[go: up one dir, main page]

DK175426B1 - Procedure for deleting data on an electronic storage medium - Google Patents

Procedure for deleting data on an electronic storage medium Download PDF

Info

Publication number
DK175426B1
DK175426B1 DK200201811A DKPA200201811A DK175426B1 DK 175426 B1 DK175426 B1 DK 175426B1 DK 200201811 A DK200201811 A DK 200201811A DK PA200201811 A DKPA200201811 A DK PA200201811A DK 175426 B1 DK175426 B1 DK 175426B1
Authority
DK
Denmark
Prior art keywords
data storage
previously stored
byte
characters
data
Prior art date
Application number
DK200201811A
Other languages
Danish (da)
Inventor
Mikael Hertig
Original Assignee
Nensome Aps
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nensome Aps filed Critical Nensome Aps
Priority to DK200201811A priority Critical patent/DK175426B1/en
Priority to PCT/DK2003/000781 priority patent/WO2004049317A1/en
Priority to AU2003280321A priority patent/AU2003280321A1/en
Publication of DK200201811A publication Critical patent/DK200201811A/en
Application granted granted Critical
Publication of DK175426B1 publication Critical patent/DK175426B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/02Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
    • G11B5/09Digital recording

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management Or Editing Of Information On Record Carriers (AREA)

Description

DK 175426 B1DK 175426 B1

Opfindelsen angår en fremgangsmåde til sletning af data på et elektronisk lagermedium Herved forstås en harddisk, diskette, databånd eller systemer af sådanne, der systematisk anvendes til for sig eller i systematisk sammenhæng at lagre data, således at disse senere kan indlæses fra lagermediet / systemet til en : 5 computer, et netværk eller et system af netværker Lagermediet anvender typisk elektromagnetisk signalteknologi på en måde, der muliggør genbrug Metoden . kan således ikke anvendes for eksempel på hulkort, hvor de enkelte bits ikke kan ændres, og hvor man i stedet må anvende et nyt hulkort, hver gang der skal foretages en ændring 10 Metoden kan anvendes til systematisk at slette alle data på en given enhed, for eksempel en harddisk, eller et givet system af harddiske, for eksempel et raidsystem Metoden kan samtidig anvendes til at slette bestemte segmenter, for eksempel lagrede dokumenter på en diskBACKGROUND OF THE INVENTION This invention relates to a method for deleting data on an electronic storage medium. This means a hard disk, floppy disk, data tape or systems which are systematically used to store or systematically store data so that they can later be loaded from the storage medium / system to one: 5 computer, network or system of networks The storage media typically uses electromagnetic signal technology in a way that enables the reuse method. can therefore not be used, for example, on hole cards where the individual bits cannot be changed and where instead a new hole card must be used every time a change is made 10 The method can be used to systematically delete all data on a given device, for example a hard drive, or a given system of hard drives, for example a raid system The method can be used at the same time to delete certain segments, for example stored documents on a disk

Overskrivningen sker efter opfindelsen typisk for hver byte ad gangen i sy-15 stemet ved, at et randomisenngsprogram bestemmer, hvor mange gange mellem to og et maksimum, der frit vælges af brugeren, den pågældende byte skal overskrives med et tilfældigt valgt tegn, men kan også gennemføres ved sekventielt gennemført overskrivning 20 Ved de kendte oversknvmngsteknikker overskrives data det samme antal gange, valgt af programmet Der kan i den sammenhæng henvises til en de fakto standard fra det amerikanske forsvarsministerium, hvorefter enheden slettes mindst tre gange Metoden er beskrevet i et dokument med titlen DOD 5220 22-M, hvor den er beskrevet som eller V 25Typically, the overwriting occurs for each byte at a time in the system in that a randomization program determines how many times between two and a maximum freely chosen by the user, the byte in question must be overwritten with a randomly selected character, but can be also carried out by sequential overwriting 20 In the known cutting techniques, data is overwritten the same number of times, selected by the program. In this context, a de facto standard from the US Department of Defense can be referred to, after which the unit is deleted at least three times. the title DOD 5220 22-M where it is described as or V 25

Det hedder i afsnit 8 306 e "Overskriv alle adresseibare loaliteter med en enkelt karakter, dens komplementære 30 modsætning, så en tilfældig karakter ”It states in section 8 306 e "Overwrite all addressable loyalties with a single character, its complementary 30 opposites, then a random character"

Ved gentagen overskrivning af lagermediet vanskeliggøres sporingen af tidligere indlæste signaler Ser man hver bitposition som en flad, kasseformet enhed, . 35 hvorover læse/sknvehovedet positioneres over diagonallmiemes skæringspunkt, vil den direkte magnetisering ske omkring midten Når der i det hele taget vil kunne findes spor efter tidligere indlæste signaler, skyldes det, at det magnetiserede områder selv videremagnetiserer deres omgivelser med svagere signaler end dem, læsehovederne selv magnetiserer direkte med Derved opstår der lag af tidligere 40 indlæste, svage signaler Søgning efter tidligere indlæste signaler skal kunne ske ved, at man søger længere nede og ud mod siderne Har man på den måde fremfundet et signal fra en tidligere skrevet fil i en byte og dermed dens bestanddele af bits, er sandsynligheden for, at en meget stor del af datasegmentets øvnge indlæste signaler findes på ens positioneret på de tilsvarende lokaliteter i de øvnge 45 bits som den fundne, ret høj Kan man således med dertil udviklet udstyr læse signaler fra tidligere indlæste data, der er overskrevet i overensstemmelse med den hidtil kendte teknik, vil optrevhngen af de tidligere indlæste og siden I DK 175426 B1By repeatedly overwriting the storage medium, the tracking of previously loaded signals makes it difficult to see each bit position as a flat, box-shaped unit,. 35 over which the read / skew head is positioned above the intersection of the diagonallmiem, the direct magnetization will occur around the center When traces of previously loaded signals can be found at all, it is because the magnetized regions themselves re-magnetize their surroundings with weaker signals than those, the reading heads even magnetizes directly with This creates layers of previously 40 weak, weak signals Searching for previously loaded signals must be possible by searching further down and out to the pages Have you thus obtained a signal from a previously written file in a byte and hence its constituents of bits, the probability that a very large part of the data segment's input signals is located at the same position at the corresponding locations in the upper 45 bits as the found, rather high signal can thus be read with developed equipment previously loaded data overwritten in accordance with it so far prior art, the recording of the previously loaded and since I DK 175426 B1

I overskrevne data være lettet derved, at repetition af viden om, hvor signalerne kan IIn overwritten data be facilitated by repetition of knowledge of where the signals can be

I læses, vil være mulig i de tilfælde, hvor bytes på lagermediet har gennemløbet IYou will read that will be possible in cases where bytes on the storage medium have passed through I

I samme historiske forløb IIn the same historical course

I 5 Der er emghed blandt fagfolk om, at genopdagelse af data vanskeliggøres ved II 5 There is concern among professionals that rediscovery of data is made more difficult by I

I flere overskrivninger, hvis disse foretages med forskellige mønstre Genopdagelse ' IIn multiple headings if these are made with different patterns Rediscovery 'I

vanskeliggøres således, at jo flere overskrivninger, des vanskeligere vil genopda- Iis made more difficult so that the more transcripts, the more difficult it is to rediscover

I gelse blive I praksis nævnes der på et givet tidspunkt det antal overskrivninger, ' IIn practice, in practice, the number of headings mentioned at a given point is mentioned

der for tiden anses for tilstrækkeligt til at opnå en acceptabel høj grad af Icurrently considered sufficient to achieve an acceptable high degree of I

I 10 beskyttelse II 10 protection I

I Ved minimum forstås det mindste antal gange, overskrivningen af det udvalgte II By minimum is meant the minimum number of times, the overwriting of the selected I

I område skal ske med Minimum kan teoretisk sættes til 0, men vil i praksis tigge IIn area should be done with Minimum can theoretically be set to 0, but will in practice beg you

I væsentligt højere Det udvalgte udtryk for minimum skal være et heltal ISignificantly higher The selected expression for the minimum must be an integer I

I 15 Ved maksimum forstås det største antal overskrivninger, processen anvender Der II 15 Maximum is the largest number of overwrites that the process uses

I er tale om et heltal, der bestemmer, hvor mange overskrivninger, en byte på IYou are talking about an integer that determines how many overwrites, a byte of I

I enheden maksimalt kan tænkes at anvende IIn the unit maximum you can use I

I Ved opfindelsen brydes de parallelle historiske forløb, der gør det muligt at IIn the invention, the parallel historical paths are broken which allow you to

I 20 genfremfinde data ved anvendelse af den ovenfor beskrevne gentagelse af læsning IIn 20, data is retrieved using the above-mentioned repeat of reading I

af signaler ud fra en forudsætning om, at man skal lede efter signaler med samme Iof signals on the assumption that one must look for signals with the same I

I forskydning fra overfladens midte for hver bitposition for at finde tidligere IIn offset from the center of the surface for each bit position to find earlier I

indlæste data Iloaded data

I 25 Dette opnås ifølge opfindelsen ved at variere antallet af overskrivninger for hver IThis is achieved according to the invention by varying the number of overwrites for each I

I enkelt byte, så antallet af lag fra tidligere overskrivninger varierer fra byte til byte, IIn single bytes, the number of layers from previous overwrites varies from byte to byte, I

I fra minimalt 2 og maksimalt et antal overskrivninger mellem 3 og uendeligt, valgt II from a minimum of 2 and a maximum of a number of overwrites between 3 and infinity, selected I

af brugeren selv Iby the user himself

I 30 II 30 I

I en given udførelsesform anvendes en tilfældighedsgenerator til at vælge det an- IIn a given embodiment, a random generator is used to select it

I tal oversknvninger, der skal gennemføres for hver eneste byte, der skal overskn- IIn number of cuts to be performed for each byte to be cut

I ves Denne metode kan udbygges yderligere gennem valget af en tilfæl- IThis method can be further elaborated through the choice of a case

I dighedsgenerator med en meget lav grad af forudsigelighed i udvælgelses- IIn density generator with a very low degree of predictability in selection I

I 35 mønstret IIn the pattern I

I I en given udførelsesform anvendes der samtidig en tilfældighedsgenerator til ud- IIn a given embodiment, a random generator is used for output

vælgeisen af de tegn, der skal anvendes ved hver enkelt overskrivning af hver en- Ithe choice of the characters to be used in each overwriting of each one

I kelt byte Også denne metode kan udbygges yderligere gennem valget af en mate- IIn cold bytes This method can also be further developed through the choice of a mate

I 40 matisk tilfældighedsgenerator, der efterlader en meget lille grad af forudsigelighed IIn 40 random random generator leaving a very small degree of predictability I

I i udvælgelsesmønstret blandt samtlige de tegn, computerens tegnsæt anvender IIn the selection pattern among all the characters used by the computer character set

I Herved opnås en samlet højere grad af uforudsigelighed og derved en lavere gen- IHereby, an overall higher degree of unpredictability is achieved and thereby a lower gene

I kendelighed af det mønster, en rekonstruktør af overskrevne data måtte betjene sig IBecause of the pattern that a reconstructor of overwritten data had to use

I af II of I

45 I45 I

I 2 II 2 I

Claims (4)

1 Fremgangsmåde til sletning af hidtidigt lagrede data på elektroniske datalagnngsmedier eller datalagringssystemer ved gentagen skrivning af S nye tegn ovenpå de hidtidigt lagrede tegn kendetegnet ved, at antallet af overskrivninger vanerer fra byte til byte mellem et minimum (=1) og et ' maksimum (=uendeligt)1 Procedure for deleting previously stored data on electronic data storage media or data storage systems by repeatedly writing S new characters on top of the previously stored characters characterized by the number of overwriting behaviors from byte to byte between a minimum (= 1) and a 'maximum (= infinite) 2 Fremgangsmåde til sletning af hidtidigt lagrede data på elektroniske 10 datalagnngsmedier ifølge krav 1, kendetegnet ved, at antallet af gange, hver bytes oversknves, udvælges af et randomisenngsprogramA method for deleting previously stored data on electronic data storage media according to claim 1, characterized in that the number of times each byte is overwritten is selected by a randomization program 3 Fremgangsmåde til sletning af hidtil lagrede data på elektroniske datalag-nngsmedier ifølge krav 1 og krav 2, kendetegnet ved, at programmets 15 administrator vælger antallet af oversknvmngerMethod for deleting data stored so far on electronic data storage media according to claim 1 and claim 2, characterized in that the administrator of the program 15 selects the number of switches 4 Fremgangsmåde til sletmng af hidtidigt lagrede data på elektroniske datalagringsmedier eller datalagnngssystemer ved gentagen oversknvning af nye tegn ovenpå de hidtidigt lagrede tegn ifølge krav 1, kendetegnet ved, 20 at et tilfældighedsgenerenngsprogram anvendes til at udvælge de tegn, der udvælges ved hver eneste overskrivning Fremgangsmåden kan anvendes på et hvilket som helst af de tegnsæt, det pågældende computersystem anvender 25 i 4Method for deleting previously stored data on electronic data storage media or data storage systems by repeatedly cutting new characters on top of the previously stored characters according to claim 1, characterized in that a random repetition program is used to select the characters selected by each overwriting method. is applied to any of the character sets used by that computer system 25 in 4
DK200201811A 2002-11-25 2002-11-25 Procedure for deleting data on an electronic storage medium DK175426B1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
DK200201811A DK175426B1 (en) 2002-11-25 2002-11-25 Procedure for deleting data on an electronic storage medium
PCT/DK2003/000781 WO2004049317A1 (en) 2002-11-25 2003-11-14 Procedure for erasure of data on electronical data media
AU2003280321A AU2003280321A1 (en) 2002-11-25 2003-11-14 Procedure for erasure of data on electronical data media

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DK200201811A DK175426B1 (en) 2002-11-25 2002-11-25 Procedure for deleting data on an electronic storage medium
DK200201811 2002-11-25

Publications (2)

Publication Number Publication Date
DK200201811A DK200201811A (en) 2004-07-30
DK175426B1 true DK175426B1 (en) 2004-10-18

Family

ID=32337936

Family Applications (1)

Application Number Title Priority Date Filing Date
DK200201811A DK175426B1 (en) 2002-11-25 2002-11-25 Procedure for deleting data on an electronic storage medium

Country Status (3)

Country Link
AU (1) AU2003280321A1 (en)
DK (1) DK175426B1 (en)
WO (1) WO2004049317A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6731447B2 (en) * 2001-06-04 2004-05-04 Xerox Corporation Secure data file erasure
AU2002315365A1 (en) * 2001-06-21 2003-01-08 Dan Bress Systems and methods for removing data stored on long-term memory devices
US20030210489A1 (en) * 2002-05-13 2003-11-13 Yec Co., Ltd. Data eraser and data erasing program

Also Published As

Publication number Publication date
DK200201811A (en) 2004-07-30
AU2003280321A1 (en) 2004-06-18
WO2004049317A1 (en) 2004-06-10

Similar Documents

Publication Publication Date Title
AU2004325580A1 (en) System and method of erasing non-volatile recording media
JP5620792B2 (en) Distributed archive system, data archive device, and data restoration device
CN117176474B (en) Encryption protection method and system for RFID data
Wani et al. File system anti-forensics–types, techniques and tools
CN106960164A (en) A kind of method and system of the fixed electronic evidence in scene
Khan et al. Designing a cluster-based covert channel to evade disk investigation and forensics
EP3410604A1 (en) Systems and methods for geometric data compression and encryption
KR101526515B1 (en) Device for storing data by utilizing pseudorandom number sequence
JP4101975B2 (en) Data recording / reproducing apparatus using portable storage medium
DK175426B1 (en) Procedure for deleting data on an electronic storage medium
KR20090052130A (en) Data protection method using data partitioning
CN116088770B (en) Data management method and device, system, electronic device, storage medium
CN114039990A (en) Inadvertent access to a storage system
EP0049113B1 (en) File deletion method for bubble cassette memory, and bubble cassette memory control apparatus
US20060120235A1 (en) System and method of erasing non-volatile recording media
RU2003108836A (en) PLAYBACK METHOD, PLAYBACK DEVICE, RECORDING METHOD AND RECORDING DEVICE
US7082425B2 (en) Real-time searching of data in a data stream
Troncoso et al. Traffic analysis attacks on a continuously-observable steganographic file system
CN105068764B (en) A kind of device and method for simulating NandFlash
Klonowski et al. Data deletion with provable security
Sansurooah A forensics overview and analysis of USB flash memory devices
RU96433U1 (en) FILE REMOVAL SYSTEM (FILE SHREDDER)
KR100831372B1 (en) Portable device with file delete / restore function and file deletion / restoration method
CN117311639B (en) Information hiding storage device and initialization, reading and writing method thereof
Fischer et al. Limited random access Turing machines

Legal Events

Date Code Title Description
PBP Patent lapsed

Ref document number: DK