CN112181313A - Fast self-destruction method and system for hard disk data - Google Patents
Fast self-destruction method and system for hard disk data Download PDFInfo
- Publication number
- CN112181313A CN112181313A CN202011149757.9A CN202011149757A CN112181313A CN 112181313 A CN112181313 A CN 112181313A CN 202011149757 A CN202011149757 A CN 202011149757A CN 112181313 A CN112181313 A CN 112181313A
- Authority
- CN
- China
- Prior art keywords
- hard disk
- destruction
- fast self
- data
- partition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000005192 partition Methods 0.000 claims abstract description 24
- 238000013500 data storage Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000000872 buffer Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0674—Disk device
- G06F3/0676—Magnetic disk device
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a method and a system for rapidly self-destroying hard disk data. The method comprises the following steps: the boot partition of the hard disk is erased. The method and the system for rapidly self-destroying the hard disk data can rapidly destroy the storage structure in the hard disk and realize self-destruction.
Description
Technical Field
The invention relates to the technical field of data storage, in particular to a method and a system for rapidly self-destroying hard disk data.
Background
In real life, a plurality of scenes often appear, and the storage format of the hard disk needs to be damaged. Such a scenario may be that a hard disk storing a large amount of private data inside is lost, or that a hard disk stored as a network has been hacked. However, there is no technical solution for rapidly implementing the self-destruction of the storage structure in the prior art.
Disclosure of Invention
The invention aims to provide a method and a system for rapidly self-destroying hard disk data, which can rapidly destroy a storage structure in a hard disk and realize self-destruction.
In order to solve the technical problem, the invention provides a method for rapidly self-destroying hard disk data, which comprises the following steps: the boot partition of the hard disk is erased.
In some embodiments, the boot partition comprises: and carrying out fastboot partition on the Android system.
In some embodiments, the file system of the hard disk comprises: jffs, yaffs.
In some embodiments, for a jffs hard disk, erasing a fastboot partition of the hard disk includes: determining inodes involved by the fastboot partition; and erasing the storage data of the inode.
In some embodiments, for a yaffs format hard disk, erasing a fastboot partition of the hard disk includes: determining tnode related to the fastboot partition; erasing the storage data of the involved tnode.
In addition, the invention also provides a fast self-destruction system of hard disk data, which comprises: one or more processors; a storage device, configured to store one or more programs, which when executed by the one or more processors, enable the one or more processors to implement the fast self-destruction method for hard disk data according to the foregoing description.
After adopting such design, the invention has at least the following advantages:
by erasing the boot sector of the hard disk used for storing data, the fast self-destruction of the hard disk storage structure can be realized.
Drawings
The foregoing is only an overview of the technical solutions of the present invention, and in order to make the technical solutions of the present invention more clearly understood, the present invention is further described in detail below with reference to the accompanying drawings and the detailed description.
FIG. 1 is a flowchart of a fast self-destruction method for hard disk data according to an embodiment of the present invention;
FIG. 2 is a flowchart of a fast self-destruction method for hard disk data according to another embodiment of the present invention;
fig. 3 is a block diagram of a fast self-destruction system for hard disk data according to another embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In order to rapidly complete the self-destruction of the hard disk data storage structure and ensure the data security, the technical scheme provided by the embodiment of the invention is to erase the boot partition of the hard disk. After the erasing operation is performed, the boot program cannot be started because the boot partition of the hard disk does not have any data, so that the safety of data stored on the hard disk is ensured.
Moreover, the technical solutions provided by the embodiments of the present invention only perform erasure of the data stored in the boot partition, and thus the total data amount of erasure is relatively small, so that the erasure operation can be performed quickly.
In various embodiments of the present invention, the boot partition typically includes: and f, performing fastboot partitioning in an Android system.
Furthermore, the hard disk storage data format typically includes: jffs format, or yaffs format.
Fig. 1 shows a flow of a fast self-destruction method for hard disk data according to an embodiment of the present invention. The flow shown in fig. 1 is applicable only to the jffs hard disk data format. Referring to fig. 1, the method for fast self-destruction of hard disk data includes:
and S11, determining the inode related to the fastboot partition.
At S12, the storage data of the inode concerned is erased.
In the embodiment shown in fig. 1, the storage format of the hard disk is jffs format. In order to ensure the completeness of data erasure, the inodes storing the fastboot partition data are calculated first, and then the inodes are erased one by one. Due to the fact that data erasure is more thorough, erasure of the fastboot partition is conducted by the implementation mode, and data security can be further guaranteed.
This has the advantage that the erasure of the boot partition is more comprehensive. In other words, the self-destruction operation of the hard disk data is more thorough.
Fig. 2 shows a flow of a fast self-destruction method for hard disk data according to another embodiment of the present invention. Also, the flow shown by fig. 2 is applicable only to yaffs hard disk data format. Referring to fig. 2, the method for fast self-destruction of hard disk data includes:
and S21, determining tnode related to the fastboot partition.
And S22, erasing the storage data of the involved tnode.
Similar to the embodiment shown in fig. 1, the embodiment shown in fig. 2 also determines all involved tnodes, and then performs a uniform data erasure on the involved tnodes.
Fig. 3 shows a structure of a fast self-destruction system of hard disk data according to still another embodiment of the present invention. Referring to fig. 3, for example, the fast self-destruction system 300 of hard disk data can be used to serve as a hard disk self-destruction device in a computer system. As described herein, the fast self-destruction system 300 of hard disk data may be used to implement fast self-destruction functionality of hard disk storage structures in a computer system. The fast destruct system 300 of hard disk data may be implemented in a single node, or the functions of the fast destruct system 300 of hard disk data may be implemented in multiple nodes in a network. Those skilled in the art will appreciate that the term fast self-destruction system of hard disk data includes devices in a broad sense, and that the fast self-destruction system 300 of hard disk data shown in FIG. 3 is only one example thereof. The fast self-destruct system 300 of hard disk data is included for clarity and is not intended to limit the application of the present invention to a specific fast self-destruct system embodiment of hard disk data or to a class of fast self-destruct system embodiments of hard disk data. At least some of the features/methods described herein may be implemented in a network device or component, such as the fast destruct system 300 of hard disk data. For example, the features/methods of the present invention may be implemented in hardware, firmware, and/or software running installed on hardware. The fast self-destruction system 300 for hard disk data may be any device that processes, stores and/or forwards data frames through a network, such as a server, a client, a data source, etc. As shown in FIG. 3, the fast self-destruct system 300 for hard disk data may include a transceiver (Tx/Rx)310, which may be a transmitter, a receiver, or a combination thereof. Tx/Rx310 may be coupled to a plurality of ports 350 (e.g., an uplink interface and/or a downlink interface) for transmitting and/or receiving frames from other nodes. Processor 330 may be coupled to Tx/Rx310 to process frames and/or determine to which nodes to send frames. The processor 330 may include one or more multi-core processors and/or memory devices 332, which may serve as data stores, buffers, and the like. The processor 330 may be implemented as a general-purpose processor, or may be part of one or more Application Specific Integrated Circuits (ASICs) and/or Digital Signal Processors (DSPs).
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the present invention in any way, and it will be apparent to those skilled in the art that the above description of the present invention can be applied to various modifications, equivalent variations or modifications without departing from the spirit and scope of the present invention.
Claims (6)
1. A fast self-destruction method of hard disk data is characterized by comprising the following steps:
the boot partition of the hard disk is erased.
2. The fast self-destruction method of hard disk data according to claim 1, wherein the booting the partition comprises: and carrying out fastboot partition on the Android system.
3. The method for fast self-destruction of hard disk data according to claim 1, wherein the file system of the hard disk comprises: jffs, yaffs.
4. The method for fast self-destruction of hard disk data according to claim 2 or 3, wherein for the hard disk with jffs format, erasing the fastboot partition of the hard disk comprises:
determining inodes involved by the fastboot partition;
and erasing the storage data of the inode.
5. The method for fast self-destruction of hard disk data according to claim 2 or 3, wherein for yaffs hard disk, erasing the fastboot partition of the hard disk comprises:
determining tnode related to the fastboot partition;
erasing the storage data of the involved tnode.
6. A fast self-destruction system of hard disk data is characterized by comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the fast self-destruction method of hard disk data according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011149757.9A CN112181313B (en) | 2020-10-23 | 2020-10-23 | Method and system for fast self-destruction of hard disk data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011149757.9A CN112181313B (en) | 2020-10-23 | 2020-10-23 | Method and system for fast self-destruction of hard disk data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112181313A true CN112181313A (en) | 2021-01-05 |
CN112181313B CN112181313B (en) | 2024-02-13 |
Family
ID=73923771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011149757.9A Active CN112181313B (en) | 2020-10-23 | 2020-10-23 | Method and system for fast self-destruction of hard disk data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112181313B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008083948A (en) * | 2006-09-27 | 2008-04-10 | Ultra X:Kk | Hard disk information erasure method and program |
CN201237788Y (en) * | 2008-08-11 | 2009-05-13 | 湖南源科创新科技股份有限公司 | Solid state hard disk based on data destruction |
CN101763317A (en) * | 2009-12-31 | 2010-06-30 | 中国软件与技术服务股份有限公司 | Data eliminating method of magnetic medium |
US20110016300A1 (en) * | 2009-07-14 | 2011-01-20 | Lee Joocheol | Apparatus and method for fast booting computer system |
US20110126045A1 (en) * | 2007-03-29 | 2011-05-26 | Bennett Jon C R | Memory system with multiple striping of raid groups and method for performing the same |
CN202433910U (en) * | 2012-02-08 | 2012-09-12 | 山东超越数控电子有限公司 | Data destruction security structure with portable device |
CN103197939A (en) * | 2012-01-05 | 2013-07-10 | 联想(新加坡)私人有限公司 | Firmware updating in a hybrid computing environment |
CN103729310A (en) * | 2014-01-14 | 2014-04-16 | 北京深思数盾科技有限公司 | Method for protecting hardware data |
WO2017082822A1 (en) * | 2015-11-09 | 2017-05-18 | Trek Technology (Singapore) Pte Ltd | External storage device with information processing capability |
CN109508268A (en) * | 2018-11-13 | 2019-03-22 | 郑州云海信息技术有限公司 | Function test method is quickly wiped in a kind of ISE hard disk test device and the hard disk sector ISE |
CN109901783A (en) * | 2017-12-07 | 2019-06-18 | 镇江长圣信息技术咨询服务有限公司 | A kind of information technology for eliminating of storage medium |
-
2020
- 2020-10-23 CN CN202011149757.9A patent/CN112181313B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008083948A (en) * | 2006-09-27 | 2008-04-10 | Ultra X:Kk | Hard disk information erasure method and program |
US20110126045A1 (en) * | 2007-03-29 | 2011-05-26 | Bennett Jon C R | Memory system with multiple striping of raid groups and method for performing the same |
CN201237788Y (en) * | 2008-08-11 | 2009-05-13 | 湖南源科创新科技股份有限公司 | Solid state hard disk based on data destruction |
US20110016300A1 (en) * | 2009-07-14 | 2011-01-20 | Lee Joocheol | Apparatus and method for fast booting computer system |
CN101763317A (en) * | 2009-12-31 | 2010-06-30 | 中国软件与技术服务股份有限公司 | Data eliminating method of magnetic medium |
CN103197939A (en) * | 2012-01-05 | 2013-07-10 | 联想(新加坡)私人有限公司 | Firmware updating in a hybrid computing environment |
CN202433910U (en) * | 2012-02-08 | 2012-09-12 | 山东超越数控电子有限公司 | Data destruction security structure with portable device |
CN103729310A (en) * | 2014-01-14 | 2014-04-16 | 北京深思数盾科技有限公司 | Method for protecting hardware data |
WO2017082822A1 (en) * | 2015-11-09 | 2017-05-18 | Trek Technology (Singapore) Pte Ltd | External storage device with information processing capability |
CN109901783A (en) * | 2017-12-07 | 2019-06-18 | 镇江长圣信息技术咨询服务有限公司 | A kind of information technology for eliminating of storage medium |
CN109508268A (en) * | 2018-11-13 | 2019-03-22 | 郑州云海信息技术有限公司 | Function test method is quickly wiped in a kind of ISE hard disk test device and the hard disk sector ISE |
Non-Patent Citations (2)
Title |
---|
周继才;: "LK存储介质Nand Flash驱动模块设计与性能优化", 单片机与嵌入式系统应用, no. 05, pages 17 * |
韦博华;: "Android手机Recovery模式取证方法研究", 信息通信, no. 09, pages 27 * |
Also Published As
Publication number | Publication date |
---|---|
CN112181313B (en) | 2024-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107870968B (en) | Performing real-time updates to a file system volume | |
US10437680B2 (en) | Relay apparatus, relay method, and computer program product | |
US10963558B2 (en) | Malware detection method and malware detection apparatus | |
US9780994B2 (en) | Notification normalization | |
US9740563B2 (en) | Controlling software processes that are subject to communications restrictions by freezing and thawing a computational process in a virtual machine from writing data | |
US10116746B2 (en) | Data storage method and network interface card | |
US11876900B2 (en) | System and method for trusted control flow enforcement using derived encryption keys | |
US10162565B2 (en) | Data erasure of a target device | |
WO2017071579A1 (en) | Method and device for mining android system vulnerabilities | |
US20170140149A1 (en) | Detecting malign code in unused firmware memory | |
CN105468433A (en) | Method and system for acquiring disc data of virtual machines | |
US8612674B2 (en) | Systems and methods for concurrently accessing a virtual tape library by multiple computing devices | |
CN109726039B (en) | Method and apparatus for managing virtual machines | |
WO2019037521A1 (en) | Security detection method, device, system, and server | |
US7328323B1 (en) | Heap buffer overflow exploitation prevention system and method | |
CN112181313B (en) | Method and system for fast self-destruction of hard disk data | |
CN109413507B (en) | Method, device, terminal and medium for processing reference relationship between barrage library and live broadcast room | |
CN113515229B (en) | Method, apparatus and computer program product for storing data | |
JP2022104878A (en) | System and method for preventing malicious process from being injected into software | |
US20210132859A1 (en) | Content modification control | |
US8341370B2 (en) | Restricting access to object based storage | |
US12061574B2 (en) | Updating edge nodes in distributed computing environments using partitions | |
CN116881091B (en) | System event log reporting method, device, chip, equipment and storage medium | |
US11431349B2 (en) | Method, electronic device and computer program product for processing data | |
EP3797373B1 (en) | Ex post facto platform configuration attestation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |