CN106531196A - Overwriting-based data destroying method and apparatus - Google Patents
Overwriting-based data destroying method and apparatus Download PDFInfo
- Publication number
- CN106531196A CN106531196A CN201610977174.2A CN201610977174A CN106531196A CN 106531196 A CN106531196 A CN 106531196A CN 201610977174 A CN201610977174 A CN 201610977174A CN 106531196 A CN106531196 A CN 106531196A
- Authority
- CN
- China
- Prior art keywords
- overriding
- data
- standard
- override
- erasing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B5/00—Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
- G11B5/02—Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
- G11B5/024—Erasing
- G11B5/0245—Bulk erasing
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an overwriting-based data destroying method and apparatus. The method comprises the following steps: obtaining a security grade requested by a user for data and a data size; according to the security grade and the data size, evaluating needed overwriting frequency; and overwriting the data by use of an overwriting standard corresponding to the overwriting frequency. According to the overwriting-based data destroying method and apparatus provided by the invention, a storage area can be covered according to certain physical disk storage rules, the possibility that the data is covered is effectively reduced, the data overwriting security is improved, the flexibility can be enhanced, and demands of different users are satisfied.
Description
Technical field
The invention belongs to virtual memory technique field, the method for more particularly to a kind of data destroying based on overriding and dress
Put.
Background technology
Magnetizing mediums both domestic and external is destroyed technology and is roughly divided into two classes at present:It is hard to destroy technology and soft destruction technology.It is hard to destroy
Technology includes that demagnetization technology, fast sale ruin technology and physical destroying technology etc., and soft destruction technology is data cover technology, according to destruction
Mode data destroying can be divided into overriding method, demagnetization method again, smash method to pieces and destroy method etc. by fire.
Wherein, it is data cover technology to override method, and its low cost, cost are little, and after destruction, disk can also be continuing with, but
Due to there is magnetic after effect, data once thoroughly can not be destroyed by covering, safety than relatively low, and, it is impossible to according to user
Demand adjusts overriding mode, causes motility not strong.
The content of the invention
For solving the above problems, the invention provides a kind of method and apparatus of the data destroying based on overriding, Neng Gouzun
According to certain physical disk storage rule, memory area is covered, the possibility that data are resumed effectively is reduced, is improved data
The safety of overriding, and its motility can be strengthened, meet the demand of different user.
A kind of method of data destroying based on overriding that the present invention is provided, including:
User is obtained for the security classification required by data and the size of data volume;
According to the security classification and the size of the data volume, the overriding number of times needed for assessment;
Using the overriding standard corresponding with the overriding number of times, data are override.
Preferably, in the method for the above-mentioned data destroying based on overriding,
Also included before the acquisition size of the user for the security classification required by data and data volume:
The corresponding relation set up between overriding number of times and overriding standard.
Preferably, in the method for the above-mentioned data destroying based on overriding,
It is described data are override after, also include:
According to the feedback result of user, the corresponding relation between the overriding number of times and overriding standard is adjusted.
Preferably, in the method for the above-mentioned data destroying based on overriding,
Described to override the corresponding overriding standard of number of times using with described, carrying out overriding to data includes:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, override using DOD5220.22-M overriding standard logarithmic evidences;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override.
A kind of device of data destroying based on overriding that the present invention is provided, including:
Acquiring unit, for obtaining user for the security classification required by data and the size of data volume;
Assessment unit, for the size according to the security classification and the data volume, the overriding number of times needed for assessment;
Data, for utilizing the overriding standard corresponding with the overriding number of times, are override by overriding unit.
Preferably, in the device of the above-mentioned data destroying based on overriding,
Also include:
Unit is set up, for setting up the corresponding relation between overriding number of times and overriding standard.
Preferably, in the device of the above-mentioned data destroying based on overriding,
Also include:
Adjustment unit, for the feedback result according to user, to right between the overriding number of times and the overriding standard
Should be related to and be adjusted.
Preferably, in the device of the above-mentioned data destroying based on overriding,
It is described overriding unit specifically for:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, standard logarithmic evidence is simply override using DOD5220.22-M and override;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override.
By foregoing description, a kind of method and apparatus of data destroying based on overriding that the present invention is provided, due to
The method includes:User is obtained for the security classification required by data and the size of data volume;According to the security classification and
The size of the data volume, the overriding number of times needed for assessment;Using the overriding standard corresponding with the overriding number of times, to data
Override, therefore, it is possible in accordance with certain physical disk storage rule, covering to memory area, effectively reducing data quilt
The possibility of recovery, improves the safety of data overriding, and can strengthen its motility, meet the demand of different user.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can be with basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 provide for the embodiment of the present application the first based on overriding data destroying method schematic diagram;
Fig. 2 provide for the embodiment of the present application the first based on overriding data destroying device schematic diagram.
Specific embodiment
The core concept of the present invention is to provide a kind of method and apparatus of the data destroying based on overriding, can be in accordance with one
Fixed physical disk storage rule, covers to memory area, effectively reduces the possibility that data are resumed, improve data overriding
Safety, and its motility can be strengthened, meet the demand of different user.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
The first method based on the data destroying for overriding that the embodiment of the present application is provided is as shown in figure 1, Fig. 1 is the application
Schematic diagram of the first of embodiment offer based on the method for the data destroying of overriding, the method comprise the steps:
S1:User is obtained for the security classification required by data and the size of data volume;
That is, different users is different for the requirement of data, some users have high demands, and some users will
Ask low, and different size of data volume also correspond to different destruction modes, therefore both parameters are combined, it becomes possible to
Different user is supplied to different schemes, strengthens the motility of data destroying.
S2:According to the security classification and the size of the data volume, the overriding number of times needed for assessment;
It should be noted that when security classification is low, only need small number of overriding number of times, it becomes possible to meet and require, and
When security classification is high, then need it is corresponding improve overriding number of times, the probability for avoiding data to be resumed as far as possible, and work as data volume compared with
When big, the time-consuming of overriding can be increased, reduce overriding efficiency, thus the size of data volume be also estimate one of overriding number of times it is important
Factor, will take into account overriding effect and efficiency, can set up the form of a corresponding relation in advance, make different security classifications and cover
The different overriding number of times of the combination correspondence of number of times is write, overriding process standardization is made, and user is very clear.
S3:Using the overriding standard corresponding with the overriding number of times, data are override.
Wherein, to I haven't seen you for ages overriding once, and in order to improve the irrecoverability of overriding, can be more overriding number of times
Override, reached the purpose for preferably destroying data.
It should be noted that the method provides the LUN (Logical Unit Number, LUN) of storage content
The destruction of rank, is mainly used in mass storage system (MSS), and in system, Logical Disk may correspond to the concept of LUN, is not to physics magnetic
The destruction of disk rank, but for destruction that the virtual logical disks of different user are carried out, it is therefore an objective to ensure the peace of historical data
Entirely, when the virtual hard disk of user is using finishing or when monoblock hard disc data is invalid, according to the actual demand of user to number of users
According to being covered.
By foregoing description, above-mentioned the first method based on the data destroying of overriding that the embodiment of the present application is provided
And device, as the method includes:User is obtained for the security classification required by data and the size of data volume;According to described
Security classification and the size of the data volume, the overriding number of times needed for assessment;Using the overriding corresponding with the overriding number of times
Data are override by standard, therefore, it is possible in accordance with certain physical disk storage rule, covering to memory area, having
Effect reduces the possibility that data are resumed, and improves the safety of data overriding, and can strengthen its motility, meets different user
Demand.
The method of second data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first based on covering
On the basis of the method for the data destroying write, also including following technical characteristic:
Also included before the acquisition size of the user for the security classification required by data and data volume:
The corresponding relation set up between overriding number of times and overriding standard.
Specifically, in table form corresponding relation therebetween can be shown, each overriding number of times
Numerical value have corresponding overriding standard, it is like this, corresponding with the security classification of user and data volume size when determining
After overriding number of times, it is possible to override with a clear and definite standard.
The third method based on the data destroying for overriding that the embodiment of the present application is provided, is to be based on to cover at above-mentioned second
On the basis of the method for the data destroying write, also including following technical characteristic:
It is described data are override after, also include:
According to the feedback result of user, the corresponding relation between the overriding number of times and overriding standard is adjusted.
In this case, it becomes possible to optimize overriding scheme, it is ensured that the effect of overriding, for example, correspond to some present count
The overriding number of times of amount, after taking the first sets of plan, it is found that the probability that data are resumed is higher, then just can be by such case
Fed back, the follow-up overriding standard using higher level finds optimal case.
The method of the 4th kind of data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first to the 3rd
In method kind based on the data destroying of overriding on the basis of any one, also including following technical characteristic:
Described to override the corresponding overriding standard of number of times using with described, carrying out overriding to data includes:
When overriding number of times is 1, using complete zero overriding standard logarithmic according to being override, it should be noted that such case
Under, than relatively low, user data there is a possibility that to be resumed smaller, system meeting the level of security that user is required to data destroying
Automatically overriding standard is set to into complete zero overriding standard, that is, all of user data area is override once with zero;
When overriding number of times is 2 to 3, using DOD5220.22-M overriding standard logarithmics according to being override, need what is illustrated
It is that now safety of the user to data destroying has relatively low requirement, the data of destruction are more important, here
DOD5220.22-M overrides standard:All possible region is covered once with identical characters, then covered once with its complement code,
Finally covered once with random code, if overriding number of times is 2, in being override before DOD5220.22-M overriding standards twice
Appearance is covered to overwritten data, and when overriding number of times is 3, overrides standard to overwritten data fully according to DOD5220.22-M
Covered;
When overriding number of times is 4 to 7, using 7 erasing standard logarithmics of DOD5220.22-M according to being override, specifically,
Three randoms number are write, twice overwritten data, twice the radix-minus-one complement of overwritten data, when the overriding number of times that user selects is 5 times, system
Overwriting operations can be carried out to data area according to front 5 overwritten datas of 7 overridings of DOD5220.22-M, by that analogy;
When overriding number of times is 8, using 8 erasing standard logarithmics of RCMP TSSIT OPS-IID according to being override, override
Process is:Odd-times produces random number, radix-minus-one complement of the even-times for last time odd-times;
When overriding number of times is 9 to 35, using Gutman erasing standard logarithmics according to being override, this is generally acknowledged safest
Data wipe scheme, but data erasing speed is slow, and specifically as shown in table 1, wherein, Random is represented this Gutman erasings standard
Random number, when the overriding number of times that user selects is 29 times, the content of overriding can be wiped before rule by system according to Gutman
The overwritten data of 29 times carries out overwriting operations to data area;
1 Gutman of table wipes the erasure sequence table of standard
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override, now, user data is extremely important, and user is very high to the level of security of data destroying, wherein, carries out first
DOD5220.22-M3 overriding, then perform Gutman erasing rules;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override, now, user data security classification highest, internal data can not definitely be revealed, wherein, first in operation
DOD5220.22-M7 overriding is first carried out, then performs Gutman erasing rules.
The first device based on the data destroying for overriding that the embodiment of the present application is provided is as shown in Fig. 2 Fig. 2 is the application
Schematic diagram of the first of embodiment offer based on the device of the data destroying of overriding, the device include:
Acquiring unit 201, for obtaining user for the security classification required by data and the size of data volume.Namely
Say, different user is different for the requirement of data, and some users have high demands, and some users require it is low and different
The data volume of size also corresponds to different destruction modes, therefore both parameters are combined, it becomes possible to be supplied to different use
Family strengthens the motility of data destroying with different schemes;
Assessment unit 202, for the size according to the security classification and the data volume, the overriding needed for assessment time
Number, it should be noted that when security classification is low, only need small number of overriding number of times, it becomes possible to meet and require, and when secrecy
When rank is high, then corresponding raising is needed to override number of times, the probability for avoiding data to be resumed as far as possible, and when data volume is larger,
The time-consuming of overriding can be increased, overriding efficiency is reduced, therefore the size of data volume is also to estimate a key factor of overriding number of times,
Overriding effect and efficiency is taken into account, the form of a corresponding relation can be set up in advance, make different security classifications and overriding time
The different overriding number of times of several combination correspondences, makes overriding process standardization, and user is very clear;
Data, for utilizing the overriding standard corresponding with the overriding number of times, are override by overriding unit 203, its
In, override once to I haven't seen you for ages, and in order to improve the irrecoverability of overriding, can be override with more overriding number of times,
Reach the purpose for preferably destroying data.
The device of second data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first based on covering
On the basis of the device of the data destroying write, also including following technical characteristic:
Unit is set up, for setting up the corresponding relation between overriding number of times and overriding standard.
Specifically, in table form corresponding relation therebetween can be shown, each overriding number of times
Numerical value have corresponding overriding standard, it is like this, corresponding with the security classification of user and data volume size when determining
After overriding number of times, it is possible to override with a clear and definite standard.
The third device based on the data destroying for overriding that the embodiment of the present application is provided, is to be based on to cover at above-mentioned second
On the basis of the device of the data destroying write, also including following technical characteristic:
Adjustment unit, for the feedback result according to user, to right between the overriding number of times and the overriding standard
Should be related to and be adjusted.
In this case, it becomes possible to optimize overriding scheme, it is ensured that the effect of overriding, for example, correspond to some present count
The overriding number of times of amount, after taking the first sets of plan, it is found that the probability that data are resumed is higher, then just can be by such case
Fed back, the follow-up overriding standard using higher level finds optimal case.
The device of the 4th kind of data destroying based on overriding that the embodiment of the present application is provided, be it is above-mentioned the first to the 3rd
In device kind based on the data destroying of overriding on the basis of any one, also including following technical characteristic:
It is described overriding unit specifically for:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, standard logarithmic evidence is simply override using DOD5220.22-M and override;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override;
When overriding number of times is 39 to 42, using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmics
According to being override.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.
Various modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope for causing.
Claims (8)
1. it is a kind of based on overriding data destroying method, it is characterised in that include:
User is obtained for the security classification required by data and the size of data volume;
According to the security classification and the size of the data volume, the overriding number of times needed for assessment;
Using the overriding standard corresponding with the overriding number of times, data are override.
2. it is according to claim 1 based on overriding data destroying method, it is characterised in that
Also included before the acquisition size of the user for the security classification required by data and data volume:
The corresponding relation set up between overriding number of times and overriding standard.
3. it is according to claim 2 based on overriding data destroying method, it is characterised in that
It is described data are override after, also include:
According to the feedback result of user, the corresponding relation between the overriding number of times and overriding standard is adjusted.
4. according to any one of claim 1-3 based on overriding data destroying method, it is characterised in that the utilization
The overriding standard corresponding with the overriding number of times, carrying out overriding to data includes:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, override using DOD5220.22-M overriding standard logarithmic evidences;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, entered using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences
Row overriding;
When overriding number of times is 39 to 42, entered using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences
Row overriding.
5. it is a kind of based on overriding data destroying device, it is characterised in that include:
Acquiring unit, for obtaining user for the security classification required by data and the size of data volume;
Assessment unit, for the size according to the security classification and the data volume, the overriding number of times needed for assessment;
Data, for utilizing the overriding standard corresponding with the overriding number of times, are override by overriding unit.
6. it is according to claim 5 based on overriding data destroying device, it is characterised in that
Also include:
Unit is set up, for setting up the corresponding relation between overriding number of times and overriding standard.
7. it is according to claim 6 based on overriding data destroying device, it is characterised in that
Also include:
Adjustment unit, for the feedback result according to user, to the corresponding pass between the overriding number of times and the overriding standard
System is adjusted.
8. according to any one of claim 5-7 based on overriding data destroying device, it is characterised in that the overriding
Unit specifically for:
When overriding number of times is 1, override using complete zero overriding standard logarithmic evidence;
When overriding number of times is 2 to 3, standard logarithmic evidence is simply override using DOD5220.22-M and override;
When overriding number of times is 4 to 7, override using 7 erasing standard logarithmics evidences of DOD5220.22-M;
When overriding number of times is 8, override using 8 erasing standard logarithmics evidences of RCMP TSSIT OPS-IID;
When overriding number of times is 9 to 35, override using Gutman erasing standard logarithmic evidences;
When overriding number of times is 36 to 38, entered using 3 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences
Row overriding;
When overriding number of times is 39 to 42, entered using 7 erasing standards of DOD5220.22-M and Gutman erasing standard logarithmic evidences
Row overriding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610977174.2A CN106531196A (en) | 2016-11-07 | 2016-11-07 | Overwriting-based data destroying method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610977174.2A CN106531196A (en) | 2016-11-07 | 2016-11-07 | Overwriting-based data destroying method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106531196A true CN106531196A (en) | 2017-03-22 |
Family
ID=58350362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610977174.2A Pending CN106531196A (en) | 2016-11-07 | 2016-11-07 | Overwriting-based data destroying method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106531196A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107765996A (en) * | 2017-09-25 | 2018-03-06 | 青岛海信移动通信技术股份有限公司 | The method for deleting and device of a kind of data |
CN110196691A (en) * | 2019-06-11 | 2019-09-03 | 苏州浪潮智能科技有限公司 | The method and device of data destroying based on data level of confidentiality and hard disk media type |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007188624A (en) * | 2006-01-12 | 2007-07-26 | Samsung Electronics Co Ltd | Hybrid hard disk drive control method, recording medium, and hybrid hard disk drive |
CN101577700A (en) * | 2008-05-05 | 2009-11-11 | 北京瑞佳晨科技有限公司 | Method for destroying computer disk data based on network environment |
CN103295638A (en) * | 2013-06-06 | 2013-09-11 | 国家电网公司 | Portable electronic storage medium data wiping device and data wiping method based on same |
CN103294960A (en) * | 2013-06-06 | 2013-09-11 | 国家电网公司 | Portable data wiping device based on U disk |
CN103714294A (en) * | 2013-12-24 | 2014-04-09 | 南京邮电大学 | Data overwriting method |
-
2016
- 2016-11-07 CN CN201610977174.2A patent/CN106531196A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007188624A (en) * | 2006-01-12 | 2007-07-26 | Samsung Electronics Co Ltd | Hybrid hard disk drive control method, recording medium, and hybrid hard disk drive |
CN101577700A (en) * | 2008-05-05 | 2009-11-11 | 北京瑞佳晨科技有限公司 | Method for destroying computer disk data based on network environment |
CN103295638A (en) * | 2013-06-06 | 2013-09-11 | 国家电网公司 | Portable electronic storage medium data wiping device and data wiping method based on same |
CN103294960A (en) * | 2013-06-06 | 2013-09-11 | 国家电网公司 | Portable data wiping device based on U disk |
CN103714294A (en) * | 2013-12-24 | 2014-04-09 | 南京邮电大学 | Data overwriting method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107765996A (en) * | 2017-09-25 | 2018-03-06 | 青岛海信移动通信技术股份有限公司 | The method for deleting and device of a kind of data |
CN110196691A (en) * | 2019-06-11 | 2019-09-03 | 苏州浪潮智能科技有限公司 | The method and device of data destroying based on data level of confidentiality and hard disk media type |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wilson et al. | Saudi Arabia: The Coming Storm: The Coming Storm | |
CN106022155B (en) | Method and server for database security management | |
EP1496427A3 (en) | Data processing method with restricted data arrangement, storage area management method, and data processing system | |
CN104573441A (en) | Computer with data privacy function and data encryption and hiding method thereof | |
DE112005002845T5 (en) | Method, device and system for secure data storage | |
CN104484595B (en) | A kind of information processing method and electronic equipment | |
CN109214807A (en) | Method, apparatus, computer equipment and the storage medium of management contribution information | |
CN106531196A (en) | Overwriting-based data destroying method and apparatus | |
Levin et al. | INSIDER: Why are INDC studies reaching different temperature estimates? | |
CN105871558A (en) | Numerical control system authority management method based on USB flash disk physical serial number | |
CN106648938A (en) | Linux system application program memory management method and system | |
CN111147518A (en) | Attack and defense countermeasure based e-mail system security evaluation method and device | |
CN106709380A (en) | Encryption and decryption method and system capable of aiming at disk data memory area | |
Ukiwo | Causes and cures of oil-related Niger Delta conflicts | |
CN103678983A (en) | Smartphone usage permission verification system and method | |
CN105204755A (en) | Soft keyboard operation method and terminal | |
CN103593592B (en) | User data encryption and decryption method | |
Nye | The Future of Russian-American Relations | |
CN104992212B (en) | Tourism smart card system | |
CN107944290B (en) | A kind of iris templates guard method based on partial ordering | |
CN106130968A (en) | A kind of identity identifying method and system | |
CN203799380U (en) | Computer network safety controller | |
Zhan et al. | Consumer adoption of Wi-Fi network: the role of security knowledge, perceived threat and security measures | |
CN103164638A (en) | Content copyright protection method based on removable storage device | |
Sasha Vezhnevets et al. | Options as responses: Grounding behavioural hierarchies in multi-agent RL |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |
|
RJ01 | Rejection of invention patent application after publication |