Secure erasure method and apparatus
A safe and non-safe technology, applied in the direction of input/output to record carrier, etc., can solve problems such as blocking and freezing, and achieve the effect of improving running smoothness and good product experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0033] Such as figure 1 As shown, a preferred embodiment of the secure erasing device of the present invention includes
[0034] In the granularity setting module 101, the user presets the splitting granularity, which is used by the system to split the continuous large block of securely erased address space.
[0035] The erasing initiating module 102 is used to initiate a secure erasing in the user space, and the parameters carried are the address space of the secure erasing; the parameters are the address and length of the disk LBA required for the secure erasing.
[0036] The splitting module 103 is used to split the securely erased address space in the kernel space according to the split granularity preset by the user. When splitting, the address space of the security erase to be executed is divided into equal lengths according to the split granularity.
[0037] The conversion module 104 is used for conversion between non-secure erasure and secure erasure. And when the system is h...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap