WO2009146650A1 - 擦除终端数据的方法及终端设备 - Google Patents

擦除终端数据的方法及终端设备 Download PDF

Info

Publication number
WO2009146650A1
WO2009146650A1 PCT/CN2009/072107 CN2009072107W WO2009146650A1 WO 2009146650 A1 WO2009146650 A1 WO 2009146650A1 CN 2009072107 W CN2009072107 W CN 2009072107W WO 2009146650 A1 WO2009146650 A1 WO 2009146650A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
range node
erasure
node
erasing
Prior art date
Application number
PCT/CN2009/072107
Other languages
English (en)
French (fr)
Inventor
宋悦
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP09757084.0A priority Critical patent/EP2282603B1/en
Priority to KR1020107029077A priority patent/KR101202237B1/ko
Publication of WO2009146650A1 publication Critical patent/WO2009146650A1/zh
Priority to US12/959,502 priority patent/US8489838B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the invention relates to the field of communication technologies, and in particular to a method and a terminal device for erasing terminal data.
  • OMA Open mobile alliance device management
  • V1.2 is a unified device management specification developed by the OMADM working group.
  • the DM system provides a low-cost solution for third-party management and setting of environment and configuration information in wireless network terminals such as mobile terminals and functional objects in terminals. Solve the problems encountered in the use of these network terminals, install and upgrade software and firmware through the over-the-air (OTA) mode, and provide more personalized and personalized services to enhance the user experience.
  • the third party can be the network management device of the information management department of the mobile operator, service provider or partner.
  • the device proxy (DMAgent) on the terminal is used to interpret and execute the management commands issued by the DM server.
  • the management tree stored on the terminal can be considered as an interface for the DM Server to manage the terminal through the DM protocol. It includes some basic management objects (MO, Management Object), and the DM Server achieves the purpose of controlling the terminal management object by operating the management tree object.
  • the operation commands are Get, Replace, Exec, Copy, Delete, and so on.
  • the range of data can be erased by a node on the management tree.
  • the specific method is to set an erase range node, and the erase range node includes two contents, and one identifies an erase data.
  • Data range such as short message or address book, etc.
  • the second is to give the erasure range section
  • the value of the flag bit in the dot the value of the flag bit in the erase range node is used to indicate whether the data corresponding to the erase range node needs to be erased when the erase operation is performed. For example: If the value of the flag bit in the short message erasure range node is "Ture", the short message data in the terminal is erased when the terminal data is erased. If the value of the flag bit in the short message erasure range node is "False"" , while erasing the terminal data, the short message data stored in the terminal is not erased.
  • the inventors of the present invention have found that, in the prior art, after performing the erasing operation, the data corresponding to the erasing range node has been erased, but the erasing range node of the terminal Still stored in the erasable list; in this case, when the management server performs the erase operation again, after receiving the request from the management server, the terminal will still erase according to the value of the flag bit in the erasure range node.
  • the data corresponding to the range node is deleted.
  • the data corresponding to the erase range node does not exist at this time, which causes a redundant erase operation, which reduces the erasing efficiency of the system and wastes the processing resources of the system. .
  • the erase range node is deleted from the erasable list.
  • setting the value of the flag bit of the erasure range node indicates that the data corresponding to the erasure range node is not deleted.
  • Receiving unit receiving a data erasure request of the management server; a data erasing unit, after the receiving unit receives the data erasing request, deleting data corresponding to each erasing range node according to a value of a flag bit in each erasing range node in the erasable list; and in each After the data corresponding to the erase range node is successfully deleted, the erase range node is deleted from the erasable list.
  • the data erasing request is received by the management server; the data corresponding to each of the erasing range nodes is deleted according to the value of the flag bit in each erasing range node in the erasable list; After the data corresponding to the node is successfully deleted, the erase range node is deleted from the erasable list. It avoids the repeated deletion of deleted data when the management server sends the erase request again, which improves the efficiency of the system to perform the erase operation and saves the processing resources of the system.
  • FIG. 1 is a flowchart of a method for erasing terminal data according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of an erasable list in the first embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for erasing terminal data according to Embodiment 2 of the present invention.
  • Embodiment 4 is a schematic diagram of an erasable list in Embodiment 2 of the present invention.
  • FIG. 5 is a flowchart of a method for erasing terminal data according to Embodiment 3 of the present invention.
  • FIG. 6 is a flowchart of a method for erasing terminal data according to Embodiment 4 of the present invention.
  • FIG. 7 is a schematic diagram showing the logical structure of a terminal device according to Embodiment 5 of the present invention.
  • the embodiment of the invention provides a method for erasing terminal data, and the embodiment of the invention further provides a corresponding terminal device. The details are described below separately.
  • Embodiment 1 A method for erasing terminal data, which is shown in FIG. 1 and includes:
  • A1 receiving a data erasure request of the management server
  • each erasable range node is included in the erasable list, and the value of the flag bit in each erasing range node is used to indicate whether to delete the data corresponding to the erasing range node when performing the erasing operation. .
  • FIG. 2 it is a schematic diagram of an erasable list in the first embodiment of the present invention.
  • the erasable list in Figure 2 contains 3 erase range nodes (1, 2, 3), each erase range section
  • the point includes the list item name and the flag bit; the list item name indicates the erasing range of the node, and the value of the flag bit in the erasing range node is used to indicate whether the data corresponding to the node erasing range needs to be deleted when the erasing operation is performed.
  • the list item name and the flag bit are represented by the child node of the erasing range node. As shown in FIG.
  • the "call record" in the terminal is deleted, and this step deletes the "2" node in the erasable list.
  • step A2 the data corresponding to each of the erasing range nodes is deleted, and the erasing range node is deleted from the erasing list in step A3.
  • step A3 There is no strict sequence between the two steps, and It is necessary to delete the erase range node from the erase list after the data corresponding to the erase range node is successfully deleted, or delete the erase range node from the erase list first, then delete the data or execute at the same time.
  • the management server may reply the information that the node has been deleted, and the reply mode may use Synchronous Result Reporting or Asynchronous Result Reporting.
  • a status code (Result Code) may be included in the reply message, for example, the status code is 1201, which indicates that the erase range node is deleted from the management tree during the erase operation.
  • the data erasure request is received by the management server; according to the erasable column
  • the values of the flag bits in the respective erasure range nodes in the table delete the data corresponding to the respective erasure range nodes; after the data corresponding to each erasure range node is successfully deleted, the erasing range node is erasable from the erasable Remove from the list.
  • the management server sends the erasure request again, the deduplication operation of the deleted data improves the efficiency of the system performing the erasing operation and saves the processing resources of the system.
  • Embodiment 2 A method for erasing terminal data, which is shown in FIG. 3, and includes:
  • step B2 determining whether it is necessary to delete all data according to the value of the flag bit of the fully erased node in the erasable list; if yes, proceeding to step B3; if not, proceeding to step B4;
  • a full erase node is set in the erasable list, and the erase range corresponding to the node is all data saved on the terminal.
  • FIG. 4 it is a schematic diagram of an erasable list in the second embodiment of the present invention.
  • the figure includes a node "1" full erase (ALL) node, and the value of the list item name of the node is: ALL, that is, corresponding To erase the range of all data, the flag value is "True", then the terminal does not need to judge the values of other nodes, and directly erases all data.
  • ALL full erase
  • step B3 delete all the data saved by the terminal, and continue to step B5;
  • step A2 of Embodiment 1 The process of deleting the data corresponding to the erasing node according to the values of the other nodes in this step is as shown in step A2 of Embodiment 1.
  • the second embodiment of the present invention by adding a full erase node to the erasable list, when performing data erasure, it is first determined whether the full erasure is required according to the value of the full erase node, and erasing the terminal in the prior art. When all the data is needed, it is also necessary to judge the value of the flag bit in each erasing range node, which can greatly improve the efficiency of data erasing, speed up the execution time of data erasing, and simplify the data erasing process.
  • step B5 in the second embodiment of the present invention is not an essential step, and only the steps B1 to B4 can be performed to improve the efficiency of data erasure caused by the complete erasure of the terminal data by the full erase node. Speed up the execution of data erasure and simplify the technical effect of the data erasure process.
  • Embodiment 3 A method for erasing terminal data, which is shown in FIG. 5, and includes:
  • step C3 there is no absolute sequence between the step C3 and the step C4.
  • step C4 also takes the completion of the step C2 as the execution condition.
  • the data erasing result fed back to the management server includes: erasure range node information corresponding to data that has not been erased and/or erased.
  • the data erasure result fed back to the management server may further include: a reason code that the data corresponding to the erasure range node is not erased and/or erased.
  • this step emphasizes that, by returning the erasure result, the management server is informed of the erasure of the data corresponding to the respective erasure range nodes of the terminal, so the data erasure result fed back to the management server may include:
  • the erase range node information corresponding to the erased data is not limited to the erased data.
  • the embodiment describes a specific method for feeding back the erasure result to the server after erasing the data.
  • the manner of feedback may be synchronous mode feedback or asynchronous mode feedback.
  • the above is a reply to the server when the erasing operation is successful, except that the code including the successful execution of the command includes one or more ⁇ 111> items, and the ⁇ 80111 ⁇ > sub-item of each ⁇ Item> includes erasure.
  • the URI of the operation (Uniformed Resource Identifier), the ⁇ Target ⁇ item contains the URI of the node that identifies the erasure range, and the ⁇ 0 1 > sub-item is the erasure scope node information.
  • the terminal will reply ⁇ Status> separately for the data that failed to be erased.
  • the data range identifier of one or more erase failures is also included, for example: ⁇ Status>
  • the message uses one or more ⁇ 111> to identify the erase range and the erase result. Similar to the synchronous reply, the ⁇ Source> sub-item contains the URI (Uniformed Resource Identifier) of the erase operation, ⁇ Target ⁇ item Contains the node URI that identifies the scope of the erase, and the ⁇ Data>/ ⁇ Identifier> subkey contains the erase range node information.
  • ⁇ 111> also includes the warning type defined by the present invention for the erasing operation, which indicates that the message is issued for the completion of the erasing operation, and also includes the result code type defined by the present invention, for example, 400 indicates that the erasing failure, Other result codes may be used to indicate more detailed erasure results.
  • 401 indicates that the erasure is failed due to the data being used
  • 402 indicates that the data to be erased is not found, and the like, and there may be more, and the present invention is not limited.
  • Whether it is synchronous reply or asynchronous reply, when erasing all data there are multiple ways to reply. One is to reply only to whether all data is erased successfully or not (ie, the reply in the reply is in the range of
  • the second is to reply to the server with the erase range node information that has not been erased and/or erased
  • the third is to reply the information of the erased erase range node to the server.
  • the third embodiment of the present invention differs from the prior art in that, after the execution of the erase command, the terminal feeds back to the server the information of the success or failure of the execution, which is more general and cannot reflect the data erasure. Specifically, in this embodiment, by feeding back the specific data erasure situation of each node, the management server can know which node is successfully erased, which node is erased, the reason for the failure, etc., which can be more beneficial to the management server to erase the next time. When operating, set the appropriate erase range.
  • the method for feeding back the erasure result in the third embodiment is also applicable to the second embodiment, that is, the steps C1 to C3 can also be replaced with the steps B1 to B5 of the second embodiment.
  • the step C3 may not be included, and only the steps Cl, C2, and C4 may be performed to achieve the beneficial effects of the feedback erasure result of the embodiment.
  • the method may further include:
  • the states of the erased nodes in the erasable list include: no erase range nodes are generated, erase range nodes have been generated, and related nodes have been deleted.
  • the present invention in order to enable the server to understand the status of the erasure range node and the data erasure, the present invention defines a WipeState node, which can be saved at any position of the lock erasure management object. It identifies different erase states, the specific states and their meanings are shown in the following table.
  • the status of "Related Node Deleted" in the table indicates the data and erasure range nodes existing in the terminal. Information nodes are corresponding.
  • the node When the WipeState node is generated in the terminal, the node should be assigned an initial value, which may be one of 10, 20, and 30.
  • the receiving a data erasure request of the management server includes: generating an erasure range node in the erasable list;
  • the status of the erasure range node in the record erasable list includes:
  • the state of the erasing range node is recorded as: no erasing range node is generated;
  • the status of the record erase range node is: The erase range node has been generated.
  • the method further includes: recording the status of the erasing range node as the related node has been deleted.
  • the value of the node should be changed accordingly, which can be set by the terminal or server.
  • the server may first obtain the status information of the node in the erasure range node and the data in the terminal, and then perform the next step.
  • the state of the erasing node may also be other various states according to system requirements.
  • the setting of the specific state does not constitute a limitation of the present invention.
  • the terminal may record more for the erasing node.
  • the scheme for the terminal to record multiple states for the erasing node does not depend on the technical solutions of the first embodiment to the third embodiment, and can be used in combination with the prior art, so that the management server can obtain more information about the terminal. Effect.
  • Embodiment 4 is a method for erasing terminal data.
  • the flowchart is as shown in FIG. 6, and includes:
  • step D2 for each erasure range node in the erasable list; determining whether the value of the flag bit in the erasure range node indicates deletion of data corresponding to the erasure range node; if yes, proceeding to step D3, if not, then not Delete the data corresponding to the erase range node.
  • D3 delete the data corresponding to the erasure range node and continue to step D4; D4. Setting a value of the flag bit of the erasure range node indicates that the data corresponding to the erasure range node is not deleted.
  • the list of the erasable list can be erased.
  • the value of the erasing range node is "True”, indicating that the data corresponding to the erasing range node is deleted, and "False” is not erasing.
  • This step emphasizes that the data is After deleting, change "True” to "False”.
  • "True” and “False” are only an example of data deletion corresponding to the identifier erasing range node. It can be understood that it can also be represented by “1” and "0".
  • the embodiment of the present invention emphasizes that the data corresponding to the erasure range node can be deleted by an identifier.
  • the specific identification manner does not constitute a limitation of the present invention.
  • the flag is not limited to a binary "bit”, but can also be represented by 8 or 16 bits.
  • step D4 the method further includes:
  • the data erase result is fed back to the management server.
  • the data erasure result fed back to the management server includes:
  • the value of the flag bit of the erasure range node is set to indicate that the data corresponding to the erasure range node is not deleted.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: ROM, RAM, disk or CD, etc.
  • a terminal device provided by an embodiment of the present invention is described in detail below.
  • Embodiment 5 a terminal device 600, its logical structure diagram shown in Figure 7, comprising: a receiving unit 610 and a data erasing unit 620;
  • the receiving unit 610 receives a data erasure request of the management server
  • the data erasing unit 620 deletes, according to the value of the flag bit in each erasing range node in the erasable list, the data corresponding to each erasing range node after receiving the data erasing request; After the data corresponding to each erase range node is successfully deleted, the erase range node is erasable from the erasable Removed from the list.
  • the terminal device in this embodiment may further include: an erasure result feedback unit 630, and feeding back a data erasure result to the management server; the data erasure result includes: data corresponding to unerased and/or erased data Erase the range node.
  • the terminal device in this embodiment may further include: a status recording unit that records the status of the erasure range node in the erasure range list.
  • the data erasing request is received by the management server; the data corresponding to each of the erasing range nodes is deleted according to the value of the flag bit in each erasing range node in the erasable list; After the data corresponding to the range node is successfully deleted, the erase range node is deleted from the erasable list. It avoids the repeated deletion of deleted data when the management server issues the erase request again, which improves the efficiency of the system performing the erase operation and saves the processing resources of the system.
  • Another embodiment of the present invention adds a full erase node to the erasable list.
  • it When performing data erasure, it first determines whether full erasure is required according to the value of the full erase node, and in the prior art, when erasing In addition to all the data of the terminal, it is also necessary to judge the value of the flag bit in each erasing range node, which can greatly improve the efficiency of data erasing, speed up the execution time of data erasing, and simplify the data erasing process.
  • the present embodiment can feedback the specific data erasure situation of each node, and the management server can know which node is successfully erased, which node is erased, the cause of failure, etc., which is more beneficial to management. When the server next erases, set the corresponding erase range.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Description

擦除终端数据的方法及终端设备
本申请要求于 2008年 6月 5日提交中国专利局、申请号为 200810111238.6、 发明名称为 "擦除终端数据的方法及终端设备" 的中国专利申请的优先权, 以 及 2009年 2月 24日提交中国专利局、 申请号为 200910004290.6、发明名称为 "擦除终端数据的方法及终端设备"的中国专利申请的优先权, 其全部内容通 过引用结合在本申请中。
技术领域
发明涉及通信技术领域, 具体涉及擦除终端数据的方法及终端设备。
背景技术
开放移动同盟设备管理 ( open mobile alliance device management, OMA
DM ) V1.2, 是 OMADM 工作组制定的设备管理统一规范。
DM系统提供了一种低成本方案,用于第三方管理和设置无线网络终端如: 手机终端及终端中的功能对象, 中的环境和配置信息。 解决这些网络终端在 使用过程中遇到的问题, 通过无线网络(over the air, OTA)方式进行软件和固 件的安装、 升级等操作, 并提供更加人性化和个性化的服务, 提高用户体验。 第三方可以是移动运营商、业务提供商或者合作方的信息管理部门的网络管理 设备。
在整体结构图中, 终端上的设备代理(DMAgent )用于解释和执行 DM服 务器 (server ) 下发的管理命令。 终端上存储的管理树可以被认为是一个 DM Server通过 DM协议对终端进行管理的接口。其中包括一些基本管理对象( MO, Management Object ), DM Server通过对管理树对象的操作达到控制终端管理对 象的目的。 操作命令有 Get (获取)、 Replace (替换)、 Exec (执行)、 Copy (复 制)、 Delete (删除)等。
基于 OMA DM技术, 目前有一种方法可以为用户提供擦除终端上保存的 数据的功能。 当用户手机丟失, 或需要进行二手交易时, 用户可以通过远程服 务器擦除终端上保存的用户个人数据。
现有技术在进行数据擦除时,可以通过管理树上的节点指示擦除数据的范 围, 具体方法是设置一个擦除范围节点, 擦除范围节点包含两项内容, 一是标 识一个擦除数据的数据范围, 例如短消息或通信录等,二是给出该擦除范围节 点中标志位的值,擦除范围节点中标志位的值用于指示在执行擦除操作时, 该 擦除范围节点对应的数据是否需要擦除。例如: 短消息擦除范围节点中标志位 的值为 "Ture" , 则在擦除终端数据时, 擦除终端内的短消息数据, 若短消息 擦除范围节点中标志位的值为 "False" , 则在擦除终端数据时, 不擦除终端内 保存的短消息数据。
在对现有技术的研究和实践过程中, 本发明的发明人发现, 现有技术中, 当执行完成擦除操作后,擦除范围节点对应的数据已经擦除,但是终端的擦除 范围节点仍然保存在可擦除列表中; 在这种情况下, 当管理服务器再次执行擦 除操作的时候, 终端收到管理服务器的请求后,仍然会根据擦除范围节点中标 志位的值对擦除范围节点对应的数据进行删除, 而实际上, 此时擦除范围节点 对应的数据并不存在, 这就造成了冗余的擦除操作, 使系统的擦除效率降低, 浪费了系统的处理资源。
发明内容 除操作的效率, 节约系统的处理资源。
本发明实施例提供的一种擦除终端数据的方法, 包括:
接收管理服务器的数据擦除请求;
根据可擦除列表内擦除范围节点中标志位的值删除所述擦除范围节点对 应的数据;
将所述擦除范围节点从所述可擦除列表中删除。
本发明实施例提供的一种擦除终端数据的方法, 包括:
接收管理服务器的数据擦除请求;
对于可擦除列表内每一个擦除范围节点;判断该擦除范围节点中标志位的 值是否指示删除本擦除范围节点对应的数据;
若是, 则将所述擦除范围节点对应的数据删除;
在数据删除成功后 ,设置该擦除范围节点的标志位的值为指示不删除本擦 除范围节点对应的数据。
本发明实施例提供的一种终端设备, 包括:
接收单元, 接收管理服务器的数据擦除请求; 数据擦除单元,在接收单元收到所述数据擦除请求后,根据可擦除列表中 各个擦除范围节点中标志位的值删除所述各个擦除范围节点对应的数据;并在 每个擦除范围节点对应的数据删除成功后,将该擦除范围节点从可擦除列表中 删除。
本发明实施例中, 通过接收管理服务器的数据擦除请求; 根据可擦除列表 内各个擦除范围节点中标志位的值删除所述各个擦除范围节点对应的数据;在 每个擦除范围节点对应的数据删除成功后,将该擦除范围节点从所述可擦除列 表中删除。避免了在管理服务器再次下发擦除请求的时候,对于已删除数据的 重复删除操作, 提升了系统执行擦除操作的效率, 节约系统的处理资源。 附图说明
图 1是本发明实施例一擦除终端数据的方法的流程图;
图 2是本发明实施例一中可擦除列表的示意图;
图 3是本发明实施例二擦除终端数据的方法的流程图;
图 4是本发明实施例二中可擦除列表的示意图;
图 5是本发明实施例三擦除终端数据的方法的流程图;
图 6是本发明实施例四擦除终端数据的方法的流程图;
图 7是本发明实施例五终端设备的逻辑结构示意图。
具体实施方式
本发明实施例提供一种擦除终端数据的方法,本发明实施例还提供相应的 终端设备。 以下分别进行详细说明。
实施例一, 一种擦除终端数据的方法, 流程图如图 1所示, 包括:
A1 , 接收管理服务器的数据擦除请求;
A2 , 根据可擦除列表内各个擦除范围节点中标志位的值删除所述各个擦 除范围节点对应的数据;
本发明实施例中, 可擦除列表中包含各个擦除范围节点, 而各个擦除范围 节点中标志位的值用于指示在执行擦除操作的时候,是否删除本擦除范围节点 对应的数据。
如图 2所示, 是本发明实施例一中可擦除列表的示意图。
图 2中的可擦除列表包含 3个擦除范围节点 (1、 2、 3 ), 每个擦除范围节 点包含列表项名称和标志位; 列表项名称表示本节点的擦除范围,擦除范围节 点中标志位的值用于表示在执行擦除操作的时候该节点擦除范围对应的数据 是否需要删除。 可以理解, 本例中, 列表项名称和标志位通过擦除范围节点的 子节点方式表示, 如图 2所示, 短消息、 通话记录、 通讯录为均为列表项名称 的值, 而 "True" 和 "False" 为标志位的值, "True"表示需要删除, "Flase" 表示不需要删除。 则在执行擦除操作的时候, 擦除范围节点 2对应的数据(通 话记录)将被删除。
可以理解的是, 本实施例中, "True" 和 "False" 仅为标识擦除范围节点 对应的数据删除的一个例子, 可以理解的是, 也可以用 "Γ 和 "0" 的方式表 示,本发明实施例强调的是可以通过一个标识标注擦除范围节点对应的数据是 否删除, 具体的标识方式不构成对本发明的限制。 并且标志位也不限于一个二 进制 "位", 同样也可以通过 8位或 16位等方式进行表示。 具体的擦除节点的值 如何表示数据是否需要删除的方式可以有多种常规方式,不构成对本发明的限 制。
A3 , 在每个擦除范围节点对应的数据删除成功后, 将该擦除范围节点从 所述可擦除列表中删除。
一并参阅图 2 , 在执行擦除操作后, 终端中的 "通话记录" 被删除, 则本 步骤将可擦除列表中的 "2" 节点删除。
另外, 上述步骤 A2中, 删除所述各个擦除范围节点对应的数据, 和步骤 A3中将擦除范围节点从擦除列表中删除, 这两个步骤之间并无严格的先后顺 序, 并不一定要在擦除范围节点对应的数据删除成功后, 才执行将擦除范围节 点从擦除列表中删除,也可以先执行将擦除范围节点从擦除列表中删除,再删 除数据或者同时执行。
并且将擦除范围节点从可擦除列表中删除后,可以向管理服务器回复节点 已被删除的信息, 回复方式可以釆用同步回复( Synchronous Result Reporting ) 或异步回复( Asynchronous Result Reporting ) , 具体的可以在回复信息中包含 一个状态码(Result Code ) , 例如状态码为 1201 , 它表示在执行擦除操作过程 中, 擦除范围节点被从管理树上删除了。
本发明实施例一中,通过接收管理服务器的数据擦除请求; 根据可擦除列 表中各个擦除范围节点中标志位的值删除所述各个擦除范围节点对应的数据; 在每个擦除范围节点对应的数据删除成功后,将该擦除范围节点从所述可擦除 列表中删除。避免了在管理服务器再次下发擦除请求的时候,对于已删除数据 的重复删除操作, 提升了系统执行擦除操作的效率, 节约系统的处理资源。
实施例二、 一种擦除终端数据的方法, 流程图如图 3所示, 包括:
B1 , 接收管理服务器的数据擦除请求;
B2 , 根据可擦除列表内全擦除节点的标志位的值判断是否需要删除全部 数据; 若是, 则继续步骤 B3; 若否, 则继续步骤 B4;
本发明实施例中, 在可擦除列表中设置一个全擦除节点, 该节点对应的擦 除范围是终端上保存的所有数据。
如图 4所示, 为本发明实施例二中可擦除列表的示意图, 图中包含了节点 "1" 全擦除(ALL ) 节点, 该节点的列表项名称的值为: ALL, 即对应擦除 全部数据的范围, 标志值为 "True" , 则终端无需判断其他节点的值, 直接擦 除所有数据。
B3 , 将终端保存的数据全部删除, 并继续步骤 B5;
B4, 根据其他各个擦除节点的值删除擦除节点对应的数据, 并继续步骤
B5;
本步骤根据其他各个节点的值删除擦除节点对应的数据的过程参见实施 例 1步骤 A2。
B5 , 在每个擦除范围节点对应的数据删除成功后, 将该擦除范围节点从 所述可擦除列表中删除。
本发明实施例二通过在可擦除列表中增加全擦除节点,在进行数据擦除的 时候, 首先根据全擦除节点的值判断是否需要全擦除, 与现有技术中当擦除终 端的所有数据时, 也需要对每一个擦除范围节点中标志位的值进行判断相比, 可以大大提高数据擦除的效率,加快数据擦除执行的时间,简化数据擦除流程。
可以理解, 本发明实施例二中步骤 B5并不是必须的步骤, 仅执行步骤 B1 至步骤 B4同样也可以实现上述通过全擦除节点实现终端数据的全部擦除带来 的提高数据擦除的效率,加快数据擦除执行的时间, 简化数据擦除流程的技术 效果。 实施例三、 一种擦除终端数据的方法, 流程图如图 5所示, 包括:
C1 , 接收管理服务器的数据擦除请求;
C2 , 根据可擦除列表内各个擦除范围节点中标志位的值删除所述各个擦 除范围节点对应的数据;
C3 , 在每个擦除范围节点对应的数据删除成功后, 将该擦除范围节点从 所述可擦除列表中删除。
C4, 向所述管理服务器反馈数据擦除结果。
本实施例中, 所述步骤 C3与步骤 C4之间并无绝对顺序, 本实施例强调步 骤 C4同样也以步骤 C2的完成作为执行条件。
本发明实施例中, 所述向所述管理服务器反馈的数据擦除结果包括: 未擦除和 /或擦除失败的数据对应的擦除范围节点信息。
可以理解的是, 所述向所述管理服务器反馈的数据擦除结果还可以包括: 擦除范围节点对应的数据未擦除和 /或擦除失败的原因代码。
当然, 本步骤强调的是, 通过返回擦除结果, 使管理服务器获知终端各个 擦除范围节点对应的数据的擦除情况,因此所述向所述管理服务器反馈的数据 擦除结果可以包括:
已擦除的数据对应的擦除范围节点信息。
可以理解,本实施例描述在擦除数据后向服务器反馈擦除结果的具体方法 反馈的方式可以是同步方式反馈或异步方式反馈。
同步回复时的方法如下:
<Status>
<MsgRef 1 </MsgRef
<CmdRe^2</CmdRe^
<Cmd>Exec</Cmd> <!--对 Exec命令的回复 -- >
<Data>200</Data> <!--操作执行成功 ~>
<Item>
<Source>
<LocURI>./ WipeMO/Operations/Wipe </LocURI> <!-执行了擦除操作 >
</Source> <Target>
<LocURI>./ WipeMO/可擦除列表 /1/列表项名称 </LocURI> <!--擦除了短消息 — > </Target>
<Data>短消 </Data>
</Item>
<Item>
<Source>
<LocURI>./ WipeMO/Operations/Wipe </LocURI> <!-执行了擦除操作 >
</Source>
<Target>
<LocURI>./ WipeMO/可擦除列表 /3/列表项名称 </LocURI> <!--擦除了通讯录 — > </Target>
<Data>通讯录</1¾1&>
</Item>
</Status>
以上是在擦除操作执行成功时对服务器的回复,其中除了包括命令执行成 功的代码, 还包括一到多个<^111>项, 每个 <Item>的 <80111^>子项包含擦除操 作的 URI ( Uniformed Resource Identifier, 统一资源标识), <Target ^项包含 标识擦除范围的节点的 URI , <0 1 >子项为擦除范围节点信息。
若数据擦除失败, 终端将单独为擦除失败的数据回复 <Status>, 其中除了 包括命令执行失败的代码, 还包括一到多个擦除失败的数据范围标识, 例如: <Status>
<MsgRef 1 </MsgRef
<CmdRe^2</CmdRe^
<Cmd>Exec</Cmd> <!--对 Exec命令的回复― >
<Data>500</Data> <!--操作执行失败 ~>
<Item>
<Source>
<LocURI>./ WipeMO/Operations/Wipe </LocURI> <!-执行了擦除操作 — > </Source>
<Target>
<LocURI>./ WipeMO/可擦除列表 /2/列表项名称 </LocURI> <!-- 通话记录未能擦除
->
</Target>
<Data>通话记录</1¾1&>
</Item>
</Status>
异步回复时的方法如下:
若擦除指令不能即时完成, 将釆用通用警告(Generic Alert ) 的方式进行 异步回复。 下面是一个例子:
<Alert>
<CmdID>2</CmdID>
<Data> 1226</Data> <!-- Generic Alert -- >
<Correlator>correlator 1 </Correlator><! -- 标识某个执行的命令—〉
<Item>
<Target><LocURI>./ WipeMO/可擦除列表 /2/列表项名称</1^000¾1></丁& > <Meta>
<Type xmlns= " syncml: metinf '>
Reversed-Domain-Name: org.openmobilealliance.lawmo . OperationComplete </Type><!- 警告类型 — >
<Format xmlns= " syncml: metinf '>text/plain</Format>
<Mark xmlns=" syncml: metinf '>warning</Mark>
</Meta>
<Data>
<! [CDATA[
<ResultCode>200</ResultCode> 〈!一擦除成功结果码 >
<Identifier>通话记录</1(^ 1661><!—擦除范围节点信息 ― > ]]>
</Data>
</Item>
<Item>
<Target><LocURI>./ WipeMO/可擦除列表 /1/列表项名称</1^000¾1></丁& > <Meta>
<Type xmlns= " syncml: metinf '> Reversed-Domain-Name:org.openmobilealliance.lawmo.OperationComplete
</Type>
<Format xmlns= " syncml: metinf '>text/plain</Format>
<Mark xmlns=" syncml: metinf '>warning</Mark>
</Meta>
<Data>
<![CDATA[
<ResultCode>400</ResultCode> 〈!一擦除失败结果码— >
<Identifier>短消息 </Identifier><!—擦除范围节点信息 — >
]]></Data>
</Item>
</Alert>
该消息中使用一到多个< 111>标识擦除范围及擦除结果, 与同步回复类 似, <Source>子项包含擦除操作的 URI ( Uniformed Resource Identifier, 统一资 源标识), <Target ^项包含标识擦除范围的节点 URI, <Data>/<Identifier>子项 中包含了擦除范围节点信息。另外< 111>还包含了本发明为擦除操作定义的警 告类型, 它表示该消息是针对擦除操作完成而发出的,还包含本发明定义的结 果码类型, 例如 400表示擦除失败, 还可以用其它结果码表示更详细的擦除结 果,例如 401表示擦除因数据正在使用而失败, 402表示未找到欲擦除的数据等, 还可以有更多, 本发明不限定。 无论是同步回复还是异步回复,当擦除所有数据时,可以有多种回复方式, 一是仅回复对所有数据的擦除是成功还是失败 (即回复中标识擦除范围为
All ),二是把未擦除和 /或擦除失败的擦除范围节点信息向服务器回复,三是把 已擦除的擦除范围节点的信息向服务器回复。 上述方式可以组合使用。
本发明实施例三与现有技术的区别在于,现有技术在执行擦除指令后, 终 端向服务器反馈擦除执行成功或失败的信息, 这种反馈方式较笼统, 不能反映 出数据擦除的具体情况, 本实施例通过反馈各个节点具体的数据擦除情况, 管 理服务器可以得知具体的哪个节点擦除成功,哪个节点擦除失败,失败原因等, 能够更有利于管理服务器在下次擦除操作的时候, 设置相应的擦除范围。
可以理解的是, 本实施例三中反馈擦除结果的方法同样适用与实施例二, 即步骤 C 1至 C3也可以替换成实施例二的步骤 B 1至 B5。 本实施例中可以不包含 步骤 C3 , 仅执行步骤 Cl、 C2、 C4即可实现本实施例反馈擦除结果带来的有益 效果。
本发明实施例中, 在上述实施例一至实施例三各个方法的基础上, 可以进 一步包括:
记录擦除范围列表内擦除范围节点的状态。
所述可擦除列表内擦除节点的状态包括: 未生成擦除范围节点、 已生成擦 除范围节点、 相关节点已删除。
具体的:本实施例中为了使服务器可以了解擦除范围节点及数据擦除的状 态, 本发明定义一个 WipeState (擦除状态)节点, 它可以保存在锁定擦除管理 对象 的任意位置。它标识了不同的擦除状态,具体状态和其含义如下表所示,
Figure imgf000012_0001
表中 "相关节点已删除"这个状态表示终端中存在的数据与擦除范围节点 信息节点是对应的。
在终端中生成 WipeState这个节点时应对该节点赋初值, 可以为 10、 20、 30 的其中一个。
可以理解的是, 釆用上述实施例一至实施例三方法, 所述接收管理服务器 的数据擦除请求之前包括: 在所述可擦除列表中生成擦除范围节点;
所述记录可擦除列表中擦除范围节点的状态包括:
在所述可擦除列表中生成擦除范围节点之前, 记录擦除范围节点的状态 为: 未生成擦除范围节点;
在所述可擦除列表中生成擦除范围节点之后, 记录擦除范围节点的状态 为: 已生成擦除范围节点。
将擦除范围节点从可擦除列表中删除之后, 可以进一步包括: 将所述擦除 范围节点的状态记录为相关节点已删除。
在终端中的擦除范围节点状态有变化时, 该节点的值应能随之改变, 可以 是终端或服务器对其进行设置。
服务器在需要对终端数据进行操作时,可以先获取这个节点的值已获得擦 除范围节点及终端中数据存在的状态信息, 再进行下一步操作。
可以理解的是,所述擦除节点的状态根据系统要求还可以为其他的多种状 态, 具体的状态的设置不构成对本发明的限制, 此处强调的是, 终端可以为擦 除节点记录多种状态, 用于向管理服务器反馈或接受管理服务器查询,使管理 服务器可以得到更多的关于终端的信息。
可以理解,终端为擦除节点记录多种状态的方案并不依赖实施例一至实施 例三的技术方案, 与现有技术结合使用, 同样可以获得上述使管理服务器可以 得到更多的关于终端的信息的效果。
实施例四, 一种擦除终端数据的方法, 流程图如图 6所示, 包括:
D1 , 接收管理服务器的数据擦除请求;
D2, 对于可擦除列表内每一个擦除范围节点; 判断该擦除范围节点中标 志位的值是否指示删除本擦除范围节点对应的数据; 若是, 则继续步骤 D3 , 若否, 则不删除该擦除范围节点对应的数据。
D3 , 将所述擦除范围节点对应的数据删除并继续步骤 D4; D4 , 设置该擦除范围节点的标志位的值为指示不删除本擦除范围节点对 应的数据。
参照图 2可擦除列表示意图, 图中, 擦除范围节点的值为 "True" 则为指 示删除本擦除范围节点对应的数据, "False" 为不擦除, 本步骤强调的是, 数 据删除后, 将 "True" 更改为 "False"。 可以理解的是, 本实施例中, "True" 和 "False"仅为标识擦除范围节点对应的数据删除的一个例子,可以理解的是, 也可以用 "1" 和 "0" 的方式表示, 本发明实施例强调的是可以通过一个标识 标注擦除范围节点对应的数据是否删除,具体的标识方式不构成对本发明的限 制。 并且标志位也不限于一个二进制 "位", 同样也可以通过 8位或 16位等方式 进行表示。
可以理解, 步骤 D4之后可以进一步包括:
向所述管理服务器反馈数据擦除结果。
所述向所述管理服务器反馈的数据擦除结果包括:
未擦除和 /或擦除失败的数据对应的擦除范围节点信息;
或者已擦除的数据对应的擦除范围节点信息。
实施例四中,通过数据删除成功后,设置该擦除范围节点的标志位的值为 指示不删除本擦除范围节点对应的数据。避免了在管理服务器再次下发擦除请 求的时候,对于已删除数据的重复删除操作,提升了系统执行擦除操作的效率, 节约系统的处理资源。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步 骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读 存储介质中, 存储介质可以包括: ROM、 RAM, 磁盘或光盘等。
下面对本发明实施例提供的一种终端设备进行详细描述。
实施例五, 一种终端设备 600 , 其逻辑结构示意图如图 7所示, 包括: 接收 单元 610和数据擦除单元 620;
所述接收单元 610, 接收管理服务器的数据擦除请求;
数据擦除单元 620 ,在接收单元 610收到所述数据擦除请求后,根据可擦除 列表中各个擦除范围节点中标志位的值删除所述各个擦除范围节点对应的数 据; 并在每个擦除范围节点对应的数据删除成功后,将该擦除范围节点从可擦 除列表中删除。
本实施例中的终端设备还可以包括: 擦除结果反馈单元 630, 向所述管理 服务器反馈数据擦除结果; 所述数据擦除结果包括: 未擦除和 /或擦除失败的 数据对应的擦除范围节点。
可以理解, 本实施例中的终端设备还可以包括: 状态记录单元, 记录擦除 范围列表内擦除范围节点的状态。 细介绍, 其中:
本发明一实施例中,通过接收管理服务器的数据擦除请求; 根据可擦除列 表中各个擦除范围节点中标志位的值删除所述各个擦除范围节点对应的数据; 在每个擦除范围节点对应的数据删除成功后,将该擦除范围节点从所述可擦除 列表中删除。避免了在管理服务器再次下发擦除请求的时候,对于已删除数据 的重复删除操作, 提升了系统执行擦除操作的效率, 节约系统的处理资源。
本发明另一实施例通过在可擦除列表中增加全擦除节点,在进行数据擦除 的时候, 首先根据全擦除节点的值判断是否需要全擦除, 与现有技术中, 当擦 除终端的所有数据时,也需要对每一个擦除范围节点中标志位的值进行判断相 比, 可以大大提高数据擦除的效率, 加快数据擦除执行的时间, 简化数据擦除 流程。
本发明再一实施例中, 本实施例通过反馈各个节点具体的数据擦除情况, 管理服务器可以得知具体的哪个节点擦除成功,哪个节点擦除失败, 失败原因 等, 能够更有利于管理服务器下次擦除操作时, 设置相应的擦除范围。 例的说明只是用于帮助理解本发明的方法及其核心思想; 同时,对于本领域的 一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变 之处, 综上所述, 本说明书内容不应理解为对本发明的限制。

Claims

权 利 要 求
1、 一种擦除终端数据的方法, 其特征在于, 包括:
接收管理服务器的数据擦除请求;
根据可擦除列表内擦除范围节点中标志位的值删除所述擦除范围节点对 应的数据;
将所述擦除范围节点从所述可擦除列表中删除。
2、 如权利要求 1所述的方法, 其特征在于, 在所述将擦除范围节点从所述 可擦除列表中删除之前, 所述方法还包括:
确定所述擦除范围节点对应的数据删除成功。
3、 如权利要求 2所述的方法, 其特征在于, 进一步包括: 记录可擦除列表 中擦除范围节点的状态。
4、 如权利要求 3所述的方法, 其特征在于, 所述记录可擦除列表中擦除范 围节点的状态包括:
所述将擦除范围节点从所述可擦除列表中删除之后,将所述擦除范围节点 的状态记录为相关节点已删除。
5、 如权利要求 3或 4所述的方法, 其特征在于, 所述接收管理服务器的数 据擦除请求之前包括: 在所述可擦除列表中生成擦除范围节点;
所述记录可擦除列表中擦除范围节点的状态包括:
在所述可擦除列表中生成擦除范围节点之前, 记录擦除范围节点的状态 为: 未生成擦除范围节点;
在所述可擦除列表中生成擦除范围节点之后,记录擦除范围节点的状态为: 已 生成擦除范围节点。
6、 如权利要求 1或 2所述的方法, 其特征在于, 所述可擦除列表中包括: 全擦除节点;
所述根据可擦除列表中擦除范围节点中标志位的值删除所述擦除范围节 点对应的数据包括:
根据所述全擦除节点标志位的值判断是否需要删除全部数据;
若是, 则将终端保存的数据全部删除;
若否,则根据所述可擦除列表中其他擦除节点的值删除擦除节点对应的数 据。
7、 如权利要求 1或 2任意一项所述的方法, 其特征在于, 根据可擦除列表 中擦除范围节点中标志位的值删除所述擦除范围节点对应的数据之后进一步 包括:
向所述管理服务器反馈数据擦除结果。
8、 如权利要求 7所述的方法, 其特征在于, 所述向所述管理服务器反馈的 数据擦除结果包括:
未擦除和 /或擦除失败的数据对应的擦除范围节点信息,
或者,
已擦除的数据对应的擦除范围节点信息。
9、 如权利要求 8所述的方法, 其特征在于, 向所述管理服务器反馈的数据 擦除结果还包括:
擦除范围节点对应的数据未擦除和 /或擦除失败的原因代码。
10、 如权利要求 1或 2所述的方法, 其特征在于, 所述将擦除范围节点从所 述可擦除列表中删除后还包括:
向所述管理服务器回复擦除范围节点已删除的信息。
11、 如权利要求 1或 2所述的方法, 其特征在于, 所述标志位通过擦除范围 节点的子节点方式表示。
12、 一种擦除终端数据的方法, 其特征在于, 包括:
接收管理服务器的数据擦除请求;
对于可擦除列表内每一个擦除范围节点;判断该擦除范围节点中标志位的 值是否指示删除本擦除范围节点对应的数据;
若是, 则将所述擦除范围节点对应的数据删除;
在数据删除成功后 ,设置该擦除范围节点的标志位的值为指示不删除本擦 除范围节点对应的数据。
13、 如权利要求 12所述的方法, 其特征在于, 根将所述擦除范围节点对应 的数据删除之后进一步包括:
向所述管理服务器反馈数据擦除结果。
14、 如权利要求 13所述的方法, 其特征在于, 所述向所述管理服务器反馈 的数据擦除结果包括:
未擦除和 /或擦除失败的数据对应的擦除范围节点信息。
15、 如权利要求 14所述的方法, 其特征在于, 所述向所述管理服务器反馈 的数据擦除结果包括:
已擦除的数据对应的擦除范围节点信息。
16、 一种终端设备, 其特征在于, 包括:
接收单元, 接收管理服务器的数据擦除请求;
数据擦除单元,在接收单元收到所述数据擦除请求后,根据可擦除列表中 擦除范围节点中标志位的值删除所述擦除范围节点对应的数据;并在擦除范围 节点对应的数据删除成功后, 将该擦除范围节点从可擦除列表中删除。
17、如权利要求 16所述的终端设备,其特征在于,还包括: 状态记录单元, 记录擦除范围列表内擦除范围节点的状态。
18、 如权利要求 16所述的终端设备, 其特征在于, 还包括: 擦除结果反馈 单元, 向所述管理服务器反馈数据擦除结果; 所述数据擦除结果包括: 未擦除 和 /或擦除失败数据对应的擦除范围节点。
19、 一种擦除终端数据的装置, 其特征在于, 包括:
接收单元, 用于接收管理服务器的数据擦除请求;
数据擦除单元,用于判断可擦除列表内每一个擦除范围节点中标志位的值 是否指示删除本擦除范围节点对应的数据; 若是, 则将该擦除范围节点对应的 数据删除;
标志位设置单元, 用于在数据删除成功后,设置该擦除范围节点的标志位 的值为指示不删除本擦除范围节点对应的数据。
PCT/CN2009/072107 2008-06-05 2009-06-03 擦除终端数据的方法及终端设备 WO2009146650A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP09757084.0A EP2282603B1 (en) 2008-06-05 2009-06-03 Method for erasing data of terminal and terminal device
KR1020107029077A KR101202237B1 (ko) 2008-06-05 2009-06-03 단말기의 데이터를 소거하는 방법 및 단말기 장치
US12/959,502 US8489838B2 (en) 2008-06-05 2010-12-03 Method and terminal device for erasing data of terminal

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN200810111238 2008-06-05
CN200810111238.6 2008-06-05
CN200910004290.6 2009-02-24
CN200910004290.6A CN101505335B (zh) 2008-06-05 2009-02-24 擦除终端数据的方法及终端设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/959,502 Continuation US8489838B2 (en) 2008-06-05 2010-12-03 Method and terminal device for erasing data of terminal

Publications (1)

Publication Number Publication Date
WO2009146650A1 true WO2009146650A1 (zh) 2009-12-10

Family

ID=40977398

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/072107 WO2009146650A1 (zh) 2008-06-05 2009-06-03 擦除终端数据的方法及终端设备

Country Status (5)

Country Link
US (1) US8489838B2 (zh)
EP (1) EP2282603B1 (zh)
KR (1) KR101202237B1 (zh)
CN (1) CN101505335B (zh)
WO (1) WO2009146650A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106154943A (zh) * 2015-04-24 2016-11-23 北大方正集团有限公司 移动设备位置监控方法、装置及系统
US20180300259A1 (en) * 2017-04-12 2018-10-18 Quanta Computer Inc. Local disks erasing mechanism for pooled physical resources
CN109117645A (zh) * 2017-06-26 2019-01-01 深圳回收宝科技有限公司 数据清除方法及其装置
US11468122B2 (en) * 2019-06-11 2022-10-11 Microsoft Technology Licensing, Llc Shared memory space management for conversational artificial intelligence system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1684048A (zh) * 2004-04-07 2005-10-19 美国博通公司 可靠擦除电子设备的非易失性存储器的信息的方法和系统
CN1737800A (zh) * 2004-08-18 2006-02-22 国际商业机器公司 用于扩展属性的延迟删除的方法和系统
CN1809186A (zh) * 2005-12-07 2006-07-26 Ut斯达康通讯有限公司 移动通信终端短信的删除方法
US20070239673A1 (en) * 2006-04-05 2007-10-11 Barsness Eric L Removing nodes from a query tree based on a result set
CN101119557A (zh) * 2007-09-07 2008-02-06 深圳华为通信技术有限公司 数据删除方法及终端

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189016B1 (en) * 1998-06-12 2001-02-13 Microsoft Corporation Journaling ordered changes in a storage volume
US7275105B2 (en) * 2002-01-16 2007-09-25 Laszlo Systems, Inc. Enabling online and offline operation
DE602006004384D1 (de) * 2005-03-21 2009-02-05 Hewlett Packard Development Co Mobiles Klientgerät und System mit Unterstützung von Fernverwaltungsgeräten
KR101139449B1 (ko) 2005-06-07 2012-04-30 엘지전자 주식회사 개인정보 삭제 기능이 구비된 이동통신 단말기 및 그동작방법
US20070093243A1 (en) * 2005-10-25 2007-04-26 Vivek Kapadekar Device management system
US20070130185A1 (en) * 2005-12-04 2007-06-07 Miller John F Iii Efficient deletion of leaf node items within tree data structure
US8095634B2 (en) * 2006-08-15 2012-01-10 Hewlett-Packard Development Company, L.P. Device management system for mobile devices that supports multiple-point transport
CN101018375B (zh) 2007-01-29 2011-11-30 中兴通讯股份有限公司 对终端数据实现远程控制的方法
CN101159963A (zh) 2007-11-09 2008-04-09 深圳华为通信技术有限公司 擦除终端数据的方法及终端设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1684048A (zh) * 2004-04-07 2005-10-19 美国博通公司 可靠擦除电子设备的非易失性存储器的信息的方法和系统
CN1737800A (zh) * 2004-08-18 2006-02-22 国际商业机器公司 用于扩展属性的延迟删除的方法和系统
CN1809186A (zh) * 2005-12-07 2006-07-26 Ut斯达康通讯有限公司 移动通信终端短信的删除方法
US20070239673A1 (en) * 2006-04-05 2007-10-11 Barsness Eric L Removing nodes from a query tree based on a result set
CN101119557A (zh) * 2007-09-07 2008-02-06 深圳华为通信技术有限公司 数据删除方法及终端

Also Published As

Publication number Publication date
KR101202237B1 (ko) 2012-11-16
KR20110011708A (ko) 2011-02-08
US8489838B2 (en) 2013-07-16
EP2282603A1 (en) 2011-02-09
EP2282603A4 (en) 2011-08-17
CN101505335A (zh) 2009-08-12
US20110078403A1 (en) 2011-03-31
EP2282603B1 (en) 2014-08-13
CN101505335B (zh) 2014-10-08

Similar Documents

Publication Publication Date Title
US8874091B2 (en) Automatic device capabilities change notification
KR100954346B1 (ko) 미디어 대상물들의 예비 다운로드를 가능하게 하는 방법, 시스템, 장치, 및 컴퓨터 프로그램 생성물
JP4828105B2 (ja) Omadmによりモバイル装置の構成設定を管理するための方法およびシステム
JP5586660B2 (ja) 情報をロックする方法、システムおよび装置
JP2018503313A (ja) データ更新方法、装置、および埋め込まれた汎用集積回路カード
CN101291305A (zh) 实现插件管理的方法及客户端
WO2015127889A1 (zh) 一种Profile关联管理的方法及装置
WO2009052732A1 (fr) Procédé, système et appareil pour la protection d&#39;informations de terminal
CN100373976C (zh) 在设备管理中处理失败任务的方法及装置
CN102301760A (zh) 用于跟踪设备管理数据改变的方法和设备
WO2009076866A1 (zh) 一种远程控制终端的方法、系统和装置
CN106302638B (zh) 一种数据管理方法、转发设备及系统
WO2009146650A1 (zh) 擦除终端数据的方法及终端设备
CN107018189A (zh) 迁移应用数据以及接收应用数据的方法及装置
CN101390410A (zh) 图标转换系统及其业务方法
EP2421291B1 (en) Terminal for device management and method for initiating management session thereof
CN101340286A (zh) 会话连接发起方法及设备
WO2009049542A1 (fr) Un procédé, un système et un appareil corrélatif pour transmettre une commande de demande de procédure distante
CN101720084A (zh) 终端数据的处理方法、终端以及系统
CN102111783A (zh) 原子命令回滚方法及终端
CN102571390A (zh) 设备管理方法、设备和系统
WO2019179392A1 (zh) 报文的生成方法及相关设备
CN101582874B (zh) 一种对外观内容进行管理操作的方法、一种服务器及终端
EP2645629B1 (en) Terminal management method and device
WO2011103727A1 (zh) 一种同步更新设备管理对象信息的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09757084

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009757084

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20107029077

Country of ref document: KR

Kind code of ref document: A