CN103514390A - Method and device for data self-destroying and digital device - Google Patents

Method and device for data self-destroying and digital device Download PDF

Info

Publication number
CN103514390A
CN103514390A CN201310430771.XA CN201310430771A CN103514390A CN 103514390 A CN103514390 A CN 103514390A CN 201310430771 A CN201310430771 A CN 201310430771A CN 103514390 A CN103514390 A CN 103514390A
Authority
CN
China
Prior art keywords
fingerprint
destroying
data
self
processing module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310430771.XA
Other languages
Chinese (zh)
Inventor
吴先洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Hui teckwin Multimedia Limited
Original Assignee
吴先洪
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 吴先洪 filed Critical 吴先洪
Priority to CN201310430771.XA priority Critical patent/CN103514390A/en
Publication of CN103514390A publication Critical patent/CN103514390A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The invention relates to a method and device for data self-destroying and a digital device. The data self-destroying method comprises the steps that an input fingerprint is obtained, if the input fingerprint is matched with a self-destroying fingerprint is judged, if yes, protected data are deleted without any prompt information, when an owner is coerced to open a storage device, due to the fact that a self-destroying fingerprint for automatically destroying data in the storage device is registered in advance, as long as a finger corresponding to the self-destroying fingerprint is used for recording the fingerprint, the obtained secret data can be automatically deleted under the condition that a menacer even does not know, the menacer still thinks that operation is carried out on the condition that the owner is in cooperation without thinking that the owner once obtains the secret data, and personal safety of the owner is protected to a certain extent.

Description

Data are from destroying method, device and digital equipment
Technical field
The present invention relates to field of encryption, particularly relate to a kind of data from destroying method, device and digital equipment.
Background technology
The data encryption of digital camera, Digital Video etc. is very common function, thereby in equipment loss or unauthorized situation, by other people unauthorized access.
For example, but for some situation, when being forced, equipment everyone still need password to tell intimidator, like this, intimidator is data in fetch equipment smoothly still, bring very large threat to the proprietary personal safety of equipment.
Summary of the invention
The object of this invention is to provide a kind of data that can auto-destruct data from destroying method, device and digital equipment.
For solving the problems of the technologies described above, as first aspect of the present invention, provide a kind of data from destroying method, comprising: obtain input fingerprint; Relatively input fingerprint and whether mate from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.
Further, if do not mated, point out user typing fingerprint again.
Further, also comprise: relatively input fingerprint and whether mate with checking fingerprint, if coupling allows access protected data.
Further, also comprise: if do not mated, point out user typing fingerprint again.
As second aspect of the present invention, provide a kind of data from apparatus for destroying, comprising: fingerprint acquisition module, for obtaining input fingerprint; From destroying processing module, for relatively inputting fingerprint and whether mating from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.
Further, certainly destroy processing module and also comprise: the first Tip element, in unmatched situation, prompting user is typing fingerprint again.
Further, also comprise: whether checking processing module, have in relatively inputting fingerprint and mate with checking fingerprint, if coupling allows access protected data.
Further, checking processing module also comprises: the second Tip element, in unmatched situation, prompting user is typing fingerprint again.
As San Ge of the present invention aspect, a kind of digital equipment is provided, comprising: storage unit, for storing data and the fingerprint of destruction certainly for data being carried out certainly destroy; Also comprise that above-mentioned data are from apparatus for destroying, it obtains the fingerprint of destruction certainly of storing in storage unit.
When everyone is forced and must opens memory device; due to registered in advance for the fingerprint of destruction certainly of the data of auto-destruct memory device; therefore; only need utilization certainly to destroy the corresponding finger of fingerprint with this and carry out fingerprint typing; can be in the situation that coercing people and knowing nothing; automatically delete the secret data that it has obtained; and now coerce people, also think that everyone is the operation of carrying out in the situation that coordinating; thereby can not think that everyone once obtained secret data, may protect to a certain extent proprietary personal safety.
Accompanying drawing explanation
Fig. 1 has schematically shown process flow diagram of the present invention.
Embodiment
Below embodiments of the invention are elaborated, but the multitude of different ways that the present invention can be defined by the claims and cover is implemented.
As a first aspect of the present invention, provide a kind of data from destroying method, comprising: obtain input fingerprint; Relatively input fingerprint and whether mate from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.Preferably, if do not mated, point out user typing fingerprint again.
When everyone is forced and must opens memory device; due to registered in advance for the fingerprint of destruction certainly of the data of auto-destruct memory device; therefore; only need utilization certainly to destroy the corresponding finger of fingerprint with this and carry out fingerprint typing; can be in the situation that coercing people and knowing nothing; automatically delete the secret data that it has obtained; and now coerce people, also think that everyone is the operation of carrying out in the situation that coordinating; thereby can not think that everyone once obtained secret data, may protect to a certain extent proprietary personal safety.
Preferably, also comprise: relatively input fingerprint and whether mate with checking fingerprint, if coupling allows access protected data.Preferably, also comprise: if do not mated, point out user typing fingerprint again.
When the normal accessing storage device of needs, can use chartered checking fingerprint, after checking fingerprint is by checking, can normal visit data equipment.If passage not, can denied access, but still can retain the secret data in memory device.
As a second aspect of the present invention, provide a kind of data from apparatus for destroying, comprising: fingerprint acquisition module, for obtaining input fingerprint; From destroying processing module, for relatively inputting fingerprint and whether mating from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.
Preferably, certainly destroy processing module and also comprise: the first Tip element, in unmatched situation, prompting user is typing fingerprint again.
Preferably, also comprise: whether checking processing module, have in relatively inputting fingerprint and mate with checking fingerprint, if coupling allows access protected data.
Preferably, checking processing module also comprises: the second Tip element, in unmatched situation, prompting user is typing fingerprint again.
As a third aspect of the present invention, a kind of digital equipment is provided, comprising: storage unit, for storing data and the fingerprint of destruction certainly for data being carried out certainly destroy; Also comprise that above-mentioned data are from apparatus for destroying, it obtains the fingerprint of destruction certainly of storing in storage unit.
For example, digital equipment can refer to the various portable digital equipments of the prior art such as digital camera, video camera, recording pen, panel computer, mobile phone, notebook computer, video playback apparatus (such as MP4 etc.).
Obviously, digital equipment in the present invention, can also refer to various portable set of the prior art (such as digital camera, video camera, recording pen, panel computer, mobile phone, notebook computer, video playback apparatus (such as MP4 etc.)) and the system forming with computer that this equipment is used in conjunction with.Now, storage unit is arranged in portable set, and data are arranged in computer from apparatus for destroying.
Those skilled in the art will also understand is that, in conjunction with the described various illustrative logical blocks of disclosure herein, unit, circuit and algorithm steps, may be implemented as electronic hardware, computer software or both combinations.For this interchangeability of hardware and software is clearly described, with regard to the function of various exemplary components, square, unit, circuit and step, it has been carried out to general description.This function is implemented as software or is implemented as hardware and depends on concrete application and the design constraint that imposes on whole system.Those skilled in the art can realize described function in every way for every kind of concrete application, but this realization determines should not be interpreted as causing departing from the scope of the present invention.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (9)

1. data, from a destroying method, is characterized in that, comprising:
Obtain input fingerprint;
Whether more described input fingerprint is destroyed fingerprint with oneself and is mated, if coupling is deleted protected data in the situation that not providing any information.
2. data according to claim 1, from destroying method, is characterized in that, if do not mated, point out user typing fingerprint again.
3. data according to claim 1, from destroying method, is characterized in that, also comprise:
Whether more described input fingerprint mates with checking fingerprint, if coupling allows the described protected data of access.
4. data according to claim 1, from destroying method, is characterized in that, also comprise: if do not mated, point out user typing fingerprint again.
5. data, from an apparatus for destroying, is characterized in that, comprising:
Fingerprint acquisition module, for obtaining input fingerprint;
From destroying processing module, for more described input fingerprint, destroy fingerprint with oneself and whether mate, if coupling is deleted protected data in the situation that not providing any information.
6. data according to claim 5, from apparatus for destroying, is characterized in that, describedly also comprise from destroying processing module:
The first Tip element, in unmatched situation, prompting user is typing fingerprint again.
7. data according to claim 5, from apparatus for destroying, is characterized in that, also comprise:
Whether checking processing module, have in more described input fingerprint and mate with checking fingerprint, if coupling allows the described protected data of access.
8. data according to claim 5, from apparatus for destroying, is characterized in that, described checking processing module also comprises:
The second Tip element, in unmatched situation, prompting user is typing fingerprint again.
9. a digital equipment, is characterized in that, comprising: storage unit, for storing data and the fingerprint of destruction certainly for described data being carried out certainly destroy; Also comprise that in claim 5 to 8, the data described in any one are from apparatus for destroying, it obtains store in described storage unit described from destroying fingerprint.
CN201310430771.XA 2013-09-18 2013-09-18 Method and device for data self-destroying and digital device Pending CN103514390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310430771.XA CN103514390A (en) 2013-09-18 2013-09-18 Method and device for data self-destroying and digital device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310430771.XA CN103514390A (en) 2013-09-18 2013-09-18 Method and device for data self-destroying and digital device

Publications (1)

Publication Number Publication Date
CN103514390A true CN103514390A (en) 2014-01-15

Family

ID=49897097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310430771.XA Pending CN103514390A (en) 2013-09-18 2013-09-18 Method and device for data self-destroying and digital device

Country Status (1)

Country Link
CN (1) CN103514390A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205410A (en) * 2015-09-14 2015-12-30 维沃移动通信有限公司 Method and terminal for managing data
WO2017185464A1 (en) * 2016-04-29 2017-11-02 宇龙计算机通信科技(深圳)有限公司 Data clearing method and terminal device
CN109831300A (en) * 2017-11-23 2019-05-31 航天信息股份有限公司 A kind of cipher key destruction method and device
CN113568846A (en) * 2021-07-29 2021-10-29 联想长风科技(北京)有限公司 Method and device for destroying encrypted hard disk

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299690A (en) * 2008-06-26 2008-11-05 蓝汛网络科技(北京)有限公司 Method, system and apparatus for monitoring multimedia contents
CN102710328A (en) * 2012-04-27 2012-10-03 深圳光启创新技术有限公司 Method and system for modifying fingerprint information
CN102930194A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Data security operating system and method based on authority management and control
CN102968600A (en) * 2012-10-30 2013-03-13 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation
CN103279698A (en) * 2013-05-06 2013-09-04 天津踏浪科技股份有限公司 Electronic record keeping hand-held terminal based on fingerprint identification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299690A (en) * 2008-06-26 2008-11-05 蓝汛网络科技(北京)有限公司 Method, system and apparatus for monitoring multimedia contents
CN102710328A (en) * 2012-04-27 2012-10-03 深圳光启创新技术有限公司 Method and system for modifying fingerprint information
CN102930194A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Data security operating system and method based on authority management and control
CN102968600A (en) * 2012-10-30 2013-03-13 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation
CN103279698A (en) * 2013-05-06 2013-09-04 天津踏浪科技股份有限公司 Electronic record keeping hand-held terminal based on fingerprint identification

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205410A (en) * 2015-09-14 2015-12-30 维沃移动通信有限公司 Method and terminal for managing data
CN105205410B (en) * 2015-09-14 2018-06-26 维沃移动通信有限公司 Data managing method and terminal
WO2017185464A1 (en) * 2016-04-29 2017-11-02 宇龙计算机通信科技(深圳)有限公司 Data clearing method and terminal device
CN109831300A (en) * 2017-11-23 2019-05-31 航天信息股份有限公司 A kind of cipher key destruction method and device
CN113568846A (en) * 2021-07-29 2021-10-29 联想长风科技(北京)有限公司 Method and device for destroying encrypted hard disk

Similar Documents

Publication Publication Date Title
US20180152296A1 (en) Electronic data protection method and device and terminal device
CN105279449A (en) Context based data access control
CN103902862A (en) Mobile device management method and device and mobile device
KR101659590B1 (en) Secure deletion of data stored in a memory
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN105574418A (en) Data encryption method and apparatus
CN103377364A (en) Fingerprint verification method for electronic device and system
US9563773B2 (en) Systems and methods for securing BIOS variables
US20130254899A1 (en) Data protecting system and protecting method
CN103514390A (en) Method and device for data self-destroying and digital device
JP7105495B2 (en) Segmented key authenticator
US9043931B2 (en) USB drive with multiple printed circuit board layers for storing data in a memory
KR20140051487A (en) Device and method for protecting data in terminal
CN105631302A (en) State control method and device of mobile equipment
WO2015176531A1 (en) Terminal data writing and reading methods and devices
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
CN108287988B (en) Security management system and method for mobile terminal file
US20150020165A1 (en) System of executing application and method thereof
CN106326782A (en) Information processing method and electronic device
CN104182706B (en) A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card
US10779432B1 (en) Modular edge data center that autonomously secures information technology components, computing workload, and data in response to unexpected loss of communication
KR101559915B1 (en) A system of managing shared data in the smart phone by using couple finger-prints
CN113868702A (en) Object moving method and device
CN104065855A (en) Camera device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160108

Address after: Nanshan District Kewei road Shenzhen City, Guangdong province 518000 No. 1 kendat East Building Room 501

Applicant after: Shenzhen City Hui teckwin Multimedia Limited

Address before: 408, room 2, 198, Washington garden, Washington Road, Nanshan District, Shenzhen,, Guangdong

Applicant before: Wu Xianhong

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140115