Method and tool for safely clearing residual information of disk and production line system clearing method

A disk and security technology, applied in the field of information security, can solve problems such as information security protection that cannot meet the requirements of remaining information protection, and achieve the effect of reliable design principles, preventing accidental deletion, and highlighting substantive features

Inactive Publication Date: 2020-07-03
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing deletion method only deletes the index point pointing to the data block, and does not destroy or delete the data in the data block. Data recovery operations can be performed through specific data recovery technologies, which cannot meet the requirements of remaining information protection and information security protection. To meet the requirements of the problem, the present invention provides a method, tool, and production line system clearing method for safely clearing the remaining information on the disk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and tool for safely clearing residual information of disk and production line system clearing method
  • Method and tool for safely clearing residual information of disk and production line system clearing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] An embodiment of the present invention provides a method for safely clearing remaining information on a disk, including the following steps:

[0038] S11: Receive a request command to clear the remaining disk information, scan the directory and files in the file system that are about to perform a complete clear operation, and compare the scan result with the list of protected files. When it is detected that there is no file in the scan result in the list of protected files When, create to-be-cleared work task and message queue; Wherein, described message queue is used for loading the file information of scanning;

[0039] S12: Perform a thorough clearing operation on directories and files according to the created clearing task;

[0040] S13: Statistically analyze the cleaning results and create a result file.

Embodiment 2

[0042] Such as figure 1 As shown, the embodiment of the present invention provides a method for safely clearing the remaining information on the disk, including the following steps:

[0043] S21: Receive a request instruction for clearing the remaining disk information, scan the directory and files in the file system that are about to perform a thorough clearing operation, and compare the scanning result with the list of protected files. When it is detected that there is no file in the scanning result in the list of protected files When, create task and message queue to be cleared; Wherein, described message queue is used for loading the file information of scanning; When detecting the file in the scanning result in the list of protected files, then directly create the undeletable result file; It should be noted that a list of protected files needs to be created before performing this step;

[0044] S22: Perform a thorough clearing operation on directories and files according...

Embodiment 3

[0048]The technical scheme of the present invention provides a tool for safely clearing the remaining information on the disk. The tool is a tool for safely clearing the remaining information on the disk to prevent important files from being accidentally deleted, and is an executable file program (executable file) deployed on the server. . The main function module, branch function module and monitoring module of the tool. In this embodiment, there are multiple sub-function modules, wherein the main function module and the branch function modules interact through message queuing;

[0049] The main function module is used to receive the request command for clearing the remaining information on the disk, scan the directories and files in the file system that are about to be completely cleared, and compare the scanning results with the list of protected files. When it is detected that there is no scan in the list of protected files When the file in the result, create the task to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a tool for safely clearing residual information of a disk and a production line system clearing method. The method for securely clearing the residual information ofthe disk comprises the following steps of: receiving a request instruction for clearing residual information of a disk, scanning a directory and files to be subjected to thorough clearing operation in the file system, comparing a scanning result with the protected file list, and creating a to-be-cleared work task and a message queue when it is detected that no file in the scanning result exists in the protected file list; wherein the message queue is used for loading scanned file information; according to the created clearing work task, executing a thorough clearing operation on the directoryand the file; and performing statistical analysis on the clearing result and creating a result file.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method, a tool, and a production line system clearing method for safely clearing remaining information on a disk. Background technique [0002] With the advancement of informatization, the security of information systems has become a matter of great concern to people. GB / T 22239-2008 "Basic Requirements for Information Security Technology Information System Security Level Protection" puts forward the requirement of "residual information protection" in information systems rated as level three and above. In order to meet the requirements for protection of remaining disk information, it should be ensured that the memory and storage space used by the virtual machine are completely cleared during recovery. [0003] For most systems or websites using the Linux operating system, the rm command is commonly used to delete sensitive files and directories, but this command o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80
CPCG06F21/80G06F21/805G06F2221/2143
Inventor 王雪静
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products