Data erasure of network devices
11625186 · 2023-04-11
Assignee
Inventors
- Mitesh Shah (Maharashtra, IN)
- Markku Valtonen (Joensuu, FI)
- Dhia Ben Haddej (Joensuu, FI)
- Chandrashekhar Kakade (Maharashtra, IN)
- Akash Nehere (Maharashtra, IN)
- Prasad Bidkar (Maharashtra, IN)
- Pratibha Pathekar (Maharashtra, IN)
Cpc classification
H04L41/28
ELECTRICITY
G06F3/0659
PHYSICS
G06F3/0604
PHYSICS
H04L41/0813
ELECTRICITY
G06F3/0652
PHYSICS
G06F3/067
PHYSICS
International classification
Abstract
A method for erasing stored data from the memory of the network device and requesting data from the memory after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure. The method further comprises determining the outcome of the data erasure procedure based on: the results of a comparison between a response received from the network device in reply to the request for data and an expected response which is indicative of a successful erasure of the memory of the network device; or the results of a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory of the network device after completion of the data erasure procedure which are indicative of a successful erasure of the memory of the network device.
Claims
1. A method for use in erasing data stored in the memory of a network device, the method comprising: performing a data erasure procedure to erase stored data from the memory of the network device; requesting data from the memory of the network device after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure; determining the outcome of the data erasure procedure based at least in part on: the results of a comparison between a response received from the network device in reply to the request for data and an expected response which is indicative of a successful erasure of the memory of the network device; or the results of a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory of the network device after completion of the data erasure procedure which are indicative of a successful erasure of the memory of the network device; wherein the network device has an Ethernet port for communication with a Wide Area Network (WAN) and the method comprises establishing a connection with the network device via the Ethernet port according to a WAN Management Protocol, for example wherein the WAN Management Protocol comprises a TR-069 CPE WAN Management Protocol; and further comprising sending a FactoryReset Remote Procedure Call (RPC) message to the network device to reset the network device to its factory default state and cause the memory of the network device to be erased and/or sending a ScheduleDownload or a Download message to the network device to cause the network device to download a firmware update from a designated location and to apply the firmware update in order to overwrite existing firmware of the network device.
2. A method as claimed in claim 1, comprising recording or storing at least one of the received response, any contents of the memory of the network device, and the determined outcome of the data erasure procedure, for example in the Cloud.
3. A method as claimed in claim 1, wherein the expected response comprises a default response or wherein the expected contents of the memory of the network device comprise default contents.
4. A method as claimed in claim 1, comprising: requesting IP address data and/or MAC address data from the memory of the network device after completion of the data erasure procedure or accessing a pre-defined portion of the memory of the network device used to store IP address data and/or MAC address data after completion of the data erasure procedure; and determining a successful outcome based at least in part on: verifying that the received response from the network device does not include any IP address data and/or any MAC address data after completion of the data erasure procedure; or verifying that the pre-defined portion of the memory of the network device used to store IP address data and/or MAC address data does not include any IP address data and/or any MAC address data after completion of the data erasure procedure.
5. A method as claimed in claim 1, comprising: requesting running configuration data from the memory of the network device after completion of the data erasure procedure or accessing a pre-defined portion of the memory of the network device used to store running configuration data after completion of the data erasure procedure; and determining a successful outcome based at least in part on: verifying that the received response from the network device corresponds to an expected running configuration which is indicative of a successful erasure of the memory of the network device; or verifying that the pre-defined portion of the memory of the network device used to store running configuration data includes running configuration data that corresponds to an expected running configuration which is indicative of a successful erasure of the memory of the network device.
6. A method as claimed in claim 1, comprising: requesting a name and a password of a local area network (LAN) from the memory of the network device after completion of the data erasure procedure or accessing a pre-defined portion of the memory of the network device that is used to store a name and a password of a local area network (LAN) after completion of the data erasure procedure; and determining a successful outcome based at least in part on: verifying that the received username and password of the network device correspond to an expected username and an expected password of the network device respectively; or verifying that a name and a password of the local area network (LAN) stored in the pre-defined portion of the memory of the network device that is used to store a name and a password of the local area network (LAN) after completion of the data erasure procedure correspond to an expected name and an expected password of the local area network (LAN) respectively.
7. A method as claimed in claim 1, comprising: requesting network device information from the network device or accessing network device information stored in the memory of the network device; selecting the data erasure procedure from a database of data erasure procedures based at least in part on network device information received from the network device in reply to the request for network device information or selecting the data erasure procedure from a database of data erasure procedures based at least in part on the accessed network device information; and selecting the expected response which is indicative of a successful erasure of the memory of the network device from a database of expected responses based at least in part on the received network device information or selecting the expected contents of the memory of the network device which are indicative of a successful erasure of the memory of the network device from a database of expected contents based at least in part on the accessed network device information.
8. A method as claimed in claim 7, wherein the network device information comprises at least one of a make, a model number of the network device, or details of an operating system of the network device such as a type and/or version of the operating system of the network device, and/or wherein at least one of the database of data erasure procedures, the database of expected responses, or the database of expected contents comprises a profiler API.
9. A method as claimed in claim 1, comprising: requesting initial data from the memory of the network device before commencing the data erasure procedure or accessing the memory of the network device before commencing the data erasure procedure; and determining the outcome of the data erasure procedure based at least in part on: the results of a comparison between an initial response received from the network device in reply to the request for initial data and the received response from the network device after completion of the data erasure procedure; or the results of a comparison between any initial contents of the memory of the network device before commencing the data erasure procedure and any contents of the memory of the network device after completion of the data erasure procedure and, optionally, the method further comprising determining that the outcome of the data erasure procedure is successful based at least in part on verifying that a routing table of the network device has been cleared of any IP addresses and/or cleared of any MAC addresses.
10. A method as claimed in claim 1, wherein the stored data comprises at least one of: one or more IP addresses; one or more MAC addresses; one or more usernames; one or more passwords; a local area network (LAN) name; a local area network (LAN) password; IP config data; boot setting data.
11. A method as claimed in claim 1, wherein the stored data is stored in one or more data files and/or one or more configuration files in a file system in the memory of the network device.
12. A method as claimed in claim 1, wherein the data erasure procedure is configured to erase all accessible data stored in the memory of the network device.
13. A method as claimed in claim 1, wherein performing the data erasure procedure comprises at least one of: clearing data stored in the memory of the network device; replacing data stored in the memory of the network device; changing a key used to encrypt data stored in the memory of the network device; executing an internal, built-in, default, factory and/or proprietary data erasure procedure associated with, or stored in, the network device, for example executing a reset procedure or an erase function associated with, or stored in, the network device; clearing the data stored in the memory of the network device manually; clearing the data stored in the memory of the network device using a computing resource and/or a user interface; and updating and/or replacing software and/or firmware of the network device.
14. A method as claimed in claim 1, wherein the data erasure procedure comprises a clear level sanitization as defined according to NIST SP 800-88 (Revision 1) or a purge level sanitization as defined according to NIST SP 800-88 (Revision 1).
15. A method as claimed in claim 1, wherein the network device comprises a device which has a memory and which is configured to interconnect, or which enables the interconnection of, two or more computing resources, for example wherein the network device comprises at least one of a router, a switch, a modem, a gateway, a firewall, a media converter, and a repeater.
16. A method as claimed in claim 1, wherein the network device comprises a router having a serial port and the method comprises logging in to the router by sending a username and password to the router via the serial port and, optionally, the method further comprising sending a trigger command to the router via the serial port to cause the router to initiate an internal, built-in, default, factory and/or proprietary data erasure procedure associated with, or stored in, the router, for example to cause the router to initiate a reset procedure or an erase function associated with, or stored in, the router and, optionally, the method further comprising: providing the router with an image file; and sending a trigger command to the router via the serial port to cause the router to use the image file to overwrite existing firmware of the router.
17. A method as claimed in claim 16, comprising: logging in to the router via the serial port after completion of the data erasure procedure; requesting the data from the memory of the router via the serial port; and receiving the response from the router via the serial port in reply to the request for data, wherein logging in to the router via the serial port after completion of the data erasure procedure comprises: using a default username and password to log in to the router; or re-setting the username and password.
18. A method for use in erasing data stored in the memory of a network device comprising: erasing all accessible data stored in the memory of the network device; requesting data from the memory of the network device after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure; and determining the outcome of the data erasure procedure based at least in part on: the results of a comparison between a response received from the network device in reply to the request for data and an expected response which is indicative of a successful erasure of the memory of the network device; or the results of a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory of the network device after completion of the data erasure procedure which are indicative of a successful erasure of the memory of the network device; wherein the network device has an Ethernet port for communication with a Wide Area Network (WAN) and the method comprises establishing a connection with the network device via the Ethernet port according to a WAN Management Protocol, for example wherein the WAN Management Protocol comprises a TR-069 CPE WAN Management Protocol; and further comprising sending a FactoryReset Remote Procedure Call (RPC) message to the network device to reset the network device to its factory default state and cause the memory of the network device to be erased and/or sending a ScheduleDownload or a Download message to the network device to cause the network device to download a firmware update from a designated location and to apply the firmware update in order to overwrite existing firmware of the network device.
19. A method as claimed in claim 18, comprising: requesting IP address data and/or MAC address data from the memory of the network device after completion of the data erasure procedure or accessing a pre-defined portion of the memory of the network device used to store IP address data and/or MAC address data after completion of the data erasure procedure; and determining a successful outcome based at least in part on: verifying that the received response from the network device does not include any IP address data and/or any MAC address data after completion of the data erasure procedure; or verifying that the pre-defined portion of the memory of the network device used to store IP address data and/or MAC address data does not include any IP address data and/or any MAC address data after completion of the data erasure procedure.
20. A method as claimed in claim 18, comprising: requesting initial data from the memory of the network device before commencing the data erasure procedure or accessing the memory of the network device before commencing the data erasure procedure; determining the outcome of the data erasure procedure based at least in part on: the results of a comparison between an initial response received from the network device in reply to the request for initial data and the received response from the network device after completion of the data erasure procedure; or the results of a comparison between any initial contents of the memory of the network device before commencing the data erasure procedure and any contents of the memory of the network device after completion of the data erasure procedure; and the method further comprising determining that the outcome of the data erasure procedure is successful based at least in part on verifying that a routing table of the network device has been cleared of any IP addresses and/or cleared of any MAC addresses.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Systems and methods for use in erasing data stored in a memory of a network device will now be described by way of non-limiting example only with reference to the accompanying drawings of which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
DETAILED DESCRIPTION OF THE DRAWINGS
(16) Referring initially to
(17) The remote database 14 stores a look-up table which includes router information such as a make and model number of the router 2 and/or details of an operating system of the router 2 such as a type and/or version number of the operating system of the router 2. Also stored in the look-up table in association with the router information, is one or more suitable data erasure procedures and one or more expected or default router responses which are indicative of a successful erasure of the memory of the router 2.
(18) As will be described in more detail below, when executed by the processing resource 20, the computer program 18 causes the host computer 12 to perform a generic method for use in erasing data stored in a memory of the router 2 which begins with the host computer 12 requesting router information from the router 2. In reply to the request for router information, the host computer 12 receives the router information from the router 2. The host computer 12 then selects a suitable data erasure procedure for erasing data stored in the memory of the router 2 from the look-up table stored in the remote database 14 based at least in part on the received router information. In addition, the host computer 12 uses the received router information to select an expected or default response which is indicative of a successful erasure of the memory of the router 2 from the look-up table stored in the remote database 14 based at least in part on the received router information.
(19) The host computer 12 then triggers, initiates or performs the selected data erasure procedure to erase the stored data from the memory of the router 2. After completion of the data erasure procedure, the host computer 12 requests data from the memory of the router 2 and receives a response from the router 2 in reply to the request for data. The host computer 12 determines the outcome of the data erasure procedure based at least in part on the results of a comparison between the received response from the router 2 and the expected or default response which is indicative of a successful erasure of the memory of the router 2. The host computer 12 then records or stores the determined outcome of the data erasure procedure, for example in the host computer 12 and/or in the Cloud 30. Additionally or alternatively, the host computer 12 records or stores the received response in the host computer 12 and/or in the Cloud 30. Storing the determined outcome of the data erasure procedure and/or the received response may provide an audit trail, for example to allow a third party to verify successful erasure of the router 2 on demand at a later date.
(20) Referring now to
(21) The method 150 begins at step 152 with the connection of one or more routers 102 to the Windows host using one or more serial cables.
(22) At step 154, a user logs into the router 102 via the Windows host to establish a connection between the router 102 and the Windows host via the serial port.
(23) At step 156, the processing resource 20 executes the software 18 causing the Windows host to fetch router information from the router 102 including a make and model number, operating system type, operating system version, and serial number of the router 102.
(24) At step 158, the Windows host uses the fetched router information to fetch a suitable erasure procedure from the profiler API. At the same time, the Windows host uses the fetched router information to fetch an expected or default response which is indicative of a successful erasure of the memory of the router 102 from the profiler API.
(25) At step 160, the Windows host initiates or executes the fetched erasure procedure to erase data from the memory of the router 102. For example, the Windows host may send a trigger command to the router 102 via the serial port to cause the router 102 to initiate an internal, built-in, default, factory and/or proprietary data erasure procedure associated with, or stored in, the router 102, for example to cause the router 102 to initiate a reset procedure or an erase function associated with, or stored in, the router 102 so as to erase data such as data files and configuration files from a file system of the router 102.
(26) At step 162, the router 102 is re-booted and the user logs back in to the router 102 by using a default username and password of the router 102 or, if required, by re-setting the username and/or password of the router 102.
(27) At step 164, the Windows host performs a verification procedure to check whether the erasure procedure was executed successfully at step 160. Specifically, the Windows host requests data from the memory of the router 102 after completion of the data erasure procedure. The Windows host receives a response from the router 102 in reply to the request for data and then determines the outcome of the data erasure procedure based at least in part on the results of a comparison between the received response from the router 102 and the fetched expected or default response which is indicative of a successful erasure of the memory of the router 102.
(28) For example, as will be described below with reference to
(29) Additionally or alternatively at step 164, as will be described below with reference to
in response to the “Show startup-config” command, thereby indicating successful erasure of data from the memory of the router 102 at step 160. However, in the event of an unsuccessful erasure of data from the memory of the router 102 at step 160, the router 102 may return start-up configuration data of the router 102 to the Windows host like that shown in the example of
(30) Additionally or alternatively at step 164, the Windows host verifies the erasure result by checking for the presence of any files in the memory of the router 102. In the case of Cisco routers, this may be done using a “dir nvram” command. Specifically, the Windows host sends a “dir nvram” command to the router 102 via the serial port to request a list of files stored in the memory of the router 102 via the serial port. In the event of a successful erasure of data from the memory of the router 102 at step 160, the router 102 may return file information to the Windows host like that shown in the example of
(31) The method 150 for use in erasing data stored in a memory of the router 102 ends at step 166 with the Windows host storing a verification report and/or uploading a verification report to the Cloud to provide an audit trail, for example to allow a third party to verify successful erasure of the router 102 on demand at a later date. The verification report may include the outcome of the verification step 164. The verification report may include one or more of the responses returned from the router 102 to the Windows host in reply to one or more of the “Show ip arp”, “Show startup-config”, and the “dir nvram” commands.
(32) In a variant of the method 150 described above with reference to
(33) From the foregoing description of steps 160 and 164 of the method 150, one of ordinary skill in the art will understand that successful execution of the erasure procedure results in erasure of all of the accessible data from the router 102 including the erasure of all IP addresses stored in the memory of the router 102 of any network devices that have been connected to the router 102, the erasure of all user-defined start-up configuration data stored in the memory of the router 102, and the erasure of all user-defined file information stored in the memory of the router 102.
(34) Referring now to
(35) Once the host computer 12 and the router 202 have established a connection, the host computer 12 executes the computer program 18 causing the host computer 12 to perform a method for use in erasing data stored in a memory of the router 202 which begins with the host computer 12 accessing router information stored in the memory of the router 202. The host computer 12 then selects a suitable data erasure procedure from the look-up table stored in the remote database 14 based at least in part on the accessed router information. In addition, the host computer 12 uses the accessed router information to select expected or default contents of the memory of the router 202 which are indicative of a successful erasure of the memory of the router 202 from the look-up table stored in the remote database 14 based at least in part on the accessed router information.
(36) In one example, the host computer 12 selects a FactoryReset Remote Procedure Call (RPC) data erasure procedure and the ACS service sends a FactoryReset Remote Procedure Call (RPC) message to the router 202 triggering the router 202 to execute a factory reset procedure to thereby reset the router 202 to its factory default state and erase data stored in the memory of the router 202.
(37) After execution of the factory reset procedure, the host computer 12 logs in to the router 202 using a default username and password, for example “admin” and “1234”.
(38) Following a successful login, or reconnection between the host computer 12 and the router 202 via ACS, the host computer 12 then performs a verification procedure to check whether the erasure procedure was executed successfully. Specifically, the host computer 12 accesses the memory of the router 202 after completion of the data erasure procedure. The host computer 12 determines the outcome of the data erasure procedure based at least in part on the results of a comparison between any contents of the memory of the router 202 and the expected contents which are indicative of a successful erasure of the memory of the router 202. For example, the host computer 12 determines whether the data erasure procedure is successful based at least in part on whether the memory of the router 202 includes any IP addresses and/or any MAC addresses. In the event that the memory of the router 202 does not include any IP addresses and/or any MAC addresses, the host computer 12 determines that the data erasure procedure was performed successfully, otherwise the host computer 12 determines that the data erasure procedure was performed unsuccessfully.
(39) Additionally or alternatively, the host computer 12 may access local area network (LAN) name and password data from the router 202 after completion of the data erasure procedure. The host computer 12 then determines the outcome of the data erasure procedure based at least in part on the results of a comparison between the accessed local area network (LAN) name and password and the expected local area network (LAN) name and password which are indicative of a successful erasure of the memory of the router 202. In the event that the accessed local area network (LAN) name and password correspond to the expected or default local area network (LAN) name and password, the host computer 12 determines that the data erasure procedure was performed successfully, otherwise the host computer 12 determines that the data erasure procedure was performed unsuccessfully. For example,
(40) Similarly,
(41) The method for use in erasing data stored in a memory of the router 202 ends with the host computer 12 storing a verification report and/or uploading a verification report to the Cloud 30 to provide an audit trail, for example to allow a third party to verify successful erasure of the router 202 on demand at a later date. The verification report may include the outcome of the verification step. The verification report may include the a listing of any IP addresses and MAC addresses stored in the router 202. The verification report may include the accessed local area network (LAN) name and password.
(42) In a variant of the method for use in erasing data stored in a memory of the router 202 described above, the host computer 12 may trigger, initiate or perform a firmware update for the router 202. For example, the ACS service may send a “ScheduleDownload” or a Download” message in order to cause the router 202 to download a firmware update from a designated location and apply the firmware update in order to overwrite existing firmware of the router 202. It should be understood that “ScheduleDownload” and “Download” messages are baseline messages which need to be implemented according to the TR-069 CPE WAN Management Protocol.
(43) From the foregoing description of the method for use in erasing data stored in a memory of the router 202 with reference to
(44) One of ordinary skill in the art will understand that various modifications are possible to the methods for use in erasing data stored in a memory of a router described above with reference to
(45) Any of the methods describe above may comprise:
(46) requesting initial data from the memory of a network device before commencing the data erasure procedure;
(47) receiving an initial response from the network device in reply to the request for initial data; and
(48) determining the outcome of the data erasure procedure based at least in part on the results of a comparison between the received initial response from the network device and the received response from the network device.
(49) Any of the methods describe above may comprise:
(50) accessing the memory of the network device before commencing the data erasure procedure; and
(51) determining the outcome of the data erasure procedure based at least in part on the results of a comparison between any initial contents of the memory of the network device before commencing the data erasure procedure and any contents of the memory of the network device after completion of the data erasure procedure.
(52) The data stored in the memory of the network device may comprise one or more IP addresses.
(53) The data stored in the memory of the network device may comprise one or more MAC addresses.
(54) The data stored in the memory of the network device may comprise one or more usernames and/or one or more passwords.
(55) The data stored in the memory of the network device may comprise configuration data such as IP config data and/or boot setting data.
(56) The data stored in the memory of the network device may be stored in one or more data files and/or one or more configuration files in a file system in the memory of the network device.
(57) The data erasure procedure may be configured to erase all accessible data stored in the memory of the network device.
(58) Performing the data erasure procedure may comprise clearing data stored in the memory of the network device.
(59) Performing the data erasure procedure may comprise replacing data stored in the memory of the network device.
(60) Performing the data erasure procedure may comprise changing a key used to encrypt data stored in the memory of the network device.
(61) The data erasure procedure may comprise a clear level sanitization as defined according to NIST SP 800-88 (Revision 1).
(62) Performing the data erasure procedure may comprise executing an internal, built-in, default, factory and/or proprietary data erasure procedure associated with, or stored in, the network device, for example executing a reset procedure or an erase function associated with, or stored in, the network device.
(63) Performing the data erasure procedure may comprise clearing the data stored in the memory of the network device manually.
(64) Performing the data erasure procedure may comprise clearing the data stored in the memory of the network device using a computing resource and/or a user interface.
(65) The data erasure procedure may comprise a purge level sanitization as defined according to NIST SP 800-88 (Revision 1).
(66) Performing the data erasure procedure may comprise updating and/or replacing software and/or firmware of the network device.
(67) One of ordinary skill in the art will understand that one or more of the features of the systems or methods described above with reference to the drawings may produce effects or provide advantages when used in isolation from one or more of the other features of the systems or methods described above and that different combinations of the features are possible other than the specific combinations of the features of the systems or methods described above.