发明名称 Using different secure erase algorithms to erase chunks from a file associated with different security levels
摘要 Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.
申请公布号 US9111109(B2) 申请公布日期 2015.08.18
申请号 US201213477991 申请日期 2012.05.22
申请人 INTERNATIONAL BUSINESS MACHINES CORPORATION 发明人 Islam Shah Mohammad R.;Patil Sandeep R.;Shiraguppi Riyazahamad M.;Shukla Divyank
分类号 G06F12/00;G06F21/62 主分类号 G06F12/00
代理机构 Konrad Raynes Davda & Victor LLP 代理人 Victor David W.;Konrad Raynes Davda & Victor LLP
主权项 1. A method for secure deleting a file, comprising: receiving a request to secure erase a file having a plurality of chunks stored in at least one storage device; receiving chunk security level information associating at least one of a plurality of security levels with the chunks of the file; determining a first secure erase algorithm to apply to a first chunk in the file in response to the request based on the security level for the first chunk indicated in the chunk security level information; determining a second secure erase algorithm to apply to a second chunk in the file in response to the request based on the security level for the second chunk indicated in the chunk security level information; applying the first secure erase algorithm to erase the first chunk; and applying the second secure erase algorithm to erase the second chunk, wherein the first and second secure erase algorithms use different processes to erase the chunks to which they are applied.
地址 Armonk NY US
您可能感兴趣的专利