Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method for data destruction of storage medium

A technology for data destruction and storage media, which is applied in the field of verification of data destruction of storage media, can solve problems such as label mislabelling, subjective and intentional misoperation, important data leakage, etc., to achieve enhanced security and no missing verification Effect

Active Publication Date: 2015-12-02
深圳青柠存储技术有限公司
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in actual operation, it is found that there are several problems in the existing verification method for the destruction of storage media data: (1) There are human errors or subjective and intentional misoperations, wrong labels are pasted indiscriminately, and the label information shows that it has been destroyed but the actual The problem that the destruction operation was not carried out led to the leakage of important data; (2) the label information is plain text information, which may easily lead to the exposure of the destruction information of the magnetic medium. If the label shows that the destruction information has not been completed, it is easy for illegal personnel to notice and steal the magnetic medium (3) The auditor relies too much on the label information. If the label falls off or is damaged during the processing, it will lead to the problem that the auditor cannot audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method for data destruction of storage medium
  • Verification method for data destruction of storage medium
  • Verification method for data destruction of storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] figure 1 It is a flow chart of Embodiment 1 of the verification method for destroying storage medium data according to the present invention, figure 1 The execution subject is the storage medium data destruction device and the verification verification terminal, specifically as figure 1 shown, including:

[0033] Step 103: Perform data destruction processing on the target storage medium to be destroyed. The storage medium may include, for example, hard disk, U disk, mobile hard disk, SD card, CF card and other storage media. Data destruction can be done by physically clearing and overwriting sectors, or using strong magnetism to degauss and physically destroy storage media. The specific selection method can be selected according to the requirements of data destruction.

[0034] Step 105, extracting and generating a first encrypted electronic signature according to the data destruction feature information of the target storage medium, and generating a second encrypted...

Embodiment 2

[0044] figure 2 It is the flow chart of Embodiment 2 of the verification method for storage medium data destruction in the present invention. On the basis of Embodiment 1, Embodiment 2 adds a step of maximizing the storage medium capacity, specifically as figure 2 shown, including:

[0045] Step 101, maximizing the capacity of the target storage medium to eliminate system hidden storage space;

[0046] Step 103, performing data destruction processing on the target storage medium to be destroyed;

[0047] Step 105, extracting and generating a first encrypted electronic signature according to the data destruction feature information of the target storage medium, and generating a second encrypted electronic signature according to the extraction of inherent attribute information of the target storage medium;

[0048] Step 107: Encrypt the first encrypted electronic signature and the second encrypted electronic signature based on a preset encryption algorithm, generate a verifi...

Embodiment 3

[0052] image 3 It is the flow chart of Embodiment 3 of the verification method for data destruction of storage media in the present invention. Embodiment 3 is based on the above-mentioned embodiments, adding a defect detection step for judging whether there is an indestructible or partially indestructible defect, specifically as follows image 3 shown, including:

[0053] Step 101, maximizing the capacity of the target storage medium to eliminate system hidden storage space;

[0054] Step 102. Detect whether the target storage medium has an indestructible or partially indestructible defect. If it does not exist, execute step 103. If it exists, execute step 104, that is, send an alarm prompt message to confirm whether to perform physical destruction for thorough processing .

[0055] Step 103, performing data destruction processing on the target storage medium to be destroyed;

[0056] Step 105, extracting and generating a first encrypted electronic signature according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a verification method for data destruction of storage medium. The method comprises the following steps of: destructing data of a target storage medium to be subjected to data destruction; extracting and generating a first encryption electronic feature code according to data destruction feature information of the target storage medium and extracting and generating a second encryption electronic feature code according to inherent attribute information of the target storage medium; based on a preset encryption algorithm, performing combined encryption on the first encryption electronic feature code and the second encryption electronic feature code, and generating a verification ciphertext sequence and writing the sequence into a specified verification storage area in the target storage medium; while verifying and checking, decrypting the verification ciphertext sequence in the verification storage area, and checking the generated decryption result with display information on the storage medium to verify the data destruction information of the target storage medium. With the method provided by the invention, by technological means, an existing problem of data leakage caused by artificial negligence or deliberate inaccuracy of verification can be solved.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of data destruction, and in particular to a verification method for data destruction of a storage medium. Background technique [0002] In view of the storage principle of magnetic media and data reading and writing methods, ordinary low-level formatting, data deletion and other methods cannot completely clear data; the hidden operation of the operating system and hard disk will produce residual data, in order to prevent criminals from using data residual to recover The original data information will cause the risk of security leaks. Before the hard disk is scrapped or sent for repair or donated, the hard disk data should be destroyed according to different confidentiality levels. [0003] At present, a corresponding label will be generated after the data of the magnetic medium is destroyed, and the information on the label includes information such as the properties and specificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/10
Inventor 李家兴
Owner 深圳青柠存储技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products