Unlock instant, AI-driven research and patent intelligence for your innovation.

Electronic Data Destruction Methods

A technology of electronic data and data, which is applied in the computer field, can solve problems such as risks caused by data deletion, insufficient deletion methods, leakage of confidential documents, etc., and achieve the effect of avoiding economic and property losses

Active Publication Date: 2020-05-08
广州瑞特租赁服务有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the times and the gradual advancement of technology, the current confidential data is stored on the computer, and sometimes it needs to be deleted through the confidential data. The traditional solution is to directly delete the confidential data on the computer, but this method of deletion is often Not thorough enough, followed by storing the confidential data on the data deletion device, and then using the deletion device to detect whether there is residual data on the computer, and then deleting the confidential electronic data on the deletion device, but this deletion device There is no verification information to delete the data directly, which leads to risks in the process of deleting some data. Similarly, the relevant staff needs to confirm the deletion. There is no confirmation step in the existing ones. Direct deletion not only It will bring risks to the deletion of confidential files, and it will also lead to the leakage of confidential files, which will bring a lot of inconvenience to users. In order to solve the above technical problems, a new technical solution is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic Data Destruction Methods
  • Electronic Data Destruction Methods
  • Electronic Data Destruction Methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The accompanying drawings are for illustrative purposes only, and should not be construed as limitations on this patent; in order to better illustrate this embodiment, certain components in the accompanying drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product; for those skilled in the art It is understandable that some well-known structures and descriptions thereof may be omitted in the drawings.

[0017] Referring to each figure, a method for destroying electronic data includes the following steps: step 1, first confirming the data to be destroyed; step 2, isolating the electronic data to be destroyed; step 3, exporting the electronic data isolated in step 2 to the storage device; Step 4, destroy the electronic data exported in Step 3 on the storage device; Step 5, destroy it on the storage device after double confirmation, the first confirmation method is digital key password confirmation, the second confirmation The confi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for destroying electronic data, relating to the field of computer technology, comprising the following steps: step 1, first confirming the data to be destroyed; step 2, isolating the electronic data to be destroyed; step 3, isolating the electronic data isolated in step 2 Export to the storage device; Step 4: Destroy the electronic data exported in Step 3 on the storage device; Step 5: Destroy on the storage device after double confirmation, the first confirmation method is digital key password confirmation, the second The re-confirmation method is fingerprint confirmation; Step 6, confirm the data destroyed on the storage device. This method uses the combination of traditional methods and new devices, so as to achieve more security in the process of data deletion and can effectively It prevents users from deleting data they do not want to delete and data in storage devices from being stolen, and can avoid economic property losses of users.

Description

Technical field: [0001] The invention relates to the technical field of computers, in particular to a method for destroying electronic data. Background technique: [0002] With the development of the times and the gradual advancement of technology, the current confidential data is stored on the computer, and sometimes it needs to be deleted through the confidential data. The traditional solution is to directly delete the confidential data on the computer, but this method of deletion is often Not thorough enough, followed by storing the confidential data on the data deletion device, and then using the deletion device to detect whether there is residual data on the computer, and then deleting the confidential electronic data on the deletion device, but this deletion device There is no verification information to delete the data directly, which leads to risks in the process of deleting some data. Similarly, the relevant staff needs to confirm the deletion. There is no confirmat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06G06F21/31G06F21/32G06F21/62
CPCG06F3/062G06F3/0652G06F3/0655G06F21/31G06F21/32G06F21/62G06F21/79G06F2221/2143
Inventor 郭永灿程应春刘军裘宗伴
Owner 广州瑞特租赁服务有限公司