Electronic Data Destruction Methods
A technology of electronic data and data, which is applied in the computer field, can solve problems such as risks caused by data deletion, insufficient deletion methods, leakage of confidential documents, etc., and achieve the effect of avoiding economic and property losses
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] The accompanying drawings are for illustrative purposes only, and should not be construed as limitations on this patent; in order to better illustrate this embodiment, certain components in the accompanying drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product; for those skilled in the art It is understandable that some well-known structures and descriptions thereof may be omitted in the drawings.
[0017] Referring to each figure, a method for destroying electronic data includes the following steps: step 1, first confirming the data to be destroyed; step 2, isolating the electronic data to be destroyed; step 3, exporting the electronic data isolated in step 2 to the storage device; Step 4, destroy the electronic data exported in Step 3 on the storage device; Step 5, destroy it on the storage device after double confirmation, the first confirmation method is digital key password confirmation, the second confirmation The confi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


