CN110210260A - Data destruct system and method - Google Patents
Data destruct system and method Download PDFInfo
- Publication number
- CN110210260A CN110210260A CN201910513429.3A CN201910513429A CN110210260A CN 110210260 A CN110210260 A CN 110210260A CN 201910513429 A CN201910513429 A CN 201910513429A CN 110210260 A CN110210260 A CN 110210260A
- Authority
- CN
- China
- Prior art keywords
- data
- power supply
- monitoring unit
- supply system
- storage unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of data destruct system and methods, it is related to field of communication technology, a kind of data destruct system provided in an embodiment of the present invention, it include: monitoring unit, sensor and storage unit, sensor is used in the case where detecting interrupt signal, first, which is sent, to monitoring unit destroys instruction, monitoring unit is used in the case where receiving the first destruction instruction, destroy the data in storage unit, i.e. when someone, which opens complete machine, steals storage unit, pass through the data information in monitoring unit immediately auto-destruct storage unit, prevent the leakage of the data information of complete machine, improve the confidentiality of the data information of complete machine.
Description
Technical field
The present invention relates to fields of communication technology, more particularly, to a kind of data destruct system and method.
Background technique
After there is interchanger etc. the external power supply of the communication equipment of data storage function to disconnect, the prior art can not be counted
It is operated according to destroying, then steals people and can open complete machine and steal storage chip, and read data from storage chip, lead to complete machine number
According to leakage, Information Security is insufficient.
For the problem of the data resource safety deficiency of complete machine in the prior art, effective solution party is not yet proposed at present
Case.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of destruct systems and method can carry out data pin when power is off
The operation ruined, the technical problem of data resource safety deficiency when alleviating power-off.
In a first aspect, the embodiment of the invention provides a kind of data destruct systems, comprising: monitoring unit, sensor and deposit
Storage unit;Sensor is used in the case where detecting interrupt signal, is sent first to monitoring unit and is destroyed instruction;Monitoring unit
For destroying the data in storage unit in the case where receiving the first destruction instruction.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein also
Including main power supply system and main control unit, monitoring unit is also used to detect main confession in the case where receiving the first destruction instruction
The open and close state of electric system, and corresponding operating is carried out to storage unit and main control unit respectively according to open and close state.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides second of first aspect
Possible embodiment, wherein monitoring unit is also used in the case where main power supply system is in close state, and it is single to destroy storage
Data in member;Alternatively, being closed between monitoring unit and main control unit in the case where main power supply system is in the open state
Storage bus interfaces, and destroy the data in storage unit.
The possible embodiment of second with reference to first aspect, the embodiment of the invention provides the third of first aspect
Possible embodiment, wherein monitoring unit is used to close in the case where receive main control unit transmission second destroys instruction
The storage bus interfaces between monitoring unit and main control unit are closed, and destroy the data in storage unit.
With reference to first aspect or first aspect the first may, the embodiment of the invention provides the 4th kind of first aspect
Possible embodiment, wherein monitoring unit, which is also used to generate, destroys time point, generates destruction record according to time point is destroyed,
And store destruction record.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides the 5th kind of first aspect
Possible embodiment, wherein monitoring unit is also used to detect the end voltage of main power supply system, according to end voltage and starting threshold value
Comparison situation, obtain the open and close state of main power supply system.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides the 6th kind of first aspect
Possible embodiment, wherein main power supply system is used to power for data destruct system and/or battery power supply system.
The possible embodiment of with reference to first aspect the first, the embodiment of the invention provides the 7th kind of first aspect
Possible embodiment, wherein further include battery power supply system, battery power supply system, which is used to be in main power supply system, closes shape
In the case where state, power for data destruct system.
Second aspect, the embodiment of the present invention also provide a kind of data self-destruction method, comprising: in the feelings for detecting interrupt signal
Under condition, sensor sends first to monitoring unit and destroys instruction;In the case where receiving the first destruction instruction, monitoring unit pin
Ruin the data in storage unit.
In conjunction with second aspect, the embodiment of the invention provides the first possible embodiments of second aspect, wherein
In the case where receiving the first destruction instruction, the step of monitoring unit destroys the data in storage unit, comprising: receiving the
In the case that one destroys instruction, the open and close state of main power supply system is detected;It is single to storage respectively according to open and close state
Member and main control unit carry out corresponding operating.
The embodiment of the present invention bring it is following the utility model has the advantages that
A kind of data destruct system and method provided in an embodiment of the present invention, comprising: monitoring unit, sensor and storage are single
Member, when someone, which opens complete machine, steals storage unit, main power supply system or battery power supply system be storage unit, monitoring unit and
Sensor provides working power, data information that can immediately in auto-destruct storage unit by monitoring unit, prevents complete machine
Data information leakage, improve the confidentiality of the data information of complete machine.Meanwhile it can when main power supply system is in starting state
Think that battery power supply system charges, no replacement is required battery improves the cruising ability of data destruct system using simplicity.
Other feature and advantage of the disclosure will illustrate in the following description, alternatively, Partial Feature and advantage can be with
Deduce from specification or unambiguously determine, or by implement the disclosure above-mentioned technology it can be learnt that.
To enable the above objects, features, and advantages of the disclosure to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Attached drawing is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of another data destruct system provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of another data destruct system provided in an embodiment of the present invention;
Fig. 4 is a kind of flow chart of data self-destruction method provided in an embodiment of the present invention.
Icon: 100- monitoring unit;120- sensor;140- storage unit;200- main power supply system;220- master control list
Member;300- battery power supply system.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be described, it is clear that described embodiments are some of the embodiments of the present invention, rather than whole implementation
Example.
The data resource safety of complete machine is insufficient at present, is based on this, a kind of data self-destruction system provided in an embodiment of the present invention
System and method, can prevent the leakage of the data information of complete machine, improve the confidentiality of the data information of complete machine.
For convenient for understanding the present embodiment, first to a kind of data destruct system disclosed in the embodiment of the present invention into
Row is discussed in detail.
Embodiment 1
As shown in Figure 1, a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention, comprising: monitoring is single
Member 100, sensor 120 and storage unit 140.The data destruct system can be applied to interchanger etc. with data storage function
Communication equipment.By storage bus connection between storage unit 140 and monitoring unit 100, and storage bus can select NAND
Store bus.
Sensor 120 is used in the case where detecting interrupt signal, is sent first to monitoring unit 100 and is destroyed instruction.
Sensor 120 can be using ultrasonic type displacement sensor, the optical displacement sensor, Hall displacement in displacement sensor
Sensor etc..Interrupt signal is that the target component of complete machine generates displacement, and passing through the mobile notch generated of the target component can
To take out storage unit 140, the selection of target component is different according to the difference of overall design, wherein target component can be
The upper cover of complete machine, when someone opens complete machine upper cover, upper cover is mobile to generate displacement, then generates interrupt signal.In advance in sensor
Corresponding with above-mentioned interrupt signal first be arranged in 120 destroy and instruct, when sensor 120 receives the interrupt signal, immediately to
Monitoring unit 100 sends first and destroys instruction, and therefore, the first destruction instruction is the quilt that sensor 120 is sent to monitoring unit 100
It is dynamic to destroy instruction, it destroys and instructs according to first, be not necessarily to user's control, monitoring unit 100 can auto-destruct storage unit 140
In data information.Meanwhile first the transmission mode for destroying instruction can be real using wire transmission mode, wireless transmission method etc.
When transmission mode, shorten sensor 120 reaction time.
Monitoring unit 100 is used to destroy the data in storage unit 140 in the case where receiving the first destruction instruction.
Storage unit 140 stores the data informations such as Software Mirroring, Encryption Algorithm and the key of complete machine.Monitoring unit 100 can be to storage
Above-mentioned data information in unit 140 is read out and destroys, and can use EPLD (Erasable Programmable
Logic Device, erasable Programmadle logic device) or the microcomputer systems such as single-chip microcontroller.Storage unit 140 and prison
It controls by storage bus connection between unit 100, therefore, in the case where receiving the first destruction instruction, monitoring unit 100 can
Quickly to destroy the data information in storage unit 140 by storing bus.Meanwhile it destroying speed and directly influencing destruction effect
Fruit, if destroyed, speed is excessively slow, and complete machine may be cut off all power supplies, cause the data information in storage unit 140 not complete
It is complete to destroy, cause the leakage of same data message.Therefore, storage unit 140 can be used with very fast data destroying speed
Nand-flash memory the time required to shortening data destroying, reduces the risk of data information leakage, improves the data destruct system
Safety.
A kind of data destruct system provided in an embodiment of the present invention, comprising: monitoring unit, sensor and storage unit pass
Sensor is used in the case where detecting interrupt signal, is sent first to monitoring unit and is destroyed instruction, monitoring unit is for connecing
In the case where receiving the first destruction instruction, destroy the data in storage unit, i.e., when someone, which opens complete machine, steals storage unit,
By the data information in monitoring unit immediately auto-destruct storage unit, the leakage of the data information of complete machine is prevented, is improved whole
The confidentiality of the data information of machine.
As shown in Fig. 2, a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention, comprising: main power supply
System 200 and main control unit 220, main power supply system 200 include voltage conversion circuit, and the ac high voltage electricity of external world's input is turned
DC low-voltage electricity is turned to, provides working power for complete machine.Main control unit 220 is that the control chip of complete machine passes through control monitoring unit
100 realize the access and control to the data information of storage unit 140.By depositing between main control unit 220 and monitoring unit 100
Storage bus is connected with control bus.
Monitoring unit 100 is also used to detect the unlatching of main power supply system 200 in the case where receiving the first destruction instruction
Closed state, and corresponding operating is carried out to storage unit 140 and main control unit 220 respectively according to open and close state.Main power supply
System 200 is in the open state, then main power supply system 200 has voltage input, i.e. complete machine is powered.Main power supply system 200, which is in, to close
Closed state, then 200 no-voltage of main power supply system inputs, i.e., complete machine powers off.Monitoring unit 100 is also used to detect main power supply system
200 end voltage obtains the open and close state of main power supply system according to the comparison situation of end voltage and starting threshold value.It needs
The starting threshold value that main power supply system 200 is preset in monitoring unit 100, when the end voltage for detecting main power supply system 200 is greater than
When equal to starting threshold value, then determine that main power supply system 200 is in the open state;When the end voltage for detecting main power supply system 200
When less than starting threshold value, then determine that main power supply system 200 is in close state.Monitoring unit 100 is according to 200 institute of main power supply system
The state at place carries out data destroying operation to storage unit 140, which need to will be in storage unit 140
Data information is all destroyed, and the destruction operating process is related to storage unit 140 and main control unit 220.
Monitoring unit 100 is also used in the case where main power supply system 200 is in close state, and destroys storage unit 140
In data.Or in the case where main power supply system 200 is in the open state, monitoring unit 100 and main control unit 220 are closed
Between storage bus interfaces, and destroy the data in storage unit.When monitoring unit 100 receives the first destruction instruction and examines
It measures in the case that main power supply system 200 is in close state, is directly believed the data in storage unit 140 by storage bus
Breath is all destroyed.When monitoring unit 100 receives the first destruction instruction and detects that main power supply system 200 is in the open state
In the case of, the storage bus interfaces being first shut off between monitoring unit 100 and main control unit 220 are prevented through main control unit 220
During being destroyed to the data information in storage unit 140, the data of storage unit 140 are written and read and are stored
Then operation again all destroys the data information in storage unit 140, prevent the mistake of data information from destroying.
Monitoring unit 100 is used to close monitoring in the case where receive the transmission of main control unit 220 second destroys instruction
Storage bus interfaces between unit 100 and main control unit 220, and destroy the data in storage unit 140.Work as main power supply system
200 is in the open state, and 100 both ends of monitoring unit store bus and lead directly to, i.e., main control unit 220 can directly control storage unit
140, monitoring unit 100 is the equal of transparent at this time, to data penetration transmission in storage bus, facilitates complete machine software to storage unit
The destruction and reading of data in 140.Second destroys user's active that instruction sends for main control unit 220 to monitoring unit 100
Instruction is destroyed, when user needs to destroy the data information of storage unit 140, user can use outer button, control interface
Etc. modes input the second destruction instruction.
When the data information that monitoring unit 100 starts storage unit 140 destroys operation, monitoring unit 100 is also used to give birth to
At destruction time point, at the beginning of which can carry out data information destruction operation for monitoring unit 100, according to
It destroys time point generation and destroys record, and the memory space being stored in monitoring unit 100, pass through main control unit convenient for user
220 transfer and check.
As shown in figure 3, a kind of structural schematic diagram of data destruct system provided in an embodiment of the present invention, comprising: battery supplies
Electric system 300, battery power supply system 300 includes energy-storage battery, for the case where main power supply system 200 is in close state
Under, it powers for data destruct system.When main power supply system 200 is in close state, battery power supply system 300 starts to power.
In view of battery durable ability, the supply district of battery power supply system 300, which only covers, to be deposited monitoring unit 100, sensor 120 and deposits
Storage unit 140.Meanwhile storage unit 140 works in standby mode, such as Nor-flash memory and Nand-flash memory
It receives bus line command and enters standby mode, 1/tens when the electric current of storage unit 140 being made to be reduced to normal work.Monitoring is single
Member 100 also enters low power consumpting state, only opens that its is internal for carrying out the destruction module of data destroying operation, other interfaces and
Functional unit is turned off.Sensor 120 can be using physical button perception or the form of periodic awakening detection chip, to reduce
Power consumption.In this way can limits promotion battery power supply system 300 power-on time.If monitoring unit 100 uses single-chip microcontroller, deposit
Storage unit 140 uses Nand-flash memory, and sensor 120 uses optical displacement sensor, is in main power supply system 200
Closed state, energy-storage battery use the battery of 5000mAh, and theoretically the data destruct system standby can reach 5 months.Main confession
Electric system 200 is used to power for data destruct system and/or battery power supply system 300, when main power supply system 200 is in opening state
When state, main power supply system 200 is used to power for data destruct system, and when the end voltage in battery power supply system 300 is lower than storage
It in the case where the voltage rating of energy battery, powers for battery power supply system 300, improves the cruising ability of data destruct system.
A kind of data destruct system provided in an embodiment of the present invention, comprising: monitoring unit, sensor and storage unit, when
When someone's opening complete machine steals storage unit, main power supply system or battery power supply system are storage unit, monitoring unit and sensing
Device provides working power, data information that can immediately in auto-destruct storage unit by monitoring unit, prevents the number of complete machine
It is believed that the leakage of breath, improves the confidentiality of the data information of complete machine.Meanwhile can be when main power supply system is in starting state
Battery power supply system charging, no replacement is required battery improve the cruising ability of data destruct system using simplicity.
Embodiment 2
As shown in figure 4, a kind of flow chart of data self-destruction method provided in an embodiment of the present invention, the method comprising the steps of
S401-S402, specific as follows:
Step S401, in the case where detecting interrupt signal, sensor sends first to monitoring unit and destroys instruction;
Step S402, in the case where receiving the first destruction instruction, monitoring unit destroys the data in storage unit.
Above-described embodiment step S402, comprising: in the case where receiving the first destruction instruction, detect main power supply system
Open and close state;Corresponding operating is carried out to storage unit and main control unit respectively according to open and close state.
Data self-destruction method provided in an embodiment of the present invention has identical with data destruct system provided by the above embodiment
Technical characteristic reach identical technical effect so also can solve identical technical problem.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
The computer program product of data self-destruction method is carried out provided by the embodiment of the present invention, including stores processor
The computer readable storage medium of executable non-volatile program code, the instruction that said program code includes can be used for executing
Previous methods method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit,
Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can
To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect
Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, of the invention
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words
The form of product embodies, which is stored in a storage medium, including some instructions use so that
One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention
State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-
Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can be with
Store the medium of program code.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art
In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention
Within the scope of.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (10)
1. a kind of data destruct system characterized by comprising monitoring unit, sensor and storage unit;
The sensor is used in the case where detecting interrupt signal, and Xiang Suoshu monitoring unit sends first and destroys instruction;
The monitoring unit is used to destroy the number in the storage unit in the case where receiving the first destruction instruction
According to.
2. data destruct system according to claim 1, which is characterized in that it further include main power supply system and main control unit,
The unlatching that the monitoring unit is also used to detect the main power supply system in the case where receiving the first destruction instruction is closed
Closed state, and corresponding operating is carried out to the storage unit and the main control unit respectively according to the open and close state.
3. data destruct system according to claim 2, which is characterized in that the monitoring unit is also used in the main confession
In the case that electric system is in close state, the data in the storage unit are destroyed;
Alternatively,
In the case where the main power supply system is in the open state, close between the monitoring unit and the main control unit
Storage bus interfaces, and destroy the data in the storage unit.
4. data destruct system according to claim 3, which is characterized in that the monitoring unit be used for receive it is described
Main control unit send second destroy instruction in the case where, that closes between the monitoring unit and the main control unit described deposits
Bus interface is stored up, and destroys the data in the storage unit.
5. data destruct system according to claim 1 or 2, which is characterized in that the monitoring unit is also used to generate pin
Time point is ruined, is generated according to the destruction time point and destroys record, and stores the destruction record.
6. data destruct system according to claim 2, which is characterized in that the monitoring unit is also used to detect the master
The end voltage of power supply system obtains the described of the main power supply system according to the comparison situation of the end voltage and starting threshold value
Open and close state.
7. data destruct system according to claim 2, which is characterized in that the main power supply system is used to be the data
Destruct system and/or battery power supply system power supply.
8. data destruct system according to claim 2, which is characterized in that it further include battery power supply system,
The battery power supply system is used in the case where the main power supply system is in close state, and is data self-destruction system
System power supply.
9. a kind of data self-destruction method characterized by comprising
In the case where detecting interrupt signal, sensor sends first to monitoring unit and destroys instruction;Receiving described
In the case that one destroys instruction, the monitoring unit destroys the data in storage unit.
10. data self-destruction method according to claim 9, which is characterized in that it is described receive it is described first destroy refer to
In the case where order, the step of monitoring unit destroys the data in storage unit, comprising:
In the case where receiving the first destruction instruction, the open and close state of main power supply system is detected;
Corresponding operating is carried out to the storage unit and main control unit respectively according to the open and close state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910513429.3A CN110210260B (en) | 2019-06-13 | 2019-06-13 | Data self-destruction system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910513429.3A CN110210260B (en) | 2019-06-13 | 2019-06-13 | Data self-destruction system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110210260A true CN110210260A (en) | 2019-09-06 |
CN110210260B CN110210260B (en) | 2020-12-08 |
Family
ID=67792537
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910513429.3A Active CN110210260B (en) | 2019-06-13 | 2019-06-13 | Data self-destruction system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110210260B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612390A (en) * | 2020-03-31 | 2020-09-01 | 上海钎劢科技设备有限公司 | Environment monitoring type storage device and method |
CN114050902A (en) * | 2021-11-10 | 2022-02-15 | 南京南瑞信息通信科技有限公司 | Key protection system and method for improving applicability of password card |
CN114077757A (en) * | 2020-08-14 | 2022-02-22 | 台山市培英职业技术学校 | Data security storage device and method |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101504630A (en) * | 2009-03-02 | 2009-08-12 | 成都市华为赛门铁克科技有限公司 | Data destroying method of memory device and memory device |
CN101634972A (en) * | 2009-09-01 | 2010-01-27 | 成都市华为赛门铁克科技有限公司 | Data protection method and data protection device of movable storage equipment and movable storage equipment |
CN201465553U (en) * | 2009-05-04 | 2010-05-12 | 同方股份有限公司 | Mobile storage device with self-destruction function |
CN101896914A (en) * | 2007-11-07 | 2010-11-24 | 高通股份有限公司 | Systems, methods, and apparatuses for erasing memory on wireless devices |
CN203013274U (en) * | 2012-12-26 | 2013-06-19 | 中国航空工业集团公司第六三一研究所 | Data self-destructive electronic hard disk |
US20140123328A1 (en) * | 2011-12-22 | 2014-05-01 | Michael Berger | Always-available embedded theft reaction subsystem |
CN103942505A (en) * | 2014-04-14 | 2014-07-23 | 立德高科(北京)数码科技有限责任公司 | Device and method for attacking current computer with unmatched hardware identity |
US20140282945A1 (en) * | 2013-03-15 | 2014-09-18 | Intel Corporation | Technologies for secure storage and use of biometric authentication information |
CN104217177A (en) * | 2013-05-31 | 2014-12-17 | 中晟国计科技有限公司 | One-computer double-network physical isolation double-display computer with switching circuit |
CN204440401U (en) * | 2015-03-26 | 2015-07-01 | 山东超越数控电子有限公司 | A kind of anti-violence disassembles computing machine |
CN105574444A (en) * | 2015-12-11 | 2016-05-11 | 无锡市同芯恒通科技有限公司 | Device for important data destruction of disassembly trigger device |
CN206209730U (en) * | 2016-11-10 | 2017-05-31 | 天津光电聚能专用通信设备有限公司 | A kind of Information Security equipment |
US20170277901A1 (en) * | 2014-08-26 | 2017-09-28 | Pahmet Llc | System and method for autonomous or remote controlled destruction of stored information or components |
CN108039951A (en) * | 2017-12-27 | 2018-05-15 | 长沙深蓝未来智能技术有限公司 | How anti-symbiotic type row be counter to separate self-desttruction equipment |
CN108241320A (en) * | 2017-12-18 | 2018-07-03 | 北京车和家信息技术有限公司 | Operating mode control method and operating mode control system |
CN109697345A (en) * | 2018-11-26 | 2019-04-30 | 维沃移动通信有限公司 | A kind of data destruction method and mobile terminal |
-
2019
- 2019-06-13 CN CN201910513429.3A patent/CN110210260B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101896914A (en) * | 2007-11-07 | 2010-11-24 | 高通股份有限公司 | Systems, methods, and apparatuses for erasing memory on wireless devices |
CN101504630A (en) * | 2009-03-02 | 2009-08-12 | 成都市华为赛门铁克科技有限公司 | Data destroying method of memory device and memory device |
CN201465553U (en) * | 2009-05-04 | 2010-05-12 | 同方股份有限公司 | Mobile storage device with self-destruction function |
CN101634972A (en) * | 2009-09-01 | 2010-01-27 | 成都市华为赛门铁克科技有限公司 | Data protection method and data protection device of movable storage equipment and movable storage equipment |
US20140123328A1 (en) * | 2011-12-22 | 2014-05-01 | Michael Berger | Always-available embedded theft reaction subsystem |
CN203013274U (en) * | 2012-12-26 | 2013-06-19 | 中国航空工业集团公司第六三一研究所 | Data self-destructive electronic hard disk |
US20140282945A1 (en) * | 2013-03-15 | 2014-09-18 | Intel Corporation | Technologies for secure storage and use of biometric authentication information |
CN104217177A (en) * | 2013-05-31 | 2014-12-17 | 中晟国计科技有限公司 | One-computer double-network physical isolation double-display computer with switching circuit |
CN103942505A (en) * | 2014-04-14 | 2014-07-23 | 立德高科(北京)数码科技有限责任公司 | Device and method for attacking current computer with unmatched hardware identity |
US20170277901A1 (en) * | 2014-08-26 | 2017-09-28 | Pahmet Llc | System and method for autonomous or remote controlled destruction of stored information or components |
CN204440401U (en) * | 2015-03-26 | 2015-07-01 | 山东超越数控电子有限公司 | A kind of anti-violence disassembles computing machine |
CN105574444A (en) * | 2015-12-11 | 2016-05-11 | 无锡市同芯恒通科技有限公司 | Device for important data destruction of disassembly trigger device |
CN206209730U (en) * | 2016-11-10 | 2017-05-31 | 天津光电聚能专用通信设备有限公司 | A kind of Information Security equipment |
CN108241320A (en) * | 2017-12-18 | 2018-07-03 | 北京车和家信息技术有限公司 | Operating mode control method and operating mode control system |
CN108039951A (en) * | 2017-12-27 | 2018-05-15 | 长沙深蓝未来智能技术有限公司 | How anti-symbiotic type row be counter to separate self-desttruction equipment |
CN109697345A (en) * | 2018-11-26 | 2019-04-30 | 维沃移动通信有限公司 | A kind of data destruction method and mobile terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612390A (en) * | 2020-03-31 | 2020-09-01 | 上海钎劢科技设备有限公司 | Environment monitoring type storage device and method |
CN111612390B (en) * | 2020-03-31 | 2022-12-06 | 上海钎劢科技设备有限公司 | Environment monitoring type storage device and method |
CN114077757A (en) * | 2020-08-14 | 2022-02-22 | 台山市培英职业技术学校 | Data security storage device and method |
CN114077757B (en) * | 2020-08-14 | 2023-12-19 | 台山市培英职业技术学校 | Data security storage device and method |
CN114050902A (en) * | 2021-11-10 | 2022-02-15 | 南京南瑞信息通信科技有限公司 | Key protection system and method for improving applicability of password card |
CN114050902B (en) * | 2021-11-10 | 2023-12-19 | 南京南瑞信息通信科技有限公司 | Key protection system and method for improving applicability of password card |
Also Published As
Publication number | Publication date |
---|---|
CN110210260B (en) | 2020-12-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110210260A (en) | Data destruct system and method | |
CN103425506B (en) | Closedown method and starting-up method and communication terminal | |
CN110316388A (en) | A kind of battery management method, cell managing device and aircraft | |
CN107566650A (en) | Solve lock control method and Related product | |
US7786695B2 (en) | Configurable battery management system with embedded SRAM in chip architecture | |
CN106786960B (en) | Charge control method, device and terminal | |
CN105426742B (en) | Mobile terminal connects computer method and device | |
CN105573372B (en) | A kind of control method and device of intelligent terminal | |
CN205477103U (en) | Intelligence thing networking safe deposit box | |
CN109088473A (en) | Battery energy management control system | |
CN110611353A (en) | Charging control method and device of intelligent door lock and intelligent door lock | |
CN105938566A (en) | Method for keeping working state of smart card entering field again and smart card | |
CN206697684U (en) | A kind of smart jack with abnormal protection | |
CN106021137A (en) | Electronic device, peripheral and method for controlling electronic device | |
CN110729788A (en) | Power supply control method, system and equipment | |
Mu et al. | Investigation and application of smart door locks based on Bluetooth control technology | |
CN205921443U (en) | Battery supply set pre -emergency electric access protection system | |
CN113323513B (en) | Power supply control method of intelligent door lock, intelligent door lock and storage medium | |
CN108306076A (en) | Battery chamber of data center air-conditioning inter-linked controlling method and system | |
CN208862626U (en) | A kind of battery energy management control system | |
CN103699857B (en) | The anti-hacking device of electronic equipment and electronic equipment | |
CN106130172A (en) | Battery supply set emergency standby power accesses protection system | |
CN107479472A (en) | Household appliances electricity consumption intelligent management system | |
CN112711320A (en) | Power switching system and method, computer readable storage medium and processor | |
CN112564229A (en) | Intelligent door and power supply system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |