CN106531196A - Overwriting-based data destroying method and apparatus - Google Patents

Overwriting-based data destroying method and apparatus Download PDF

Info

Publication number
CN106531196A
CN106531196A CN201610977174.2A CN201610977174A CN106531196A CN 106531196 A CN106531196 A CN 106531196A CN 201610977174 A CN201610977174 A CN 201610977174A CN 106531196 A CN106531196 A CN 106531196A
Authority
CN
China
Prior art keywords
overriding
data
standard
override
erasing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610977174.2A
Other languages
Chinese (zh)
Inventor
吕玉彬
戚勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201610977174.2A priority Critical patent/CN106531196A/en
Publication of CN106531196A publication Critical patent/CN106531196A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/02Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
    • G11B5/024Erasing
    • G11B5/0245Bulk erasing

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an overwriting-based data destroying method and apparatus. The method comprises the following steps: obtaining a security grade requested by a user for data and a data size; according to the security grade and the data size, evaluating needed overwriting frequency; and overwriting the data by use of an overwriting standard corresponding to the overwriting frequency. According to the overwriting-based data destroying method and apparatus provided by the invention, a storage area can be covered according to certain physical disk storage rules, the possibility that the data is covered is effectively reduced, the data overwriting security is improved, the flexibility can be enhanced, and demands of different users are satisfied.

Description

A kind of method and apparatus of the data destroying based on overriding
Technical field
The invention belongs to virtual memory technique field, the method for more particularly to a kind of data destroying based on overriding and dress Put.
Background technology
Magnetizing mediums both domestic and external is destroyed technology and is roughly divided into two classes at present:It is hard to destroy technology and soft destruction technology.It is hard to destroy Technology includes that demagnetization technology, fast sale ruin technology and physical destroying technology etc., and soft destruction technology is data cover technology, according to destruction Mode data destroying can be divided into overriding method, demagnetization method again, smash method to pieces and destroy method etc. by fire.
Wherein, it is data cover technology to override method, and its low cost, cost are little, and after destruction, disk can also be continuing with, but Due to there is magnetic after effect, data once thoroughly can not be destroyed by covering, safety than relatively low, and, it is impossible to according to user Demand adjusts overriding mode, causes motility not strong.
The content of the invention
For solving the above problems, the invention provides a kind of method and apparatus of the data destroying based on overriding, Neng Gouzun According to certain physical disk storage rule, memory area is covered, the possibility that data are resumed effectively is reduced, is improved data The safety of overriding, and its motility can be strengthened, meet the demand of different user.
A kind of method of data destroying based on overriding that the present invention is provided, including:
User is obtained for the security classification required by data and the size of data volume;
According to the security classification and the size of the data volume, the overriding number of times needed for assessment;
Using the overriding standard corresponding with the overriding number of times, data are override.
Preferably, in the method for the above-mentioned data destroying based on overriding,
Also included before the acquisition size of the user for the security classification required by data and data volume:
The corresponding relation set up between overriding number of times and overriding standard.
Preferably, in the method for the above-mentioned data destroying based on overriding,
It is described data are override after, also include:
According to the feedback result of user, the corresponding relation between the overriding number of times and overriding standard is adjusted.
Preferably, in the method for the above-mentioned data destroying based on overriding,
Described to override the corresponding overriding standard of number of times using with described, carrying out overriding to data includes:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, override using DOD5220.22-M overriding standard logarithmic evidences;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override.
A kind of device of data destroying based on overriding that the present invention is provided, including:
Acquiring unit, for obtaining user for the security classification required by data and the size of data volume;
Assessment unit, for the size according to the security classification and the data volume, the overriding number of times needed for assessment;
Data, for utilizing the overriding standard corresponding with the overriding number of times, are override by overriding unit.
Preferably, in the device of the above-mentioned data destroying based on overriding,
Also include:
Unit is set up, for setting up the corresponding relation between overriding number of times and overriding standard.
Preferably, in the device of the above-mentioned data destroying based on overriding,
Also include:
Adjustment unit, for the feedback result according to user, to right between the overriding number of times and the overriding standard Should be related to and be adjusted.
Preferably, in the device of the above-mentioned data destroying based on overriding,
It is described overriding unit specifically for:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, standard logarithmic evidence is simply override using DOD5220.22-M and override;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override.
By foregoing description, a kind of method and apparatus of data destroying based on overriding that the present invention is provided, due to The method includes:User is obtained for the security classification required by data and the size of data volume;According to the security classification and The size of the data volume, the overriding number of times needed for assessment;Using the overriding standard corresponding with the overriding number of times, to data Override, therefore, it is possible in accordance with certain physical disk storage rule, covering to memory area, effectively reducing data quilt The possibility of recovery, improves the safety of data overriding, and can strengthen its motility, meet the demand of different user.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can be with basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 provide for the embodiment of the present application the first based on overriding data destroying method schematic diagram;
Fig. 2 provide for the embodiment of the present application the first based on overriding data destroying device schematic diagram.
Specific embodiment
The core concept of the present invention is to provide a kind of method and apparatus of the data destroying based on overriding, can be in accordance with one Fixed physical disk storage rule, covers to memory area, effectively reduces the possibility that data are resumed, improve data overriding Safety, and its motility can be strengthened, meet the demand of different user.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The first method based on the data destroying for overriding that the embodiment of the present application is provided is as shown in figure 1, Fig. 1 is the application Schematic diagram of the first of embodiment offer based on the method for the data destroying of overriding, the method comprise the steps:
S1:User is obtained for the security classification required by data and the size of data volume;
That is, different users is different for the requirement of data, some users have high demands, and some users will Ask low, and different size of data volume also correspond to different destruction modes, therefore both parameters are combined, it becomes possible to Different user is supplied to different schemes, strengthens the motility of data destroying.
S2:According to the security classification and the size of the data volume, the overriding number of times needed for assessment;
It should be noted that when security classification is low, only need small number of overriding number of times, it becomes possible to meet and require, and When security classification is high, then need it is corresponding improve overriding number of times, the probability for avoiding data to be resumed as far as possible, and work as data volume compared with When big, the time-consuming of overriding can be increased, reduce overriding efficiency, thus the size of data volume be also estimate one of overriding number of times it is important Factor, will take into account overriding effect and efficiency, can set up the form of a corresponding relation in advance, make different security classifications and cover The different overriding number of times of the combination correspondence of number of times is write, overriding process standardization is made, and user is very clear.
S3:Using the overriding standard corresponding with the overriding number of times, data are override.
Wherein, to I haven't seen you for ages overriding once, and in order to improve the irrecoverability of overriding, can be more overriding number of times Override, reached the purpose for preferably destroying data.
It should be noted that the method provides the LUN (Logical Unit Number, LUN) of storage content The destruction of rank, is mainly used in mass storage system (MSS), and in system, Logical Disk may correspond to the concept of LUN, is not to physics magnetic The destruction of disk rank, but for destruction that the virtual logical disks of different user are carried out, it is therefore an objective to ensure the peace of historical data Entirely, when the virtual hard disk of user is using finishing or when monoblock hard disc data is invalid, according to the actual demand of user to number of users According to being covered.
By foregoing description, above-mentioned the first method based on the data destroying of overriding that the embodiment of the present application is provided And device, as the method includes:User is obtained for the security classification required by data and the size of data volume;According to described Security classification and the size of the data volume, the overriding number of times needed for assessment;Using the overriding corresponding with the overriding number of times Data are override by standard, therefore, it is possible in accordance with certain physical disk storage rule, covering to memory area, having Effect reduces the possibility that data are resumed, and improves the safety of data overriding, and can strengthen its motility, meets different user Demand.
The method of second data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first based on covering On the basis of the method for the data destroying write, also including following technical characteristic:
Also included before the acquisition size of the user for the security classification required by data and data volume:
The corresponding relation set up between overriding number of times and overriding standard.
Specifically, in table form corresponding relation therebetween can be shown, each overriding number of times Numerical value have corresponding overriding standard, it is like this, corresponding with the security classification of user and data volume size when determining After overriding number of times, it is possible to override with a clear and definite standard.
The third method based on the data destroying for overriding that the embodiment of the present application is provided, is to be based on to cover at above-mentioned second On the basis of the method for the data destroying write, also including following technical characteristic:
It is described data are override after, also include:
According to the feedback result of user, the corresponding relation between the overriding number of times and overriding standard is adjusted.
In this case, it becomes possible to optimize overriding scheme, it is ensured that the effect of overriding, for example, correspond to some present count The overriding number of times of amount, after taking the first sets of plan, it is found that the probability that data are resumed is higher, then just can be by such case Fed back, the follow-up overriding standard using higher level finds optimal case.
The method of the 4th kind of data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first to the 3rd In method kind based on the data destroying of overriding on the basis of any one, also including following technical characteristic:
Described to override the corresponding overriding standard of number of times using with described, carrying out overriding to data includes:
When overriding number of times is 1, using complete zero overriding standard logarithmic according to being override, it should be noted that such case Under, than relatively low, user data there is a possibility that to be resumed smaller, system meeting the level of security that user is required to data destroying Automatically overriding standard is set to into complete zero overriding standard, that is, all of user data area is override once with zero;
When overriding number of times is 2 to 3, using DOD5220.22-M overriding standard logarithmics according to being override, need what is illustrated It is that now safety of the user to data destroying has relatively low requirement, the data of destruction are more important, here DOD5220.22-M overrides standard:All possible region is covered once with identical characters, then covered once with its complement code, Finally covered once with random code, if overriding number of times is 2, in being override before DOD5220.22-M overriding standards twice Appearance is covered to overwritten data, and when overriding number of times is 3, overrides standard to overwritten data fully according to DOD5220.22-M Covered;
When overriding number of times is 4 to 7, using 7 erasing standard logarithmics of DOD5220.22-M according to being override, specifically, Three randoms number are write, twice overwritten data, twice the radix-minus-one complement of overwritten data, when the overriding number of times that user selects is 5 times, system Overwriting operations can be carried out to data area according to front 5 overwritten datas of 7 overridings of DOD5220.22-M, by that analogy;
When overriding number of times is 8, using 8 erasing standard logarithmics of RCMP TSSIT OPS-IID according to being override, override Process is:Odd-times produces random number, radix-minus-one complement of the even-times for last time odd-times;
When overriding number of times is 9 to 35, using Gutman erasing standard logarithmics according to being override, this is generally acknowledged safest Data wipe scheme, but data erasing speed is slow, and specifically as shown in table 1, wherein, Random is represented this Gutman erasings standard Random number, when the overriding number of times that user selects is 29 times, the content of overriding can be wiped before rule by system according to Gutman The overwritten data of 29 times carries out overwriting operations to data area;
1 Gutman of table wipes the erasure sequence table of standard
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override, now, user data is extremely important, and user is very high to the level of security of data destroying, wherein, carries out first DOD5220.22-M3 overriding, then perform Gutman erasing rules;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override, now, user data security classification highest, internal data can not definitely be revealed, wherein, first in operation DOD5220.22-M7 overriding is first carried out, then performs Gutman erasing rules.
The first device based on the data destroying for overriding that the embodiment of the present application is provided is as shown in Fig. 2 Fig. 2 is the application Schematic diagram of the first of embodiment offer based on the device of the data destroying of overriding, the device include:
Acquiring unit 201, for obtaining user for the security classification required by data and the size of data volume.Namely Say, different user is different for the requirement of data, and some users have high demands, and some users require it is low and different The data volume of size also corresponds to different destruction modes, therefore both parameters are combined, it becomes possible to be supplied to different use Family strengthens the motility of data destroying with different schemes;
Assessment unit 202, for the size according to the security classification and the data volume, the overriding needed for assessment time Number, it should be noted that when security classification is low, only need small number of overriding number of times, it becomes possible to meet and require, and when secrecy When rank is high, then corresponding raising is needed to override number of times, the probability for avoiding data to be resumed as far as possible, and when data volume is larger, The time-consuming of overriding can be increased, overriding efficiency is reduced, therefore the size of data volume is also to estimate a key factor of overriding number of times, Overriding effect and efficiency is taken into account, the form of a corresponding relation can be set up in advance, make different security classifications and overriding time The different overriding number of times of several combination correspondences, makes overriding process standardization, and user is very clear;
Data, for utilizing the overriding standard corresponding with the overriding number of times, are override by overriding unit 203, its In, override once to I haven't seen you for ages, and in order to improve the irrecoverability of overriding, can be override with more overriding number of times, Reach the purpose for preferably destroying data.
The device of second data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first based on covering On the basis of the device of the data destroying write, also including following technical characteristic:
Unit is set up, for setting up the corresponding relation between overriding number of times and overriding standard.
Specifically, in table form corresponding relation therebetween can be shown, each overriding number of times Numerical value have corresponding overriding standard, it is like this, corresponding with the security classification of user and data volume size when determining After overriding number of times, it is possible to override with a clear and definite standard.
The third device based on the data destroying for overriding that the embodiment of the present application is provided, is to be based on to cover at above-mentioned second On the basis of the device of the data destroying write, also including following technical characteristic:
Adjustment unit, for the feedback result according to user, to right between the overriding number of times and the overriding standard Should be related to and be adjusted.
In this case, it becomes possible to optimize overriding scheme, it is ensured that the effect of overriding, for example, correspond to some present count The overriding number of times of amount, after taking the first sets of plan, it is found that the probability that data are resumed is higher, then just can be by such case Fed back, the follow-up overriding standard using higher level finds optimal case.
The device of the 4th kind of data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first to the 3rd In device kind based on the data destroying of overriding on the basis of any one, also including following technical characteristic:
It is described overriding unit specifically for:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, standard logarithmic evidence is simply override using DOD5220.22-M and override;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics According to being override.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention. Various modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope for causing.

Claims (8)

1. it is a kind of based on overriding data destroying method, it is characterised in that include:
User is obtained for the security classification required by data and the size of data volume;
According to the security classification and the size of the data volume, the overriding number of times needed for assessment;
Using the overriding standard corresponding with the overriding number of times, data are override.
2. it is according to claim 1 based on overriding data destroying method, it is characterised in that
Also included before the acquisition size of the user for the security classification required by data and data volume:
The corresponding relation set up between overriding number of times and overriding standard.
3. it is according to claim 2 based on overriding data destroying method, it is characterised in that
It is described data are override after, also include:
According to the feedback result of user, the corresponding relation between the overriding number of times and overriding standard is adjusted.
4. according to any one of claim 1-3 based on overriding data destroying method, it is characterised in that the utilization The overriding standard corresponding with the overriding number of times, carrying out overriding to data includes:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, override using DOD5220.22-M overriding standard logarithmic evidences;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, entered using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences Row overriding;
When overriding number of times is 39 to 42, entered using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences Row overriding.
5. it is a kind of based on overriding data destroying device, it is characterised in that include:
Acquiring unit, for obtaining user for the security classification required by data and the size of data volume;
Assessment unit, for the size according to the security classification and the data volume, the overriding number of times needed for assessment;
Data, for utilizing the overriding standard corresponding with the overriding number of times, are override by overriding unit.
6. it is according to claim 5 based on overriding data destroying device, it is characterised in that
Also include:
Unit is set up, for setting up the corresponding relation between overriding number of times and overriding standard.
7. it is according to claim 6 based on overriding data destroying device, it is characterised in that
Also include:
Adjustment unit, for the feedback result according to user, to the corresponding pass between the overriding number of times and the overriding standard System is adjusted.
8. according to any one of claim 5-7 based on overriding data destroying device, it is characterised in that the overriding Unit specifically for:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, standard logarithmic evidence is simply override using DOD5220.22-M and override;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, entered using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences Row overriding;
When overriding number of times is 39 to 42, entered using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences Row overriding.
CN201610977174.2A 2016-11-07 2016-11-07 Overwriting-based data destroying method and apparatus Pending CN106531196A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610977174.2A CN106531196A (en) 2016-11-07 2016-11-07 Overwriting-based data destroying method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610977174.2A CN106531196A (en) 2016-11-07 2016-11-07 Overwriting-based data destroying method and apparatus

Publications (1)

Publication Number Publication Date
CN106531196A true CN106531196A (en) 2017-03-22

Family

ID=58350362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610977174.2A Pending CN106531196A (en) 2016-11-07 2016-11-07 Overwriting-based data destroying method and apparatus

Country Status (1)

Country Link
CN (1) CN106531196A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107765996A (en) * 2017-09-25 2018-03-06 青岛海信移动通信技术股份有限公司 The method for deleting and device of a kind of data
CN110196691A (en) * 2019-06-11 2019-09-03 苏州浪潮智能科技有限公司 The method and device of data destroying based on data level of confidentiality and hard disk media type

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007188624A (en) * 2006-01-12 2007-07-26 Samsung Electronics Co Ltd Hybrid hard disk drive control method, recording medium, and hybrid hard disk drive
CN101577700A (en) * 2008-05-05 2009-11-11 北京瑞佳晨科技有限公司 Method for destroying computer disk data based on network environment
CN103295638A (en) * 2013-06-06 2013-09-11 国家电网公司 Portable electronic storage medium data wiping device and data wiping method based on same
CN103294960A (en) * 2013-06-06 2013-09-11 国家电网公司 Portable data wiping device based on U disk
CN103714294A (en) * 2013-12-24 2014-04-09 南京邮电大学 Data overwriting method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007188624A (en) * 2006-01-12 2007-07-26 Samsung Electronics Co Ltd Hybrid hard disk drive control method, recording medium, and hybrid hard disk drive
CN101577700A (en) * 2008-05-05 2009-11-11 北京瑞佳晨科技有限公司 Method for destroying computer disk data based on network environment
CN103295638A (en) * 2013-06-06 2013-09-11 国家电网公司 Portable electronic storage medium data wiping device and data wiping method based on same
CN103294960A (en) * 2013-06-06 2013-09-11 国家电网公司 Portable data wiping device based on U disk
CN103714294A (en) * 2013-12-24 2014-04-09 南京邮电大学 Data overwriting method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107765996A (en) * 2017-09-25 2018-03-06 青岛海信移动通信技术股份有限公司 The method for deleting and device of a kind of data
CN110196691A (en) * 2019-06-11 2019-09-03 苏州浪潮智能科技有限公司 The method and device of data destroying based on data level of confidentiality and hard disk media type

Similar Documents

Publication Publication Date Title
Wilson et al. Saudi Arabia: The Coming Storm: The Coming Storm
CN106022155B (en) Method and server for database security management
EP1496427A3 (en) Data processing method with restricted data arrangement, storage area management method, and data processing system
CN104573441A (en) Computer with data privacy function and data encryption and hiding method thereof
DE112005002845T5 (en) Method, device and system for secure data storage
CN104484595B (en) A kind of information processing method and electronic equipment
CN109214807A (en) Method, apparatus, computer equipment and the storage medium of management contribution information
CN106531196A (en) Overwriting-based data destroying method and apparatus
Levin et al. INSIDER: Why are INDC studies reaching different temperature estimates?
CN105871558A (en) Numerical control system authority management method based on USB flash disk physical serial number
CN106648938A (en) Linux system application program memory management method and system
CN111147518A (en) Attack and defense countermeasure based e-mail system security evaluation method and device
CN106709380A (en) Encryption and decryption method and system capable of aiming at disk data memory area
Ukiwo Causes and cures of oil-related Niger Delta conflicts
CN103678983A (en) Smartphone usage permission verification system and method
CN105204755A (en) Soft keyboard operation method and terminal
CN103593592B (en) User data encryption and decryption method
Nye The Future of Russian-American Relations
CN104992212B (en) Tourism smart card system
CN107944290B (en) A kind of iris templates guard method based on partial ordering
CN106130968A (en) A kind of identity identifying method and system
CN203799380U (en) Computer network safety controller
Zhan et al. Consumer adoption of Wi-Fi network: the role of security knowledge, perceived threat and security measures
CN103164638A (en) Content copyright protection method based on removable storage device
Sasha Vezhnevets et al. Options as responses: Grounding behavioural hierarchies in multi-agent RL

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication