CN106845261A - A kind of method and device of destruction SSD hard disc datas - Google Patents

A kind of method and device of destruction SSD hard disc datas Download PDF

Info

Publication number
CN106845261A
CN106845261A CN201710253986.7A CN201710253986A CN106845261A CN 106845261 A CN106845261 A CN 106845261A CN 201710253986 A CN201710253986 A CN 201710253986A CN 106845261 A CN106845261 A CN 106845261A
Authority
CN
China
Prior art keywords
data
ssd hard
key
hard disks
ssd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710253986.7A
Other languages
Chinese (zh)
Inventor
张闯
陈继承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Inspur Smart Computing Technology Co Ltd
Original Assignee
Guangdong Inspur Big Data Research Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Inspur Big Data Research Co Ltd filed Critical Guangdong Inspur Big Data Research Co Ltd
Priority to CN201710253986.7A priority Critical patent/CN106845261A/en
Publication of CN106845261A publication Critical patent/CN106845261A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of method of destruction SSD hard disc datas, in SSD hard disk initializations, instruction according to user input sets key in the predeterminated position of SSD hard disks, for being encrypted to the data for writing SSD hard disks, then preserve into FLASH chip, when the data of the storage in destroying SSD hard disks, directly key is deleted.Avoid tradition and wipe the method that each piece of FLASH chip carries out destroying data successively, greatly improve the efficiency of SSD hard disc datas destruction, effectively avoid data and leak, so as to ensure that the security of data.Additionally, the embodiment of the present invention is additionally provided realizes device accordingly, further such that methods described has more practicality, described device has corresponding advantage.

Description

A kind of method and device of destruction SSD hard disc datas
Technical field
The present embodiments relate to hard disk design technical field, more particularly to a kind of method of destruction SSD hard disc datas And device.
Background technology
SSD (Solid State Drives, solid state hard disc), is also solid disk, is with solid-state electronic storage chip array system Into hard disk, be made up of control unit and memory cell (FLASH chip or dram chip).Solid state hard disc interface specification and It is identical with common hard disc in definition, function and application method, in product design and size also completely and common hard disc Unanimously.Due to its stabilization performance and also effectively overcome mechanical hard disk shortcomings, the application of SSD is more and more wider.Solid-state The storage medium of hard disk is divided into two kinds, and one kind is that, used as storage medium, another is to use using flash memory (FLASH chip) DRAM is used as storage medium, but FLASH chip property is more stable compared with DRAM.
As a example by SSD hard disks with storage medium as FLASH chip, existing SSD hard disks are visited including operating system data block Ask response layer, FTL mapping layers, FLASH operation layers and FLASH chip.Upper layer application wants certain file in access hard disk, can pass through Operating system is converted into assigned block of address data access instruction (multiple of the usual byte of position 512 of block size of data), due to FLASF Physical characteristic, it is necessary to block data address is converted into FLASH physical address, then the FLASH that will be operated by FTL mapping layers Physical address is sent to FLASH operation layers, and FLASH operation layers enter according to physical address to one or more FLASH pages of FLASH Row read-write, and feedback operation result.
When the data in SSD hard disks are deleted, SSD hard disks directly can be carried out into height when data safety is not related to Level is formatted, i.e., the difference according to file system type wipes a small amount of FLASH blocks, spends the time less.But, if desired Thoroughly destroy hard disc data, then erasable FLASH blocks that must be one by one.Each FLASH data block on hard disk wipes cost one by one Time is more long, in case of emergency, may have little time to destroy all data completely, causes leaking data.
In consideration of it, the data in SSD hard disks how are quickly destroyed, so that assuring data security, is art technology Personnel's problem demanding prompt solution.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method and device of destruction SSD hard disc datas, and SSD is destroyed to improve The efficiency of data in hard disk, so as to avoid data from leaking, it is ensured that the security of data.
In order to solve the above technical problems, the embodiment of the present invention provides following technical scheme:
On the one hand the embodiment of the present invention provides a kind of method of destruction SSD hard disc datas, including:
The key instruction of user input is received, in SSD hard disk initializations, according to the instruction in the SSD hard disks Predeterminated position generates key;
When the data write-in SSD hard disks are detected, the data are encrypted using the key, then will added The FLASH chip of data is activation after close to the SSD hard disks;
When the reception user destroy the data of the SSD hard-disc storages, the key is deleted.
Optionally, also included after the predeterminated position generation key of the SSD hard disks according to the instruction described:
For the SSD hard disks set access rights;
When detect the SSD hard disc datas are written and read when, send the checking information of the access rights;
When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;It is defeated when judging When the checking information for entering is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that institute Stating SSD hard disks cannot conduct interviews.
Optionally, the access rights are the key.
Optionally, the data are carried out using the key when the data write-in SSD hard disks are detected described Also include after encryption:
Whether detect the data to be encrypted according to the key succeed;
When detecting the key and being unsuccessful to the data encryption, the data are added again according to the key It is close, and return to the instruction of failed encryption.
On the other hand the embodiment of the present invention provides a kind of device of destruction SSD hard disc datas, including:
Key production module, the key for receiving user input is instructed, in SSD hard disk initializations, according to the finger The predeterminated position in the SSD hard disks is made to generate key;
Data encryption module, for when the data write-in SSD hard disks are detected, using the key to the data It is encrypted, then by the FLASH chip of the data is activation after encryption to the SSD hard disks;
Data destroying module, for when the reception user destroy the data of the SSD hard-disc storages, by described in Key is deleted.
Optionally, also specifically included including access rights module:
Permission unit is set, for setting access rights for the SSD hard disks;
Authority Verification unit, for when detect the SSD hard disc datas are written and read when, send the access rights Checking information;When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;Work as judgement When the checking information of input is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that The SSD hard disks cannot conduct interviews.
Optionally, the permission unit that sets is the unit that the SSD hard disks set the key.
Optionally, also include:
Encrypted authentication module, for detecting to be encrypted the data according to the key whether succeed;When detecting When the key is unsuccessful to the data encryption, the data are encrypted again according to the key, and return to encryption and lost The instruction for losing.
The embodiment of the invention provides a kind of method of destruction SSD hard disc datas, in SSD hard disk initializations, according to The instruction of family input sets key in the predeterminated position of SSD hard disks, for being encrypted to the data for writing SSD hard disks, Then preserve into FLASH chip, when the data of the storage in destroying SSD hard disks, directly deleted key.
The advantage of the technical scheme that the application is provided is to set key by SSD hard disks, and the data to writing are carried out Encryption, is that must be decrypted using data key when data are read, and can just obtain initial data, when destruction SSD hard disks During the data of storage, directly key is deleted, the data of storage cannot just be decrypted, and also cannot just be read out, and keep away Exempt from tradition and wiped the method that each piece of FLASH chip carries out destroying data successively, greatly improve the destruction of SSD hard disc datas Efficiency, effectively avoid data and leak, so as to ensure that the security of data.
Additionally, the embodiment of the present invention is provided also directed to the method for destroying SSD hard disc datas realizes device accordingly, enter one Step causes that methods described has more practicality, and described device has corresponding advantage.
Brief description of the drawings
For the clearer explanation embodiment of the present invention or the technical scheme of prior art, below will be to embodiment or existing The accompanying drawing to be used needed for technology description is briefly described, it should be apparent that, drawings in the following description are only this hair Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with root Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method for destruction SSD hard disc datas provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another method for destroying SSD hard disc datas provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the method for another destruction SSD hard disc data provided in an embodiment of the present invention;
Fig. 4 is a kind of specific embodiment structure chart of the device of destruction SSD hard disc datas provided in an embodiment of the present invention;
Fig. 5 is another specific embodiment structure of the device of destruction SSD hard disc datas provided in an embodiment of the present invention Figure.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description The present invention is described in further detail.Obviously, described embodiment is only a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " " in the description and claims of this application and above-mentioned accompanying drawing Four " it is etc. for distinguishing different objects, rather than for describing specific order.In addition term " comprising " and " having " and Their any deformations, it is intended that covering is non-exclusive to be included.For example contain the process of series of steps or unit, method, System, product or equipment are not limited to the step of having listed or unit, but may include the step of not listing or unit.
Present inventor has found that existing SSD hard disks are generally required one by one when destruction data are carried out by research Erasable FLASH blocks so that the data of SSD hard-disc storages cannot be recovered, and each the FLASH data block on hard disk is wiped one by one The cost time is more long, and when needing promptly to carry out destruction data, traditional method shows and is not suitable for.
In consideration of it, the application sets key by SSD hard disks, the data to writing are encrypted, and are when data are read Must be decrypted using data key, can just obtain initial data, when the data of SSD hard-disc storages are destroyed, directly Key is deleted, the data of storage cannot just be decrypted, and also cannot just be read out, improve SSD hard disc data pins The efficiency ruined, effectively avoids the leakage of data, so as to ensure that the security of data.
After the technical scheme for describing the embodiment of the present invention, the various non-limiting reality of detailed description below the application Apply mode.
Referring firstly to Fig. 1, Fig. 1 is a kind of flow of the method for destruction SSD hard disc datas provided in an embodiment of the present invention Schematic diagram, the embodiment of the present invention may include herein below:
S101:The key instruction of user input is received, it is hard in the SSD according to the instruction in SSD hard disk initializations The predeterminated position generation key of disk.
Key is a kind of parameter, is the ginseng being input into plaintext is converted to ciphertext or converts ciphertext into the algorithm of plaintext Number.
Key can be specified for user, or system is automatically generated, and this does not influence the realization of the application.
The specifying information of key is positioned in SSD hard disks, certain position that user specifies, or system randomly place with In SSD hard disks, the application does not do any restriction to this.
S102:When the data write-in SSD hard disks are detected, the data are encrypted using the key, so Afterwards by the FLASH chip of the data is activation after encryption to the SSD hard disks.
Data to be written are encrypted using key, can using symmetric key encryption, i.e. information sender and Recipient goes encrypting and decrypting data using same key, is suitable for being encrypted big data quantity;Also can use asymmetric Key encryption is respectively completed encrypt and decrypt operation, including public key and private key using different keys, and information transmitter is used Public-key cryptography goes encryption, and information receiver then goes decryption with private key;Or the two is combined and is encrypted, this equal not shadow Ring the realization of the application.
FLASH chip is SSD hard-disc storage chips, when in certain file of hard-disc storage, can be changed by operating system Into assigned block of address data access instruction, block data address is converted into FLASH physical address by FTL mapping layers, then will The FLASH physical address of operation is sent to FLASH operation layers, and FLASH operation layers are according to physical address to one or many of FLASH Individual FLASH pages is written and read.
S103:When the reception user destroy the data of the SSD hard-disc storages, the key is deleted Remove.
When SSD hard disks destroy, directly key is deleted, cannot thus be entered by key pair encryption data Row decryption, so as to be read out to initial data, that is, has destroyed data.Directly key is deleted, pin is greatly reduced The time of data is ruined, the efficiency for destroying data is improve.
In technical scheme provided in an embodiment of the present invention, key is set by SSD hard disks, the data to writing are carried out Encryption, is that must be decrypted using data key when data are read, and can just obtain initial data, when destruction SSD hard disks During the data of storage, directly key is deleted, the data of storage cannot just be decrypted, and also cannot just be read out, and keep away Exempt from tradition and wiped the method that each piece of FLASH chip carries out destroying data successively, greatly improve the destruction of SSD hard disc datas Efficiency, effectively avoid data and leak, so as to ensure that the security of data.
From above-described embodiment, the deletion of key is the key that data are destroyed to SSD hard disks, thus data key whether It is successfully factor that determination data is successfully destroyed to encrypt, and based on above-described embodiment, refers to Fig. 2, and the application is also directed to providing Another embodiment.
S201-S202:Specifically, consistent with described by above-described embodiment S101-S102, here is omitted.
S203:Whether detect the data to be encrypted according to the key succeed.
S204:When detecting the key and being unsuccessful to the data encryption, according to the key to the data again It is encrypted, and returns to the instruction of failed encryption.
S205:Specifically, consistent with described by above-described embodiment S103, here is omitted.
By to data whether encryption is detected, it is unsuccessful to encrypting, re-encrypted can be carried out, it is further to protect The security of the data of card.
It should be noted that when to some data repeatedly encryption it is still unsuccessful when, it may be possible to the encryption system of use and Data have conflict, or other reasonses in itself, so repeat encryption, lose time, it is preferred that settable encryption number of times (such as three times), after more than the encryption number of times, carry out alarm, and staff carries out analysis judgment to this, quick to repair. The overall operating efficiency of this system is not only increased, the security of data is also advantageously improved.
In a kind of specific embodiment, when being backed up to key and being stored in the SSD hard disks, then key is entered After row is deleted, the middle data of SSD hard disks can still rely on the key of backup to be decrypted, so as to be read.
In view of the foregoing, Fig. 3 is referred to, the application still further there is provided one embodiment.
S301:Specifically, consistent with described by above-described embodiment S201, here is omitted.
S302:For the SSD hard disks set access rights.
The access rights of setting can be identical with the key for setting, certainly, also can be different, those skilled in the art can be according to reality Border situation is chosen.
S303:When detect the SSD hard disc datas are written and read when, send the checking information of the access rights.
S304:When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation.
When checking information passes through, when the instruction for receiving is to read data, then corresponding data are shown;When connecing Then the instruction for receiving arrives the data is activation after encryption when writing data, to be then encrypted according to the data key for setting The FLASH chip of SSD hard disks.
S305:When the checking information for judging input is incorrect and input validation number of times reaches predetermined threshold value, by the visit Ask that authority is deleted, so that the SSD hard disks cannot conduct interviews.
Checking number of times can be 3 times, certainly, or arbitrary number of times, certainly, number of times can not very little, to prevent staff Mistake and cause;Certainly, also can not be too many, it is to avoid hard disk is trespassed because of conjecture, makes data leak.
Access rights are set by for SSD hard disks, the security of data is further ensure that, are effectively prevented outside data Let out.
The embodiment of the present invention is provided also directed to the method for destroying SSD hard disc datas and realizes device accordingly, is further made Obtain methods described and have more practicality.The device to destruction SSD hard disc datas provided in an embodiment of the present invention is introduced below, The device of destruction SSD hard disc datas described below can mutually corresponding ginseng with the method for above-described destruction SSD hard disc datas According to.
Referring to Fig. 4, Fig. 4 is the device of destruction SSD hard disc datas provided in an embodiment of the present invention in a kind of specific embodiment party Structure chart under formula, the device may include:
Key production module 401, the key for receiving user input is instructed, in SSD hard disk initializations, according to described The predeterminated position in the SSD hard disks is instructed to generate key.
Data encryption module 402, for when the data write-in SSD hard disks are detected, using the key to described Data are encrypted, then by the FLASH chip of the data is activation after encryption to the SSD hard disks.
Data destroying module 403, for when the reception user destroy the data of the SSD hard-disc storages, inciting somebody to action The key is deleted.
Optionally, in some implementation methods of the present embodiment, Fig. 5 is referred to, described device for example can be with access right Limit module 404, specifically may include:
Permission unit 4041 is set, for setting access rights for the SSD hard disks;
Authority Verification unit 3042, for when detect the SSD hard disc datas are written and read when, send the access The checking information of authority;When the checking information for judging input is correct, corresponding data is opened up in the instruction according to read-write data Show;When the checking information for judging input is incorrect and input validation number of times reaches predetermined threshold value, the access rights are carried out Delete, so that the SSD hard disks cannot conduct interviews.
Optionally, in other implementation methods of the present embodiment, Fig. 5 is referred to, described device can also for example include:
Encrypted authentication module 405, for detecting to be encrypted the data according to the key whether succeed;Work as detection To the key it is unsuccessful to the data encryption when, the data are encrypted again according to the key, and return to encryption The instruction of failure.
The function that each functional module of the device of SSD hard disc datas is destroyed described in the embodiment of the present invention can be according to the above method Method in embodiment is implemented, and it implements the associated description that process is referred to above method embodiment, herein not Repeat again.
From the foregoing, it will be observed that the embodiment of the present invention sets key by SSD hard disks, the data to writing are encrypted, and work as reading Access can just obtain initial data according to being that must be decrypted using data key, when the data for destroying SSD hard-disc storages When, directly key is deleted, the data of storage cannot just be decrypted, also cannot just be read out, it is to avoid tradition according to Secondary each piece of FLASH chip of erasing carries out the method for destroying data, greatly improves the efficiency of SSD hard disc datas destruction, has The data that avoid of effect leak, so as to ensure that the security of data.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and other The difference of embodiment, between each embodiment same or similar part mutually referring to.For being filled disclosed in embodiment For putting, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is referring to method part Illustrate.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can realize described function to each specific application using distinct methods, but this realization should not Think beyond the scope of this invention.
The step of method or algorithm for being described with reference to the embodiments described herein, directly can be held with hardware, processor Capable software module, or the two combination is implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In field in known any other form of storage medium.
The method and device to a kind of destruction SSD hard disc datas provided by the present invention are described in detail above. Specific case used herein is set forth to principle of the invention and implementation method, and the explanation of above example is use Understand the method for the present invention and its core concept in help.It should be pointed out that for those skilled in the art, Under the premise without departing from the principles of the invention, some improvement and modification can also be carried out to the present invention, these improve and modify Fall into the protection domain of the claims in the present invention.

Claims (8)

1. it is a kind of to destroy SSD hard disc data methods, it is characterised in that including:
The key instruction of user input is received, in SSD hard disk initializations, according to the instruction in the default of the SSD hard disks Position generates key;
When the data write-in SSD hard disks are detected, the data are encrypted using the key, after then encrypting Data is activation to the SSD hard disks FLASH chip;
When the reception user destroy the data of the SSD hard-disc storages, the key is deleted.
2. method according to claim 1, it is characterised in that it is described according to the instruction in the pre- of the SSD hard disks If also including after position generation key:
For the SSD hard disks set access rights;
When detect the SSD hard disc datas are written and read when, send the checking information of the access rights;
When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;When judgement input When checking information is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that the SSD Hard disk cannot conduct interviews.
3. method according to claim 2, it is characterised in that the access rights are the key.
4. the method according to claims 1 to 3 any one, it is characterised in that described when detecting data write-in institute When stating SSD hard disks, also include after being encrypted to the data using the key:
Whether detect the data to be encrypted according to the key succeed;
When detecting the key and being unsuccessful to the data encryption, the data are encrypted again according to the key, And return to the instruction of failed encryption.
5. it is a kind of to destroy SSD hard disc data devices, it is characterised in that including:
Key production module, the key for receiving user input is instructed, and in SSD hard disk initializations, is existed according to the instruction The predeterminated position generation key of the SSD hard disks;
Data encryption module, for when the data write-in SSD hard disks are detected, being carried out to the data using the key Encryption, then by the FLASH chip of the data is activation after encryption to the SSD hard disks;
Data destroying module, for when the reception user destroy the data of the SSD hard-disc storages, by the key Deleted.
6. device according to claim 5, it is characterised in that also including access rights module, specifically include:
Permission unit is set, for setting access rights for the SSD hard disks;
Authority Verification unit, for when detect the SSD hard disc datas are written and read when, send the access rights and test Card information;When the checking information for judging input is correct, the instruction according to read-write data performs corresponding operation;When judgement is input into When checking information is incorrect and input validation number of times reaches predetermined threshold value, the access rights are deleted, so that described SSD hard disks cannot conduct interviews.
7. device according to claim 6, it is characterised in that the setting permission unit is that the SSD hard disks set institute State the unit of key.
8. device according to claim 7, it is characterised in that also include:
Encrypted authentication module, for detecting to be encrypted the data according to the key whether succeed;It is described when detecting When key is unsuccessful to the data encryption, the data are encrypted again according to the key, and return to failed encryption Instruction.
CN201710253986.7A 2017-04-18 2017-04-18 A kind of method and device of destruction SSD hard disc datas Pending CN106845261A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710253986.7A CN106845261A (en) 2017-04-18 2017-04-18 A kind of method and device of destruction SSD hard disc datas

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710253986.7A CN106845261A (en) 2017-04-18 2017-04-18 A kind of method and device of destruction SSD hard disc datas

Publications (1)

Publication Number Publication Date
CN106845261A true CN106845261A (en) 2017-06-13

Family

ID=59146933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710253986.7A Pending CN106845261A (en) 2017-04-18 2017-04-18 A kind of method and device of destruction SSD hard disc datas

Country Status (1)

Country Link
CN (1) CN106845261A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190365A (en) * 2018-08-01 2019-01-11 杭州电子科技大学 A kind of solid state hard disk data protection system based on USB flash disk authentication
CN109766731A (en) * 2019-01-11 2019-05-17 深圳忆联信息系统有限公司 Encryption data processing method, device and computer equipment based on solid state hard disk
CN109933542A (en) * 2019-02-27 2019-06-25 记忆科技(深圳)有限公司 Based on solid state hard disk AES key dynamic management approach and device
CN110196691A (en) * 2019-06-11 2019-09-03 苏州浪潮智能科技有限公司 The method and device of data destroying based on data level of confidentiality and hard disk media type
CN112286463A (en) * 2020-10-30 2021-01-29 南方电网科学研究院有限责任公司 Data processing method, device, equipment and storage medium
CN113673004A (en) * 2021-08-09 2021-11-19 国网重庆市电力公司电力科学研究院 Data destruction method based on classification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082883A (en) * 2006-05-31 2007-12-05 朴显泽 Storage apparatus having multiple layer encrypting protection
CN102508791A (en) * 2011-09-28 2012-06-20 梁守龙 Method and device for encrypting hard disk partition
WO2012162128A1 (en) * 2011-05-20 2012-11-29 Citrix Systems, Inc. Securing encrypted virtual hard disks
CN103440209A (en) * 2013-07-19 2013-12-11 记忆科技(深圳)有限公司 Solid state hard disk data encryption and decryption method and solid state hard disk system
CN104636688A (en) * 2015-02-25 2015-05-20 山东超越数控电子有限公司 Method for implementing security firmware on basis of solid-state disk
CN105046173A (en) * 2015-07-02 2015-11-11 山东超越数控电子有限公司 Fast and reliable design method for destroying SSD hard disk
CN105893880A (en) * 2016-04-12 2016-08-24 浪潮集团有限公司 Encryption solid-state disk with timed destruction function and destruction method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082883A (en) * 2006-05-31 2007-12-05 朴显泽 Storage apparatus having multiple layer encrypting protection
WO2012162128A1 (en) * 2011-05-20 2012-11-29 Citrix Systems, Inc. Securing encrypted virtual hard disks
CN102508791A (en) * 2011-09-28 2012-06-20 梁守龙 Method and device for encrypting hard disk partition
CN103440209A (en) * 2013-07-19 2013-12-11 记忆科技(深圳)有限公司 Solid state hard disk data encryption and decryption method and solid state hard disk system
CN104636688A (en) * 2015-02-25 2015-05-20 山东超越数控电子有限公司 Method for implementing security firmware on basis of solid-state disk
CN105046173A (en) * 2015-07-02 2015-11-11 山东超越数控电子有限公司 Fast and reliable design method for destroying SSD hard disk
CN105893880A (en) * 2016-04-12 2016-08-24 浪潮集团有限公司 Encryption solid-state disk with timed destruction function and destruction method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190365A (en) * 2018-08-01 2019-01-11 杭州电子科技大学 A kind of solid state hard disk data protection system based on USB flash disk authentication
CN109766731A (en) * 2019-01-11 2019-05-17 深圳忆联信息系统有限公司 Encryption data processing method, device and computer equipment based on solid state hard disk
CN109766731B (en) * 2019-01-11 2021-01-19 深圳忆联信息系统有限公司 Encrypted data processing method and device based on solid state disk and computer equipment
CN109933542A (en) * 2019-02-27 2019-06-25 记忆科技(深圳)有限公司 Based on solid state hard disk AES key dynamic management approach and device
CN110196691A (en) * 2019-06-11 2019-09-03 苏州浪潮智能科技有限公司 The method and device of data destroying based on data level of confidentiality and hard disk media type
CN112286463A (en) * 2020-10-30 2021-01-29 南方电网科学研究院有限责任公司 Data processing method, device, equipment and storage medium
CN113673004A (en) * 2021-08-09 2021-11-19 国网重庆市电力公司电力科学研究院 Data destruction method based on classification

Similar Documents

Publication Publication Date Title
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
CN106845261A (en) A kind of method and device of destruction SSD hard disc datas
US9483664B2 (en) Address dependent data encryption
Skillen et al. On implementing deniable storage encryption for mobile devices
CN102945355B (en) Fast Data Encipherment strategy based on sector map is deferred to
US8464073B2 (en) Method and system for secure data storage
Skillen et al. Mobiflage: Deniable storage encryptionfor mobile devices
CN202795383U (en) Device and system for protecting data
CN104951409A (en) System and method for full disk encryption based on hardware
KR101303278B1 (en) FPGA apparatus and method for protecting bitstream
CN105389265B (en) The method and apparatus of zero content are generated on junk data when encryption parameter changes
CN104090853A (en) Solid-state disc encryption method and system
CN101441601B (en) Ciphering transmission method of hard disk ATA instruction and system
Lee et al. Secure Data Deletion for USB Flash Memory.
Swanson et al. Safe: Fast, verifiable sanitization for ssds
CN106415585A (en) Key extraction during secure boot
KR20150026915A (en) Virtual bands concentration for self encrypting drives
CN109190401A (en) A kind of date storage method, device and the associated component of Qemu virtual credible root
CN110533142A (en) A kind of encrypted U disk and USB flash disk partition method
CN108491724A (en) A kind of hardware based computer interface encryption device and method
CN110659506A (en) Replay protection of memory based on key refresh
Zhang et al. Ensuring data confidentiality via plausibly deniable encryption and secure deletion–a survey
CN106682521A (en) File transparent encryption and decryption system and method based on driver layer
US8683088B2 (en) Peripheral device data integrity
US9003201B2 (en) Hardware protection for encrypted strings and protection of security parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613