CN110210260A - Data destruct system and method - Google Patents

Data destruct system and method Download PDF

Info

Publication number
CN110210260A
CN110210260A CN201910513429.3A CN201910513429A CN110210260A CN 110210260 A CN110210260 A CN 110210260A CN 201910513429 A CN201910513429 A CN 201910513429A CN 110210260 A CN110210260 A CN 110210260A
Authority
CN
China
Prior art keywords
data
power supply
monitoring unit
supply system
storage unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910513429.3A
Other languages
Chinese (zh)
Other versions
CN110210260B (en
Inventor
高阳
赵孝雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Forward Industrial Co Ltd
Original Assignee
Shenzhen Forward Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Forward Industrial Co Ltd filed Critical Shenzhen Forward Industrial Co Ltd
Priority to CN201910513429.3A priority Critical patent/CN110210260B/en
Publication of CN110210260A publication Critical patent/CN110210260A/en
Application granted granted Critical
Publication of CN110210260B publication Critical patent/CN110210260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of data destruct system and methods, it is related to field of communication technology, a kind of data destruct system provided in an embodiment of the present invention, it include: monitoring unit, sensor and storage unit, sensor is used in the case where detecting interrupt signal, first, which is sent, to monitoring unit destroys instruction, monitoring unit is used in the case where receiving the first destruction instruction, destroy the data in storage unit, i.e. when someone, which opens complete machine, steals storage unit, pass through the data information in monitoring unit immediately auto-destruct storage unit, prevent the leakage of the data information of complete machine, improve the confidentiality of the data information of complete machine.

Description

Data destruct system and method
Technical field
The present invention relates to fields of communication technology, more particularly, to a kind of data destruct system and method.
Background technique
After there is interchanger etc. the external power supply of the communication equipment of data storage function to disconnect, the prior art can not be counted It is operated according to destroying, then steals people and can open complete machine and steal storage chip, and read data from storage chip, lead to complete machine number According to leakage, Information Security is insufficient.
For the problem of the data resource safety deficiency of complete machine in the prior art, effective solution party is not yet proposed at present Case.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of destruct systems and method can carry out data pin when power is off The operation ruined, the technical problem of data resource safety deficiency when alleviating power-off.
In a first aspect, the embodiment of the invention provides a kind of data destruct systems, comprising: monitoring unit, sensor and deposit Storage unit;Sensor is used in the case where detecting interrupt signal, is sent first to monitoring unit and is destroyed instruction;Monitoring unit For destroying the data in storage unit in the case where receiving the first destruction instruction.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein also Including main power supply system and main control unit, monitoring unit is also used to detect main confession in the case where receiving the first destruction instruction The open and close state of electric system, and corresponding operating is carried out to storage unit and main control unit respectively according to open and close state.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides second of first aspect Possible embodiment, wherein monitoring unit is also used in the case where main power supply system is in close state, and it is single to destroy storage Data in member;Alternatively, being closed between monitoring unit and main control unit in the case where main power supply system is in the open state Storage bus interfaces, and destroy the data in storage unit.
The possible embodiment of second with reference to first aspect, the embodiment of the invention provides the third of first aspect Possible embodiment, wherein monitoring unit is used to close in the case where receive main control unit transmission second destroys instruction The storage bus interfaces between monitoring unit and main control unit are closed, and destroy the data in storage unit.
With reference to first aspect or first aspect the first may, the embodiment of the invention provides the 4th kind of first aspect Possible embodiment, wherein monitoring unit, which is also used to generate, destroys time point, generates destruction record according to time point is destroyed, And store destruction record.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides the 5th kind of first aspect Possible embodiment, wherein monitoring unit is also used to detect the end voltage of main power supply system, according to end voltage and starting threshold value Comparison situation, obtain the open and close state of main power supply system.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides the 6th kind of first aspect Possible embodiment, wherein main power supply system is used to power for data destruct system and/or battery power supply system.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides the 7th kind of first aspect Possible embodiment, wherein further include battery power supply system, battery power supply system, which is used to be in main power supply system, closes shape In the case where state, power for data destruct system.
Second aspect, the embodiment of the present invention also provide a kind of data self-destruction method, comprising: in the feelings for detecting interrupt signal Under condition, sensor sends first to monitoring unit and destroys instruction;In the case where receiving the first destruction instruction, monitoring unit pin Ruin the data in storage unit.
In conjunction with second aspect, the embodiment of the invention provides the first possible embodiments of second aspect, wherein In the case where receiving the first destruction instruction, the step of monitoring unit destroys the data in storage unit, comprising: receiving the In the case that one destroys instruction, the open and close state of main power supply system is detected;It is single to storage respectively according to open and close state Member and main control unit carry out corresponding operating.
The embodiment of the present invention bring it is following the utility model has the advantages that
A kind of data destruct system and method provided in an embodiment of the present invention, comprising: monitoring unit, sensor and storage are single Member, when someone, which opens complete machine, steals storage unit, main power supply system or battery power supply system be storage unit, monitoring unit and Sensor provides working power, data information that can immediately in auto-destruct storage unit by monitoring unit, prevents complete machine Data information leakage, improve the confidentiality of the data information of complete machine.Meanwhile it can when main power supply system is in starting state Think that battery power supply system charges, no replacement is required battery improves the cruising ability of data destruct system using simplicity.
Other feature and advantage of the disclosure will illustrate in the following description, alternatively, Partial Feature and advantage can be with Deduce from specification or unambiguously determine, or by implement the disclosure above-mentioned technology it can be learnt that.
To enable the above objects, features, and advantages of the disclosure to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Attached drawing is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of another data destruct system provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of another data destruct system provided in an embodiment of the present invention;
Fig. 4 is a kind of flow chart of data self-destruction method provided in an embodiment of the present invention.
Icon: 100- monitoring unit;120- sensor;140- storage unit;200- main power supply system;220- master control list Member;300- battery power supply system.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be described, it is clear that described embodiments are some of the embodiments of the present invention, rather than whole implementation Example.
The data resource safety of complete machine is insufficient at present, is based on this, a kind of data self-destruction system provided in an embodiment of the present invention System and method, can prevent the leakage of the data information of complete machine, improve the confidentiality of the data information of complete machine.
For convenient for understanding the present embodiment, first to a kind of data destruct system disclosed in the embodiment of the present invention into Row is discussed in detail.
Embodiment 1
As shown in Figure 1, a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention, comprising: monitoring is single Member 100, sensor 120 and storage unit 140.The data destruct system can be applied to interchanger etc. with data storage function Communication equipment.By storage bus connection between storage unit 140 and monitoring unit 100, and storage bus can select NAND Store bus.
Sensor 120 is used in the case where detecting interrupt signal, is sent first to monitoring unit 100 and is destroyed instruction. Sensor 120 can be using ultrasonic type displacement sensor, the optical displacement sensor, Hall displacement in displacement sensor Sensor etc..Interrupt signal is that the target component of complete machine generates displacement, and passing through the mobile notch generated of the target component can To take out storage unit 140, the selection of target component is different according to the difference of overall design, wherein target component can be The upper cover of complete machine, when someone opens complete machine upper cover, upper cover is mobile to generate displacement, then generates interrupt signal.In advance in sensor Corresponding with above-mentioned interrupt signal first be arranged in 120 destroy and instruct, when sensor 120 receives the interrupt signal, immediately to Monitoring unit 100 sends first and destroys instruction, and therefore, the first destruction instruction is the quilt that sensor 120 is sent to monitoring unit 100 It is dynamic to destroy instruction, it destroys and instructs according to first, be not necessarily to user's control, monitoring unit 100 can auto-destruct storage unit 140 In data information.Meanwhile first the transmission mode for destroying instruction can be real using wire transmission mode, wireless transmission method etc. When transmission mode, shorten sensor 120 reaction time.
Monitoring unit 100 is used to destroy the data in storage unit 140 in the case where receiving the first destruction instruction. Storage unit 140 stores the data informations such as Software Mirroring, Encryption Algorithm and the key of complete machine.Monitoring unit 100 can be to storage Above-mentioned data information in unit 140 is read out and destroys, and can use EPLD (Erasable Programmable Logic Device, erasable Programmadle logic device) or the microcomputer systems such as single-chip microcontroller.Storage unit 140 and prison It controls by storage bus connection between unit 100, therefore, in the case where receiving the first destruction instruction, monitoring unit 100 can Quickly to destroy the data information in storage unit 140 by storing bus.Meanwhile it destroying speed and directly influencing destruction effect Fruit, if destroyed, speed is excessively slow, and complete machine may be cut off all power supplies, cause the data information in storage unit 140 not complete It is complete to destroy, cause the leakage of same data message.Therefore, storage unit 140 can be used with very fast data destroying speed Nand-flash memory the time required to shortening data destroying, reduces the risk of data information leakage, improves the data destruct system Safety.
A kind of data destruct system provided in an embodiment of the present invention, comprising: monitoring unit, sensor and storage unit pass Sensor is used in the case where detecting interrupt signal, is sent first to monitoring unit and is destroyed instruction, monitoring unit is for connecing In the case where receiving the first destruction instruction, destroy the data in storage unit, i.e., when someone, which opens complete machine, steals storage unit, By the data information in monitoring unit immediately auto-destruct storage unit, the leakage of the data information of complete machine is prevented, is improved whole The confidentiality of the data information of machine.
As shown in Fig. 2, a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention, comprising: main power supply System 200 and main control unit 220, main power supply system 200 include voltage conversion circuit, and the ac high voltage electricity of external world's input is turned DC low-voltage electricity is turned to, provides working power for complete machine.Main control unit 220 is that the control chip of complete machine passes through control monitoring unit 100 realize the access and control to the data information of storage unit 140.By depositing between main control unit 220 and monitoring unit 100 Storage bus is connected with control bus.
Monitoring unit 100 is also used to detect the unlatching of main power supply system 200 in the case where receiving the first destruction instruction Closed state, and corresponding operating is carried out to storage unit 140 and main control unit 220 respectively according to open and close state.Main power supply System 200 is in the open state, then main power supply system 200 has voltage input, i.e. complete machine is powered.Main power supply system 200, which is in, to close Closed state, then 200 no-voltage of main power supply system inputs, i.e., complete machine powers off.Monitoring unit 100 is also used to detect main power supply system 200 end voltage obtains the open and close state of main power supply system according to the comparison situation of end voltage and starting threshold value.It needs The starting threshold value that main power supply system 200 is preset in monitoring unit 100, when the end voltage for detecting main power supply system 200 is greater than When equal to starting threshold value, then determine that main power supply system 200 is in the open state;When the end voltage for detecting main power supply system 200 When less than starting threshold value, then determine that main power supply system 200 is in close state.Monitoring unit 100 is according to 200 institute of main power supply system The state at place carries out data destroying operation to storage unit 140, which need to will be in storage unit 140 Data information is all destroyed, and the destruction operating process is related to storage unit 140 and main control unit 220.
Monitoring unit 100 is also used in the case where main power supply system 200 is in close state, and destroys storage unit 140 In data.Or in the case where main power supply system 200 is in the open state, monitoring unit 100 and main control unit 220 are closed Between storage bus interfaces, and destroy the data in storage unit.When monitoring unit 100 receives the first destruction instruction and examines It measures in the case that main power supply system 200 is in close state, is directly believed the data in storage unit 140 by storage bus Breath is all destroyed.When monitoring unit 100 receives the first destruction instruction and detects that main power supply system 200 is in the open state In the case of, the storage bus interfaces being first shut off between monitoring unit 100 and main control unit 220 are prevented through main control unit 220 During being destroyed to the data information in storage unit 140, the data of storage unit 140 are written and read and are stored Then operation again all destroys the data information in storage unit 140, prevent the mistake of data information from destroying.
Monitoring unit 100 is used to close monitoring in the case where receive the transmission of main control unit 220 second destroys instruction Storage bus interfaces between unit 100 and main control unit 220, and destroy the data in storage unit 140.Work as main power supply system 200 is in the open state, and 100 both ends of monitoring unit store bus and lead directly to, i.e., main control unit 220 can directly control storage unit 140, monitoring unit 100 is the equal of transparent at this time, to data penetration transmission in storage bus, facilitates complete machine software to storage unit The destruction and reading of data in 140.Second destroys user's active that instruction sends for main control unit 220 to monitoring unit 100 Instruction is destroyed, when user needs to destroy the data information of storage unit 140, user can use outer button, control interface Etc. modes input the second destruction instruction.
When the data information that monitoring unit 100 starts storage unit 140 destroys operation, monitoring unit 100 is also used to give birth to At destruction time point, at the beginning of which can carry out data information destruction operation for monitoring unit 100, according to It destroys time point generation and destroys record, and the memory space being stored in monitoring unit 100, pass through main control unit convenient for user 220 transfer and check.
As shown in figure 3, a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention, comprising: battery supplies Electric system 300, battery power supply system 300 includes energy-storage battery, for the case where main power supply system 200 is in close state Under, it powers for data destruct system.When main power supply system 200 is in close state, battery power supply system 300 starts to power. In view of battery durable ability, the supply district of battery power supply system 300, which only covers, to be deposited monitoring unit 100, sensor 120 and deposits Storage unit 140.Meanwhile storage unit 140 works in standby mode, such as Nor-flash memory and Nand-flash memory It receives bus line command and enters standby mode, 1/tens when the electric current of storage unit 140 being made to be reduced to normal work.Monitoring is single Member 100 also enters low power consumpting state, only opens that its is internal for carrying out the destruction module of data destroying operation, other interfaces and Functional unit is turned off.Sensor 120 can be using physical button perception or the form of periodic awakening detection chip, to reduce Power consumption.In this way can limits promotion battery power supply system 300 power-on time.If monitoring unit 100 uses single-chip microcontroller, deposit Storage unit 140 uses Nand-flash memory, and sensor 120 uses optical displacement sensor, is in main power supply system 200 Closed state, energy-storage battery use the battery of 5000mAh, and theoretically the data destruct system standby can reach 5 months.Main confession Electric system 200 is used to power for data destruct system and/or battery power supply system 300, when main power supply system 200 is in opening state When state, main power supply system 200 is used to power for data destruct system, and when the end voltage in battery power supply system 300 is lower than storage It in the case where the voltage rating of energy battery, powers for battery power supply system 300, improves the cruising ability of data destruct system.
A kind of data destruct system provided in an embodiment of the present invention, comprising: monitoring unit, sensor and storage unit, when When someone's opening complete machine steals storage unit, main power supply system or battery power supply system are storage unit, monitoring unit and sensing Device provides working power, data information that can immediately in auto-destruct storage unit by monitoring unit, prevents the number of complete machine It is believed that the leakage of breath, improves the confidentiality of the data information of complete machine.Meanwhile can be when main power supply system is in starting state Battery power supply system charging, no replacement is required battery improve the cruising ability of data destruct system using simplicity.
Embodiment 2
As shown in figure 4, a kind of flow chart of data self-destruction method provided in an embodiment of the present invention, the method comprising the steps of S401-S402, specific as follows:
Step S401, in the case where detecting interrupt signal, sensor sends first to monitoring unit and destroys instruction;
Step S402, in the case where receiving the first destruction instruction, monitoring unit destroys the data in storage unit.
Above-described embodiment step S402, comprising: in the case where receiving the first destruction instruction, detect main power supply system Open and close state;Corresponding operating is carried out to storage unit and main control unit respectively according to open and close state.
Data self-destruction method provided in an embodiment of the present invention has identical with data destruct system provided by the above embodiment Technical characteristic reach identical technical effect so also can solve identical technical problem.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
The computer program product of data self-destruction method is carried out provided by the embodiment of the present invention, including stores processor The computer readable storage medium of executable non-volatile program code, the instruction that said program code includes can be used for executing Previous methods method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, of the invention Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can be with Store the medium of program code.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention Within the scope of.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (10)

1. a kind of data destruct system characterized by comprising monitoring unit, sensor and storage unit;
The sensor is used in the case where detecting interrupt signal, and Xiang Suoshu monitoring unit sends first and destroys instruction;
The monitoring unit is used to destroy the number in the storage unit in the case where receiving the first destruction instruction According to.
2. data destruct system according to claim 1, which is characterized in that it further include main power supply system and main control unit, The unlatching that the monitoring unit is also used to detect the main power supply system in the case where receiving the first destruction instruction is closed Closed state, and corresponding operating is carried out to the storage unit and the main control unit respectively according to the open and close state.
3. data destruct system according to claim 2, which is characterized in that the monitoring unit is also used in the main confession In the case that electric system is in close state, the data in the storage unit are destroyed;
Alternatively,
In the case where the main power supply system is in the open state, close between the monitoring unit and the main control unit Storage bus interfaces, and destroy the data in the storage unit.
4. data destruct system according to claim 3, which is characterized in that the monitoring unit be used for receive it is described Main control unit send second destroy instruction in the case where, that closes between the monitoring unit and the main control unit described deposits Bus interface is stored up, and destroys the data in the storage unit.
5. data destruct system according to claim 1 or 2, which is characterized in that the monitoring unit is also used to generate pin Time point is ruined, is generated according to the destruction time point and destroys record, and stores the destruction record.
6. data destruct system according to claim 2, which is characterized in that the monitoring unit is also used to detect the master The end voltage of power supply system obtains the described of the main power supply system according to the comparison situation of the end voltage and starting threshold value Open and close state.
7. data destruct system according to claim 2, which is characterized in that the main power supply system is used to be the data Destruct system and/or battery power supply system power supply.
8. data destruct system according to claim 2, which is characterized in that it further include battery power supply system,
The battery power supply system is used in the case where the main power supply system is in close state, and is data self-destruction system System power supply.
9. a kind of data self-destruction method characterized by comprising
In the case where detecting interrupt signal, sensor sends first to monitoring unit and destroys instruction;Receiving described In the case that one destroys instruction, the monitoring unit destroys the data in storage unit.
10. data self-destruction method according to claim 9, which is characterized in that it is described receive it is described first destroy refer to In the case where order, the step of monitoring unit destroys the data in storage unit, comprising:
In the case where receiving the first destruction instruction, the open and close state of main power supply system is detected;
Corresponding operating is carried out to the storage unit and main control unit respectively according to the open and close state.
CN201910513429.3A 2019-06-13 2019-06-13 Data self-destruction system and method Active CN110210260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910513429.3A CN110210260B (en) 2019-06-13 2019-06-13 Data self-destruction system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910513429.3A CN110210260B (en) 2019-06-13 2019-06-13 Data self-destruction system and method

Publications (2)

Publication Number Publication Date
CN110210260A true CN110210260A (en) 2019-09-06
CN110210260B CN110210260B (en) 2020-12-08

Family

ID=67792537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910513429.3A Active CN110210260B (en) 2019-06-13 2019-06-13 Data self-destruction system and method

Country Status (1)

Country Link
CN (1) CN110210260B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612390A (en) * 2020-03-31 2020-09-01 上海钎劢科技设备有限公司 Environment monitoring type storage device and method
CN114050902A (en) * 2021-11-10 2022-02-15 南京南瑞信息通信科技有限公司 Key protection system and method for improving applicability of password card
CN114077757A (en) * 2020-08-14 2022-02-22 台山市培英职业技术学校 Data security storage device and method

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504630A (en) * 2009-03-02 2009-08-12 成都市华为赛门铁克科技有限公司 Data destroying method of memory device and memory device
CN101634972A (en) * 2009-09-01 2010-01-27 成都市华为赛门铁克科技有限公司 Data protection method and data protection device of movable storage equipment and movable storage equipment
CN201465553U (en) * 2009-05-04 2010-05-12 同方股份有限公司 Mobile storage device with self-destruction function
CN101896914A (en) * 2007-11-07 2010-11-24 高通股份有限公司 Systems, methods, and apparatuses for erasing memory on wireless devices
CN203013274U (en) * 2012-12-26 2013-06-19 中国航空工业集团公司第六三一研究所 Data self-destructive electronic hard disk
US20140123328A1 (en) * 2011-12-22 2014-05-01 Michael Berger Always-available embedded theft reaction subsystem
CN103942505A (en) * 2014-04-14 2014-07-23 立德高科(北京)数码科技有限责任公司 Device and method for attacking current computer with unmatched hardware identity
US20140282945A1 (en) * 2013-03-15 2014-09-18 Intel Corporation Technologies for secure storage and use of biometric authentication information
CN104217177A (en) * 2013-05-31 2014-12-17 中晟国计科技有限公司 One-computer double-network physical isolation double-display computer with switching circuit
CN204440401U (en) * 2015-03-26 2015-07-01 山东超越数控电子有限公司 A kind of anti-violence disassembles computing machine
CN105574444A (en) * 2015-12-11 2016-05-11 无锡市同芯恒通科技有限公司 Device for important data destruction of disassembly trigger device
CN206209730U (en) * 2016-11-10 2017-05-31 天津光电聚能专用通信设备有限公司 A kind of Information Security equipment
US20170277901A1 (en) * 2014-08-26 2017-09-28 Pahmet Llc System and method for autonomous or remote controlled destruction of stored information or components
CN108039951A (en) * 2017-12-27 2018-05-15 长沙深蓝未来智能技术有限公司 How anti-symbiotic type row be counter to separate self-desttruction equipment
CN108241320A (en) * 2017-12-18 2018-07-03 北京车和家信息技术有限公司 Operating mode control method and operating mode control system
CN109697345A (en) * 2018-11-26 2019-04-30 维沃移动通信有限公司 A kind of data destruction method and mobile terminal

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101896914A (en) * 2007-11-07 2010-11-24 高通股份有限公司 Systems, methods, and apparatuses for erasing memory on wireless devices
CN101504630A (en) * 2009-03-02 2009-08-12 成都市华为赛门铁克科技有限公司 Data destroying method of memory device and memory device
CN201465553U (en) * 2009-05-04 2010-05-12 同方股份有限公司 Mobile storage device with self-destruction function
CN101634972A (en) * 2009-09-01 2010-01-27 成都市华为赛门铁克科技有限公司 Data protection method and data protection device of movable storage equipment and movable storage equipment
US20140123328A1 (en) * 2011-12-22 2014-05-01 Michael Berger Always-available embedded theft reaction subsystem
CN203013274U (en) * 2012-12-26 2013-06-19 中国航空工业集团公司第六三一研究所 Data self-destructive electronic hard disk
US20140282945A1 (en) * 2013-03-15 2014-09-18 Intel Corporation Technologies for secure storage and use of biometric authentication information
CN104217177A (en) * 2013-05-31 2014-12-17 中晟国计科技有限公司 One-computer double-network physical isolation double-display computer with switching circuit
CN103942505A (en) * 2014-04-14 2014-07-23 立德高科(北京)数码科技有限责任公司 Device and method for attacking current computer with unmatched hardware identity
US20170277901A1 (en) * 2014-08-26 2017-09-28 Pahmet Llc System and method for autonomous or remote controlled destruction of stored information or components
CN204440401U (en) * 2015-03-26 2015-07-01 山东超越数控电子有限公司 A kind of anti-violence disassembles computing machine
CN105574444A (en) * 2015-12-11 2016-05-11 无锡市同芯恒通科技有限公司 Device for important data destruction of disassembly trigger device
CN206209730U (en) * 2016-11-10 2017-05-31 天津光电聚能专用通信设备有限公司 A kind of Information Security equipment
CN108241320A (en) * 2017-12-18 2018-07-03 北京车和家信息技术有限公司 Operating mode control method and operating mode control system
CN108039951A (en) * 2017-12-27 2018-05-15 长沙深蓝未来智能技术有限公司 How anti-symbiotic type row be counter to separate self-desttruction equipment
CN109697345A (en) * 2018-11-26 2019-04-30 维沃移动通信有限公司 A kind of data destruction method and mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612390A (en) * 2020-03-31 2020-09-01 上海钎劢科技设备有限公司 Environment monitoring type storage device and method
CN111612390B (en) * 2020-03-31 2022-12-06 上海钎劢科技设备有限公司 Environment monitoring type storage device and method
CN114077757A (en) * 2020-08-14 2022-02-22 台山市培英职业技术学校 Data security storage device and method
CN114077757B (en) * 2020-08-14 2023-12-19 台山市培英职业技术学校 Data security storage device and method
CN114050902A (en) * 2021-11-10 2022-02-15 南京南瑞信息通信科技有限公司 Key protection system and method for improving applicability of password card
CN114050902B (en) * 2021-11-10 2023-12-19 南京南瑞信息通信科技有限公司 Key protection system and method for improving applicability of password card

Also Published As

Publication number Publication date
CN110210260B (en) 2020-12-08

Similar Documents

Publication Publication Date Title
CN110210260A (en) Data destruct system and method
CN103425506B (en) Closedown method and starting-up method and communication terminal
CN110316388A (en) A kind of battery management method, cell managing device and aircraft
CN107566650A (en) Solve lock control method and Related product
US7786695B2 (en) Configurable battery management system with embedded SRAM in chip architecture
CN106786960B (en) Charge control method, device and terminal
CN105426742B (en) Mobile terminal connects computer method and device
CN105573372B (en) A kind of control method and device of intelligent terminal
CN205477103U (en) Intelligence thing networking safe deposit box
CN109088473A (en) Battery energy management control system
CN110611353A (en) Charging control method and device of intelligent door lock and intelligent door lock
CN105938566A (en) Method for keeping working state of smart card entering field again and smart card
CN206697684U (en) A kind of smart jack with abnormal protection
CN106021137A (en) Electronic device, peripheral and method for controlling electronic device
CN110729788A (en) Power supply control method, system and equipment
Mu et al. Investigation and application of smart door locks based on Bluetooth control technology
CN205921443U (en) Battery supply set pre -emergency electric access protection system
CN113323513B (en) Power supply control method of intelligent door lock, intelligent door lock and storage medium
CN108306076A (en) Battery chamber of data center air-conditioning inter-linked controlling method and system
CN208862626U (en) A kind of battery energy management control system
CN103699857B (en) The anti-hacking device of electronic equipment and electronic equipment
CN106130172A (en) Battery supply set emergency standby power accesses protection system
CN107479472A (en) Household appliances electricity consumption intelligent management system
CN112711320A (en) Power switching system and method, computer readable storage medium and processor
CN112564229A (en) Intelligent door and power supply system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant