CN106845261A - A kind of method and device of destruction SSD hard disc datas - Google Patents
A kind of method and device of destruction SSD hard disc datas Download PDFInfo
- Publication number
- CN106845261A CN106845261A CN201710253986.7A CN201710253986A CN106845261A CN 106845261 A CN106845261 A CN 106845261A CN 201710253986 A CN201710253986 A CN 201710253986A CN 106845261 A CN106845261 A CN 106845261A
- Authority
- CN
- China
- Prior art keywords
- data
- ssd hard
- key
- hard disks
- ssd
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 241001269238 Data Species 0.000 title claims abstract description 31
- 230000006378 damage Effects 0.000 title abstract description 26
- 238000003860 storage Methods 0.000 claims abstract description 25
- 230000014759 maintenance of location Effects 0.000 claims description 9
- 230000004913 activation Effects 0.000 claims description 7
- 238000010200 validation analysis Methods 0.000 claims description 6
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 239000007787 solid Substances 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 241000208340 Araliaceae Species 0.000 description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 description 2
- 235000008434 ginseng Nutrition 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of method of destruction SSD hard disc datas, in SSD hard disk initializations, instruction according to user input sets key in the predeterminated position of SSD hard disks, for being encrypted to the data for writing SSD hard disks, then preserve into FLASH chip, when the data of the storage in destroying SSD hard disks, directly key is deleted.Avoid tradition and wipe the method that each piece of FLASH chip carries out destroying data successively, greatly improve the efficiency of SSD hard disc datas destruction, effectively avoid data and leak, so as to ensure that the security of data.Additionally, the embodiment of the present invention is additionally provided realizes device accordingly, further such that methods described has more practicality, described device has corresponding advantage.
Description
Technical field
The present embodiments relate to hard disk design technical field, more particularly to a kind of method of destruction SSD hard disc datas
And device.
Background technology
SSD (Solid State Drives, solid state hard disc), is also solid disk, is with solid-state electronic storage chip array system
Into hard disk, be made up of control unit and memory cell (FLASH chip or dram chip).Solid state hard disc interface specification and
It is identical with common hard disc in definition, function and application method, in product design and size also completely and common hard disc
Unanimously.Due to its stabilization performance and also effectively overcome mechanical hard disk shortcomings, the application of SSD is more and more wider.Solid-state
The storage medium of hard disk is divided into two kinds, and one kind is that, used as storage medium, another is to use using flash memory (FLASH chip)
DRAM is used as storage medium, but FLASH chip property is more stable compared with DRAM.
As a example by SSD hard disks with storage medium as FLASH chip, existing SSD hard disks are visited including operating system data block
Ask response layer, FTL mapping layers, FLASH operation layers and FLASH chip.Upper layer application wants certain file in access hard disk, can pass through
Operating system is converted into assigned block of address data access instruction (multiple of the usual byte of position 512 of block size of data), due to FLASF
Physical characteristic, it is necessary to block data address is converted into FLASH physical address, then the FLASH that will be operated by FTL mapping layers
Physical address is sent to FLASH operation layers, and FLASH operation layers enter according to physical address to one or more FLASH pages of FLASH
Row read-write, and feedback operation result.
When the data in SSD hard disks are deleted, SSD hard disks directly can be carried out into height when data safety is not related to
Level is formatted, i.e., the difference according to file system type wipes a small amount of FLASH blocks, spends the time less.But, if desired
Thoroughly destroy hard disc data, then erasable FLASH blocks that must be one by one.Each FLASH data block on hard disk wipes cost one by one
Time is more long, in case of emergency, may have little time to destroy all data completely, causes leaking data.
In consideration of it, the data in SSD hard disks how are quickly destroyed, so that assuring data security, is art technology
Personnel's problem demanding prompt solution.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method and device of destruction SSD hard disc datas, and SSD is destroyed to improve
The efficiency of data in hard disk, so as to avoid data from leaking, it is ensured that the security of data.
In order to solve the above technical problems, the embodiment of the present invention provides following technical scheme:
On the one hand the embodiment of the present invention provides a kind of method of destruction SSD hard disc datas, including:
The key instruction of user input is received, in SSD hard disk initializations, according to the instruction in the SSD hard disks
Predeterminated position generates key;
When the data write-in SSD hard disks are detected, the data are encrypted using the key, then will added
The FLASH chip of data is activation after close to the SSD hard disks;
When the reception user destroy the data of the SSD hard-disc storages, the key is deleted.
Optionally, also included after the predeterminated position generation key of the SSD hard disks according to the instruction described:
For the SSD hard disks set access rights;
When detect the SSD hard disc datas are written and read when, send the checking information of the access rights;
When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;It is defeated when judging
When the checking information for entering is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that institute
Stating SSD hard disks cannot conduct interviews.
Optionally, the access rights are the key.
Optionally, the data are carried out using the key when the data write-in SSD hard disks are detected described
Also include after encryption:
Whether detect the data to be encrypted according to the key succeed;
When detecting the key and being unsuccessful to the data encryption, the data are added again according to the key
It is close, and return to the instruction of failed encryption.
On the other hand the embodiment of the present invention provides a kind of device of destruction SSD hard disc datas, including:
Key production module, the key for receiving user input is instructed, in SSD hard disk initializations, according to the finger
The predeterminated position in the SSD hard disks is made to generate key;
Data encryption module, for when the data write-in SSD hard disks are detected, using the key to the data
It is encrypted, then by the FLASH chip of the data is activation after encryption to the SSD hard disks;
Data destroying module, for when the reception user destroy the data of the SSD hard-disc storages, by described in
Key is deleted.
Optionally, also specifically included including access rights module:
Permission unit is set, for setting access rights for the SSD hard disks;
Authority Verification unit, for when detect the SSD hard disc datas are written and read when, send the access rights
Checking information;When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;Work as judgement
When the checking information of input is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that
The SSD hard disks cannot conduct interviews.
Optionally, the permission unit that sets is the unit that the SSD hard disks set the key.
Optionally, also include:
Encrypted authentication module, for detecting to be encrypted the data according to the key whether succeed;When detecting
When the key is unsuccessful to the data encryption, the data are encrypted again according to the key, and return to encryption and lost
The instruction for losing.
The embodiment of the invention provides a kind of method of destruction SSD hard disc datas, in SSD hard disk initializations, according to
The instruction of family input sets key in the predeterminated position of SSD hard disks, for being encrypted to the data for writing SSD hard disks,
Then preserve into FLASH chip, when the data of the storage in destroying SSD hard disks, directly deleted key.
The advantage of the technical scheme that the application is provided is to set key by SSD hard disks, and the data to writing are carried out
Encryption, is that must be decrypted using data key when data are read, and can just obtain initial data, when destruction SSD hard disks
During the data of storage, directly key is deleted, the data of storage cannot just be decrypted, and also cannot just be read out, and keep away
Exempt from tradition and wiped the method that each piece of FLASH chip carries out destroying data successively, greatly improve the destruction of SSD hard disc datas
Efficiency, effectively avoid data and leak, so as to ensure that the security of data.
Additionally, the embodiment of the present invention is provided also directed to the method for destroying SSD hard disc datas realizes device accordingly, enter one
Step causes that methods described has more practicality, and described device has corresponding advantage.
Brief description of the drawings
For the clearer explanation embodiment of the present invention or the technical scheme of prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for technology description is briefly described, it should be apparent that, drawings in the following description are only this hair
Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with root
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method for destruction SSD hard disc datas provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another method for destroying SSD hard disc datas provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the method for another destruction SSD hard disc data provided in an embodiment of the present invention;
Fig. 4 is a kind of specific embodiment structure chart of the device of destruction SSD hard disc datas provided in an embodiment of the present invention;
Fig. 5 is another specific embodiment structure of the device of destruction SSD hard disc datas provided in an embodiment of the present invention
Figure.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.Obviously, described embodiment is only a part of embodiment of the invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " " in the description and claims of this application and above-mentioned accompanying drawing
Four " it is etc. for distinguishing different objects, rather than for describing specific order.In addition term " comprising " and " having " and
Their any deformations, it is intended that covering is non-exclusive to be included.For example contain the process of series of steps or unit, method,
System, product or equipment are not limited to the step of having listed or unit, but may include the step of not listing or unit.
Present inventor has found that existing SSD hard disks are generally required one by one when destruction data are carried out by research
Erasable FLASH blocks so that the data of SSD hard-disc storages cannot be recovered, and each the FLASH data block on hard disk is wiped one by one
The cost time is more long, and when needing promptly to carry out destruction data, traditional method shows and is not suitable for.
In consideration of it, the application sets key by SSD hard disks, the data to writing are encrypted, and are when data are read
Must be decrypted using data key, can just obtain initial data, when the data of SSD hard-disc storages are destroyed, directly
Key is deleted, the data of storage cannot just be decrypted, and also cannot just be read out, improve SSD hard disc data pins
The efficiency ruined, effectively avoids the leakage of data, so as to ensure that the security of data.
After the technical scheme for describing the embodiment of the present invention, the various non-limiting reality of detailed description below the application
Apply mode.
Referring firstly to Fig. 1, Fig. 1 is a kind of flow of the method for destruction SSD hard disc datas provided in an embodiment of the present invention
Schematic diagram, the embodiment of the present invention may include herein below:
S101:The key instruction of user input is received, it is hard in the SSD according to the instruction in SSD hard disk initializations
The predeterminated position generation key of disk.
Key is a kind of parameter, is the ginseng being input into plaintext is converted to ciphertext or converts ciphertext into the algorithm of plaintext
Number.
Key can be specified for user, or system is automatically generated, and this does not influence the realization of the application.
The specifying information of key is positioned in SSD hard disks, certain position that user specifies, or system randomly place with
In SSD hard disks, the application does not do any restriction to this.
S102:When the data write-in SSD hard disks are detected, the data are encrypted using the key, so
Afterwards by the FLASH chip of the data is activation after encryption to the SSD hard disks.
Data to be written are encrypted using key, can using symmetric key encryption, i.e. information sender and
Recipient goes encrypting and decrypting data using same key, is suitable for being encrypted big data quantity;Also can use asymmetric
Key encryption is respectively completed encrypt and decrypt operation, including public key and private key using different keys, and information transmitter is used
Public-key cryptography goes encryption, and information receiver then goes decryption with private key;Or the two is combined and is encrypted, this equal not shadow
Ring the realization of the application.
FLASH chip is SSD hard-disc storage chips, when in certain file of hard-disc storage, can be changed by operating system
Into assigned block of address data access instruction, block data address is converted into FLASH physical address by FTL mapping layers, then will
The FLASH physical address of operation is sent to FLASH operation layers, and FLASH operation layers are according to physical address to one or many of FLASH
Individual FLASH pages is written and read.
S103:When the reception user destroy the data of the SSD hard-disc storages, the key is deleted
Remove.
When SSD hard disks destroy, directly key is deleted, cannot thus be entered by key pair encryption data
Row decryption, so as to be read out to initial data, that is, has destroyed data.Directly key is deleted, pin is greatly reduced
The time of data is ruined, the efficiency for destroying data is improve.
In technical scheme provided in an embodiment of the present invention, key is set by SSD hard disks, the data to writing are carried out
Encryption, is that must be decrypted using data key when data are read, and can just obtain initial data, when destruction SSD hard disks
During the data of storage, directly key is deleted, the data of storage cannot just be decrypted, and also cannot just be read out, and keep away
Exempt from tradition and wiped the method that each piece of FLASH chip carries out destroying data successively, greatly improve the destruction of SSD hard disc datas
Efficiency, effectively avoid data and leak, so as to ensure that the security of data.
From above-described embodiment, the deletion of key is the key that data are destroyed to SSD hard disks, thus data key whether
It is successfully factor that determination data is successfully destroyed to encrypt, and based on above-described embodiment, refers to Fig. 2, and the application is also directed to providing
Another embodiment.
S201-S202:Specifically, consistent with described by above-described embodiment S101-S102, here is omitted.
S203:Whether detect the data to be encrypted according to the key succeed.
S204:When detecting the key and being unsuccessful to the data encryption, according to the key to the data again
It is encrypted, and returns to the instruction of failed encryption.
S205:Specifically, consistent with described by above-described embodiment S103, here is omitted.
By to data whether encryption is detected, it is unsuccessful to encrypting, re-encrypted can be carried out, it is further to protect
The security of the data of card.
It should be noted that when to some data repeatedly encryption it is still unsuccessful when, it may be possible to the encryption system of use and
Data have conflict, or other reasonses in itself, so repeat encryption, lose time, it is preferred that settable encryption number of times
(such as three times), after more than the encryption number of times, carry out alarm, and staff carries out analysis judgment to this, quick to repair.
The overall operating efficiency of this system is not only increased, the security of data is also advantageously improved.
In a kind of specific embodiment, when being backed up to key and being stored in the SSD hard disks, then key is entered
After row is deleted, the middle data of SSD hard disks can still rely on the key of backup to be decrypted, so as to be read.
In view of the foregoing, Fig. 3 is referred to, the application still further there is provided one embodiment.
S301:Specifically, consistent with described by above-described embodiment S201, here is omitted.
S302:For the SSD hard disks set access rights.
The access rights of setting can be identical with the key for setting, certainly, also can be different, those skilled in the art can be according to reality
Border situation is chosen.
S303:When detect the SSD hard disc datas are written and read when, send the checking information of the access rights.
S304:When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation.
When checking information passes through, when the instruction for receiving is to read data, then corresponding data are shown;When connecing
Then the instruction for receiving arrives the data is activation after encryption when writing data, to be then encrypted according to the data key for setting
The FLASH chip of SSD hard disks.
S305:When the checking information for judging input is incorrect and input validation number of times reaches predetermined threshold value, by the visit
Ask that authority is deleted, so that the SSD hard disks cannot conduct interviews.
Checking number of times can be 3 times, certainly, or arbitrary number of times, certainly, number of times can not very little, to prevent staff
Mistake and cause;Certainly, also can not be too many, it is to avoid hard disk is trespassed because of conjecture, makes data leak.
Access rights are set by for SSD hard disks, the security of data is further ensure that, are effectively prevented outside data
Let out.
The embodiment of the present invention is provided also directed to the method for destroying SSD hard disc datas and realizes device accordingly, is further made
Obtain methods described and have more practicality.The device to destruction SSD hard disc datas provided in an embodiment of the present invention is introduced below,
The device of destruction SSD hard disc datas described below can mutually corresponding ginseng with the method for above-described destruction SSD hard disc datas
According to.
Referring to Fig. 4, Fig. 4 is the device of destruction SSD hard disc datas provided in an embodiment of the present invention in a kind of specific embodiment party
Structure chart under formula, the device may include:
Key production module 401, the key for receiving user input is instructed, in SSD hard disk initializations, according to described
The predeterminated position in the SSD hard disks is instructed to generate key.
Data encryption module 402, for when the data write-in SSD hard disks are detected, using the key to described
Data are encrypted, then by the FLASH chip of the data is activation after encryption to the SSD hard disks.
Data destroying module 403, for when the reception user destroy the data of the SSD hard-disc storages, inciting somebody to action
The key is deleted.
Optionally, in some implementation methods of the present embodiment, Fig. 5 is referred to, described device for example can be with access right
Limit module 404, specifically may include:
Permission unit 4041 is set, for setting access rights for the SSD hard disks;
Authority Verification unit 3042, for when detect the SSD hard disc datas are written and read when, send the access
The checking information of authority;When the checking information for judging input is correct, corresponding data is opened up in the instruction according to read-write data
Show;When the checking information for judging input is incorrect and input validation number of times reaches predetermined threshold value, the access rights are carried out
Delete, so that the SSD hard disks cannot conduct interviews.
Optionally, in other implementation methods of the present embodiment, Fig. 5 is referred to, described device can also for example include:
Encrypted authentication module 405, for detecting to be encrypted the data according to the key whether succeed;Work as detection
To the key it is unsuccessful to the data encryption when, the data are encrypted again according to the key, and return to encryption
The instruction of failure.
The function that each functional module of the device of SSD hard disc datas is destroyed described in the embodiment of the present invention can be according to the above method
Method in embodiment is implemented, and it implements the associated description that process is referred to above method embodiment, herein not
Repeat again.
From the foregoing, it will be observed that the embodiment of the present invention sets key by SSD hard disks, the data to writing are encrypted, and work as reading
Access can just obtain initial data according to being that must be decrypted using data key, when the data for destroying SSD hard-disc storages
When, directly key is deleted, the data of storage cannot just be decrypted, also cannot just be read out, it is to avoid tradition according to
Secondary each piece of FLASH chip of erasing carries out the method for destroying data, greatly improves the efficiency of SSD hard disc datas destruction, has
The data that avoid of effect leak, so as to ensure that the security of data.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and other
The difference of embodiment, between each embodiment same or similar part mutually referring to.For being filled disclosed in embodiment
For putting, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is referring to method part
Illustrate.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description
And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These
Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty
Technical staff can realize described function to each specific application using distinct methods, but this realization should not
Think beyond the scope of this invention.
The step of method or algorithm for being described with reference to the embodiments described herein, directly can be held with hardware, processor
Capable software module, or the two combination is implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In field in known any other form of storage medium.
The method and device to a kind of destruction SSD hard disc datas provided by the present invention are described in detail above.
Specific case used herein is set forth to principle of the invention and implementation method, and the explanation of above example is use
Understand the method for the present invention and its core concept in help.It should be pointed out that for those skilled in the art,
Under the premise without departing from the principles of the invention, some improvement and modification can also be carried out to the present invention, these improve and modify
Fall into the protection domain of the claims in the present invention.
Claims (8)
1. it is a kind of to destroy SSD hard disc data methods, it is characterised in that including:
The key instruction of user input is received, in SSD hard disk initializations, according to the instruction in the default of the SSD hard disks
Position generates key;
When the data write-in SSD hard disks are detected, the data are encrypted using the key, after then encrypting
Data is activation to the SSD hard disks FLASH chip;
When the reception user destroy the data of the SSD hard-disc storages, the key is deleted.
2. method according to claim 1, it is characterised in that it is described according to the instruction in the pre- of the SSD hard disks
If also including after position generation key:
For the SSD hard disks set access rights;
When detect the SSD hard disc datas are written and read when, send the checking information of the access rights;
When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;When judgement input
When checking information is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that the SSD
Hard disk cannot conduct interviews.
3. method according to claim 2, it is characterised in that the access rights are the key.
4. the method according to claims 1 to 3 any one, it is characterised in that described when detecting data write-in institute
When stating SSD hard disks, also include after being encrypted to the data using the key:
Whether detect the data to be encrypted according to the key succeed;
When detecting the key and being unsuccessful to the data encryption, the data are encrypted again according to the key,
And return to the instruction of failed encryption.
5. it is a kind of to destroy SSD hard disc data devices, it is characterised in that including:
Key production module, the key for receiving user input is instructed, and in SSD hard disk initializations, is existed according to the instruction
The predeterminated position generation key of the SSD hard disks;
Data encryption module, for when the data write-in SSD hard disks are detected, being carried out to the data using the key
Encryption, then by the FLASH chip of the data is activation after encryption to the SSD hard disks;
Data destroying module, for when the reception user destroy the data of the SSD hard-disc storages, by the key
Deleted.
6. device according to claim 5, it is characterised in that also including access rights module, specifically include:
Permission unit is set, for setting access rights for the SSD hard disks;
Authority Verification unit, for when detect the SSD hard disc datas are written and read when, send the access rights and test
Card information;When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;When judgement is input into
When checking information is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that described
SSD hard disks cannot conduct interviews.
7. device according to claim 6, it is characterised in that the setting permission unit is that the SSD hard disks set institute
State the unit of key.
8. device according to claim 7, it is characterised in that also include:
Encrypted authentication module, for detecting to be encrypted the data according to the key whether succeed;It is described when detecting
When key is unsuccessful to the data encryption, the data are encrypted again according to the key, and return to failed encryption
Instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710253986.7A CN106845261A (en) | 2017-04-18 | 2017-04-18 | A kind of method and device of destruction SSD hard disc datas |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710253986.7A CN106845261A (en) | 2017-04-18 | 2017-04-18 | A kind of method and device of destruction SSD hard disc datas |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106845261A true CN106845261A (en) | 2017-06-13 |
Family
ID=59146933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710253986.7A Pending CN106845261A (en) | 2017-04-18 | 2017-04-18 | A kind of method and device of destruction SSD hard disc datas |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845261A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109190365A (en) * | 2018-08-01 | 2019-01-11 | 杭州电子科技大学 | A kind of solid state hard disk data protection system based on USB flash disk authentication |
CN109766731A (en) * | 2019-01-11 | 2019-05-17 | 深圳忆联信息系统有限公司 | Encryption data processing method, device and computer equipment based on solid state hard disk |
CN109933542A (en) * | 2019-02-27 | 2019-06-25 | 记忆科技(深圳)有限公司 | Based on solid state hard disk AES key dynamic management approach and device |
CN110196691A (en) * | 2019-06-11 | 2019-09-03 | 苏州浪潮智能科技有限公司 | The method and device of data destroying based on data level of confidentiality and hard disk media type |
CN112286463A (en) * | 2020-10-30 | 2021-01-29 | 南方电网科学研究院有限责任公司 | Data processing method, device, equipment and storage medium |
CN113673004A (en) * | 2021-08-09 | 2021-11-19 | 国网重庆市电力公司电力科学研究院 | Data destruction method based on classification |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101082883A (en) * | 2006-05-31 | 2007-12-05 | 朴显泽 | Storage apparatus having multiple layer encrypting protection |
CN102508791A (en) * | 2011-09-28 | 2012-06-20 | 梁守龙 | Method and device for encrypting hard disk partition |
WO2012162128A1 (en) * | 2011-05-20 | 2012-11-29 | Citrix Systems, Inc. | Securing encrypted virtual hard disks |
CN103440209A (en) * | 2013-07-19 | 2013-12-11 | 记忆科技(深圳)有限公司 | Solid state hard disk data encryption and decryption method and solid state hard disk system |
CN104636688A (en) * | 2015-02-25 | 2015-05-20 | 山东超越数控电子有限公司 | Method for implementing security firmware on basis of solid-state disk |
CN105046173A (en) * | 2015-07-02 | 2015-11-11 | 山东超越数控电子有限公司 | Fast and reliable design method for destroying SSD hard disk |
CN105893880A (en) * | 2016-04-12 | 2016-08-24 | 浪潮集团有限公司 | Encryption solid-state disk with timed destruction function and destruction method thereof |
-
2017
- 2017-04-18 CN CN201710253986.7A patent/CN106845261A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101082883A (en) * | 2006-05-31 | 2007-12-05 | 朴显泽 | Storage apparatus having multiple layer encrypting protection |
WO2012162128A1 (en) * | 2011-05-20 | 2012-11-29 | Citrix Systems, Inc. | Securing encrypted virtual hard disks |
CN102508791A (en) * | 2011-09-28 | 2012-06-20 | 梁守龙 | Method and device for encrypting hard disk partition |
CN103440209A (en) * | 2013-07-19 | 2013-12-11 | 记忆科技(深圳)有限公司 | Solid state hard disk data encryption and decryption method and solid state hard disk system |
CN104636688A (en) * | 2015-02-25 | 2015-05-20 | 山东超越数控电子有限公司 | Method for implementing security firmware on basis of solid-state disk |
CN105046173A (en) * | 2015-07-02 | 2015-11-11 | 山东超越数控电子有限公司 | Fast and reliable design method for destroying SSD hard disk |
CN105893880A (en) * | 2016-04-12 | 2016-08-24 | 浪潮集团有限公司 | Encryption solid-state disk with timed destruction function and destruction method thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109190365A (en) * | 2018-08-01 | 2019-01-11 | 杭州电子科技大学 | A kind of solid state hard disk data protection system based on USB flash disk authentication |
CN109766731A (en) * | 2019-01-11 | 2019-05-17 | 深圳忆联信息系统有限公司 | Encryption data processing method, device and computer equipment based on solid state hard disk |
CN109766731B (en) * | 2019-01-11 | 2021-01-19 | 深圳忆联信息系统有限公司 | Encrypted data processing method and device based on solid state disk and computer equipment |
CN109933542A (en) * | 2019-02-27 | 2019-06-25 | 记忆科技(深圳)有限公司 | Based on solid state hard disk AES key dynamic management approach and device |
CN110196691A (en) * | 2019-06-11 | 2019-09-03 | 苏州浪潮智能科技有限公司 | The method and device of data destroying based on data level of confidentiality and hard disk media type |
CN112286463A (en) * | 2020-10-30 | 2021-01-29 | 南方电网科学研究院有限责任公司 | Data processing method, device, equipment and storage medium |
CN113673004A (en) * | 2021-08-09 | 2021-11-19 | 国网重庆市电力公司电力科学研究院 | Data destruction method based on classification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103065102B (en) | Data encryption mobile storage management method based on virtual disk | |
CN106845261A (en) | A kind of method and device of destruction SSD hard disc datas | |
US9483664B2 (en) | Address dependent data encryption | |
Skillen et al. | On implementing deniable storage encryption for mobile devices | |
CN102945355B (en) | Fast Data Encipherment strategy based on sector map is deferred to | |
US8464073B2 (en) | Method and system for secure data storage | |
Skillen et al. | Mobiflage: Deniable storage encryptionfor mobile devices | |
CN202795383U (en) | Device and system for protecting data | |
CN104951409A (en) | System and method for full disk encryption based on hardware | |
KR101303278B1 (en) | FPGA apparatus and method for protecting bitstream | |
CN105389265B (en) | The method and apparatus of zero content are generated on junk data when encryption parameter changes | |
CN104090853A (en) | Solid-state disc encryption method and system | |
CN101441601B (en) | Ciphering transmission method of hard disk ATA instruction and system | |
Lee et al. | Secure Data Deletion for USB Flash Memory. | |
Swanson et al. | Safe: Fast, verifiable sanitization for ssds | |
CN106415585A (en) | Key extraction during secure boot | |
KR20150026915A (en) | Virtual bands concentration for self encrypting drives | |
CN109190401A (en) | A kind of date storage method, device and the associated component of Qemu virtual credible root | |
CN110533142A (en) | A kind of encrypted U disk and USB flash disk partition method | |
CN108491724A (en) | A kind of hardware based computer interface encryption device and method | |
CN110659506A (en) | Replay protection of memory based on key refresh | |
Zhang et al. | Ensuring data confidentiality via plausibly deniable encryption and secure deletion–a survey | |
CN106682521A (en) | File transparent encryption and decryption system and method based on driver layer | |
US8683088B2 (en) | Peripheral device data integrity | |
US9003201B2 (en) | Hardware protection for encrypted strings and protection of security parameters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |