-
1.
公开(公告)号:US20240362187A1
公开(公告)日:2024-10-31
申请号:US18631660
申请日:2024-04-10
Inventor: Peng XU , Shuning XU , Wei WANG , Runze XU , Tingting RAO , Hai JIN
CPC classification number: G06F16/162 , G06F21/60 , G06F2221/2143
Abstract: A method and system for overwriting-based deletion of information and verification of deletion is provided, wherein the method at least includes: receiving a deletion request and/or a random seed; performing fine-grained overwriting on the information by means of random overwriting; in response to an extraction request for a post-deletion state, making a master node in a source domain of the information broadcast the extraction request to at least one slave node; and sending the post-deletion state fed back by the slave node and a related state-verification parameter to a verifying terminal, so that the verifying terminal verifies an overwriting result based on a verifiable pseudo-random function. Thus, the present application can effectively prevent information recovery after being logically deleted, and efficaciously ensure verifiability as well as non-recoverability of deleted information, thereby assuring non-recoverable deletion and providing verifiability of deletion to information subjects.
-
2.
公开(公告)号:US20240362251A1
公开(公告)日:2024-10-31
申请号:US18631790
申请日:2024-04-10
Inventor: Peng XU , Yinjia PI , Wei WANG , Shuning XU , Yubo ZHENG , Hai JIN
IPC: G06F16/27
CPC classification number: G06F16/27
Abstract: A method and system for automatic deletion of information based on time synchronization and trusted counting is provided, the method including: defining different data structures including configurations in a normalized manner; setting triggering conditions for automatic information deletion, including conditions for automatic deletion based on time synchronization and/or based on trusted counting; maintaining synchrony of the configurations across different domains; and after satisfying the triggering conditions, making an information source domain and/or an information propagation domain perform the automatic information deletion. Considering that existing data deletion mechanisms cannot delete information according to preset retention periods, the present application employs synchrony across system clocks to perform automatic deletion of authorization information under circulation after a certain time period, and further limits a circulation count for information of interest so as to ensure that the information and its copies are all deleted after reaching a preset maximum permittable circulation count.
-