WO2011130934A1 - 一种销毁终端数据的方法及装置 - Google Patents

一种销毁终端数据的方法及装置 Download PDF

Info

Publication number
WO2011130934A1
WO2011130934A1 PCT/CN2010/073585 CN2010073585W WO2011130934A1 WO 2011130934 A1 WO2011130934 A1 WO 2011130934A1 CN 2010073585 W CN2010073585 W CN 2010073585W WO 2011130934 A1 WO2011130934 A1 WO 2011130934A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
destruction
destroyed
terminal
instruction
Prior art date
Application number
PCT/CN2010/073585
Other languages
English (en)
French (fr)
Inventor
陈永亮
黄翠荣
刘莹
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011130934A1 publication Critical patent/WO2011130934A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the invention relates to the field of electronic communication, and in particular to a method and device for destroying terminal data. Background technique
  • Patent CN101600208 a system and method for automatically destroying stored data of a mobile phone are provided, but the solution only deletes data, and there is a risk that the deleted data is illegally restored.
  • Patent CN200610060652.X provides a method of using activation code matching, and then destroying the data of the destruction area in the terminal according to the matching situation, and covering the related data, but the patent only considers the destruction of the data stored in the mobile terminal, Consider the destruction of data in the external storage device and the Subscriber Identity Module (SIM). At the same time, the destruction of the data in the destruction area takes a certain amount of time. When the data is not completely destroyed, it is forcibly cracked to obtain data. may. Summary of the invention
  • the main object of the present invention is to provide a method and apparatus for destroying terminal data, which adopts the present invention and device to prevent illegal data from being illegally acquired, and to prevent deleted data from being illegal. Law recovery.
  • the present invention provides a method for destroying terminal data, including:
  • the remote terminal sends a destruction instruction to the terminal, and the data destruction module of the terminal parses the destruction instruction, and destroys the data according to the priority in the destruction instruction and the analysis result.
  • the data destruction module of the terminal parses the destruction instruction, including: the data destruction module reads the data in the destruction instruction, determines the data to be destroyed, and the priority of the data destruction, and compares the verification information in the destruction instruction with the set Verification information, determine the match between the two, calculate the check code according to the data in the destruction instruction, and compare with the check code in the destruction instruction to determine that the two are the same, then the data is destroyed.
  • the destroying the data according to the priority in the destruction instruction and the parsing result includes: destroying the data according to the priority, generating a pseudo random number according to the pseudo random algorithm principle, and randomly selecting the bitwise overwrite and the hop according to the generated pseudo random number One of bit overwrite or random overwrite mode, overwriting the data to be destroyed, determining that the unused storage space needs to be destroyed, and filling the unused storage space with the generated pseudo random number, the number of overwrites is User settings.
  • the data destruction module sends the destruction result to the remote terminal through the short message module of the terminal.
  • the data to be destroyed is selected by the data destruction module, and the data to be destroyed is destroyed by the data destruction module; and/or the destruction period or the destruction time is set for the data to be destroyed, and the data destruction module compares the current time with the same Set the time, determine the current time to match the set time, destroy the data to be destroyed, or periodically destroy the data to be destroyed.
  • the present invention also provides an apparatus for destroying terminal data, including:
  • a data transceiver unit configured to receive a destruction instruction sent by the remote terminal to the terminal, and send the instruction to the comparison verification unit;
  • a comparison verification unit configured to receive and decode the destruction instruction sent by the data transceiver unit, and determine The priority of destroying the data is sent to the execution unit along with the parsing result;
  • the execution unit is configured to destroy the data according to the priority of the destruction data sent by the comparison verification module and the parsing result.
  • the comparison verification unit is specifically configured to: read the data in the destruction instruction, determine the priority of the data destruction and the data to be destroyed, compare the verification information in the destruction instruction with the set verification information, and determine that the two match
  • the setting unit is used to set the verification information, and verify the destruction instruction. The correctness.
  • the execution unit is specifically configured to: according to the priority destruction data, adopt a pseudo-random algorithm principle to generate a pseudo random number, and use the generated pseudo random number to randomly adopt a bitwise overwrite, a jump overwrite or a random overwrite mode.
  • One type overwriting the data to be destroyed, determining that the unused storage space needs to be destroyed, and overwriting the unused storage space with the generated pseudo-random number.
  • the execution unit is further configured to: determine that the destruction result is to be returned, and send the destruction result to the data transceiver unit; the data transceiver unit is configured to send the destruction result to the short message module of the terminal, and send the destruction result to the remote terminal.
  • the setting unit is further configured to: select data to be destroyed, set the number of times of overwriting, and/or set a destruction period or a destruction time;
  • the execution unit is further configured to: destroy the selected data according to the number of times of overwriting , and / or, compare the current time with the set time, determine the current time and the set time, destroy the data to be destroyed according to the set number of overwrites, or periodically destroy the selected data.
  • the method and device for destroying terminal data prioritize data, preferentially destroy the classified data, avoid illegally obtaining the confidential data, and perform multiple coverage on the deleted data to prevent
  • the deleted data is illegally restored, and the destruction cycle is set to avoid data leakage caused by the forgotten destruction.
  • the data destruction module can be called directly when browsing the data, so that the data destruction is more convenient and quick.
  • FIG. 1 is a schematic flowchart of a method for implementing destruction of terminal data according to the present invention
  • FIG. 1 is a schematic diagram of the composition of an apparatus for implementing destruction of terminal data according to the present invention. detailed description
  • the remote terminal sends a destruction instruction to the terminal, and the data destruction module of the terminal parses the destruction instruction and determines the priority of the data destruction, and destroys the data according to the priority and the analysis result;
  • the remote terminal is any terminal that can send a destruction instruction, and the terminal is a terminal that needs to perform data destruction and set a data destruction module.
  • Step 101 The terminal starts a data destruction module.
  • the terminal starts the data destruction module, and the startup is automatically executed in the background when the terminal is powered on, and the data destruction module is used to destroy the terminal data.
  • Step 102 The remote terminal sends a destruction instruction to the terminal, and the data destruction module receives the destruction instruction.
  • the remote terminal sends a destruction command to the terminal, where the command includes, but is not limited to, a short message, a multimedia message, or an OTA (Over-The-Air).
  • the remote terminal can send a destruction command to the terminal to destroy the data of the terminal. .
  • Step 103 The data destruction module parses the destruction instruction and destroys the terminal data according to the priority and the analysis result.
  • the data destruction module parses the received destruction instruction, and the destruction instruction is composed of a series of numbers, each of which represents a corresponding data destruction indication according to a set rule.
  • the user can set the value of the number in the destruction instruction according to the data to be destroyed.
  • the destruction instruction consists of 32 digits, and the rules are as follows:
  • the first to sixth digits are used to identify the destruction information of the SIM card data, and the first digit represents Whether to destroy all SIM card data, the second number indicates whether to destroy the card data, the third number indicates whether to destroy the short message data, the fourth number indicates whether to destroy the text short message data, and the fifth number indicates whether to destroy the multimedia short message Message data, the sixth digit indicates whether the short message data is destroyed. A value of 1 indicates that the data is destroyed. A value of 0 indicates that the data is not destroyed.
  • the 7th to 11th digits are used to identify the mobile phone data destruction information, the 7th digit indicates whether to destroy the mobile phone data, the 8th digit indicates whether to destroy the mobile phone business card holder data, and the 9th digit indicates whether to destroy the mobile phone short message data, 10 digits indicate whether to destroy the mobile phone picture data, the 11th digit indicates whether the unused storage space is destroyed, the value is 1 indicates destruction, the value is 0 indicates no destruction, and the unused storage space refers to the space where no data is stored, wherein Contains deleted data.
  • the 12th to 16th digits are used to identify external memory information, the 12th digit indicates whether external memory information is destroyed, the 13th digit indicates whether to destroy image data in the external memory, and the 14th digit indicates whether to destroy multimedia data in the external memory.
  • the 15th number indicates whether to destroy the text data in the external memory.
  • the 16th number indicates whether the unused space is destroyed. The value is 1 for destruction, and the value 0 indicates no destruction.
  • the 17th number is used to identify which memory data is preferentially destroyed. If it is 1, the SIM card data is destroyed first, 2 is the priority to destroy the mobile phone data, and 3 is the priority to destroy the external memory data.
  • the 18th to 28th digits are verification information, such as a mobile phone number, used to verify the destruction command, and one or more mobile phone numbers can be set.
  • the 29th number is used to identify whether to return the result of the destruction result. A value of 1 means to return the destruction result, and a value of 0 means not to return the destruction result.
  • the 30th number is the check code, and the 31st to 32nd numbers are reserved flags.
  • the data destruction module of the terminal reads the value of each digit in the destruction instruction, thereby determining the priority destruction data and the data to be destroyed in the SIM card, the mobile phone data, and the external memory, and then destroying the verification information in the instruction, that is, the 18th to The 28th digit mobile phone number is compared with the verification information set by the user in the data destruction module, and the determination is matched, and then the first to the 17th values are calculated according to the operation, and compared with the verification code in the destruction instruction.
  • the destroying refers to generating a pseudo-random number according to the principle of the pseudo-random algorithm, and randomly using the generated pseudo-random number to perform bit-by-bit overwriting, hopping overwriting or random overwriting.
  • the pseudo random number is written into the unused storage space, the number of overwrites can be set by the user through the data destruction module, and the data destruction module reads the user The number of times set, determines the number of times the data is destroyed.
  • the data destruction module After destroying the data, the data destruction module determines whether it needs to return the destruction result by reading the value of the 29th digit in the destruction instruction. If the destruction result needs to be returned, the data destruction module sends the destruction result to the remote terminal.
  • the user can autonomously destroy the data on the terminal through the data destruction module, specifically: directly opening the data destruction module, inputting the password of the data destruction module, and entering the data destruction module, the password can be set through the data destruction module
  • the data destruction module browses all the data of the terminal, including the file or folder in the internal memory of the terminal, the SIM card or the external memory, selects the data to be destroyed, and then selects the data to be destroyed through the data destruction module, or sets the data destruction module. Destroy the cycle or destroy time, and then select the data to be destroyed.
  • the data destruction module compares the current time with the destruction time set by the user, determines that the current time is the same as the set time, destroys the selected data, or periodically destroys the selected data.
  • the data is selected by the data destruction module to destroy the log, and the destruction log includes the name, time, and the like of the destroyed file.
  • the present invention also provides an apparatus for destroying terminal data.
  • the apparatus includes: a data transceiving unit 201, a comparison verification unit 202, and an execution unit 203:
  • the data transceiver unit 201 is configured to receive the destruction command sent by the remote terminal to the terminal and send the message to the comparison verification unit 202.
  • the value of the number in the destruction instruction is set by the user according to the data that needs to be destroyed, and then sent by the remote terminal;
  • the comparison verification unit 202 is configured to receive the destruction instruction sent by the data transceiver unit 201 and parse it, determine the priority of the destroyed data, and send the priority of the destroyed data and the analysis result to the execution unit 203;
  • the executing unit 203 is configured to destroy the data according to the priority of the destroyed data sent by the comparison verification module 202 and the parsing result.
  • the comparison verification unit 202 is specifically configured to: read the data in the destruction instruction, determine the priority of the data destruction set by the user, and the data to be destroyed in the SIM card, the mobile phone data, and the external memory, and set the verification information in the destruction instruction. Comparing the verification information, for example, comparing the mobile phone number of the 18th to 28th digits in the destruction instruction with the mobile phone number set by the setting unit 204, determining that one of the numbers matches, that is, the verification information is consistent, according to the destruction instruction
  • the check code is numerically calculated, and the calculated check code is compared with the check code in the destroy command to determine that the two match, the data is destroyed, and the priority and the analysis result are sent to the execution unit 203.
  • the setting unit 204 is configured to set the verification information, thereby verifying the correctness of the destruction instruction.
  • the executing unit 203 is specifically configured to: according to the priority destruction data, generate a pseudo random number by using a pseudo random algorithm principle, and randomly adopt one of bitwise overwrite, jump overwrite or random overwrite by using the generated pseudo random number, Overwrite the data to be destroyed, determine to destroy unused storage space, and overwrite unused storage space with the generated pseudo-random number;
  • the setting unit 204 is configured to set the number of times of overwriting.
  • the executing unit 203 is further configured to: determine that the destruction result needs to be returned, and send the destruction result to the data transceiver unit 201;
  • the data transceiver unit 201 is configured to send the destruction result to the short message module of the terminal, and send the destruction result to the remote terminal.
  • the setting unit 204 is further configured to: select data to be destroyed, set the number of overwrites, and/or, set a destruction period or a destruction time;
  • the executing unit 203 is further configured to: destroy the selected data according to the number of times of overwriting, And/or, comparing the current time with the set time, determining that the current time is consistent with the set time, destroying the data to be destroyed according to the set number of times of overwriting, or periodically destroying the selected data, and generating according to the setting Destroy the log.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种销毁终端数据的方法,包括:远程终端向终端发送销毁指令,终端的数据销毁模块解析销毁指令,并按照销毁指令中的优先级以及解析结果销毁数据。本发明还公开了一种销毁终端数据的装置,采用本发明所述的方法及装置,避免的涉密数据被非法获取,防止已删除数据被非法恢复。

Description

一种销毁终端数据的方法及装置 技术领域
本发明涉及电子通讯领域, 特别是指一种销毁终端数据的方法及装置。 背景技术
随着社会的发展, 人们的生活水平日益提高, 移动终端, 例如手机, 也越来越普及, 成为人们日常生活中不可或缺的通讯工具。 同时, 随着通 讯技术的发展, 一些在计算机上实现的功能将会在手机上实现, 例如: 内 部或者外部存储设备的空间越来越大等, 这种技术的发展, 一方面方便了 用户, 用户可以将文件存放到手机的存储设备当中, 同时也会给手机用户 带来了数据外泄的风险, 即使用户已经删除了手机上的数据, 有可能因为 删除不彻底, 而被非法用户恢复, 进行非法使用。
在专利 CN101600208中, 提供了一种手机存储数据自动销毁的系统及 方法, 但是该方案只是对数据进行删除, 对于已删除的数据存在被非法恢 复的风险。 专利 CN200610060652.X中, 提供了一种利用激活码匹配, 然后 根据匹配情况销毁终端中销毁区域的数据, 并且对相关的数据进行覆盖, 但是该专利仅考虑对移动终端内部存储数据的销毁, 未考虑对外部存储设 备以及用户识别模块( SIM, Subscriber Identity Module )卡中数据的销毁, 同时, 位于销毁区域中数据的销毁需要一定的时间, 存在数据未完全销毁 时, 被强行破解从而获取数据的可能。 发明内容
有鉴于此, 本发明的主要目的在于提供一种销毁终端数据的方法及装 置, 采用本发明及装置, 避免涉密数据被非法获取, 防止已删除数据被非 法恢复。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供了一种销毁终端数据的方法, 包括:
远程终端向终端发送销毁指令, 终端的数据销毁模块解析销毁指令, 并按照销毁指令中的优先级以及解析结果销毁数据。
上述方案中, 所述终端的数据销毁模块解析销毁指令包括: 数据销毁 模块读取销毁指令中的数据, 确定需要销毁的数据以及数据销毁的优先级, 比较销毁指令中的验证信息同设定的验证信息, 确定两者相符, 根据销毁 指令中的数据计算校验码, 并与销毁指令中的校验码比较, 确定两者相同, 则进行数据销毁。
上述方案中, 所述按照销毁指令中的优先级以及解析结果销毁数据包 括: 根据优先级销毁数据, 根据伪随机算法原理产生伪随机数, 根据产生 的伪随机数随机选用逐位覆写、 跳位覆写或随机覆写方式中的一种, 对要 销毁的数据进行覆写, 确定需要销毁未用存储空间时, 用产生的伪随机数 填充未用存储空间, 所述覆写的次数由用户设定。
上述方案中, 确定需要返回销毁结果, 数据销毁模块将销毁结果通过 终端的短信模块发送给远程终端。
上述方案中, 通过数据销毁模块选择要销毁的数据, 由数据销毁模块 对要销毁的数据进行销毁; 和 /或, 对要销毁的数据设定销毁周期或销毁时 间, 数据销毁模块比较当前时间同设定时间, 确定当前时间同设定时间相 符, 对要销毁的数据进行销毁, 或对要销毁的数据周期性销毁。
本发明还提供了一种销毁终端数据的装置, 包括:
数据收发单元, 用于接收远程终端发送给终端的销毁指令并发送给比 较验证单元;
比较验证单元, 用于接收数据收发单元发送的销毁指令并解析, 确定 销毁数据的优先级, 同解析结果一起发送给执行单元;
执行单元, 用于根据比较验证模块发送的销毁数据的优先级以及解析 结果销毁数据。
上述方案中, 比较验证单元具体用于, 读取销毁指令中的数据, 确定 数据销毁的优先级以及需要销毁的数据, 将销毁指令中的验证信息同设定 的验证信息比较, 确定两者相符, 通过销毁数据中的数值, 计算校验码, 并与销毁指令中的校验码比较, 确定两者相同, 则对数据进行销毁; 相应 的, 设置单元, 用于设置验证信息, 验证销毁指令的正确性。
上述方案中, 执行单元具体用于, 根据优先级销毁数据, 采用伪随机 算法原理产生伪随机数, 用产生的伪随机数随机采用逐位覆写、 跳位覆写 或随机覆写方式中的一种, 对要销毁的数据进行覆写, 确定需要销毁未用 存储空间, 用产生的伪随机数覆盖未用存储空间。
上述方案中, 执行单元进一步用于, 确定需返回销毁结果, 将销毁结 果发送给数据收发单元; 数据收发单元, 用于将销毁结果发送给终端的短 信模块, 将销毁结果发送给远程终端。
上述方案中, 设置单元进一步用于, 选择需销毁的数据, 设置覆写次 数, 和 /或, 设定销毁周期或销毁时间; 执行单元进一步用于, 根据覆写次 数, 对选择的数据进行销毁, 和 /或, 比较当前时间同设定时间, 确定当前 时间同设定时间相符, 根据设置的覆写次数对需销毁的数据进行销毁, 或 周期性销毁选定的数据。
由此可见, 采用本发明所述的销毁终端数据的方法及装置, 对数据划 分优先级, 优先销毁涉密的数据, 避免涉密数据被非法获取, 对已删除数 据进行多次覆盖, 防止已删除数据被非法恢复, 设定销毁周期, 避免用户 因遗忘销毁造成数据泄露, 可直接在浏览数据时调用数据销毁模块, 使数 据的销毁更加方便快捷。 附图说明
图 1为本发明实现销毁终端数据的方法流程示意图;
图 1为本发明实现销毁终端数据的装置组成示意图。 具体实施方式
本发明的基本思想是: 远程终端向终端发送销毁指令, 终端的数据销 毁模块解析销毁指令并确定数据销毁的优先级, 按照优先级以及解析结果 对数据进行销毁;
其中, 所述远程终端为任意可发送销毁指令的终端, 所述终端为需要 进行数据销毁并设置了数据销毁模块的终端。
下面结合附图和具体实施例来对本发明进行详细说明, 如图 1 所示, 本发明实现销毁终端数据的具体步驟如下:
步驟 101 , 终端启动数据销毁模块;
终端启动数据销毁模块, 所述启动为终端开机时自动在后台运行, 所 述数据销毁模块用于销毁终端数据。
步驟 102,远程终端向终端发送销毁指令,数据销毁模块接收销毁指令。 远程终端向终端发送销毁指令, 所述指令包括但不限于短信、 彩信或 者 OTA ( Over-The-Air )等方式发送, 当终端遗失, 可以通过远程终端向终 端发送销毁指令, 以便销毁终端的数据。
步驟 103 ,数据销毁模块解析销毁指令并按照优先级及解析结果销毁终 端数据。
数据销毁模块解析接收的销毁指令, 所述销毁指令由一串数字组成, 根据设定的规则每个数字表示相应的数据销毁指示。 用户可根据需要销毁 的数据设定销毁指令中数字的数值,例如,所述销毁指令由 32个数字组成, 其制定规则如下:
第 1到第 6个数字用于标识 SIM卡数据的销毁信息, 第 1个数字表示 是否销毁全部 SIM卡数据, 第 2个数字表示是否销毁名片夹数据, 第 3个 数字表示是否销毁短消息数据, 第 4个数字表示是否销毁文本短消息数据, 第 5个数字表示是否销毁多媒体短消息数据, 第 6个数字表示是否销毁语 音短消息数据, 数值为 1表示销毁数据, 数值为 0表示不销毁数据。 第 7 到第 11个数字用于标识手机数据销毁信息, 第 7个数字表示是否销毁手机 数据, 第 8个数字表示是否销毁手机名片夹数据, 第 9个数字表示是否销 毁手机短消息数据, 第 10个数字表示是否销毁手机图片数据, 第 11个数 字表示是否进行未用存储空间销毁, 数值为 1表示销毁, 数值为 0表示不 销毁, 所述未用存储空间指未存储数据的空间, 其中包含已删除的数据。 第 12到第 16个数字用于标识外部存储器信息, 第 12个数字表示是否销毁 外部存储器信息, 第 13个数字表示是否销毁外部存储器中图片数据, 第 14 个数字表示是否销毁外部存储器中多媒体数据, 第 15个数字表示是否销毁 外部存储器中文本数据, 第 16个数字表示是否进行未用空间销毁, 数值为 1表示销毁, 数值为 0表示不销毁。 第 17个数字用于标识优先销毁哪个存 储器数据, 如果为 1则优先销毁 SIM卡数据, 2表示优先销毁手机数据, 3 表示优先销毁外部存储器数据。 第 18个到第 28个数字为验证信息, 例如 为手机号码, 用于验证销毁指令, 可设定一到多个手机号码。 第 29个数字 用于标识是否返回销毁结果的指令, 数值为 1 表示要返回销毁结果, 数值 为 0表示不要返回销毁结果。 第 30个数字为校验码, 第 31到第 32个数字 为预留标识位。
终端的数据销毁模块读取销毁指令中每一个数字的数值, 从而确定优 先销毁的数据以及 SIM卡、 手机数据以及外部存储器中需要销毁的数据, 然后将销毁指令中的验证信息, 即第 18到第 28位数字的手机号码与用户 设置在数据销毁模块中的验证信息比较, 确定相符, 然后将第 1到第 17的 数值根据运算计算出校验码, 同销毁指令中的校验码比较, 若两者相符, 则根据优先级对终端中的数据进行销毁, 所述销毁是指根据伪随机算法原 理产生伪随机数, 用产生的伪随机数随机采用逐位覆写、 跳位覆写或者随 机覆写方式中的一种, 覆盖要销毁的数据, 对于未用存储空间, 将伪随机 数写入所述未用存储空间, 覆写的次数可由用户通过数据销毁模块进行设 定, 数据销毁模块通过读取用户设定的次数, 确定销毁数据的覆写次数。
销毁数据后, 数据销毁模块通过读取销毁指令中第 29位数字的数值确 定是否需要返回销毁结果, 如果需要返回销毁结果, 数据销毁模块将销毁 结果发送给远程终端。
进一步的, 用户可以通过数据销毁模块实现自主销毁终端上的数据, 具体为: 直接开启数据销毁模块, 输入数据销毁模块的密码, 进入数据销 毁模块, 所述密码可通过数据销毁模块进行设置, 通过数据销毁模块浏览 终端的所有数据, 包括终端内部存储器、 SIM卡或者外部存储器中的文件 或文件夹, 选择需要销毁的数据, 然后通过数据销毁模块选中需要销毁的 数据, 或者通过数据销毁模块设定销毁周期或销毁时间, 然后选择需要销 毁的数据, 数据销毁模块将当前时间同用户设定的销毁时间进行比较, 确 定当前时间同设定时间相同, 销毁选定的数据, 或周期性销毁选定的数据, 通过数据销毁模块选择是否需要销毁日志, 所述销毁日志中包括销毁的文 件名称、 时间等。
或者, 浏览数据, 确定数据需要销毁, 通过调用方式开启数据销毁模 块, 输入密码进入数据销毁模块, 然后对数据进行销毁。
本发明还提供了一种销毁终端数据的装置, 如图 2所示, 该装置包括: 数据收发单元 201、 比较验证单元 202、 执行单元 203:
数据收发单元 201 ,用于接收远程终端发送给终端的销毁指令并发送给 比较验证单元 202;所述销毁指令中数字的数值为用户根据需要销毁的数据 进行设定, 然后通过远程终端发送; 比较验证单元 202 ,用于接收数据收发单元 201发送的销毁指令并解析, 确定销毁数据的优先级, 将销毁数据的优先级以及解析结果发送给执行单 元 203 ;
执行单元 203 ,用于根据比较验证模块 202发送的销毁数据的优先级以 及解析结果销毁数据。
比较验证单元 202具体用于, 读取销毁指令中的数据, 确定用户设定 的数据销毁的优先级以及 SIM卡、 手机数据以及外部存储器中需要销毁的 数据, 将销毁指令中的验证信息同设置的验证信息相比较, 如将销毁指令 中第 18到第 28位数字的手机号码同设置单元 204设置的手机号码相比较, 确定同其中的一个号码相符, 即验证信息相符, 根据销毁指令中的数值计 算校验码, 将计算出的校验码, 同销毁指令中的校验码比较, 确定两者相 符, 则对数据进行销毁, 将优先级以及解析结果发送给执行单元 203。
设置单元 204, 用于设置验证信息, 从而验证销毁指令的正确性。
执行单元 203 具体用于, 根据优先级销毁数据, 采用伪随机算法原理 产生伪随机数, 用产生的伪随机数随机采用逐位覆写、 跳位覆写或者随机 覆写方式中的一种, 对要销毁的数据进行覆写, 确定销毁未用存储空间, 用产生的伪随机数覆盖未用存储空间;
设置单元 204, 用于设置覆写次数。
执行单元 203 进一步用于, 确定需返回销毁结果, 将销毁结果发送给 数据收发单元 201 ;
数据收发单元 201 , 用于将销毁结果发送给终端的短信模块, 将销毁结 果发送给远程终端。
设置单元 204进一步用于, 选择需销毁的数据, 设置覆写次数, 和 /或, 设定销毁周期或销毁时间;
执行单元 203 进一步用于, 根据覆写次数, 对选择的数据进行销毁, 和 /或, 比较当前时间同设定时间, 确定当前时间同设定时间相符, 根据设 置的覆写次数, 对需销毁的数据进行销毁, 或周期性销毁选定的数据, 并 根据设定产生销毁日志。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围, 凡在本发明的精神和原则之内所作的任何修改、 等同替换和改进 等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种销毁终端数据的方法, 其特征在于, 该方法包括:
远程终端向终端发送销毁指令, 终端的数据销毁模块解析销毁指令, 并按照销毁指令中的优先级以及解析结果销毁数据。
2、 根据权利要求 1所述的方法, 其特征在于, 所述终端的数据销毁模 块解析销毁指令包括:
数据销毁模块读取销毁指令中的数据, 确定需要销毁的数据以及数据 销毁的优先级, 比较销毁指令中的验证信息同设定的验证信息, 确定两者 相符, 根据销毁指令中的数据计算校验码, 并与销毁指令中的校验码比较, 确定两者相同, 则进行数据销毁。
3、 根据权利要求 1所述的方法, 其特征在于, 所述按照销毁指令中的 优先级以及解析结果销毁数据包括: 根据优先级销毁数据, 根据伪随机算 法原理产生伪随机数, 根据产生的伪随机数随机选用逐位覆写、 跳位覆写 或随机覆写方式中的一种, 对要销毁的数据进行覆写, 确定需要销毁未用 存储空间时, 用产生的伪随机数填充未用存储空间, 所述覆写的次数由用 户设定。
4、 根据权利要求 1、 2或 3所述的方法, 其特征在于,
确定需要返回销毁结果 , 数据销毁模块将销毁结果通过终端的短信模 块发送给远程终端。
5、 根据权利要求 1、 2或 3所述的方法, 其特征在于, 该方法进一步 包括:
通过数据销毁模块选择要销毁的数据, 由数据销毁模块对要销毁的数 据进行销毁; 和 /或,
对要销毁的数据设定销毁周期或销毁时间, 数据销毁模块比较当前时 间同设定时间, 确定当前时间同设定时间相符, 对要销毁的数据进行销毁, 或对要销毁的数据周期性销毁。
6、 一种销毁终端数据的装置, 其特征在于, 该装置包括:
数据收发单元, 用于接收远程终端发送给终端的销毁指令并发送给比 较验证单元;
比较验证单元, 用于接收数据收发单元发送的销毁指令并解析, 确定 销毁数据的优先级, 同解析结果一起发送给执行单元;
执行单元, 用于根据比较验证模块发送的销毁数据的优先级以及解析 结果销毁数据。
7、 根据权利要求 6所述的装置, 其特征在于,
比较验证单元具体用于, 读取销毁指令中的数据, 确定数据销毁的优 先级以及需要销毁的数据, 将销毁指令中的验证信息同设定的验证信息比 较, 确定两者相符, 通过销毁数据中的数值, 计算校验码, 并与销毁指令 中的校验码比较, 确定两者相同, 则对数据进行销毁;
相应的, 设置单元, 用于设置验证信息, 验证销毁指令的正确性。
8、 根据权利要求 6所述的装置, 其特征在于,
执行单元具体用于, 根据优先级销毁数据, 采用伪随机算法原理产生 伪随机数, 用产生的伪随机数随机采用逐位覆写、 跳位覆写或随机覆写方 式中的一种, 对要销毁的数据进行覆写, 确定需要销毁未用存储空间, 用 产生的伪随机数覆盖未用存储空间。
9、 根据权利要求 6、 7或 8所述的装置, 其特征在于,
执行单元进一步用于, 确定需返回销毁结果, 将销毁结果发送给数据 收发单元;
数据收发单元, 用于将销毁结果发送给终端的短信模块, 将销毁结果 发送给远程终端。
10、 根据权利要求 6、 7或 8所述的装置, 其特征在于, 设置单元进一步用于, 选择需销毁的数据, 设置覆写次数, 和 /或, 设 定销毁周期或销毁时间;
执行单元进一步用于, 根据覆写次数, 对选择的数据进行销毁, 和 /或, 比较当前时间同设定时间, 确定当前时间同设定时间相符, 根据设置的覆 写次数对需销毁的数据进行销毁, 或周期性销毁选定的数据。
PCT/CN2010/073585 2010-04-22 2010-06-04 一种销毁终端数据的方法及装置 WO2011130934A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010153925.1 2010-04-22
CN201010153925A CN101815128A (zh) 2010-04-22 2010-04-22 一种销毁终端数据的方法及装置

Publications (1)

Publication Number Publication Date
WO2011130934A1 true WO2011130934A1 (zh) 2011-10-27

Family

ID=42622242

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/073585 WO2011130934A1 (zh) 2010-04-22 2010-06-04 一种销毁终端数据的方法及装置

Country Status (2)

Country Link
CN (1) CN101815128A (zh)
WO (1) WO2011130934A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533202A (zh) * 2012-07-05 2014-01-22 佳能株式会社 配备有覆写删除功能的信息处理装置及其控制方法

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571949B (zh) * 2011-12-31 2014-05-07 河海大学 一种基于网络的数据自毁方法
CN105117302B (zh) * 2015-07-24 2017-12-29 厦门宇高信息科技有限公司 一种用于存储介质数据销毁的校验方法
CN105069577A (zh) * 2015-08-25 2015-11-18 长沙市麓智信息科技有限公司 专利信息管理系统
CN105357009B (zh) * 2015-09-29 2018-07-24 莱诺斯科技(北京)股份有限公司 一种涉密数据的传输回收系统
CN105701417A (zh) * 2016-01-13 2016-06-22 丁贤根 基于cms文件分组保密管理系统的实现方法
CN106792651A (zh) * 2017-01-10 2017-05-31 广东欧珀移动通信有限公司 移动终端自毁方法、装置和移动终端
CN106851624A (zh) * 2017-02-24 2017-06-13 北京小米移动软件有限公司 信息处理方法及装置
CN107862223A (zh) * 2017-11-28 2018-03-30 长沙深蓝未来智能技术有限公司 多次全盘覆盖防止电子信息存储载体数据恢复的方法
CN108710471A (zh) * 2018-03-27 2018-10-26 陈迎春 一种数据销毁方法、装置、服务器与系统
CN108874864B (zh) * 2018-04-19 2023-05-30 北京立思辰计算机技术有限公司 文件回收方法和系统
CN109949478B (zh) * 2019-03-21 2021-09-21 深圳神盾卫民警用设备有限公司 卡证销毁方法、卡证销毁设备以及可读存储介质
CN110866291B (zh) * 2019-11-15 2023-03-24 北京工业大学 一种基于双重安全机制的废旧电子产品信息清除方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006054340A1 (ja) * 2004-11-17 2006-05-26 Fujitsu Limited 携帯無線端末及びそのセキュリティシステム
JP2007058652A (ja) * 2005-08-25 2007-03-08 Nec System Technologies Ltd ファイル破壊装置、情報処理装置、情報処理方法及びプログラム
CN1929665A (zh) * 2006-09-26 2007-03-14 华为技术有限公司 手机功能的短信控制方法
CN101600208A (zh) * 2008-06-02 2009-12-09 深圳富泰宏精密工业有限公司 手机存储数据自动销毁系统及方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131723B (zh) * 2006-08-21 2010-06-02 杭州小尔科技有限公司 用手机删除笔记本电脑内存文件的系统及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006054340A1 (ja) * 2004-11-17 2006-05-26 Fujitsu Limited 携帯無線端末及びそのセキュリティシステム
JP2007058652A (ja) * 2005-08-25 2007-03-08 Nec System Technologies Ltd ファイル破壊装置、情報処理装置、情報処理方法及びプログラム
CN1929665A (zh) * 2006-09-26 2007-03-14 华为技术有限公司 手机功能的短信控制方法
CN101600208A (zh) * 2008-06-02 2009-12-09 深圳富泰宏精密工业有限公司 手机存储数据自动销毁系统及方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533202A (zh) * 2012-07-05 2014-01-22 佳能株式会社 配备有覆写删除功能的信息处理装置及其控制方法
US9411720B2 (en) 2012-07-05 2016-08-09 Canon Kabushiki Kaisha Information processing apparatus equipped with overwrite deletion function, method of controlling the same, and storage medium

Also Published As

Publication number Publication date
CN101815128A (zh) 2010-08-25

Similar Documents

Publication Publication Date Title
WO2011130934A1 (zh) 一种销毁终端数据的方法及装置
CN102694920B (zh) 一种手机防盗方法
US9292680B2 (en) Mobile terminal detection method and mobile terminal
CN102781001A (zh) 移动终端内置文件加密方法及移动终端
CN104717622B (zh) 信息转发方法和装置、终端和服务器
CN104700010A (zh) 个人信息保护方法及保护装置
JP2006505993A5 (zh)
TW201334492A (zh) 電子裝置的解鎖密碼重置系統及方法
CN102202297B (zh) 一种移动终端加密的方法和装置
CN101426198A (zh) 一种手机信息的保护方法
CN101815292B (zh) 一种移动终端的数据保护装置及方法
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN109409034A (zh) 应用程序的验证方法、平台、终端、系统、介质和设备
CN110855833A (zh) 终端找回方法、装置、终端及存储介质
CN101483871A (zh) 一种触摸屏终端及其鉴权方法和系统
WO2011140756A1 (zh) 移动终端、移动终端数据保护方法以及移动终端监控系统
CN109582238B (zh) 一种硬盘绑定、匹配方法、系统及电子设备和存储介质
CN102902933B (zh) 基于文件碎片化处理的文件保存方法
WO2016141797A1 (zh) 信息处理方法及装置、计算机可读介质
CN109614511A (zh) 一种废弃图片的删除方法及装置、电子设备
WO2008089638A1 (fr) Procédé et terminal de communication pour contrôler l'information d'usager dans le terminal de communication
TWI325715B (en) Method of retrieving and encrypting data for mobile communication apparatus
CN113873450A (zh) 短信配置方法、装置、计算机设备和存储介质
WO2012006840A1 (zh) 隐藏信息的方法和装置
CN105975624A (zh) 一种数据传输方法、设备和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10850068

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10850068

Country of ref document: EP

Kind code of ref document: A1