CN112181313B - Method and system for fast self-destruction of hard disk data - Google Patents
Method and system for fast self-destruction of hard disk data Download PDFInfo
- Publication number
- CN112181313B CN112181313B CN202011149757.9A CN202011149757A CN112181313B CN 112181313 B CN112181313 B CN 112181313B CN 202011149757 A CN202011149757 A CN 202011149757A CN 112181313 B CN112181313 B CN 112181313B
- Authority
- CN
- China
- Prior art keywords
- hard disk
- data
- destruction
- self
- fastboot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000005192 partition Methods 0.000 claims abstract description 23
- 238000013500 data storage Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000000872 buffer Substances 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0674—Disk device
- G06F3/0676—Magnetic disk device
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a method and a system for fast self-destruction of hard disk data. The method comprises the following steps: and erasing the boot partition of the hard disk. The method and the system for quickly self-destroying the hard disk data can quickly destroy the storage structure in the hard disk and realize self-destroying.
Description
Technical Field
The invention relates to the technical field of data storage, in particular to a method and a system for quickly self-destroying hard disk data.
Background
In real life, some situations often occur, and the storage format of the hard disk needs to be destroyed. Such a scenario may be that a hard disk having a large amount of private data stored therein is lost, or that a hard disk stored as a network has been hacked by a hacker. However, there is no technical solution in the prior art that can quickly implement the self-destruction of the storage structure.
Disclosure of Invention
The invention aims to solve the technical problem of providing a quick self-destruction method and a quick self-destruction system for hard disk data, which can quickly destroy a storage structure in a hard disk and realize self destruction.
In order to solve the technical problems, the invention provides a quick self-destruction method of hard disk data, which comprises the following steps: and erasing the boot partition of the hard disk.
In some implementations, the boot partition includes: fastboot partition of Android system.
In some embodiments, a file system of a hard disk includes: jffs, yaffs.
In some embodiments, for a jffs format hard disk, erasing the fastboot partition of the hard disk includes: determining inodes related to fastboot partitions; and erasing the storage data of the related inode.
In some embodiments, for a yaffs format hard disk, erasing the fastboot partition of the hard disk includes: determining tnode related to fastboot partition; the stored data of the concerned tnode is erased.
In addition, the invention also provides a quick self-destruction system of hard disk data, which comprises: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors realize the rapid self-destruction method of the hard disk data.
With such a design, the invention has at least the following advantages:
by erasing the boot sector of the hard disk used to store data, a quick self-destruction of the hard disk storage structure can be achieved.
Drawings
The foregoing is merely an overview of the present invention, and the present invention is further described in detail below with reference to the accompanying drawings and detailed description.
FIG. 1 is a flow chart of a method for fast self-destruction of hard disk data according to one embodiment of the present invention;
FIG. 2 is a flowchart of a method for fast self-destruction of hard disk data according to another embodiment of the present invention;
fig. 3 is a block diagram of a fast self-destruction system for hard disk data according to still another embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
In order to rapidly complete self-destruction of a hard disk data storage structure and ensure data security, the technical scheme provided by the embodiment of the invention is that a boot partition of a hard disk is erased. After the erasing operation is executed, the boot program cannot be started because the boot partition of the hard disk does not have any data, so that the security of the data stored on the hard disk is ensured.
Moreover, the technical solutions provided by the embodiments of the present invention only perform erasure of the data stored in the boot partition, so that the total amount of data erased is relatively small, enabling the erasure operation to be performed quickly.
In various embodiments of the present invention, the boot partition typically includes: fastboot partition in Android system.
Also, hard disk storage data formats typically include: jffs format, or yaffs format.
Fig. 1 shows a flow of a method for fast self-destruction of hard disk data according to an embodiment of the present invention. Moreover, the flow shown by fig. 1 is applicable only to jffs hard disk data formats. Referring to fig. 1, the fast self-destruction method of hard disk data includes:
s11, determining inodes related to fastboot partitions.
S12, erasing the storage data of the related inode.
In the embodiment shown in fig. 1, the storage format of the hard disk is the js format. In order to ensure the thorough data erasure, the inodes storing the fastboot partition data are first calculated, and then the inodes are erased one by one. As the data is erased more thoroughly, the fastboot partition is erased by adopting the implementation mode, and the data security can be further ensured.
This has the advantage that the erasure of the boot partition is more comprehensive. In other words, the self-destruction operation of the hard disk data is more thorough.
Fig. 2 shows a flow of a method for fast self-destruction of hard disk data according to another embodiment of the present invention. Also, the flow shown by fig. 2 is applicable only to yaffs hard disk data format. Referring to fig. 2, the fast self-destruction method of hard disk data includes:
s21, determining tnode related to fastboot partition.
S22, erasing the storage data of the related tnode.
Similar to the embodiment shown in fig. 1, in the embodiment shown in fig. 2, all the tnode involved is determined first, and then a unified data erasure is performed on the tnode involved.
Fig. 3 shows a structure of a fast self-destruction system for hard disk data according to still another embodiment of the present invention. Referring to fig. 3, for example, the fast self-destruct system 300 of hard disk data may be used to act as a hard disk self-destruct device in a computer system. As described herein, the fast self-destruct system 300 for hard disk data may be used to implement fast self-destruct functions to hard disk storage structures in a computer system. The fast self-destruct system 300 of hard disk data may be implemented in a single node, or the functions of the fast self-destruct system 300 of hard disk data may be implemented in multiple nodes in a network. Those skilled in the art will appreciate that the term fast self-destruct system for hard disk data includes devices in a broad sense, with the fast self-destruct system 300 for hard disk data shown in FIG. 3 being but one example. The fast self-destruct system 300 including hard disk data is for clarity of description and is not intended to limit the application of the present invention to a specific fast self-destruct system embodiment of hard disk data or a class of fast self-destruct system embodiments of hard disk data. At least some of the features/methods described herein may be implemented in a network device or component, such as a fast self-destruct system 300 for hard disk data. For example, the features/methods of the present invention may be implemented in hardware, firmware, and/or software running on hardware. The fast self-destruct system 300 for hard disk data may be any device that processes, stores and/or forwards data frames over a network, such as a server, client, data source, etc. As shown in fig. 3, the fast self-destruct system 300 of hard disk data may include a transceiver (Tx/Rx) 310, which may be a transmitter, a receiver, or a combination thereof. The Tx/Rx310 may be coupled to a plurality of ports 350 (e.g., uplink and/or downlink interfaces) for transmitting and/or receiving frames from other nodes. The processor 330 may be coupled to the Tx/Rx310 to process the frame and/or to determine to which nodes to send the frame. Processor 330 may include one or more multi-core processors and/or memory devices 332, which may serve as data stores, buffers, and the like. The processor 330 may be implemented as a general purpose processor or may be part of one or more application specific integrated circuits (application specific integrated circuit, ASIC) and/or digital signal processor (digital signal processor, DSP).
The above description is only of the preferred embodiments of the present invention, and is not intended to limit the invention in any way, and some simple modifications, equivalent variations or modifications can be made by those skilled in the art using the teachings disclosed herein, which fall within the scope of the present invention.
Claims (2)
1. The fast self-destruction method for hard disk data is characterized by comprising the following steps:
erasing a boot sector of the hard disk, the boot sector comprising: fastboot partition of the Android system; the file system of the hard disk includes: jffs, yaffs;
for a hard disk in jffs format, erasing the fastboot partition of the hard disk includes:
determining inodes related to fastboot partitions;
erasing the storage data of the related inode;
for a yaffs format hard disk, erasing the fastboot partition of the hard disk includes:
determining tnode related to fastboot partition;
the stored data of the concerned tnode is erased.
2. A fast self-destruction system for hard disk data, comprising:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the fast self-destruction method of hard disk data according to claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011149757.9A CN112181313B (en) | 2020-10-23 | 2020-10-23 | Method and system for fast self-destruction of hard disk data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011149757.9A CN112181313B (en) | 2020-10-23 | 2020-10-23 | Method and system for fast self-destruction of hard disk data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112181313A CN112181313A (en) | 2021-01-05 |
CN112181313B true CN112181313B (en) | 2024-02-13 |
Family
ID=73923771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011149757.9A Active CN112181313B (en) | 2020-10-23 | 2020-10-23 | Method and system for fast self-destruction of hard disk data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112181313B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008083948A (en) * | 2006-09-27 | 2008-04-10 | Ultra X:Kk | Hard disk information erasure method and program |
CN201237788Y (en) * | 2008-08-11 | 2009-05-13 | 湖南源科创新科技股份有限公司 | Solid state hard disk based on data destruction |
CN101763317A (en) * | 2009-12-31 | 2010-06-30 | 中国软件与技术服务股份有限公司 | Data eliminating method of magnetic medium |
CN202433910U (en) * | 2012-02-08 | 2012-09-12 | 山东超越数控电子有限公司 | Data destruction security structure with portable device |
CN103197939A (en) * | 2012-01-05 | 2013-07-10 | 联想(新加坡)私人有限公司 | Firmware updating in a hybrid computing environment |
CN103729310A (en) * | 2014-01-14 | 2014-04-16 | 北京深思数盾科技有限公司 | Method for protecting hardware data |
WO2017082822A1 (en) * | 2015-11-09 | 2017-05-18 | Trek Technology (Singapore) Pte Ltd | External storage device with information processing capability |
CN109508268A (en) * | 2018-11-13 | 2019-03-22 | 郑州云海信息技术有限公司 | Function test method is quickly wiped in a kind of ISE hard disk test device and the hard disk sector ISE |
CN109901783A (en) * | 2017-12-07 | 2019-06-18 | 镇江长圣信息技术咨询服务有限公司 | A kind of information technology for eliminating of storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9632870B2 (en) * | 2007-03-29 | 2017-04-25 | Violin Memory, Inc. | Memory system with multiple striping of raid groups and method for performing the same |
KR101602360B1 (en) * | 2009-07-14 | 2016-03-10 | 엘지전자 주식회사 | System fast booting apparatus and method |
-
2020
- 2020-10-23 CN CN202011149757.9A patent/CN112181313B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008083948A (en) * | 2006-09-27 | 2008-04-10 | Ultra X:Kk | Hard disk information erasure method and program |
CN201237788Y (en) * | 2008-08-11 | 2009-05-13 | 湖南源科创新科技股份有限公司 | Solid state hard disk based on data destruction |
CN101763317A (en) * | 2009-12-31 | 2010-06-30 | 中国软件与技术服务股份有限公司 | Data eliminating method of magnetic medium |
CN103197939A (en) * | 2012-01-05 | 2013-07-10 | 联想(新加坡)私人有限公司 | Firmware updating in a hybrid computing environment |
CN202433910U (en) * | 2012-02-08 | 2012-09-12 | 山东超越数控电子有限公司 | Data destruction security structure with portable device |
CN103729310A (en) * | 2014-01-14 | 2014-04-16 | 北京深思数盾科技有限公司 | Method for protecting hardware data |
WO2017082822A1 (en) * | 2015-11-09 | 2017-05-18 | Trek Technology (Singapore) Pte Ltd | External storage device with information processing capability |
CN109901783A (en) * | 2017-12-07 | 2019-06-18 | 镇江长圣信息技术咨询服务有限公司 | A kind of information technology for eliminating of storage medium |
CN109508268A (en) * | 2018-11-13 | 2019-03-22 | 郑州云海信息技术有限公司 | Function test method is quickly wiped in a kind of ISE hard disk test device and the hard disk sector ISE |
Non-Patent Citations (2)
Title |
---|
Android手机Recovery模式取证方法研究;韦博华;;信息通信(第09期);第27页第1段-第30页倒数第1段 * |
LK存储介质Nand Flash驱动模块设计与性能优化;周继才;;单片机与嵌入式系统应用(第05期);第17页第1段-第18页倒数第1段 * |
Also Published As
Publication number | Publication date |
---|---|
CN112181313A (en) | 2021-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11838386B2 (en) | System and method for improving internet communication by using intermediate nodes | |
US12038910B2 (en) | Method and system for reducing the size of a blockchain | |
US10116746B2 (en) | Data storage method and network interface card | |
CN109614439B (en) | Data synchronization method, device, electronic equipment and storage medium | |
US20150026325A1 (en) | Notification normalization | |
CN109951546A (en) | Transactions requests processing method, device, equipment and medium based on intelligent contract | |
US9742685B2 (en) | Enhanced mechanisms for granting access to shared resources | |
WO2020114590A1 (en) | Method and system for determining a state of an account in a network device running a light client protocol of a distributed ledger technology network | |
US9864651B2 (en) | Receiving an update code prior to completion of a boot procedure | |
CN112181313B (en) | Method and system for fast self-destruction of hard disk data | |
CN111078425B (en) | Message processing method and device, storage medium and electronic equipment | |
CN113391759B (en) | Communication method and equipment | |
CN114584556B (en) | File transmission method and device | |
CN116881091B (en) | System event log reporting method, device, chip, equipment and storage medium | |
US20240362188A1 (en) | Updating edge nodes in distributed computing environments using partitions | |
JP2024129866A (en) | Data synchronization system, data synchronization method, and data synchronization program | |
CN114238254A (en) | Shared access method, device and storage medium of file system | |
CN114266043A (en) | Method, electronic device and computer program product for storage management | |
CN109286643A (en) | The method and apparatus for reading the configuration parameter of an application example |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |