CN112181313A - Fast self-destruction method and system for hard disk data - Google Patents

Fast self-destruction method and system for hard disk data Download PDF

Info

Publication number
CN112181313A
CN112181313A CN202011149757.9A CN202011149757A CN112181313A CN 112181313 A CN112181313 A CN 112181313A CN 202011149757 A CN202011149757 A CN 202011149757A CN 112181313 A CN112181313 A CN 112181313A
Authority
CN
China
Prior art keywords
hard disk
destruction
fast self
data
partition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011149757.9A
Other languages
Chinese (zh)
Other versions
CN112181313B (en
Inventor
刘青山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anshi Technology Co ltd
Original Assignee
Beijing Anshi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anshi Technology Co ltd filed Critical Beijing Anshi Technology Co ltd
Priority to CN202011149757.9A priority Critical patent/CN112181313B/en
Publication of CN112181313A publication Critical patent/CN112181313A/en
Application granted granted Critical
Publication of CN112181313B publication Critical patent/CN112181313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a method and a system for rapidly self-destroying hard disk data. The method comprises the following steps: the boot partition of the hard disk is erased. The method and the system for rapidly self-destroying the hard disk data can rapidly destroy the storage structure in the hard disk and realize self-destruction.

Description

Fast self-destruction method and system for hard disk data
Technical Field
The invention relates to the technical field of data storage, in particular to a method and a system for rapidly self-destroying hard disk data.
Background
In real life, a plurality of scenes often appear, and the storage format of the hard disk needs to be damaged. Such a scenario may be that a hard disk storing a large amount of private data inside is lost, or that a hard disk stored as a network has been hacked. However, there is no technical solution for rapidly implementing the self-destruction of the storage structure in the prior art.
Disclosure of Invention
The invention aims to provide a method and a system for rapidly self-destroying hard disk data, which can rapidly destroy a storage structure in a hard disk and realize self-destruction.
In order to solve the technical problem, the invention provides a method for rapidly self-destroying hard disk data, which comprises the following steps: the boot partition of the hard disk is erased.
In some embodiments, the boot partition comprises: and carrying out fastboot partition on the Android system.
In some embodiments, the file system of the hard disk comprises: jffs, yaffs.
In some embodiments, for a jffs hard disk, erasing a fastboot partition of the hard disk includes: determining inodes involved by the fastboot partition; and erasing the storage data of the inode.
In some embodiments, for a yaffs format hard disk, erasing a fastboot partition of the hard disk includes: determining tnode related to the fastboot partition; erasing the storage data of the involved tnode.
In addition, the invention also provides a fast self-destruction system of hard disk data, which comprises: one or more processors; a storage device, configured to store one or more programs, which when executed by the one or more processors, enable the one or more processors to implement the fast self-destruction method for hard disk data according to the foregoing description.
After adopting such design, the invention has at least the following advantages:
by erasing the boot sector of the hard disk used for storing data, the fast self-destruction of the hard disk storage structure can be realized.
Drawings
The foregoing is only an overview of the technical solutions of the present invention, and in order to make the technical solutions of the present invention more clearly understood, the present invention is further described in detail below with reference to the accompanying drawings and the detailed description.
FIG. 1 is a flowchart of a fast self-destruction method for hard disk data according to an embodiment of the present invention;
FIG. 2 is a flowchart of a fast self-destruction method for hard disk data according to another embodiment of the present invention;
fig. 3 is a block diagram of a fast self-destruction system for hard disk data according to another embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In order to rapidly complete the self-destruction of the hard disk data storage structure and ensure the data security, the technical scheme provided by the embodiment of the invention is to erase the boot partition of the hard disk. After the erasing operation is performed, the boot program cannot be started because the boot partition of the hard disk does not have any data, so that the safety of data stored on the hard disk is ensured.
Moreover, the technical solutions provided by the embodiments of the present invention only perform erasure of the data stored in the boot partition, and thus the total data amount of erasure is relatively small, so that the erasure operation can be performed quickly.
In various embodiments of the present invention, the boot partition typically includes: and f, performing fastboot partitioning in an Android system.
Furthermore, the hard disk storage data format typically includes: jffs format, or yaffs format.
Fig. 1 shows a flow of a fast self-destruction method for hard disk data according to an embodiment of the present invention. The flow shown in fig. 1 is applicable only to the jffs hard disk data format. Referring to fig. 1, the method for fast self-destruction of hard disk data includes:
and S11, determining the inode related to the fastboot partition.
At S12, the storage data of the inode concerned is erased.
In the embodiment shown in fig. 1, the storage format of the hard disk is jffs format. In order to ensure the completeness of data erasure, the inodes storing the fastboot partition data are calculated first, and then the inodes are erased one by one. Due to the fact that data erasure is more thorough, erasure of the fastboot partition is conducted by the implementation mode, and data security can be further guaranteed.
This has the advantage that the erasure of the boot partition is more comprehensive. In other words, the self-destruction operation of the hard disk data is more thorough.
Fig. 2 shows a flow of a fast self-destruction method for hard disk data according to another embodiment of the present invention. Also, the flow shown by fig. 2 is applicable only to yaffs hard disk data format. Referring to fig. 2, the method for fast self-destruction of hard disk data includes:
and S21, determining tnode related to the fastboot partition.
And S22, erasing the storage data of the involved tnode.
Similar to the embodiment shown in fig. 1, the embodiment shown in fig. 2 also determines all involved tnodes, and then performs a uniform data erasure on the involved tnodes.
Fig. 3 shows a structure of a fast self-destruction system of hard disk data according to still another embodiment of the present invention. Referring to fig. 3, for example, the fast self-destruction system 300 of hard disk data can be used to serve as a hard disk self-destruction device in a computer system. As described herein, the fast self-destruction system 300 of hard disk data may be used to implement fast self-destruction functionality of hard disk storage structures in a computer system. The fast destruct system 300 of hard disk data may be implemented in a single node, or the functions of the fast destruct system 300 of hard disk data may be implemented in multiple nodes in a network. Those skilled in the art will appreciate that the term fast self-destruction system of hard disk data includes devices in a broad sense, and that the fast self-destruction system 300 of hard disk data shown in FIG. 3 is only one example thereof. The fast self-destruct system 300 of hard disk data is included for clarity and is not intended to limit the application of the present invention to a specific fast self-destruct system embodiment of hard disk data or to a class of fast self-destruct system embodiments of hard disk data. At least some of the features/methods described herein may be implemented in a network device or component, such as the fast destruct system 300 of hard disk data. For example, the features/methods of the present invention may be implemented in hardware, firmware, and/or software running installed on hardware. The fast self-destruction system 300 for hard disk data may be any device that processes, stores and/or forwards data frames through a network, such as a server, a client, a data source, etc. As shown in FIG. 3, the fast self-destruct system 300 for hard disk data may include a transceiver (Tx/Rx)310, which may be a transmitter, a receiver, or a combination thereof. Tx/Rx310 may be coupled to a plurality of ports 350 (e.g., an uplink interface and/or a downlink interface) for transmitting and/or receiving frames from other nodes. Processor 330 may be coupled to Tx/Rx310 to process frames and/or determine to which nodes to send frames. The processor 330 may include one or more multi-core processors and/or memory devices 332, which may serve as data stores, buffers, and the like. The processor 330 may be implemented as a general-purpose processor, or may be part of one or more Application Specific Integrated Circuits (ASICs) and/or Digital Signal Processors (DSPs).
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the present invention in any way, and it will be apparent to those skilled in the art that the above description of the present invention can be applied to various modifications, equivalent variations or modifications without departing from the spirit and scope of the present invention.

Claims (6)

1. A fast self-destruction method of hard disk data is characterized by comprising the following steps:
the boot partition of the hard disk is erased.
2. The fast self-destruction method of hard disk data according to claim 1, wherein the booting the partition comprises: and carrying out fastboot partition on the Android system.
3. The method for fast self-destruction of hard disk data according to claim 1, wherein the file system of the hard disk comprises: jffs, yaffs.
4. The method for fast self-destruction of hard disk data according to claim 2 or 3, wherein for the hard disk with jffs format, erasing the fastboot partition of the hard disk comprises:
determining inodes involved by the fastboot partition;
and erasing the storage data of the inode.
5. The method for fast self-destruction of hard disk data according to claim 2 or 3, wherein for yaffs hard disk, erasing the fastboot partition of the hard disk comprises:
determining tnode related to the fastboot partition;
erasing the storage data of the involved tnode.
6. A fast self-destruction system of hard disk data is characterized by comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the fast self-destruction method of hard disk data according to any one of claims 1 to 5.
CN202011149757.9A 2020-10-23 2020-10-23 Method and system for fast self-destruction of hard disk data Active CN112181313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011149757.9A CN112181313B (en) 2020-10-23 2020-10-23 Method and system for fast self-destruction of hard disk data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011149757.9A CN112181313B (en) 2020-10-23 2020-10-23 Method and system for fast self-destruction of hard disk data

Publications (2)

Publication Number Publication Date
CN112181313A true CN112181313A (en) 2021-01-05
CN112181313B CN112181313B (en) 2024-02-13

Family

ID=73923771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011149757.9A Active CN112181313B (en) 2020-10-23 2020-10-23 Method and system for fast self-destruction of hard disk data

Country Status (1)

Country Link
CN (1) CN112181313B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008083948A (en) * 2006-09-27 2008-04-10 Ultra X:Kk Hard disk information erasure method and program
CN201237788Y (en) * 2008-08-11 2009-05-13 湖南源科创新科技股份有限公司 Solid state hard disk based on data destruction
CN101763317A (en) * 2009-12-31 2010-06-30 中国软件与技术服务股份有限公司 Data eliminating method of magnetic medium
US20110016300A1 (en) * 2009-07-14 2011-01-20 Lee Joocheol Apparatus and method for fast booting computer system
US20110126045A1 (en) * 2007-03-29 2011-05-26 Bennett Jon C R Memory system with multiple striping of raid groups and method for performing the same
CN202433910U (en) * 2012-02-08 2012-09-12 山东超越数控电子有限公司 Data destruction security structure with portable device
CN103197939A (en) * 2012-01-05 2013-07-10 联想(新加坡)私人有限公司 Firmware updating in a hybrid computing environment
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data
WO2017082822A1 (en) * 2015-11-09 2017-05-18 Trek Technology (Singapore) Pte Ltd External storage device with information processing capability
CN109508268A (en) * 2018-11-13 2019-03-22 郑州云海信息技术有限公司 Function test method is quickly wiped in a kind of ISE hard disk test device and the hard disk sector ISE
CN109901783A (en) * 2017-12-07 2019-06-18 镇江长圣信息技术咨询服务有限公司 A kind of information technology for eliminating of storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008083948A (en) * 2006-09-27 2008-04-10 Ultra X:Kk Hard disk information erasure method and program
US20110126045A1 (en) * 2007-03-29 2011-05-26 Bennett Jon C R Memory system with multiple striping of raid groups and method for performing the same
CN201237788Y (en) * 2008-08-11 2009-05-13 湖南源科创新科技股份有限公司 Solid state hard disk based on data destruction
US20110016300A1 (en) * 2009-07-14 2011-01-20 Lee Joocheol Apparatus and method for fast booting computer system
CN101763317A (en) * 2009-12-31 2010-06-30 中国软件与技术服务股份有限公司 Data eliminating method of magnetic medium
CN103197939A (en) * 2012-01-05 2013-07-10 联想(新加坡)私人有限公司 Firmware updating in a hybrid computing environment
CN202433910U (en) * 2012-02-08 2012-09-12 山东超越数控电子有限公司 Data destruction security structure with portable device
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data
WO2017082822A1 (en) * 2015-11-09 2017-05-18 Trek Technology (Singapore) Pte Ltd External storage device with information processing capability
CN109901783A (en) * 2017-12-07 2019-06-18 镇江长圣信息技术咨询服务有限公司 A kind of information technology for eliminating of storage medium
CN109508268A (en) * 2018-11-13 2019-03-22 郑州云海信息技术有限公司 Function test method is quickly wiped in a kind of ISE hard disk test device and the hard disk sector ISE

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周继才;: "LK存储介质Nand Flash驱动模块设计与性能优化", 单片机与嵌入式系统应用, no. 05, pages 17 *
韦博华;: "Android手机Recovery模式取证方法研究", 信息通信, no. 09, pages 27 *

Also Published As

Publication number Publication date
CN112181313B (en) 2024-02-13

Similar Documents

Publication Publication Date Title
CN107870968B (en) Performing real-time updates to a file system volume
US10437680B2 (en) Relay apparatus, relay method, and computer program product
US10963558B2 (en) Malware detection method and malware detection apparatus
US9780994B2 (en) Notification normalization
US9740563B2 (en) Controlling software processes that are subject to communications restrictions by freezing and thawing a computational process in a virtual machine from writing data
US10116746B2 (en) Data storage method and network interface card
US11876900B2 (en) System and method for trusted control flow enforcement using derived encryption keys
US10162565B2 (en) Data erasure of a target device
WO2017071579A1 (en) Method and device for mining android system vulnerabilities
US20170140149A1 (en) Detecting malign code in unused firmware memory
CN105468433A (en) Method and system for acquiring disc data of virtual machines
US8612674B2 (en) Systems and methods for concurrently accessing a virtual tape library by multiple computing devices
CN109726039B (en) Method and apparatus for managing virtual machines
WO2019037521A1 (en) Security detection method, device, system, and server
US7328323B1 (en) Heap buffer overflow exploitation prevention system and method
CN112181313B (en) Method and system for fast self-destruction of hard disk data
CN109413507B (en) Method, device, terminal and medium for processing reference relationship between barrage library and live broadcast room
CN113515229B (en) Method, apparatus and computer program product for storing data
JP2022104878A (en) System and method for preventing malicious process from being injected into software
US20210132859A1 (en) Content modification control
US8341370B2 (en) Restricting access to object based storage
US12061574B2 (en) Updating edge nodes in distributed computing environments using partitions
CN116881091B (en) System event log reporting method, device, chip, equipment and storage medium
US11431349B2 (en) Method, electronic device and computer program product for processing data
EP3797373B1 (en) Ex post facto platform configuration attestation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant