CN101587452A - Method for recovering deleted data in computer by utilizing intelligent key equipment - Google Patents

Method for recovering deleted data in computer by utilizing intelligent key equipment Download PDF

Info

Publication number
CN101587452A
CN101587452A CNA2008101121760A CN200810112176A CN101587452A CN 101587452 A CN101587452 A CN 101587452A CN A2008101121760 A CNA2008101121760 A CN A2008101121760A CN 200810112176 A CN200810112176 A CN 200810112176A CN 101587452 A CN101587452 A CN 101587452A
Authority
CN
China
Prior art keywords
data
deleted
key equipment
cipher key
intelligent cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101121760A
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNA2008101121760A priority Critical patent/CN101587452A/en
Publication of CN101587452A publication Critical patent/CN101587452A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a method for recovering deleted data in a computer by utilizing intelligent key equipment, which comprises the steps of storing the deleted data and recovering the deleted data, wherein the step of storing the deleted data comprises the steps of: 1, installing a driver of the intelligent key equipment, and running the intelligent key equipment; 2, running a monitoring program, monitoring whether the operation of data deletion exists, if so, sending the deleted data to the intelligent key equipment by the monitoring program, and otherwise, continuously monitoring by the monitoring program; and 3, receiving and storing the deleted data sent by the monitoring program by the intelligent key equipment. Through the operation, the method solves the problems that data in the computers cannot be recovered or cannot be completely recovered after the deletion and the privacy of the recovered data cannot be protected.

Description

A kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine
Technical field
The present invention relates to information security field, be meant a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine especially.
Background technology
Along with development of computer, it is colourful that PC World also becomes.Lot of data is stored on computers, but under present technical conditions, computing machine does not resemble safety the safety cabinet, preserve superincumbent data the possibility of losing is also often arranged, because computing machine in use can run into situations such as changing machine, poisoning, system crash, upgrading and deletion unavoidably, sometimes also need to carry out the format of hard disk, found that some important data forgets backup, cause capsule information to be lost.In order to address this problem, the data of finding lost, technician have developed several data according to the difference of the reason of corrupted data and have recovered instrument, have reduced loss to greatest extent.
Though existing data recovery tools can be recovered the data of losing to some extent, but we should see and wherein still have weak point, particularly when deleted data, the user for a long time afterwards finds that just certain file vanishes sometimes, can produce three kinds of results like this: first, data thoroughly can not be recovered because data deleted after, its space that occupied is originally occupied by new data; The second, data can not completely be recovered, and that is to say that deleted data seem to be resumed, but can not normally use; The 3rd, recover these deleted data and often will look for special company, like this, deleted data are to be resumed, but can not guarantee the privacy of deleted data.
Intelligent cipher key equipment is a kind of small hardware device that has processor and storer, and it adopts the double factor authentication pattern, and use is simple, cost is lower.Its built-in single-chip microcomputer or intelligent card chip can be stored user's key or digital certificate, utilizes the authentication of the built-in cryptographic algorithm realization of intelligent cipher key equipment to user identity.That intelligent cipher key equipment has is E-mail enciphered, digital signature, safety certificate, secure network login and visit SSL (Security Socket Layer, the secure socket layer protocol layer) function such as secure network, and has the feature that the private key that guarantees the user leaves hardware never, also have the characteristic of attack protection physically, security is high.Because intelligent cipher key equipment is USB interface normally, so intelligent cipher key equipment also is USBKEY.
Summary of the invention
Can not recover or can not completely recover after deleted in order to solve in the computing machine data; and can not protect the problem of the privacy that is resumed data; the invention provides a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine; it is characterized in that: described method comprises that intelligent cipher key equipment stores the step of deleted data and recover the step of deleted data; wherein, the step of the deleted data of described storage comprises:
Step 1: the driver of intelligent cipher key equipment is installed, the operation intelligent cipher key equipment on described computing machine;
Step 2: the watchdog routine operation, whether monitoring has the operation of deleted data, if having, then watchdog routine sends to described intelligent cipher key equipment with deleted data; Otherwise watchdog routine continues monitoring;
Step 3: described intelligent cipher key equipment receives the described deleted data that described watchdog routine sends and is stored in the described equipment;
The step of the deleted data of described recovery comprises:
Step 4: after described intelligent cipher key equipment is received data recovery application, checking holder's legal identity;
Step 5: when holder's identity when being legal, intelligent cipher key equipment inquires needs data recovered;
Step 6: derive the described data recovered that needs.
In the described step 1, also comprise the step of checking intelligent cipher key equipment holder's legal identity behind the operation intelligent cipher key equipment.
Described watchdog routine is present in the described driver.
Described watchdog routine also comprises the execution following steps when the operation that monitors deleted data: the prompting user confirms whether to carry out deletion action.
In the described step 3, described intelligent cipher key equipment also comprised the step that described deleted file is compressed before the described deleted file of storage, correspondingly, described step 6 is specially: to the operation that the need data recovered decompresses, the data after will decompressing then derive.
In the described step 3, described intelligent cipher key equipment also comprised the step of described deleted file being carried out the intelligent key processing before the described deleted file of storage, correspondingly, described step 6 is specially: the need data recovered is decrypted, and the data after will deciphering then derive.
Described intelligent key is handled and is comprised encryption and/or digital signature.
In the described step 3, described intelligent cipher key equipment also comprised the step to described deleted file compresses and intelligent key is handled before the described deleted file of storage, correspondingly, described step 6 is specially: the need data recovered is decrypted and decompresses, and the data after will encrypting and decompress then derive.
Described intelligent cipher key equipment can be stored data deleted in many computing machines.
Beneficial effect: the present invention utilizes the memory function of intelligent cipher key equipment and the characteristics of security, the data storage that to delete in the process of using a computer is in intelligent cipher key equipment, make and when finding that data are deleted, can recover, also guaranteed to be resumed the integrality and the privacy of data simultaneously.
Description of drawings
Accompanying drawing 1 is the process flow diagram of the deleted data of storage in the embodiment of the invention 1;
Accompanying drawing 2 is the process flow diagrams that recover deleted data in the embodiment of the invention 1.
Embodiment
In order to make technical scheme of the present invention and beneficial effect clearer and more definite, the invention will be further described below in conjunction with specific embodiment.
Embodiment 1
Preferably, in the present embodiment, intelligent cipher key equipment can be stored data deleted in many computing machines, needs before the deleted data of intelligent cipher key equipment storage it is compressed and carries out intelligent key and handle (mode handled of intelligent key comprise encrypt and/or digital signature).
Preferably, in the present embodiment, a kind of method of data deleted in the intelligent cipher key equipment recovery computing machine of utilizing comprises step of storing deleted data and the step of recovering deleted data, wherein, step when as shown in Figure 1, storing deleted data comprises:
Step 101: the driver of intelligent cipher key equipment is installed on computers, the operation intelligent cipher key equipment;
Step 102: the watchdog routine in the driver is moved on computers;
Step 103: watchdog routine judges whether the data on the computing machine are deleted, if then execution in step 104; Otherwise watchdog routine continues monitoring;
Step 104: watchdog routine sends to intelligent cipher key equipment with deleted data in deleted;
Step 105: intelligent cipher key equipment receives data that watchdog routine sends and it is handled, and the concrete steps of processing are to compress afterwards earlier to encrypt, and wherein, the step of encryption also available digital signatures is replaced;
Step 106: the data after the intelligent cipher key equipment stores processor.
In the present embodiment, the process flow diagram when recovering deleted data may further comprise the steps as shown in Figure 2:
Step 201: intelligent cipher key equipment carries out authentication to the holder of intelligent cipher key equipment after receiving data and recovering application, whether legal to verify its identity, the mode of authentication can be PIN code authentication mode or biological characteristic authentication mode;
Step 202: the holder by authentication after, when promptly holder's identity was legal, inquiry was stored in data in the intelligent cipher key equipment, needs data recovered to find out;
Step 203: intelligent cipher key equipment is handled operation to the needs data recovered, and the concrete steps of handling operation comprise deciphering afterwards earlier and decompress;
Step 204: the holder exports to data decompressed in the intelligent cipher key equipment and once deletes in this data computing machine, finishes the operation of restore data.
In the present embodiment, because deleted data have also sent to intelligent cipher key equipment in deleted, so guaranteed the restorability of deleted data and the integrality that is resumed data, simultaneously, because being the holder (supvr of deleted data just) by intelligent cipher key equipment, the operation of restore data finishes, so also guaranteed to be resumed the privacy of data.
In actual applications, the compression that intelligent cipher key equipment was carried out before the storage watchdog routine deleted data of sending is also carried out the operation that intelligent key handles and can only be replaced with squeeze operation, correspondingly, when recovering deleted data, the holder is before derivation needs data recovered from intelligent cipher key equipment, and the elder generation that intelligent cipher key equipment carried out deciphers the step that afterwards decompresses and can only replace with the step that decompresses.
In actual applications, the compression that intelligent cipher key equipment was carried out before the storage watchdog routine deleted data of sending is also carried out operation that intelligent key handles and can be handled (mode handled of intelligent key comprise encrypt and digital signature) and replace with carrying out intelligent key, correspondingly, when recovering deleted data, the holder is before derivation needs data recovered from intelligent cipher key equipment, and the elder generation that intelligent cipher key equipment carried out deciphers the step that afterwards decompresses and can replace with the step that is decrypted.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. method of utilizing intelligent cipher key equipment to recover data deleted in the computing machine, it is characterized in that: described method comprises that intelligent cipher key equipment stores the step of deleted data and recover the step of deleted data, wherein, the step of the deleted data of described storage comprises:
Step 1: the driver of intelligent cipher key equipment is installed, the operation intelligent cipher key equipment on described computing machine;
Step 2: the watchdog routine operation, whether monitoring has the operation of deleted data, if having, then watchdog routine sends to described intelligent cipher key equipment with deleted data; Otherwise watchdog routine continues monitoring;
Step 3: described intelligent cipher key equipment receives the described deleted data that described watchdog routine sends and is stored in the described equipment;
The step of the deleted data of described recovery comprises:
Step 4: after described intelligent cipher key equipment is received data recovery application, checking holder's legal identity;
Step 5: when holder's identity when being legal, intelligent cipher key equipment inquires needs data recovered;
Step 6: derive the described data recovered that needs.
2. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: in the described step 1, also comprise the step of checking intelligent cipher key equipment holder's legal identity behind the operation intelligent cipher key equipment.
3. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: described watchdog routine is present in the described driver.
4. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: described watchdog routine also comprises the execution following steps when the operation that monitors deleted data: the prompting user confirms whether to carry out deletion action.
5. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: in the described step 3, described intelligent cipher key equipment also comprised the step that described deleted file is compressed before the described deleted file of storage, correspondingly, described step 6 is specially: to the operation that the need data recovered decompresses, the data after will decompressing then derive.
6. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: in the described step 3, described intelligent cipher key equipment also comprised the step of described deleted file being carried out the intelligent key processing before the described deleted file of storage, correspondingly, described step 6 is specially: the need data recovered is decrypted, and the data after will deciphering then derive.
7. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 6, it is characterized in that: described intelligent key is handled and is comprised encryption and/or digital signature.
8. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: in the described step 3, described intelligent cipher key equipment also comprised the step to described deleted file compresses and intelligent key is handled before the described deleted file of storage, correspondingly, described step 6 is specially: the need data recovered is decrypted and decompresses, and the data after will encrypting and decompress then derive.
9. a kind of method of utilizing data deleted in the intelligent cipher key equipment recovery computing machine according to claim 1, it is characterized in that: described intelligent cipher key equipment can be stored data deleted in many computing machines.
CNA2008101121760A 2008-05-22 2008-05-22 Method for recovering deleted data in computer by utilizing intelligent key equipment Pending CN101587452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101121760A CN101587452A (en) 2008-05-22 2008-05-22 Method for recovering deleted data in computer by utilizing intelligent key equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101121760A CN101587452A (en) 2008-05-22 2008-05-22 Method for recovering deleted data in computer by utilizing intelligent key equipment

Publications (1)

Publication Number Publication Date
CN101587452A true CN101587452A (en) 2009-11-25

Family

ID=41371706

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101121760A Pending CN101587452A (en) 2008-05-22 2008-05-22 Method for recovering deleted data in computer by utilizing intelligent key equipment

Country Status (1)

Country Link
CN (1) CN101587452A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062480A (en) * 2017-12-14 2018-05-22 徐州汇尔康食品有限公司 A kind of electric business platform website data protects system
CN109407974A (en) * 2018-09-19 2019-03-01 平安科技(深圳)有限公司 Electronic device, image deletion method and storage medium based on mixed meat and fish dishes binary code

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062480A (en) * 2017-12-14 2018-05-22 徐州汇尔康食品有限公司 A kind of electric business platform website data protects system
CN109407974A (en) * 2018-09-19 2019-03-01 平安科技(深圳)有限公司 Electronic device, image deletion method and storage medium based on mixed meat and fish dishes binary code
CN109407974B (en) * 2018-09-19 2022-05-20 平安科技(深圳)有限公司 Electronic device, picture deleting method based on mixed binary code and storage medium

Similar Documents

Publication Publication Date Title
CN103020537B (en) Data encrypting method, data encrypting device, data deciphering method and data deciphering device
CN112074836A (en) Apparatus and method for protecting data through trusted execution environment
US9256499B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN101650693B (en) Security control method for mobile hard disk and security mobile hard disk
US9064133B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN103198263B (en) By the method that the peripheral hardware key of personal computer sets up enciphering/deciphering memory space
JP2009139990A (en) Technology for preventing unauthorized access to information
CN111385084A (en) Key management method and device for digital assets and computer readable storage medium
CN107066298B (en) Method and device for running application program without traces
CN109766215B (en) Data processing method and device
Pandian et al. Effective fragmentation minimization by cloud enabled back up storage
CN110888778A (en) Cloud desktop-based log file monitoring system and method
US10635826B2 (en) System and method for securing data in a storage medium
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
US9054864B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN101930521A (en) File protecting method and device thereof
US9324123B2 (en) Storage of keyID in customer data area
KR102216869B1 (en) Apparatus and method for decrypting end-to-end encrypted files
CN101587452A (en) Method for recovering deleted data in computer by utilizing intelligent key equipment
CN114625756A (en) Data query method and device and server
CN111159783B (en) Portable high-speed stream encryption hardware device and method
CN102831080A (en) Data security protection method for mobile storage equipment
WO2020138505A1 (en) File transfer system
CN112804053B (en) Data recovery method, encryption device, terminal device and storage medium
CN215117523U (en) Server data protection system based on PUFs hardware encryption board card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20091125