Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data overwriting method

A technology of data overwriting and data, which is applied in erasing methods, digital data protection, recording/reproducing/deleting methods, etc., can solve problems such as irregular coverage, waste of computer resources, etc., to increase difficulty, improve efficiency, and reduce consumption Effect

Inactive Publication Date: 2014-04-09
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some researchers have proposed a data overwriting scheme that uses the md5 algorithm to generate an overwriting sequence. This scheme introduces a data overwriting system design technology for the Windows FAT32 file structure, using the 128-bit hash generated by the md5 algorithm Value encryption and irreversible good characteristics, first randomly input or read multiple characters, then use the principle of md5 algorithm to output, cascade to form a 128-bit hash value to repeatedly fill the data area, to achieve multiple irregular coverage of data However, the overwriting sequence of the md5 algorithm method still needs to be generated in advance, involving multiple nonlinear functions, 4 rounds of 64-step operations, etc., generating multiple "0" and "1" sequences at one time, rather than according to the overwriting requirements, Causes a waste of computer resources; and these sequences are fixed-length, bringing the possibility of data recovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data overwriting method
  • Data overwriting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] In the actual application process of the data overwriting method designed by the present invention, there are two specific embodiments, such as figure 1 Shown embodiment one, comprises the steps:

[0034] Step 001. Obtain the length n of the target data sequence, and determine the first data of the target data sequence ListData first And the end of the data ListData last , according to the length n, the data first ListData first And the end of the data ListData last determining the intermediate data position of the target data sequence, and dividing the target data sequence into a first half data sequence and a second half data sequence by the intermediate data position;

[0035] Step 002. Each data in the first half of the data sequence and each data in the second half of the data sequence are respectively subjected to a "modulo 2 addition" operation according to the data bit one-to-one correspondence rule, such as adding the first data bit in the first half of the ...

Embodiment 2

[0041] In the actual application process of the data overwriting method designed by the present invention, such as figure 2 The second shown embodiment includes the following steps:

[0042] Step 001. Obtain the length n of the target data sequence, and determine the first data of the target data sequence ListData first And the end of the data ListData last , according to the length n, the data first ListData first And the end of the data ListData last determining the intermediate data position of the target data sequence, and dividing the target data sequence into a first half data sequence and a second half data sequence by the intermediate data position;

[0043] Step 002. Each data in the first half of the data sequence and each data in the second half of the data sequence are respectively subjected to a "modulo 2 addition" operation according to the data bit one-to-one correspondence rule, such as adding the first data bit in the first half of the data sequence The d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data overwriting method, wherein data overwriting is completed through a sequence of data. Data on corresponding data bits in a target data sequence are subjected to 'modulo-2 add' operation to obtain an operation result data sequence, so that a data overwriting sequence is formed; then, overwriting corresponding to the target data sequence is realized by utilizing the data overwriting sequence. Consumption of computer resources is reduced; the data overwriting sequence does not need to be generated in advance; besides, since the length of the overwriting sequence is indeterminate each time, data overwriting efficiency can be improved on the premise that safe destruction of storage data is guaranteed, and the probability of data recovery is lowered greatly.

Description

technical field [0001] The invention relates to a data overwriting method. Background technique [0002] With the emergence and rapid development of Internet technology, the way of life of human beings has been greatly changed. Individuals and enterprises host a large amount of data in various ways, but at the same time, a large amount of enterprise data and user privacy information are leaked. There are many ways to leak, and the damage caused is becoming more and more severe. Therefore, the effective deletion of data that has reached the life cycle and has been maliciously attacked has become an important part of data security protection in computer network technology. [0003] Data overwriting is the most widespread method of data destruction in computer networks, and the most important thing is what standard is used to achieve overwriting. Data overwriting refers to the process of writing non-confidential data to the hard disk cluster that previously stored sensitive d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG11B5/024
Inventor 徐小龙龚培培金仙力韩京宇李爱群刘大勇
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products