CN101504630A - Data destroying method of memory device and memory device - Google Patents

Data destroying method of memory device and memory device Download PDF

Info

Publication number
CN101504630A
CN101504630A CNA2009101191240A CN200910119124A CN101504630A CN 101504630 A CN101504630 A CN 101504630A CN A2009101191240 A CNA2009101191240 A CN A2009101191240A CN 200910119124 A CN200910119124 A CN 200910119124A CN 101504630 A CN101504630 A CN 101504630A
Authority
CN
China
Prior art keywords
memory device
data
disassembled
signal
disassembling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2009101191240A
Other languages
Chinese (zh)
Inventor
申立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Digital Technologies Chengdu Co Ltd
Original Assignee
Huawei Symantec Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Symantec Technologies Co Ltd filed Critical Huawei Symantec Technologies Co Ltd
Priority to CNA2009101191240A priority Critical patent/CN101504630A/en
Publication of CN101504630A publication Critical patent/CN101504630A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method for destroying storage-device data, and a storage device. The storage device destroys data stored in the self by judging whether disassembly is legal, so that the storage device can rapidly destroy the data stored in the self when illegal disassembly is performed on the storage device outside so as to avoid data leak and effectively protect data security. In addition, as the method does not need external equipment or manpower to destroy the data, the method is simple and easy to apply.

Description

Method and memory device that a kind of storage device data is destroyed
Technical field
The present invention relates to field of computer technology, be specifically related to method and memory device that a kind of storage device data is destroyed.
Background technology
Along with informationalized development, the usable range of computing machine has also obtained popularizing greatly, nowadays most enterprises, individual etc. can utilize computing machine to carry out the work, most of data are stored in the memory device of computing machine with the form of electronic document, for example on the solid state hard disc, so to say that society of today has progressed into " with no paper at all " period." with no paper at all " improved the efficient of corporate operation or personal work really greatly, but meanwhile, brought hidden danger also for inevitably information security, individual privacy etc.
For the data that prevent to be stored on the computer memory device are revealed; prior art generally can adopt carries out method of encrypting to these data and comes protected data; for example by on the operating system aspect, encrypting with software mode; perhaps encrypt, promptly itself provide encryption function by memory device (as solid state hard disc) with hardware independently.But, data are encrypted, certainly exist the possibility that is cracked, and, even be not decrypted, can also obtain data on this memory device by the mode of disassembling memory device, for example obtain certain section important executable code in certain memory device, still there is hidden danger in data security.
Summary of the invention
Method and memory device that the embodiment of the invention provides a kind of storage device data to destroy improve data security.
The method that a kind of storage device data is destroyed comprises:
Generate the signal that memory device is disassembled;
The signal of being disassembled according to described memory device judge disassemble whether legal;
When determining described disassembling when illegally disassembling, destroy the data of being stored on the described memory device.
A kind of memory device is characterized in that, comprising:
Storage unit is used to store data;
Disassemble the signal generation unit, be used to generate the signal that memory device is disassembled;
The legitimacy judging unit, whether the signal judgement that is used for being disassembled according to the memory device of disassembling the generation of signal generation unit is disassembled legal;
The data destroying unit is used for determining to disassemble when illegally disassembling when the legitimacy judging unit, destroys the data of being stored on the described storage unit.
Whether the memory device of the embodiment of the invention is disassembled by judgement legal; the data of self storing are destroyed; make when outer bound pair memory device is illegally disassembled; memory device can be destroyed the data of self storing apace; avoid data to reveal, effectively protected safety of data, and; this scheme need not external unit or manually data destroyed, and is simple and easy to do.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the accompanying drawing of required use is done to introduce simply in will describing embodiment below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the method flow diagram that the storage device data that provides of the embodiment of the invention one is destroyed;
Fig. 2 is the structural representation of the memory device that provides of the embodiment of the invention two;
Fig. 3 is the synoptic diagram when compressing for contact spring;
Fig. 4 is the synoptic diagram when stretching for contact spring.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The method that the embodiment of the invention provides a kind of storage device data to destroy.The embodiment of the invention also provides corresponding memory device.Below be elaborated respectively.
Embodiment one,
The method that a kind of storage device data is destroyed, at first, generate the signal that memory device is disassembled, then the signal of being disassembled according to described memory device judge this disassemble whether legal, if this is disassembled is legal disassembling, then this memory device goes to normal mode of operation, if this is disassembled and is illegal disassembling, then destroys the data that this memory device self is stored.As shown in Figure 1, idiographic flow can be as follows:
101, generate the signal that memory device is disassembled, generate the signal that memory device is disassembled such as changing by the induction ambient pressure, wherein, changing the function generate the signal that memory device disassembled by the induction ambient pressure can realize by Machine Design, also can wait by sensor and realize.For example, can the variation that contact spring is responded to ambient pressure be installed on memory device, when ambient pressure changes, change the switching line state of contact spring place circuit, generate the signal that memory device is disassembled, as follows:
Method one, with the circuit at break contact spring place as normality: when ambient pressure changed, the circuit at make contact springs place generated the signal that memory device is disassembled;
At the inner contact spring of installing of memory device, make contact spring keep being connected with an end of the circuit of memory device inside, when contact spring is in compressive state, the other end of contact spring and circuit disconnects, after contact spring stretches, contact with the other end of circuit, circuit communication, after circuit is connected, the legitimacy judging unit is triggered, and whether judgement is disassembled legal, and promptly execution in step 102, that is to say, when circuit is connected, be equivalent to generate a signal that memory device is disassembled, so the legitimacy judging unit is triggered, the signal of being disassembled according to this memory device judges and whether legally disassembles that promptly execution in step 102.
Perhaps, also can adopt method two, with the circuit at make contact springs place as normality: when ambient pressure changes, the circuit at break contact spring place generates the signal that memory device is disassembled, promptly when the circuit at contact spring place disconnects, be equivalent to generate a signal that memory device is disassembled, so the legitimacy judging unit is triggered, whether judgement is disassembled legal, and promptly execution in step 102.
More than two kinds of methods, can select according to user's the demand and the characteristics of memory device, certainly, if with " circuit at make contact springs place " words as normality, because the most of the time circuit is to be in channel status, thus more electric energy will be consumed, therefore, comparatively speaking, have more superiority with " circuit at break contact spring place " as normality.
102, the signal of being disassembled according to this memory device is judged the current disassembling (behavior of disassembling in other words, the operation of disassembling in other words) whether legal, for example, can adopt modes such as finger print identifying, wireless key authentication, also can adopt standard A TA agreement (AT Attachment, optional equipment on the AT computing machine) SECURITY in (safely) carries out legitimacy and judges, promptly judge in the default time period and whether receive the legal password of disassembling, if, then determine to disassemble to legal and disassemble, this memory device goes to normal mode of operation; If not, then determine to disassemble for illegally disassembling execution in step 103.
With the ATA protocol mode is the example explanation.The ATA standard contains the security setting password, the security release, security is freezed to lock and security forbids that password etc. relates to the standard and the agreement of data security, restrict access aspect.Memory device can use the order of stipulating in the ATA agreement, or adopts custom command, carries out legitimacy and judges.When memory device at the appointed time in the section, receive the legal password of disassembling that main frame sends, and the password password is correct, assert that then it is legal this time disassembling; Otherwise if do not receive the security command that main frame sends in the section at the appointed time, or password is repeatedly illegal, all regards as illegal.Perhaps the user is directly to the legal password of disassembling of this memory device input.Can be judge to produce behind the signal of disassembling whether receive the legal password of disassembling in the Preset Time section in the application, judge that also whether the signal disassembled is to produce in receiving legal Preset Time after disassembling password.
Wherein, password can be authentication information such as administrator's password or user cipher, also can be fingerprint authentication information or wireless key authentication information etc.
103, destroy the data that this memory device self is stored, also can be called data self-destruction (Self-destruction, self-destruction); For example, can wipe the storage area that stores data, and, can fill the storage area of wiping with insignificant field; Specifically can realize by the Control Software in the memory device, also can be by hardware independently, perhaps hardware and Control Software cooperate or the like and to realize.Wherein, when data are destroyed, can delete all data of being stored on this memory device, also can delete the data of predetermined storage area on this memory device, for example deletion also can realize by the wiping data.
Certainly, before step 101, can also accept the setting of user, then, when needs are destroyed data (step 103), just can destroy the data of self storing according to the data attribute that the user is provided with to the data attribute; Wherein, the setting of data attribute is meant which data the user can set up on their own and belong to critical data; the data that promptly need protection like this, are judged when memory device and to be disassembled when illegally disassembling; just only can destroy these critical datas, rather than destroy the total data of self storing.It should be noted that the said data of the embodiment of the invention not only refer to storage user data in the memory device, can also comprise the firmware code of memory device self or the internal data of memory device etc. simultaneously.The user can pass through self-defining ata command, and the data of specifying some LBA (Logical Block Addressing) (LBA, Logical Block Addressing) address to deposit are critical data, also the firmware code or the internal data of memory device self can be appointed as critical data.
In addition, this memory device is specifically as follows solid state hard disc (SSD, Solid State Disk), portable hard drive etc., also can be other the equipment that need protect the data of self storing.
Whether the memory device of present embodiment is disassembled by judgement legal; the data of self storing are destroyed; make when outer bound pair memory device is illegally disassembled; memory device can be destroyed the data of self storing apace; avoid data to reveal; effectively protected safety of data; and; this scheme need not external unit or manually data is destroyed; simple and easy to do; be that the useful of encipherment scheme that prior art is mentioned replenished, help the protection of information security and individual privacy etc.
Embodiment two,
In order to implement above method better, the embodiment of the invention also correspondingly provides a kind of memory device, and as shown in Figure 2, this memory device comprises storage unit 200, disassembles signal generation unit 201, legitimacy judging unit 202 and data destroying unit 203;
Storage unit 200 is used to store data;
Disassemble signal generation unit 201, be used to generate the signal that memory device is disassembled;
Legitimacy judging unit 202, whether the signal judgement that is used for being disassembled according to the memory device of disassembling the generation of signal generation unit is disassembled legal; For example can after receiving the signal that memory device disassembled, start timer, according in the default time period, whether receive legal disassemble password judge disassemble whether legal;
Data destroying unit 203 is used for determining to disassemble when illegally disassembling when legitimacy judging unit 202, destroys the data of self storing, i.e. storage unit 200 data of being stored; For example, can wipe the storage area that stores data, and the storage area of wiping be filled with insignificant field; Specifically can realize by the Control Software in the memory device, also can be by hardware independently, perhaps hardware and Control Software cooperate or the like and to realize.Wherein, when data are destroyed, can delete all data of being stored on this memory device, also can delete the data of predetermined storage area on this memory device.It should be noted that the said data of the embodiment of the invention not only refer to storage user data in the memory device, also comprise firmware, internal data of memory device self etc. simultaneously.Data destroying unit 203 specifically can be realized by the Control Software in the memory device, also can be by hardware independently, and perhaps hardware and Control Software cooperate or the like and to realize.
Wherein, as shown in Figure 2, the described signal generation unit 201 of disassembling is specifically as follows pressure sensitive (PressSensor) device;
Described pressure sensitive device is used to respond to ambient pressure to be changed, and the signal according to the variation generation memory device of the ambient pressure of sensing is disassembled so that trigger legitimacy judging unit 202, for example triggers legitimacy judging unit 202 by start-up circuit.
This pressure sensitive device specifically can wait by sensor and realize, also can realize by Machine Design, for example, this pressure sensitive device can comprise at least one (several) contact spring, when ambient pressure changes, the circuit at make contact springs place generates the signal that memory device is disassembled, specifically can be as follows:
At the key position of memory device inside at least one contact spring is installed, described contact spring keeps being connected with an end of the circuit of memory device inside, when contact spring is in compressive state, the other end of contact spring and circuit disconnects, after contact spring stretches, contact with the other end of circuit, with circuit communication, to trigger legitimacy judging unit 202.Wherein, key position refers to the position that need touch when disassembling shell, for example the positions such as point of fixity of shell.The quantity of contact spring can be accepted or rejected according to the concrete structure of memory device.
Certainly, also can be to adopt another kind of scheme: when ambient pressure changed, the circuit at break contact spring place generates the signal that memory device is disassembled, and implementation and top similar is no longer burdensome at this.
Wherein, as shown in Figure 2, described legitimacy judging unit 202 can comprise timer 2 021, legitimacy decision package 2022 and password receiving element 2023;
Timer 2 021 is used for starting the time of user preset when disassembling signal generation unit 201 and generate the signal that memory devices are disassembled; Mode regularly can adopt by the mode of successively decreasing or increasing progressively, and for example, be the time of user preset start-up time, and successively decreasing until the time then is 0, and perhaps, be 0 start-up time, increases progressively the time until user preset then.
Legitimacy decision package 2022, be used to judge whether password receiving element 2023 receives the legal password of disassembling in the time period that timer 2 021 is preset, if, then determine to disassemble and disassemble to legal, memory device goes to normal mode of operation, if not, then determine to disassemble for illegally disassembling, trigger data is destroyed unit 203.
Password receiving element 2023 is used to receive and disassembles legal password.Password receiving element 2023 receives that main frame sends disassembles legal password or receives the user directly to the legal password of disassembling of memory device input.Wherein, password can be authentication information such as administrator's password or user cipher, also can be fingerprint authentication information or wireless key authentication information etc.
Wherein, as shown in Figure 2, this memory device can also comprise that attribute is provided with unit 204;
Attribute is provided with unit 204, is used to accept the setting of user to the data attribute; Wherein, the setting of data attribute is meant which data the user can set up on their own and belong to critical data, the data that promptly need protection like this, are judged when legitimacy judging unit 202 and to be disassembled when illegally disassembling, just only can destroy these critical datas, rather than destroy the total data of self storing; The user can pass through self-defining ata command, and the data of specifying some LBA address to deposit are critical data, also firmware, the internal data of memory device self can be appointed as critical data.
Described data destroying unit 203, also be used for determining to disassemble when illegal when legitimacy judging unit 202, according to attribute the set data attribute of being accepted unit 204 of user is set and destroys the data of being stored on this memory device, promptly the set data attribute of being accepted unit 204 of user is set and destroys the data of being stored on the storage unit 200 according to attribute.
This memory device is specifically as follows solid state hard disc, portable hard drive etc., also can be other the equipment that need protect the data of self storing.
The memory device employing of present embodiment will be disassembled signal generation unit 201 and will be embedded in memory device inside; as the trigger condition of destroying critical data; when satisfying trigger condition; the data that 203 pairs of these memory devices in data destroying unit are stored are destroyed; make when outer bound pair memory device is illegally disassembled; memory device can be destroyed the data of self storing apace; avoid data to reveal; effectively protected safety of data; and this scheme need not external unit or manually data destroyed, and is simple and easy to do; be that the useful of encipherment scheme that prior art is mentioned replenished, help the protection of information security and individual privacy etc.
Embodiment three,
Below will be that solid state hard disc is that example is described in further detail with the memory device described in the embodiment two.
Disassemble signal generation unit 201, legitimacy judging unit 202 and data destroying unit 203 inner the increasing of existing solid state hard disc; Catch the variation of solid state hard disc shell shape by disassembling signal generation unit 201, determine with this whether solid state hard disc is disassembled; When definite solid state hard disc is disassembled, start internal circuit (being equivalent to generate the signal that a memory device is disassembled), by legitimacy judging unit 202 judge current disassemble whether legal, when determining illegally to disassemble, trigger data is destroyed unit 203, and the critical data in this solid state hard disc is destroyed fast.
Because when disassembling solid state hard disc, solid state hard disc may not have externally fed, so solid state hard disc needs can self-power supply, for example can carry battery etc., could guarantee is not having under the situation of externally fed, and inner each unit of solid state hard disc can also normal operation, in view of the solid state hard disc volume little, can't carry capacity, battery that volume is bigger, so it is low as much as possible to require to disassemble the energy consumption of signal generation unit 201, consumes energy not even.For this reason, present embodiment adopts contact spring as the critical component of disassembling the pressure sensitive device in the signal generation unit 201.
Contact spring keeps being connected with an end of the circuit of solid state hard disc inside, and when contact spring was in compressive state, the other end of contact spring and circuit disconnected, and after contact spring stretches, contacted with the other end of circuit, with circuit communication.Referring to Fig. 3 and Fig. 4, the synoptic diagram the when synoptic diagram when Fig. 3 compresses for contact spring, Fig. 4 stretch for contact spring, when being applied on the contact spring, circuit is disconnected as pressure (arrow among Fig. 3 is represented downward pressure), and this moment, circuit was in off state; When pressure disappeared, contact spring stretched, and circuit is connected, and this moment, circuit was in channel status.
At the key position of solid state hard disc inside a plurality of contact springs are installed; When the external world disassembled shell, contact spring will be upspring, and with circuit communication, thereby realized the induction seizure that shell shape changes.Adopt contact spring, the advantage that having energy consumption consumption is zero, cost is low, when the shell shape no change, circuit is not connected, and it is in running order that do not have any device this moment, noenergy consumption.
After circuit was connected, legitimacy judging unit 202 started, and whether judgement is disassembled legal.Specifically can adopt the SECURITY in the standard A TA agreement to carry out the legitimacy judgement, as follows:
Legitimacy judging unit 202 is when starting, timer 2 021 in the legitimacy judging unit 202 starts the time of user preset, password receiving element 2023 is waited for the extraneous legal password of the disassembling (authentication information such as user cipher or administrator's password of importing on main frame, perhaps finger print identifying information, perhaps wireless key authentication information etc.), if in timer official hour section, be in the time period of user preset, receive the legal password of disassembling (promptly the external world has inputed correct password), then 2022 judgements of legitimacy decision package are this time disassembled to legal and are disassembled, solid state hard disc jumps to normal mode of operation, otherwise, if password receiving element 2023 does not receive the legal password of disassembling (promptly the external world does not input correct password) in the time period of user preset, then 2022 judgements of legitimacy decision package are this time disassembled to illegally disassembling, and jump to data destroying unit 203 and handle.
The user can be according to the demand of self, by self-defining ata command, the data of specifying some LBA address to deposit are critical data, perhaps with the firmware of solid state hard disc self, internal data is appointed as critical data, attribute is provided with unit 204 and accepts the setting of user to critical data, afterwards, when the external world disassembles solid state hard disc, and legitimacy judging unit 202 judges that this disassembles when illegally disassembling, data destroying unit 203 will be wiped at the storage area that stores critical data, and, can fill these storage areas of wiping with insignificant field.
It should be noted that data protection is that requirement is all effective when having or not extraneous power supply to power, therefore, solid state hard disc need provide power supply for oneself.For solid state hard disc, storage medium is FLASH (flash memory) particle; Its piece erasing time is generally about 2 milliseconds.Less in the critical data amount, for example under the situation of tens M data volumes, with the data repetitive erasing, and fill with nonsignificant data, the time that is consumed is second level, therefore, can adopt the bigger common electrical of capacity perhaps the less button cell of volume can meet the demands.Electric capacity or button cell are embedded in solid state hard disc inside, charging when solid state hard disc uses for the first time, and whether the electric weight of all judging electric capacity or button cell when each the use is sufficient, if it is inadequate, then charging once more, to guarantee that electric capacity or button cell have enough electric weight, so that after the circuit connection, electric capacity or button cell can provide power supply for solid state hard disc.
It should be noted that, present embodiment only with in-built electrical in solid state hard disc perhaps button cell as the power supply example, should be understood that, except such scheme, can also adopt other modes realize the power supply.
In addition, present embodiment mainly is as normality with " circuit at break contact spring place ", promptly when ambient pressure changes, the signal that the circuit at make contact springs place is disassembled with the generation memory device is that example describes, should be understood that, during enforcement, can also be with " circuit at make contact springs place " as normality, promptly when ambient pressure changes, the circuit at break contact spring place is to generate the signal that memory device is disassembled, that is to say, when ambient pressure changes, can also be with the circuit at break contact spring place as carrying out the trigger condition that legitimacy is judged to disassembling.Certainly, if with " circuit at make contact springs place " as normality, because the most of the time circuit is to be in channel status, so will consume more electric energy, therefore, comparatively speaking, have more superiority as normality with " circuit at break contact spring place ".
The embodiment of the invention adopts the pressure sensitive device is embedded in memory device inside; catch the variation of self shell with this; simultaneously; shell is changed as carrying out the trigger condition that legitimacy is judged; when satisfying trigger condition; this memory device start-up circuit; legitimacy is carried out in current disassembling judge, when determining illegally to disassemble, then destroy critical data; for example the storage area at critical data place is deleted; make that this memory device can be destroyed critical data apace when this memory device of outer bound pair is illegally disassembled, avoid critical data to reveal; effectively protected the security of critical data; and this scheme need not external unit or manually data destroyed, and is simple and easy to do; be that the useful of encipherment scheme that prior art is mentioned replenished, help the protection of information security and individual privacy etc.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of the foregoing description is to instruct relevant hardware to finish by program, this program can be stored in the computer-readable recording medium, storage medium can comprise: ROM (read-only memory) (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc.
More than a kind of storage device data is destroyed to the embodiment of the invention provided method and memory device be described in detail, used specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (13)

1, a kind of method of storage device data destruction is characterized in that, comprising:
Generate the signal that memory device is disassembled;
The signal of being disassembled according to described memory device judge disassemble whether legal;
When determining described disassembling when illegally disassembling, destroy the data of being stored on the described memory device.
2, method according to claim 1 is characterized in that, the signal that described generation memory device is disassembled is:
Change the signal that the generation memory device is disassembled by the induction ambient pressure.
3, method according to claim 2 is characterized in that, the described signal of being disassembled by induction ambient pressure variation generation memory device is:
When ambient pressure changes, change the switching line state of the contact spring place circuit of installing on the described memory device, generate the signal that memory device is disassembled.
4, method according to claim 3 is characterized in that, the described switching line state that when ambient pressure changes, changes the contact spring place circuit of installing on the described memory device, and the signal that the generation memory device is disassembled comprises:
When ambient pressure changed, the circuit at make contact springs place generated the signal that memory device is disassembled; Perhaps
When ambient pressure changed, the circuit at break contact spring place generated the signal that memory device is disassembled.
5, method according to claim 1 is characterized in that, whether legal comprising disassembled in described judgement:
Whether judgement receives the legal password of disassembling in the default time period;
If not, then determine to disassemble to illegally disassembling.
According to each described method in the claim 1 to 5, it is characterized in that 6, the data of being stored on this memory device of described destruction are:
Delete all data of being stored on the described memory device, perhaps delete the data of predetermined storage area on the described memory device.
7, method according to claim 1 is characterized in that, also comprises:
Accept the setting of user to the data attribute;
When destroying the data of being stored on this memory device, destroy the data of being stored on the described memory device according to the data attribute that the user is provided with.
8, a kind of memory device is characterized in that, comprising:
Storage unit is used to store data;
Disassemble the signal generation unit, be used to generate the signal that memory device is disassembled;
The legitimacy judging unit, whether the signal judgement that is used for being disassembled according to the memory device of disassembling the generation of signal generation unit is disassembled legal;
The data destroying unit is used for determining to disassemble when illegally disassembling when the legitimacy judging unit, destroys the data of being stored on the described storage unit.
9, memory device according to claim 8 is characterized in that, the described signal generation unit of disassembling is specially the pressure sensitive device, is used to respond to ambient pressure and changes, and generates the signal that memory device is disassembled according to the variation of the ambient pressure of sensing.
10, memory device according to claim 9 is characterized in that, described pressure sensitive device comprises a contact spring at least, and when ambient pressure changed, the circuit at make contact springs place generated the signal that memory device is disassembled.
11, memory device according to claim 9 is characterized in that, described pressure sensitive device comprises a contact spring at least, and when ambient pressure changed, the circuit at break contact spring place generated the signal that memory device is disassembled.
12, memory device according to claim 8 is characterized in that, described legitimacy judging unit comprises:
Timer is used for starting the time of user preset when disassembling the signal generation unit and generate the signal that memory device disassembled;
The password receiving element is used to receive and disassembles legal password;
The legitimacy decision package is used to judge whether the password receiving element receives the legal password of disassembling in the time period that timer is preset, if, then determine to disassemble and disassemble to legal, if not, then determine to disassemble to illegally disassembling.
13, according to Claim 8 to 12 each described memory devices, it is characterized in that, also comprise:
Attribute is provided with the unit, is used to accept the setting of user to the data attribute;
Described data destroying unit also is used for determining to disassemble when illegal when the legitimacy judging unit, according to attribute the set data attribute of accepting the unit of user is set and destroys the data of being stored on the described storage unit.
CNA2009101191240A 2009-03-02 2009-03-02 Data destroying method of memory device and memory device Pending CN101504630A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2009101191240A CN101504630A (en) 2009-03-02 2009-03-02 Data destroying method of memory device and memory device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2009101191240A CN101504630A (en) 2009-03-02 2009-03-02 Data destroying method of memory device and memory device

Publications (1)

Publication Number Publication Date
CN101504630A true CN101504630A (en) 2009-08-12

Family

ID=40976882

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2009101191240A Pending CN101504630A (en) 2009-03-02 2009-03-02 Data destroying method of memory device and memory device

Country Status (1)

Country Link
CN (1) CN101504630A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937404A (en) * 2010-09-07 2011-01-05 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
CN102420856A (en) * 2011-11-17 2012-04-18 杭州华三通信技术有限公司 Data processing method and equipment
CN102682241A (en) * 2011-03-10 2012-09-19 研祥智能科技股份有限公司 Electronic equipment and method and system for protecting data of same
CN105426784A (en) * 2015-11-05 2016-03-23 天津津航计算技术研究所 Solid state disk data destruction system
CN105447418A (en) * 2016-01-04 2016-03-30 成都卫士通信息产业股份有限公司 Secret key safety protection equipment and working method thereof
CN105836568A (en) * 2016-05-25 2016-08-10 芜湖金欧机械制造有限公司 Anti-falling lifting device
CN105955078A (en) * 2016-05-12 2016-09-21 哈尔滨工程大学 UUV (Unmanned Underwater Vehicle) multi-stage self-destruction method and system under exceptional conditions
CN103971068B (en) * 2014-05-06 2017-05-24 广州市华标科技发展有限公司 CPU chip core technology protection device and method and electronic device
CN106778373A (en) * 2017-01-10 2017-05-31 浙江大学 Data storage device, data protection system and its application method
CN106919863A (en) * 2017-02-21 2017-07-04 联想长风科技(北京)有限公司 A kind of self-destruction hard disk unit
CN107681838A (en) * 2016-08-02 2018-02-09 发那科株式会社 Encoder and electric motor system
CN109086632A (en) * 2018-07-25 2018-12-25 北京智芯微电子科技有限公司 Chip data protects system and method
CN109489507A (en) * 2018-12-12 2019-03-19 中国人民解放军海军工程大学 Self-desttruction equipment based on in-line arrangement fuse
CN110210260A (en) * 2019-06-13 2019-09-06 深圳市风云实业有限公司 Data destruct system and method
CN111563280A (en) * 2020-05-06 2020-08-21 杭州锘崴信息科技有限公司 Secure computing system and method of operating the same

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937404A (en) * 2010-09-07 2011-01-05 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
CN102682241A (en) * 2011-03-10 2012-09-19 研祥智能科技股份有限公司 Electronic equipment and method and system for protecting data of same
CN102682241B (en) * 2011-03-10 2016-10-19 研祥智能科技股份有限公司 A kind of electronic equipment and the guard method of data thereof and system
CN102420856A (en) * 2011-11-17 2012-04-18 杭州华三通信技术有限公司 Data processing method and equipment
CN102420856B (en) * 2011-11-17 2014-10-29 杭州华三通信技术有限公司 Data processing method and equipment
CN103971068B (en) * 2014-05-06 2017-05-24 广州市华标科技发展有限公司 CPU chip core technology protection device and method and electronic device
CN105426784A (en) * 2015-11-05 2016-03-23 天津津航计算技术研究所 Solid state disk data destruction system
CN105447418A (en) * 2016-01-04 2016-03-30 成都卫士通信息产业股份有限公司 Secret key safety protection equipment and working method thereof
CN105955078A (en) * 2016-05-12 2016-09-21 哈尔滨工程大学 UUV (Unmanned Underwater Vehicle) multi-stage self-destruction method and system under exceptional conditions
CN105836568A (en) * 2016-05-25 2016-08-10 芜湖金欧机械制造有限公司 Anti-falling lifting device
CN107681838A (en) * 2016-08-02 2018-02-09 发那科株式会社 Encoder and electric motor system
CN107681838B (en) * 2016-08-02 2021-06-04 发那科株式会社 Encoder and motor system
CN106778373A (en) * 2017-01-10 2017-05-31 浙江大学 Data storage device, data protection system and its application method
CN106919863A (en) * 2017-02-21 2017-07-04 联想长风科技(北京)有限公司 A kind of self-destruction hard disk unit
CN109086632A (en) * 2018-07-25 2018-12-25 北京智芯微电子科技有限公司 Chip data protects system and method
CN109489507A (en) * 2018-12-12 2019-03-19 中国人民解放军海军工程大学 Self-desttruction equipment based on in-line arrangement fuse
CN109489507B (en) * 2018-12-12 2023-11-03 中国人民解放军海军工程大学 Self-destruction device based on in-line fuze
CN110210260A (en) * 2019-06-13 2019-09-06 深圳市风云实业有限公司 Data destruct system and method
CN111563280A (en) * 2020-05-06 2020-08-21 杭州锘崴信息科技有限公司 Secure computing system and method of operating the same
CN111563280B (en) * 2020-05-06 2023-12-05 杭州锘崴信息科技有限公司 Secure computing system and method of operating the same

Similar Documents

Publication Publication Date Title
CN101504630A (en) Data destroying method of memory device and memory device
US9967252B2 (en) Secure storage device with automatic command filtering
KR101176692B1 (en) Mass storage device with near field communications
US9792446B2 (en) System and method for protecting data stored on a removable data storage device
EP2367135B1 (en) Adapter for portable storage medium and method of disabling data access
TW201009581A (en) Method and system for protecting data
JP6410828B2 (en) Storage system having security storage device and management method thereof
CN202694329U (en) Wireless storage equipment
KR100988414B1 (en) Data security apparatus
TW202009717A (en) Storage device and program
US20230066750A1 (en) Control of A Computer System in A Power-Down State
CN101937404B (en) Control method for accessing computer memory and computer thereof
CN101673248B (en) Storage system, controller and data protection method
CN202771533U (en) Encryption keyboard and self-service device utilizing the same
CN201812500U (en) Removable storage device
US11586775B2 (en) Securing data
KR20200063535A (en) Server and method for determining the integrity of the appliacion using thereof
CN110310108B (en) Novel self-destruction hardware wallet with dismantling machine
CN101655908A (en) Subscriber verification method and apparatus
KR101549014B1 (en) External storage apparatus for executing user authentication using tag
KR101736444B1 (en) Computing system
CN103020509A (en) Terminal equipment encryption and decryption method, device and terminal equipment
JP5767657B2 (en) Method and computer for protecting data stored in non-volatile memory
CN102034054A (en) Information authentication system
US20120047582A1 (en) Data deleting method for computer storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090812