Sign In to Follow Application
View All Documents & Correspondence

Data Eraser.

Abstract: The present invention relates to an erasing method, an erasing device and an erasing system. The process involves and encompasses, receiving an erase request carrying the identification information of data with a network storage device; determining a first data related to the identification information of data; and erasing the first data. The same gets further followed with subsequent commands as per user demands. Thus, the present invention makes use of a user-initiated manner for erasing data objects in the network storage device, and information related to data objects. The process also helps in obtaining any type of erasing result information after erasing, so that the user can know whether the network storage device actually removes data objects and the related information to further enhance the security of the user data objects in the network storage device. The method not only facilitates data erasing but also in ensuring maintenance of security for the user. The invention thus highlights the epitome of security and data deletion in the communication sector that dissects the very issues of data erasing from a device and or system. The invention thus provides for a kind of data erase method, either from a device and or system, and can guarantee that the data stored on network storage device is real and minimises the problem of deleting of its relevant information which itself is cumbersome.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 January 2023
Publication Number
30/2024
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
Parent Application

Applicants

MORINGA TECHSOLV PRIVATE LIMITED
FLAT NO. 5/6, 3RD FLOOR, HOSHBANOO MANSION, OLD ICE FACTORY, GOKHALE ROAD, NAUPADA, THANE - 400601, MAHARASHTRA, INDIA.

Inventors

1. SANJEEV DAHIWADKAR
FLAT NO. 5/6, 3RD FLOOR, HOSHBANOO MANSION, OLD ICE FACTORY, GOKHALE ROAD, NAUPADA, THANE - 400601, MAHARASHTRA, INDIA.

Specification

FORM 2
THE PATENT ACT 1970
(39 of 1970)
&
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10 and rule13)
1. TITLE OF THE INVENTION
DATA ERASER
2. APPLICANT (S)
(a) NAME: Moringa Techsolv Private Limited
(b) NATIONALITY:Flat No.5/6, 3rd Floo,HoshbanooMansion Near Old Ice Factory Naupada
(c) ADDRESS: Thane 400602 email: santosh.kamane@cvberfit.tech T: 9637267360

3. PREAMBLE TO THE DESCRIPTION
PROVISIONAL
The following specifitcation describes the Invention. COMPLETE
The following specification particularly describes the invention and the manner in which it is to be performed.
The present invention relates to ensure adequate data erasing
4. DESCRIPTION {Description shall start from next page.)
5. CLAIMS (not applicable for provisional specification. Claims should start with the preamble — "l/we claim" on separate page)
6. DATE AND SIGNATURE (to be given at the end of last page of specification)
7. ABSTRACT OF THE INVENTION (to be given along with complete specification on separate page)
* Note: •
* Repeat boxes In case of more than one entry.
*To be signed by the applfcant(s) or by authorized registered patent agent
*Name of the applicant should be given in full, family name in the beginning.
* Complete address of the applicant should be given stating the postal index no./code, state and
*country. 'Strive out the column which is/are not applicable

II. FIELD OF INVENTION
As highlighted above, the very purpose of the present invention is help in deletion of data from not only a network storage system but also from a device.
History as it stands today:
At present, in the network storage, or, in the cloud storage, provides the delete method to the data object. This delete method is such that: when the user no longer needs to retain certain data object, can initiate to delete by application programming interfaces the operation of data object to network store system, network store system only returns to the success of deletion action result or failure, but does not return to other information about deletion action
In network store system, after network store system receives Client-initiated deletion data object request, network store system is not deleted the content of data object, the data of recovering the data object content and the data of description of data object content immediately, just this data object is added to deleted marker, now the content of data object remains original content, not deleted, not capped yet. When the user initiates to access the accessing operation of this data object, the non-existent information of network store system return data object.
But, after the user receives the information of " data object does not exist ", think that the content of data object is deleted, but now the content of user's data object still is present in network store system, still there is the risk illegally read, for user's privacy

and security information, still there are user's privacy and the risk that security information is revealed.
Thus, the user can only carry out deletion action to the data object, but whether network store system really delete data object and relevant information, and the user can not be known. Whether network store system really deleted the data object of user's storage or its relevant information, do not accomplish in the prior art.
The invention thus enables the user in such a manner that one can only carry out deletion action to the data object, but whether network store system really delete data object and relevant information, and the user can not be known. Whether network store system really deleted the data object of user's storage or its relevant information, do not accomplish in the prior art. These short comings in prior art are overturned by the present invention that deals the user to understand that data deletion once carried out is real, the data object and relevant information to the said data also stands deleted.
The features thus described in the present invention are such that they relate to a method of deleting information from a storage device and or network or from a memory having dynamic memory allocation and makes the use of tools and like for achieving the said object that forms the crux of the present invention.

III. SUMMARY OF INVENTION.
The present invention pertains to an erasing method, an erasing device and an erasing system. The method comprises receiving an erase request carrying the identification information of data with a network storage device; determining a first data related to the identification information of data; and erasing the first data.
In its primary aspect, the invention provides a kind of data erase method, the described method comprises: a. network storage device receives the request of wiping, and b. the described request of wiping carries the identification information of data; c. Determine the first relevant data of identification information of described data; d. Wipe described the first data.
In such an aspect, the mode of wiping the first data comprises one or more of following steps: a. the content of destroying described the first data; b. Delete the content of described the first data; c. Cover the content of described the first data.
In a further aspect, the invention provides a kind of data erase method, the described method comprises: i. receiving the request of wiping that described user sends, ii. the described request of wiping carries the identification information of data; iii. Send write data requests to network storage device, the identification information of described data is carried in the write data request, so that described network storage device is determined the first relevant data of identification information of described data rewrites described the first data.

In an aspect of the first embodiment described above, the first data comprise: i. the relevant information of the data object of the data object of user's storage and/or user's storage, wherein, the relevant information of the data object of described user's storage comprises one or several in following information: ii. the copy, snapshot, mirror image or the version information that are stored in the data object of described network storage device for recovering the user; iii. Be stored in the information of content of the data object of described network storage device for describing the user; iv. Perhaps the user is stored in the privacy information of the data object in described network storage device.
In yet another aspect, the invention provides a kind of network storage device, described device comprises: the first receiving element, wipe request for reception, the described request of wiping carries the identification information of data, and the identification information of described data is transferred to the first determining unit; The first determining unit, for receive the identification information of data from described the first receiving element, determine the first relevant data of identification information of described data, and give described erase unit by described first data transmission; Erase unit, for from described the first determining unit, receiving described the first data, wipe described the first data.
In data erase method provided by the invention, device and system, the request of wiping that network storage device sends by receiving user terminal or user agent, this request of wiping carries the identification information of data; Determine first data relevant to the identification information of data according to the identification information of these data; Wipe the first data

realized by Client-initiated, the relevant information of wiping data object in network storage device or data object of perhaps initiating by the agency, thereby make the user can know whether network storage device is really deleted data object and relevant information, further strengthened the security of user's data object in the network storage device.
Thus the present invention is a data erase method and is characterized by the steps that include and comprise of a a network storage device that receives the request of wiping, and the described request of wiping carries the identification information of data.
Determining the first relevant data of identification information of described data followed by Wipe described the first data.
Importantly the data erase method as mentioned immediately herein above is characterized by a. destroy the content of described data; b. delete the content of described data; cover the content of described data. Importantly the term of "content" include all issues of covered data that may have a particular value or may be random as per the individual user's usability.
Also and importantly the present invention makes the use of a network storage device such that this device comprises of ; The first receiving element, wipe request for reception, and the described request of wiping carries the identification information of data, and the identification information of described data is transferred to the first determining unit; and the first determining unit, for receive the identification information of data from described the first receiving element, determine the first relevant

data of identification information of described data, and give described erase unit by described first data transmission; Erase unit, for from described the first determining unit, receiving described the first data, wipe described the first data.
In addition to the above, the network storage device is characterized by and comprises of Network interface; Processor; Storer. The application program of physical store in described storer, described application program comprises and can be used for making described processor and described device to carry out the instruction of following process: Request is wiped in reception, and the described request of wiping carries the identification information of data; Determine the first relevant data of identification information of described data; Wipe described the first data.
Description of the drawings.
The aforementioned and other features and objects of the present invention and the manner of attaining them will become more apparent and the invention itself will be best understood by reference to the following description of a preferred embodiment taken in conjunction with the accompanying drawings, wherein:
FIG. 1 is a flow chart for the file deletion processing method of the present invention.
Figure 1 is flow chart of the components associated with the Data Erase process. Organizations herein can install the data eraser or the same can be managed centrally. The organization server can connect with a web console in order to send or receive instructions using logs using any APIs. As indicated in the diagram,the data

eraser tool is a web application with any additional API's to support collection of logs apart from the enforcement of any policies including distant erasing, certificates if required.
The eraser (wipe out) server that self-hosts APIs can provide for centralized management and oversight of the erasing process. Importantly an added feature herein being that communication to a server is also possible from APIs in order have the necessary actions executed. The Wipeout web console is an application with any additional APIs to support collecting of logs, enforcement of any polices and generation of any reports from the internet. The APIs are used in communication calls and interface programming and helping distant function creation and action. The SQL database serves as a utility for record storage and management.
A mechanism to mitigate this potential risk is desired; the storage resources associated with such confidential files should be overwritten before those resources are returned to the free storage pool for reuse.
In any existing implementation, such an erasure state value is optimally associated with a file in the hidden background deletion directory, for the following reasons: the file is securely removed from access by user application programs, and thus may be overwritten with impunity; the act of moving the file from the user accessible directory space to this special directory (along with appropriate permissions checks e.g. that the file actually has passed its required retention time) can be used as a secure gate on re-enabling of the overwrite and modify capabilities that were removed from the file; and the system model already supports the

concepts and provides the mechanisms for independent processes walking through the set of files, performing actions upon them.
Thus, the scheduled deletion of confidential data stored in a compliant archive is performed in a secure manner.
While there have been described above the principles of the present invention in conjunction with specific components, circuitry and bias techniques, it is to be clearly understood that the foregoing description is made only by way of example and not as a limitation to the scope of the invention. Particularly, it is recognized that the teachings of the foregoing disclosure will suggest other modifications to those persons skilled in the relevant art. Such modifications may involve other features which are already known per se and which may be used instead of or in addition to features already described herein. Although claims have been formulated in this application to particular combinations of features, it should be understood that the scope of the disclosure herein also includes any novel feature or any novel combination of features disclosed either explicitly or implicitly or any generalization or modification thereof which would be apparent to persons skilled in the relevant art, whether or not such relates to the same invention as presently claimed in any claim and whether or not it mitigates any or all of the same technical problems as confronted by the present invention. The applicants hereby reserve the right to formulate new claims to such features and/or combinations of such features during the prosecution of the present application or of any further application derived therefrom.

IV. CLAIMS
We Claim:
1. A data deletion method comprising of initiating a command to delete a file; finding storage resources associated with the file; overwriting the storage resources associated with the file with a given data value; returning a first completion indication to an application; overwriting the storage resources associated with the file; overwriting the storage resources associated with the file; returning the storage resources associated with the file to a free pool of storage resources; removing a file entry associated with the file from a file directory; and returning a completion indication to the application.
2. The method as claimed in claim 1, wherein a completion of deletion of data involves reporting to the application that data is deleted and that the data in the file cannot be recovered using established methods.
3; The method as claimed in Claim 1 involving initiation of an action that runs in parallel with the completion index.
4. The method as in claim 1, wherein indications are also provided to the application that a file is deleted and the data in the file is not recoverable.
5. The method as in claim 1, further involving re- writing the storage repository with any given or random data blue print.

6. The method as in claim 1 further comprising of re-writing the storage repository in a manner dependent upon the physical uniqueness of the storage repository.
7. The method as in claim 1 further involving an indication that re-writing has been completed.
8. The method as in claim 1, wherein at least one aspect of the re¬writing task involves initiating the storage repository to perform a physical deletion of the data.
9. A data deletion method involving providing data that a file has been deleted, and cannot be recovered by the usage of standard practice and procedures.

Documents

Application Documents

# Name Date
1 202321004597-FORM 2-24-01-2023.pdf 2023-01-24
2 202321004597-FORM 1-24-01-2023.pdf 2023-01-24