Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A verification method for data destruction of storage media

A technology for data destruction and storage media, which is applied in the field of verification of data destruction of storage media, can solve problems such as wrongly pasted labels, subjective and intentional misoperation, and label drop-off, and achieves the effect of strengthening security and no missing verification

Active Publication Date: 2017-12-29
深圳青柠存储技术有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in actual operation, it is found that there are several problems in the existing verification method for the destruction of storage media data: (1) There are human errors or subjective and intentional misoperations, wrong labels are pasted indiscriminately, and the label information shows that it has been destroyed but the actual The problem that the destruction operation was not carried out led to the leakage of important data; (2) the label information is plain text information, which may easily lead to the exposure of the destruction information of the magnetic medium. If the label shows that the destruction information has not been completed, it is easy for illegal personnel to notice and steal the magnetic medium (3) The auditor relies too much on the label information. If the label falls off or is damaged during the processing, it will lead to the problem that the auditor cannot audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method for data destruction of storage media
  • A verification method for data destruction of storage media
  • A verification method for data destruction of storage media

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] figure 1 It is a flow chart of Embodiment 1 of the verification method for destroying storage medium data according to the present invention, figure 1 The execution subject is the storage medium data destruction device and the verification verification terminal, specifically as figure 1 shown, including:

[0033] Step 103: Perform data destruction processing on the target storage medium to be destroyed. The storage medium may include, for example, hard disk, U disk, mobile hard disk, SD card, CF card and other storage media. Data destruction can be done by physically clearing and overwriting sectors, or using strong magnetism to degauss and physically destroy storage media. The specific selection method can be selected according to the requirements of data destruction.

[0034] Step 105, extracting and generating a first encrypted electronic signature according to the data destruction feature information of the target storage medium, and generating a second encrypted...

Embodiment 2

[0044] figure 2 It is the flow chart of Embodiment 2 of the verification method for storage medium data destruction in the present invention. On the basis of Embodiment 1, Embodiment 2 adds a step of maximizing the storage medium capacity, specifically as figure 2 shown, including:

[0045] Step 101, maximizing the capacity of the target storage medium to eliminate system hidden storage space;

[0046] Step 103, performing data destruction processing on the target storage medium to be destroyed;

[0047] Step 105, extracting and generating a first encrypted electronic signature according to the data destruction feature information of the target storage medium, and generating a second encrypted electronic signature according to the extraction of inherent attribute information of the target storage medium;

[0048] Step 107: Encrypt the first encrypted electronic signature and the second encrypted electronic signature based on a preset encryption algorithm, generate a verifi...

Embodiment 3

[0052] image 3 It is the flow chart of Embodiment 3 of the verification method for data destruction of storage media in the present invention. Embodiment 3 is based on the above-mentioned embodiments, adding a defect detection step for judging whether there is an indestructible or partially indestructible defect, specifically as follows image 3 shown, including:

[0053] Step 101, maximizing the capacity of the target storage medium to eliminate system hidden storage space;

[0054] Step 102. Detect whether the target storage medium has an indestructible or partially indestructible defect. If it does not exist, execute step 103. If it exists, execute step 104, that is, send an alarm prompt message to confirm whether to perform physical destruction for thorough processing .

[0055] Step 103, performing data destruction on the target storage medium to be destroyed;

[0056] Step 105, extracting and generating a first encrypted electronic signature according to the data des...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a verification method for data destruction of a storage medium, comprising: performing data destruction processing on a target storage medium to be destroyed; generating a first encrypted electronic signature according to extraction of data destruction characteristic information of the target storage medium; and According to the inherent attribute information extraction of the target storage medium, the second encrypted electronic signature is generated; based on the preset encryption algorithm, the first encrypted electronic signature and the second encrypted electronic signature are combined and encrypted, and the verification ciphertext sequence is generated and then written Enter the verification storage area specified in the target storage medium; when verifying and checking, decrypt the verification ciphertext sequence in the verification storage area, and check the generated decryption result with the explicit information on the storage medium to verify the target storage Data destruction information for the media. The method provided by the invention can solve the existing problem of data leakage due to manual negligence or intentional inaccurate verification through technical means.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of data destruction, and in particular to a verification method for data destruction of a storage medium. Background technique [0002] In view of the storage principle of magnetic media and data reading and writing methods, ordinary low-level formatting, data deletion and other methods cannot completely clear data; the hidden operation of the operating system and hard disk will produce residual data, in order to prevent criminals from using data residual to recover The original data information will cause the risk of security leaks. Before the hard disk is scrapped or sent for repair or donated, the hard disk data should be destroyed according to different confidentiality levels. [0003] At present, a corresponding label will be generated after the data of the magnetic medium is destroyed, and the information on the label includes information such as the properties and specificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/10
Inventor 李家兴
Owner 深圳青柠存储技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products