Data destruction method and system
A data destruction and data technology, applied in the field of data security, can solve the problems of difficult large-scale and batch determination of destruction target data, mistaken destruction of useful data, and low efficiency of data destruction, so as to reduce data management costs, improve efficiency, The effect of enhancing the overall effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0057] With the vigorous development of information technology, people's awareness of network security is increasing, and a mature security protection system has gradually formed around the process of data generation, storage, transmission, and use. Among them, data destruction, as an important process in the data life cycle, is a key link in data security protection. The data life cycle can be a collection of processes such as data generation, storage, transmission, use, and destruction. Around the data destruction process, a complete security protection system has not yet been formed.
[0058] Specifically, as the demand for data security destruction is changing day by day, the existing data soft destruction and data hard destr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com