CN113722774A - Information elimination method, system, equipment and storage medium based on authorization and authentication - Google Patents

Information elimination method, system, equipment and storage medium based on authorization and authentication Download PDF

Info

Publication number
CN113722774A
CN113722774A CN202110796923.2A CN202110796923A CN113722774A CN 113722774 A CN113722774 A CN 113722774A CN 202110796923 A CN202110796923 A CN 202110796923A CN 113722774 A CN113722774 A CN 113722774A
Authority
CN
China
Prior art keywords
information
user
storage medium
encrypted file
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110796923.2A
Other languages
Chinese (zh)
Inventor
毛锐
王妍
张琪
王晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN202110796923.2A priority Critical patent/CN113722774A/en
Publication of CN113722774A publication Critical patent/CN113722774A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an information elimination method, a system, equipment and a storage medium based on authorization and authentication, wherein the information elimination method based on the authorization and the authentication comprises the following steps: carrying out authorized identity authentication on the user, and exporting the information of the computer storage medium to be eliminated selected by the authenticated authorized user as an encrypted file; and identifying the encrypted file based on the basic input and output system, and eliminating the information of the computer storage medium to be eliminated according to the encrypted file. According to the invention, the authorized identity authentication is carried out on the user and the derived information is encrypted, so that the situation that the information is maliciously deleted, accidentally deleted or missed deleted is avoided, the safety in the whole message elimination process is improved, and the cost of adding extra equipment is reduced; in addition, the information to be eliminated is eliminated according to the derived information, so that the data information of the whole disk is completely eliminated.

Description

Information elimination method, system, equipment and storage medium based on authorization and authentication
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to an information elimination method, system, device, and storage medium based on authorization and authentication.
Background
With the rapid development of the internet era, the society has entered the big data era, and data information may need to be deleted from devices such as a magnetic disk, a computer, a mobile phone, and the like for various purposes, such as cleaning up a memory space, ensuring data security and preventing data leakage.
For conventional information elimination, it is common to insert an external device for information elimination or remove a disk and put it on a dedicated device for information elimination.
Because the mode of inserting the external device or detaching the disk and placing the device for transferring does not have safety verification, the conditions of malicious elimination, accidental elimination and the like of information are easily caused in the information deleting process, so that the loss which cannot be measured is caused, additional equipment is required to be used, and the cost of information elimination is increased. In addition, the existing software elimination tools in the market can only eliminate part of the data to be deleted, all traces of the data in the processing process cannot be eliminated, and the deleted data can be recovered through a special tool, so that the data cannot be completely and completely deleted.
Disclosure of Invention
The invention provides an information elimination method, system, equipment and storage medium based on authorization and authentication, which are used for solving the problems of information leakage and malicious or accidental elimination of data in the data deletion process in the prior art, improving the safety and flexibility of the data elimination process and completely eliminating the data information of the whole disk.
The invention provides an information elimination method based on authorization and authentication, which comprises the following steps: carrying out authorized identity authentication on the user, and exporting the information of the computer storage medium to be eliminated selected by the authenticated authorized user as an encrypted file; and identifying the encrypted file based on the basic input and output system, and eliminating the information of the computer storage medium to be eliminated according to the encrypted file.
The invention provides an information elimination method based on authorization and authentication, which is based on a basic input and output system to identify an encrypted file and eliminate the computer storage medium information to be eliminated according to the encrypted file, and comprises the following steps: reading the encrypted file based on the basic input and output system, and decrypting the encrypted file; the basic input and output system judges whether the decrypted encrypted file contains a terminal serial number, if so, the terminal serial number is matched with the terminal serial number contained in the basic information of the computer storage medium, and if the terminal serial number is matched with the terminal serial number contained in the basic information of the computer storage medium, the corresponding computer storage medium information is selected according to the decrypted encrypted file and eliminated; otherwise, the authorized identity authentication is carried out again so as to export the computer storage medium information to be eliminated selected by the authenticated user as an encrypted file.
The invention provides an information elimination method based on authorization and authentication, which comprises the following steps: and performing full disk information elimination on the selected computer storage medium information corresponding to the terminal serial number in an addressing write-over mode for multiple times, wherein the contents of each write-over are inconsistent.
The invention provides an information elimination method based on authorization and authentication, which is used for carrying out authorization and identity verification on a user and comprises the following steps: judging whether the user name and the password input by the user are consistent with the user name and the password in the authorization personnel information pre-stored in the database by checking the user name and the password input by the user so as to judge whether the user is an authorized user;
before identifying the encrypted file based on the basic input output system, the method further comprises the following steps: the operation authentication of the user comprises the following steps: and judging whether the user identity is the operation user or not by checking the user name and the password input by the user and judging whether the user name and the password are consistent with the user name and the password in the operator information stored in the database in advance.
The invention provides an information elimination method based on authorization and authentication, which leads out the information of a computer storage medium to be eliminated selected by a verified user as an encrypted file, and comprises the following steps: selecting corresponding computer storage medium information to be eliminated according to the basic information of at least one computer storage medium to be eliminated selected by the user and passing the verification, and exporting the selected computer storage medium information to be eliminated into an encrypted file; the encrypted file is stored in a storage medium.
According to the information eliminating method based on authorization and authentication provided by the invention, before the encrypted file is identified based on the basic input and output system, the method further comprises the following steps: confirming whether the computer storage medium information to be eliminated is exported to be an encrypted file or not, and generating a confirmation record according to a confirmation result.
According to the information elimination method based on authorization and authentication provided by the invention, after eliminating the computer storage medium information to be eliminated according to the encrypted file, the method further comprises the following steps: and generating a removal record according to the removal for the user to view or export.
The invention also provides an information elimination system based on authorization and authentication, which applies any one of the information methods based on authorization and authentication, and the system comprises: the authentication management module is used for carrying out authorized identity verification on the user and exporting the computer storage medium information to be eliminated selected by the authorized user passing the verification as an encrypted file; and the information elimination module is used for eliminating the information of the computer storage medium to be eliminated based on the basic input and output system and the encrypted file.
The invention also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of any one of the information elimination methods based on authorization and authentication.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the authorization and authentication based information cancellation method as described in any of the above.
According to the information elimination method, the system, the equipment and the storage medium based on authorization and authentication, the computer storage medium information is prevented from being maliciously eliminated by an unauthorized user by carrying out authorized identity authentication on the user, the information of the computer storage medium to be eliminated is prevented from being falsified after being exported by exporting the information of the computer storage medium to be eliminated into an encrypted file, and the information of the computer storage medium to be eliminated is eliminated according to the exported encrypted file, so that the safety in the whole message elimination process is improved, the information is prevented from being maliciously or accidentally deleted, the information is prevented from being deleted in a missing manner, and the cost of adding additional equipment is reduced; in addition, the information of the computer storage medium to be eliminated is eliminated according to the encrypted file, and the information of the computer storage medium to be eliminated can be eliminated for the whole disk according to the encrypted file, so that the data information of the whole disk can be completely and completely eliminated.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of an information elimination method based on authorization and authentication according to the present invention;
FIG. 2 is a schematic flow chart of exporting an encrypted file provided by the present invention;
FIG. 3 is a schematic flow chart of erasing information of a computer storage medium to be erased according to the present invention;
FIG. 4 is a schematic diagram of an information elimination system based on authorization and authentication according to the present invention;
fig. 5 is a schematic structural diagram of an electronic device provided in the present invention.
Reference numerals:
1: an information management module; 2: an authentication management module; 3: an information elimination module;
4: a log management module; 51: a processor; 52: a communication interface;
53: a memory; 54: a communication bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of an information elimination method based on authorization and authentication according to an embodiment of the present invention, where the method includes:
s01, carrying out authorized identity authentication on the user, and exporting the computer storage medium information to be eliminated selected by the authenticated authorized user as an encrypted file;
and S02, identifying the encrypted file based on the basic input and output system, and eliminating the computer storage medium information to be eliminated according to the encrypted file.
It should be noted that S0N in this specification does not represent the order of the information elimination method based on authorization and authentication, and the information elimination method based on authorization and authentication of the present invention is specifically described below with reference to fig. 2 to 3.
Step S01, performing authorized authentication on the user, and exporting the information of the computer storage medium to be eliminated, which is selected by the authorized user and passes the authentication, as an encrypted file, referring to fig. 2.
In this embodiment, before the user is authenticated, the elimination tool needs to be installed and the database needs to be initialized. It should be noted that, at this time, only the user information of the operator and the user information of the authorized person are in the database.
Subsequently, performing authorized authentication on the user, including: and judging whether the user is an authorized user or not by checking the user name and the password input by the user and judging whether the user name and the password are consistent with the user name and the password in the authorized personnel information prestored in the database. It should be noted that, by determining whether the user is an authorized user, it is determined whether the user has an authorization qualification, so that malicious tampering with the information of the computer storage medium to be deleted, which needs to be deleted, by other people is avoided, and the security of the information removal process is improved. In addition, the process of carrying out authorized identity verification on the user is the process of logging in the eliminating tool, if the verification is passed, the user is authenticated as an authorized user, the eliminating tool enters a registration authorization page, the authorized user registers the computer storage medium in the registration authorization page, the computer storage medium information to be eliminated is selected according to the requirement of the authorized user, and then the selected computer storage medium information to be eliminated is exported to be an encrypted file.
Exporting the verified computer storage medium information to be eliminated selected by the user into an encrypted file, wherein the encrypted file comprises: selecting corresponding computer storage medium information according to the basic information of at least one computer storage medium which is selected by the user and needs to be eliminated, and exporting the selected computer storage medium information to be eliminated as an encrypted file; the encrypted file is stored in a storage medium. It should be noted that the encrypted file is composed of one or more hard disk serial numbers and used in combination; "separate and the end of which is also used"; and ending. The basic information of the computer storage medium may be at least one of basic information of an approver, an approver department, a medium security level, a medium type, a medium serial number, a medium storage capacity, a responsible person, an original purpose, a medium destination and the like, which is input in the information removing operation. The storage medium may be various media capable of storing program codes, such as a usb disk, a portable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Step S02, recognizing the encrypted file based on the bios, and erasing the information of the computer storage medium to be erased according to the encrypted file, referring to fig. 3.
In this embodiment, before information is eliminated, operation authentication needs to be performed on an operator first, that is, when the operator logs in the BIOS system, the operation authentication is performed, and a specific authentication process includes: whether the user name and the password input by the operator are consistent with the user name and the password in the operator information prestored in the database or not is judged by checking the user name and the password input by the operator, so that whether the operator is an operating user or not is judged, whether the user has the operation qualification or not is judged, the condition that the information is missed to be deleted due to the fact that the user without the operation qualification carries out information elimination operation is avoided, and the safety of the information elimination process is further enhanced.
After the user performs operation authentication, the user is identified as an operation user, whether the authorized user exports the computer storage medium information to be eliminated as an encrypted file is confirmed, and a confirmation record is generated according to a confirmation result. According to the generated confirmation record, the user can know the state of the current information elimination process, for example, if the confirmation record shows that the computer storage medium information to be eliminated is not exported to be an encrypted file, the user performs authorization authentication again to reselect the computer storage medium information to be eliminated and exports the computer storage medium information to be the encrypted file; if the record is confirmed to show that the computer storage medium information to be eliminated is exported to be an encrypted file, the operating user can continue to perform the subsequent message eliminating step. It should be noted that the operating user and the authorized user may be the same user or different users, and when the operating user and the authorized user are the same user, the corresponding operating user information and the authorized user information may be the same or different, and may be specifically set according to actual requirements, which is not further limited herein.
Subsequently, after it is confirmed that the information of the computer storage medium to be eliminated is exported as the encrypted file, the operation user restarts the device, logs in the elimination tool again based on the restarted device, and performs operation authentication again on the operation user, where the operation authentication process may refer to the foregoing description and is not described herein again. In this embodiment, the device may be a computer device.
After the operation identity authentication is passed, the user is determined as an operation user, the operation user searches for a corresponding deleting function through the eliminating tool and issues a deleting instruction, and after the eliminating tool receives the deleting instruction, the encrypted file is identified based on the basic input and output system, and the information of the computer storage medium to be eliminated is eliminated according to the encrypted file. The method comprises the following steps of identifying an encrypted file based on a basic input and output system, and eliminating computer storage medium information to be eliminated according to the encrypted file, wherein the method comprises the following steps: reading the encrypted information of the computer storage medium to be eliminated based on the BIOS system, and decrypting the encrypted file; and the BIOS system judges whether the decrypted encrypted file contains a terminal serial number, if so, the terminal serial number is matched with the terminal serial number contained in the basic information of the computer storage medium, and if so, the corresponding computer storage medium information is selected according to the decrypted encrypted file and eliminated. And if the terminal serial number is not contained in the encrypted file or the terminal serial number contained in the encrypted file is not matched with the terminal serial number contained in the basic information of the computer storage medium, performing authorization authentication again to export the computer storage medium information to be eliminated selected by the authenticated user as the encrypted file again.
It should be noted that, in the information elimination process, the selected computer storage medium information corresponding to the terminal serial number needs to be subjected to full disk information elimination in the form of addressing write coverage for multiple times, and the contents of each write coverage are different, so as to ensure that the eliminated disk information cannot be recovered. It should be noted that after the full disk is erased from the decrypted encrypted file, the encrypted file stored in the storage medium needs to be erased to achieve complete erasure of information.
In order to facilitate the authorized user to refer to the performed erasing operation, after the computer storage medium information to be erased is erased according to the encrypted file, an erasing record is generated according to the erasing operation for viewing or exporting. Specifically, after the message is erased, the operation user confirms the message erasing operation, and the erasing tool generates an erasing record based on the confirmation information and the information erasing operation after the operation user confirms the information erasing operation, thereby facilitating the reference or derivation by the authorized user. When the erasure record is exported, the erasure record and the history erasure record may be imported and exported in a text format, where the text format may be txt, word, excel, PDF, or the like.
Another embodiment of the present invention provides an information elimination method based on authorization and authentication, which is different from the above method embodiments in that: in this embodiment, after the encrypted file is exported, the operator does not need to perform operation authentication, and can directly log in the erasing tool to confirm whether the authorized user exports the computer storage medium information to be erased into the encrypted file, and generate a confirmation record according to the confirmation result. In addition, after the equipment is restarted, the operator does not perform operation authentication to directly log in the erasing tool so as to further erase the computer storage medium information to be erased and confirm the erasing operation to generate an erasing record. The remaining steps can refer to the above method embodiments, and are not described herein.
In summary, the embodiment of the present invention prevents an unauthorized user from maliciously eliminating computer storage medium information by performing authorized identity authentication on the user, and prevents the information from being tampered after being exported by exporting the computer storage medium information to be eliminated as an encrypted file, and then eliminates the computer storage medium information to be eliminated according to the exported encrypted file, thereby improving the security in the whole message elimination process, preventing the information from being maliciously or accidentally deleted, preventing the information from being missed, and reducing the cost of adding additional devices; in addition, the information of the computer storage medium to be eliminated is eliminated according to the encrypted file, and the information of the computer storage medium to be eliminated can be eliminated for the whole disk according to the encrypted file, so that the data information of the whole disk can be completely and completely eliminated.
The information erasing system based on authorization and authentication provided by the present invention is described below, and the information erasing system based on authorization and authentication described below and the information erasing method based on authorization and authentication described above may be referred to correspondingly.
Fig. 4 is a schematic structural diagram of an information erasing system based on authorization and authentication according to this embodiment, and as shown in fig. 4, the system includes: the authentication management module 2 is used for carrying out authorized identity verification on the user and exporting the computer storage medium information to be eliminated selected by the authorized user passing the verification as an encrypted file; and the information elimination module 3 is used for eliminating the information of the computer storage medium to be eliminated based on the basic input and output system and the encrypted file.
In this embodiment, the system further includes an information management module 1, configured to manage authorized user information, so that when the authentication management module 2 verifies the user identity, the authorized user information is provided to the user, and thus the authentication management module 2 matches the user information input by the user according to the authorized user information provided by the information management module 1, so as to verify the user identity. Specifically, the information management module 1 includes an information storage unit for storing user information such as authorized user information, operation user information, and the like, and a data management unit for managing the stored user information such as periodically updating and deleting the user information stored in the information storage unit. The user information includes information such as a user name and a password.
The authentication management module 2 includes an authentication management unit and a data derivation unit, wherein: the authentication management unit performs matching according to the authorized user information stored in the information management module 1 and the user information input by the user to verify the user identity; and the data export unit encrypts and exports the computer storage medium information to be eliminated selected by the authorized user passing the verification as an encrypted file. The user is authorized to be authenticated to provide use safety, so that the information of the computer storage medium to be eliminated, which needs to be eliminated, is prevented from being maliciously tampered by others, and the safety of the information elimination process is further improved. It should be noted that the derived encrypted file is generally stored in a storage medium, and the type of the storage medium may refer to the foregoing method embodiment, which is not described herein again.
In this embodiment, the authentication management module 2 further needs to perform operation user verification on the user, so that after the identity verification of the operation user passes, the information elimination module eliminates the information of the computer storage medium to be eliminated based on the bios and the encrypted file, so as to improve the security of the information elimination process, and avoid the situation that information is missed or eliminated incompletely due to malicious operations of other people. Since the authentication management module 2 needs to perform user authentication on the user, the information management module 1 is further configured to manage the operation user information, and the manner of managing the operation user information refers to the manner of managing the authorized user information, which is not described herein again.
After passing the operation user authentication, the information elimination module 3 eliminates the computer storage medium information to be eliminated based on the basic input output system and the encrypted file. Since the derived encrypted file is encrypted, in order to identify the encrypted file and eliminate the full-disk computer storage medium information to be eliminated according to the encrypted file, the information elimination function module 3 includes a first sub-module for eliminating the computer storage medium information to be eliminated, the first sub-module includes a reading unit, a decryption unit, a judgment unit and an elimination unit, wherein: the reading unit is used for reading the storage medium so as to extract the encrypted file stored in the storage medium; the decryption unit is used for decrypting the encrypted file extracted by the reading unit; the judging unit is used for judging whether the decrypted encrypted file contains the terminal serial number so as to determine whether to delete the information, and if so, the eliminating unit eliminates the information of the computer storage medium to be eliminated of the whole disk according to the decrypted encrypted file; otherwise, the authentication management module 1 performs identity verification on the user again and exports the encrypted file again.
In addition, because the storage medium also stores the information of the computer storage medium to be eliminated, the encrypted file in the storage medium needs to be eliminated.
In order to facilitate the user to know the information elimination result in time, the system further comprises a log management module 4 for managing the elimination record for the user to view or export.
Another embodiment of the present invention provides an information elimination system based on authorization and authentication, which is different from the above systems in that: the authentication management module in this embodiment needs to perform only authorized user verification on the user, and correspondingly, the information management module is only used for managing the authorized user information, and the information elimination module eliminates the computer storage medium information to be eliminated based on the basic input/output system and the encrypted file after the authentication management module exports the encrypted file. The specific structure of the system refers to the above system embodiments, and is not described herein.
Fig. 5 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 5: a processor (processor)51, a communication Interface (communication Interface)52, a memory (memory)53 and a communication bus 54, wherein the processor 51, the communication Interface 52 and the memory 53 complete communication with each other through the communication bus 54. The processor 51 may invoke logic instructions in the memory 53 to perform an authorization and authentication based information elimination method comprising: carrying out authorized identity authentication on the user, and exporting the information of the computer storage medium to be eliminated selected by the authenticated authorized user as an encrypted file; and identifying the encrypted file based on the basic input and output system, and eliminating the information of the computer storage medium to be eliminated according to the encrypted file.
In addition, the logic instructions in the memory 53 may be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions, which when executed by a computer, enable the computer to perform the authorization and authentication-based information elimination method provided by the above methods, the method comprising: carrying out authorized identity authentication on the user, and exporting the information of the computer storage medium to be eliminated selected by the authenticated authorized user as an encrypted file; and identifying the encrypted file based on the basic input and output system, and eliminating the information of the computer storage medium to be eliminated according to the encrypted file.
In yet another aspect, the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, the computer program being implemented by a processor to perform the authorization and authentication-based information elimination methods provided above, the method comprising: carrying out authorized identity authentication on the user, and exporting the information of the computer storage medium to be eliminated selected by the authenticated authorized user as an encrypted file; and identifying the encrypted file based on the basic input and output system, and eliminating the information of the computer storage medium to be eliminated according to the encrypted file.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An information elimination method based on authorization and authentication is characterized by comprising the following steps:
carrying out authorized identity authentication on the user, and exporting the information of the computer storage medium to be eliminated selected by the authenticated authorized user as an encrypted file;
and identifying the encrypted file based on a basic input and output system, and eliminating the computer storage medium information to be eliminated according to the encrypted file.
2. The method for eliminating information based on authorization and authentication as claimed in claim 1, wherein the identifying the encrypted file based on the bios and eliminating the computer storage media information to be eliminated according to the encrypted file comprises:
reading the encrypted file based on a basic input and output system, and decrypting the encrypted file;
the basic input and output system judges whether the decrypted encrypted file contains a terminal serial number, if so, the terminal serial number is matched with the terminal serial number contained in the basic information of the computer storage medium, and if the terminal serial number is matched with the terminal serial number contained in the basic information of the computer storage medium, the corresponding computer storage medium information is selected according to the decrypted encrypted file and eliminated; otherwise, the authorized identity authentication is carried out again so as to export the computer storage medium information to be eliminated selected by the authenticated user as an encrypted file.
3. The authorization and authentication-based information cancellation method according to claim 2, wherein the cancellation comprises: and performing full disk information elimination on the selected computer storage medium information corresponding to the terminal serial number in an addressing write-over mode for multiple times, wherein the content of each write-over is inconsistent.
4. The method for eliminating information based on authorization and authentication as claimed in claim 1, wherein the performing authorization authentication for the user comprises: judging whether the user name and the password input by the user are consistent with the user name and the password in the authorization personnel information pre-stored in the database by checking the user name and the password input by the user so as to judge whether the user is an authorized user;
before the identifying the encrypted file based on the basic input output system, the method further comprises: the operation authentication of the user comprises the following steps: and judging whether the user identity is the operation user or not by checking the user name and the password input by the user and judging whether the user name and the password are consistent with the user name and the password in the operator information stored in the database in advance.
5. The method for eliminating information based on authorization and authentication as claimed in claim 1, wherein the exporting of the computer storage media information to be eliminated selected by the authenticated user as an encrypted file comprises:
selecting corresponding computer storage medium information to be eliminated according to the basic information of at least one computer storage medium to be eliminated selected by the user and passing the verification, and exporting the selected computer storage medium information to be eliminated into an encrypted file;
and storing the encrypted file in a storage medium.
6. The method of claim 1, further comprising, before identifying the encrypted file based on bios, the steps of: and confirming whether the computer storage medium information to be eliminated is exported to be an encrypted file or not, and generating a confirmation record according to a confirmation result.
7. The method for eliminating information based on authorization and authentication as claimed in claim 1, further comprising, after eliminating the computer storage medium information to be eliminated according to the encrypted file: and generating a removal record according to the removal for the user to view or export.
8. An information cancellation system based on authorization and authentication, comprising:
the authentication management module is used for carrying out authorized identity verification on the user and exporting the computer storage medium information to be eliminated selected by the authorized user passing the verification as an encrypted file;
and the information elimination module is used for eliminating the information of the computer storage medium to be eliminated based on the basic input and output system and the encrypted file.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the steps of the authorization and authentication based information cancellation method according to any one of claims 1 to 7.
10. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when being executed by a processor, implements the steps of the authorization and authentication based information cancellation method according to any one of claims 1 to 7.
CN202110796923.2A 2021-07-14 2021-07-14 Information elimination method, system, equipment and storage medium based on authorization and authentication Pending CN113722774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110796923.2A CN113722774A (en) 2021-07-14 2021-07-14 Information elimination method, system, equipment and storage medium based on authorization and authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110796923.2A CN113722774A (en) 2021-07-14 2021-07-14 Information elimination method, system, equipment and storage medium based on authorization and authentication

Publications (1)

Publication Number Publication Date
CN113722774A true CN113722774A (en) 2021-11-30

Family

ID=78673307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110796923.2A Pending CN113722774A (en) 2021-07-14 2021-07-14 Information elimination method, system, equipment and storage medium based on authorization and authentication

Country Status (1)

Country Link
CN (1) CN113722774A (en)

Similar Documents

Publication Publication Date Title
US8219806B2 (en) Management system, management apparatus and management method
US20130124861A1 (en) Shielding a sensitive file
CN112231647A (en) Software authorization verification method
CN107430658A (en) Fail-safe software certification and checking
CN101770552B (en) Method for clearing computer password, computer and system for clearing computer password
CN112364318B (en) Operation and maintenance big data security management method, system, terminal and storage medium
CN106169052A (en) The processing method of application program, device and mobile terminal
CN115952552B (en) Remote data destruction method, system and equipment
CN115238286A (en) Data protection method and device, computer equipment and storage medium
CN104104650B (en) data file access method and terminal device
CN111147259B (en) Authentication method and device
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN111143808B (en) System security authentication method and device, computing equipment and storage medium
CN111046436A (en) System level package management-based signature authentication method and server
CN112182555A (en) Weak password detection method, device, electronic apparatus, storage medium, and program
JP2007148762A (en) External storage device
CN112434270A (en) Method and system for enhancing data security of computer system
CN110472423A (en) A kind of nuclear power station file permission management method, device and equipment
CN113722774A (en) Information elimination method, system, equipment and storage medium based on authorization and authentication
CN111695113B (en) Terminal software installation compliance detection method and device and computer equipment
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN111046376B (en) Distribution auditing method and device based on installation package
CN112732676A (en) Data migration method, device, equipment and storage medium based on block chain
CN115225350B (en) Government cloud encryption login verification method based on national secret certificate and storage medium
CN113923012B (en) Fingerprint generation method and tamper-proof method of client device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination