CN117785041A - Mobile equipment data clearing method - Google Patents

Mobile equipment data clearing method Download PDF

Info

Publication number
CN117785041A
CN117785041A CN202311795240.0A CN202311795240A CN117785041A CN 117785041 A CN117785041 A CN 117785041A CN 202311795240 A CN202311795240 A CN 202311795240A CN 117785041 A CN117785041 A CN 117785041A
Authority
CN
China
Prior art keywords
data
equipment
erasing
crushing
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311795240.0A
Other languages
Chinese (zh)
Inventor
刘军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shark Leakage Information Technology Co ltd
Original Assignee
Shenzhen Shark Leakage Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shark Leakage Information Technology Co ltd filed Critical Shenzhen Shark Leakage Information Technology Co ltd
Priority to CN202311795240.0A priority Critical patent/CN117785041A/en
Publication of CN117785041A publication Critical patent/CN117785041A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a mobile equipment data clearing method, which comprises the following steps: step one: connecting equipment to an hourglass inspection machine, and switching to a privacy crushing page; step two: connecting equipment to be crushed, selecting a plurality of equipment, crushing the equipment, and arranging crushing modes; step three: performing a first complete erase operation on the device using the corresponding function of the library; step four: after waiting for the equipment to be reconnected to the software, activating the equipment; step five: installing a mobile phone end IOS erasing APP by using an authorization technology, directly opening, and starting erasing operation; the beneficial effects of the invention are as follows: through the multiple thorough erasing operations, the user data can be ensured not to be recovered, so that the operation effect of data clearing is achieved; in addition, other technical means are adopted to further ensure the data security, so that the data clearing effect can be fully ensured, and the data security, integrity and reliability of a user are ensured.

Description

Mobile equipment data clearing method
Technical Field
The invention belongs to the technical field of data clearing, and particularly relates to a mobile equipment data clearing method.
Background
With the development and popularization of technology, our lives and works are more and more separated from various electronic devices; among these devices, the mobile phone device is favored for its excellent performance and user experience; however, the importance of data scavenging is increasingly prominent in addressing issues of personal privacy and information security.
In the mobile phone device, a large amount of user information such as photos, videos, chat records, mails, etc. is stored; such information may relate to personal privacy, business confidentiality or sensitive information, which, once revealed or utilized by lawbreakers, would have a serious impact on the user; therefore, in the case of maintenance, sales, scrapping, etc. of the mobile phone equipment, data clearing is very necessary.
Firstly, the data clearing of the mobile phone equipment has important significance in recovering the application of the missing mobile phone; when the mobile phone is lost or stolen, the primary task is to prevent data leakage; the privacy and information safety of the user can be protected by remotely locking or erasing the mobile phone data; in addition, in the process of retrieving the mobile phone, the data are erased, so that personal privacy is protected, and adverse effects are avoided; secondly, with the prosperity of the secondhand market, the buying and selling of the secondhand mobile phone equipment is also becoming increasingly common, and data clearing is necessary before the mobile phone equipment is sold or donated; thus, personal information can be prevented from being revealed, and the rights and interests of the purchaser are ensured.
In addition, at the end of the service life of the mobile phone equipment, data clearing is also important; the data is cleared before the equipment is abandoned, so that sensitive information leakage can be effectively avoided, and information security risks are reduced.
The operation steps of data clearing of the mobile phone device generally comprise selecting a data clearing mode, deriving data and the like; different cleaning modes are suitable for different scenes, and a user can select a proper cleaning mode according to actual requirements; in terms of exporting data, a user can select to backup the data to other storage devices or the cloud to prevent the data from being lost; in general, the application field of mobile phone equipment data clearing is wide, and the mobile phone equipment data clearing relates to equipment maintenance, selling, scrapping and other scenes; by data clearing, the privacy and information safety of the user can be effectively protected, and potential risks are avoided; of course, in actual operation, the user needs to pay attention to obey relevant laws and regulations and safety regulations, so as to ensure the legitimacy and safety of data clearing; meanwhile, in order to better protect personal privacy and information security, users are recommended to backup important data periodically so as not to cause data loss due to equipment failure or loss.
With the popularity of mobile devices, users have increasingly demanded security and privacy protection of personal data in the devices; however, the existing data clearing method often cannot clear all data in the device thoroughly, so that there is a risk of data leakage.
Disclosure of Invention
The invention aims to provide a mobile device data clearing method which can thoroughly clear device data and ensure that the data cannot be restored.
In order to achieve the above purpose, the present invention provides the following technical solutions: the method for clearing the data of the mobile equipment comprises the following steps:
step one: connecting equipment to an hourglass inspection machine, and switching to a privacy crushing page;
step two: connecting equipment to be crushed, selecting a plurality of equipment, crushing the equipment, and arranging crushing modes;
step three: performing a first complete erase operation on the device using the corresponding function of the library;
step four: after waiting for the equipment to be reconnected to the software, activating the equipment;
step five: installing a mobile phone end IOS erasing APP by using an authorization technology, directly opening, and starting erasing operation;
step six: and (3) finishing the APP operation of the mobile phone erasing terminal, connecting the client of the hourglass inspection machine again, and performing the operation of clearing all data again.
As a preferred technical scheme of the present invention, the method further comprises encryption processing of all data.
As a preferred embodiment of the present invention, the method for encrypting all data includes using advanced encryption standard AES, triple DES, RSA encryption algorithm.
As a preferable technical scheme of the invention, the method also comprises anonymization processing technology, wherein personal information and identification information are replaced by random characters or deleted.
As a preferred technical solution of the present invention, the anonymization processing technology includes data desensitization; summarizing data; randomizing data; data generalization; data disturbance; exchanging data; sampling data; encrypting data; differential privacy.
As a preferable technical scheme of the invention, a file crushing technology is adopted to delete the sensitive files at the file level and delete the sensitive files at the bottom level.
As a preferable technical scheme of the invention, the file crushing technology comprises file-level deletion; deleting the bottom layer level; covering data; and (5) whole-disk erasing.
As a preferred technical solution of the present invention, the authorization technique includes authentication of a device user or password authorization.
Compared with the prior art, the invention has the beneficial effects that:
through the multiple thorough erasing operations, the user data can be ensured not to be recovered, so that the operation effect of data clearing is achieved; in addition, other technical means are adopted to further ensure the data security, so that the data clearing effect can be fully ensured, and the data security, integrity and reliability of a user are ensured;
the data recovery method and the device can effectively prevent the data of the user from being recovered, thereby greatly enhancing the safety of the data of the user and meeting the requirement of the user on data protection.
Drawings
FIG. 1 is a flow chart of a data clearing method according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1, a first embodiment of the present invention provides a method for clearing data of a mobile device, which includes the following steps:
step one: connecting equipment to an hourglass inspection machine, and switching to a privacy crushing page;
step two: connecting equipment to be crushed, selecting a plurality of equipment, crushing the equipment, and arranging crushing modes;
step three: performing a first complete erase operation on the device using the corresponding function of the library;
step four: after waiting for the equipment to be reconnected to the software, activating the equipment;
step five: installing a mobile phone end IOS erasing APP by using an authorization technology, directly opening, and starting erasing operation;
step six: and (3) finishing the APP operation of the mobile phone erasing terminal, connecting the client of the hourglass inspection machine again, and performing the operation of clearing all data again.
In the technical aspect, by means of the bottom functions of the library of the libibileless and the iTunes, the device is subjected to two complete erasure operations so as to ensure that the data of a user cannot be recovered; firstly, we use the corresponding function to carry out the first complete erasing to the equipment, then wait for the equipment to be reconnected to the software, then carry out the activating operation to the equipment, then use the authorization technology, install the mobile phone terminal erasing APP and directly open, default to open the erasing operation, once the mobile phone erasing terminal APP is operated to be completed (the operation can carry out the comprehensive overwriting to the hard disk of the equipment so as to ensure that the data can not be recovered), we connect the hourglass checking machine client again, and carry out the operation of clearing all the data again (the second complete erasing), through a plurality of complete erasures, we can ensure that the data of the user can not be recovered, thereby achieving the operation effect of data clearing.
Example 2
Referring to fig. 1, a second embodiment of the present invention provides a method for clearing data of a mobile device, including the following steps:
step one: connecting equipment to an hourglass inspection machine, and switching to a privacy crushing page;
step two: connecting equipment to be crushed, selecting a plurality of equipment, crushing the equipment, and arranging crushing modes;
step three: performing a first complete erase operation on the device using the corresponding function of the library;
step four: after waiting for the equipment to be reconnected to the software, activating the equipment;
step five: installing a mobile phone end IOS erasing APP by using an authorization technology, directly opening, and starting erasing operation;
step six: and (3) finishing the APP operation of the mobile phone erasing terminal, connecting the client of the hourglass inspection machine again, and performing the operation of clearing all data again.
In the technical aspect, by means of the bottom functions of the library of the libibileless and the iTunes, the device is subjected to two complete erasure operations so as to ensure that the data of a user cannot be recovered; firstly, we use the corresponding function to carry out the first complete erasing to the equipment, then wait for the equipment to be reconnected to the software, then carry out the activating operation to the equipment, then use the authorization technology, install the mobile phone terminal erasing APP and directly open, default to open the erasing operation, once the mobile phone erasing terminal APP is operated to be completed (the operation can carry out the comprehensive overwriting to the hard disk of the equipment so as to ensure that the data can not be recovered), we connect the hourglass checking machine client again, and carry out the operation of clearing all the data again (the second complete erasing), through a plurality of complete erasures, we can ensure that the data of the user can not be recovered, thereby achieving the operation effect of data clearing.
All data are cleared for the equipment: the mobile phone equipment is connected to the computer by using a data line, the software can automatically search the equipment and connect the equipment, and the equipment pops up a window needing to be trusted or unlocked during connection, and the step is that a user manually operates to trust or unlock, so that the equipment can be normally managed after the user finishes the operation; at this time, the state of the display device on the software interface is: to be erased;
the first data clearing is carried out on the equipment, the step is to call a system level API inside the equipment, and the effect is as follows: setting-general-transmitting or restoring mobile phone-erasing all contents and the effect when setting clicking are the same, one key is used for carrying out operations of restoring factory settings and erasing all contents on equipment, the equipment can instantly enter an erasing mode of a black screen during operation to start data erasing on the equipment, at the moment, the equipment is not required to be subjected to any operation, automatic restarting is carried out after automatic operation of the equipment is waited, the first data erasing is completed after the system is restarted, and at the moment, the state of the equipment is displayed on a software interface: the first cleaning is successful;
waiting for the device to restart and then connecting: because the first data clearing requires restarting the device, the software stands by at this time, and waits for the data clearing completion device to be automatically reconnected to the software, and at this time, manual operation by a user may be required for unlocking; at this time, the state of the display device on the software interface is: waiting for reconnection;
activating the device: because the device is reset to an unactivated mode after the first data clearing, the next operation can be performed after the device is activated, the hardware identification code of the device is required to be collected for the activating operation, the hardware identification code is arranged into an XML format file with a standard format, the XML format file is sent to an activating server (https:// albert. App. Com/device activation) of the mobile phone, the device is required to be connected with a network, the activating server waits for data verification, and the mobile phone server returns information of successful activation of the device when the data verification passes; at this time, the state of the display device on the software interface is: the device is being activated;
installing an IOS erasure APP: in order to remove the data and ensure the function design which cannot be recovered, the method needs to be matched with an iOS APP for operation, the APP is built in software by default and can be directly installed when needed, and downloading from a server is not needed; the installation is to call an internal API of the equipment, the iOS APP is required to be uploaded to a file system in the equipment, and the corresponding installation API is called for one-key installation, and the API returns information of successful installation; at this time, the state of the display device on the software interface is: the erasure APP is being installed;
starting erasing at the mobile phone end: after the APP is successfully installed, the APP is manually clicked and opened by a user, and the APP automatically starts the erasing operation by default after opening, so that the APP generates coverage data until the equipment memory is fully occupied (the time consumption can be different according to the size of the equipment memory), and the predicted remaining time is displayed on an interface; at this time, the state of the display device on the software interface is: the mobile phone terminal is erased, at the moment, the equipment can be disconnected, and other equipment is operated;
after the mobile phone end is erased, the hourglass inspection machine is connected: after the mobile phone end is erased, the APP interface prompts the erasure completion, and the mobile phone end is connected with a computer for the next operation; at this time, the device is reconnected to the computer; at this time, the state of the display device on the software interface is: the mobile phone end is erased;
and cleaning all materials of the equipment again: in order to ensure the thoroughly degree of the data cleaning after the erasing completion degree, the equipment is cleaned again, and the process is the same as the second step;
and (3) completion: after the operation is finished, the equipment is erased, the equipment is marked, and the interface shows that the current equipment is erased.
In this embodiment, it is preferable to further include performing encryption processing on all the data to ensure that even if the data is recovered, it cannot be read; the method for encrypting all data comprises the steps of using advanced encryption standard AES, triple DES and RSA encryption algorithm;
the advanced encryption standard AES is a trusted standard algorithm used by the united states government and other organizations, 128 bit format is already very secure, but AES will also use 192 bit and 256 bit keys to achieve very demanding encryption purposes, well recognized as sufficient to cope with all attacks except brute force attacks; AES will ultimately be the preferred standard for private sector encryption of data as perceived by many internet security professionals;
triple DES is the successor of the original Data Encryption Standard (DES) algorithm created to cope with hackers attempting to break DES; applying a three-time DES algorithm to each data block, typically used to encrypt UNIX passwords and ATM PINs;
RSA is a public key encryption asymmetric algorithm, is a standard for encrypting information transmitted by a network, has strong and reliable encryption function, can generate a large number of messy codes, and is frustrated by potential hackers, because cracking a system can cause the hackers to consume a large amount of time and energy, and have to be abandoned;
when the data encryption processing is implemented, the user input UserName can be used for requesting the API of the server to acquire the key of the data encryption processing through the Http protocol, and then the UserPWD of the user and the key are combined to form a new key.
In this embodiment, preferably, the method further includes anonymizing processing technology, in which personal information and identification information are replaced by random characters or deleted, so as to protect privacy and security of users; anonymizing processing techniques include data desensitization; summarizing data; randomizing data; data generalization; data disturbance; exchanging data; sampling data; encrypting data; differential privacy;
data desensitization: the sensitive data in the personal information is replaced or encrypted, such as the mobile phone number and the identity card number are replaced by specific symbols or numbers;
data generalization: summarizing or blurring specific data in the personal information, such as summarizing and counting age ranges and income ranges;
randomizing data: randomizing specific data in the personal information, such as randomizing address and birthday data;
data generalization: replacing a particular age value with an age group, e.g., generalizing an individual aged 30 years to an age group aged 30-40 years;
data perturbation: adding random perturbations to the numerical attributes, e.g., adding a random offset to payroll values in the raw data;
and (3) data exchange: exchanging attribute values of different individuals, for example, exchanging birth dates of two different individuals in the original dataset;
sampling data: selecting a portion of the samples from the original dataset, e.g., from a dataset containing 1000 individuals, randomly selecting 100 individuals for analysis and sharing;
data encryption: encrypting the data, only authorized users can decrypt and access the original data, e.g., encrypting the entire data set using a symmetric encryption algorithm, and decrypting the data using a key;
differential privacy: privacy is protected by adding noise to the data, for example, by adding some random noise to each data point when publishing statistics, so that the individual contributions are hardly distinguishable.
In this embodiment, preferably, a file shredding technology is used to perform file-level deletion and bottom-level deletion on the sensitive file, so as to ensure that the data cannot be recovered; file shredding techniques include file-level deletion; deleting the bottom layer level; covering data; performing full-disk erasing;
file-level deletion: deleting the file name and the extension thereof or setting the file content to be zero to make the file become an invalid file; thus, the file is completely deleted and cannot be restored;
bottom level delete: the sector where the file is located is marked as being capable of being covered, so that the file is thoroughly deleted; bottom level deletion is typically more thorough than file level deletion, because even if a file is deleted, the sector in which it resides may still retain some information;
data coverage: the original data is covered by repeatedly writing random data into the storage position of the file; the data coverage can effectively prevent recovery, because the original data becomes unrecognizable due to the writing of random data;
full disk erase: all data of the whole hard disk are deleted, so that the whole hard disk becomes a brand new unallocated space, and all data can not be recovered by whole disk erasure.
Through the combined use of the technical means, the data clearing effect can be fully ensured, and the safety, the completeness and the reliability of the data of the user are ensured.
While embodiments of the present invention have been shown and described in detail with reference to the foregoing detailed description, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations may be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. The data clearing method for the mobile equipment is characterized by comprising the following steps of: the cleaning method comprises the following steps:
step one: connecting equipment to an hourglass inspection machine, and switching to a privacy crushing page;
step two: connecting equipment to be crushed, selecting a plurality of equipment, crushing the equipment, and arranging crushing modes;
step three: performing a first complete erase operation on the device using the corresponding function of the library;
step four: after waiting for the equipment to be reconnected to the software, activating the equipment;
step five: installing a mobile phone end IOS erasing APP by using an authorization technology, directly opening, and starting erasing operation;
step six: and (3) finishing the APP operation of the mobile phone erasing terminal, connecting the client of the hourglass inspection machine again, and performing the operation of clearing all data again.
2. The mobile device data clearing method according to claim 1, wherein: and encrypting all data.
3. The mobile device data clearing method according to claim 2, wherein: methods of encrypting all data include the use of advanced encryption standard AES, triple DES, RSA encryption algorithms.
4. The mobile device data clearing method according to claim 1, wherein: the method also comprises anonymization processing technology, wherein personal information and identification information are replaced by random characters or deleted.
5. The method for mobile device data cleansing as defined in claim 4, wherein: the anonymization processing technology comprises data desensitization; summarizing data; randomizing data; data generalization; data disturbance; exchanging data; sampling data; encrypting data; differential privacy.
6. The mobile device data clearing method according to claim 1, wherein: and (3) performing file-level deletion and bottom-level deletion on the sensitive file by adopting a file crushing technology.
7. The mobile device data clearing method of claim 6, wherein: the file crushing technology comprises file-level deletion; deleting the bottom layer level; covering data; and (5) whole-disk erasing.
8. The mobile device data clearing method according to claim 1, wherein: the authorization technique includes device user authentication or password authorization.
CN202311795240.0A 2023-12-25 2023-12-25 Mobile equipment data clearing method Pending CN117785041A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311795240.0A CN117785041A (en) 2023-12-25 2023-12-25 Mobile equipment data clearing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311795240.0A CN117785041A (en) 2023-12-25 2023-12-25 Mobile equipment data clearing method

Publications (1)

Publication Number Publication Date
CN117785041A true CN117785041A (en) 2024-03-29

Family

ID=90384507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311795240.0A Pending CN117785041A (en) 2023-12-25 2023-12-25 Mobile equipment data clearing method

Country Status (1)

Country Link
CN (1) CN117785041A (en)

Similar Documents

Publication Publication Date Title
EP2345977B1 (en) Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
US9348984B2 (en) Method and system for protecting confidential information
US8510572B2 (en) Remote access system, gateway, client device, program, and storage medium
US9100413B2 (en) Selectively wiping a remote device
US7962492B2 (en) Data management apparatus, data management method, data processing method, and program
JP2007241513A (en) Equipment monitoring device
JP2006155554A (en) Database encryption and access control method, and security management device
WO2007058417A1 (en) Digital information storage system, digital information security system, method for storing digital information and method for service digital information
CN112329050A (en) File security management terminal and system
JP4044126B1 (en) Information leakage prevention device, information leakage prevention program, information leakage prevention recording medium, and information leakage prevention system
RU2434283C1 (en) System for protecting information containing state secrets from unauthorised access
CN111339526A (en) USB disk encryption method for enterprise information security
CN111539042A (en) Safe operation method based on trusted storage of core data files
CN117785041A (en) Mobile equipment data clearing method
Grance et al. Guide to computer and network data analysis: Applying forensic techniques to incident response
CN113360877A (en) Method for designing safe mobile storage medium based on RAM
US20010056548A1 (en) Firwall protection in computer network systems
WO2007099716A1 (en) Date communication system, and portable memory
RU2504835C1 (en) System for protecting information containing state secrets from unauthorised access
CN115438358B (en) Controlled file encryption method and electronic equipment
CN112784321B (en) Disk resource security system
JP4899196B2 (en) Data management system, terminal computer, management computer, data management method and program thereof
Day Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
CN117972753A (en) Enterprise management software data security protection method
CN117521132A (en) Security measures and access control method for SAAS system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination