Method for erasing private data in android mobile phone

文档序号:717310 发布日期:2021-04-16 浏览:14次 中文

阅读说明:本技术 一种安卓手机中隐私数据的擦除方法 (Method for erasing private data in android mobile phone ) 是由 刘立明 于 2019-10-16 设计创作,主要内容包括:本发明一种安卓手机中隐私数据的擦除方法,实现过程如下:初步删除手机上的数据和应用;获取手机中敏感信息的读写权限;读取并删除敏感信息;生成虚构的随机敏感信息,覆盖至被删除的所述敏感信息的位置,所述随机敏感信息的数量大于被删除的敏感信息的数量;覆盖完成后删除虚构的所述随机敏感信息;获取手机内存的读写权限;生成随机数据,填满手机剩余可用存储空间,完成清除。本发明通过对安卓手机中存储内容反复的数据写入和擦除,来确保原有数据不可被恢复和还原,从而可以彻底清除安卓手机中的隐私数据。(The invention discloses an erasing method of private data in an android mobile phone, which comprises the following implementation processes: preliminarily deleting data and applications on the mobile phone; acquiring the read-write permission of sensitive information in the mobile phone; reading and deleting sensitive information; generating fictitious random sensitive information, and covering the fictitious random sensitive information to the position of the deleted sensitive information, wherein the quantity of the random sensitive information is greater than that of the deleted sensitive information; deleting the fictitious random sensitive information after the covering is finished; acquiring the read-write permission of the mobile phone memory; and generating random data, filling the residual available storage space of the mobile phone, and finishing the clearing. The method and the device ensure that the original data cannot be recovered and restored by repeatedly writing and erasing the data of the stored content in the android mobile phone, so that the private data in the android mobile phone can be thoroughly cleared.)

1. A method for erasing private data in an android mobile phone is characterized by comprising the following steps:

(1) data and application on the mobile phone are deleted preliminarily: finishing preliminary deletion of data and application on the mobile phone by adopting a mode of opening and restoring factory settings or installing software;

(2) acquiring the read-write permission of sensitive information in the mobile phone;

(3) reading and deleting the sensitive information;

(4) generating fictitious random sensitive information and covering the fictitious random sensitive information to the position of the deleted sensitive information; the number of the sensitive information is larger than the number of the deleted sensitive information;

(5) deleting the fictitious random sensitive information after the covering is finished;

(6) acquiring the read-write permission of the mobile phone memory;

(7) and generating random data, filling the residual available storage space of the mobile phone, and finishing the clearing.

2. The method for erasing the private data in the android phone of claim 1, comprising: the step (2) is specifically realized by the following steps:

the first step is as follows: setting storage items of sensitive information in the mobile phone, wherein the storage items comprise contact persons, short messages, call records or calendars;

the second step is that: searching the storage items and generating an inquiry page for confirming authorization, automatically searching the set storage position of the mobile phone module on the mobile phone by the system, and generating a page to confirm whether to authorize access or not after the search is completed;

the third step: and acquiring a confirmation instruction for the inquiry page, acquiring read-write authorization of the storage item, and after the user clicks a confirmation frame on the inquiry page, acquiring a feedback confirmation instruction by the system and acquiring the read-write permission of the mobile phone module.

3. The method for erasing the private data in the android phone of claim 1, comprising: the specific implementation method of the step (6) is as follows:

the first step is as follows: searching a mobile phone memory and generating an inquiry page for confirming authorization;

the second step is that: and acquiring a confirmation instruction of the inquiry page, and acquiring the read-write authorization of the mobile phone memory.

4. The method for erasing the private data in the android phone of claim 1, comprising: the specific implementation method of the step (7) is as follows:

the first step is as follows: reading the size of the remaining available storage space of the mobile phone, wherein the remaining available storage space of the mobile phone can reach the maximum at the moment because the mobile phone is reset once or sensitive information is deleted and covered once;

the second step is that: generating random data with the same size as the available storage space, wherein the generated random data can also reach the maximum;

the third step: the random data is covered to the position of the available storage space, and the adoption of the random data in the maximum space can ensure that the original data is completely covered.

Technical Field

The invention relates to the technical field of data erasing and recovery, in particular to an erasing method of private data in an android mobile phone.

Background

At present, after the mobile phone is recovered, the android mobile phone data is cleared and restored through factory-provided factory-reset settings. The factory recovery only marks original data in the disk, private data in the disk of the android mobile phone are not really cleared away, and a large amount of private data can still be recovered through a data recovery means, so that privacy leakage of a user is caused.

Disclosure of Invention

The invention aims to provide a method for erasing private data in an android mobile phone, which can ensure that a user can thoroughly erase the private data in the android mobile phone and cannot restore the data through a data restoring tool or software, thereby protecting the privacy of the user.

The technical scheme of the invention is as follows:

a method for erasing private data in an android mobile phone is characterized by comprising the following steps:

(1) data and application on the mobile phone are deleted preliminarily: finishing preliminary deletion of data and application on the mobile phone by adopting a mode of opening and restoring factory settings or installing software;

(2) acquiring the read-write permission of sensitive information in the mobile phone;

(3) reading and deleting the sensitive information;

(4) generating fictitious random sensitive information and covering the fictitious random sensitive information to the position of the deleted sensitive information; the number of the sensitive information is larger than the number of the deleted sensitive information;

(5) deleting the fictitious random sensitive information after the covering is finished;

(6) acquiring the read-write permission of the mobile phone memory;

(7) and generating random data, filling the residual available storage space of the mobile phone, and finishing the clearing.

The method ensures that the original data cannot be recovered and restored by repeatedly writing and erasing the data of the stored content in the android mobile phone, thereby thoroughly eliminating the private data in the android mobile phone.

Drawings

FIG. 1 is a flow chart of an implementation method of the present invention.

Detailed Description

The storage of the android mobile phone is divided into a plurality of partitions, including a system partition, a data partition and the like, wherein the system partition stores a mobile phone operating system; the data partition is used for storing user files, such as contacts, short messages, photos, records, APP downloaded by the user and the like. The technical idea of the invention is as follows: preliminarily deleting data and applications on the mobile phone; acquiring the read-write permission of sensitive information in the mobile phone; reading and deleting sensitive information; generating fictitious random sensitive information, and covering the fictitious random sensitive information to the position of the deleted sensitive information, wherein the quantity of the random sensitive information is greater than that of the deleted sensitive information; deleting the fictitious random sensitive information after the covering is finished; acquiring the read-write permission of the mobile phone memory; and generating random data, filling the residual available storage space of the mobile phone, and finishing the clearing.

As shown in fig. 1, the specific implementation of the present invention is as follows:

(1) data and application on the mobile phone are deleted preliminarily:

the initial deletion of data and applications on the mobile phone can be completed by means of 'opening and restoring factory settings' or 'installing software'.

(2) Acquiring the read-write permission of sensitive information in the mobile phone:

the first step is as follows: setting storage items of sensitive information in the mobile phone, for example, presetting a mobile phone module needing to clear the sensitive information, such as a contact person, a short message, a call record or a calendar in the system;

the second step is that: searching the storage items and generating an inquiry page for confirming authorization, automatically searching the set storage position of the mobile phone module on the mobile phone by the system, and generating a page to confirm whether to authorize access or not after the search is completed;

the third step: and acquiring a confirmation instruction for the inquiry page, acquiring read-write authorization of the storage item, and after the user clicks a confirmation frame on the inquiry page, acquiring a feedback confirmation instruction by the system and acquiring the read-write permission of the mobile phone module.

(3) Reading and deleting the sensitive information:

(4) and generating fictitious random sensitive information and covering the position of the deleted sensitive information.

And generating fictitious random sensitive information, and covering the fictitious random sensitive information to the position of the deleted sensitive information, wherein the number of the sensitive information is greater than that of the deleted sensitive information.

(5) And deleting the fictitious random sensitive information after the covering is finished.

(6) Obtaining read-write permission of mobile phone memory

The first step is as follows: searching a mobile phone memory and generating an inquiry page for confirming authorization;

the second step is that: and acquiring a confirmation instruction of the inquiry page, and acquiring the read-write authorization of the mobile phone memory.

(7) And generating random data, filling the residual available storage space of the mobile phone, and finishing the clearing.

The first step is as follows: reading the size of the remaining available storage space of the mobile phone, wherein the remaining available storage space of the mobile phone can reach the maximum at the moment because the mobile phone is reset once or sensitive information is deleted and covered once;

the second step is that: generating random data with the same size as the available storage space, wherein the generated random data can also reach the maximum;

the third step: the random data is covered to the position of the available storage space, and the adoption of the random data in the maximum space can ensure that the original data is completely covered.

5页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于DSP处理器的EtherCAT从站控制器及方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类