CN108710471A - A kind of data destruction method, device, server and system - Google Patents
A kind of data destruction method, device, server and system Download PDFInfo
- Publication number
- CN108710471A CN108710471A CN201810256355.5A CN201810256355A CN108710471A CN 108710471 A CN108710471 A CN 108710471A CN 201810256355 A CN201810256355 A CN 201810256355A CN 108710471 A CN108710471 A CN 108710471A
- Authority
- CN
- China
- Prior art keywords
- data
- destroyed
- hash
- backup
- covering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of data destruction method, includes the following steps:Delete step:It deletes smart machine terminal and needs the data destroyed;It downloads, covering step:Hash, and the former storage location for the data that the hash covering write-in needs are destroyed are downloaded from network cloud server;And a kind of device with data destroying function, including such as lower part:Trigger module:Function is destroyed for trigger data;Removing module:For deleting the data in specified range;Download module:For downloading hash from network cloud server;Cover writing module:Designated storage location is written in hash for that will download;And corresponding server and system;User is helped to realize that mathematical logic is destroyed, and its is easy to operate, data destroying effect is preferable.
Description
Technical field
The invention belongs to computer data storage and processing technology field, more particularly to computer data network storage, under
Load and local data deletion, soverlay technique field.
Background technology
After smart mobile phone occurs, user can store mass data on mobile phone, wherein being much related to individual privacy.With intelligence
Energy mobile phone is popularized, and after old mobile phone is discarded, many people do not recognize the risk of leaking data so that old mobile phone becomes user
The major hidden danger of information leakage, even if other people appreciate risk, but because without simply and effectively destroying data immediately
Method, old mobile phone can only be collected, cause waste and pollute.
Data destruction method is divided into physical destroying and logic is destroyed, and general data in mobile phone does not need physical destroying, still,
The common method for deleting data in mobile phone and factory reset, there is no thoroughly destroy data.It is of course also possible to pass through data
The method of covering, enhancing logic destroy effect, such operation, be under the risk that user recognizes leaking data, according to
The operation that the understanding of oneself carries out, effect that is cumbersome and cannot be guaranteed data destroying.
In addition, the data for user's storage on intelligent devices, exist sometimes for backup, can directly delete sometimes
Remove, sometimes for destroy, sometimes for deleted again after backup, sometimes for after backup destroy, it is local sometimes for being retained in
Situation.For this case, the present invention propose it is a kind of to smart machine data carry out User Defined Classification Management method and
Equipment, to help user preferably to manage the smart machine data of oneself.
Invention content
The problem of in view of being proposed in background technology, the present invention provide a kind of data destruction method, device, server and are
System helps user to realize that mathematical logic is destroyed, and its is easy to operate, data destroying effect is preferable;One kind is also provided and has data
Backup, the device and system deleted, destroy function.
The technical scheme is that:
A kind of data destruction method, includes the following steps:
5)Delete step:It deletes smart machine terminal and needs the data destroyed;
6)It downloads, covering step:Hash is downloaded from network cloud server, and will be described in hash covering write-in
Need the former storage location for the data destroyed.
The data destruction method further includes 7)Step is deleted again:The hash is deleted again.
The data destruction method, covering step are repeated as many times, and the sequence of write-in hash is when repeating covering step
Variation.
The data destruction method is downloaded, covering step and deletes step again and be repeated as many times, when repeated downloads step under institute
The interior of the hash of load is perhaps sequentially variation.
The data destruction method further includes:1)Default step:The Rule of judgment of the default data for needing to destroy;2)Inspection
Rope step:According to preset Rule of judgment, the data for needing to destroy are determined.
The data destruction method further includes:4)Backup-step:The data destroyed will be needed to be uploaded to network cloud service
Device backs up.
The data destruction method further includes:3)Judgment step:The data destroyed for judging the needs retrieved
To need the data backed up or the data for that need not back up;With 4)Backup-step:If need the data that back up then by needs
The data of backup are uploaded to network high in the clouds server backup, otherwise skip step 4).
The data destruction method is preset in step, and the default Rule of judgment for needing the data destroyed can be made by oneself by user
Justice.
A kind of device with data destroying function, including such as lower part:
Trigger module:Function is destroyed for trigger data;
Removing module:For deleting the data in specified range;
Download module:For downloading hash from network cloud server;
Cover writing module:Designated storage location is written in hash for that will download.
Described device determines specified range, the method for designated storage location, can be that device is default, user is specified or root
It is obtained according to preset condition.
Described device further includes counting module:Number for recording covering write-in, or download, covering are written, again
The number of deletion, when reaching setting number, terminator.
Described device further includes condition memory module:The preset condition destroyed for storing data;And retrieval module:
For needing the data destroyed according to preset condition retrieval.
Described device further includes backup module:For backing up the data for needing to destroy.
Described device further includes network connecting module in backup module, for establishing and the connection of network cloud server,
By data backup to network cloud server.
Described device further includes custom block, allows user's self-defining to need the data area destroyed, and/or permit
Family self-defining allowable needs whether the data destroyed need to back up and need the data area backed up.
Described device further includes that write sequence adjusts module:For the hash to being downloaded from network cloud server
When being repeatedly written former storage location, the sequence of write-in is adjusted.
A kind of server destroyed for smart machine terminal data, is stored thereon with hash, server receives
After the data download instruction that smart machine terminal is sent, the hash of requested size is issued according to download instruction.
The server further includes that data content adjusts module, right when repeating to issue hash to same equipment
The interior of hash is perhaps sequentially adjusted.
The server further includes data backup memory space, the number uploaded for backing up the smart machine terminal
According to.
A kind of network system for data destroying includes smart machine terminal with data destroying function and right
The server destroyed for smart machine terminal data answered.
A kind of device, including:
2)Data backup unit:For by the data backup on device to network cloud server;
3)Data deleting unit:For deleting the data stored on device;
4)Data destroying unit:Data on apparatus for destroying, manner described above;
5)Triggering command execution unit:For triggering the instruction for executing data backup, deletion, destruction.
Described device, including:
1)The self-defined unit of file management:Range for User Defined data backup, deletion, destruction.
Described device, data backup range can be needed by user's specified portions by the self-defined unit of file management
The file extent of backup;Can also be to be judged as in emergency circumstances(Mobile phone loss, mobile phone blank screen), all on back-up device
User data/file.
Described device, data deletion/destruction include that system cache rubbish on deletion/apparatus for destroying, deletion/destruction are made by oneself
Adopted rubbish, backup history file and delete/destroy the backup history file locally stored file;Deletion/the destruction
Self-defined rubbish, history file range be set by the user.
Described device, the mode of instruction execution, including the automatic execution of setting condition is pressed, or manually perform.
Described device, by imposing a condition, automatic execute includes user's transmission cipher instruction, and it is close that device by network receives this
After code instruction, the instruction of data backup, deletion, destruction is executed automatically.
Described device can also use a hiding button triggering command to execute, for example, the primary execution data of pressing are standby
Part, data are executed twice and are deleted, and execute data destroying three times.
A kind of system, including foregoing device and server;
User account information is stored on the server, user can be by its other than the device of Backup Data to server
His device downloads the data backed up thereon by the user account information login service device.
The invention has the advantages that by the connection of smart machine terminal and network cloud server, to smart machine
After needing the data destroyed to be deleted in terminal, is downloaded from network high in the clouds and delete an equal amount of hash of data, covered
It is placed on former data storage location, by the way that hash is written to the storage location repeatedly, reaches and more thoroughly destroys number of users
According to effect, after user abandons the smart machine terminal, other people can not by data restore the methods of obtain user information, from
And ensure the information security of mobile phone or other smart machine terminals;The present invention also provides a kind of with data backup, data simultaneously
It deletes, the device and system of the function of data destroying, the system scheme of a smart machine terminal data management is provided.
Description of the drawings
Fig. 1 is the data destroying execution flow chart of specific embodiment 1;
Fig. 2 is the data destroying system schematic of specific embodiment 1;
Fig. 3 is the server and Intelligent terminal data Shredding Process figure of specific embodiment 1;
Fig. 4 is the main interface schematic diagram of specific embodiment 2;
Fig. 5 is " executing all instructions by setting " interface schematic diagram of specific embodiment 2;
Fig. 6 is " backup " interface schematic diagram of specific embodiment 2;
Fig. 7 is " deletion " interface schematic diagram of specific embodiment 2;
Fig. 8 is " file management is self-defined " interface schematic diagram of specific embodiment 2;
Fig. 9 is the system schematic of specific embodiment 3.
Specific implementation mode
Description of specific embodiments of the present invention by taking mobile phone as an example below, but the present invention is suitable for all and mobile phone
Same or analogous intelligent terminal, such as tablet computer, laptop, desktop computer, vehicle intelligent terminal, in realization side
When formula no significant difference, each equipment is not carried out to separate discussion.
As shown in Fig. 2, data destroying system is built first, and the system is mainly by mobile phone(1)With network cloud server
(2)It constitutes, in mobile phone(1)Upper storage data destroying program, the program is by setting condition automatic trigger or passes through user's operation
Triggering.
Example 1.1:The example of setting condition automatic trigger can refer to the mode of document CN200810301928, in mobile phone
Preset data destroys instruction password, and when mobile phone receives the short message comprising the instruction password, automatic log-on data destroys program, with
Solve the information leakage problem after mobile phone is lost.
Example 1.2:The example of setting condition automatic trigger further includes being appointed as needing the number of planned disposal to specific file
According to after reaching the condition of planned disposal, data destroying being carried out automatically, to solve the information security issue of vital document.
Example 1.3:The example of user's operation triggering, including by a cell phone application, user enters data destroying journey after clicking
Sequence interface, user destroy program by program interface, trigger data.
Example 1.4:The example of user's operation triggering further includes as shown in Fig. 2, by the way that a built-in key is arranged
(101), user is by pressing the button, log-on data destruction program.
Example 1.5:The example of user's operation triggering, further includes mobile phone after select file(1)In boundary that file is operated
Face selection destroys click right mouse button in button or computer and selects to destroy option in right-click menu, is carried out to file with equipment
The operation of deletion is similar.
After trigger data destroys program in any way, mobile phone(1)It is middle to execute flow as shown in Figure 1, the automatic root of program
Mobile phone is retrieved according to preset condition(1)In this need the data destroyed.
Preset condition includes:
Example 2.1:User is if you need to destroy mobile phone(1)Middle whole data then need to only set the triggering shape for needing to destroy total data
Formula;After the short message triggering mode triggering in example 1.1, then program is by mobile phone(1)In all data markers be number to be destroyed
According to;The for another example triggering mode of example 1.3, the button of setting destruction total data in the interfaces APP;The for another example triggering of example 1.4
Mode then destroys total data by button.
Example 2.2:User is as need to be only destroyed the partial data in mobile phone, then by presetting the default data for needing to destroy of step
Range;Such as the auto-destruct file in example 1.2, user can be to the SMS conduct of vital document such as assigned number transmission
The object of planned disposal, there are the SMSs that the assigned number is sent in setting such as equipment, then are executed in 24 hours automatic
Program is destroyed, or auto-destruct program etc. is executed after user reads, user can set destruction condition;For another example example 1.3
In, user can need the file extent destroyed, the same destruction realized to part specified file by the APP interface settings.
Example 2.3:Method of the user as described in by example 1.5 destroys specified file, and operation is then deleted with existing
Except the operating method of file is similar, the step of without default and retrieval file.
After retrieving the data that this need to be destroyed, program can judge whether data need to back up according to preset condition, if
It is, then by data backup to network cloud server(2), if it is not, the step of then directly skipping backup.
Example 3.1:Backup Data can be backed up to total data, in example 2.1, to mobile phone(1)In data into
It, can be to whole mobile phone data backups to network cloud server before marketing is ruined(2), user can by new cell-phone use account
The modes logging in network cloud server such as password downloads the data of backup to the method for new cell-phone, avoids user's original mobile phone(1)It loses
Loss of data after losing, abandon or damaging.
Example 3.2:Backup Data can be that the data destroyed to needs back up;In example 2.2, user is to needing to destroy
File be set as backup after destroy again, then program execute when data are backed up;For another example in example 2.3, it can be selected in user
After destroying data, continue the option whether pop-up is backed up, data is backed up according to user's selection or without backup.
Example 3.3:Backup Data can also be to carry out incremental backup, part according to preset condition to the data destroyed of needs
It is not backed up;It, can be in mobile phone in example 2.1(1)In preset and need the file that backs up, after log-on data destroys program, pair set
It is set to the file for needing to back up and uploads network cloud server(2)It is destroyed again after being backed up, alternative document is directly destroyed;For another example
When the method for use example 1.3 specifies destruction file extent in example 2.2, while the condition of specified backup file, to qualified
File backup, other are not backed up.
Example 3.4:It should be noted that Backup Data is not required to backup to network cloud server(2), user can also
Other backup paths are specified, such as by file backup to movable storage device, certain backup network cloud server(2)Typically more
Efficiently select.
After the completion of needing the file backup backed up, the step of program will execute Delete Local File, to the file of deletion
Size is calculated, from network cloud server(2)Download hash identical with file size is deleted, the hash
Can be video file, audio file, document files etc.(Such as film, music, mess code document), data are from network cloud server
(2)After upper download, it is covered in mobile phone(1)The former storage location of upper deleted data, then deletes overlay file, in order to enhance again
Data destroying effect, covering step and delete again step repeat n times.
Example 4.1:The data destruction method can be from network cloud server(2)Upper download and the data deleted
After the data of same size, former storage location is covered, by the combination of video file, audio file, document files, original is stored
It writes completely, to prevent deleted data to be resumed position.
Example 4.2:The data destruction method can be deleted the data of covering write-in again, after covering is written to obtain
Obtain the mobile phone space of blank.
Example 4.3:The data destruction method re-downloads new covering text after deleting the data of covering write-in again
Part, video file included in overlay file, audio file, the content of document files, size, put in order change, will under
It carries step, covering step, delete step repetition n times again.
Example 4.4:The data destruction method, after deleting the data of covering write-in again, to the covering text downloaded before
Part adjusts video file wherein included, audio file, document files and puts in order, then re-writes former storage location,
N times are repeated, thoroughly to destroy the trace of original document.
A specific embodiment 1 in conjunction with attached drawing 1 ~ 3 is:
Mobile phone(1)Producer provides network cloud server(2), in mobile phone(1)Interior setting data destroying program, the data destroying
Program is by pressing mobile phone(1)The built-in key of side(101)Triggering, built-in key(101)It is inserted by using needle-like object
Enter harboring holes to press, after data destroying program is triggered, mobile phone(1)(Intelligent terminal in attached drawing 3), with network cloud server
(2)(Server in attached drawing 3)Establish connection, network cloud server(2)Check the mobile phone in server(2)On whether have storage
Account, not then according to mobile phone(1)Telephone number be that user establishes an account, password is initial password and user is allowed to step on
Record modification, at the same time, by mobile phone(1)On data be divided into the data not being backed up and data that needs back up, such as by mobile phone
In garbage files be judged as not being backed up, by the cell phone address book of user, short message, photo, chat record, network account etc.
It is judged as needing to back up, the data that need not be backed up directly is deleted, the data backed up to needs uploads to network cloud service
Device(2)On corresponding account space backed up, after the completion of backup, from network cloud server(2)On transfer overlay file, adjust
It can be that mobile phone is directly obtained on mobile phone to take the judgement of overlay file size(1)User's maximum free memory(That is hand
Memory space all in addition to system on machine), the size of deleted file or the size of backup file, overlay file is issued
To mobile phone(1), mobile phone(1)After receiving overlay file, overlay file is written and is deleted data(Or the number deleted again after backup
According to)Former storage location, after the capped write-in of the former storage location for ensuring significant data, if there is more data that can be write
In the memory space for entering other writable data, preferred method is to download and the covering of deleted data same size text
The former storage location of the deleted data of part write-in realizes covering, after the completion of covering, then deletes overlay file, then repeated downloads
New overlay file re-writes former storage location, to accelerate to destroy speed, can also write the overlay file transformation that original is downloaded
Enter and be sequentially written in former storage location, if user need to destroy the data of memory space A ~ F, then downloads from a server film a, music
Film a, is written the memory space of A ~ C, the memory space of music b write-ins D ~ E by b, mess code document c respectively, and document c write-ins F is deposited
Space is stored up film a is moved to empty storage space G ~ I, music b is moved to A ~ B, document c is moved to after covering is primary
C, then film a is moved to D ~ F, file a, b, c are finally deleted in repeated multiple times covering, can then terminate flow later, complete data
It destroys.
The comprising modules of the device of the invention, the composition form of server are corresponding with the explanation of specific embodiment as above,
Not reinflated discussion.
4 ~ 8, attached drawing illustrates another specific embodiment 2 of the present invention:
The program being arranged on mobile phone contains data backup, data are deleted, data destroying(Hereinafter referred to as data processing)Three
The range of the function of dividing, the corresponding management data of three parts function can realize User Defined by interface.
In program main interface(Attached drawing 4), it is respectively arranged with " file management is self-defined ", " executes and all refers to by setting
Enable ", " backup ", " deletion ", " destruction " five touchscreen buttons, click on corresponding button enter corresponding operation interface.
It clicks " file management is self-defined " button and enters attached interface shown in Fig. 8, on the surface, user can set certainly
The dynamic execution condition for executing data processing and the range for executing file execute data processing for example, can set, hold automatically automatically
Capable condition is to execute within every 15 days primary, and corresponding file extent is set as shown in the figure, and the "+" number circle for clicking front can be with
Increase file extent, such as, show that it includes generation, user in 15 days before 3 months to need the file extent deleted in figure
The short message that the not used phone number for being marked as harassing call is sent(Such as promotional advertising short message, some express delivery numbers
It is labeled), the "+" number by clicking front can increase that generating before 3 months, user is not used micro- from certain in 15 days
The chat picture of letter group is the data for needing to delete, and after the completion of user's setting, is executed automatically once to mobile phone every 15 days mobile phones
The retrieval of middle storage receipt, the data for meeting the above preset condition will directly be deleted by program;Certainly user hand can also be set as
Dynamic to execute, i.e., user selects respective operations to execute data processing by opening the program.
" press setting and execute all instructions " button is clicked, into interface as shown in Figure 5, the range of execution is practical to include:It is right
File backed up, deleted file, being destroyed to file, to being deleted after file backup, to being destroyed after file backup
Five kinds of operations, each operation have corresponding button, can check the range of data processing by clicking button, click executive button,
It then presses execution condition set by user stored in mobile phone and executes data processing, execution condition set by user is attached drawing
It is set shown in 8.
" backup " button is clicked, interface as shown in Figure 6 occurs, display needs the range of the file backed up, user may be selected
Only back up a part of file, also can full backup, then click lower section " backup " button, so that it may with the file backup that will be chosen
To network cloud server.
" deletion " button is clicked, the interface of appearance is as shown in fig. 7, shown caching rubbish is that running software generates in system
Rubbish is cached, user's setting is not needed and directly deletes, shown self-defined rubbish is the user-defined text that can directly delete
Part(I.e. as shown in Fig. 8), shown history file is the user-defined file for needing to delete again after backing up;" destruction " boundary
Face and " deletion " interface are similar, no longer describe.
By software as described above and its several interfaces, user can put open program and enter main interface, then manage
The data in mobile phone for managing oneself meets the increasingly various data management demand of user.
Attached embodiment shown in Fig. 93 is the example how used the data backuped on network cloud server, user
(4)It is of course possible to use former mobile phone(1)It is directly logged onto network cloud server(2)The upper data for obtaining oneself backup, in addition
Other mobile phones can also be passed through(3)Or the network high in the clouds account of other smart machine login users obtains related data, log in and
Obtain data method referring to I patent application CN2017114950516, CN2017114950520,
In addition several method described in CN2017114950732 can also use built-in key(101)Realize that convenient data are standby
Part is deleted and is destroyed, such as built-in key of pressing(101)Mobile phone(1)Back up data to network cloud server
(2), press twice, mobile phone(1)By setting backup partial data and data are deleted, pressing three times, executes the operation for destroying data.
Claims (10)
1. a kind of data destruction method, includes the following steps:
5)Delete step:It deletes smart machine terminal and needs the data destroyed;
6)It downloads, covering step:Hash is downloaded from network high in the clouds, and hash covering write-in described is needed into pin
The former storage location for the data ruined.
2. data destruction method according to claim 1 further includes 7)Step is deleted again:The hash is deleted again.
3. data destruction method according to claim 1 or claim 2, covering step are repeated as many times, repeat that nothing is written when covering step
It is variation with the sequence of data.
4. data destruction method according to claim 2, downloads, covering step and deletes step again and be repeated as many times, under repeating
It is perhaps sequentially variation to carry the interior of the hash downloaded when step.
5. data destruction method according to claim 1 further includes:1)Default step:It is default to need sentencing for the data destroyed
Broken strip part;2)Searching step:According to preset Rule of judgment, the data for needing to destroy are determined.
6. data destruction method according to claim 1 further includes:4)Backup-step:The data destroyed will be needed to be uploaded to
It backs up in network high in the clouds.
7. according to the data destruction method of claim 1 or 5, further include:3)Judgment step:For judging described retrieve
It is the data for needing to back up or the data for that need not back up to need the data destroyed;With 4)Backup-step:If needing to back up
Data then the data that back up will be needed to be uploaded to the backup of network high in the clouds, otherwise skip step 4).
8. a kind of device with data destroying function, including such as lower part:
Trigger module:Function is destroyed for trigger data;
Removing module:For deleting the data in specified range;
Download module:For downloading hash from network cloud server;
Cover writing module:Designated storage location is written in hash for that will download.
9. device according to claim 8 determines specified range, the method for designated storage location, it can be that device is default, use
Family is specified or is obtained according to preset condition.
10. device according to claim 8 further includes, counting module:Number for recording covering write-in, or download,
The number that covering is written, deletes again, when reaching setting number, terminator.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810256355.5A CN108710471A (en) | 2018-03-27 | 2018-03-27 | A kind of data destruction method, device, server and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810256355.5A CN108710471A (en) | 2018-03-27 | 2018-03-27 | A kind of data destruction method, device, server and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108710471A true CN108710471A (en) | 2018-10-26 |
Family
ID=63866213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810256355.5A Pending CN108710471A (en) | 2018-03-27 | 2018-03-27 | A kind of data destruction method, device, server and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108710471A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291390A (en) * | 2020-01-20 | 2020-06-16 | 中国人民解放军海军工程大学 | Key data safe destruction trigger system and trigger method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101815128A (en) * | 2010-04-22 | 2010-08-25 | 中兴通讯股份有限公司 | Method and device for destroying terminal data |
CN102905009A (en) * | 2011-07-28 | 2013-01-30 | 北京邮电大学 | Mobile terminal information protection method and system |
CN103164656A (en) * | 2012-06-01 | 2013-06-19 | 北京安天电子设备有限公司 | Method and system for erasing hidden file based on visible file |
CN104035891A (en) * | 2014-06-26 | 2014-09-10 | 福州大学 | Android mobile terminal data security protection system |
CN106548093A (en) * | 2015-09-18 | 2017-03-29 | 四川效率源信息安全技术股份有限公司 | The method for deleting of confidential data in FAT32 file system |
CN106598487A (en) * | 2016-11-21 | 2017-04-26 | 深圳市中博睿存科技有限公司 | Data destruction method and device |
CN106844104A (en) * | 2017-01-25 | 2017-06-13 | 北京奇虎科技有限公司 | A kind of terminal data processing method, device and mobile terminal |
US20170288859A1 (en) * | 2016-01-13 | 2017-10-05 | ZenmuTech, Inc | Computer programs, secret management methods and systems |
-
2018
- 2018-03-27 CN CN201810256355.5A patent/CN108710471A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101815128A (en) * | 2010-04-22 | 2010-08-25 | 中兴通讯股份有限公司 | Method and device for destroying terminal data |
CN102905009A (en) * | 2011-07-28 | 2013-01-30 | 北京邮电大学 | Mobile terminal information protection method and system |
CN103164656A (en) * | 2012-06-01 | 2013-06-19 | 北京安天电子设备有限公司 | Method and system for erasing hidden file based on visible file |
CN104035891A (en) * | 2014-06-26 | 2014-09-10 | 福州大学 | Android mobile terminal data security protection system |
CN106548093A (en) * | 2015-09-18 | 2017-03-29 | 四川效率源信息安全技术股份有限公司 | The method for deleting of confidential data in FAT32 file system |
US20170288859A1 (en) * | 2016-01-13 | 2017-10-05 | ZenmuTech, Inc | Computer programs, secret management methods and systems |
CN106598487A (en) * | 2016-11-21 | 2017-04-26 | 深圳市中博睿存科技有限公司 | Data destruction method and device |
CN106844104A (en) * | 2017-01-25 | 2017-06-13 | 北京奇虎科技有限公司 | A kind of terminal data processing method, device and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291390A (en) * | 2020-01-20 | 2020-06-16 | 中国人民解放军海军工程大学 | Key data safe destruction trigger system and trigger method |
CN111291390B (en) * | 2020-01-20 | 2022-05-20 | 中国人民解放军海军工程大学 | Key data safe destruction trigger system and trigger method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105493054B (en) | It is protected using the rapid data of double file system | |
US20090292710A1 (en) | Management of mobile-device data | |
CN106648024A (en) | Contextual history of computing objects | |
CN108833658A (en) | A kind of method and apparatus of data scrubbing | |
CN101421714A (en) | User experience for multimedia mobile note taking | |
CN103559455A (en) | Android device personal information protection method based on user identification | |
Tso et al. | iPhone social networking for evidence investigations using iTunes forensics | |
EP2461615A1 (en) | Method for backing up terminal data and system thereof | |
CN101431558A (en) | Data control method for mobile terminal and mobile terminal thereof | |
CN107241263A (en) | A kind of message delet method and device, computer installation and storage medium | |
CN103885858A (en) | Method and system for mobile phone backup and data recovery | |
WO2016154159A1 (en) | Providing interactive preview of content within communication | |
CN101207851A (en) | Wireless application access system, client end equipment and server | |
EP3467681A1 (en) | Data migration method and device | |
CN105224194A (en) | A kind of data processing method and terminal | |
CN101304454B (en) | Method for rapidly inspecting short message history record | |
CN107332966A (en) | A kind of backup method of address list information | |
CN108710471A (en) | A kind of data destruction method, device, server and system | |
CN107704337A (en) | Method, mobile terminal and the device with store function of factory reset | |
CN104750572A (en) | Data back-up method, data back-up device and mobile terminal | |
CN103092768A (en) | Method and device of data processing in application system | |
KR101075023B1 (en) | Method for Managing history of document using Link Document and System thereof | |
US11277480B2 (en) | System and method for targeted endpoint data acquisition | |
CN111125038B (en) | Intelligent data synchronization method and system based on cloud storage | |
CN106325771A (en) | Method for processing data of multiple terminals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181026 |
|
RJ01 | Rejection of invention patent application after publication |