WO2019090586A1 - Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données - Google Patents

Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données Download PDF

Info

Publication number
WO2019090586A1
WO2019090586A1 PCT/CN2017/110164 CN2017110164W WO2019090586A1 WO 2019090586 A1 WO2019090586 A1 WO 2019090586A1 CN 2017110164 W CN2017110164 W CN 2017110164W WO 2019090586 A1 WO2019090586 A1 WO 2019090586A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
factory
password
frp
operation instruction
Prior art date
Application number
PCT/CN2017/110164
Other languages
English (en)
Chinese (zh)
Inventor
木魁
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to CN201780096648.5A priority Critical patent/CN111316277A/zh
Priority to PCT/CN2017/110164 priority patent/WO2019090586A1/fr
Publication of WO2019090586A1 publication Critical patent/WO2019090586A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Definitions

  • the present invention relates to the field of data erasure in mobile terminals, and more particularly to a mobile terminal and a computer readable storage medium for data erasure.
  • Factory Reset Protection is a protection measure in Android devices developed by Google that protects devices after they are stolen or lost, preventing unauthorized users from logging in or using them. If the electronic device is running Android OS 5.1 or higher, after logging in to the Google account and launching the FRP lock on this device, the relevant account information will be stored in a separate partition. If the user's mobile terminal is lost or stolen, the user does not normally brush the machine, or restores the factory settings, after restarting the device, you need to fill in the information of its Google account to complete the boot process. If the account password is forgotten, the mobile terminal cannot activate the entry interface. At the same time, the user can also clear the user's personal information by erasing the data in the FRP partition.
  • the drawback of the one-button erase FRP partition function implemented by the mobile terminal is that if the password of the mobile terminal is not known, the system cannot be erased, and thus the FRP partition cannot be erased.
  • the user forgets the password by himself but needs to clear the personal information in the smart terminal, it is difficult to implement.
  • the present invention provides a mobile terminal and a computer readable storage medium for data erasure.
  • the invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
  • a computer readable storage medium for data erasing on which a computer program is stored, wherein when the computer program is executed by a processor, the following steps are implemented: capturing a first operation instruction, starting security Mode, in the safe mode, selecting and entering the factory reset protection program, in the factory reset protection program, selecting to erase the factory reset protection data, capturing a second operation instruction, inputting a password information, The password information is compared with a preset password, and when the password information matches the preset password, the factory reset protection data is erased.
  • capturing a first operation instruction comprises: capturing an operation instruction input by the pair of mobile terminals, parsing the operation instruction, obtaining an operation content, and controlling the mobile terminal to enter according to the operation content Safe mode.
  • the password information is an unlock code of the factory reset protection program.
  • the acquiring method of the unlocking code comprises: reading an international mobile device identity code of the mobile terminal, and retrieving an unlocking code of the mobile terminal's factory reset protection program according to the international mobile device identity code.
  • the following steps are further implemented, the security mode is parsed, the setting authority is obtained, and the entry of the factory reset protection program is written into the security mode.
  • a mobile terminal includes a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the following steps: capturing a first An operation command starts a safety mode, in which the selection and enters a factory reset protection program, in the factory reset protection program, selects an erase factory reset protection data, captures a second operation instruction, and inputs a
  • the password information compares the password information with a preset password, and when the password information matches the preset password, erasing and restoring the factory setting protection data.
  • capturing a first operation instruction comprises: capturing an operation instruction input by the pair of mobile terminals, parsing the operation instruction, obtaining an operation content, and controlling the mobile terminal to enter according to the operation content Safe mode.
  • the password information is an unlock code of the factory reset protection program.
  • the acquiring method of the unlocking code comprises: reading an international mobile device identity code of the mobile terminal, and retrieving an unlocking code of the mobile terminal's factory reset protection program according to the international mobile device identity code.
  • the processor executes the computer program
  • the following steps are implemented, the security mode is parsed, the setting authority is obtained, and the entry of the factory reset protection program is written into the security mode.
  • the technical advantage of the present invention is that the present invention proposes a mobile terminal and a computer readable storage medium for data erasure.
  • the invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
  • FIG. 1 is a flow chart showing the steps implemented when a computer program stored on a computer readable storage medium for data erasure is executed by a processor in accordance with a preferred embodiment of the present invention
  • FIG. 2 is a flow chart showing a step of automatically capturing a first operation command and starting a security mode in accordance with the present invention
  • FIG. 3 is a flow chart showing a step of obtaining an unlock code of the factory reset protection program in accordance with FIG. 1;
  • FIG. 4 is a flow diagram showing the steps of a write-to-safe mode that preferably restores the factory-set protection program of FIG.
  • first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information without departing from the scope of the present disclosure.
  • second information may also be referred to as first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determination"
  • the drawback of the one-button erasure FRP partition function implemented by the mobile terminal is that if the password of the mobile terminal is not known, the system cannot be accessed, and thus the FRP partition cannot be erased. When the user forgets the password by himself but needs to clear the personal information in the smart terminal, it is difficult to implement.
  • a computer readable storage medium for data erasing is proposed. Referring to Figure 1, there is shown a flow diagram of the steps implemented when a computer program stored on a computer readable storage medium for data erasure is executed by a processor in accordance with a preferred embodiment of the present invention.
  • the steps implemented when the computer program is executed by the processor mainly include: S1: capturing a first operation instruction, starting a security mode; S2: selecting, in the security mode, selecting And enter the factory reset protection program; S3: in the factory reset protection program, select to erase the factory settings protection data; S4: capture a second operation instruction, input a password information; S5: comparing the password information with a preset password; S6: erasing and restoring the factory setting protection data when the password information matches the preset password.
  • the steps implemented when the computer program is executed by the processor are as follows:
  • the security mode is: Recovery mode, which is an Android mobile terminal backup function, and refers to a data that can be internal to the Android machine. Or the mode in which the system is modified (similar to windows PE or DOS). In this mode, the user can back up or upgrade the existing system, or restore the factory settings here.
  • the use of recovery is the same as the GHOST software on the computer, which plays a role in system backup and restoration. Of course, you can also upgrade the kernel, brush patches, and so on. Recovery is written in conjunction with the system baseband, and different baseband versions cannot be messed up. Enter the recovery interface, the user can directly use the zip format rom format on the sd card to upgrade (downgrade) the user's system.
  • the mobile terminal after the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
  • FIG. 2 it is a schematic flowchart of a step of automatically capturing a first operation instruction and starting a security mode according to the present invention.
  • the step of capturing a first operation instruction and starting the security mode is as follows:
  • the user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, further parse the operation
  • the operation instruction for example, acquiring a button position of the user, a button strength, and the like, and obtaining an operation content pointed by the operation instruction according to the parsed operation instruction, thereby further controlling the mobile terminal to enter the security mode.
  • the volume button is the cursor selection button, which can be used to move the cursor
  • the power button is the confirmation button.
  • the factory reset protection is a protection measure in the Android device developed by Google. Protect your device after it has been stolen or lost, preventing unauthorized users from logging in or using it.
  • Google In order to prevent user information from leaking after the mobile terminal is lost, Google requires that Android 5.1 and later versions need to have FRP function and be enabled by default. This security feature prevents unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is enabled, the user can perform the operation of clearing the user data by remotely logging in to the Google account to avoid leakage of information, and the method needs to be turned on after the factory is restored. The navigation verifies that the Google account that was last logged in can enter the system and use the mobile terminal normally. The user can control the FRP function to be turned on and off through the "Settings - Developer Options - Open OEM Unlock" menu. The OEM switch is off, indicating that the FRP function is on. When FRP is turned on, Secureboot cannot be unlocked, and the fastboot flash command cannot be executed.
  • the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal in a security mode, after the mobile terminal parses the operation instruction. And, according to the operation instruction, enter a reset factory setting protection program of the mobile terminal. Therefore, it is possible to realize the normal use of the factory reset protection program without logging into the Google account.
  • the user may implement an operation instruction by triggering a specific button on the mobile terminal to trigger the mobile terminal to perform an operation instruction, and the mobile terminal parses the After the operation instruction, the device can be selected to erase and restore the factory setting protection data according to the operation instruction.
  • a password request is sent, for example, by popping up a dialog box on the display screen of the mobile terminal.
  • the user inputs a password information to the mobile terminal by using a keyboard or the like of the mobile terminal, that is, sends a second operation instruction; after reading the password information input by the user, the mobile terminal converts the password information into one Computer-readable digital information, such as converting decimal numbers to binary digital information, etc., and sending them out.
  • the password information is an unlock code of the factory reset protection program.
  • FIG. 3 it is a flow diagram of a step corresponding to the unlock code of FIG. 1 that preferably obtains a factory reset protection program.
  • the method for acquiring the unlock code includes:
  • the International Mobile Equipment Identity is an abbreviation of the international mobile device identity code
  • the international mobile equipment identification code is an "electronic serial number" consisting of 15 digits, which is associated with each The phones correspond one-to-one, and the code is the only one in the world.
  • Each handset will be assigned a globally unique set of numbers after assembly, and this number will be recorded by the manufacturer of the manufacturing process from production to delivery.
  • IMEI is TAC+FAC+SNR+SP, and its composition is:
  • the first 6 digits is the "model approval number", which generally represents the model.
  • the subsequent 6-digit number is the "serial number", which generally represents the production sequence number.
  • SP last 1 digit
  • the IMEI code is attached to the logo on the back of the mobile phone (also stored in the mobile phone, which can be obtained by pressing "*#06#” on the mobile phone), and is read and written in the memory of the mobile phone. It is also the "file” and "identity number” of the mobile phone at the manufacturer.
  • the international mobile device identity code of the mobile terminal can be obtained by reading the identification information on the mobile terminal or by pressing “*#06#” on the mobile terminal.
  • the FRP unlocking code can be queried by the IMEI in the “Query Unlocking Code” function of the FRP unlocking tool, such as the ComPartner platform.
  • the mobile terminal after the mobile terminal captures a password information input by a user to the mobile terminal, the mobile terminal further further stores the password information with a pre-stored one in the mobile terminal.
  • the default password is correct.
  • the mobile terminal may obtain the rights erasure to restore the factory setting protection data.
  • the technical effect of bypassing the Google account password and one-click erasing the FRP partition data is realized.
  • FIG. 4 it is a flow diagram of a step in accordance with FIG. 1 which preferably restores the entry of the factory-set protection program to the security mode.
  • the proposed step of writing the entry of the factory reset protection program into the security mode includes:
  • the recovery.img is rewritten in the Linux environment, and the split_bootimg.zip file is downloaded.
  • the zip file contains a perl file, split_bootimg.pl script, which can read recovery.img and read the kernel and ramdisk. This script also outputs the kernel command line and board name.
  • Unpack recovery.img use mkbootfs tool to recreate ramdisk; use mkbootimg to recreate recovery-new.img, get a new recovery-new.img, and then brush into the third-party recovery method.
  • a recovery that satisfies the condition can be re-created and written into the original recovery, and the specific steps are as follows:
  • recovery.img-kernel is the new kernel
  • ramdisk-new.gz is the new memory disk
  • boot-new.img is the new img generated.
  • Boot.img or recovery.img packaged according to this method because of the base address and kernel parameters Both are correct and can be used directly on the mobile terminal.
  • a mobile terminal and a computer readable storage medium for data erasing are provided.
  • the invention writes the entry of the FRP into the recovery mode, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.
  • Another aspect of the present invention is to provide a mobile terminal including a memory, a processor, and a memory And a computer program executable on the processor, wherein the processor executes the computer program to implement the following steps:
  • S'1 capture a first operation instruction, start the security mode
  • S'2 in the security mode, select and enter the factory reset protection program
  • S'3 in the factory reset protection program, select to erase Restore factory setting protection data
  • S'4 capture a second operation instruction, input a password information
  • S'5 compare the password information with a preset password
  • S'6 when the password information and the location When the preset passwords match, the erase restores the factory settings protection data.
  • the security mode is: Recovery mode, which is an Android mobile terminal backup function, and refers to a data that can be internal to the Android machine. Or the mode in which the system is modified (similar to windows PE or DOS). In this mode, the user can back up or upgrade the existing system, or restore the factory settings here.
  • the use of recovery is the same as the GHOST software on the computer, which plays a role in system backup and restoration. Of course, you can also upgrade the kernel, brush patches, and so on. Recovery is written in conjunction with the system baseband, and different baseband versions cannot be messed up. Enter the recovery interface, the user can directly use the zip format rom format on the sd card to upgrade (downgrade) the user's system.
  • the mobile terminal after the user triggers the mobile terminal and sends an operation instruction to the mobile terminal, the mobile terminal enters the security mode of the mobile terminal according to the operation instruction.
  • the step of capturing a first operation instruction and starting the security mode is provided by:
  • the user may input an operation instruction to the mobile terminal by pressing a specific function key on the mobile terminal; after the mobile terminal senses the operation instruction, further parse the operation
  • the operation instruction for example, acquiring a button position of the user, a button strength, and the like, and obtaining an operation content pointed by the operation instruction according to the parsed operation instruction, thereby further controlling the mobile terminal to enter the security mode.
  • the volume button is the cursor selection button, which can be used to move the cursor
  • the power button is the confirmation button.
  • the factory reset protection is a protection measure in the Android device developed by Google, which can be Protect the device after theft or loss, preventing unauthorized users from logging in or using it.
  • Google In order to prevent user information from leaking after the mobile terminal is lost, Google requires that Android 5.1 and later versions need to have FRP function and be enabled by default. This security feature prevents unauthorized users from logging in or using the device. For example, if the mobile terminal is lost or stolen, as long as the FRP function is enabled, the user can perform the operation of clearing the user data by remotely logging in to the Google account to avoid leakage of information, and the method needs to be turned on after the factory is restored. The navigation verifies that the Google account that was last logged in can enter the system and use the mobile terminal normally. The user can control the FRP function to be turned on and off through the "Settings - Developer Options - Open OEM Unlock" menu. The OEM switch is off, indicating that the FRP function is on. When FRP is turned on, Secureboot cannot be unlocked, and the fastboot flash command cannot be executed.
  • the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal in a security mode, and after the mobile terminal parses the operation instruction, According to the operation instruction, the factory reset protection program of the mobile terminal is entered. Therefore, it is possible to realize the normal use of the factory reset protection program without logging into the Google account.
  • the user may send an operation instruction to the mobile terminal by triggering a specific button on the mobile terminal under the factory reset protection program, and after the mobile terminal parses the operation instruction, According to the operation instruction, select to erase and restore the factory setting protection data.
  • a password request is sent, for example, by popping up a dialog box in the display screen of the mobile terminal.
  • the user inputs a password information to the mobile terminal by using a keyboard or the like of the mobile terminal, that is, sends a second operation instruction; after reading the password information input by the user, the mobile terminal converts the password information into one Computer readable digital information, For example, convert a decimal number into binary digital information, etc., and send it out.
  • the password information is an unlock code of the factory reset protection program.
  • the method for acquiring the unlock code includes:
  • the International Mobile Equipment Identity is an abbreviation of the international mobile device identity code
  • the international mobile equipment identification code is an "electronic serial number" consisting of 15 digits, which is associated with each The phones correspond one-to-one, and the code is the only one in the world.
  • Each handset will be assigned a globally unique set of numbers after assembly, and this number will be recorded by the manufacturer of the manufacturing process from production to delivery.
  • IMEI is TAC+FAC+SNR+SP, and its composition is:
  • the first 6 digits is the "model approval number", which generally represents the model.
  • the subsequent 6-digit number is the "serial number", which generally represents the production sequence number.
  • SP last 1 digit
  • the IMEI code is attached to the logo on the back of the mobile phone (also stored in the mobile phone, which can be obtained by pressing "*#06#” on the mobile phone), and is read and written in the memory of the mobile phone. It is also the "file” and "identity number” of the mobile phone at the manufacturer.
  • the international mobile device identity code of the mobile terminal can be obtained by reading the identification information on the mobile terminal or by pressing “*#06#” on the mobile terminal.
  • the FRP unlocking code can be queried by the IMEI in the "Query Unlocking Code" function of the FRP unlocking tool, such as the ComPartner platform.
  • the mobile terminal after the mobile terminal captures a password information input by the user to the mobile terminal, the mobile terminal further compares the password information with a preset password pre-stored in the mobile terminal. Correct.
  • the mobile terminal may obtain the rights erasure restoration factory setting protection data.
  • the technical effect of bypassing the Google account password and one-click erasing the FRP partition data is realized.
  • the proposed step of writing the entry of the factory reset protection program into the security mode includes:
  • the recovery.img is rewritten in the Linux environment, and the split_bootimg.zip file is downloaded.
  • the zip file contains a perl file, split_bootimg.pl script, which can read recovery.img and read the kernel and ramdisk. This script also outputs the kernel command line and board name.
  • Unpack recovery.img use mkbootfs tool to recreate ramdisk; use mkbootimg to recreate recovery-new.img, get a new recovery-new.img, and then brush into the third-party recovery method.
  • a recovery that satisfies the condition can be re-created and written into the original recovery, and the specific steps are as follows:
  • recovery.img-kernel is the new kernel
  • ramdisk-new.gz is the new memory disk
  • boot-new.img is the new img generated.
  • Boot.img or recovery.img packaged according to this method because of the base address and kernel parameters Both are correct and can be used directly on the mobile terminal.
  • a mobile terminal in the present invention, writes the entry of the FRP into the recovery mode of the mobile terminal, and the user can erase the personal information data in the FRP partition by inputting the correct FRP password in the recovery mode.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un terminal mobile, et un support de stockage lisible par ordinateur pour l'effacement de données, ledit support de stockage lisible par ordinateur stockant dans celui-ci un programme d'ordinateur, qui, lorsqu'il est exécuté par un processeur, amène les étapes suivantes à être mises en œuvre : la capture d'une première instruction d'opération pour démarrer un mode de sécurité ; dans le mode de sécurité, la sélection et l'entrée d'un programme de protection de réinitialisation d'usine (FRP) ; dans le programme FRP, la sélection et l'effacement des données FRP ; la capture d'une seconde instruction d'opération, pour entrer des informations de mot de passe ; la comparaison des informations de mot de passe à un mot de passe prédéfini ; et lorsque les informations de mot de passe correspondent au mot de passe prédéfini, l'effacement des données FRP. Selon la présente invention, l'entrée du FRP est écrite dans un mode de récupération, et un utilisateur peut effacer les données d'informations personnelles dans une partition FRP en entrant un mot de passe FRP correct dans le mode de récupération.
PCT/CN2017/110164 2017-11-09 2017-11-09 Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données WO2019090586A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780096648.5A CN111316277A (zh) 2017-11-09 2017-11-09 一种移动终端及用于数据擦除的计算机可读存储介质
PCT/CN2017/110164 WO2019090586A1 (fr) 2017-11-09 2017-11-09 Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/110164 WO2019090586A1 (fr) 2017-11-09 2017-11-09 Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données

Publications (1)

Publication Number Publication Date
WO2019090586A1 true WO2019090586A1 (fr) 2019-05-16

Family

ID=66437523

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/110164 WO2019090586A1 (fr) 2017-11-09 2017-11-09 Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données

Country Status (2)

Country Link
CN (1) CN111316277A (fr)
WO (1) WO2019090586A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220229898A1 (en) * 2020-07-14 2022-07-21 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348979A (zh) * 2014-11-13 2015-02-11 深圳市中兴移动通信有限公司 移动终端及其短信在加密模式下的显示方法和装置
CN104539811A (zh) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 终端的防盗方法和移动终端
CN104615951A (zh) * 2015-02-13 2015-05-13 联想(北京)有限公司 一种信息处理方法及移动终端
US20160342389A1 (en) * 2013-12-04 2016-11-24 Google Inc. User interface customization based on speaker characterics
CN106778359A (zh) * 2015-11-20 2017-05-31 宏碁股份有限公司 重置出厂保护的解除方法及其电子装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8260747B2 (en) * 2009-02-05 2012-09-04 Netapp, Inc. System, method, and computer program product for allowing access to backup data
US8892072B2 (en) * 2011-09-23 2014-11-18 Lg Electronics Inc. Mobile terminal and method of providing security thereto
CN102883026B (zh) * 2012-09-07 2015-12-02 广东欧珀移动通信有限公司 一种移动终端实现开机保护的方法
US9100769B2 (en) * 2013-02-08 2015-08-04 Sprint Communications Company L.P. System and method of storing service brand packages on a mobile device
CN105224423A (zh) * 2015-10-26 2016-01-06 Tcl海外电子(惠州)有限公司 终端数据备份方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160342389A1 (en) * 2013-12-04 2016-11-24 Google Inc. User interface customization based on speaker characterics
CN104348979A (zh) * 2014-11-13 2015-02-11 深圳市中兴移动通信有限公司 移动终端及其短信在加密模式下的显示方法和装置
CN104539811A (zh) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 终端的防盗方法和移动终端
CN104615951A (zh) * 2015-02-13 2015-05-13 联想(北京)有限公司 一种信息处理方法及移动终端
CN106778359A (zh) * 2015-11-20 2017-05-31 宏碁股份有限公司 重置出厂保护的解除方法及其电子装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220229898A1 (en) * 2020-07-14 2022-07-21 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)
US11748470B2 (en) * 2020-07-14 2023-09-05 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)

Also Published As

Publication number Publication date
CN111316277A (zh) 2020-06-19

Similar Documents

Publication Publication Date Title
US9292680B2 (en) Mobile terminal detection method and mobile terminal
JP5889933B2 (ja) コンピュータの動作不良を防止する方法、コンピュータ・プログラムおよびコンピュータ
US20070061561A1 (en) OS starting method and apparatus using the same
US20150378846A1 (en) Method, computer program, and computer for restoring set of variables
JP2004151785A (ja) 着脱式デバイス及びプログラムの起動方法
JP4929804B2 (ja) 認証方法、認証装置および認証プログラム
US20160004648A1 (en) Data erasing apparatus, data erasing method, and computer-readable storage medium
CN105637521B (zh) 一种数据处理方法及智能终端
TW200305807A (en) Basic input/output system (BIOS) shadowed small-print hard disk drive as robust, always on, backup for hard disk image & software failure
US8549312B2 (en) Mobile terminal and method for protecting its system data
US7418542B2 (en) Rewritable, nonvolatile memory, electronic device, method of rewriting rewritable, nonvolatile memory, and storage medium having stored thereon rewrite program
WO2019090586A1 (fr) Terminal mobile, système et support de stockage lisible par ordinateur pour l'effacement de données
CN109871334B (zh) 电缆调制解调器及操作方法
Gómez-Miralles et al. Versatile iPad forensic acquisition using the apple camera connection kit
JP4653497B2 (ja) 携帯記憶装置
JP2010152750A (ja) 端末装置
Gómez-Miralles et al. Universal, fast method for iPad forensics imaging via USB adapter
JP2010176490A (ja) Usbストレージデバイス、ホストコンピュータ、usbストレージシステム、およびプログラム
CN108319848B (zh) 开机控制方法和装置
CN105488436A (zh) 一种移动存储设备访问方法和装置
JP2018139025A (ja) データ消去方法、データ消去プログラム、データ消去プログラムを備えたコンピュータおよびデータ消去管理サーバ
CN110659477A (zh) 安卓设备的防刷机保护方法、系统及安卓设备和存储介质
US20240152469A1 (en) Self-Detecting and Data Rewriting System and Application Method Thereof
JP6049042B2 (ja) 記憶部およびシンクライアントシステム
JP6860800B1 (ja) 情報処理装置、情報処理システム、および、プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17931681

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17931681

Country of ref document: EP

Kind code of ref document: A1