KR20100009330A - The data elimination method using a mobile type storage system - Google Patents

The data elimination method using a mobile type storage system Download PDF

Info

Publication number
KR20100009330A
KR20100009330A KR1020080070173A KR20080070173A KR20100009330A KR 20100009330 A KR20100009330 A KR 20100009330A KR 1020080070173 A KR1020080070173 A KR 1020080070173A KR 20080070173 A KR20080070173 A KR 20080070173A KR 20100009330 A KR20100009330 A KR 20100009330A
Authority
KR
South Korea
Prior art keywords
data
disk
storage device
removable storage
random number
Prior art date
Application number
KR1020080070173A
Other languages
Korean (ko)
Inventor
김석현
정헌
Original Assignee
(주) 엠엘테크
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주) 엠엘테크 filed Critical (주) 엠엘테크
Priority to KR1020080070173A priority Critical patent/KR20100009330A/en
Publication of KR20100009330A publication Critical patent/KR20100009330A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/0223User address space allocation, e.g. contiguous or non contiguous base addressing
    • G06F12/023Free address space management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1748De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

PURPOSE: A method for permanently deleting data using a mobile storage device is provided to completely delete data stored in a recording medium like a hard disk, thereby making it impossible to recover the deleted data. CONSTITUTION: A connected mobile storage device searches a physical disk and a logical disk of a computer. The physical disk and the logical disk are displayed on a screen. A user selects a disk between the physical disk or the logical disk. Data stored in the physical disk or the logical disk is covered by a specific pattern value. Data itself which is not location information of the data is deleted.

Description

Permanently delete data using removable storage device {THE DATA ELIMINATION METHOD USING A MOBILE TYPE STORAGE SYSTEM}

The present invention relates to a method of permanently deleting data using a removable storage device. More particularly, the present invention provides a method of permanently deleting data that is mounted on a mobile storage device to permanently delete user-specific data, and prohibits the outflow of main data. The present invention relates to the provision of a method for permanently deleting data that makes data accessible.

The data that companies and individuals store and manage on their hard disks often plays a role as one of the important assets for companies and individuals.

In particular, when the data stored on the hard disk is information related to core technology development, information on human resources management, or information on sales, the importance as an asset is even greater.

However, information, which is one of such important assets, is often easily leaked to others.

For example, if an employee at a business leaves the company when he leaves the company, returns his computer, or transfers a hard disk used by a company or individual to another person, the data stored on the hard disk should be completely deleted. In reality, the data stored on the hard disk is retained, and only the location information about the data is deleted.

In addition, not only personal or corporate personal information stored on the hard disk, but also basic software (Operating System) existing in the hard disk of the computer is executing a format for deletion, but since only logical deletion is performed. There is software (OS) in it.

Looking at the deletion form of data existing in the hard disk of the computer by the prior art as described above with reference to FIG.

For example, when reading the NewFile.HWP document file, the file information is first read through the root directory entry that includes the information of each file contained in the root directory entry of the disk, and then the file allocation table (FAT) is used. Check the file location information, check the data area, and access the actual data stored.

In case of file saving, it works similarly to file reading. First, it checks whether there is information of the file to save through the root directory entry. After confirming, the actual data is stored in the data area based on the positional information.

If you want to delete a file in this state, the file is shown as if the file is deleted by checking the FAT and changing the first letter of the file, but the information is present in the actual data area so that it can be recovered later.

In this way, if a computer having a hard disk from which data has been deleted is leaked to another person, the deleted data can be restored for the purpose of substantially malicious use.

The restored data may be exposed to others or other companies without their knowledge, and the leakage of personal and corporate information may result in enormous property damage, as well as significant limitations on personal or corporate activities. The problem arises.

In addition, as the data or software on the computer, which he thought to have been deleted, is recovered, a number of unfortunate problems occur such as a legal dispute between the assignee and the assignee.

Accordingly, the present invention has been invented to solve the above problems, and completely deletes data stored in a recording medium such as a hard disk, and prevents restoration thereof, thereby preventing the leakage of personal or corporate information to the outside. It is an object of the present invention to provide a method for permanently erasing data on a recording medium and to provide a method in which data cannot be accessed without using a designated removable storage device even if user-specific data is leaked to the outside.

The method of permanently erasing data of a recording medium according to the present invention searches for a physical disk and a logical disk of a computer by using a data erasing program installed in a removable storage device using a USB port mounted on a PC after the computer booting process. Since the data stored in the physical disk or the logical disk selected by the user is deleted, it is easy to delete the data itself, not only the location information of the data, and it is impossible to restore the deleted data so that important information is leaked. The purpose of being able to prevent can be achieved.

In addition, since it is not used through computer booting, there is no need to change the external computer environment, and the user-specific data is stored in the personal area of the removable storage device so that the user-specific data can be accessed only through the designated removable storage device. The stored data can be encrypted and / or decrypted at the stage of storing it in a private area of the removable storage device without installing a security program on the host computer or the computer, and can encrypt and conceal the name of the file. In this case, the purpose is to minimize the information exposure time by opening the file using instant decryption (temporary decryption) and securely deleting it.

The present invention uses the removable storage device to permanently delete the data stored in the recording medium, such as a computer's hard disk to make it impossible to recover, with the greatest advantage to prevent information leakage and convenience that can be easily used even if not professional It is an invention which can provide various effects.

Hereinafter, with reference to the accompanying drawings will be described a preferred configuration and operation of the present invention for achieving the above object.

2 is a view illustrating a principle of permanently deleting data using a removable storage device to which the technique of the present invention is applied. FIG. 3 is a diagram illustrating a permanently deleting data algorithm using a removable storage device to which the present invention is applied. FIG. 5 is a diagram illustrating a process of permanently deleting data using a removable storage device to which the technique of the present invention is applied. FIG. 6 is a diagram showing a first step of permanently deleting data using a removable storage device to which the technique of the present invention is applied, and FIG. 7 is a removable storage to which the technique of the present invention is applied. FIG. 8 is a diagram illustrating a process of permanently deleting data using a device; FIG. FIG. 9 is a view illustrating a data permanently deleting execution completion screen using a removable storage device. FIG. 9 is a configuration diagram of a software permanently deleting software using a removable storage device to which the technology of the present invention is applied. FIG. 10 is a removable storage to which the technology of the present invention is applied. A block configuration diagram showing a process of permanently deleting data using a device and an operation state of a security area in a portable storage device will be described together.

In the present invention, after the computer booting process, the physical disk and the logical disk of the computer is searched in the removable storage device connected to the USB port mounted on the computer, the searched physical disk and logical disk on the screen, the searched on the screen The physical and logical disks shown in the table are selected by the user, and the data stored on the selected physical disk or logical disk is overwritten with "0", "1", and "random" data, so that not only the partition information, but also the file system and the actual data are displayed. The erasure program, which overwrites all stored clusters with encryption codes and enables the deletion of data itself as well as the location information of the data, has a stored recording medium to provide ease of deletion and restoration of deleted data. Makes it impossible for important information to be leaked Characterized in that it can be prevented.

In the present invention, the user-specific data is stored in the personal area of the removable storage device so that the user-specific data can be accessed only through the designated removable storage device, and the stored data is removable without installing a security program on the host computer or the computer. It can be encrypted or decrypted at the stage of storing in a private area of the storage device, and the encrypted file is stored with an access program that can minimize the information exposure time by immediately opening the file using instant decryption (temporary decryption) and securely deleting it. Another feature is to have more recording media to maximize the ease of use and security.

The process of permanently deleting data using the portable storage device of the present invention will be described with reference to FIGS. 5 to 8.

After booting the computer, connect the removable storage device with the recording medium to which the deletion program is stored in the USB port installed in the PC, and let the recording medium of the deletion program stored in the removable storage device search the physical and logical disks of the computer. do.

When the search is completed, the searched physical disks and logical disks are displayed in a list form on the monitor in the form of a pop-up window, and the user selects a disk to be deleted from the list of displayed physical disks and logical disks.

Selection of the physical disk and the logical disk to be deleted may be made by the user blocking or selecting one by one using the arrow keys or the mouse.

When the user selects the physical and logical disks to be deleted, the user strikes the complete deletion warning through the strike-type message window and the OK button to proceed with the deletion and the undeleted deletion in the complete deletion warning message window. It would be natural to have a Cancel button for the user to select.

When the user selects the OK button, a pop-up message window informs the user that the files on the physical disk and the logical disk are deleted. The user can recognize that the deletion is completed through the pop-up message window even when the deletion is completed.

When completely deleting the physical disk and the logical disk using the removable storage device as described above, as shown in Figure 3, after the booting of the computer completes a file to be deleted using a removable storage device having a recording medium in which the deletion program is stored or Search the folder and select it. If you proceed wiping, not only partition information. The file system, even the cluster where the actual data is stored, is overwritten with encryption code, making recovery impossible forever.

MBR (Master Boot Record) that stores disk partition information so that previous data cannot be detected from the hard disk by using recovery software, DBR (DOS Boot Uecord) having information about booting of disk, and attribute information about each file FAT (File Allocation Table) that stores location information indicating which cluster is located on the disk, Root Directory Entry that contains information about each file contained in the root directory entry of the disk, and actual data of each file. The process proceeds by overwriting all the recording areas constituting all the data recording areas of the hard disk including the data area where the data is stored with a specific pattern value.

That is, overwrite all accessible sectors of the disk with "random numbers", overwrite all accessible sectors of the disk with "0", "1", "random numbers" at the same location, or "Random number 1", "Random number 1", "Random number 2", "Random number 2", "Random number 3", "Random number 3", "Random number 4", "Random number 4" "Repair", "Random Number 5", and "Random Number 5 Repair" are executed to perform multiple overwrites to disable the recovery of the hard disk.

The reason for overwriting with "0", "1", and "random" data like this is that if you overwrite data with "0" like a utility such as Low Format, there will be a physical magnetic trace so that you can try to recover physically. In this case, "0", "1", and "random" data may be recovered, but "unusable, unusable" information, which is not necessary at all, is recovered, and thus cannot be utilized.

As described above, in the present invention, the file location information, the file information, and the actual data in which data is actually overwritten with "0", "1", and "random" data are used to store not only the partition information but also the file system and the actual data. All clusters will be overwritten with encryption code, making it impossible to restore deleted data.

The following describes a method of configuring and operating a security area for an access provided in the portable storage device.

When application / data starts, it notifies execution to Manager SW and requests authentication in the form of login window for access to removable storage device.

The Manager SW sends the application / data information to the removable storage device and asks for permission.

The portable storage device sends information of the application program to the security module (stored the number of executions, access rights, etc.) located in the hidden block to determine whether the program is available.

When the available packet comes from the security module located in the hidden block, the mobile storage device returns a token to the Manager SW for accessing the secure block of the mobile storage device.

The Manager SW receives the Secure Block access right token from the removable storage device and registers it with the information of the application in the internal list and transfers the right token to the application / data.

The application / data can access the Secure Block with the privilege Token until the program terminates.

If an error occurs in the Manager SW, driver, or security module during execution, Manager SW immediately generates an interrupt to stop using the driver and security module, and displays a message according to the degree of problem in the currently running application program.

In this case, a strong usage restriction for the application program is applied to an emergency situation such as removal of a module.

Through this process, data is read and written through the decryption and encryption of the personal security area of the mobile storage device, and the data specialized for each user is stored in the personal area, and the stored data is immediately deleted by opening the file and minimizing information exposure time. You will be able to.

The present invention as described above is mounted on the removable storage device to permanently delete the user-specific data to prohibit the outflow of the main data, and to increase the security and convenience by allowing access to the main data only through the designated removable storage device It can be used easily.

1 is a view showing a principle of data deletion to which the prior art is applied.

Figure 2 illustrates the principle of permanent data deletion using a removable storage device to which the technique of the present invention is applied.

3 is a diagram illustrating a data permanent deletion algorithm using a removable storage device to which the technique of the present invention is applied.

Figure 4 is a step showing a permanent data deletion process using a removable storage device applied technology of the present invention.

5 is a view showing a data permanently deleted initial screen using a removable storage device to which the technique of the present invention is applied.

FIG. 6 is a diagram illustrating a first step of permanently deleting data using a removable storage device to which the technique of the present invention is applied. FIG.

7 is a view showing a permanent data deletion progress screen using a removable storage device to which the technique of the present invention is applied.

8 is a view showing a permanent data deletion completion screen using a removable storage device to which the technique of the present invention is applied.

9 is a configuration diagram of an operation of permanently deleting data using a removable storage device to which the technique of the present invention is applied.

Figure 10 is a block diagram showing the operation of the secure area on the removable storage device and the data permanent deletion process using a removable storage device applied technology of the present invention.

Claims (6)

Connecting a removable storage device having a recording medium having a deletion program stored therein with a USB port mounted to the computer after a computer booting process; Retrieving a physical disk and a logical disk of the computer by the connected removable storage device; Displaying the retrieved physical disk and logical disk on a screen; Selecting a disk to be deleted among the physical disks and the logical disks displayed on the screen; And overwriting the selected physical disk or the logical disk with a specific pattern value to delete the data itself, not just the location information of the data. The method of claim 1; The removable storage device stores user-specific data in a personal area of the removable storage device to access user-specific data; Storing or storing the stored data in a personal area of the removable storage device; Encrypted files are permanently deleted using temporary storage (temporary decryption), and the access program that can be securely deleted immediately by the access program, characterized in that the removable storage device further comprises a recording medium. The method of claim 1; The physical disk or logical disk includes a master boot record (MBR) for storing disk partition information; A DOS Boot Uecord (DBR) having information about booting of the disk; A File Allocation Table (FAT) for storing attribute information about each file and location information indicating on which disk the file is located; A Root Directory Entry containing information about each file contained in the root directory entry of the disk; Method for permanently deleting data using a removable storage device characterized in that it comprises all the recording area including a data area, which is a space in which the actual data of each file is stored. The method of claim 1; And the specific pattern value overwrites all accessible sectors of the disk with "random numbers". The method of claim 1; The specific pattern value is a method of permanently erasing data using a removable storage device, characterized in that multiple overwrites are performed at the same positions with "0", "1", and "random numbers" on all accessible sectors of the disk. The method of claim 1; The specific pattern values are "random number 1", "random number 1", "random number 2", "random number 2", "random number 3", "random number 3", "random number" 4 "," Repair of Random Number 4 "," Random Number 5 "," Random Number 5 Revision "disables recovery of a hard disk characterized by multiple overwrites. Method for permanently deleting data using a removable storage device.
KR1020080070173A 2008-07-18 2008-07-18 The data elimination method using a mobile type storage system KR20100009330A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020080070173A KR20100009330A (en) 2008-07-18 2008-07-18 The data elimination method using a mobile type storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020080070173A KR20100009330A (en) 2008-07-18 2008-07-18 The data elimination method using a mobile type storage system

Publications (1)

Publication Number Publication Date
KR20100009330A true KR20100009330A (en) 2010-01-27

Family

ID=41817767

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020080070173A KR20100009330A (en) 2008-07-18 2008-07-18 The data elimination method using a mobile type storage system

Country Status (1)

Country Link
KR (1) KR20100009330A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101025440B1 (en) * 2010-05-14 2011-03-28 주식회사 모뉴엘 A computer had standby power circuit breaker function
KR101496664B1 (en) * 2013-08-23 2015-02-27 플러스기술주식회사 Method and system of deleting data for mobile device
CN105824839A (en) * 2015-01-06 2016-08-03 中兴通讯股份有限公司 Method and apparatus for safe deletion of data in mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101025440B1 (en) * 2010-05-14 2011-03-28 주식회사 모뉴엘 A computer had standby power circuit breaker function
KR101496664B1 (en) * 2013-08-23 2015-02-27 플러스기술주식회사 Method and system of deleting data for mobile device
CN105824839A (en) * 2015-01-06 2016-08-03 中兴通讯股份有限公司 Method and apparatus for safe deletion of data in mobile terminal

Similar Documents

Publication Publication Date Title
US7571176B2 (en) Selective file erasure using metadata modifications
US8244989B2 (en) Secure erasure of a target digital file including use of replacement data from used space
Bauer et al. Secure data deletion for Linux file systems
US7984296B2 (en) Content protection device and content protection method
US8281388B1 (en) Hardware secured portable storage
JP5184041B2 (en) File system management apparatus and file system management program
CN100389408C (en) Fixed disk data enciphering back-up and restoring method
US8762431B2 (en) System and method for secure erase in copy-on-write file systems
US20030221115A1 (en) Data protection system
US7818567B2 (en) Method for protecting security accounts manager (SAM) files within windows operating systems
Joukov et al. Adding secure deletion to your favorite file system
WO2007091652A1 (en) Tally information management method and management device
Steel Windows forensics: The field guide for conducting corporate computer investigations
CN113553006A (en) Secure encrypted storage system for realizing data writing to read-only partition
JP3867188B2 (en) Security management system and program recording medium thereof
US20050193195A1 (en) Method and system for protecting data of storage unit
US8725780B2 (en) Methods and systems for rule-based worm enforcement
KR20100009330A (en) The data elimination method using a mobile type storage system
CN112559982A (en) Copyright protection method for application program
KR100970700B1 (en) Method for perpetual data deleting
CN109901783A (en) A kind of information technology for eliminating of storage medium
Mallery Secure file deletion: Fact or fiction?
JP2001117824A (en) Portable information terminal device and its program recording medium
WO2003083670A1 (en) Protection of data by hiding the data
JP4000916B2 (en) Data management apparatus and data management program

Legal Events

Date Code Title Description
A201 Request for examination
N231 Notification of change of applicant
E902 Notification of reason for refusal
E601 Decision to refuse application