Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for deleting file

A file deletion and file technology, applied in special data processing applications, instruments, electronic digital data processing, etc., can solve problems such as loss of enterprises or units or even countries, leakage of confidential data, and inability to clear and clean data.

Inactive Publication Date: 2010-04-28
北京泰得思达科技发展有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when moving or deleting these data on the computer, usually the operating system cannot clear the data, but only deletes the location where the data is saved, which will leave an opportunity for confidential data leakage
At present, some recovery software can use the above vulnerabilities to obtain these data, and then cause huge losses to the corresponding enterprises or units or even the country

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for deleting file
  • Method for deleting file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] In order to make the purpose, technical solutions and advantages of the present invention clearer, the implementation of the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0012] see figure 1 , this embodiment provides a method for securely deleting a file, the method includes: firstly, the file system sends a file request 201 to the file system driver, for example, requesting to perform a deletion operation on a certain file. Call the file system driver to execute the corresponding request operation 202 according to the above request, then return the operation request 203, and then judge the operation request type to confirm whether it is a delete operation 204, if it is not a delete operation, then end; otherwise, obtain the file delete operation The previous file system schema structure and the information 205 in the schema after the delete operation.

[0013] Here, it is necessary to establish a file sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for safely deleting a file, which comprises the following steps: firstly, executing a request operation according to a file request sent by an operating system; secondly, judging whether the type of the file request is a file deleting request or not; if the type of the file request is a file deleting request, comparing the file system graphic formula structures after the deleting operation and before the deleting operation to acquire the file corresponding to the deleting operation; and finally, eliminating the contents in the block data according to the deleted file.

Description

technical field [0001] The invention relates to a method for deleting files, in particular to a method for safely deleting confidential files in a computer. Background technique [0002] Usually in some confidential environments such as state agencies and enterprises, computers contain a large number of confidential documents or sensitive data, so the management of these documents and data is very important. However, when moving or deleting these data on the computer, usually the operating system cannot clear the data, but only deletes the location where the data is saved, which will leave an opportunity for confidential data leakage. At present, some recovery software can use the above-mentioned vulnerabilities to obtain these data, and then cause huge losses to the corresponding enterprises or units or even the country. Contents of the invention [0003] In order to solve the above-mentioned problems and defects, the present invention provides a method for deleting file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 任忠宇任中本
Owner 北京泰得思达科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products