CN106776908A - Data clearing method, device and terminal - Google Patents
Data clearing method, device and terminal Download PDFInfo
- Publication number
- CN106776908A CN106776908A CN201611083858.4A CN201611083858A CN106776908A CN 106776908 A CN106776908 A CN 106776908A CN 201611083858 A CN201611083858 A CN 201611083858A CN 106776908 A CN106776908 A CN 106776908A
- Authority
- CN
- China
- Prior art keywords
- data
- target data
- memory space
- depth
- write
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1737—Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data clearing method, device and terminal.The data clearing method includes:The present invention is deleted by the target data in memory space; as the system reboots; depth is entered by identification data secure ID and clears up pattern; the operation repeatedly of write-in and the removing of data is carried out to the memory space of delete target data; cleared up with the depth for realizing the target data; to prevent recovery software from being reduced to deleted data, the private data of user is protected.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of data clearing method, device and terminal.
Background technology
With the fast development of mobile terminal technology, the frequency that user changes mobile terminal is more and more faster.When user changes
During new mobile terminal, the privacy of user data closely bound up with the life and work of user are also preserved in old mobile terminal,
The such as private data such as photo, vital document, contact person.When old mobile terminal is turned to increase other people or sell by user, it is
Not revealing the privacy of individual is needed to clear up the private data, but current private data commonly deleted
Or after formatting, can be by recovering what software was reduced, there is the hidden danger that private data is easily stolen by others.
Therefore, need to further improve.
The content of the invention
The present invention provides a kind of data clearing method, device and terminal, can lift the security of private data.
The embodiment of the present invention provides a kind of data clearing method, and methods described includes:
Target data in memory space is deleted;
As the system reboots, depth is entered by identification data secure ID and clears up pattern;
The operation repeatedly of write-in and the removing of data is carried out to the memory space of delete target data, to realize
State the depth cleaning of target data.
The embodiment of the present invention also provides a kind of data scrubbing device, and described device includes:
Data removing module, for deleting the target data in memory space;
Identification module, for as the system reboots, entering depth by identification data secure ID and clearing up pattern;
Depth cleaning modul, the write-in and removing of data are carried out for the memory space to delete target data
Operate repeatedly, cleared up with the depth for realizing the target data.
The embodiment of the present invention also provides a kind of terminal, including:Memory and processor, the processor and the memory
Coupling, wherein, the processor calls the executable program code stored in the memory, performs any reality of the invention
Apply the data clearing method described in example.
The present invention is deleted by the target data in memory space, as the system reboots, is pacified by identification data
Full mark enters depth and clears up pattern, the memory space of delete target data is carried out data write-in and removing it is anti-
Multiple operation, is cleared up with the depth for realizing the target data, to prevent recovery software from being reduced to deleted data, is protected
The private data of user.
Brief description of the drawings
Below in conjunction with the accompanying drawings, described in detail by specific embodiment of the invention, technical scheme will be made
And other beneficial effects are apparent.
Fig. 1 is a kind of schematic flow sheet of data clearing method provided in an embodiment of the present invention.
Fig. 2 is a kind of use state figure of data clearing method provided in an embodiment of the present invention.
Fig. 3 is a kind of another schematic flow sheet of data clearing method provided in an embodiment of the present invention.
Fig. 4 is a kind of another schematic flow sheet of data clearing method provided in an embodiment of the present invention.
Fig. 5 is a kind of structural representation of data scrubbing device provided in an embodiment of the present invention.
Fig. 6 is a kind of structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described.It is understood that specific embodiment described herein is only used for explaining the present invention, rather than to limit of the invention
It is fixed.It also should be noted that, for the ease of description, illustrate only part related to the present invention in accompanying drawing and not all knot
Structure.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
Every other embodiment, belongs to the scope of protection of the invention.
Term " first ", " second " and " the 3rd " in the present invention etc. is for distinguishing different objects, rather than for retouching
State particular order.Additionally, term " comprising " and " having " and their any deformations, it is intended that covering is non-exclusive to be included.
For example contain series of steps or unit process, method, system, product or equipment be not limited to the step of having listed or
Unit, but alternatively also include the step of not listing or unit, or alternatively also include for these processes, method, product
Product or other intrinsic steps of equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can be wrapped in conjunction with the embodiments
Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
A kind of executive agent of data clearing method provided in an embodiment of the present invention, can be provided in an embodiment of the present invention
A kind of data scrubbing device, or it is integrated with mobile terminal (for example desktop computer, notebook, the palm of the data scrubbing device
Upper computer, panel computer, smart mobile phone, mobile hard disk etc.), the data scrubbing device can be using hardware or the side of software
Formula is realized.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow sheet of data clearing method provided in an embodiment of the present invention.The side
Method includes:
Step S101, deletes the target data in memory space.
It is understood that having the memory space for storing terminal data, described memory space in mobile terminal
Can be magnetic disc, CD, read-only storage (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), safe digital card (Secure Digital Memory Card/SD card) etc..The memory space
The terminal data of middle storage includes system data and nonsystematic data.Wherein, the system data is that mobile terminal is installing system
Produced system file during system, the normal operation for maintaining mobile terminal;The nonsystematic data are being used including user
The privacy numbers such as the photo, video, vital document, contact person, the user profile of login client that are produced during mobile terminal
According to.
It is empty to storage when user needs to carry out factory reset, or when being input into the operational order of delete target data
Between in the nonsystematic data as target data deleted.Such as delete the photo and video in memory space.
By taking hard disk as an example, when a certain target data is saved in hard disk, the data message of target data is protected first
The catalogue memory block in hard disk is stored to, the data message can include data name, size of data, date created, modification day
Phase etc., while select an idle storage location to be preserved the target data in the data storage area of the hard disk, then
The storage location is preserved into catalogue memory block.When the operational order for deleting the target data is received, catalogue is stored
Data message in area is deleted, and can not now find the target data in an operating system, but data storage area
The target data under middle respective memory locations is also present, be only intended to store this delete target data storage location mark
It is writable new data.
Step S102, as the system reboots, enters depth and clears up pattern by identification data secure ID.
It is understood that a data safety can further be set for the data that deletion action is produced in systems
Mark, the data safety is identified for triggering depth cleaning pattern.As the system reboots, by a clothes on mobile terminal backstage
Business is started, the service will include data safety mark selection interface be pushed to system reboot interface for
Family select, when mobile terminal identify user have selected the data safety identify when, system enter depth clear up pattern;Work as movement
When terminal recognition goes out the non-selected data safety of user and identifies, system enters normal replay phase.
Fig. 2 is referred to, Fig. 2 is a kind of use state figure of data clearing method provided in an embodiment of the present invention.Work as system
When restarting, a service on mobile terminal backstage is started, the mobile terminal shown in interface is restarted " ignoring " with
And the select button of " the depth cleaning " identified as data safety, when mobile terminal identifies that user selects the data safety mark
When knowing " depth cleaning ", system enters depth and clears up pattern;It is when mobile terminal identifies that user selects " ignoring " or non-selected
The data safety identifies " depth cleaning ", and countdown in " ignoring " select button from become 0 second within 10 seconds when, system entrance is just
Normal replay phase.
Step S103, the behaviour repeatedly that write-in and the removing of data are carried out to the memory space of delete target data
Make, cleared up with the depth for realizing the target data.
By taking hard disk as an example, the storage location to the target data in the data storage area of delete target data is repeated
The operation of write-in and the removing of data, to cover storage vestige of the target data in the storage location, to realize the target
The depth cleaning of data, prevents other people from recovering to deleted target data.
Such as, the amount of storage of the memory space of delete target data is 30M (million), for example, write the data A of 30M
In entering the memory space, after the data A all the write-in memory spaces, then by the data A from the storage
All removed in space, the data A is write into the memory space afterwards, and be purged after completion is write, by number
Write according to A remove again repeatedly operate repeatedly, to cover storage vestige of the target data in the memory space, with reality
The depth cleaning of the existing target data.
The present embodiment is deleted by the target data in memory space, as the system reboots, by identification data
Secure ID enters depth and clears up pattern, and the write-in and removing of data are carried out to the memory space of delete target data
Operate repeatedly, cleared up with the depth for realizing the target data.The data safety selected by the key of identifying user one is identified and entered
Depth clears up pattern, and the private data of automatic protection user, to prevent other people from being reduced to deleted data, improves data
The security of protection.
In some implementation methods, the step S103 can also be realized by step S1031 to S1033, specially:
Step S1031, the memory space to delete target data carries out the write operation of random data.
It is understood that by random data write-in in the memory space of delete target data, to the storage
The target data of original storage is covered or filled in space.Write operation is carried out using random data, is in order that writing
The irregular complexity sought, increase data recovery that may be present of vestige for entering.
Step S1032, when the random data amount of storage of memory space write-in reaches default storage threshold value, enters line number
According to clear operation.
It is understood that the default storage threshold value could be arranged to the storage maximum of the memory space.Work as institute
When the random data amount of storage for stating memory space write-in reaches the storage maximum of the memory space, data dump behaviour is carried out
Make.
Step S1033, write-in and when number of operations reaches preset times repeatedly of removing when the random data, empties
The memory space, is cleared up with the depth for realizing the target data.
For example, the preset times are not less than 10 times.Such as preset times be 10 times, when the random data write-in and
The number of operations repeatedly removed is when reaching 10 times, and emptying may residual after last time data dump in the memory space
Fragmentation of data, with realize the target data depth clear up.
The present embodiment is deleted by the target data in memory space, as the system reboots, by identification data
Secure ID enters depth and clears up pattern, and the write-in of random data and clear is carried out to the memory space of delete target data
The operation repeatedly for removing, when it is described number of operations reaches preset times repeatedly when, the memory space is emptied, to realize the target
The depth cleaning of data, to prevent recovery software from being reduced to deleted data, protects the private data of user.
Fig. 3 is referred to, Fig. 3 is a kind of another schematic flow sheet of data clearing method provided in an embodiment of the present invention.Institute
The method of stating includes:
Step S201, deletes the target data in memory space.
It is empty to storage when user needs to carry out factory reset, or when being input into the operational order of delete target data
Between in target data deleted.Such as delete the photo and video in memory space.
By taking hard disk as an example, when a certain target data is saved in hard disk, the data message of target data is protected first
The catalogue memory block in hard disk is stored to, the data message can include data name, size of data, date created, modification day
Phase etc., while select an idle storage location to be preserved the target data in the data storage area of the hard disk, then
The storage location is preserved into catalogue memory block.When the operational order for deleting the target data is received, catalogue is stored
Data message in area is deleted, and can not now find the target data in an operating system, but data storage area
The target data under middle respective memory locations is also present, be only intended to store this delete target data storage location mark
It is writable new data.
Step S202, as the system reboots, enters depth and clears up pattern by identification data secure ID.
It is understood that a data safety can further be set for the data that deletion action is produced in systems
Mark, the data safety is identified for triggering depth cleaning pattern.As the system reboots, by a clothes on mobile terminal backstage
Business is started, the service will include data safety mark selection interface be pushed to system reboot interface for
Family select, when mobile terminal identify user select the data safety identify when, system enter depth clear up pattern;When mobile whole
When end identifies that the non-selected data safety of user is identified, system enters normal replay phase.
Step S203, the behaviour repeatedly that write-in and the removing of data are carried out to the memory space of delete target data
Make, cleared up with the depth for realizing the target data.
By taking hard disk as an example, the storage location to the target data in the data storage area of delete target data is repeated
The operation of write-in and the removing of data, to cover storage vestige of the target data in the storage location, to realize the target
The depth cleaning of data, prevents other people from recovering to deleted target data.
In some implementation methods, the step S203 can also be realized by step S2031 to S2034, including:
Step S2031, file is set up in the memory space of delete target data.
It is understood that file is set up in the memory space of delete target data, for managing new number
According to.
Step S2032, carries out the write operation of random data in the file.
It is understood that the file that will be set up in random data the write-in memory space of delete target data
It is interior, the target data of original storage in the memory space is covered or filled.
Step S2033, when the random data amount of storage of memory space write-in reaches default storage threshold value, enters line number
According to clear operation.
It is understood that the default storage threshold value could be arranged to the storage maximum of the memory space.Typically
Storage size shared by empty file is 0 byte, then when the random data write in the file in the memory space
When amount of storage reaches the storage maximum of the memory space, data-cleaning operation is carried out.
Step S2034, write-in and when number of operations reaches preset times repeatedly of removing when the random data are deleted
The file in the memory space, is cleared up with the depth for realizing the target data.
For example, the preset times are not less than 10 times.Such as preset times be 10 times, when the random data write-in and
When the number of operations repeatedly removed reaches 10 times, the file in the memory space is deleted, you can empty the file
The fragmentation of data that may be remained after last time data dump in folder, is cleared up with the depth for realizing the target data.
The present embodiment is deleted by the target data in memory space, as the system reboots, by identification data
Secure ID enters depth and clears up pattern, and the file to being set up in the memory space of delete target data is carried out at random
The operation repeatedly of write-in and the removing of data, when it is described number of operations reaches preset times repeatedly when, delete the file, with
The depth cleaning of the target data is realized, to prevent recovery software from being reduced to deleted data, protection user's is hidden
Private data.
Fig. 4 is referred to, Fig. 4 is a kind of another schematic flow sheet of data clearing method provided in an embodiment of the present invention.Institute
The method of stating includes:
Step S301, Type division is carried out by the target data, wherein the type includes general type and privacy class
Type.
It is understood that when the target data is set up, or before target data deletion, by the number of targets
According to Type division is carried out, wherein the type includes general type and privacy type.
Wallpaper photo, scenery photo are set to general type by such as user when the photograph album of mobile terminal is managed, will be with
User-related portrait photographs, video are set to privacy type.
Step S302, deletes the target data in memory space.
For example, when user needs to carry out factory reset, or when being input into the operational order of delete target data, to depositing
Target data in storage space is deleted.Such as delete the photo and video in memory space.
Step S303, when the deleted target data is privacy type, and during system reboot, number is obtained by automatic
Enter depth according to secure ID and clear up pattern.
For example, when the deleted video is privacy type, and during system reboot, by a clothes on mobile terminal backstage
Business is started, and the automatic data safety mark that obtains clears up pattern into depth.
Step S304, the behaviour repeatedly that write-in and the removing of data are carried out to the memory space of delete target data
Make, cleared up with the depth for realizing the target data.
For example, the storage location of the video in the data space for having deleted video is repeated data write-in and
The operation of removing, to cover storage vestige of the video in the storage location, is cleared up with the depth for realizing the target data, is prevented
Only other people recover to deleted target data.
The present embodiment is divided into general type and privacy type by by the target data, to the target in memory space
Data are deleted, and when the deleted target data is privacy type, and during system reboot, are pacified by the automatic data that obtain
Full mark enters depth and clears up pattern, the memory space of delete target data is carried out data write-in and removing it is anti-
Multiple operation, is cleared up with the depth for realizing the target data.Obtained automatically during by offering an explanation the type of target data for privacy type
Access enters depth and clears up pattern according to secure ID, makes data scrubbing more intelligent, to prevent from recovering software to deleted number
According to being reduced, the private data of user is protected.
The embodiment of the present invention also provides a kind of data scrubbing device, as shown in figure 5, Fig. 5 is provided in an embodiment of the present invention
A kind of structural representation of data scrubbing device.The data scrubbing device 40 includes Type division module 41, and data delete mould
Block 42, identification module 43, and depth cleaning modul 44.
The data removing module 42, for deleting the target data in memory space.
It is understood that having the memory space for storing terminal data, described memory space in mobile terminal
Can be magnetic disc, CD, read-only storage (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), safe digital card (Secure Digital Memory Card/SD card) etc..The memory space
The terminal data of middle storage includes system data and nonsystematic data.Wherein, the system data is that mobile terminal is installing system
Produced system file during system, the normal operation for maintaining mobile terminal;The nonsystematic data are being used including user
The privacy numbers such as the photo, video, vital document, contact person, the user profile of login client that are produced during mobile terminal
According to.
When user needs to carry out factory reset, or when being input into the operational order of delete target data, the data
Removing module 42 to memory space in the nonsystematic data as target data delete.Such as described data removing module
42 delete the photo and video in memory space.
By taking hard disk as an example, when a certain target data is saved in hard disk, the data message of target data is protected first
The catalogue memory block in hard disk is stored to, the data message can include data name, size of data, date created, modification day
Phase etc., while select an idle storage location to be preserved the target data in the data storage area of the hard disk, then
The storage location is preserved into catalogue memory block.When the data removing module 42 is deleted the target data, will
Data message in catalogue memory block is deleted, and can not now find the target data in an operating system, but count
Also exist according to the target data under respective memory locations in memory block, be only intended to store the storage of the delete target data
Position mark is writable new data.
The identification module 43, for as the system reboots, entering depth by identification data secure ID and clearing up pattern.
It is understood that a data safety can further be set for the data that deletion action is produced in systems
Mark, the data safety is identified for triggering depth cleaning pattern.As the system reboots, the identification module 43 will be mobile whole
Hold a service on backstage to be started, and the selection interface of the data safety mark will be included and be pushed to system reboot circle
Face for user select, when the identification module 43 identify user select the data safety identify when, system enter depth it is clear
Reason pattern;When the identification module 43 is identified the non-selected data safety of user is identified when, system enters normal replay phase.
The depth cleaning modul 44, for the memory space to delete target data carry out data write-in and
The operation repeatedly removed, is cleared up with the depth for realizing the target data.
By taking hard disk as an example, the target data in the data storage area of delete target data of the depth cleaning modul 44 pairs
Storage location be repeated data write-in and removing operation, to cover storage trace of the target data in the storage location
Mark, is cleared up with the depth for realizing the target data, prevents other people from recovering to deleted target data.
In some implementation methods, the depth cleaning modul 44, also including writing unit 442, clearing cell 443 and deep
Degree cleaning unit 444.
Said write unit 442, the write-in of random data is carried out for the memory space to delete target data
Operation.
It is understood that the storage that random data is write delete target data by said write unit 442 is empty
Between in, the target data of original storage in the memory space was covered or filled.Write using random data
Operation, is in order that the vestige of write-in is irregular seeks, to increase the complexity of data recovery that may be present.
The clearing cell 443, for reaching default storage threshold when the random data amount of storage that the memory space writes
During value, data-cleaning operation is carried out.
It is understood that the default storage threshold value could be arranged to the storage maximum of the memory space.Work as institute
When the random data amount of storage for stating memory space write-in reaches the storage maximum of the memory space, the clearing cell 443
Carry out data-cleaning operation.
The depth clears up unit 444, and the number of operations repeatedly for the write-in when the random data and removing reaches
During preset times, the memory space is emptied, cleared up with the depth for realizing the target data.
For example, the preset times are not less than 10 times.Such as preset times be 10 times, when the random data write-in and
The number of operations repeatedly removed is when reaching 10 times, and the depth cleaning unit 444 is emptied in the memory space in last time
The fragmentation of data that may be remained after data dump, is cleared up with the depth for realizing the target data.
In some implementation methods, the depth cleaning modul 44, also including setting up unit 441.
It is described to set up unit 441, for setting up file in the memory space of delete target data.
It is understood that the unit 441 of setting up sets up file in the memory space of delete target data
Folder, for managing new data.
Said write unit 442, is additionally operable to be carried out in the file write operation of random data.
It is understood that the storage that random data is write delete target data by said write unit 442 is empty
Between middle foundation file in, the target data of original storage in the memory space was covered or filled.
The depth clears up unit 444, is additionally operable to be reached when the number of operations repeatedly of write-in and the removing of the random data
During to preset times, the file in the memory space is deleted, cleared up with the depth for realizing the target data.
For example, the preset times are not less than 10 times.Such as preset times be 10 times, when the random data write-in and
When the number of operations repeatedly removed reaches 10 times, the depth cleaning unit 444 deletes the file in the memory space
Folder, you can the fragmentation of data that may be remained after last time data dump in the file is emptied, to realize the mesh
Mark the depth cleaning of data.
In some implementation methods, the Type division module 41, for the target data to be carried out into Type division, wherein
The type includes general type and privacy type.
It is understood that when the target data is set up, or before target data deletion, the Type division
The target data is carried out Type division by module 41, wherein the type includes general type and privacy type.
In some implementation methods, the identification module 43 is additionally operable to when the deleted target data is privacy type,
And during system reboot, identified into depth cleaning pattern by the automatic data safety that obtains.
For example, when the deleted video is privacy type, and during system reboot, the identification module 43 will be mobile whole
A service on backstage is held to be started, and the automatic data safety mark that obtains clears up pattern into depth.
The embodiment of the present invention also provides a kind of terminal, as shown in fig. 6, Fig. 6 is a kind of terminal provided in an embodiment of the present invention
Structural representation.The terminal 500 can include radio frequency (RF, Radio Frequency) circuit 501, include one or one
The memory 502 of individual above computer-readable recording medium, input block 503, display unit 504, sensor 505, audio-frequency electric
Road 506, Wireless Fidelity (WiFi, Wireless Fidelity) module 507, include one or more than one processing core
Processor 508 and the part such as power supply 509.It will be understood by those skilled in the art that the terminal structure shown in Fig. 6 is not
The restriction of structure paired terminal, can include part more more or less than diagram, or combine some parts, or different portions
Part is arranged.
Radio circuit 501 can be used to receive and send messages, or in communication process signal reception and transmission.
Memory 502 can be used to store application program and data.Include and can hold in the application program of the storage of memory 502
Line program code.
Input block 503 can be used to receive numeral, character information or the user's characteristic information (such as fingerprint) of input, and
Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.
Display unit 504 can be used for show by user input information or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Terminal may also include at least one sensor 505, such as optical sensor, motion sensor and other sensors.
Voicefrequency circuit 506 can provide the COBBAIF between user and terminal by loudspeaker, microphone.
Wireless Fidelity (WiFi) module 507 can be used for short range wireless transmission, user can be helped to send and receive e-mail, clear
Look at and webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.
Processor 508 is the control centre of terminal, using various interfaces and the various pieces of the whole terminal of connection, is led to
Cross operation or perform application program of the storage in memory 502, and call data of the storage in memory 502, perform
The various functions and processing data of terminal, so as to carry out integral monitoring to terminal.
Terminal also includes the power supply 509 (such as battery) powered to all parts.
Although not shown in Fig. 6, terminal can also will not be repeated here including camera, bluetooth module etc..
In the present embodiment, the processor 508 in terminal can be according to following instruction, by one or more application
The corresponding executable program code of process of program is loaded into memory 502, and storage is run by processor 508 in storage
Application program in device 502, performs following operation:
Target data in memory space is deleted;
As the system reboots, depth is entered by identification data secure ID and clears up pattern;
The operation repeatedly of write-in and the removing of data is carried out to the memory space of delete target data, to realize
State the depth cleaning of target data.
In some implementation methods, processor 508 is used to carry out data to the memory space of delete target data
Write-in and the operation repeatedly removed, are cleared up with the depth for realizing the target data, including:
The memory space to delete target data carries out the write operation of random data;
When the random data amount of storage of memory space write-in reaches default storage threshold value, data dump behaviour is carried out
Make;
Write-in and when number of operations reaches preset times repeatedly of removing when the random data, empty the storage empty
Between, cleared up with the depth for realizing the target data.
In some implementation methods, processor 508 is used to be carried out in the memory space to delete target data
Before the write operation of random data, also include:
File is set up in the memory space of delete target data;
The memory space to delete target data carries out the write operation of random data, including:Described
The write operation of random data is carried out in file;
The write-in and when number of operations reaches preset times repeatedly of removing when the random data, empties described depositing
Storage space, is cleared up with the depth for realizing the target data, including:When the operation repeatedly of write-in and the removing of the random data
When number of times reaches preset times, the file in the memory space is deleted, it is clear with the depth for realizing the target data
Reason.
In some implementation methods, processor 508 was used for before the target data in memory space is deleted,
Also include:
The target data is carried out into Type division, wherein the type includes general type and privacy type.
In some implementation methods, processor 508 is used to as the system reboots, depth is entered by selecting data safety to identify
Cleaning pattern, including:
When the deleted target data is privacy type, and during system reboot, data safety mark is obtained by automatic
Know and enter depth cleaning pattern.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiment.
In the embodiment of the present invention, the data scrubbing device belongs to same with a kind of data clearing method in foregoing embodiments
One design, can run the either method provided in the data clearing method embodiment on the data scrubbing device, its
The process of implementing refers to the data clearing method embodiment, and here is omitted.
It should be noted that for data clearing method of the present invention, this area common test personnel be appreciated that
All or part of flow of data clearing method described in the embodiment of the present invention is realized, can be by computer program to control phase
The hardware of pass is completed, and the computer program can be stored in a computer read/write memory medium, if storage is in terminal
In memory, and by least one computing device in the terminal, data scrubbing side as described is may include in the process of implementation
The flow of the embodiment of method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (ROM, Read Only
Memory), random access memory (RAM, Random Access Memory) etc..
For the data scrubbing device of the embodiment of the present invention, its each functional module can be integrated in a treatment core
In piece, or modules are individually physically present, it is also possible to which two or more modules are integrated in a module.On
Stating integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The collection
If into module to realize in the form of software function module and as independent production marketing or when using, it is also possible to storage exists
In one computer read/write memory medium, the storage medium is for example read-only storage, disk or CD etc..
A kind of data clearing method, device and the terminal for being provided the embodiment of the present invention above are described in detail,
Specific case used herein is set forth to principle of the invention and implementation method, and the explanation of above example is use
Understand technical scheme and its core concept in help;It will be understood by those within the art that:It still may be used
Modified with to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic;
And these modifications or replacement, do not make the model of the technical scheme of the essence disengaging various embodiments of the present invention of appropriate technical solution
Enclose.
Claims (11)
1. a kind of data clearing method, it is characterised in that methods described includes:
Target data in memory space is deleted;
As the system reboots, depth is entered by identification data secure ID and clears up pattern;
The operation repeatedly of write-in and the removing of data is carried out to the memory space of delete target data, to realize the mesh
Mark the depth cleaning of data.
2. data clearing method according to claim 1, it is characterised in that described to being deposited described in delete target data
Storage space carries out the operation repeatedly of write-in and the removing of data, is cleared up with the depth for realizing the target data, including:
The memory space to delete target data carries out the write operation of random data;
When the random data amount of storage of memory space write-in reaches default storage threshold value, data-cleaning operation is carried out;
Write-in and when number of operations reaches preset times repeatedly of removing when the random data, empty the memory space,
Cleared up with the depth for realizing the target data.
3. data clearing method according to claim 2, it is characterised in that described to described in delete target data
Before memory space carries out the write operation of random data, also include:
File is set up in the memory space of delete target data;
The memory space to delete target data carries out the write operation of random data, including:In the file
The write operation of random data is carried out in folder;
The write-in and when number of operations reaches preset times repeatedly of removing when the random data, empties the storage empty
Between, cleared up with the depth for realizing the target data, including:When the number of operations repeatedly of write-in and the removing of the random data
When reaching preset times, the file in the memory space is deleted, cleared up with the depth for realizing the target data.
4. data clearing method according to claim 1, it is characterised in that in the target data in memory space
Before being deleted, also include:
The target data is carried out into Type division, wherein the type includes general type and privacy type.
5. data clearing method according to claim 4, it is characterised in that it is described as the system reboots, by selecting number
Enter depth according to secure ID and clear up pattern, including:
When the deleted target data is privacy type, and during system reboot, by it is automatic obtain data safety identify into
Enter depth cleaning pattern.
6. a kind of data scrubbing device, it is characterised in that described device includes:
Data removing module, for deleting the target data in memory space;
Identification module, for as the system reboots, entering depth by identification data secure ID and clearing up pattern;
Depth cleaning modul, the write-in and removing for carrying out data for the memory space to delete target data are repeatedly
Operation, is cleared up with the depth for realizing the target data.
7. data scrubbing device according to claim 6, it is characterised in that the depth cleaning modul, including:
Writing unit, the write operation of random data is carried out for the memory space to delete target data;
Clearing cell, for when the random data amount of storage that the memory space writes reaches default storage threshold value, entering line number
According to clear operation;
Depth clears up unit, for the write-in when the random data and when number of operations reaches preset times repeatedly of removing,
The memory space is emptied, is cleared up with the depth for realizing the target data.
8. data scrubbing device according to claim 7, it is characterised in that the depth cleaning modul, also includes:
Unit is set up, for setting up file in the memory space of delete target data;
Said write unit, the write operation for carrying out random data in the file;
The depth clears up unit, and the number of operations repeatedly for the write-in when the random data and removing reaches preset times
When, the file in the memory space is deleted, cleared up with the depth for realizing the target data.
9. data scrubbing device according to claim 6, it is characterised in that described device also includes:
Type division module, for the target data to be carried out into Type division, wherein the type includes general type and hidden
Private type.
10. data scrubbing device according to claim 9, it is characterised in that the identification module, is additionally operable to when the quilt
The target data of deletion is privacy type, and during system reboot, mould is cleared up into depth by the automatic data safety mark that obtains
Formula.
A kind of 11. terminals, it is characterised in that including:Memory and processor, the processor are coupled with the memory, its
In, the processor calls the executable program code stored in the memory, performs as claim 1 to 5 is any
Data clearing method described in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611083858.4A CN106776908B (en) | 2016-11-30 | 2016-11-30 | Data cleaning method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611083858.4A CN106776908B (en) | 2016-11-30 | 2016-11-30 | Data cleaning method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106776908A true CN106776908A (en) | 2017-05-31 |
CN106776908B CN106776908B (en) | 2020-02-14 |
Family
ID=58913684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611083858.4A Active CN106776908B (en) | 2016-11-30 | 2016-11-30 | Data cleaning method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106776908B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109522756A (en) * | 2018-09-27 | 2019-03-26 | 中国科学院信息工程研究所 | A kind of data method for deleting and device |
CN109831575A (en) * | 2018-12-26 | 2019-05-31 | 上海悦易网络信息技术有限公司 | The method for deleting and erasing system of private data in Android mobile phone |
CN109948361A (en) * | 2019-03-06 | 2019-06-28 | 上海悦易网络信息技术有限公司 | Computer private data sweep-out method based on external memorizer |
CN112199042A (en) * | 2020-09-30 | 2021-01-08 | 深圳市汇顶科技股份有限公司 | Storage space management method, device, chip, equipment and storage medium |
CN113138723A (en) * | 2021-05-12 | 2021-07-20 | 湖北央中巨石信息技术有限公司 | Data soft destroying method, system, device and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013119401A1 (en) * | 2012-02-09 | 2013-08-15 | Microsoft Corporation | Security policy for device data |
CN105824839A (en) * | 2015-01-06 | 2016-08-03 | 中兴通讯股份有限公司 | Method and apparatus for safe deletion of data in mobile terminal |
CN105989310A (en) * | 2015-03-03 | 2016-10-05 | 联想(北京)有限公司 | Data destruction method and system |
-
2016
- 2016-11-30 CN CN201611083858.4A patent/CN106776908B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013119401A1 (en) * | 2012-02-09 | 2013-08-15 | Microsoft Corporation | Security policy for device data |
CN105824839A (en) * | 2015-01-06 | 2016-08-03 | 中兴通讯股份有限公司 | Method and apparatus for safe deletion of data in mobile terminal |
CN105989310A (en) * | 2015-03-03 | 2016-10-05 | 联想(北京)有限公司 | Data destruction method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109522756A (en) * | 2018-09-27 | 2019-03-26 | 中国科学院信息工程研究所 | A kind of data method for deleting and device |
CN109831575A (en) * | 2018-12-26 | 2019-05-31 | 上海悦易网络信息技术有限公司 | The method for deleting and erasing system of private data in Android mobile phone |
CN109948361A (en) * | 2019-03-06 | 2019-06-28 | 上海悦易网络信息技术有限公司 | Computer private data sweep-out method based on external memorizer |
CN112199042A (en) * | 2020-09-30 | 2021-01-08 | 深圳市汇顶科技股份有限公司 | Storage space management method, device, chip, equipment and storage medium |
CN112199042B (en) * | 2020-09-30 | 2024-08-02 | 深圳市汇顶科技股份有限公司 | Storage space management method, device, chip, equipment and storage medium |
CN113138723A (en) * | 2021-05-12 | 2021-07-20 | 湖北央中巨石信息技术有限公司 | Data soft destroying method, system, device and medium |
CN113138723B (en) * | 2021-05-12 | 2022-04-19 | 湖北央中巨石信息技术有限公司 | Data soft destroying method, system, device and medium |
Also Published As
Publication number | Publication date |
---|---|
CN106776908B (en) | 2020-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105493054B (en) | It is protected using the rapid data of double file system | |
CN106776908A (en) | Data clearing method, device and terminal | |
US20220322054A1 (en) | Short Message Processing Method and Apparatus, and Electronic Device | |
CN101938568B (en) | Method, system and mobile terminal for positioning information | |
CN105051722B (en) | The method and apparatus of the entity of atom link is kept using the mechanism that is automatically performed | |
CN104375836A (en) | Method and device for showing lock screen window | |
CN105022955B (en) | A kind of locking means and mobile terminal of application program | |
CN107391308A (en) | Data processing method and device, terminal and computer-readable recording medium | |
CN106445292A (en) | Doppelganger management method and system for application program | |
JP2019504566A (en) | Information image display method and apparatus | |
CN105760778A (en) | Method and device for improving security of private picture and electronic equipment | |
CN104572348A (en) | Terminal | |
CN106599115A (en) | Data protection method and device and terminal | |
CN106021027A (en) | Terminal data processing method and system | |
CN105224194A (en) | A kind of data processing method and terminal | |
CN108984339B (en) | Data recovery method and related product | |
CN104615662A (en) | Data processing method and device and terminal device | |
CN109597707A (en) | Clone volume data copying method, device and computer readable storage medium | |
CN106650409B (en) | A kind of terminal control method and terminal | |
CN107704337A (en) | Method, mobile terminal and the device with store function of factory reset | |
CN108762983A (en) | Multi-medium data restoration methods and device | |
CN107368738A (en) | A kind of anti-Root method and devices of smart machine | |
CN108763976B (en) | Information display method based on double screens, mobile terminal and storage medium | |
CN103870378A (en) | Monitoring method for terminal device and terminal device | |
CN104572349A (en) | Data backup method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |