CN102324003A - Multi-strategy self-destruction method for highly-credible embedded computer - Google Patents

Multi-strategy self-destruction method for highly-credible embedded computer Download PDF

Info

Publication number
CN102324003A
CN102324003A CN201110132632A CN201110132632A CN102324003A CN 102324003 A CN102324003 A CN 102324003A CN 201110132632 A CN201110132632 A CN 201110132632A CN 201110132632 A CN201110132632 A CN 201110132632A CN 102324003 A CN102324003 A CN 102324003A
Authority
CN
China
Prior art keywords
destruction
self
chip
module
connects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110132632A
Other languages
Chinese (zh)
Inventor
刘宏伟
舒燕君
左德承
董剑
吴智博
周海鹰
罗丹彦
张展
温东新
苗百利
钱军
李璟
梁佼
徐文芳
林成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN201110132632A priority Critical patent/CN102324003A/en
Publication of CN102324003A publication Critical patent/CN102324003A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a multi-strategy self-destruction method for a highly-credible embedded computer, belonging to the technical field of computer safety and solving the problem that the traditional self-destruction strategy of the highly-credible embedded computer can cause unnecessary self-destruction due to the fault of a manager. The self-destruction method disclosed by the invention comprises the following steps of: 1, acquiring information that a computer system is threatened through a self-destruction module, judging the threatened level according to the information that the computer system is threatened, and sending a self-destruction control command; and 2, selecting a corresponding control strategy by a multistrategy self-destruction subsystem according to the received control command of the self-destruction module, and carrying out key data destruction. The self-destruction method is suitable for safety protection of the highly-credible embedded computer.

Description

The how tactful self-destruction method of high credible embedded computing machine
Technical field
The present invention relates to the how tactful self-destruction method of a kind of high credible embedded computing machine, belong to the computer security technique field.
Background technology
The field of high credible embedded computer utility at present is very extensive, and the data of a large amount of important sensitivities can be deposited in the high credible embedded computer system of key area as required, do not hope to be stolen or revise by other people.For example be applied in the high credible embedded computing machine of commercial field, in case out of control, lose or stolen, certainly will cause leakage of data, bring loss difficult to the appraisal to enterprise, enterprise development is brought very bad influence.Therefore the computing machine embedded system is used the self-destruction technology, realize that self-destroying function is imperative.High credible embedded computing machine is for guaranteeing confidentiality and security; Need be on the hazard in security of system; When for example system identity authentification failure, system are by artificial destruction, for realizing that above-mentioned security attribute provides last guarantee, prevent someone's login of attempting to make repeated attempts through safety self-destruct technology; Use force and crack the entering system, steal the significant data of internal system.
Usually, the cost of computing machine self-destruction strategy is than higher, and the self-destruction design can influence the use of system, reduces the availability of system, therefore selects suitable self-destruction opportunity and rational self-destruction mode very necessary.If the unnecessary self-destruction of the unconscious erroneous trigger of keeper system then can cause system's devastating loss, there is very big hidden danger in this mechanism in practical application.Therefore destruct system must be avoided insignificant self-destruction, because this mistake not only influences our the normal use to this system, works as system simultaneously and falls into enemy's hand accidentally, also possibly cause serious and unpredictable loss to us.
Summary of the invention
The objective of the invention is to solve the error of the self-destruction strategy meeting of existing high credible embedded computing machine, cause the problem of unnecessary self-destruction, provide a kind of high credible embedded computing machine how tactful self-destruction method owing to the keeper.
The how tactful self-destruction method of the credible embedded computing machine of height according to the invention may further comprise the steps:
Step 1: obtain the information that computer system is on the hazard through the self-destruction module, and judge the grade of suffered threat, send the self-destruction steering order according to the information that the computer system that obtains is on the hazard;
Step 2: how tactful self-destruction subsystem is selected corresponding control strategies according to the steering order of the self-destruction module that receives, and carries out critical data and destroys.
How tactful self-destruction subsystem selects the detailed process of corresponding control strategies to be according to the steering order of the self-destruction module that receives in the step 2:
When the steering order of self-destruction module shows that computer system receives elementary threat, how tactful self-destruction subsystem () is selected data self-destruction policy module to carry out critical data to destroy;
When the steering order of self-destruction module shows that computer system receives middle rank and threatens, how tactful self-destruction subsystem () option program self-destruction policy module is carried out critical data and is destroyed;
When the steering order of self-destruction module shows that computer system receives senior threat, how tactful self-destruction subsystem () is selected electric self-destruction policy module to carry out critical data to destroy.
Advantage of the present invention is: the present invention is a kind of method that key message data in the credible embedded computing machine of height are carried out how tactful self-destruction; The inventive method can be under the situation that does not have the keeper to arrange; According to the current external world situation of living in of computer system; Automatically whether affirmation is on the hazard, and judges threat level, takes different self-destruction strategies according to the difference of threat level.It has guaranteed accuracy, promptness and the reliability of computer system self-destruction, and information security that can maintenance calculations machine system is avoided its confidential information to reveal and caused heavy losses.
The present invention has effectively guaranteed high credible embedded computing machine when going out the situation that active, destruction and information is stolen, the security of system-critical data.
Description of drawings
Fig. 1 is the process flow diagram of the inventive method;
Fig. 2 is the circuit structure diagram of the electric self-destruct circuit of the present invention, and the self-destruction signal that receives is represented in the front at conversion of signals chip place among the figure;
Fig. 3 is the schematic diagram of the electric self-destruct circuit of the present invention.
Embodiment
Embodiment one: below in conjunction with Fig. 1 this embodiment is described, the how tactful self-destruction method of the credible embedded computing machine of the said height of this embodiment, it may further comprise the steps:
Step 1: obtain the information that computer system is on the hazard through self-destruction module 1, and judge the grade of suffered threat, send the self-destruction steering order according to the information that the computer system that obtains is on the hazard;
Step 2: how tactful self-destruction subsystem 2 is selected corresponding control strategies according to the steering order of the self-destruction module 1 that receives, and carries out critical data and destroys.
When this embodiment is on the hazard in the critical data information of the credible embedded computing machine of height; Need to adopt way of hardware and software combination; To key message or parts self-destruction; It has guaranteed that computer system adopts different destruction strategies under the threat that receives different stage, strengthened the security of system and the destruction ability of system.
Embodiment two: this embodiment is described below in conjunction with Fig. 1; This embodiment is further specifying embodiment one; How tactful self-destruction subsystem 2 selects the detailed process of corresponding control strategies to be according to the steering order of the self-destruction module 1 that receives in the step 2:
When the steering order of self-destruction module 1 shows that computer system receives elementary threat, how tactful self-destruction subsystem (2) is selected data self-destruction policy module 2-1 to carry out critical data to destroy;
When the steering order of self-destruction module 1 shows that computer system receives middle rank and threatens, how tactful self-destruction subsystem (2) option program self-destruction policy module 2-2 carries out critical data and destroys;
When the steering order of self-destruction module 1 shows that computer system receives senior threat, how tactful self-destruction subsystem (2) is selected electric self-destruction policy module 2-3 to carry out critical data to destroy.
For high reliability and the security that guarantees system, generally can adopt ID authentication mechanism in the embedded system to the keeper, the threat level in this embodiment is judged according to the certification policy of system.Elementary threat in this embodiment refers to that system receives external personnel and illegally logins, and middle rank threatens the system that is meant to be used by illegal, and senior threat is meant that system suffers dismounting to wait situation such as malicious sabotage after authentication was lost efficacy.
Self-destruction module 1 is to adopt software to realize, system can send unlike signal to self-destruction module 1 when the threat that receives in various degree, through judging type, trigger different self-destruction mode (comprising the data self-destruction, program self-destruction, electric self-destruction).
When user's login was repeatedly lost efficacy, self-destruction module 1 obtained corresponding signal, is judged to be elementary threat, adopts data self-destruction policy module 2-1 to carry out the data self-destruction afterwards.
When the user in executable operations time checking repeatedly do not pass through, self-destruction module 1 obtains corresponding signal, is judged to be middle rank and threatens, and adopts program self-destruction policy module 2-2 to carry out the program self-destruction afterwards.
When system feels that through perceptron system chassis is destroyed by the people, self-destruction module 1 obtains corresponding signal, is judged to be senior threat, adopts electric self-destruction policy module 2-3 to carry out electric self-destruction afterwards.
Embodiment three: this embodiment is for to the further specifying of embodiment two, and said data self-destruction policy module 2-1 carries out critical data and destroys and be meant: the user profile in the deletion computer system, database and application program output result.
When self-destruction module 1 receives the threat information that computer system receives, know threat level automatically, when system received elementary threat, the critical data that can select data self-destruction policy module 2-1 to accomplish system was destroyed.
Said computing system adopts erasable storer to deposit critical data, when needs carry out the data self-destruction, realizes the critical data in the erasable memory chip is destroyed through programming.Can be through chip critical data zone erase mode, perhaps adopt system function to the critical data file carry out data override after the operation of deleted file again.
Come this embodiment is specifically described based on following system below: the calculating veneer of computer system adopts the embedded type CPU based on the ARM7 kernel.Except that processor, also has NOR FLASH ROM on the veneer, SDRAM and NAND FLASH ROM.Operating system and application program leave among the NOR FLASH ROM, and data file and key results are kept among the NAND FLASH ROM.That the main process chip of base plate is selected for use is the Cyclone II Series FPGA chip EP2C35F672C8N of altera corp, has adopted the SOPC technology when realizing technical scheme.Each piece veneer has oneself independently operating system, moves identical task, and delivers to base plate to task result through private bus and put to the vote, and is shifty to the critical data realization destruction of calculating veneer.
The realization of data self-destruction policy module 2-1:
The system-computed veneer has adopted the K9F2808 chip of 8 16M_8bit, is used for the storage space of expanding single plate, critical data contents such as store data storehouse, daily record in this chip.System only need carry out data destroying to this chip in data self-destruction rank.Because veneer adopts the JFFS2 file system of supporting Nand Flash; When the starting up; Automatically with file load such as daily record, databases under/mnt file, and as the extension storage chip, the critical data that calculates is kept at this document folder down with the storage mode of file.Because the JFFS2 file system supports the read-write of file, compression to separate contracting service, so the growth data file is through the program interpolation and file is carried out read-write operation carry out Data Update.Operating system is unforeseen for the specific address of file, loses more than gain if therefore also take scrub techniques that data erase is carried out in entire chip inside.Therefore adopt through base plate and send command-destruct, after veneer takes orders, file content is carried out zero data write, cover and call the deletion of delete function behind the legacy data again and leave in/ all critical data files under the mnt file.
Embodiment four: this embodiment is for to the further specifying of embodiment two or three, and said program self-destruction policy module 2-2 carries out critical data and destroys and be meant: the operating system in the destroying computer system, application program and database program.
When this embodiment threatens for receive middle rank in computer system, adopt software mode that system is taked the program self-destruction, come the key procedure in the destroying system, the method is not destroyed chip.With identical described in the embodiment three; Program leaves in the FX of erasable storage chip, when system receives the program command-destruct, starts the program of wiping; Storage area to program in the storage chip is wiped respectively, and then destroys crucial program module.
NOR FLASH ROM selects 64Mbit (8M_8bit) Intel E28F128 chip for use in the veneer, and it is mapped on the BANK0 of S3C44B0X, as storage BootLoader and linux system mirror image.In system program self-destruction strategy, wipe all information in this chip, this system just can't work.Described according to the E28F128 databook, its instruction set comprises that array reads, read states register, clear status register, write buffer memory, piece removing, chip configuration, setting/removing piece lock-bit etc.Therefore the program self-destruction of this chip operation can use piece to wipe (Block Erase) instruction realization.Wipe by piece and undertaken, the least unit of just at every turn wiping is a piece, through beginning to wipe to the piece transmission that will wipe and confirming that erase command realizes the self-destruction to critical data.The idiographic flow that piece is wiped is for sending this instruction of 0x20H to the piece that will wipe earlier, and address wire provides the address of wanting wiping block, and expression will begin to wipe; The 0x0DH that redispatches instruction, the address wire arbitrary data is confirmed erase operation.At this moment, chip E28F128 begins obliterated data voluntarily, and the data in this piece all can be by one writing.Program could continue to wipe next blocks of data after need waiting for that chip operation is accomplished.The value of service routine inquiry mode read status register SR judges whether this piece of chip wipes completion.If wipe completion, it is zero that the value of status register SR and 0x80H carry out result behind the AND-operation, the description that table 1 is detailed how to wipe a piece.
Table 1 is wiped the operation of NOR FLASH rom chip
Embodiment five: this embodiment is described below in conjunction with Fig. 2 and Fig. 3; This embodiment is for to the further specifying of embodiment two, three or four, and said electric self-destruction policy module 2-3 carries out critical data and destroys and be meant: control electric self-destruct circuit and directly objective chip 2-31 is carried out physical damage.
Because the security of data self-destruction and program self-destruction still has certain hidden danger, can not very get rid of maybe be because outside cause causes chip erase not exclusively to cause the possibility of the incomplete situation generation of self-destruction.So be stolen or system information when receiving senior threats in system, adopt the strategy that directly chip is destroyed, adopt the high pressure self-destruction of hardware supports completion key chip, carry out self-destruction more completely.In internal system high-tension circuit is set, links to each other, connect high pressure during the system self-destruction with key chip, critical component; High pressure is controlled by logic switch; Opening of crucial trigger switch destroyed the storage chip or the parts that are connected with high pressure phase, makes the critical data that system stores and the thorough damage of program; Non-renewable, system destroys.
Embodiment six: this embodiment is described below in conjunction with Fig. 2 and Fig. 3; This embodiment is further specifying embodiment five; Said electric self-destruct circuit is made up of conversion of signals chip 2-321, VCC power supply 2-322, relay 2-323, DC voltage chip 2-324, resistance 2-325 and electric capacity 2-326
The V+ pin of DC voltage chip 2-324 connects the anode connection terminal of VCC power supply 2-322; The negative pole of VCC power supply 2-322 connects termination power ground; The negative pole link of VCC power supply 2-322 connects the end of electric capacity 2-326; The other end of electric capacity 2-326 connects the end of resistance 2-325, and the other end of resistance 2-325 connects the power output end Vout of DC voltage chip 2-324, and the GND pin of DC voltage chip 2-324 connects power supply ground;
The anode connection terminal of VCC power supply 2-322 connects the end of conversion of signals chip 2-321; The other end of conversion of signals chip 2-321 connects an end of the control coil of relay 2-323, and the other end of the control coil of relay 2-323 connects the negative pole link of VCC power supply 2-322;
The anode connection terminal of VCC power supply 2-322 connects the normally closed contact of the single-pole double-throw switch (SPDT) of relay 2-323; The normally opened contact of this single-pole double-throw switch (SPDT) connects the end of resistance 2-325; The end that the end of this resistance 2-325 is connected with electric capacity 2-326 for this resistance 2-325; The power supply side Vcc1 of the moving contact linking objective chip 2-31 of this single-pole double-throw switch (SPDT), the power supply ground end GND of objective chip 2-31 connects the negative pole link of VCC power supply 2-322;
Conversion of signals chip 2-321 is used for when receiving the steering order of self-destruction module 1 at output terminal output 5v voltage.
The 5v voltage of conversion of signals chip 2-321 output can make the control coil energising of relay 2-323; Make the normally closed contact of relay 2-323 break off; Normally opened contact is closed, thereby the power supply end of objective chip 2-31 is connected with the power output end of DC voltage chip 2-324, and the voltage of this DC voltage chip 2-324 output is higher than the normal working voltage that objective chip 2-31 can bear; Therefore this objective chip 2-31 is burnt by high voltage, and then realizes the chip self-destruction.
The described electric self-destruction of this embodiment realizes that through around objective chip 2-31, designing an electric self-destruct circuit concrete electric self-destruction design is like Fig. 2.When the self-destruction module confirms to reach electric self-destruction threshold value; Adopt FPGA to send the load module of electric self-destruction signal to destruct system through self-defined pin; Make the load module of FPGA produce an output signal, the signal of this FPGA converts the 5v output voltage to through conversion of signals chip 2-321, and this output voltage is as the switch control boost module of relay 2-323; The high pressure output of the feasible chip that boosts can affact on the objective chip 2-31, thereby reaches the purpose of electric self-destruction.
Described boost module is made up of DC voltage chip 2-324, resistance 2-325 and the electric capacity 2-326 in the electric self-destruct circuit.
Embodiment seven: this embodiment is for to the further specifying of embodiment six, and conversion of signals chip 2-321 adopts the tps2013 chip to realize.
Relay 2-323:
Obtain 330v and even higher output voltage because boost module is moment by the input voltage of 3.3v, whether the security when guaranteeing the machine operate as normal is connected in the circuit by relay 2-323 control boost module in self-destruct circuit.Because boost module and DC voltage chip 2-324 need the control of relay 2-323, so relay 2-323 can select the HJR3FF-S-Z single-pole double-throw (SPDT) relay of sky wave here.
Boost module:
Boost module can be reequiped by digital camera booster circuit plate.In the module with the 400V 130A IGBT element of the special-purpose electric capacity of the 330WV220uF flashlamp of Hitachi's pin, a GT5G103 of Toshiba.When module satisfied input voltage 3.2V-5V, output voltage was 280V-350V, and capacitance parameter 330W 220uF, can satisfy the requirement that instantaneous pressure punctures chip at about 2-5 of duration of charging second.
Objective chip 2-31:
In order well to reach the minimum purpose of electric self-destruction restorability, can destroy NAND FLASH chip and NORFLASH chip, thereby reach program and the purpose of data in the comprehensive breaking space.
Embodiment eight: this embodiment is for to the further specifying of embodiment six or seven, and it is the single-pole double-throw (SPDT) relay of HJR 3FF-S-Z that relay 2-323 adopts model.

Claims (8)

1. one kind high how tactful self-destruction method of credible embedded computing machine, it is characterized in that: it may further comprise the steps:
Step 1: obtain the information that computer system is on the hazard through self-destruction module (1), and judge the grade of suffered threat, send the self-destruction steering order according to the information that the computer system that obtains is on the hazard;
Step 2: how tactful self-destruction subsystem (2)), select corresponding control strategies, carry out critical data and destroy according to the steering order of the self-destruction module (1) that receives.
2. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 1 is characterized in that: how tactful self-destruction subsystem (2) selects the detailed process of corresponding control strategies to be according to the steering order of the self-destruction module (1) that receives in the step 2:
When the steering order of self-destruction module (1) shows that computer system receives elementary threat, how tactful self-destruction subsystem (2) is selected data self-destruction policy modules (2-1) to carry out critical data to destroy;
When the steering order of self-destruction module (1) shows that computer system receives middle rank and threatens, how tactful self-destruction subsystem (2) option program self-destruction policy module (2-2) is carried out critical data and is destroyed;
When the steering order of self-destruction module (1) shows that computer system receives senior threat, how tactful self-destruction subsystem (2) is selected electric self-destruction policy module (2-3) to carry out critical data to destroy.
3. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 2 is characterized in that: said data self-destruction policy module (2-1) is carried out the critical data destruction and is meant: the user profile in the deletion computer system, database and application program output result.
4. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 2 is characterized in that: said program self-destruction policy module (2-2) is carried out the critical data destruction and is meant: the operating system in the destroying computer system, application program and database program.
5. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 2 is characterized in that: said electric self-destruction policy module (2-3) is carried out the critical data destruction and is meant: control electric self-destruct circuit and directly objective chip (2-31) is carried out physical damage.
6. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 5; It is characterized in that: said electric self-destruct circuit is made up of conversion of signals chip (2-321), VCC power supply (2-322), relay (2-323), DC voltage chip (2-324), resistance (2-325) and electric capacity (2-326)
The V+ pin of DC voltage chip (2-324) connects the anode connection terminal of VCC power supply (2-322); The negative pole of VCC power supply (2-322) connects termination power ground; The negative pole link of VCC power supply (2-322) connects an end of electric capacity (2-326); The other end of electric capacity (2-326) connects an end of resistance (2-325), and the other end of resistance (2-325) connects the power output end Vout of DC voltage chip (2-324), and the GND pin of DC voltage chip (2-324) connects power supply ground;
The anode connection terminal of VCC power supply (2-322) connects an end of conversion of signals chip (2-321); The other end of conversion of signals chip (2-321) connects an end of the control coil of relay (2-323), and the other end of the control coil of relay (2-323) connects the negative pole link of VCC power supply (2-322);
The anode connection terminal of VCC power supply (2-322) connects the normally closed contact of the single-pole double-throw switch (SPDT) of relay (2-323); The normally opened contact of this single-pole double-throw switch (SPDT) connects an end of resistance (2-325); The end that one end of this resistance (2-325) is connected with electric capacity (2-326) for this resistance (2-325); The power supply side Vcc1 of the moving contact linking objective chip (2-31) of this single-pole double-throw switch (SPDT), the power supply ground end GND of objective chip (2-31) connects the negative pole link of VCC power supply (2-322);
Conversion of signals chip (2-321) is used for when receiving the steering order of self-destruction module (1) at output terminal output 5v voltage.
7. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 6 is characterized in that: conversion of signals chip (2-321) adopts the tps2013 chip to realize.
8. the how tactful self-destruction method of the credible embedded computing machine of height according to claim 6 is characterized in that: it is the single-pole double-throw (SPDT) relay of HJR3FF-S-Z that relay (2-323) adopts model.
CN201110132632A 2011-05-20 2011-05-20 Multi-strategy self-destruction method for highly-credible embedded computer Pending CN102324003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110132632A CN102324003A (en) 2011-05-20 2011-05-20 Multi-strategy self-destruction method for highly-credible embedded computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110132632A CN102324003A (en) 2011-05-20 2011-05-20 Multi-strategy self-destruction method for highly-credible embedded computer

Publications (1)

Publication Number Publication Date
CN102324003A true CN102324003A (en) 2012-01-18

Family

ID=45451744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110132632A Pending CN102324003A (en) 2011-05-20 2011-05-20 Multi-strategy self-destruction method for highly-credible embedded computer

Country Status (1)

Country Link
CN (1) CN102324003A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679055A (en) * 2012-09-18 2014-03-26 联想(北京)有限公司 Information processing method, information processing device and electronic equipment
CN105955078A (en) * 2016-05-12 2016-09-21 哈尔滨工程大学 UUV (Unmanned Underwater Vehicle) multi-stage self-destruction method and system under exceptional conditions
CN106469278A (en) * 2015-08-20 2017-03-01 陕西千山航空电子有限责任公司 A kind of unmanned plane FDR system flying quality pin decryption method
CN106991341A (en) * 2016-09-08 2017-07-28 宜鼎国际股份有限公司 Possesses the flash memory device that entity destroys function
CN109697345A (en) * 2018-11-26 2019-04-30 维沃移动通信有限公司 A kind of data destruction method and mobile terminal
CN110281872A (en) * 2019-05-09 2019-09-27 广州优创电子有限公司 Control circuit and controller of vehicle
CN110866291A (en) * 2019-11-15 2020-03-06 北京工业大学 Waste electronic product information clearing method based on dual security mechanisms
CN112711779A (en) * 2021-01-18 2021-04-27 北京和协航电信息科技有限公司 Self-destruction circuit and electronic equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403996A (en) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 Data security protection method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403996A (en) * 2008-10-28 2009-04-08 成都市华为赛门铁克科技有限公司 Data security protection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
邱志涛等: "分布式系统层次化自毁方法及案例研究", 《计算机应用研究》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679055A (en) * 2012-09-18 2014-03-26 联想(北京)有限公司 Information processing method, information processing device and electronic equipment
CN106469278A (en) * 2015-08-20 2017-03-01 陕西千山航空电子有限责任公司 A kind of unmanned plane FDR system flying quality pin decryption method
CN105955078A (en) * 2016-05-12 2016-09-21 哈尔滨工程大学 UUV (Unmanned Underwater Vehicle) multi-stage self-destruction method and system under exceptional conditions
CN106991341A (en) * 2016-09-08 2017-07-28 宜鼎国际股份有限公司 Possesses the flash memory device that entity destroys function
CN106991341B (en) * 2016-09-08 2020-04-24 宜鼎国际股份有限公司 Flash memory device with entity destroying function
CN109697345A (en) * 2018-11-26 2019-04-30 维沃移动通信有限公司 A kind of data destruction method and mobile terminal
CN110281872A (en) * 2019-05-09 2019-09-27 广州优创电子有限公司 Control circuit and controller of vehicle
CN110866291A (en) * 2019-11-15 2020-03-06 北京工业大学 Waste electronic product information clearing method based on dual security mechanisms
CN112711779A (en) * 2021-01-18 2021-04-27 北京和协航电信息科技有限公司 Self-destruction circuit and electronic equipment
CN112711779B (en) * 2021-01-18 2024-03-29 北京和协航电信息科技有限公司 Self-destruction circuit and electronic equipment

Similar Documents

Publication Publication Date Title
CN102324003A (en) Multi-strategy self-destruction method for highly-credible embedded computer
US8856534B2 (en) Method and apparatus for secure scan of data storage device from remote server
CN101877040B (en) High-reliability computing platform
CN105550073A (en) Database backup method and system thereof
US11886595B2 (en) Computer boot method, controller, storage medium, and system
CN101980235A (en) Safe computing platform
CN102436559B (en) A kind of state switching method and system
CN108228374A (en) A kind of fault handling method of equipment, apparatus and system
US7409563B2 (en) Method and apparatus for preventing un-authorized attachment of computer peripherals
US9330282B2 (en) Instruction cards for storage devices
CN106445720A (en) Memory error recovery method and device
CN110069361A (en) Method and device for TPM (trusted platform Module) failover
CN104077083A (en) New added storage method, device and system
CN110298174A (en) Firmware management method and firmware management system
CN207281744U (en) Os starting device and system mainboard
CN102662873B (en) Device for realizing insulation blocking of storage carrier data
CN204557485U (en) A kind of privately owned cloud device reaching terminal device reduction by finger print identifying
US20180039797A1 (en) Systems and methods for dynamic external input/output port screening
WO2015127831A1 (en) Anti-intrusion method and access device
CN207742669U (en) A kind of novel computer internet information safety control
TW201250473A (en) Backup device and running method of backup device
CN104486127A (en) Redundancy trusted server management method based on trusted management unit
CN105678149A (en) Unlocking method and terminal
CN205507779U (en) Financial affairs are with theftproof computer
CN205354034U (en) Secure computer mainboard based on close algorithm of state is encrypted

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120118