[go: up one dir, main page]

WO2004049317A1 - Procedure for erasure of data on electronical data media - Google Patents

Procedure for erasure of data on electronical data media Download PDF

Info

Publication number
WO2004049317A1
WO2004049317A1 PCT/DK2003/000781 DK0300781W WO2004049317A1 WO 2004049317 A1 WO2004049317 A1 WO 2004049317A1 DK 0300781 W DK0300781 W DK 0300781W WO 2004049317 A1 WO2004049317 A1 WO 2004049317A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
erasure
previously stored
overwrites
procedure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/DK2003/000781
Other languages
French (fr)
Inventor
Mikael Hertig
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NENSOME APS
Original Assignee
NENSOME APS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NENSOME APS filed Critical NENSOME APS
Priority to AU2003280321A priority Critical patent/AU2003280321A1/en
Publication of WO2004049317A1 publication Critical patent/WO2004049317A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/02Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
    • G11B5/09Digital recording

Definitions

  • This invention relates to a procedure for the erasure of data on an electronic storage medium.
  • Storage medium is defined as hard disks, floppy disks, computer chips, data tapes or systems of . the same, systematically used either individually or in systematic correlation for the storage of data so that such data can be read in from the storage medium/the system to a computer, a network or a system of networks later.
  • these storage media use electromagnetic signal technology in such a way that re-use is made possible. This method is therefore not applicable to for example L 0 punched cards, where the individual bit remains unchangeable and where a new punched card must be applied in the event of changes being made. .
  • the method may be applied for the systematic erasure of all data on a given unit, e.g. a hard disk or a given system of hard disks, e.g. a RAID system. At the same time the method may be used for the erasure of certain segments, e.g. stored documents on a disk.
  • a given unit e.g. a hard disk or a given system of hard disks, e.g. a RAID system.
  • the method may be used for the erasure of certain segments, e.g. stored documents on a disk.
  • the overwrite is typically effected for one byte at a time in the system by way of a randomising program.
  • the randomising program determines how many times from a number between one and up to a maximum freely chosen by the user the byte in question should 0 be overwritten with a random character.
  • the erasure may also be effected by way of a sequential overwrite.
  • a technically knowledgeable escort is preferred. If access to classified data cannot be precluded by the escort, either the component under maintenance must be physically disconnected from the classified AIS (and sanitized before and after maintenance) or the entire AIS must be sanitized before and after maintenance. c. The dedicated copy of the system software with a direct security function shall not be used for maintenance purposes by uncleared personnel. d. When a system failure prevents sanitization of the system prior to maintenance by uncleared vendor personnel, AISSP procedures must be enforced to deny the uncleared person visual and electronic access to any classified data that may be contained on the system. e. When practical, all maintenance and diagnostics will be performed in the contractor's facility.
  • Any AIS components or equipment released from secure control is no longer part of an accredited system.
  • Nendor-supplied software/firmware used for maintenance or diagnostics must be protected at the level of the accredited AIS.
  • the CSA may allow, on a case-by-case basis, the release of certain types of costly magnetic media for maintenance, such as disk head-alignment.
  • All maintenance tools, diagnostic equipment, and other devices used to service an accredited AIS must be approved by the contractor.
  • Any component board placed into an accredited AIS must remain in the security area until proper release procedures are completed.
  • Remote diagnostic or maintenance services are strongly discouraged. If remote diagnostic or maintenance services become necessary, the AIS shall be sanitized and disconnected from any communication links to network, prior to the connection of any nonsecured communication line.
  • Type I a or b a, b, or m
  • EAPROM Electronically Alterable PROM
  • EPROM Erasable Programmable
  • Flash EPROM FEPROM
  • PROM Programmable ROM
  • Nonvolatile RAM NONRAM
  • NONRAM Nonvolatile RAM
  • SRAM Static Random Access Memory
  • Type I and Type II magnetic tape can only be sanitized for reuse by using approved degaussing equipment.
  • Type III tape cannot be sanitized by degaussing.
  • the CSA will advise the contractor of currently approved Type I and Type LI degaussers. If the contractor uses more than one type of tape (i.e., Type I, Type U, or Type III) and has an approved degausser, then all magnetic tapes must be labelled as to their "Type" to ensure that each is sanitized by appropriate means.
  • Type I magnetic tape has a coercivity of 350 oersteds or less;
  • Type LI has a coercivity between 351 and 0 750 oersteds; and
  • Type LTI has a coercivity greater than 750 oersteds.
  • Minimum is defined as being the least number of times that the overwrite of the selected area must take place. In theory, minimum can be set to 0, but in practice the value will be considerably higher. The minimum must be expressed by an integer.
  • Maximum is defined as being the largest number of overwrites used by the process. This is expressed by an integer defining the maximum number of overwrites that a byte on the unit might be subjected to. The value of maximum is going to infinite according to mathematical law.
  • This invention breaks with the parallel historical progress which makes it possible to retrieve data by using the above mentioned repetitive reading of signals on the premise that signals with the same displacement from the surface centre should be detected for each bit position in order to retrieve previously recorded data.
  • this is achieved by varying the number of overwrites for each individual byte so that the number of layers from previous overwrites varies from byte to byte from a minimum of 2 and up to a maximum number of overwrites between 3 and infinitely, chosen by the user himself.
  • a random number generator is used to choose the number of overwrites to be carried out for each individual byte. This method can be further extended by the choice of a random number generator with a very low degree of predictability in the selection pattern.
  • a random number generator ('randomizer') is used at the same time for the selection of the characters to be used for each individual overwrite of each individual byte.
  • This method can also be further extended by the choice of a mathematical random number generator, leaving a very little degree of predictability in the selection pattern among all the characters used by the computer's character set.
  • an overall higher degree of inpredictability is achieved and thereby a lower recognition of the pattern which is available for a re-constructor of overwritten data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management Or Editing Of Information On Record Carriers (AREA)

Abstract

The invention relates to a method for a safer erasure of data on electronic data storage media with an electromagnetised surface by overwriting the previously stored data.To achieve a higher degree of security against reconstruction, the number of overwrites of each byte of the previously stored data is varied from time to time in a random manner. The invention also enhances lack of recognition by the selection of characters for each individual overwrite by means of a random number generator characterised by a very little degree of recognizable tendencies as far as patterns or regularity are concerned.

Description

Procedure - for erasure of data on electronical data media
1. Description
This invention relates to a procedure for the erasure of data on an electronic storage medium.
Storage medium is defined as hard disks, floppy disks, computer chips, data tapes or systems of . the same, systematically used either individually or in systematic correlation for the storage of data so that such data can be read in from the storage medium/the system to a computer, a network or a system of networks later. Typically, these storage media use electromagnetic signal technology in such a way that re-use is made possible. This method is therefore not applicable to for example L 0 punched cards, where the individual bit remains unchangeable and where a new punched card must be applied in the event of changes being made. .
The method may be applied for the systematic erasure of all data on a given unit, e.g. a hard disk or a given system of hard disks, e.g. a RAID system. At the same time the method may be used for the erasure of certain segments, e.g. stored documents on a disk.
Following the invention, the overwrite is typically effected for one byte at a time in the system by way of a randomising program. The randomising program determines how many times from a number between one and up to a maximum freely chosen by the user the byte in question should 0 be overwritten with a random character. The erasure may also be effected by way of a sequential overwrite.
When using the known overwrite techniques, data is overwritten the same number of times, as chosen by the program. In this connection reference is made to a de facto standard from the American ministry of defence, according to which the unit is erased at least three times. The method is described in a document titled DOD 5220.22-M., in which it is described as "d" or "e".
Paragraph 8.306 states:
0 "8-306. Maintenance a. Cleared personnel who perform maintenance or diagnostics do not normally require an escort. Need-to-know for access to classified information must be enforced. Uncleared maintenance personnel must always be escorted by a cleared and technically knowledgeable individual. The ISSR must ensure that escorts of uncleared maintenance personnel are trained and sufficiently knowledgeable concerning the AISSP, established security policies and practices, and escorting procedures. b. If maintenance is being conducted by appropriately cleared personnel, system sanitizing or component isolation are a local option. If maintenance is being performed by uncleared personnel, steps must be taken to effectively deny access to classified information by the uncleared person and any maintenance equipment or software used; these procedures should be documented in the AISSP. A technically knowledgeable escort is preferred. If access to classified data cannot be precluded by the escort, either the component under maintenance must be physically disconnected from the classified AIS (and sanitized before and after maintenance) or the entire AIS must be sanitized before and after maintenance. c. The dedicated copy of the system software with a direct security function shall not be used for maintenance purposes by uncleared personnel. d. When a system failure prevents sanitization of the system prior to maintenance by uncleared vendor personnel, AISSP procedures must be enforced to deny the uncleared person visual and electronic access to any classified data that may be contained on the system. e. When practical, all maintenance and diagnostics will be performed in the contractor's facility. Any AIS components or equipment released from secure control is no longer part of an accredited system. f. Nendor-supplied software/firmware used for maintenance or diagnostics must be protected at the level of the accredited AIS. The CSA may allow, on a case-by-case basis, the release of certain types of costly magnetic media for maintenance, such as disk head-alignment. g. All maintenance tools, diagnostic equipment, and other devices used to service an accredited AIS must be approved by the contractor. h. Any component board placed into an accredited AIS must remain in the security area until proper release procedures are completed. i. Remote diagnostic or maintenance services are strongly discouraged. If remote diagnostic or maintenance services become necessary, the AIS shall be sanitized and disconnected from any communication links to network, prior to the connection of any nonsecured communication line.
Clearing and Sanitization Matrix
Media Clear Magnetic Tape1
Type I a or b a, b, or m
Type LI a or b b or m
Type m a or b m
Magnetic Disk
Bernoullis a, b, or c m Floppies a, b, or c m
Non-Removable Rigid Disk c a, b, d, or m
Removable Rigid Disk a, b, or c a, b, d, or m
Optical Disk
Read Many, Write Many c m
Read Only m, n
Write Once, Read Many (Worm) m, n Memory
Dynamic Random Access memory (DRAM c or g c, g, or m
Electronically Alterable PROM (EAPROM) i j or m
Electronically Erasable PROM (EEPROM) i h or m
Erasable Programmable (ROM (EPROM) k
1, then c, or m .0 Flash EPROM (FEPROM) i c then i, or m
Programmable ROM (PROM) c m
Magnetic Bubble Memory c a, b, c, or m
Magnetic Core Memory c a, b, e, or m
Magnetic Plated Wire c c and f, or m I 0 Magnetic Resistive Memory c m
Nonvolatile RAM (NONRAM) c or g c, g, or m
Read Only Memory ROM m
Static Random Access Memory (SRAM) c or g c and f, g, or m
Equipment Cathode Ray Tube (CRT) g q
Printers 0 Impact g p then g
Laser g o then g
Type I and Type II magnetic tape can only be sanitized for reuse by using approved degaussing equipment. Type III tape cannot be sanitized by degaussing. The CSA will advise the contractor of currently approved Type I and Type LI degaussers. If the contractor uses more than one type of tape (i.e., Type I, Type U, or Type III) and has an approved degausser, then all magnetic tapes must be labelled as to their "Type" to ensure that each is sanitized by appropriate means. Type I magnetic tape has a coercivity of 350 oersteds or less; Type LI has a coercivity between 351 and 0 750 oersteds; and Type LTI has a coercivity greater than 750 oersteds.
Clearing and Sanitization Matrix a. Degauss with a Type I degausser b. Degauss with a Type LI degausser. c. Overwrite all addressable locations with a single character. d. Overwrite all addressable locations with a character, its complement, then a random character and verify. THIS METHOD IS NOT APPROVED FOR SANITIZING MEDIA THAT CONTAIN TOP SECRET INFORMATION. 0 e. Overwrite all addressable locations with a character, its complement, then a random character. f. Each overwrite must reside in memory for a period longer than the classified data resided. g. Remove all power to include battery power. h. Overwrite all locations with a random pattern, all locations witn Dinary zeros, an locations witn binary ones. i. Perform a full chip erase as per manufacturer's data sheets, j. Perform i above, then c above, a total of three times, k. Perform an ultraviolet erase according to manufacturer's recommendation. 1. Perform k above, but increase time by a factor of three, m. Destroy - Disintegrate, incinerate, pulverize, shred, or melt, n. Destruction required only if classified information is contained, o. Run five pages of unclassified text (font test acceptable). L 0 p. Ribbons must be destroyed. Platens must be cleaned. q. Inspect and/or test screen surface for evidence of burned-in information. If present, the cathode ray tube must be destroyed."
By repeated overwriting of the storage medium, the traceability of previously recorded signals is made difficult. If the position of each bit is regarded as a flat box unit on top of which the reading/writing head is positioned over the point of intersection of the two diagonal lines, the direct magnetising occurs at the mid-point. Detection of any traces of previously recorded signals is possible due to the fact that the magnetised areas re-magnetise their surroundings with signals 0 weaker than those directly magnetised by the reading heads. In this way layers of previously loaded, weak signals are created. The search for previously loaded signals is made possible by searching further down and towards the sides. If a signal from a previously written file is found in a byte and therefore in its component bits, then the probability that a large number of signals from other data segments will be found in the same positions in corresponding locations as those of the detected bits is relatively high. If signals from previously recorded data that are overwritten according to the presently known techniques can be read by using specially developed equipment, then the unravelling of previously recorded and later overwritten data will be made easier due to the fact that the repetition of the knowledge as to where the signals can be found is made possible in those cases where bits on the storage medium have been subjected to the same historical 0 progress.
Professionals agree that rediscovery of data is made more difficult by repetitive overwrites if these are carried out with different patterns. An increase in the number of overwrites thus makes rediscovery more difficult. In practice, at a given point in time, the number of overwrites that is presently considered to be sufficient for an acceptably high degree of protection will be stated.
Minimum is defined as being the least number of times that the overwrite of the selected area must take place. In theory, minimum can be set to 0, but in practice the value will be considerably higher. The minimum must be expressed by an integer. Maximum is defined as being the largest number of overwrites used by the process. This is expressed by an integer defining the maximum number of overwrites that a byte on the unit might be subjected to. The value of maximum is going to infinite according to mathematical law.
This invention breaks with the parallel historical progress which makes it possible to retrieve data by using the above mentioned repetitive reading of signals on the premise that signals with the same displacement from the surface centre should be detected for each bit position in order to retrieve previously recorded data.
Following the invention, this is achieved by varying the number of overwrites for each individual byte so that the number of layers from previous overwrites varies from byte to byte from a minimum of 2 and up to a maximum number of overwrites between 3 and infinitely, chosen by the user himself.
In a given version, a random number generator is used to choose the number of overwrites to be carried out for each individual byte. This method can be further extended by the choice of a random number generator with a very low degree of predictability in the selection pattern.
In a given version, a random number generator ('randomizer') is used at the same time for the selection of the characters to be used for each individual overwrite of each individual byte. This method can also be further extended by the choice of a mathematical random number generator, leaving a very little degree of predictability in the selection pattern among all the characters used by the computer's character set. Hereby an overall higher degree of inpredictability is achieved and thereby a lower recognition of the pattern which is available for a re-constructor of overwritten data.

Claims

2. 0 Claims Patent Requirements
.1. Procedure for the erasure of previously stored data on electronic data storage media or data storage systems by repetitive writing of new characters on top of the previously stored characters characterised by the fact that the number of overwrites varies from byte to byte between a minimum and a maximum.
L 0 .2. Procedure for the erasure of previously stored data on electronic data storage media according to requirement 1 characterised by the fact that the number of overwrites of each byte is selected by a randomising program.
,3 Procedure for the erasure of previously stored data on electronic data storage media according to requirement 1 and requirement 2 characterised by the fact that the administrator of the program selects the number of overwrites.
.4. Procedure for the erasure of previously stored data on electronic data storage media or data storage systems by repetitive overwrites using new characters on top of the previously stored 0 characters according to requirement 1 characterised by the fact that a random number generator is being used for the selection of the characters to be used for each individual overwrite.
PCT/DK2003/000781 2002-11-25 2003-11-14 Procedure for erasure of data on electronical data media Ceased WO2004049317A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003280321A AU2003280321A1 (en) 2002-11-25 2003-11-14 Procedure for erasure of data on electronical data media

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DK200201811A DK175426B1 (en) 2002-11-25 2002-11-25 Procedure for deleting data on an electronic storage medium
DKPA200201811 2002-11-25

Publications (1)

Publication Number Publication Date
WO2004049317A1 true WO2004049317A1 (en) 2004-06-10

Family

ID=32337936

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK2003/000781 Ceased WO2004049317A1 (en) 2002-11-25 2003-11-14 Procedure for erasure of data on electronical data media

Country Status (3)

Country Link
AU (1) AU2003280321A1 (en)
DK (1) DK175426B1 (en)
WO (1) WO2004049317A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020181134A1 (en) * 2001-06-04 2002-12-05 Xerox Corporation Secure data file erasure
US20020196572A1 (en) * 2001-06-21 2002-12-26 Steven Bress Systems and methods for removing data stored on long-term memory devices
US20030210489A1 (en) * 2002-05-13 2003-11-13 Yec Co., Ltd. Data eraser and data erasing program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020181134A1 (en) * 2001-06-04 2002-12-05 Xerox Corporation Secure data file erasure
US20020196572A1 (en) * 2001-06-21 2002-12-26 Steven Bress Systems and methods for removing data stored on long-term memory devices
US20030210489A1 (en) * 2002-05-13 2003-11-13 Yec Co., Ltd. Data eraser and data erasing program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHOU J.K. ET AL.: "Providing security erasure of a deleted disk or disk document", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 25, no. 12, May 1983 (1983-05-01), pages 6680 - 6682, XP002972890 *

Also Published As

Publication number Publication date
AU2003280321A1 (en) 2004-06-18
DK175426B1 (en) 2004-10-18
DK200201811A (en) 2004-07-30

Similar Documents

Publication Publication Date Title
DE69325072T2 (en) Secure memory card
US3931504A (en) Electronic data processing security system and method
DE69528663T2 (en) METHOD FOR CHECKING THE OPERATING ARRANGEMENT OF A COMPUTER SYSTEM
Parker Toward a new framework for information security?
DE69326858T2 (en) Secure file deletion
TW323359B (en)
JP2005011151A (en) Memory card
US6928551B1 (en) Method and apparatus for selectively denying access to encoded data
EP1667008A2 (en) A data protection method for a removable storage medium and a storage device using the same
KR102511686B1 (en) Method and system for verifying data erasure process
US9317422B1 (en) Secure erase of data in electronic device
DE112008003855T5 (en) System and method for providing secure access to system memory
US8721738B1 (en) System and method for ensuring security of data stored on data storage devices
JP4822230B2 (en) Apparatus, method, and program for partially disabling information retrieval on WORM media
US8528105B1 (en) System and method for ensuring security of data stored on electronic computing devices
DE102011054842A1 (en) Device for handling notes of value and / or coins and method for initializing and operating such a device
US20060200357A1 (en) Policy based data shredding for storage controller
CN105117302B (en) A kind of method of calibration for storage medium data destroying
WO2004049317A1 (en) Procedure for erasure of data on electronical data media
NL8120486A (en) DEVICE FOR AUTOMATICALLY ERASING THE INFORMATION CONTENT IN AN INFORMATION BASE.
Bennison et al. Data security issues relating to end of life equipment
Yusof et al. Data sanitization framework for computer hard disk drive: a case study in Malaysia
US8623099B2 (en) System and method for securing data within a storage system
JP4936230B2 (en) Storage device with data complete erasure function, method and program thereof
Baharudin et al. NPC-WIPER: File Wiper Tool using Non Printable Characters

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP