DK175426B1 - Procedure for deleting data on an electronic storage medium - Google Patents
Procedure for deleting data on an electronic storage medium Download PDFInfo
- Publication number
- DK175426B1 DK175426B1 DK200201811A DKPA200201811A DK175426B1 DK 175426 B1 DK175426 B1 DK 175426B1 DK 200201811 A DK200201811 A DK 200201811A DK PA200201811 A DKPA200201811 A DK PA200201811A DK 175426 B1 DK175426 B1 DK 175426B1
- Authority
- DK
- Denmark
- Prior art keywords
- data storage
- previously stored
- byte
- characters
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0674—Disk device
- G06F3/0676—Magnetic disk device
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B5/00—Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
- G11B5/02—Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
- G11B5/09—Digital recording
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management Or Editing Of Information On Record Carriers (AREA)
Description
DK 175426 B1DK 175426 B1
Opfindelsen angår en fremgangsmåde til sletning af data på et elektronisk lagermedium Herved forstås en harddisk, diskette, databånd eller systemer af sådanne, der systematisk anvendes til for sig eller i systematisk sammenhæng at lagre data, således at disse senere kan indlæses fra lagermediet / systemet til en : 5 computer, et netværk eller et system af netværker Lagermediet anvender typisk elektromagnetisk signalteknologi på en måde, der muliggør genbrug Metoden . kan således ikke anvendes for eksempel på hulkort, hvor de enkelte bits ikke kan ændres, og hvor man i stedet må anvende et nyt hulkort, hver gang der skal foretages en ændring 10 Metoden kan anvendes til systematisk at slette alle data på en given enhed, for eksempel en harddisk, eller et givet system af harddiske, for eksempel et raidsystem Metoden kan samtidig anvendes til at slette bestemte segmenter, for eksempel lagrede dokumenter på en diskBACKGROUND OF THE INVENTION This invention relates to a method for deleting data on an electronic storage medium. This means a hard disk, floppy disk, data tape or systems which are systematically used to store or systematically store data so that they can later be loaded from the storage medium / system to one: 5 computer, network or system of networks The storage media typically uses electromagnetic signal technology in a way that enables the reuse method. can therefore not be used, for example, on hole cards where the individual bits cannot be changed and where instead a new hole card must be used every time a change is made 10 The method can be used to systematically delete all data on a given device, for example a hard drive, or a given system of hard drives, for example a raid system The method can be used at the same time to delete certain segments, for example stored documents on a disk
Overskrivningen sker efter opfindelsen typisk for hver byte ad gangen i sy-15 stemet ved, at et randomisenngsprogram bestemmer, hvor mange gange mellem to og et maksimum, der frit vælges af brugeren, den pågældende byte skal overskrives med et tilfældigt valgt tegn, men kan også gennemføres ved sekventielt gennemført overskrivning 20 Ved de kendte oversknvmngsteknikker overskrives data det samme antal gange, valgt af programmet Der kan i den sammenhæng henvises til en de fakto standard fra det amerikanske forsvarsministerium, hvorefter enheden slettes mindst tre gange Metoden er beskrevet i et dokument med titlen DOD 5220 22-M, hvor den er beskrevet som eller V 25Typically, the overwriting occurs for each byte at a time in the system in that a randomization program determines how many times between two and a maximum freely chosen by the user, the byte in question must be overwritten with a randomly selected character, but can be also carried out by sequential overwriting 20 In the known cutting techniques, data is overwritten the same number of times, selected by the program. In this context, a de facto standard from the US Department of Defense can be referred to, after which the unit is deleted at least three times. the title DOD 5220 22-M where it is described as or V 25
Det hedder i afsnit 8 306 e "Overskriv alle adresseibare loaliteter med en enkelt karakter, dens komplementære 30 modsætning, så en tilfældig karakter ”It states in section 8 306 e "Overwrite all addressable loyalties with a single character, its complementary 30 opposites, then a random character"
Ved gentagen overskrivning af lagermediet vanskeliggøres sporingen af tidligere indlæste signaler Ser man hver bitposition som en flad, kasseformet enhed, . 35 hvorover læse/sknvehovedet positioneres over diagonallmiemes skæringspunkt, vil den direkte magnetisering ske omkring midten Når der i det hele taget vil kunne findes spor efter tidligere indlæste signaler, skyldes det, at det magnetiserede områder selv videremagnetiserer deres omgivelser med svagere signaler end dem, læsehovederne selv magnetiserer direkte med Derved opstår der lag af tidligere 40 indlæste, svage signaler Søgning efter tidligere indlæste signaler skal kunne ske ved, at man søger længere nede og ud mod siderne Har man på den måde fremfundet et signal fra en tidligere skrevet fil i en byte og dermed dens bestanddele af bits, er sandsynligheden for, at en meget stor del af datasegmentets øvnge indlæste signaler findes på ens positioneret på de tilsvarende lokaliteter i de øvnge 45 bits som den fundne, ret høj Kan man således med dertil udviklet udstyr læse signaler fra tidligere indlæste data, der er overskrevet i overensstemmelse med den hidtil kendte teknik, vil optrevhngen af de tidligere indlæste og siden I DK 175426 B1By repeatedly overwriting the storage medium, the tracking of previously loaded signals makes it difficult to see each bit position as a flat, box-shaped unit,. 35 over which the read / skew head is positioned above the intersection of the diagonallmiem, the direct magnetization will occur around the center When traces of previously loaded signals can be found at all, it is because the magnetized regions themselves re-magnetize their surroundings with weaker signals than those, the reading heads even magnetizes directly with This creates layers of previously 40 weak, weak signals Searching for previously loaded signals must be possible by searching further down and out to the pages Have you thus obtained a signal from a previously written file in a byte and hence its constituents of bits, the probability that a very large part of the data segment's input signals is located at the same position at the corresponding locations in the upper 45 bits as the found, rather high signal can thus be read with developed equipment previously loaded data overwritten in accordance with it so far prior art, the recording of the previously loaded and since I DK 175426 B1
I overskrevne data være lettet derved, at repetition af viden om, hvor signalerne kan IIn overwritten data be facilitated by repetition of knowledge of where the signals can be
I læses, vil være mulig i de tilfælde, hvor bytes på lagermediet har gennemløbet IYou will read that will be possible in cases where bytes on the storage medium have passed through I
I samme historiske forløb IIn the same historical course
I 5 Der er emghed blandt fagfolk om, at genopdagelse af data vanskeliggøres ved II 5 There is concern among professionals that rediscovery of data is made more difficult by I
I flere overskrivninger, hvis disse foretages med forskellige mønstre Genopdagelse ' IIn multiple headings if these are made with different patterns Rediscovery 'I
vanskeliggøres således, at jo flere overskrivninger, des vanskeligere vil genopda- Iis made more difficult so that the more transcripts, the more difficult it is to rediscover
I gelse blive I praksis nævnes der på et givet tidspunkt det antal overskrivninger, ' IIn practice, in practice, the number of headings mentioned at a given point is mentioned
der for tiden anses for tilstrækkeligt til at opnå en acceptabel høj grad af Icurrently considered sufficient to achieve an acceptable high degree of I
I 10 beskyttelse II 10 protection I
I Ved minimum forstås det mindste antal gange, overskrivningen af det udvalgte II By minimum is meant the minimum number of times, the overwriting of the selected I
I område skal ske med Minimum kan teoretisk sættes til 0, men vil i praksis tigge IIn area should be done with Minimum can theoretically be set to 0, but will in practice beg you
I væsentligt højere Det udvalgte udtryk for minimum skal være et heltal ISignificantly higher The selected expression for the minimum must be an integer I
I 15 Ved maksimum forstås det største antal overskrivninger, processen anvender Der II 15 Maximum is the largest number of overwrites that the process uses
I er tale om et heltal, der bestemmer, hvor mange overskrivninger, en byte på IYou are talking about an integer that determines how many overwrites, a byte of I
I enheden maksimalt kan tænkes at anvende IIn the unit maximum you can use I
I Ved opfindelsen brydes de parallelle historiske forløb, der gør det muligt at IIn the invention, the parallel historical paths are broken which allow you to
I 20 genfremfinde data ved anvendelse af den ovenfor beskrevne gentagelse af læsning IIn 20, data is retrieved using the above-mentioned repeat of reading I
af signaler ud fra en forudsætning om, at man skal lede efter signaler med samme Iof signals on the assumption that one must look for signals with the same I
I forskydning fra overfladens midte for hver bitposition for at finde tidligere IIn offset from the center of the surface for each bit position to find earlier I
indlæste data Iloaded data
I 25 Dette opnås ifølge opfindelsen ved at variere antallet af overskrivninger for hver IThis is achieved according to the invention by varying the number of overwrites for each I
I enkelt byte, så antallet af lag fra tidligere overskrivninger varierer fra byte til byte, IIn single bytes, the number of layers from previous overwrites varies from byte to byte, I
I fra minimalt 2 og maksimalt et antal overskrivninger mellem 3 og uendeligt, valgt II from a minimum of 2 and a maximum of a number of overwrites between 3 and infinity, selected I
af brugeren selv Iby the user himself
I 30 II 30 I
I en given udførelsesform anvendes en tilfældighedsgenerator til at vælge det an- IIn a given embodiment, a random generator is used to select it
I tal oversknvninger, der skal gennemføres for hver eneste byte, der skal overskn- IIn number of cuts to be performed for each byte to be cut
I ves Denne metode kan udbygges yderligere gennem valget af en tilfæl- IThis method can be further elaborated through the choice of a case
I dighedsgenerator med en meget lav grad af forudsigelighed i udvælgelses- IIn density generator with a very low degree of predictability in selection I
I 35 mønstret IIn the pattern I
I I en given udførelsesform anvendes der samtidig en tilfældighedsgenerator til ud- IIn a given embodiment, a random generator is used for output
vælgeisen af de tegn, der skal anvendes ved hver enkelt overskrivning af hver en- Ithe choice of the characters to be used in each overwriting of each one
I kelt byte Også denne metode kan udbygges yderligere gennem valget af en mate- IIn cold bytes This method can also be further developed through the choice of a mate
I 40 matisk tilfældighedsgenerator, der efterlader en meget lille grad af forudsigelighed IIn 40 random random generator leaving a very small degree of predictability I
I i udvælgelsesmønstret blandt samtlige de tegn, computerens tegnsæt anvender IIn the selection pattern among all the characters used by the computer character set
I Herved opnås en samlet højere grad af uforudsigelighed og derved en lavere gen- IHereby, an overall higher degree of unpredictability is achieved and thereby a lower gene
I kendelighed af det mønster, en rekonstruktør af overskrevne data måtte betjene sig IBecause of the pattern that a reconstructor of overwritten data had to use
I af II of I
45 I45 I
I 2 II 2 I
Claims (4)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DK200201811A DK175426B1 (en) | 2002-11-25 | 2002-11-25 | Procedure for deleting data on an electronic storage medium |
| PCT/DK2003/000781 WO2004049317A1 (en) | 2002-11-25 | 2003-11-14 | Procedure for erasure of data on electronical data media |
| AU2003280321A AU2003280321A1 (en) | 2002-11-25 | 2003-11-14 | Procedure for erasure of data on electronical data media |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DK200201811A DK175426B1 (en) | 2002-11-25 | 2002-11-25 | Procedure for deleting data on an electronic storage medium |
| DK200201811 | 2002-11-25 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| DK200201811A DK200201811A (en) | 2004-07-30 |
| DK175426B1 true DK175426B1 (en) | 2004-10-18 |
Family
ID=32337936
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DK200201811A DK175426B1 (en) | 2002-11-25 | 2002-11-25 | Procedure for deleting data on an electronic storage medium |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU2003280321A1 (en) |
| DK (1) | DK175426B1 (en) |
| WO (1) | WO2004049317A1 (en) |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6731447B2 (en) * | 2001-06-04 | 2004-05-04 | Xerox Corporation | Secure data file erasure |
| AU2002315365A1 (en) * | 2001-06-21 | 2003-01-08 | Dan Bress | Systems and methods for removing data stored on long-term memory devices |
| US20030210489A1 (en) * | 2002-05-13 | 2003-11-13 | Yec Co., Ltd. | Data eraser and data erasing program |
-
2002
- 2002-11-25 DK DK200201811A patent/DK175426B1/en not_active IP Right Cessation
-
2003
- 2003-11-14 WO PCT/DK2003/000781 patent/WO2004049317A1/en not_active Ceased
- 2003-11-14 AU AU2003280321A patent/AU2003280321A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| DK200201811A (en) | 2004-07-30 |
| AU2003280321A1 (en) | 2004-06-18 |
| WO2004049317A1 (en) | 2004-06-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2004325580A1 (en) | System and method of erasing non-volatile recording media | |
| JP5620792B2 (en) | Distributed archive system, data archive device, and data restoration device | |
| CN117176474B (en) | Encryption protection method and system for RFID data | |
| Wani et al. | File system anti-forensics–types, techniques and tools | |
| CN106960164A (en) | A kind of method and system of the fixed electronic evidence in scene | |
| Khan et al. | Designing a cluster-based covert channel to evade disk investigation and forensics | |
| EP3410604A1 (en) | Systems and methods for geometric data compression and encryption | |
| KR101526515B1 (en) | Device for storing data by utilizing pseudorandom number sequence | |
| JP4101975B2 (en) | Data recording / reproducing apparatus using portable storage medium | |
| DK175426B1 (en) | Procedure for deleting data on an electronic storage medium | |
| KR20090052130A (en) | Data protection method using data partitioning | |
| CN116088770B (en) | Data management method and device, system, electronic device, storage medium | |
| CN114039990A (en) | Inadvertent access to a storage system | |
| EP0049113B1 (en) | File deletion method for bubble cassette memory, and bubble cassette memory control apparatus | |
| US20060120235A1 (en) | System and method of erasing non-volatile recording media | |
| RU2003108836A (en) | PLAYBACK METHOD, PLAYBACK DEVICE, RECORDING METHOD AND RECORDING DEVICE | |
| US7082425B2 (en) | Real-time searching of data in a data stream | |
| Troncoso et al. | Traffic analysis attacks on a continuously-observable steganographic file system | |
| CN105068764B (en) | A kind of device and method for simulating NandFlash | |
| Klonowski et al. | Data deletion with provable security | |
| Sansurooah | A forensics overview and analysis of USB flash memory devices | |
| RU96433U1 (en) | FILE REMOVAL SYSTEM (FILE SHREDDER) | |
| KR100831372B1 (en) | Portable device with file delete / restore function and file deletion / restoration method | |
| CN117311639B (en) | Information hiding storage device and initialization, reading and writing method thereof | |
| Fischer et al. | Limited random access Turing machines |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PBP | Patent lapsed |
Ref document number: DK |