CN108880810B - Key destroying circuit structure - Google Patents

Key destroying circuit structure Download PDF

Info

Publication number
CN108880810B
CN108880810B CN201811043971.9A CN201811043971A CN108880810B CN 108880810 B CN108880810 B CN 108880810B CN 201811043971 A CN201811043971 A CN 201811043971A CN 108880810 B CN108880810 B CN 108880810B
Authority
CN
China
Prior art keywords
key
destroying
module
storage
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811043971.9A
Other languages
Chinese (zh)
Other versions
CN108880810A (en
Inventor
颜环宇
高渊
姜金良
刘杨
范迎迎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Yunyong Electronic Technology Co ltd
Original Assignee
Jiangsu Yunyong Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Yunyong Electronic Technology Co ltd filed Critical Jiangsu Yunyong Electronic Technology Co ltd
Priority to CN201811043971.9A priority Critical patent/CN108880810B/en
Publication of CN108880810A publication Critical patent/CN108880810A/en
Application granted granted Critical
Publication of CN108880810B publication Critical patent/CN108880810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention discloses a key destroying circuit structure, which comprises a PCB substrate, wherein the PCB substrate is arranged in a machine shell, a micro switch, a battery seat, a battery and a storage key module are carried on an upper plate of the PCB substrate, the battery is arranged on the battery seat and is used for providing a working power supply for the storage key module, and the storage key module is used for storing key information; the input end of the micro switch is connected with the cover and used for detecting the external cover opening action, once the cover is opened, the micro switch immediately triggers the micro switch to be disconnected, the micro switch automatically triggers the battery to stop providing a working power supply for the storage key module after being disconnected, and the key information is lost after the storage key module is powered off, so that a key is destroyed.

Description

Key destroying circuit structure
Technical Field
The invention belongs to the technical field of security passwords, and particularly relates to a key destroying circuit structure.
Background
Key management refers to security and privacy management implemented over the entire process of the key lifecycle used. In modern cryptography research, encryption and decryption algorithms are generally disclosed, and after the encryption algorithm is determined, the confidentiality degree of the cryptosystem is completely dependent on the confidentiality degree of the secret key. Therefore, key management is an important ring in data encryption and decryption technology, and plays an important role in the whole security system. If the keys are not reasonably protected and managed, the security system is vulnerable no matter how sophisticated and complex the algorithm is designed. The purpose of the key management is to ensure the security of the key, i.e. the authenticity and validity of the key, and thus the security of the data security system. Currently, general device private keys are stored in a nonvolatile memory, but no effective protection measures are available, and once the device private keys are illegally stolen, serious information security problems are caused.
Disclosure of Invention
The invention aims to overcome the technical problems, strengthen the safety management of private keys and provide a key destroying circuit structure.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the key destroying circuit structure comprises a PCB substrate, wherein the PCB substrate is arranged in a shell, a micro switch, a battery seat, a battery and a storage key module are carried on the upper plate of the PCB substrate, the battery is arranged on the battery seat and is used for providing a working power supply for the storage key module, and the storage key module is used for storing key information; the input end of the micro switch is connected with the cover and used for detecting the external cover opening action, once the cover is opened, the micro switch immediately triggers the micro switch to be disconnected, the micro switch automatically triggers the battery to stop providing a working power supply for the storage key module after being disconnected, and the key information is lost after the storage key module is powered off, so that a key is destroyed.
Further, the memory key module is a 23K256 memory chip.
Further, the battery is a 3.3V button battery.
Further, the number of the micro switches is 4, and the micro switches are sequentially connected with each other.
Further, the type of the micro switch is PB22E70.
Further, the key destroying device also comprises a self-locking key destroying switch, wherein the self-locking key destroying switch is arranged on the shell and is connected with the storage key module, when the self-locking key destroying switch is pressed, the working power supply of the key module is automatically disconnected, and after the storage key module is powered off, the key information is lost, so that the key is destroyed, and when the self-locking key destroying switch is pressed again, the working power supply of the key module is automatically connected, so that the key is kept or injected.
Further, the model of the self-locking key-type destroying switch is TS-22A.
Further, a large capacitor is arranged between the self-locking key-destroying switch and the storage key module circuit for storing charges.
The invention has the beneficial effects that:
1. according to the invention, the battery is used for providing a working power supply for the key storage module, whether the cover is opened or not is detected through the micro switch, so that the destruction of the key is realized, and the safety of the key is ensured.
2. The invention realizes active, quick and convenient destruction of the key through the self-locking key type destruction key switch, and ensures the safety of the key.
3. According to the invention, the charge is stored through the large capacitor, so that the technical problem of key destruction caused by misoperation is solved.
Drawings
Fig. 1: the invention relates to a circuit schematic diagram of a first embodiment of a key destroying circuit structure.
Fig. 2: the invention relates to a circuit schematic diagram of a second embodiment of a key destroying circuit structure.
Fig. 3: the invention relates to a circuit schematic diagram of a key destroying circuit structure embodiment III.
Detailed Description
The present invention will be described in detail with reference to the accompanying drawings and examples.
Embodiment one:
as shown in fig. 1, a key destroying circuit structure is mainly used on an information security device, and a case of the information security device is a 1U standard structure and is square in shape, so as to prevent a secret key stored in the case from being illegally stolen. The information security device comprises a PCB substrate, wherein the PCB substrate is arranged in a case of the information security device, and 4 micro switches (U34, U35, U33 and U87), a battery seat J8, a button battery and a memory key module U26 are arranged on the upper plate of the PCB substrate.
The button battery is of a model CR2032 and 3.3V voltage and is directly arranged on the battery seat J8 and used for providing working power supply for the storage key module U26. The method specifically comprises the following steps: the button battery is connected with a pin 3 of a micro switch U87 through a current limiting resistor R141 by a pin 1 of a battery seat J8, a pin 2 of the micro switch U87 is connected with a pin 3 of a micro switch U33, a pin 2 of the micro switch U33 is connected with a pin 3 of a micro switch U35, a pin 2 of the micro switch U35 is connected with a pin 3 of a micro switch U34, and a pin 2 of the micro switch U34 is connected with a pin 8 of a storage key module U26. Wherein, the resistance value of the current limiting resistor R141 is 100 ohm.
The storage key module U26 is a 23K256 storage chip and is used for storing key information. The input ends of the 4 micro switches (U34, U35, U33 and U87) are respectively connected with four sides of the cover of the information safety equipment, the 4 micro switches (U34, U35, U33 and U87) can detect the cover opening action of any side of the case, and as long as the cover of any side is opened, the micro switch corresponding to the connection of the micro switches can be automatically disconnected, the micro switch is automatically triggered to stop supplying working power to the storage key module U26 after being disconnected, and the stored key information is immediately lost after the storage key module U26 is powered off, so that a destroying key is realized, and the key is ensured not to be illegally stolen. The types of the 4 micro switches (U34, U35, U33 and U87) are PB22E70, and the number of the micro switches can be flexibly set according to actual needs.
Embodiment two:
in the first embodiment, the 4 micro switches (U34, U35, U33, U87) automatically detect whether the cover is opened or not, and once the cover is opened, the storage key module U26 is triggered to destroy the key. However, the cover is usually tightly mounted on the chassis by using screws, so that when an external person needs to uncover the cover, the cover can be opened by screwing all the screws out, so that the destruction of the secret key cannot be rapidly carried out, and the cover is inconvenient and needs to be provided with corresponding tools. Therefore, in order to enable an operator to destroy the secret key quickly and conveniently, the technical scheme of the first embodiment is optimized. As shown in fig. 2, the present invention further includes a self-locking key-destroying switch S1, the type of the self-locking key-destroying switch is TS-22A, and the self-locking key-destroying switch S1 is installed on a chassis of the information security device and connected to the storage key module U26. The specific connection relation is as follows: pin 2 of the self-locking key-destroying switch S1 is connected with pin 8 of the memory key module U26. The second embodiment adopts a technical manner of actively implementing the key destroying, that is, by pressing the self-locking key destroying switch S1, the key storing module U26 is actively triggered to implement the key destroying. The specific working principle is as follows: when the self-locking key-type key destroying switch S1 is pressed, the working power supply of the storage key module U26 is automatically disconnected, and the stored key information is immediately lost after the storage key module U26 is powered off, so that a destroying key is realized, and when the self-locking key-type key destroying switch S1 is continuously pressed again, the working power supply of the storage key module U26 is automatically connected, so that the key can be kept or injected, and the key can be actively, quickly and conveniently destroyed.
Embodiment III:
although the key can be destroyed actively, quickly and conveniently by the technical scheme of the second embodiment, because the self-locking key destroying switch S1 is installed on the chassis, an external operator can easily operate the self-locking key destroying switch S1 carelessly, for example, the key storing module U26 can destroy the key immediately when the self-locking key destroying switch S1 is touched carelessly, i.e. the technical problem of destroying the key caused by misoperation exists. In order to solve the problem, the third embodiment is technically optimized based on the second technical solution of the second embodiment, as shown in fig. 3, that is, a large capacitance stored charge C311 is arranged between the self-locking key-destroying switch S1 and the circuit of the stored key module U26. Namely, pin 2 of the self-locking key-destroying switch S1 is connected to pin 8 of the memory key module U26 through the large-capacitance memory charge C311. The large capacitor storage charge C311 can store certain electric quantity, namely can provide working power for the storage key module U26 in a certain time, and the specific working principle is as follows: when an external person mismanipulates (e.g. presses) the self-locking key destroying switch S1, although the self-locking key destroying switch S1 can cut off the power supply provided by the button battery to the storage key module U26, the large-capacity storage charge C311 stores a certain amount of electricity, so that the large-capacity storage charge C311 can immediately provide a working power supply to the storage key module U26, so that the storage key module U26 is ensured not to be powered off, that is, the key stored on the storage key module U26 cannot be destroyed before the large-capacity storage charge C311 consumes the electricity, that is, the misoperator can rapidly press the self-locking key destroying switch S1 again before the large-capacity storage charge C311 consumes the electricity, so that the self-locking key destroying switch S1 can switch on the working power supply of the storage key module U26, and the technical problem that the key is destroyed by mismanipulation is solved.
It should be noted that, the above embodiments of the present invention are all performed under the condition of no electrification, that is, no external power supply is connected.
Finally, it should be noted that: the above embodiments are only for illustrating the present invention and not for limiting the technical solution described in the present invention; thus, while the invention has been described in detail with reference to the various embodiments described above, it will be understood by those skilled in the art that the invention may be modified or equivalents; all technical solutions and modifications thereof that do not depart from the spirit and scope of the present invention are intended to be included in the scope of the appended claims.

Claims (5)

1. The utility model provides a destroy key circuit structure, includes the PCB base plate, the PCB base plate is installed in the casing, its characterized in that: the PCB substrate upper plate is provided with a micro switch, a battery seat, a battery and a storage key module, wherein the battery is arranged on the battery seat and is used for providing a working power supply for the storage key module, and the storage key module is used for storing key information; the input end of the micro switch is connected with the cover and is used for detecting the external cover opening action, once the cover is opened, the micro switch is immediately triggered to be disconnected, the micro switch is automatically triggered to stop providing a working power supply for the storage key module after being disconnected, the key information is lost after the storage key module is powered off, so that a destroying key is realized, the key destroying circuit structure further comprises a self-locking key type key destroying switch, the self-locking key type key destroying switch is arranged on the shell and is connected with the storage key module, when the self-locking key type key destroying switch is pressed, the working power supply of the storage key module is automatically disconnected, the key information is lost after the storage key module is powered off, so that a destroying key is automatically connected with the working power supply of the storage key module, and when the self-locking key type key destroying switch is continuously pressed again, the key is kept or injected; and a large capacitor for storing charges is arranged between the self-locking key-type key destroying switch and the key storage module circuit, and the battery is a 3.3V button battery.
2. The key destruction circuit architecture of claim 1, wherein: the memory key module is a 23K256 memory chip.
3. The key destruction circuit architecture of claim 1, wherein: the number of the micro switches is 4, and the micro switches are sequentially connected with each other.
4. A key destruction circuit arrangement according to claim 3, wherein: the type of the micro switch is PB22E70.
5. The key destruction circuit architecture of claim 1, wherein: the self-locking key type key destroying switch is of a model TS-22A.
CN201811043971.9A 2018-09-07 2018-09-07 Key destroying circuit structure Active CN108880810B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811043971.9A CN108880810B (en) 2018-09-07 2018-09-07 Key destroying circuit structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811043971.9A CN108880810B (en) 2018-09-07 2018-09-07 Key destroying circuit structure

Publications (2)

Publication Number Publication Date
CN108880810A CN108880810A (en) 2018-11-23
CN108880810B true CN108880810B (en) 2024-02-27

Family

ID=64323420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811043971.9A Active CN108880810B (en) 2018-09-07 2018-09-07 Key destroying circuit structure

Country Status (1)

Country Link
CN (1) CN108880810B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765438B (en) * 2019-10-24 2021-01-01 江苏云涌电子科技股份有限公司 High-performance password card and working method thereof
CN111327422A (en) * 2020-03-05 2020-06-23 中安云科科技发展(山东)有限公司 Cipher machine with key destruction function and key destruction method
CN111352862A (en) * 2020-03-05 2020-06-30 中安云科科技发展(山东)有限公司 Key destroying method, system, password card and password machine
CN113271206B (en) * 2021-05-12 2022-07-19 江苏云涌电子科技股份有限公司 Signal identification circuit and method
CN113472535B (en) * 2021-08-02 2024-02-27 电信科学技术第五研究所有限公司 Active and passive triggering key destruction circuit capable of running for long time
CN115174080B (en) * 2022-09-07 2023-03-21 北京安盟信息技术股份有限公司 Key protection method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2153097Y (en) * 1993-04-07 1994-01-12 刘贤惠 Anti-theft alarm controlled by siphon switch
CN102360411A (en) * 2011-10-17 2012-02-22 三一重工股份有限公司 Uncovering locking method and device and communication device
CN103971068A (en) * 2014-05-06 2014-08-06 广州市华标科技发展有限公司 CPU chip core technology protection device and method and electronic device
CN104200174A (en) * 2014-08-27 2014-12-10 成都卫士通信息产业股份有限公司 Automatic destruction structure for information of electronic equipment
CN105447418A (en) * 2016-01-04 2016-03-30 成都卫士通信息产业股份有限公司 Secret key safety protection equipment and working method thereof
CN105787397A (en) * 2016-03-23 2016-07-20 深圳市亿威尔信息技术股份有限公司 Case uncovering detection system and implementing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2153097Y (en) * 1993-04-07 1994-01-12 刘贤惠 Anti-theft alarm controlled by siphon switch
CN102360411A (en) * 2011-10-17 2012-02-22 三一重工股份有限公司 Uncovering locking method and device and communication device
CN103971068A (en) * 2014-05-06 2014-08-06 广州市华标科技发展有限公司 CPU chip core technology protection device and method and electronic device
CN104200174A (en) * 2014-08-27 2014-12-10 成都卫士通信息产业股份有限公司 Automatic destruction structure for information of electronic equipment
CN105447418A (en) * 2016-01-04 2016-03-30 成都卫士通信息产业股份有限公司 Secret key safety protection equipment and working method thereof
CN105787397A (en) * 2016-03-23 2016-07-20 深圳市亿威尔信息技术股份有限公司 Case uncovering detection system and implementing method

Also Published As

Publication number Publication date
CN108880810A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN108880810B (en) Key destroying circuit structure
CN209620882U (en) A kind of safety device for having multichannel and ruining key function
CN201465553U (en) Mobile storage device with self-destruction function
US7238901B2 (en) Tamper resistant pin entry apparatus
CN100520833C (en) Cabinet security monitoring method and device in modern logistics
CN109306824B (en) Safety device with multipath key destroying function
CN110188564B (en) Mobile data storage terminal based on quantum key encryption
CN102413221A (en) Method for protecting privacy information and mobile terminal
CN111327422A (en) Cipher machine with key destruction function and key destruction method
CN101511083A (en) Authentication method and terminal for telecom smart card
CN208638362U (en) One kind ruining key circuit structure
CN202771533U (en) Encryption keyboard and self-service device utilizing the same
CN203366064U (en) Automatic teller machine card reader safety monitoring device
US20100153708A1 (en) Server Assisted Portable Device
CN206805521U (en) A kind of mobile data memory unit based on quantum key encryption
CN110210260B (en) Data self-destruction system and method
CN205545301U (en) Key protective film piece
CN104183056A (en) Encrypting pin pad
CN204791018U (en) Prevent losing multi -functional U shield
CN105743640A (en) Key protection module
CN201044180Y (en) Smart card type safety USB flash drive
CN103294141A (en) Safety protection computer case
US10721253B2 (en) Power circuitry for security circuitry
CN210627201U (en) Intelligent key equipment with anti-dismantling self-destruction function
CN203276262U (en) Portable storage device with encryption lock function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant