Unlock instant, AI-driven research and patent intelligence for your innovation.

Disk data connection chain-based file crushing method

A technology for linking chains and files, applied in the field of information security, can solve problems such as deliberate recovery, doubts about reliability and security, and inability to process data with a secret level, so as to improve efficiency, improve availability and security, Risk reduction effect

Active Publication Date: 2015-06-24
CHINA ELECTRIC POWER RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to meet the needs of users to completely delete files, some special so-called file shredding software appeared on the Internet, and some anti-virus software also added the file shredding function, but most of these software have not passed the certification of specialized agencies, and their reliability and security are not It is doubtful that it can be used to process general private data, but it cannot be used to process classified data
[0009] To sum up, when routine operations such as deleting and formatting are used to "destroy" data, in fact the data is not actually destroyed, and the data will remain until new data is written into the same storage space of the hard disk, so there is a possibility that it will be destroyed by others. risk of deliberate recovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk data connection chain-based file crushing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0027] Such as figure 1 A method for shredding files based on a disk data connection chain is provided, the method comprising the following steps:

[0028] Step 1: Find the file allocation table and cluster address pointer through the file to be shredded;

[0029] Step 2: Smash and delete the found file allocation table and cluster address pointer;

[0030] Step 3: Overwrite the free space on the disk.

[0031] In the step 1, the file allocation table represents storage disk file space information, which includes unallocated, allocated or marked as bad disk cluster information; the header of the file allocation table occupies three entries , where the first byte is the disk media specifier, and the second and third bytes are FFFFH set by the system. DOS allocates disk space to files in units of clusters, and each cluster occupies an area in the file alloca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a disk data connection chain-based file crushing method, which comprises the following steps of: looking up a file allocation table and a family address pointer through a file to be crushed; performing crushing deletion on the found file allocation table and the family address pointer; and overwriting the available space of a disk. According to the disk data connection chain-based file crushing method provided by the invention, through performing the crushing deletion on the file allocation table and the family address pointer, the file cannot be normally recovered, and a recovery tool cannot look up the crushed file through the stored information of the disk. On the basis, the file allocation table and the family address pointer in the disk and a free space are overwritten, and therefore, the file can be thoroughly cleared and crushed. Only a disk sector with an address pointer and the family address pointer in the file allocation table in the disk is overwritten, and therefore, not only is the crushing efficiency improved but also the damage risk of the disk is lowered.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a file shredding method based on a disk data connection chain. Background technique [0002] Data security is one of the core issues of information security. Data security includes not only data encryption, access control, backup and recovery, etc. for the purpose of maintaining data integrity, but also data destruction for the purpose of completely destroying data integrity. . Data destruction refers to the use of various technical means to completely delete the data in the computer storage device, so as to prevent unauthorized users from using the residual data to restore the original data information, so as to achieve the purpose of protecting key data. Due to the different nature of information carriers, compared with paper documents, the destruction technology of data files is more complicated, the procedure is more cumbersome, and the cost is highe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
Inventor 李凌高昆仑郑晓崑王涛赵保华魏桂臣
Owner CHINA ELECTRIC POWER RES INST