking recovery-clock work-5.0.2.0.img of G6 as an example, similarly solving the kernel memory mirror and the ramdisk memory mirror image, and then unpacking the ramdisk memory mirror image;
4. preparing a new recovery kernel, wherein in the embodiment, by using recovery.img-kernel of an official native package, only the native kernel can be matched with hardware of the mobile terminal;
5. the memory disc of the ramdisk is modified,
6. packing the new ramdisk memory according to the method for packing the ramdisk;
7. packing according to the above method to generate new recovery-new.img;
8. brushing the new recovery-new.img into the mobile phone;
9. img, opening the native recovery of the mobile phone, comparing file headers of the two files, and copying the first 16 native lines (000h-100h) to the new recovery for covering.
10. And finally, changing the first three bytes of the new recovery-new.img and the second line back to the three values just recorded and storing.
Img-kernel is a new kernel; the ram disk-new.gz is a new memory disk; the boot-new.img is the new img generated, and the boot.img or recovery.img packed according to the method can be directly used on the mobile terminal because the base address and the kernel parameter are correct.
In summary, the present invention provides a mobile terminal and a computer-readable storage medium for data erasure. The invention writes the entry of the FRP into the recovery mode, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
Another aspect of the present invention provides a mobile terminal, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
s' 1: capturing a first operation instruction, and starting a safety mode; s' 2: under the safety mode, selecting and entering a factory reset protection program; s' 3: in the factory setting restoration protection program, selecting to erase factory setting restoration protection data; s' 4: capturing a second operation instruction and inputting password information; s' 5: comparing the password information with a preset password; s' 6: and when the password information is matched with the preset password, erasing and recovering factory setting protection data.
Specifically, in this embodiment, when the processor executes the computer program, the following steps are implemented:
s' 1: capturing a first operation instruction, and starting the security mode
Preferably, when the mobile terminal is a mobile terminal with an Android system, the security mode is as follows: the Recovery mode is an Android mobile terminal backup function, and refers to a mode (similar to windows PE or DOS) capable of modifying data or a system inside an Android machine. In this mode, the user can back up or upgrade the existing system, and can restore factory settings. The usage principle of recovery is the same as that of GHOST software on a computer, and the recovery plays a role in system backup and recovery. Of course, the kernel may be upgraded, patched, etc. The recovery is written together with the system baseband, and different baseband versions cannot be flushed. Entering the recovery interface, the user can directly use rom in zip format on the sd card to upgrade (downgrade) the user's system.
Therefore, in this embodiment, when the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
Preferably, in this embodiment, the step of capturing a first operation instruction and starting the security mode includes:
-capturing a pair of operating instructions input by the mobile terminal
-parsing the operation command to obtain an operation content
-controlling the mobile terminal to enter a secure mode in dependence of the content of the operation
In this embodiment, a user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, the operation instruction is further analyzed, for example, the key position, the key force and the like of the user are obtained, and the operation content pointed by the operation instruction is obtained according to the analyzed operation instruction, so that the mobile terminal is further controlled to enter a safe mode.
More preferably, in this embodiment, the method for recovering includes:
1. after the mobile terminal is completely powered off, pressing a volume key down (up) and a power key, and entering a bootloader interface;
2. pressing a volume key to move a cursor to a recovery row;
3. and pressing a power key, and then automatically restarting the mobile terminal to enter a recovery mode.
The volume key is a cursor selection key and can be used for moving a cursor, and the power key is a confirmation key.
S' 2: under the safety mode, selecting and entering a factory reset protection program
Preferably, when the mobile terminal is a mobile terminal with an Android system, Factory set Protection (FRP) is restored, and a Protection measure in an Android device developed for google can protect the device after the device is stolen or lost, thereby preventing unauthorized user from logging in or using the device.
In order to prevent user information from leaking after the mobile terminal is lost, Google requires that the Android 5.1 version and later versions have the FRP function and are started by default. This security feature may prevent unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is in the enabled state, the user may perform an operation of clearing user data by logging in the Google account remotely, so as to avoid information leakage, and after the method is performed to recover and leave the factory, the user needs to verify that the last logged-in Google account can enter the system by booting, navigating and verifying, and the mobile terminal is normally used. The user can control the FRP function to be turned on and off through a menu of 'setting-developer option-turning on OEM unlocking', and an OEM switch is in a turn-off state, which represents that the FRP function is in a turn-on state. When the FRP is started, the Secureboot can not be unlocked, and the fastboot flush command can not be executed.
In the prior art, the use method and the steps of the basic functions of the FRP comprise the following steps: the FRP use method comprises the following steps of supporting FRP, opening FRP and having a Google account, and comprises the following steps: a. enter setting- > developer option- > OEM unlock, close "OEM unlock" switch (turn on FRP); b. connecting the testing machine with the VPN, and logging in a Google account (a Google account number exists); c. and setting a screen locking password. Therefore, in the prior art, the user can process the data in the FRP only when the user has and knows the Google account and the password thereof.
Preferably, in this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal in a secure mode, and after the mobile terminal analyzes the operation instruction, the user may enter a factory-reset protection program of the mobile terminal according to the operation instruction. Therefore, the factory setting restoration protection program can be normally used without logging in the Google account.
S' 3: in the factory setting restoration protection program, the factory setting restoration protection data is selectively erased
In this embodiment, a user may send an operation instruction to the mobile terminal in a form of triggering a specific button on the mobile terminal when a factory-setting restoration protection program is restored, and after the mobile terminal analyzes the operation instruction, the mobile terminal may select to erase and restore factory-setting protection data according to the operation instruction.
S' 4: capturing a second operation instruction, inputting a password information
In this embodiment, after the mobile terminal senses that the user selects to erase and restore factory-set protection data, a password request is sent, for example, in a form of popping up a dialog box in a display screen of the mobile terminal. The user inputs password information to the mobile terminal by means of a keyboard and the like of the mobile terminal, namely a second operation instruction is sent; after the mobile terminal reads the password information input by the user, the password information is converted into digital information readable by a computer, for example, decimal digits are converted into binary digital information, and the binary digital information is sent out.
Specifically, the password information is an unlock code of the factory-reset protection program.
More preferably, in this embodiment, the method for acquiring the unlock code includes:
-reading the international mobile equipment identity of the mobile terminal
In this embodiment, an International Mobile Equipment Identity (IMEI) is an abbreviation of the International Mobile Equipment Identity, and an International Mobile Equipment Identity is an "electronic serial number" composed of 15 digits and corresponding to each Mobile phone one by one, and the code is unique throughout the world. Each handset, when assembled, is assigned a globally unique set of numbers that are recorded by the manufacturer from production to delivery.
The IMEI is TAC + FAC + SNR + SP and consists of:
1. the first 6 digits (TAC) is a "model approval number", which generally represents a model.
2. The next 2 digits (FAC) is the "last assembly number", which generally represents the source.
3. The next 6 digits (SNR) is the "string number," which generally represents the production sequence number.
4. The last 1-bit number (SP) is usually "0", which is now on standby for the purpose of checking codes.
The IMEI code is attached to a label on the back of the mobile phone (also stored in the phone, available on the mobile phone as "# 06 #"), and is read from and written to the memory of the mobile phone. It is also the "file" and "identification number" of the mobile phone at the manufacturer.
Therefore, in this embodiment, the international mobile equipment identity of the mobile terminal may be obtained by reading the identification information on the mobile terminal or by pressing "# 06 #" on the mobile terminal.
-retrieving an unlock code of a factory reset protection program of the mobile terminal based on the international mobile equipment identity code
In this embodiment, the FRP unlocking code may be queried by using the IMEI in the "query unlocking code" function of the FRP unlocking tool, such as the ComPartner platform.
S' 5: comparing the password information with a preset password
In this implementation, after the mobile terminal captures password information input by a user to the mobile terminal, the mobile terminal further compares the password information with a preset password stored in the mobile terminal in advance.
S' 6: when the password information is matched with the preset password, erasing and restoring factory setting protection data
In this embodiment, when the comparison result of the mobile terminal is that the password information matches the preset password, the mobile terminal may obtain the permission to erase and restore the factory-set protection data. Therefore, the technical effect that the Google account number password is bypassed and the FRP partition data is erased by one key is achieved.
Preferably, in this embodiment, the step of writing the entry for restoring the factory setting protection program into the secure mode includes:
-a set permission to initiate a secure mode;
-writing an entry to the factory-set-restore-protection-program into the secure mode.
Specifically, rewriting recovery.img under linux environment, downloading split _ bootimg.zip file, where the zip file includes a perl file, and a split _ bootimg.pl script, where the script can read recovery.img, read kernel and ramdisk, and also output kernel command line and board name. Unpacking recovery.img; recreating ramdisk using mkbootfs tool; and (3) recreating recovery-new.img by using mkbootimg to obtain a new recovery-new.img, and then brushing in the third party recovery.
Preferably, in this embodiment, a recovery that satisfies the condition may be newly created and written into the original recovery, and the specific steps are as follows:
1. decompressing native recovery.img from the official package;
2. solving the core recovery, img-kernel and ramdisk memory mirror images of the primary recovery package, and then unpacking the ramdisk memory mirror images;
3. finding a suitable third party recovery package with better function, for example, taking recovery-clock work-5.0.2.0.img of G6 as an example, similarly solving the kernel memory mirror and the ramdisk memory mirror image, and then unpacking the ramdisk memory mirror image;
4. preparing a new recovery kernel, wherein in the embodiment, by using recovery.img-kernel of an official native package, only the native kernel can be matched with hardware of the mobile terminal;
5. the memory disc of the ramdisk is modified,
6. packing the new ramdisk memory according to the method for packing the ramdisk;
7. packing according to the above method to generate new recovery-new.img;
8. brushing the new recovery-new.img into the mobile phone;
9. img, opening the native recovery of the mobile phone, comparing file headers of the two files, and copying the first 16 native lines (000h-100h) to the new recovery for covering.
10. And finally, changing the first three bytes of the new recovery-new.img and the second line back to the three values just recorded and storing.
Img-kernel is a new kernel; the ram disk-new.gz is a new memory disk; the boot-new.img is the new img generated, and the boot.img or recovery.img packed according to the method can be directly used on the mobile terminal because the base address and the kernel parameter are correct.
In summary, the present invention provides a mobile terminal. The invention writes the entry of the FRP into the recovery mode of the mobile terminal, and the user can erase personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
It should be noted that the embodiments of the present invention have been described in terms of preferred embodiments, and not by way of limitation, and that those skilled in the art can make modifications and variations of the embodiments described above without departing from the spirit of the invention.
Claims (10)
- A computer-readable storage medium for data erasure, having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the steps of:capturing a first operation instruction, starting the safety mode,under the safe mode, selecting and entering a factory resetting protection program,in the factory reset protection program, the factory reset protection data is selected to be erased,capturing a second operation command, inputting a password information,comparing the password information with a preset password,when the password information matches the preset password,and erasing and restoring factory setting protection data.
- The computer-readable storage medium of claim 1,capturing a first operating command, the step of initiating the secure mode comprising,capturing a pair of operation instructions input by the mobile terminal,analyzing the operation instruction to obtain an operation content,and controlling the mobile terminal to enter a safe mode according to the operation content.
- The computer-readable storage medium of claim 1,and the password information is an unlocking code for restoring the factory-set protection program.
- The computer-readable storage medium of claim 3,the acquisition method of the unlocking code comprises the following steps,reading the international mobile equipment identity of the mobile terminal,and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity code.
- The computer-readable storage medium of claim 1,the computer program when executed by a processor further realizes the following steps,the security mode is analyzed, and the security mode is analyzed,the set-up right is obtained and,and writing the entry of the factory-setting restoration protection program into the safety mode.
- A mobile terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of:capturing a first operation instruction, starting the safety mode,under the safe mode, selecting and entering a factory resetting protection program,in the factory reset protection program, the factory reset protection data is selected to be erased,capturing a second operation command, inputting a password information,comparing the password information with a preset password,when the password information matches the preset password,and erasing and restoring factory setting protection data.
- The mobile terminal of claim 1,capturing a first operating command, the step of initiating the secure mode comprising,capturing a pair of operation instructions input by the mobile terminal,analyzing the operation instruction to obtain an operation content,and controlling the mobile terminal to enter a safe mode according to the operation content.
- The mobile terminal of claim 1,and the password information is an unlocking code for restoring the factory-set protection program.
- The mobile terminal of claim 3,the acquisition method of the unlocking code comprises the following steps,reading the international mobile equipment identity of the mobile terminal,and retrieving the unlocking code of the factory-reset protection program of the mobile terminal according to the international mobile equipment identity code.
- The mobile terminal of claim 1,the processor realizes the following steps when executing the computer program,the security mode is analyzed, and the security mode is analyzed,the set-up right is obtained and,and writing the entry of the factory-setting restoration protection program into the safety mode.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/110164 WO2019090586A1 (en) | 2017-11-09 | 2017-11-09 | Mobile terminal, and computer readable storage medium for data wiping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111316277A true CN111316277A (en) | 2020-06-19 |
CN111316277B CN111316277B (en) | 2024-07-23 |
Family
ID=66437523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780096648.5A Active CN111316277B (en) | 2017-11-09 | 2017-11-09 | Mobile terminal and computer readable storage medium for data erasure |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111316277B (en) |
WO (1) | WO2019090586A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11334662B2 (en) * | 2020-07-14 | 2022-05-17 | Bank Of America Corporation | Tamper-evident travel devices equipped with secure re-image file (s) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100198791A1 (en) * | 2009-02-05 | 2010-08-05 | Grace Zhanglei Wu | System, method, and computer program product for allowing access to backup data |
CN102883026A (en) * | 2012-09-07 | 2013-01-16 | 广东欧珀移动通信有限公司 | Method for implementing start-up protection on mobile terminal |
EP2574022A1 (en) * | 2011-09-23 | 2013-03-27 | Lg Electronics Inc. | Mobile terminal and method of providing security thereto |
WO2014123758A1 (en) * | 2013-02-08 | 2014-08-14 | Sprint Communications Company, L.P. | System and method of storing service brand packages on a mobile device |
CN104615951A (en) * | 2015-02-13 | 2015-05-13 | 联想(北京)有限公司 | Information processing method and mobile terminal |
CN105224423A (en) * | 2015-10-26 | 2016-01-06 | Tcl海外电子(惠州)有限公司 | Terminal data backup method and device |
CN106778359A (en) * | 2015-11-20 | 2017-05-31 | 宏碁股份有限公司 | Reset the release method and its electronic installation of protection of dispatching from the factory |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150154002A1 (en) * | 2013-12-04 | 2015-06-04 | Google Inc. | User interface customization based on speaker characteristics |
CN104348979B (en) * | 2014-11-13 | 2016-03-30 | 努比亚技术有限公司 | Mobile terminal and note thereof display packing in an encrypted mode and device |
CN104539811A (en) * | 2015-01-23 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Anti-theft method of terminal and mobile terminal |
-
2017
- 2017-11-09 CN CN201780096648.5A patent/CN111316277B/en active Active
- 2017-11-09 WO PCT/CN2017/110164 patent/WO2019090586A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100198791A1 (en) * | 2009-02-05 | 2010-08-05 | Grace Zhanglei Wu | System, method, and computer program product for allowing access to backup data |
EP2574022A1 (en) * | 2011-09-23 | 2013-03-27 | Lg Electronics Inc. | Mobile terminal and method of providing security thereto |
CN102883026A (en) * | 2012-09-07 | 2013-01-16 | 广东欧珀移动通信有限公司 | Method for implementing start-up protection on mobile terminal |
WO2014123758A1 (en) * | 2013-02-08 | 2014-08-14 | Sprint Communications Company, L.P. | System and method of storing service brand packages on a mobile device |
CN104615951A (en) * | 2015-02-13 | 2015-05-13 | 联想(北京)有限公司 | Information processing method and mobile terminal |
CN105224423A (en) * | 2015-10-26 | 2016-01-06 | Tcl海外电子(惠州)有限公司 | Terminal data backup method and device |
CN106778359A (en) * | 2015-11-20 | 2017-05-31 | 宏碁股份有限公司 | Reset the release method and its electronic installation of protection of dispatching from the factory |
Also Published As
Publication number | Publication date |
---|---|
CN111316277B (en) | 2024-07-23 |
WO2019090586A1 (en) | 2019-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7840794B2 (en) | OS starting method and apparatus using the same | |
JP6054908B2 (en) | Method for repairing variable sets, computer program and computer | |
US9292680B2 (en) | Mobile terminal detection method and mobile terminal | |
US20140115316A1 (en) | Boot loading of secure operating system from external device | |
CN104506639A (en) | Root right acquiring method and device | |
JP2004151785A (en) | Detachable device and method for starting program | |
JP2006092547A (en) | Computer system with basic input-output system and control method thereof | |
US20160004648A1 (en) | Data erasing apparatus, data erasing method, and computer-readable storage medium | |
CN113626822B (en) | UEFI firmware starting method and device integrating LinuxBoot | |
TW200305807A (en) | Basic input/output system (BIOS) shadowed small-print hard disk drive as robust, always on, backup for hard disk image & software failure | |
KR20200141560A (en) | Security system and method for computer using usb storage medium | |
KR102459774B1 (en) | Method of encrypting dll file, system of encrypting dll file performing the same, and storage medium storing the same | |
CN105786545B (en) | Breakpoint recovery method and system based on heterogeneous hybrid memory | |
WO2018049798A1 (en) | Method and apparatus for reconstructing cache partition | |
US20050193195A1 (en) | Method and system for protecting data of storage unit | |
Gómez-Miralles et al. | Versatile iPad forensic acquisition using the apple camera connection kit | |
JP4653497B2 (en) | Portable storage device | |
CN111316277B (en) | Mobile terminal and computer readable storage medium for data erasure | |
CN107818272A (en) | Hard disk secure starts and hard disk binding method, device and industrial computer | |
JP5304229B2 (en) | Terminal device | |
US8924306B2 (en) | Remote computer rebooting tool | |
CN109522174B (en) | Method, device, terminal and storage medium for controlling adb enabling | |
CN105488436A (en) | Mobile storage equipment access method and device | |
CN113721837B (en) | Storage medium information elimination method and device based on BIOS | |
CN106227665B (en) | A kind of equipment starting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |