The present application claims the benefit of priority under 35 USC 119 to Chinese patent application 201911116710.X, filed Nov. 15, 2019, the contents of which are incorporated herein by reference.
The present invention relates to the technical field of information erasure for electronic products, and in particular, to a method for erasing information from electronic scrap based on a dual-security mechanism.
In China, the update of electronic products such as smartphones and computers is accelerating with the continuous development of science and technology, resulting in an increasingly large amount of electronic scrap. Waste of resources, environmental pollution and information security problems due to improper treatment of the electronic scrap are getting worse. According to statistics, China's users change their mobile phones on average in 15 months, of which 20% will change their mobile phones within one year. According to statistics from the Ministry of Industry and Information Technology, as of October 2015, China has 1.302 billion mobile phone users, about 200 million mobile phones are discarded each year, but the recycling rate is less than 1% [1]. Computers are updated every 18 months, and 6 million scrap computers are produced each year in mainland China. This electronic scrap contains a lot of valuable metals. For example, a scrap computer contains 1.2% copper alloy, 1% precious metal alloy (such as gold, silver, and palladium), and each ton of scrap mobile phones contains about 280 g/t copper, 2 kg/t gold, 100 kg/t silver, and 100 g/t palladium [2]. Therefore, the improper treatment of electronic scrap will cause serious waste of resources and environmental pollution.
Under the nation's increasing emphasis on environmental protection and reuse of resources, the recycling of electronic scrap has received attention from the whole society [3]. At present, electronic scrap is mainly recycled by roadside mobile vendors and maintenance service providers, circulated in second-hand markets, received by regular enterprises for trade-in, and donated to underdeveloped areas. Due to the outdated technologies and equipment of recyclers and dealers, the second-hand electronic products obtained by the mobile traders are divided into non-reusables and reusables. The non-reusables are disassembled by small workshops and then subjected to strong acid or incineration to extract precious metals, with other parts discarded. The reusables are sold after simple repair, refurbishment, or assembly[1]. In recent years, some online and offline recycling platforms resell the scrap mobile phones after simple information erasure. However, the lack of relevant industry standards, laws and regulations, as well as the existence of a large amount of mobile traders, affect the development of formal recycling institutions. As a result, electronic scrap does not go through any or complete information erasure in the process from recycling to reselling. A large amount of user data is left in these products, which may involve the privacy and confidential information of individuals, enterprises, state agencies or even secrecy departments. This will seriously threaten user privacy and even national security [4].
Information erasure uses various technical means to completely erase the private data in a storage device, to avoid data disclosure [5]. Generally, the typical information deletion and formatting functions of an electronic device cannot really erase data on a storage medium of the device. Instead, the data can be recovered through simple processing of dedicated software[6]. Degaussing, thermal removal, physical destruction, and chemical corrosion on the storage medium can completely erase the information, but also destroy the storage medium. Therefore, such methods provide high security but compromise cost efficiency [7]. The preceding technologies cannot meet the technical requirements for erasing information from electronic scrap. There is still another technique: data overwriting, which uses meaningless and irregular data to overwrite raw privacy and confidential data. Theoretically, the original data information can be overwritten after a single overwrite. However, there may be some data residue, so overwriting needs to be performed several times in different ways to ensure the security. Currently, most overwriting software vendors use US DOD 5220.22M standard. According to this standard, random numbers are overwritten first, then complement numbers of the random numbers, and once again, random numbers [8]. In theory, data on the storage medium can be effectively destroyed as long as the number of overwrites is sufficient [9]. The BMB21-2007 standard issued in 2007, Security and Confidentiality Requirements for the Destruction of Carriers Involving State Secrets and Information Erasure, affirms the overwriting technology and specifies the overwrite times and data formats [10]. From this perspective, overwriting is the most cost-effective method for information erasure currently [11].
Information erasure and information recovery, as two important components of information security, are both complementary and contrary. They are complementary because they are indispensable different applications in the information security field. They are contrary in terms of techniques and applications [3]. The continuous improvement of the information recovery technology poses increasingly high requirements for the information erasure technology.
In China, information erasure technologies are still evolving, with the focus on discussions about the importance of information erasure [4]. In recent years, China's research on technologies for erasing information from different storage media has made some progress. For magnetic storage media, literature [5] expounds different information erasure methods and their comparative research, and puts forwards the concepts of remote destruction and self-destruction to ensure information security. Literature [12] analyzes the advantages and disadvantages of various overwriting sequences in the overwriting technology, designs a new overwriting solution, and puts forward a data destruction software system for magnetic medium based on network security. Literature [13] designs an electronic file shredder and information erasure software for magnetic hard drives. And literature [14] provides a convenient, secure, and user-friendly magnetic medium information erasure solution based on Windows file systems. For flash-based storage media, literature [15] analyzes information erasure on solid state memory. Literature [16] designs information recovery and erasure software based on the study of Android storage system. Literature [4] designs a platform-independent fragment information erasure model for SQLite database, to erase fragment information on different platforms, where the model is built on a model-driven framework.
For the information erasure technology itself, literature [17] proposes a new method for erasing residual data. Literature [18] provides an erasure method with customizable overwrite times and literature [19,20] puts forward the idea of parallel data destruction to improve the information erasure efficiency. Literature [21] proposes security level-based information erasure, which is also the mainstream solution for existing information erasure equipment/software in the domestic market. Its overwriting policy is based on some foreign overwriting standards, with the security to be tested. In recent years, a variety of domestic patents for information erasure have emerged in China, but most of them are designed based on information erasure systems. Literature [22,23] designs a portable disk information erasure system and device. Literature [24] designs an overall information erasure system, including a front-end erasure device and a back-end server, and proposes global overwriting+local random overwriting to improve the erasure efficiency. Literature [25] provides a system that realizes real-time monitoring and effective log management of information erasure. Literature [26] designs a QR code-based security management solution for secret-related storage media. And literature [27] provides a process for erasing Linux-based disk files, and their traces and logs.
There are also a few patents for inventions for information erasure technologies. Literature [28,29,30] proposes different solutions for the failure to securely erase user data from the flash memory in time due to remote update, to eliminate common security risks while mitigating system burden. And literature [31] provides a method for erasing information based on a quantum random number generator, to effectively improve the overwriting efficiency and security. In summary, there still lacks theoretical support, technological innovation, and integrated system design for information erasure technologies in China. There also lacks information erasure specifications for civil industry.
Foreign countries give more emphasis on the study of information erasure technologies, and have developed corresponding specifications for each information erasure technology. For example, foreign countries have developed many standards for overwriting technologies, for different users and organizations to securely and efficiently erase information [4]. In the 1990s, foreign scholars had made many achievements in the study of flash-based information erasure. Gutmann [32] made in-depth analysis on the magnetic memory and random access memory, and proposed effective information recovery and information erasure methods. For the effect of applying the mature disk information erasure technologies to flash memory, the study made by Wei et al. [33] and Fundo et al. [34] shows that the complex structure of the latter poses higher requirements for information erasure solutions.
Literature [35] proposes an adaptive hybrid erasure solution based on the cost and benefit model, which can, in theory, securely and efficiently erase data in multiple flash storage modes. Literature [36, 37] provides encryption-based secure file erasure solutions to securely erase file keys and original data. Literature [37] also puts forward trusted information erasure verification solutions for governments, businesses, and individuals. For the issue that the service life of SSDs is damaged by data migration or block cleanup caused by purge- and encryption-based information erasure, Liu et al. proposes an ErasuCrypto solution. This solution not only addresses the said issue, but also erases invalid data [38].
Foreign countries have made deep research into information erasure of smart mobile terminals, and provide well-designed solutions for different physical storage interfaces to securely and effectively erase data from physical storage devices in different file systems [39]. For today's big data systems, Gnatyuk et al. [40] designs STM Shredder software based on a pseudo-random sequence generator to erase information securely and quickly. At present, most of the foreign patents for inventions related to information erasure are about the overwriting technologies. For example, literature [41] designs an overwriting solution based on multiple overwrites and verifications on generated non-compressed data blocks, which can effectively meet the overwriting requirement of “compression before storage” Literature [42] proposes a verification scheme of first performing consistency check and then comparing a known overwrite sequence with a sequence read out after erasure; and literature [43] provides an information erasure solution based on file overwriting.
In general, the information erasure process used by foreign patents is: generating an overwrite sequence based on the capacity of a to-be-erased area, obtaining an address of the area and performing overwriting cyclically, and verifying a result of each overwriting. In addition, the study, application, and industry development of foreign information erasure technologies are quite advanced. Blancco provides a systematic secure information erasure service, its products use more than 20 overwriting standards of different countries, and its customers spread around the globe, but its security is still in doubt. In short, information erasure with multiple-security guarantee that is customized based on features of the electronic scrap is still not available, and there is no research on online correction of erasure solutions. Therefore, it is difficult to balance the efficiency and security in the information erasure process.
To sum up, the complexity of flash memory and the diversity of existing storage media in the market make a generic and effective information erasure solution impossible.
Recycling the increasing large amount of electronic scrap has become a trend to avoid waste of resources and environmental pollution. However, the difficulty in secure erasure of information in the electronic scrap badly limits the recycling rate. The existing information erasure devices and software in the market mostly use security level-based overwriting technologies, and the overwriting policies are also based on foreign standards, making it hard to ensure a secure and efficient information erasure process for the electronic scrap. To resolve the foregoing problems, this application proposes an information erasure method based on a dual-security mechanism, including a feature data case matching module, an information erasure and recovery evaluation module, an erasure solution adjustment and native system recovery module. Firstly, use a feature data case matching module to match feature data cases by: identifying a storage medium feature of to-be-erased electronic scrap and identifying an information erasure feature of the electronic scrap, then combining with a storage medium feature database and an information erasure feature database to match and determine an erasure solution; and identifying a firmware system feature of the electronic scrap and matching a similar case in a firmware system feature database to determine a native system data package for rewriting after the information is securely erased. Then, use an information erasure and recovery evaluation module to execute the erasure solution for the electronic scrap, extract a feature of the erased electronic scrap in this step, and build an information erasure evaluation model to evaluate an information erasure effect; use an information recovery mechanism to recover the information on the erased electronic scrap, extract an information recovery feature, and build an information recovery evaluation model to evaluate an information recovery effect; and build a comprehensive dual-security evaluation model based on field-specific expert knowledge and the preceding evaluation results, to obtain a comprehensive dual-security evaluation value. Lastly, determine whether the information erasure meets a set standard; and if the information erasure does not meet the set standard, correct an erasure solution according to the evaluation result and evaluating an information erasure and recovery effect, until the information erasure result meets the standard; or if the information erasure meets the set standard, perform a last erasure operation on the erased electronic scrap to erase the recovered information, format the electronic scrap, and write a matching native system into the electronic scrap to obtain the electronic scrap with the native system recovered.
In accordance with the inventive concepts, provided is a method for erasing information from electronic scrap based on a dual-security mechanism. The method is implemented using a feature data case matching module, an information erasure and recovery evaluation module, and an erasure solution adjustment and native system recovery module, as shown in
Feature Data Case Matching Module
Inputs of the module are to-be-erased electronic scrap X and field-specific expert knowledge Know. Outputs are an erasure solution{λpass,S,λsize,λorder, . . . }, and a native system data package udata for the to-be-erased electronic scrap. The module is used to obtain the erasure solution, and the native system data package udata for the to-be-erased electronic scrap, based on the to-be-erased electronic scrap, the field-specific expert knowledge Know, a storage medium feature database Dmediumdata, an information erasure feature database Ddeletedata, and a firmware system feature database Dfirmwaredata. A mapping relationship is as follows:
{{λpass,S,λsize,λorder, . . . },udata}=fmatch(X,Dmediumdata,Ddeletedata,Dfirmwaredata) (1)
where fmatch(⋅) (represents a mapping model for feature extraction and case matching of the to-be-erased electronic scrap. λpass represents overwrite times. S={s1,L,sλ
Information Erasure and Recovery Evaluation Module
Inputs of the module are the erasure solution {λpass,S,λsize,λorder, . . . }, and the field-specific expert knowledge Know. Outputs are the information erasure feature{ηdeletenull,ηdeletedamage, . . . }, the information recovery feature {ηrecoveriden,ηrecoverback, . . . }, and a comprehensive dual-security evaluation value ξcombine. The module is used to perform, based on the erasure solution and field-specific expert knowledge, information erasure and evaluation on the to-be-erased electronic scrap, perform information recovery and evaluation, and obtain the comprehensive dual-security evaluation value. A mapping relationship is as follows:
{{ηdeletenull,ηdeletedamage, . . . },{ηrecoveriden,ηrecoverback, . . . },ξcombine}=festimate({λpass,S,λsize,λorder, . . . },X,Know) (2)
where festimate(⋅) represents a mapping model for implementing the foregoing process.
Erasure Solution Adjustment and Native System Recovery Module
Inputs of the module are the information erasure feature {ηdeletenull,ηdeletedamage, . . . }, the information recovery feature {ηrecoveriden,ηrecoverback, . . . }, the comprehensive dual-security evaluation value ξcombine, solution {λpass,S,λsize,λorder, . . . }, the native system data package udata, and the field-specific expert knowledge Know. Outputs are a corrected erasure solution {λpassnew,Snew,λsizenew,λordernew, . . . }, and the electronic scrap with the native system recovered Z. The module is used to completely erase the information based on corrected information erasure solutions, to obtain the electronic scrap with the native system recovered. A mapping relationship is as follows:
{{λpassnew,Snew,λsizenew,λordernew, . . . },Z}=fUpWr({ηdeletenull,ηdeletedamage, . . . },{ηrecoveriden,ηrecoverback, . . . },ξcombine,{λpass,S,λsize,λorder, . . . },udata,Know) (3)
where fUpWr(⋅) represents a mapping model that can represent the erasure solution adjustment and native system recovery process.
As shown in
A basic structure of the designed storage medium feature database Dmediumdata is as follows:
[{MediumType,Capacity,AdressMode,WRmode, . . . },{λpass,λsize,λorder, . . . }] (4)
where {MediumType,Capacity,AdressMode,WRmode,L} represents features of a storage medium such as a type, a capacity, an addressing mode, and a read/write mode.
A basic structure of the designed information erasure feature database Ddeletedata is as follows:
[{ComStorage,ComFormat,ComCode,PriName,PriLang,PriFormat,PriPath, . . . },{S, . . . }] (5)
where {ComStorage,ComFormat,ComCode,PriName,PriLang,PriFormat,PriPath,L} represents information erasure features such as a common data storage location, a common data format, a common data encoding rule, an independent software name, an independent software development language, an independent software data format, and an independent software installation path.
A basic structure of the designed firmware system feature database Dfirmwaredata is as follows:
[{SysType,SysVersion,DevLang,RunMech,FileDir,L},udata] (6)
where {SysType,SysVersion,DevLang,RunMech,FileDir,L} represents firmware system features such as a system type, a system version, a development language, an operating mechanism, and a standard file directory.
The following process is performed for the to-be-erased electronic scrap X. Firstly, connect to the to-be-erased electronic scrap through a data interface, scan the to-be-erased electronic scrap in a hardware scan module, temporarily back up the information contained in the to-be-erased electronic scrap, and identify the storage medium feature, the information erasure feature, and the firmware system feature based on the scanned information. This process is expressed as follows:
where fscan(⋅) represents the process of scanning the to-be-erased electronic scrap and fiden(⋅) represents the process of identifying the storage medium feature dmediumfea, the information erasure feature ddeletefea, and the firmware system feature dfirmwarefea of the to-be-erased electronic scrap.
Next, combine with the identified storage medium feature dmediumfea, the identified information erasure feature ddeletefea, the storage medium feature database Dmediumdata and the information erasure feature database Ddeletedata to match and obtain the erasure solution {λpass,S,λsize,λorder, . . . }. This process is expressed as follows:
{λpass,S,λsize,λorder, . . . }=fmatchsolution(dmediumfea,ddeletefea,Dmediumdata,Ddeletedata) (8)
where fmatchsolution is a matching model based on a case reasoning algorithm.
Reference for the case-based reasoning algorithm: Yan Aijun, Qian Limin, Wang Pu: A Comparative Study on a Weight Allocation Model for Case Reasoning Attributes, ACTA Automatica Sinica, 2014, 40(09):1896-1902.
Then, match the identified firmware system feature dfirmwarefea with the firmware system feature database Dfirmwaredata to obtain the native system data package udata. This process is expressed as follows:
udata=fmatchfirmware(dfirmwarefea,Dfirmwaredata) (9)
where fmatchfirmware(⋅) is a matching model based on a case reasoning algorithm.
Reference for the case-based reasoning algorithm: Yan Aijun, Qian Limin, Wang Pu: A Comparative Study on a Weight Allocation Model for Case Reasoning Attributes, ACTA Automatica Sinica, 2014, 40(09):1896-1902.
As shown in
The specific implementation process is as follows: erase the information of the to-be-erased electronic scrap X based on the given erasure solution {λpass,S,λsize,λorder, . . . }, extract an information erasure feature of the erased electronic scrap, and evaluate an information erasure effect. This process is expressed as follows:
where Xdelete represents the erased electronic scrap; ξdelete represents an information erasure evaluation value obtained by an information erasure model fdeleteestimate(⋅); fdelete(⋅) represents the process of erasing the information; fdeleteextra(⋅) represents the process of extracting the information erasure feature of Xdelete; and fdeleteestimate(⋅) represents an erasure evaluation model that is implemented using a neural network algorithm. Reference for the neural network algorithm: Li Long, Wei Jing, Li Canbing, Cao Yijia, Song Junying, Fang Baling: Load Model Prediction Based on an Artificial Neural Network, Transactions of China Electrical Technology, 2015, 30(08):225-230.
Here {ηdeletenull,ηdeletedamage,L} represents features such as an available space percentage and a damaged space percentage of Xdelete, and calculation formulas are as follows:
Use the information recovery mechanism to recover the information of Xdelete, extract an information recovery feature of the recovered electronic scrap Xrecover, and evaluate an information recovery effect. This process is expressed as follows:
where Xrecover represents the electronic scrap obtained after information recovery is performed on Xdelete; ξrecover represents an information recovery evaluation value obtained by an information recovery evaluation model frecoverestimate(⋅); frecover(⋅) represents the process of recovering the information; frecoverextra(⋅) represents the process of extracting the information recovery feature of Xrecover; and frecoverestimate(⋅) represents an information recovery evaluation model that is implemented using the neural network algorithm.
Reference for the neural network algorithm: Li Long, Wei Jing, Li Canbing, Cao Yijia, Song Junying, Fang Baling: Load Model Prediction Based on an Artificial Neural Network, Transactions of China Electrical Technology, 2015, 30(08):225-230.
{ηrecoveriden,ηrecoverback,L} represents features such as a recoverable data identification rate and a recovery degree of Xrecover, and calculation formulas are as follows:
Evaluate the information erasure and recovery processes based on the field-specific expert knowledge Know and the preceding information to obtain the comprehensive dual-security evaluation value ξcombine. This process is expressed as follows:
ξcombine=fdel_recoverestimate({ηdeletenull,ηdeletedamage,L},{ηrecoveriden,ηrecoverback,L},ξdelete,ξrecover,Know) (16)
where fdel_recoverestimate(⋅) represents a comprehensive dual-security evaluation model that is implemented using a case reasoning algorithm.
Reference for the case-based reasoning algorithm: Yan Aijun, Qian Limin, Wang Pu: A Comparative Study on a Weight Allocation Model for Case Reasoning Attributes, ACTA Automatica Sinica, 2014, 40(09):1896-1902.
As shown in
The specific implementation process is as follows. Firstly, compare the obtained comprehensive dual-security evaluation value λcombine with a threshold ξset specified based on the expert knowledge. If ξcombinenew≤ξset, perform a last erasure operation, and then recover the native system. This process is expressed as follows:
where fdeletelast(⋅) represents the process of the last erasure operation; and Xdeletelast represents the electronic scrap obtained after the fdeletelast(⋅) operation is performed on Xrecover. If ξcombine>ξset, correct the information erasure solution based on a storage medium feature dmediumfea, an information erasure feature ddeletefea, a firmware system feature dfirmwarefea, and the native system data package udata of the to-be-erased electronic scrap, an erasure solution {λpass,S,λsize,λorder, . . . } used by the information erasure and recovery evaluation module, a storage medium feature database Dmediumdata, an information erasure feature database Ddeletedata, a firmware system feature database Dfirmwaredata, and the field-specific expert knowledge Know. This process is expressed as follows:
{λpassnew,Snew,λsizenew,λordernew, . . . }=fupdate(ξcombine,dmediumfea,ddeletefea,dfirmwarefea,{λpass,S,λsize,λorder, . . . },Dmediumdata,Ddeletedata,Dfirmwaredata,Know,X,{ηdeletenull,ηdeletedamage, . . . },{ηrecoveriden,ηrecoverback, . . . }) (18)
where fupdate(⋅) represents a mapping model for updating the erasure solution, which is implemented using a case reasoning algorithm.
Reference for the case-based reasoning algorithm: Yan Aijun, Qian Limin, Wang Pu: A Comparative Study on a Weight Allocation Model for Case Reasoning Attributes, ACTA Automatica Sinica, 2014, 40(09):1896-1902.
Above dmediumfea, ddeletefea, and dfirmwarefea represent the storage medium feature, the information erasure feature, and the firmware system feature of the to-be-erased electronic scrap; {ηdeletenull,ηdeletedamage, . . . } represents the information erasure feature obtained after information erasure is performed on X; and {ηrecoveriden,ηrecoverback, . . . } represents the information recovery feature obtained after information recovery is performed on Xdelete.
The original information erasure solutions are replaced with new information erasure solution:
{λpass,S,λsize,λorder, . . . }←{λpassnew,Snew,λsizenew,λordernew, . . . } (19)
Then, use the new information erasure solution to evaluate an information erasure and new recovery effect until anew comprehensive dual-security evaluation value ξcombinenew≤ξset is obtained.
To sum up, this application proposes a method for erasing information based on a dual-security mechanism. Its novelty lies in intelligently generating, based on features of to-be-erased electronic scrap, an erasure solution that can achieve both efficiency and security. Its main idea is to: build a storage medium feature database, an information erasure feature database, and a firmware system feature database to match cases for the to-be-erased electronic scrap; generate an erasure solution and a native system data package based on the matching results; erase the information, evaluate an erasure result, recover the information on the erased electronic scrap, and evaluate a recovery result, to implement comprehensive double security evaluation; check the information erasure validity of the electronic scrap based on the evaluation results; and if an erasure result is invalid, correct erasure solutions online based on the evaluation result, until the erasure result is valid and the electronic scrap with a native system recovered is obtained. The method according to this application provides information erasure solutions for different systems. Case matching improves the information erasure efficiency. Information erasure and recovery evaluation ensures secure erasure. Erasure solution correction provides a unified solution for different electronic scrap and achieves both efficiency and security in the information erasure process.
Number | Date | Country | Kind |
---|---|---|---|
201911116710.X | Nov 2019 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
4149262 | Lamb | Apr 1979 | A |
5193149 | Awiszio | Mar 1993 | A |
5958062 | Komasaka | Sep 1999 | A |
9286231 | Vaisanen et al. | Mar 2016 | B2 |
10175891 | Malwankar | Jan 2019 | B1 |
11115272 | Kumar | Sep 2021 | B1 |
11120136 | BeSerra | Sep 2021 | B1 |
20030133409 | Corazza | Jul 2003 | A1 |
20040012812 | Shimizu | Jan 2004 | A1 |
20040034766 | Sakamura | Feb 2004 | A1 |
20050021355 | Brendle | Jan 2005 | A1 |
20050289402 | Neri | Dec 2005 | A1 |
20060010150 | Shaath | Jan 2006 | A1 |
20060107071 | Girish | May 2006 | A1 |
20080005452 | Suda | Jan 2008 | A1 |
20080037658 | Price | Feb 2008 | A1 |
20080140724 | Flynn | Jun 2008 | A1 |
20080140910 | Flynn | Jun 2008 | A1 |
20080155224 | Crandall | Jun 2008 | A1 |
20090073841 | Pasquariello | Mar 2009 | A1 |
20090248604 | Masson | Oct 2009 | A1 |
20090319782 | Lee | Dec 2009 | A1 |
20100037232 | Lee | Feb 2010 | A1 |
20100156896 | Ichimura | Jun 2010 | A1 |
20130185555 | Wang | Jul 2013 | A1 |
20130198440 | Oh | Aug 2013 | A1 |
20140380125 | Calder | Dec 2014 | A1 |
20150169462 | Vaisanen et al. | Jun 2015 | A1 |
20160328180 | Wang | Nov 2016 | A1 |
20170041296 | Ford | Feb 2017 | A1 |
20170339250 | Momchilov | Nov 2017 | A1 |
20190034107 | Kim | Jan 2019 | A1 |
20190212942 | Kellokoski et al. | Jul 2019 | A1 |
20210064471 | Park | Mar 2021 | A1 |
20210083693 | Danilov | Mar 2021 | A1 |
20210173588 | Kannan | Jun 2021 | A1 |
Number | Date | Country |
---|---|---|
103117084 | May 2013 | CN |
103294960 | Sep 2013 | CN |
103295638 | Sep 2013 | CN |
103902468 | Jul 2014 | CN |
105630418 | Jun 2016 | CN |
106909542 | Jun 2017 | CN |
107277089 | Oct 2017 | CN |
107562376 | Jan 2018 | CN |
107562384 | Jan 2018 | CN |
107562384 | Jan 2018 | CN |
108271150 | Jul 2018 | CN |
108921229 | Nov 2018 | CN |
109656888 | Apr 2019 | CN |
109683918 | Apr 2019 | CN |
3422237 | Jan 2019 | EP |
3615174 | Jan 2005 | JP |
2010176387 | Aug 2010 | JP |
2015141643 | Aug 2015 | JP |
WO-2016019236 | Feb 2016 | WO |
2018141929 | Aug 2018 | WO |
WO-2020169876 | Aug 2020 | WO |
Entry |
---|
Cojocar, Lucian, Kaveh Razavi, and Herbert Bos. “Off-the-shelf embedded devices as platforms for security research.” In Proceedings of the 10th European Workshop on Systems Security, pp. 1-6. 2017. (Year: 2017). |
Diesburg, Sarah, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I. Andy Wang, and Geoff Kuenning. “Trueerase: Per-file secure deletion for the storage data path.” In Proceedings of the 28th annual computer security applications conference, pp. 439-448. 2012. (Year: 2012). |
Reardon, Joel, David Basin, and Srdjan Capkun. “Sok: Secure data deletion.” In 2013 IEEE symposium on security and privacy, pp. 301-315. IEEE, 2013. (Year: 2013). |
Hao, Feng, Dylan Clarke, and Avelino Francisco Zorzo. “Deleting secret data with public verifiability.” IEEE Transactions on Dependable and Secure Computing 13, No. 6 (2015): 617-629. (Year: 2015). |
Onarlioglu, Kaan, William Robertson, and Engin Kirda. “Eraser: Your data won't be back.” In 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 153-166. IEEE, 2018. (Year: 2018). |
Li, Long, Jing Wei, C. B. Li, Y. Cao, and B. Fang. “Prediction of load model based on artificial neural network.” Transactions of China Electrotechnical Society 30, No. 8 (2015): 225-230. (Year: 2015). |
Zhou, J. “Research on the Promotion of Standardization to Promote the Development of China's Waste Mobile Phone Recycling Industry”, Quality and Standardization, 2018, (01)41-43, pp. 643-647 (Translation of abstract only). |
Ye, D. “Talking about the recycling of electronic waste such as computer phones”, Resource Conservation and Environmental Protection, 2014 (01)144. (Translation of abstract only). |
Wang, J. “Data destruction: An Important Branch of Data Security”, Computer Security, 2006 (08) 53-54. (Translation of abstract only). |
Ye, Q. “Research on MDA-based SQLite Fragment Data Erasure Technology”, Kunming University of Science and Technology, 2016. (Translation of abstract only). |
Xu, J. et al. “Research of Data Destruction Based-on Magnetic Storage Media”, Journal of Southwest China Normal University (Natural Science Edition) (Aug. 2007), vol. 32 No. 4, pp. 107-110. (Translation of abstract only). |
Yin, Y. et al. “Computer Data Secure Delete and Privacy Protect”, Information Network Security, 2009(05)55-58. (Translation of abstract only). |
Chen, E. et al. “Design and Implementation of Database Destroy System”, Computer Engineering and Design (May 2008) vol. 29, No. 10, pp. 2499-2501. (Translation of abstract only). |
Wang, B. et al. “Research and verification of write overlay information elimination technology”, Proceedings of the 18th National Conference on Information Confidentiality, Beijing Jincheng Publishing House. (Translation of abstract only). |
Wei, C. et al. “Application and Research on Data Destruction Technology”, Computer and Modernization, 2010 (10) pp. 180-182. (Translation of abstract only). |
Li, T. “Information Storage and Information Destruction Technology”, Information Security and Technology, 2010 (06) pp. 45-48. (Translation of abstract only). |
Shen, H. “On the Technology for Eliminating Information”, Information Security and Communication Confidentiality, 2009(08)92-94 (Translation of abstract only). |
Lu, Z. et al. “Data Self-Destruction Method”, Application Research of Computers (2009), 26(01) pp. 350-351, 355. (Translation of abstract only). |
Wang, B. et al. “Research and Implementation of the Information Elimination Technology on Storage Medium”, Beijing Jiaotong University, 2009. (Translation of abstract only). |
Bai, Y. “Research and Implementation of Magnetic Media Data Wipe Technology on Windows Platform”, Hubei University of Technology, 2010. (Translation of abstract only). |
Qi, F. et al. “Research on Information Elimination Methods for Solid State Storage Devices and Devices”, Secrecy Science and Technology (2011), (06) pp. 54-59. (Translation of abstract only). |
Sun, D. “Design and Implementation of Data Recovery and Erasure Software Based on Android”, Beijing University of Posts and Telecommunications, 2014. (Translation of abstract only). |
Zhou, K. et al. “Study on the Sanitization and Security of Data Remanence”, Science Technology and Engineering (Sep. 2006), vol. 6 No. 17, pp. 2769-2771. (Translation of abstract only). |
Wu, S. et al. “Storage Medium-Oriented Data Secure Deletion”, 2017,26(11)36-44. (Translation of abstract only). |
Fang, S. et al. “Development and Application of Parallel High-Speed Electronic Data Destruction Platform”, Heilongjiang Electric Power (2017), 39(06)547-550+556 (Translation of abstract only). |
Du, X. “Secure Erase Hard Drive Data in the Study of Residual”, Hebei University of Science and Technology, 2012. (translation of abstract only). |
Gutmann, P. “Secure Deletion of Data from Magnetic and Solid-State Memory”, Sixth USENIX Security Symposium Proceedings, San Jose, California, Jul. 22-25, 1996. |
Wei, M. et al. “Reliably Erasing Data From Flash-Based Solid State Drives”. |
Fundo, A. et al. “Secure Deletion of Data from SSD”, International Journal of Advanced Computer Science and Applications (IJACSA) (2014), vol. 5, No. 8, pp. 131-134. |
Sun, K. et al. “Models and Design of an Adaptive Hybrid Scheme for Secure Deletion of Data in Consumer Electronics”, IEEE Transactions on Consumer Electronics (Feb. 2008), vol. 54, No. 1, pp. 100-104. |
Lee, J. et al. “Secure Deletion for NAND Flash File System”, SAC '08, Fortaleza, Ceará, Brazil (Mar. 16-20, 2008), pp. 1710-1714. |
Swanson, S. et al. “SAFE: Fast, Verifiable Sanitization for SSDs Or: Why encryption alone is not a solution for sanitizing SSDs”, Non-Volatile Systems Laboratory, Computer Science & Engineering, University of California, San Diego (Oct. 13, 2010) Rev v0.6.1. |
Liu, Chen et al. “ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives”, Proceedings on Privacy Enhancing Technologies (2017) vol. 1, pp. 132-148. |
Reardon, J. et al. “SoK: Secure Data Deletion”, Institute of Information Security, ETH Zurich, Zurich, Switzerland. |
Gnatyuk, S. et al. “Modern Method and Software Tool for Guaranteed Data Deletion in Advanced Big Data Systems”, Springer Nature Switzerland AG 2020, Z. Hu et al. (eds.), “Advances in Artificial Systems for Medicine and Education II”, Advances in Intelligent Systems and Computing vol. 902 pp. 581-590. |
Number | Date | Country | |
---|---|---|---|
20210150041 A1 | May 2021 | US |