Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure erasure method and apparatus

A safe and non-safe technology, applied in the direction of input/output to record carrier, etc., can solve problems such as blocking and freezing, and achieve the effect of improving running smoothness and good product experience

Active Publication Date: 2016-02-03
FUZHOU ROCKCHIP SEMICON
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention enables the data specified by the user to be erased from the storage medium, effectively protecting the user's security information, but it cannot solve the problem of blocking and jamming of the system's normal disk access under the secure erasing operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure erasure method and apparatus
  • Secure erasure method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Such as figure 1 As shown, a preferred embodiment of the secure erasing device of the present invention includes

[0034] In the granularity setting module 101, the user presets the splitting granularity, and the granularity is used for the system to split the address space of the secure erasing of continuous large blocks.

[0035] The initiating erasure module 102 is used for initiating secure erasing in the user space, and the parameter is the address space of the secure erasing; the parameter is the address and length of the disk LBA required for the secure erasing.

[0036] The splitting module 103 is used for splitting the address space of the secure erase in the kernel space according to the splitting granularity preset by the user. When splitting, the address space to be executed for secure erasing is divided into equal lengths according to the splitting granularity.

[0037] The converting module 104 is used for converting between non-secure erasing and secure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure erasure method. The method comprises the steps that: (1) a user sets the splitting granularity; (2) a user space initiates secure erasure, wherein a carried parameter is an address space of the secure erasure; (3) a kernel space splits the address space of the secure erasure according to the splitting granularity preset by the user; (4) a secure erasure mode is changed to a non-secure erasure mode; (5) the split address space is segmentally subjected to non-secure erasure under the condition that an IO load of a system is relatively low; and (6) after all non-secure erasure operations are performed, the system initiates garbage recovery and collection under the condition that the IO load is relatively low. According to the method, the secure erasure is subjected to non-secure splitting, and the non-secure erasure and the garbage recovery and collection are performed under the condition that the IO load of the system is relatively low, so that the blocking and jamming problems of normal disk access of the system are prevented.

Description

technical field [0001] The invention relates to a method and device for safely erasing an embedded system. Background technique [0002] The current embedded system requires a large number of security erase operations for emmc particles to ensure the unrecoverable deletion of disk data. Secure Erase is different from conventional erase operations in that it is executed exclusively, and other read and write operations must wait for it to complete before proceeding. Therefore, if there are a large number of areas that need to be securely erased, the normal disk access of the system will be blocked, causing user experience to be stuck, and even causing system abnormalities. [0003] A Chinese invention published on 2012.08.01 with a publication number of CN102622309A discloses a method and device for securely erasing data, which receives instruction information for securely erasing data, and the instruction information includes the logical address of the data that needs to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/06
Inventor 林涛
Owner FUZHOU ROCKCHIP SEMICON
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products