CN106156660A - The data destruction method of a kind of storage device and system - Google Patents

The data destruction method of a kind of storage device and system Download PDF

Info

Publication number
CN106156660A
CN106156660A CN201610603090.2A CN201610603090A CN106156660A CN 106156660 A CN106156660 A CN 106156660A CN 201610603090 A CN201610603090 A CN 201610603090A CN 106156660 A CN106156660 A CN 106156660A
Authority
CN
China
Prior art keywords
data
safe class
erasing
storage device
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610603090.2A
Other languages
Chinese (zh)
Inventor
徐洪志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201610603090.2A priority Critical patent/CN106156660A/en
Publication of CN106156660A publication Critical patent/CN106156660A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses the data destruction method of a kind of storage device, comprise determining that out the target data needing to carry out destroying in storage device;Identify the data safe class corresponding with target data;Utilize the data erasing mechanism corresponding with data safe class, target data is carried out corresponding data erasing and processes;Wherein, the erasing times of regulation and data safe class correlation in data erasing mechanism.Visible, the application is specifically according to the data safe class of target data, select corresponding data erasing mechanism that target data is destroyed, and the erasing times specified in data erasing mechanism and data safe class correlation, that is, data safe class is the highest, the erasing times corresponding to data erasing mechanism is the most, the most both may insure that data were fully wiped, when can ensure that again and every class data are wiped, be respectively provided with higher efficiency of erasing.It addition, the application further correspondingly discloses a kind of data destroying system.

Description

The data destruction method of a kind of storage device and system
Technical field
The present invention relates to data destroying technical field, particularly to data destruction method and the system of a kind of storage device.
Background technology
Currently, along with the arrival of data age, people's produced data volume in the Working Life of every day gets more and more, And among these, have many data to relate to privacy or the trade secret etc. of enterprise of individual.When people are no longer necessary to use During these private datas, it will usually select these data to be destroyed, to avoid private data to be leaked.
But, the data erasing mechanism being typically with in prior art fixing carries out erasing process to data, that is, The number of times that all data carry out data erasing is all identical.And owing to the privacy of different pieces of information is the most different, Use fixing data erasing mechanism to cause some data wipe not thoroughly, it is the most thorough that some data then can be wiped free of The end, thus the time that waste is the most unnecessary.
In sum it can be seen that the most not only can ensure that data were fully wiped but also can guarantee that higher efficiency of erasing is There is problem to be solved at present.
Summary of the invention
In view of this, it is an object of the invention to provide data destruction method and the system of a kind of storage device, can be true Protect data fully to be wiped, can guarantee that again higher efficiency of erasing.Its concrete scheme is as follows:
A kind of data destruction method of storage device, including:
Determine the target data needing to carry out destroying in storage device;
Identify the data safe class corresponding with described target data;
Utilize the data erasing mechanism corresponding with described data safe class, described target data is carried out corresponding data Erasing processes;
Wherein, the erasing times of regulation and described data safe class correlation in described data erasing mechanism.
Preferably, described in determine the process of target data needing in storage device to carry out to destroy, including:
By the way of user specifies, determine the target data needing to carry out destroying in described storage device.
Preferably, described in determine the process of target data needing in storage device to carry out to destroy, including:
According to the default destruction cycle, periodically it is defined as the data in default memory area in described storage device needing Carry out the target data destroyed;Wherein, described default memory area is to be specified in described storage device in advance by user Memory area.
Preferably, the process of the data safe class that described identification is corresponding with described target data, including:
The storage safe class in territory, described target storage is extracted from the property value in territory, target storage;
According to described storage safe class, and combine first and preset mapping library, identify corresponding with described target data Data safe class;
Wherein, territory, described target storage is the memory block in described storage device stored described target data Territory;Described first preset mapping library be pre-created for record storage safe class and data safe class between map close The data base of system.
Preferably, in described data erasing mechanism, the erasing times of regulation more than 2 times and is less than 100 times.
Preferably, if in described data erasing mechanism, the erasing times of regulation is more than or equal to 35 times, then in described data Front 35 secondary data erasing steps are set to the data erasure step consistent with Gutmann algorithm by erasing mechanism.
Preferably, the data erasing mechanism that described utilization is corresponding with described data safe class, described target data is entered The process that the corresponding data erasing of row processes, including:
Utilize second to preset mapping library, determine the data erasing machine corresponding with the data safe class of described target data System;
Utilize described data erasing mechanism, described target data is carried out corresponding data erasing and processes;
Wherein, described second preset mapping library be pre-created for recording data safe class and data erasing mechanism Between the data base of mapping relations.
The invention also discloses the data destroying system of a kind of storage device, including:
Data determining module, for determining the target data needing to carry out destroying in storage device;
Grade identification module, for identifying the data safe class corresponding with described target data;
Data erasing module, for utilizing the data erasing mechanism corresponding with described data safe class, to described target Data carry out corresponding data erasing and process;
Wherein, the erasing times of regulation and described data safe class correlation in described data erasing mechanism.
Preferably, described grade identification module includes:
Information extraction unit, for extracting the storage in territory, described target storage from the property value in territory, target storage Safe class;
Grade recognition unit, for according to described storage safe class, and combines first and presets mapping library, identify and institute State the data safe class that target data is corresponding;
Wherein, territory, described target storage is the memory block in described storage device stored described target data Territory;Described first preset mapping library be pre-created for record storage safe class and data safe class between map close The data base of system.
Preferably, described data erasing module includes:
Erasing mechanism determines unit, is used for utilizing second to preset mapping library, determines the data peace with described target data The data erasing mechanism that congruence level is corresponding;
Data erasing unit, is used for utilizing described data erasing mechanism, described target data carries out corresponding data wiping Except processing;
Wherein, described second preset mapping library be pre-created for recording data safe class and data erasing mechanism Between the data base of mapping relations.
In the present invention, the data destruction method of storage device, comprise determining that out and storage device needs destroy Target data;Identify the data safe class corresponding with target data;The data corresponding with data safe class are utilized to wipe Mechanism, carries out corresponding data erasing and processes target data;Wherein, the erasing times specified in data erasing mechanism and data Safe class correlation.Visible, the present invention, specifically according to the data safe class of target data, selects corresponding Target data is destroyed by data erasing mechanism, and the erasing times specified in data erasing mechanism and data safe class Correlation, that is, data safe class is the highest, the erasing times corresponding to data erasing mechanism is the most, the most both May insure that data are fully wiped, when can ensure that again and every class data are wiped, be respectively provided with higher efficiency of erasing.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to The accompanying drawing provided obtains other accompanying drawing.
Fig. 1 is the data destruction method flow chart of a kind of storage device disclosed in the embodiment of the present invention;
Fig. 2 is the data destroying system structure schematic diagram of a kind of storage device disclosed in the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
The embodiment of the invention discloses the data destruction method of a kind of storage device, shown in Figure 1, the method includes:
Step S11: determine the target data needing to carry out destroying in storage device.
It is understood that above-mentioned storage device includes but not limited to USB flash disk, storage card, hard disk, SAN storage area network Deng.
It addition, above-mentioned target data can be the data in storage device in certain memory area, it is also possible to be whole depositing Data in storage equipment.
Step S12: identify the data safe class corresponding with target data.
It is understood that different types of data have different data safe classes, the purpose of this step be in order to Determine the data safe class of target data.
Step S13: utilize the data erasing mechanism corresponding with above-mentioned data safe class, target data is carried out accordingly Data erasing processes.Wherein, the erasing times of regulation and data safe class correlation in data erasing mechanism.
That is, the data safe class of target data is the highest, regulation in the data erasing mechanism corresponding to target data Erasing times is the most.It should be noted that current embodiment require that previously according to different data safe classes, determine Erasing times in corresponding data erasing mechanism.
In the embodiment of the present invention, the data destruction method of storage device, comprise determining that out and storage device needs carry out pin Ruin the target data of process;Identify the data safe class corresponding with target data;Utilize the number corresponding with data safe class According to erasing mechanism, target data is carried out corresponding data erasing and processes;Wherein, the erasing times of regulation in data erasing mechanism With data safe class correlation.Visible, the embodiment of the present invention specifically according to the data safe class of target data, Select corresponding data erasing mechanism that target data is destroyed, and in data erasing mechanism the erasing times of regulation with Data safe class correlation, that is, data safe class is the highest, the erasing times corresponding to data erasing mechanism is also The most, the most both may insure that data were fully wiped, be respectively provided with higher when can ensure that again and every class data are wiped Efficiency of erasing.
The embodiment of the invention discloses the data destruction method of a kind of concrete storage device, relative to a upper embodiment, Technical scheme has been made further instruction and optimization by the present embodiment.Concrete:
In upper embodiment step S11, it is thus necessary to determine that go out to need the target data carrying out destroying.The embodiment of the present invention Various ways can be used to determine above-mentioned target data.
Such as, the embodiment of the present invention can be determined and need in storage device to carry out pin by the way of user specifies Ruin the target data of process.
Certainly, the embodiment of the present invention can also determine above-mentioned target data in the following way: according to default destruction In the cycle, periodically the data in default memory area are defined as in storage device the target data needing to carry out destroying;Its In, default memory area is the memory area specified in storage device in advance by user.The data of storage are needed according to expection Different types of data, the above-mentioned default destruction cycle can correspondingly be set as the different cycles, such as, can be set to 1 little Time, one day, one month even 1 year etc..
In upper embodiment step S12, identify the process of the data safe class corresponding with target data, specifically can wrap Include below step S121 to S122;Wherein,
Step S121: extract the storage safe class in territory, target storage from the property value in territory, target storage.Its In, territory, target storage is the memory area in storage device stored target data.
It is understood that the embodiment of the present invention needs to arrange one for indicating this storage for territory, target storage in advance The attribute of the storage safe class in region, such as, arranges one for indicating that this memory area is high safety grade, intermediate security Grade or the attribute of lower security grade.
Step S122: according to above-mentioned storage safe class, and combine first and preset mapping library, identify and target data pair The data safe class answered;Wherein, first to preset mapping library be pacifying for recording storage safe class and data of being pre-created The data base of mapping relations between congruence level.
It is understood that storage safe class is the highest, corresponding data safe class is the highest, otherwise, storage peace Congruence level is the lowest, and corresponding data safe class is the lowest.
Certainly, except can use aforesaid way in addition to the data safe class identifying target data, the embodiment of the present invention Corresponding data safe class mark symbol can also be set in advance in target data, then by extracting the number in target data Accord with according to safe class mark, just can directly identify the data safe class of target data.
Preferably, in the present embodiment, in every kind of data erasing mechanism, the erasing times of regulation is all higher than 2 times and less than 100 Secondary.
Wherein, if the erasing times of regulation is more than or equal to 35 times in data erasing mechanism, then in data erasing mechanism Middle by front 35 secondary data erasing steps be set to the data erasure step consistent with Gutmann algorithm.On it should be noted that Stating Gutmann algorithm is a kind of safer data erasing scheme proposed by professor Gu Teman of Oran gram university.
Further, in upper embodiment step S13, utilize the data erasing mechanism corresponding with data safe class, right Target data carries out the process that corresponding data erasing processes, and specifically includes below step S131 and S132;Wherein,
Step S131: utilize second to preset mapping library, determine the data corresponding with the data safe class of target data Erasing mechanism.
Step S132: utilize the data erasing mechanism determined in step S132, target data is carried out corresponding data Erasing processes;
Wherein, second preset mapping library be pre-created for recording between data safe class and data erasing mechanism The data base of mapping relations.That is, above-mentioned second presets and have recorded different data safe class and corresponding in mapping library Data erasing mechanism.
Accordingly, the embodiment of the invention also discloses the data destroying system of a kind of storage device, shown in Figure 2, should System includes:
Data determining module 21, for determining the target data needing to carry out destroying in storage device;
Grade identification module 22, for identifying the data safe class corresponding with target data;
Data erasing module 23, for utilizing the data erasing mechanism corresponding with above-mentioned data safe class, to number of targets Process according to carrying out corresponding data erasing;
Wherein, the erasing times of regulation and data safe class correlation in data erasing mechanism.
Visible, the embodiment of the present invention, specifically according to the data safe class of target data, selects corresponding data to wipe Target data is destroyed by the mechanism of removing, and in data erasing mechanism, the erasing times of regulation and data safe class are positive Pass relation, that is, data safe class is the highest, the erasing times corresponding to data erasing mechanism is the most, the most both can be true Protect data fully to be wiped, when can ensure that again and every class data are wiped, be respectively provided with higher efficiency of erasing.
Concrete, above-mentioned grade identification module can include information extraction unit and grade recognition unit;Wherein,
Information extraction unit, for extracting the storage safety in territory, target storage from the property value in territory, target storage Grade;
Grade recognition unit, for according to storage safe class, and combines first and presets mapping library, identify and number of targets According to corresponding data safe class;
Wherein, the memory area during territory, target storage is storage device, target data stored;First preset reflect Penetrate storehouse be pre-created for recording the data base of mapping relations between storage safe class and data safe class.
It addition, above-mentioned data erasing module specifically can include that erasing mechanism determines unit and data erasing unit;Wherein,
Erasing mechanism determines unit, is used for utilizing second to preset mapping library, determines that the data with target data are safely etc. The data erasing mechanism that level is corresponding;
Data erasing unit, is used for utilizing data erasing mechanism, target data carries out corresponding data erasing and processes;
Wherein, second preset mapping library be pre-created for recording between data safe class and data erasing mechanism The data base of mapping relations.
More specific work process about above-mentioned modules and unit refers to inside the Pass the phase in previous embodiment Hold, no longer repeat at this.
Finally, in addition it is also necessary to explanation, in this article, the relational terms of such as first and second or the like be used merely to by One entity or operation separate with another entity or operating space, and not necessarily require or imply these entities or operation Between exist any this reality relation or order.And, term " includes ", " comprising " or its any other variant meaning Containing comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include that A little key elements, but also include other key elements being not expressly set out, or also include for this process, method, article or The key element that equipment is intrinsic.In the case of there is no more restriction, statement " including ... " key element limited, do not arrange Except there is also other identical element in including the process of described key element, method, article or equipment.
Data destruction method and system to a kind of storage device provided by the present invention are described in detail above, this Applying specific case in literary composition to be set forth principle and the embodiment of the present invention, the explanation of above example is only intended to Help to understand method and the core concept thereof of the present invention;Simultaneously for one of ordinary skill in the art, according to the think of of the present invention Thinking, the most all will change, in sum, it is right that this specification content should not be construed as The restriction of the present invention.

Claims (10)

1. the data destruction method of a storage device, it is characterised in that including:
Determine the target data needing to carry out destroying in storage device;
Identify the data safe class corresponding with described target data;
Utilize the data erasing mechanism corresponding with described data safe class, described target data is carried out corresponding data erasing Process;
Wherein, the erasing times of regulation and described data safe class correlation in described data erasing mechanism.
The data destruction method of storage device the most according to claim 1, it is characterised in that described in determine storage device Middle needs carry out the process of the target data destroyed, including:
By the way of user specifies, determine the target data needing to carry out destroying in described storage device.
The data destruction method of storage device the most according to claim 1, it is characterised in that described in determine storage device Middle needs carry out the process of the target data destroyed, including:
According to the default destruction cycle, periodically it is defined as the data in default memory area in described storage device needing to carry out The target data destroyed;Wherein, described default memory area is by depositing that user specifies in advance in described storage device Storage area territory.
The data destruction method of storage device the most according to claim 1, it is characterised in that described identification and described target The process of the data safe class that data are corresponding, including:
The storage safe class in territory, described target storage is extracted from the property value in territory, target storage;
According to described storage safe class, and combine first and preset mapping library, identify the data corresponding with described target data Safe class;
Wherein, territory, described target storage is the memory area in described storage device stored described target data;Institute State first preset mapping library be pre-created for record storage safe class and data safe class between mapping relations Data base.
The data destruction method of storage device the most according to claim 1, it is characterised in that in described data erasing mechanism The erasing times of regulation is more than 2 times and less than 100 times.
The data destruction method of storage device the most according to claim 5, it is characterised in that if described data erasing mechanism The erasing times of middle regulation is more than or equal to 35 times, then front 35 secondary data erasing steps arranged in described data erasing mechanism For the data erasure step consistent with Gutmann algorithm.
7. according to the data destruction method of the storage device described in any one of claim 1 to 6, it is characterised in that described utilization The data erasing mechanism corresponding with described data safe class, carries out the mistake that corresponding data erasing processes to described target data Journey, including:
Utilize second to preset mapping library, determine the data erasing mechanism corresponding with the data safe class of described target data;
Utilize described data erasing mechanism, described target data is carried out corresponding data erasing and processes;
Wherein, described second preset mapping library be pre-created for recording between data safe class and data erasing mechanism The data base of mapping relations.
8. the data destroying system of a storage device, it is characterised in that including:
Data determining module, for determining the target data needing to carry out destroying in storage device;
Grade identification module, for identifying the data safe class corresponding with described target data;
Data erasing module, for utilizing the data erasing mechanism corresponding with described data safe class, to described target data Carry out corresponding data erasing to process;
Wherein, the erasing times of regulation and described data safe class correlation in described data erasing mechanism.
The data destroying system of storage device the most according to claim 8, it is characterised in that described grade identification module bag Include:
Information extraction unit, for extracting the storage safety in territory, described target storage from the property value in territory, target storage Grade;
Grade recognition unit, for according to described storage safe class, and combines first and presets mapping library, identify and described mesh The data safe class that mark data are corresponding;
Wherein, territory, described target storage is the memory area in described storage device stored described target data;Institute State first preset mapping library be pre-created for record storage safe class and data safe class between mapping relations Data base.
The data destroying system of storage device the most according to claim 8 or claim 9, it is characterised in that described data erasing mould Block includes:
Erasing mechanism determines unit, is used for utilizing second to preset mapping library, determines that the data with described target data are safely etc. The data erasing mechanism that level is corresponding;
Data erasing unit, is used for utilizing described data erasing mechanism, carries out described target data at corresponding data erasing Reason;
Wherein, described second preset mapping library be pre-created for recording between data safe class and data erasing mechanism The data base of mapping relations.
CN201610603090.2A 2016-07-27 2016-07-27 The data destruction method of a kind of storage device and system Pending CN106156660A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610603090.2A CN106156660A (en) 2016-07-27 2016-07-27 The data destruction method of a kind of storage device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610603090.2A CN106156660A (en) 2016-07-27 2016-07-27 The data destruction method of a kind of storage device and system

Publications (1)

Publication Number Publication Date
CN106156660A true CN106156660A (en) 2016-11-23

Family

ID=58060086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610603090.2A Pending CN106156660A (en) 2016-07-27 2016-07-27 The data destruction method of a kind of storage device and system

Country Status (1)

Country Link
CN (1) CN106156660A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107765996A (en) * 2017-09-25 2018-03-06 青岛海信移动通信技术股份有限公司 The method for deleting and device of a kind of data
CN113821842A (en) * 2021-11-22 2021-12-21 四川华鲲振宇智能科技有限责任公司 Server storage medium one-key destroying method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1554180A (en) * 2002-05-30 2004-12-08 夏普株式会社 Image processing device
CN1662031A (en) * 2004-02-26 2005-08-31 松下电器产业株式会社 Multifunction apparatus
CN101763317A (en) * 2009-12-31 2010-06-30 中国软件与技术服务股份有限公司 Data eliminating method of magnetic medium
CN103608866A (en) * 2013-03-15 2014-02-26 华为技术有限公司 Data wiping method and device for flash memory
CN104205115A (en) * 2012-03-26 2014-12-10 国际商业机器公司 Using different secure erase algorithms to erase chunks from file associated with different security levels

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1554180A (en) * 2002-05-30 2004-12-08 夏普株式会社 Image processing device
CN1662031A (en) * 2004-02-26 2005-08-31 松下电器产业株式会社 Multifunction apparatus
CN101763317A (en) * 2009-12-31 2010-06-30 中国软件与技术服务股份有限公司 Data eliminating method of magnetic medium
CN104205115A (en) * 2012-03-26 2014-12-10 国际商业机器公司 Using different secure erase algorithms to erase chunks from file associated with different security levels
CN103608866A (en) * 2013-03-15 2014-02-26 华为技术有限公司 Data wiping method and device for flash memory

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王正德等: "《信息安全管理论》", 31 July 2009, 军事科学出版社 *
龚培培: "云端融合计算环境中的数据销毁机制", 《中国优秀硕士学位论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107765996A (en) * 2017-09-25 2018-03-06 青岛海信移动通信技术股份有限公司 The method for deleting and device of a kind of data
CN113821842A (en) * 2021-11-22 2021-12-21 四川华鲲振宇智能科技有限责任公司 Server storage medium one-key destroying method and system

Similar Documents

Publication Publication Date Title
CN109767803A (en) Data memory device and its voltage protection method
CN105260320B (en) Data processing method and device for FLASH memory
CN110020544A (en) The Hash information processing method and system of record are stored in the block of block chain
CN106156660A (en) The data destruction method of a kind of storage device and system
CN104142979B (en) A kind of indexing means for realizing RFID tag storage management
CN104751051A (en) Method, device and mobile terminal for identifying malicious advertisements
CN103500226A (en) Method and device for removing sensitivity of sensitive data
CN102508743B (en) Multi-point backup and real-time protection method for Linux file system
CN105260130B (en) A kind of reading/writing method of Seagate hard-disk system file
CN106326439A (en) Real-time video storage and retrieval method and device
CN101833496A (en) Detection device based on host anti-object reusability of hard disk and detection method thereof
CN105302485B (en) A kind of safe method for deleting and device
CN105844156A (en) Process information acquisition method and device and electronic equipment
CN106648713A (en) OTP programming method and device
CN108399266A (en) Data pick-up method, apparatus, electronic equipment and computer readable storage medium
CN109669627A (en) Data memory device and non-volatile formula memory operating method
CN111782605A (en) Chip card file management method, device, terminal and storage medium
CN105184197A (en) Method for completely erasing confidential data
CN106559385A (en) A kind of data authentication method and apparatus
CN109960459A (en) A kind of data-storage system
CN107957921B (en) Wear-balanced intelligent card power-down data protection method
CN103390250A (en) Method and device for generating operation order
CN106611109A (en) Software operating method on storage device
CN102968597A (en) Disk data connection chain-based file crushing method
CN101777077A (en) Method for implementing file system of embedded device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123

RJ01 Rejection of invention patent application after publication