CN115857825A - Data erasing method, device, equipment and storage medium - Google Patents

Data erasing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115857825A
CN115857825A CN202211676882.4A CN202211676882A CN115857825A CN 115857825 A CN115857825 A CN 115857825A CN 202211676882 A CN202211676882 A CN 202211676882A CN 115857825 A CN115857825 A CN 115857825A
Authority
CN
China
Prior art keywords
server
data
erasing
hard disk
bios
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211676882.4A
Other languages
Chinese (zh)
Inventor
王万强
王龙飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202211676882.4A priority Critical patent/CN115857825A/en
Publication of CN115857825A publication Critical patent/CN115857825A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a data erasing method, a device, equipment and a storage medium, wherein the method comprises the following steps: setting the starting mode of the server to be started through an operating system stored in a TF card of the server; after the starting mode is set, the control server is started through an operating system stored in the TF card; after the server is started, inquiring erasing configuration information in the BMC; erasing data stored in a hard disk of the server according to the erasing configuration information; after the data stored in the hard disk is erased, factory setting of the BIOS is restored; and after the recovery is finished, recovering the configuration information of the BMC to a factory default value. The invention can set the server to be started through the operating system stored in the TF card by the BMC, and then erase the data stored in the hard disk of the server, thereby avoiding that some data are read by others when the server is cleared or replaced, and protecting the safety of user data in the server.

Description

Data erasing method, device, equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a data erasing method, apparatus, device, and storage medium.
Background
In the prior art, the server is normally cleared and replaced, and when the server is cleared or replaced, in order to avoid stealing data stored in the server by others, data in the server needs to be securely erased, including erasing of server hard disk data, configuration of BMC (Baseboard Management Controller) and configuration of BIOS (Basic Input Output System), so that the server is restored to a factory state; therefore, how to securely erase data in the server is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
In view of the above problems, embodiments of the present invention are proposed to provide a data erasing method and a corresponding data erasing apparatus, electronic device, computer-readable storage medium that overcome or at least partially solve the above problems.
In order to solve the above problem, an embodiment of the present invention discloses a data erasing method, which is applied to a BMC, where the BMC is connected to a BIOS and a server, respectively, and the BIOS is connected to the server, where the method includes:
setting the starting mode of the server to be started through an operating system stored in a flash memory TF card of the server;
after the starting mode is set, controlling the server to start through an operating system stored in the TF card;
after the server is started, inquiring erasure configuration information in the BMC;
according to the erasing configuration information, erasing data stored in a hard disk of the server;
after the data stored in the hard disk is erased, restoring factory settings of the BIOS;
and after the BIOS is restored to factory default, restoring the configuration information of the BMC to the factory default.
Optionally, when the data is secret data, the erasing the data stored in the hard disk of the server includes:
performing basic erasing on data stored in a hard disk of the server, wherein the basic erasing is to overwrite the data stored in the hard disk by adopting preset information so as to complete erasing; the preset information is random data information.
Optionally, when the data is secret data, the erasing the data stored in the hard disk of the server includes:
and deeply erasing the data stored in the hard disk of the server by adopting a preset erasing algorithm, wherein the preset erasing algorithm comprises any one of a Sanitize erasing algorithm, a Secure-Erase erasing algorithm and a CryptoErase key erasing algorithm.
Optionally, the method further comprises:
receiving a data erasing progress sent by the server;
and displaying the data erasing progress to a user.
Optionally, the restoring factory settings of the BIOS includes:
and sending a factory resetting instruction to the BIOS, wherein the factory resetting instruction is used for indicating the BIOS to reset the configuration information to a factory default value.
Optionally, the data comprises: at least one of service data, user information, software operation data, software installation packages and system configuration files.
The invention also discloses a data erasing device, which is applied to a baseboard management controller BMC, wherein the BMC is respectively connected with a basic input/output system BIOS and a server, the BIOS is connected with the server, and the device comprises:
the setting module is used for setting the starting mode of the server to be started through an operating system stored in a flash memory TF card of the server;
the control module is used for controlling the server to start through an operating system stored in the TF card after the start mode is set;
the query module is used for querying the erasing configuration information in the BMC after the server is started;
the erasing module is used for erasing the data stored in the hard disk of the server according to the erasing configuration information;
the BIOS recovery module is used for recovering factory settings of the BIOS after the data stored in the hard disk are erased;
and the BMC recovery module is used for recovering the configuration information of the BMC to a factory default value after the BIOS is completely recovered to the factory default value.
Optionally, when the data is secret data, the erasing module includes:
the basic erasing submodule is used for performing basic erasing on data stored in a hard disk of the server, and the basic erasing is to overwrite the data stored in the hard disk by adopting preset information so as to complete erasing; the preset information is random data information.
Optionally, when the data is secret data, the erasing module includes:
the deep erasing submodule is used for deeply erasing data stored in the hard disk of the server, and the deep erasing refers to erasing the data stored in the hard disk of the server by adopting a preset erasing algorithm, wherein the preset erasing algorithm comprises any one of a Sanitize erasing algorithm, a Secure-Erase erasing algorithm and a CryptoErase key erasing algorithm.
Optionally, the apparatus comprises:
the receiving module is used for receiving the data erasing progress sent by the server;
and the display module is used for displaying the data erasing progress to a user.
Optionally, the apparatus further comprises:
the judging module is used for judging whether the data erasing progress reaches a preset progress value or not;
and the determining module is used for determining that the data erasing stored in the hard disk of the server is finished when the data erasing progress reaches the preset progress value.
Optionally, the BIOS recovery module includes:
and the sending submodule is used for sending a factory resetting instruction to the BIOS, and the factory resetting instruction is used for indicating the BIOS to reset the configuration information to a factory default value.
Optionally, the data comprises: at least one of service data, user information, software operation data, software installation packages and system configuration files.
The invention also discloses an electronic device, comprising: a processor, a memory and a computer program stored on the memory and capable of running on the processor, which computer program, when executed by the processor, carries out the steps of the data erasure method as described above.
The invention also discloses a computer readable storage medium on which a computer program is stored, which computer program, when executed by a processor, implements the steps of the data erasure method as described above.
The embodiment of the invention has the following advantages:
according to the embodiment of the invention, the starting mode of the server is set to be started through the operating system stored in the TF card of the server through the BMC, so that the influence on data erasure caused by starting the operating system stored in the hard disk is avoided; after the server is started, erasing data stored in a hard disk of the server according to the inquired erasing configuration information in the BMC; after the data stored in the hard disk is erased, factory settings are restored to the BIOS and the BMC in sequence; the invention prevents some data from being read by others when the server is cleared or replaced, and protects the safety of user data in the server.
Drawings
Fig. 1 is a connection block diagram of a BMC according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a data erasing method according to an embodiment of the present invention;
FIG. 3 is a flow chart of steps of another data erasing method provided by the embodiment of the invention;
FIG. 4 is a block diagram of a data erasing apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present invention;
fig. 6 is a block diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
In the prior art, the clearing and replacement of a server become normal work, and when the server is cleared or replaced, in order to avoid stealing data stored in the server by others, the data in the server needs to be safely erased, including erasing of server hard disk data, configuration of a BMC and configuration of a BIOS, so that the server is restored to a factory state; therefore, how to securely erase data in the server is an urgent problem to be solved by those skilled in the art.
Based on this, one of the core concepts of the embodiment of the present invention is that the BMC sets the start mode of the server to be started by the operating system stored in the TF card of the server, thereby avoiding the influence on data erasure caused by starting the operating system stored in the hard disk; after the server is started, erasing data stored in a hard disk of the server according to the inquired erasing configuration information in the BMC; after the data stored in the hard disk is erased, factory settings are restored to the BIOS and the BMC in sequence; the invention prevents some data from being read by others when the server is cleared or replaced, and protects the safety of user data in the server.
Fig. 1 shows a connection block diagram of a BMC according to an embodiment of the present invention, where in fig. 1, the BMC is connected to a server and a BIOS, the BIOS is connected to the server, the server includes a TF card and a hard disk, and when the server is started through an operating system of the hard disk, normal service operation may be performed, and when the server is started through the operating system of the TF card, data stored in the server may be erased.
Referring to fig. 2, a flowchart of steps of a data erasing method provided in an embodiment of the present invention is shown, and is applied to a BMC, where the BMC is respectively connected to a BIOS and a server, and the BIOS is connected to the server, and the method specifically includes the following steps:
step 101, setting the starting mode of the server to be started through an operating system stored in a flash memory TF card of the server.
In the embodiment of the invention, the server refers to a computer system which can provide certain services for other machines in a network in a broad sense; in a narrow sense, a server is a special reference to some high-performance computers, and can provide services to the outside through a network. Since higher requirements are made for stability, security, performance, and the like than those of a general PC, hardware such as a CPU, a chipset, a memory, a disk system, and a network is different from that of a general PC (Personal Computer).
The server is used as a node of the network, stores and processes 80% of data and information on the network, and is also called a soul of the network; making an image metaphor: the server is like an exchange of a post office, and the fixed or mobile network terminals such as a microcomputer, a notebook, a PDA, a mobile phone, etc. are like telephone sets scattered at home, various offices, public places, etc. The user can communicate with the external telephone in daily life and work and can reach the target telephone only by passing through the switchboard; similarly, network terminal devices such as home and enterprise computers for accessing internet, obtaining information, communicating with the outside world, entertainment, etc. must also pass through the server, so that the server can be said to be "organization" and "leader" devices.
Differentiated according to the architecture, servers are mainly divided into two categories:
non-x 86 servers: including mainframes, minicomputers, and UNIX servers, which are servers using RISC (reduced instruction set) or EPIC processors and mainly using UNIX and other dedicated operating systems, reduced instruction set processors mainly including POWER and PowerPC processors of IBM corporation, SPARC processors developed by SUN in cooperation with fuji corporation, EPIC processors mainly including the itanium processors developed by HP in cooperation with Intel, and the like. The server is expensive, has a closed system, good stability and strong performance, and is mainly used in core systems of large enterprises such as finance, telecommunication and the like;
x86 server: also known as CISC (complex instruction set) architecture server, which is generally referred to as PC server, is based on PC architecture, and uses Intel or other x86 instruction set compatible processor chip and Windows operating System server, such as IBM System x series server, HP Proliant series server, etc. The price is cheap, the compatibility is good, the stability is poor, unsafe, mainly used in medium and small enterprises and non-key business.
BIOS is a group of programs solidified on a ROM chip on the inner mainboard of the computer, which stores the most important basic input and output programs of the computer, the self-checking program after starting up and the system self-starting program, and can read and write the specific information set by the system from the CMOS; the main function of the system is to provide the bottommost and most direct hardware setting and control for the computer; in addition, the BIOS also provides some system parameters to the operating system; the change of system hardware is hidden by BIOS, and programs use the functions of the BIOS instead of directly controlling the hardware; modern operating systems ignore the abstraction layer provided by the BIOS and directly control the hardware components.
The function of the BIOS is divided into three parts:
self-checking and initializing, wherein the part is responsible for starting a computer, and the part specifically comprises three parts:
(1) The first part of BIOS is used for detecting a hardware part when a computer is just powered On, and is also called Power On self test (POST for short), the function is to check whether the computer is good, the normally complete POST self test comprises testing a CPU, a 640K basic memory, an extended memory above 1M, a ROM, a mainboard, a CMOS memory, a serial-parallel port, a display card, a soft-hard disk system and a keyboard, and once a problem is found in the self test, the system gives a prompt message or a whistle warning; if an error is found in the self-test, the self-test is processed according to two conditions: the system is shut down for serious faults (fatal faults), and no prompt or signal can be given at the moment because various initialization operations are not completed; and giving out a prompt or a sound alarm signal for the non-serious fault and waiting for the user to process.
(2) The second part is initialization, including creating interrupt vector, setting register, initializing and detecting some peripheral equipment, etc. the important part is BIOS setting, which is mainly some parameters set in hardware, and when the computer is started, these parameters are read and compared with the actual hardware setting, and if they are not matched, the system is started.
(3) The third part is a boot program, and the function is to boot DOS (Disk Operating System) or other Operating systems. The BIOS reads the boot record from the starting sector of the floppy or hard disk, if not found, it will display no boot device on the display, if found, it will transfer the control right of the computer to the boot record, the boot record will load the operating system into the computer, after the computer is successfully started, this part of the BIOS task is completed.
The BMC is a baseboard management controller and can perform operations such as firmware upgrading, machine equipment checking and the like on a machine in a state that the machine is not started; before the server is started, the BMC may set the starting mode of the server to start from the operating system stored in the TF card, and after the setting is completed, the BIOS may direct the server to start from the operating system stored in the TF card.
And step 102, after the start mode is set, starting the control server through the operating system stored in the TF card.
In the embodiment of the invention, the BMC can control the startup and shutdown of the server, after the startup mode of the server is set, the BMC can control the server to be started through the operating system stored in the TF card, the operating system stored in the TF (Trans flash card) card can safely erase data stored in the server, and after the server is started, the operating system in the TF card can safely erase data in the designated area.
Step 103, after the server is started, the erasing configuration information in the BMC is inquired.
In the embodiment of the present invention, the erasure configuration information is area information used to indicate that the server needs to be erased, in an example, the operation data of a general server is stored in a hard disk, and at this time, the erasure configuration information is the hard disk of the server; for those skilled in the art, the erasure configuration information may be set according to the user requirement, and is not limited herein.
And 104, erasing the data stored in the hard disk of the server according to the erasing configuration information.
According to the embodiment of the invention, after the erasing configuration information is determined, the data stored in the hard disk of the server can be erased according to the erasing configuration information, in one example, the erasing configuration information is the hard disk of the server, and the data stored in the hard disk of the server is erased according to the hard disk information of the server, so that the user data can be ensured not to be stolen by other people when the server needs to be replaced or discarded, and the data safety of the user is protected.
And 105, after the data stored in the hard disk is erased, restoring factory settings of the BIOS.
In the embodiment of the invention, when the data stored in the hard disk is erased, the BIOS can be restored to factory settings, so that the condition that the records of some programs are browsed and embezzled by others in the use process of the BIOS is avoided.
And step 106, after the BIOS is restored to the factory default value, restoring the configuration information of the BMC to the factory default value.
In the embodiment of the invention, after the factory resetting of the BIOS is completed, the configuration information of the BIOS is restored to the factory default value, so that the erasing of the data stored in the hard disk of the server, the factory resetting of the BIOS and the factory resetting of the BMC are sequentially completed.
According to the embodiment of the invention, the starting mode of the server is set to be started through the operating system stored in the TF card of the server through the BMC, so that the influence on data erasure caused by starting the operating system stored in the hard disk is avoided; after the server is started, erasing data stored in a hard disk of the server according to the inquired erasing configuration information in the BMC; after the data stored in the hard disk is erased, factory settings are restored to the BIOS and the BMC in sequence; the invention prevents some data from being read by others when the server is cleared or replaced, and protects the safety of user data in the server.
Fig. 3 is a flowchart illustrating another step of a data erasing method according to an embodiment of the present invention, where the method is applied to a BMC, the BMC is respectively connected to a BIOS and a server, and the BMC is connected to the server BIOS, and the method specifically includes the following steps:
step 201, the boot mode of the server is set to be booted through the operating system stored in the flash memory TF card of the server.
Step 202, after the start mode setting is completed, the control server starts through the operating system stored in the TF card.
Step 203, after the server is started, the erasing configuration information in the BMC is queried.
Step 204, according to the erasing configuration information, when the data is secret data, basic erasing is performed on the data stored in the hard disk of the server, and the basic erasing is to overwrite the data stored in the hard disk by adopting preset information so as to complete erasing; the preset information is random data information.
In the embodiment of the invention, the secret data is that official employees in a company or third parties and trainees signed with corresponding secret agreements are allowed to use the secret data within a specified range, such as abuse, leakage and tampering, and the secret data can cause small negative influence on company business and data bodies after being damaged, so that reputation damage, economic loss or legal liability cannot be generated; the data transferred or transmitted can be shared under the real, minimum necessary and reasonable condition of the requirement;
in one example, when the data is secret data, an addressable unit of a hard disk can be written with a single character three times, a fixed value 0xFF is written for the first time, then a fixed value 0x77 is written, and finally random data information is written, for example, the random data information is 3, and the purpose of clearing the information data on the memory is achieved through data overwriting three times; the erasing efficiency can be improved by the basic erasing mode.
In an embodiment of the present invention, the data includes: at least one of service data, user information, software operation data, software installation packages and system configuration files.
In the embodiment of the invention, the user information can refer to an account password, identity information, an input fingerprint and the like of the user; the software running data refers to some data generated in the software running process, such as some data generated by chatting and videos of software such as login WeChat and QQ; service data refers to data generated by a server when running some services; the software installation package refers to an installation package stored in a hard disk when software is installed; the system configuration file refers to a file for configuring parameters and initial settings for the server; since the server may generate various data during the operation process, the erased data includes specifically, but not limited to, those.
In an embodiment of the present invention, when data is top secret data, erasing data stored in a hard disk of a server includes: the data stored in the hard disk of the server is deeply erased, wherein the deeply erasing is to Erase the data stored in the hard disk of the server by adopting a preset erasing algorithm, and the preset erasing algorithm comprises any one of a Sanitize erasing algorithm, a Secure-Erase erasing algorithm and a CryptoErase key erasing algorithm.
In the embodiment of the invention, the confidential data refers to data which is approved by a company data decision-making organization and is limited to be used by individual key personnel, direct work related personnel, users or employees of the company or within a minimum specific range, and comprises the most important confidentiality of the company, the future fate and the fundamental benefits of development of the related company, such as abuse, leakage, tampering, damage to the company and data main bodies (users, employees, external data providers or companies and other bodies having legal rights on data) after being damaged, reputation or reputation damage, and economic loss, or the company can bear important legal responsibility; data sharing, transfer or transmission is prohibited principally for internal and external use.
The Sanitize is a more advanced erasing technology supported by partial hard disks, the mode of Erase (three modes of Block, overwrite and Crypto) can be selected, the NAND server hard disk recommends using Block Erase, the server hard disk supporting the self-encryption function (generally supporting the Crypto mode) recommends using Crypto Erase, and the erasing time is very short (only the encrypted key needs to be cleared).
The cleaning method of the server hard disk comprises the following steps: the deletion in crypto Erase mode can be prioritized, and then the deletion in Block Erase mode. The Sanitize command is executed by a hard disk background, and can simultaneously carry out saniize on a plurality of disks; block Erase: completely erasing data on the server hard disk from the block level, namely physically; overwrite: the user data is overlaid with a specific data format. The Overwrite erase was originally applied to HDDs whose data was stored on metal disks with magnetic coatings, and writing new data was done by overwriting. In the NVMe server hard disk era, the protocol evolves to NVMe1.3, which introduces the saitze function, and the Overwrite erasing mode is still used. However, the storage medium of the server hard disk is different from the HDD, the basic unit of reading and writing is not bits (bit) or bytes (byte) of the HDD, but is a Page (Page), new data writing needs to be performed first (Erase) and then (Program), erasing needs to be performed according to a Block (Block) unit, and extra erasing is intangibly introduced, so that the service life of the server hard disk is reduced;
crypt Erase: for a hard disk supporting a self-encryption function, encrypted data is made unrecognizable by deleting a key.
Secure-Erase: some configuration parameters of the hard disk are modified through format, and data can be deleted while the parameters are modified.
When the data with the erasure in the server is the top secret data, any one of the erasure algorithms can be adopted to erase the data, so that the data can be ensured to be completely erased; the specific choice is not limited herein.
In step 205, after the data stored in the hard disk is erased, factory settings of the BIOS are restored.
In an embodiment of the present invention, the restoring factory settings of the BIOS includes: and sending a factory resetting instruction to the BIOS, wherein the factory resetting instruction is used for indicating the BIOS to reset the configuration information to a factory default value.
And step 206, after the BIOS is restored to the factory default value, restoring the configuration information of the BMC to the factory default value.
In an embodiment mode of the present invention, the method further includes: receiving a data erasing progress sent by a server; and showing the data erasing progress to a user.
In the embodiment of the invention, when the data in the hard disk of the server is erased, the server can send the data erasing progress to the BMC in real time, so that whether the data is erased or not can be known in real time, and convenience is provided for a user.
In an example, the data erasing progress is displayed in a page of the BMC in a form of a progress bar, and a specific progress value is displayed, for example, when the progress value is 50%, it indicates that the data erasing progress in the server is 50%, and the user can know the erasing progress according to the progress bar.
In an embodiment mode of the present invention, the method further includes:
judging whether the data erasing progress reaches a preset progress value or not; and when the data erasing progress reaches a preset progress value, determining that the data erasing stored in the hard disk of the server is finished.
In the embodiment of the present invention, the preset progress value refers to a progress value set by a user, and is generally set to 100%, in an example, if the data erasure progress is 50%, that is, less than 100%, it indicates that the erasure of the non-data stored in the hard disk of the server is completed; if the data erasing progress is 100%, namely 100% is reached, the data erasing stored in the hard disk of the server is finished.
The embodiment of the invention discloses a data erasing method, which can set the starting mode of a server to be started through an operating system stored in a TF card of the server through BMC, thereby avoiding the influence on data erasing caused by starting the operating system stored in a hard disk; after the server is started, erasing data stored in a hard disk of the server according to the inquired erasing configuration information in the BMC; after the data stored in the hard disk is erased, factory settings are restored to the BIOS and the BMC in sequence; the invention prevents some data from being read by others when the server is cleared or replaced, and protects the safety of user data in the server.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those of skill in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the embodiments of the invention.
Referring to fig. 4, a block diagram of a data erasing apparatus according to an embodiment of the present invention is shown, and is applied to a BMC, where the BMC is connected to a BIOS and a server, respectively, and the BIOS is connected to the server, and specifically includes the following modules:
a setting module 301, configured to set a boot mode of the server to be booted through an operating system stored in a flash memory TF card of the server;
a control module 302, configured to control the server to start through an operating system stored in the TF card after the start mode setting is completed;
the query module 303 is configured to query the erase configuration information in the BMC after the server is started;
an erasing module 304, configured to erase data stored in a hard disk of the server according to the erasing configuration information;
a BIOS recovery module 305, configured to recover factory settings of the BIOS after the data stored in the hard disk is erased;
a BMC restoring module 306, configured to restore the configuration information of the BMC to a factory default value after the BIOS restores the factory settings.
The invention discloses a data erasing device, wherein the starting mode of a server is set to be started through an operating system stored in a TF card of the server through BMC, so that the influence on data erasing caused by starting the operating system stored in a hard disk is avoided; after the server is started, erasing data stored in a hard disk of the server according to the inquired erasing configuration information in the BMC; after the data stored in the hard disk is erased, factory settings are restored to the BIOS and the BMC in sequence; the invention prevents some data from being read by others when the server is cleared or replaced, and protects the safety of user data in the server.
In an embodiment of the present invention, when the data is secret data, the erasing module 304 includes:
the basic erasing submodule is used for performing basic erasing on data stored in a hard disk of the server, and the basic erasing is to overwrite the data stored in the hard disk by adopting preset information so as to complete erasing; the preset information is random data information.
In an embodiment of the present invention, when the data is secret data, the erasing module 304 includes:
the deep erasing submodule is used for deeply erasing data stored in the hard disk of the server, and the deep erasing refers to erasing the data stored in the hard disk of the server by adopting a preset erasing algorithm, wherein the preset erasing algorithm comprises any one of a Sanitize erasing algorithm, a Secure-Erase erasing algorithm and a CryptoErase key erasing algorithm.
In an embodiment mode of the present invention, the apparatus includes:
the receiving module is used for receiving the data erasing progress sent by the server;
and the display module is used for displaying the data erasing progress to a user.
In an embodiment mode of the present invention, the apparatus further includes:
the judging module is used for judging whether the data erasing progress reaches a preset progress value or not;
and the determining module is used for determining that the data erasing stored in the hard disk of the server is finished when the data erasing progress reaches the preset progress value.
In an embodiment of the present invention, the BIOS recovery module includes:
and the sending submodule is used for sending a factory resetting instruction to the BIOS, and the factory resetting instruction is used for indicating the BIOS to reset the configuration information to a factory default value.
In an embodiment of the present invention, the data includes: at least one of service data, user information, software operation data, software installation packages and system configuration files.
The invention discloses a data erasing device, wherein the starting mode of a server is set to be started through an operating system stored in a TF card of the server through BMC, so that the influence on data erasing caused by starting the operating system stored in a hard disk is avoided; after the server is started, erasing data stored in a hard disk of the server according to the inquired erasing configuration information in the BMC; after the data stored in the hard disk is erased, factory settings are restored to the BIOS and the BMC in sequence; the invention prevents some data from being read by others when the server is cleared or replaced, and protects the safety of user data in the server.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
As shown in fig. 5, a block diagram of an electronic device 40 according to an embodiment of the present invention is provided, and includes:
the data erasing method comprises a processor 401, a memory 402 and a computer program 4021 stored in the memory 402 and capable of running on the processor 401, wherein when the computer program 4021 is executed by the processor 401, each process of the data erasing method embodiment is implemented, and the same technical effect can be achieved.
Fig. 6 shows a block diagram of a structure of a computer-readable storage medium 50 according to an embodiment of the present invention, where the computer-readable storage medium 50 stores a computer program 501, and when the computer program 501 is executed by a processor, the computer program 501 implements the processes of the data erasing method in the above-mentioned embodiment, and can achieve the same technical effects, and therefore, for avoiding repetition, details are not repeated here.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrases "comprising one of \ 8230; \8230;" does not exclude the presence of additional like elements in a process, method, article, or terminal device that comprises the element.
The foregoing describes in detail a data erasing method, apparatus, device, and storage medium provided by the present invention, and a specific example is applied in the present document to explain the principle and the implementation of the present invention, and the description of the foregoing embodiment is only used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A data erasing method is applied to a Baseboard Management Controller (BMC), wherein the BMC is respectively connected with a Basic Input Output System (BIOS) and a server, and the BIOS is connected with the server, and the method comprises the following steps:
setting the starting mode of the server to be started through an operating system stored in a flash memory TF card of the server;
after the start mode setting is completed, controlling the server to start through an operating system stored in the TF card;
after the server is started, inquiring erasure configuration information in the BMC;
according to the erasing configuration information, erasing data stored in a hard disk of the server;
after the data stored in the hard disk is erased, restoring factory settings of the BIOS;
and after the BIOS is restored to the factory default value, restoring the configuration information of the BMC to the factory default value.
2. The method according to claim 1, wherein when the data is secret data, the erasing the data stored in the hard disk of the server comprises:
performing basic erasing on data stored in a hard disk of the server, wherein the basic erasing is to overwrite the data stored in the hard disk by adopting preset information so as to complete erasing; the preset information is random data information.
3. The method according to claim 1, wherein when the data is confidential data, the erasing the data stored in the hard disk of the server comprises:
and deeply erasing the data stored in the hard disk of the server by adopting a preset erasing algorithm, wherein the preset erasing algorithm comprises any one of a Sanitize erasing algorithm, a Secure-Erase erasing algorithm and a CryptoErase key erasing algorithm.
4. The method of claim 1, further comprising:
receiving a data erasing progress sent by the server;
and displaying the data erasing progress to a user.
5. The method of claim 4, further comprising:
judging whether the data erasing progress reaches a preset progress value or not;
and when the data erasing progress reaches the preset progress value, determining that the data erasing stored in the hard disk of the server is finished.
6. The method of claim 1, wherein the restoring factory settings of the BIOS comprises:
and sending a factory resetting instruction to the BIOS, wherein the factory resetting instruction is used for indicating the BIOS to reset the configuration information to a factory default value.
7. The method of claim 1, wherein the data comprises: at least one of service data, user information, software operation data, software installation packages and system configuration files.
8. A data erasing device is applied to a Baseboard Management Controller (BMC), wherein the BMC is respectively connected with a basic input/output system (BIOS) and a server, the BIOS is connected with the server, and the device comprises:
the setting module is used for setting the starting mode of the server to be started through an operating system stored in a flash memory TF card of the server;
the control module is used for controlling the server to start through an operating system stored in the TF card after the start mode is set;
the query module is used for querying the erasing configuration information in the BMC after the server is started;
the erasing module is used for erasing the data stored in the hard disk of the server according to the erasing configuration information;
the BIOS recovery module is used for recovering factory settings of the BIOS after the data stored in the hard disk is erased;
and the BMC recovery module is used for recovering the configuration information of the BMC to a factory default value after the BIOS is completely recovered to the factory default value.
9. An electronic device, comprising: processor, memory and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the data erasure method according to any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the data erasure method according to any one of claims 1-7.
CN202211676882.4A 2022-12-26 2022-12-26 Data erasing method, device, equipment and storage medium Pending CN115857825A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211676882.4A CN115857825A (en) 2022-12-26 2022-12-26 Data erasing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211676882.4A CN115857825A (en) 2022-12-26 2022-12-26 Data erasing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115857825A true CN115857825A (en) 2023-03-28

Family

ID=85654890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211676882.4A Pending CN115857825A (en) 2022-12-26 2022-12-26 Data erasing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115857825A (en)

Similar Documents

Publication Publication Date Title
JP5567114B2 (en) Mitigation of potentially endangered electronic devices
CN105453102B (en) The system and method for the private cipher key leaked for identification
CN101952809B (en) Computer storage device having separate read-only space and read-write space, removable media component, system management interface, and network interface
CN1795439B (en) Security system and method for computer operating systems
US10339304B2 (en) Systems and methods for generating tripwire files
JP2009506431A (en) Change product behavior according to license
JP2019516160A (en) System and method for detecting security threats
US20050216466A1 (en) Method and system for acquiring resource usage log and computer product
US9384353B2 (en) System and method for encryption of disk based on pre-boot compatibility testing
CN110070360B (en) Transaction request processing method, device, equipment and storage medium
CN108304222A (en) Apparatus management/control system and method
CN109445909A (en) Backup method, system, terminal and the storage medium of virtual-machine data
CN104915266A (en) Application program protection method and application program protection device
CN110472215B (en) Bid file generation method, device, equipment and medium
US8365296B2 (en) Information processing apparatus, information processing method and computer readable medium having a program
US20070168582A1 (en) Method for protecting an i/o port of a computer
CN115857825A (en) Data erasing method, device, equipment and storage medium
JP4807289B2 (en) Information processing apparatus, file processing method, and program
Buda et al. File System Minifilter Based Data Leakage Prevention System
WO2021144978A1 (en) Attack estimation device, attack estimation method, and attack estimation program
CN114254346A (en) Data storage processing method, system, equipment and medium
CN113051533A (en) Safety management method of terminal equipment
US20050033721A1 (en) Location switch hard drive shim
CN111639353A (en) Data management method and device, embedded equipment and storage medium
JP2017045106A (en) Information processing device and information processing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination