KR20100009330A - The data elimination method using a mobile type storage system - Google Patents
The data elimination method using a mobile type storage system Download PDFInfo
- Publication number
- KR20100009330A KR20100009330A KR1020080070173A KR20080070173A KR20100009330A KR 20100009330 A KR20100009330 A KR 20100009330A KR 1020080070173 A KR1020080070173 A KR 1020080070173A KR 20080070173 A KR20080070173 A KR 20080070173A KR 20100009330 A KR20100009330 A KR 20100009330A
- Authority
- KR
- South Korea
- Prior art keywords
- data
- disk
- storage device
- removable storage
- random number
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/162—Delete operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
- G06F16/1748—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/62—Uninstallation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
Description
The present invention relates to a method of permanently deleting data using a removable storage device. More particularly, the present invention provides a method of permanently deleting data that is mounted on a mobile storage device to permanently delete user-specific data, and prohibits the outflow of main data. The present invention relates to the provision of a method for permanently deleting data that makes data accessible.
The data that companies and individuals store and manage on their hard disks often plays a role as one of the important assets for companies and individuals.
In particular, when the data stored on the hard disk is information related to core technology development, information on human resources management, or information on sales, the importance as an asset is even greater.
However, information, which is one of such important assets, is often easily leaked to others.
For example, if an employee at a business leaves the company when he leaves the company, returns his computer, or transfers a hard disk used by a company or individual to another person, the data stored on the hard disk should be completely deleted. In reality, the data stored on the hard disk is retained, and only the location information about the data is deleted.
In addition, not only personal or corporate personal information stored on the hard disk, but also basic software (Operating System) existing in the hard disk of the computer is executing a format for deletion, but since only logical deletion is performed. There is software (OS) in it.
Looking at the deletion form of data existing in the hard disk of the computer by the prior art as described above with reference to FIG.
For example, when reading the NewFile.HWP document file, the file information is first read through the root directory entry that includes the information of each file contained in the root directory entry of the disk, and then the file allocation table (FAT) is used. Check the file location information, check the data area, and access the actual data stored.
In case of file saving, it works similarly to file reading. First, it checks whether there is information of the file to save through the root directory entry. After confirming, the actual data is stored in the data area based on the positional information.
If you want to delete a file in this state, the file is shown as if the file is deleted by checking the FAT and changing the first letter of the file, but the information is present in the actual data area so that it can be recovered later.
In this way, if a computer having a hard disk from which data has been deleted is leaked to another person, the deleted data can be restored for the purpose of substantially malicious use.
The restored data may be exposed to others or other companies without their knowledge, and the leakage of personal and corporate information may result in enormous property damage, as well as significant limitations on personal or corporate activities. The problem arises.
In addition, as the data or software on the computer, which he thought to have been deleted, is recovered, a number of unfortunate problems occur such as a legal dispute between the assignee and the assignee.
Accordingly, the present invention has been invented to solve the above problems, and completely deletes data stored in a recording medium such as a hard disk, and prevents restoration thereof, thereby preventing the leakage of personal or corporate information to the outside. It is an object of the present invention to provide a method for permanently erasing data on a recording medium and to provide a method in which data cannot be accessed without using a designated removable storage device even if user-specific data is leaked to the outside.
The method of permanently erasing data of a recording medium according to the present invention searches for a physical disk and a logical disk of a computer by using a data erasing program installed in a removable storage device using a USB port mounted on a PC after the computer booting process. Since the data stored in the physical disk or the logical disk selected by the user is deleted, it is easy to delete the data itself, not only the location information of the data, and it is impossible to restore the deleted data so that important information is leaked. The purpose of being able to prevent can be achieved.
In addition, since it is not used through computer booting, there is no need to change the external computer environment, and the user-specific data is stored in the personal area of the removable storage device so that the user-specific data can be accessed only through the designated removable storage device. The stored data can be encrypted and / or decrypted at the stage of storing it in a private area of the removable storage device without installing a security program on the host computer or the computer, and can encrypt and conceal the name of the file. In this case, the purpose is to minimize the information exposure time by opening the file using instant decryption (temporary decryption) and securely deleting it.
The present invention uses the removable storage device to permanently delete the data stored in the recording medium, such as a computer's hard disk to make it impossible to recover, with the greatest advantage to prevent information leakage and convenience that can be easily used even if not professional It is an invention which can provide various effects.
Hereinafter, with reference to the accompanying drawings will be described a preferred configuration and operation of the present invention for achieving the above object.
2 is a view illustrating a principle of permanently deleting data using a removable storage device to which the technique of the present invention is applied. FIG. 3 is a diagram illustrating a permanently deleting data algorithm using a removable storage device to which the present invention is applied. FIG. 5 is a diagram illustrating a process of permanently deleting data using a removable storage device to which the technique of the present invention is applied. FIG. 6 is a diagram showing a first step of permanently deleting data using a removable storage device to which the technique of the present invention is applied, and FIG. 7 is a removable storage to which the technique of the present invention is applied. FIG. 8 is a diagram illustrating a process of permanently deleting data using a device; FIG. FIG. 9 is a view illustrating a data permanently deleting execution completion screen using a removable storage device. FIG. 9 is a configuration diagram of a software permanently deleting software using a removable storage device to which the technology of the present invention is applied. FIG. 10 is a removable storage to which the technology of the present invention is applied. A block configuration diagram showing a process of permanently deleting data using a device and an operation state of a security area in a portable storage device will be described together.
In the present invention, after the computer booting process, the physical disk and the logical disk of the computer is searched in the removable storage device connected to the USB port mounted on the computer, the searched physical disk and logical disk on the screen, the searched on the screen The physical and logical disks shown in the table are selected by the user, and the data stored on the selected physical disk or logical disk is overwritten with "0", "1", and "random" data, so that not only the partition information, but also the file system and the actual data are displayed. The erasure program, which overwrites all stored clusters with encryption codes and enables the deletion of data itself as well as the location information of the data, has a stored recording medium to provide ease of deletion and restoration of deleted data. Makes it impossible for important information to be leaked Characterized in that it can be prevented.
In the present invention, the user-specific data is stored in the personal area of the removable storage device so that the user-specific data can be accessed only through the designated removable storage device, and the stored data is removable without installing a security program on the host computer or the computer. It can be encrypted or decrypted at the stage of storing in a private area of the storage device, and the encrypted file is stored with an access program that can minimize the information exposure time by immediately opening the file using instant decryption (temporary decryption) and securely deleting it. Another feature is to have more recording media to maximize the ease of use and security.
The process of permanently deleting data using the portable storage device of the present invention will be described with reference to FIGS. 5 to 8.
After booting the computer, connect the removable storage device with the recording medium to which the deletion program is stored in the USB port installed in the PC, and let the recording medium of the deletion program stored in the removable storage device search the physical and logical disks of the computer. do.
When the search is completed, the searched physical disks and logical disks are displayed in a list form on the monitor in the form of a pop-up window, and the user selects a disk to be deleted from the list of displayed physical disks and logical disks.
Selection of the physical disk and the logical disk to be deleted may be made by the user blocking or selecting one by one using the arrow keys or the mouse.
When the user selects the physical and logical disks to be deleted, the user strikes the complete deletion warning through the strike-type message window and the OK button to proceed with the deletion and the undeleted deletion in the complete deletion warning message window. It would be natural to have a Cancel button for the user to select.
When the user selects the OK button, a pop-up message window informs the user that the files on the physical disk and the logical disk are deleted. The user can recognize that the deletion is completed through the pop-up message window even when the deletion is completed.
When completely deleting the physical disk and the logical disk using the removable storage device as described above, as shown in Figure 3, after the booting of the computer completes a file to be deleted using a removable storage device having a recording medium in which the deletion program is stored or Search the folder and select it. If you proceed wiping, not only partition information. The file system, even the cluster where the actual data is stored, is overwritten with encryption code, making recovery impossible forever.
MBR (Master Boot Record) that stores disk partition information so that previous data cannot be detected from the hard disk by using recovery software, DBR (DOS Boot Uecord) having information about booting of disk, and attribute information about each file FAT (File Allocation Table) that stores location information indicating which cluster is located on the disk, Root Directory Entry that contains information about each file contained in the root directory entry of the disk, and actual data of each file. The process proceeds by overwriting all the recording areas constituting all the data recording areas of the hard disk including the data area where the data is stored with a specific pattern value.
That is, overwrite all accessible sectors of the disk with "random numbers", overwrite all accessible sectors of the disk with "0", "1", "random numbers" at the same location, or "Random number 1", "Random number 1", "
The reason for overwriting with "0", "1", and "random" data like this is that if you overwrite data with "0" like a utility such as Low Format, there will be a physical magnetic trace so that you can try to recover physically. In this case, "0", "1", and "random" data may be recovered, but "unusable, unusable" information, which is not necessary at all, is recovered, and thus cannot be utilized.
As described above, in the present invention, the file location information, the file information, and the actual data in which data is actually overwritten with "0", "1", and "random" data are used to store not only the partition information but also the file system and the actual data. All clusters will be overwritten with encryption code, making it impossible to restore deleted data.
The following describes a method of configuring and operating a security area for an access provided in the portable storage device.
When application / data starts, it notifies execution to Manager SW and requests authentication in the form of login window for access to removable storage device.
The Manager SW sends the application / data information to the removable storage device and asks for permission.
The portable storage device sends information of the application program to the security module (stored the number of executions, access rights, etc.) located in the hidden block to determine whether the program is available.
When the available packet comes from the security module located in the hidden block, the mobile storage device returns a token to the Manager SW for accessing the secure block of the mobile storage device.
The Manager SW receives the Secure Block access right token from the removable storage device and registers it with the information of the application in the internal list and transfers the right token to the application / data.
The application / data can access the Secure Block with the privilege Token until the program terminates.
If an error occurs in the Manager SW, driver, or security module during execution, Manager SW immediately generates an interrupt to stop using the driver and security module, and displays a message according to the degree of problem in the currently running application program.
In this case, a strong usage restriction for the application program is applied to an emergency situation such as removal of a module.
Through this process, data is read and written through the decryption and encryption of the personal security area of the mobile storage device, and the data specialized for each user is stored in the personal area, and the stored data is immediately deleted by opening the file and minimizing information exposure time. You will be able to.
The present invention as described above is mounted on the removable storage device to permanently delete the user-specific data to prohibit the outflow of the main data, and to increase the security and convenience by allowing access to the main data only through the designated removable storage device It can be used easily.
1 is a view showing a principle of data deletion to which the prior art is applied.
Figure 2 illustrates the principle of permanent data deletion using a removable storage device to which the technique of the present invention is applied.
3 is a diagram illustrating a data permanent deletion algorithm using a removable storage device to which the technique of the present invention is applied.
Figure 4 is a step showing a permanent data deletion process using a removable storage device applied technology of the present invention.
5 is a view showing a data permanently deleted initial screen using a removable storage device to which the technique of the present invention is applied.
FIG. 6 is a diagram illustrating a first step of permanently deleting data using a removable storage device to which the technique of the present invention is applied. FIG.
7 is a view showing a permanent data deletion progress screen using a removable storage device to which the technique of the present invention is applied.
8 is a view showing a permanent data deletion completion screen using a removable storage device to which the technique of the present invention is applied.
9 is a configuration diagram of an operation of permanently deleting data using a removable storage device to which the technique of the present invention is applied.
Figure 10 is a block diagram showing the operation of the secure area on the removable storage device and the data permanent deletion process using a removable storage device applied technology of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080070173A KR20100009330A (en) | 2008-07-18 | 2008-07-18 | The data elimination method using a mobile type storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080070173A KR20100009330A (en) | 2008-07-18 | 2008-07-18 | The data elimination method using a mobile type storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20100009330A true KR20100009330A (en) | 2010-01-27 |
Family
ID=41817767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020080070173A KR20100009330A (en) | 2008-07-18 | 2008-07-18 | The data elimination method using a mobile type storage system |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20100009330A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101025440B1 (en) * | 2010-05-14 | 2011-03-28 | 주식회사 모뉴엘 | A computer had standby power circuit breaker function |
KR101496664B1 (en) * | 2013-08-23 | 2015-02-27 | 플러스기술주식회사 | Method and system of deleting data for mobile device |
CN105824839A (en) * | 2015-01-06 | 2016-08-03 | 中兴通讯股份有限公司 | Method and apparatus for safe deletion of data in mobile terminal |
-
2008
- 2008-07-18 KR KR1020080070173A patent/KR20100009330A/en not_active Application Discontinuation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101025440B1 (en) * | 2010-05-14 | 2011-03-28 | 주식회사 모뉴엘 | A computer had standby power circuit breaker function |
KR101496664B1 (en) * | 2013-08-23 | 2015-02-27 | 플러스기술주식회사 | Method and system of deleting data for mobile device |
CN105824839A (en) * | 2015-01-06 | 2016-08-03 | 中兴通讯股份有限公司 | Method and apparatus for safe deletion of data in mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7571176B2 (en) | Selective file erasure using metadata modifications | |
US8244989B2 (en) | Secure erasure of a target digital file including use of replacement data from used space | |
Bauer et al. | Secure data deletion for Linux file systems | |
US7984296B2 (en) | Content protection device and content protection method | |
US8281388B1 (en) | Hardware secured portable storage | |
JP5184041B2 (en) | File system management apparatus and file system management program | |
CN100389408C (en) | Fixed disk data enciphering back-up and restoring method | |
US8762431B2 (en) | System and method for secure erase in copy-on-write file systems | |
US20030221115A1 (en) | Data protection system | |
US7818567B2 (en) | Method for protecting security accounts manager (SAM) files within windows operating systems | |
Joukov et al. | Adding secure deletion to your favorite file system | |
WO2007091652A1 (en) | Tally information management method and management device | |
Steel | Windows forensics: The field guide for conducting corporate computer investigations | |
CN113553006A (en) | Secure encrypted storage system for realizing data writing to read-only partition | |
JP3867188B2 (en) | Security management system and program recording medium thereof | |
US20050193195A1 (en) | Method and system for protecting data of storage unit | |
US8725780B2 (en) | Methods and systems for rule-based worm enforcement | |
KR20100009330A (en) | The data elimination method using a mobile type storage system | |
CN112559982A (en) | Copyright protection method for application program | |
KR100970700B1 (en) | Method for perpetual data deleting | |
CN109901783A (en) | A kind of information technology for eliminating of storage medium | |
Mallery | Secure file deletion: Fact or fiction? | |
JP2001117824A (en) | Portable information terminal device and its program recording medium | |
WO2003083670A1 (en) | Protection of data by hiding the data | |
JP4000916B2 (en) | Data management apparatus and data management program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
N231 | Notification of change of applicant | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |