CN105989310B - A kind of data destruction method and system - Google Patents

A kind of data destruction method and system Download PDF

Info

Publication number
CN105989310B
CN105989310B CN201510094739.8A CN201510094739A CN105989310B CN 105989310 B CN105989310 B CN 105989310B CN 201510094739 A CN201510094739 A CN 201510094739A CN 105989310 B CN105989310 B CN 105989310B
Authority
CN
China
Prior art keywords
data
electronic equipment
currently monitored
destroyed
destruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510094739.8A
Other languages
Chinese (zh)
Other versions
CN105989310A (en
Inventor
赵懿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510094739.8A priority Critical patent/CN105989310B/en
Publication of CN105989310A publication Critical patent/CN105989310A/en
Application granted granted Critical
Publication of CN105989310B publication Critical patent/CN105989310B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

This application provides a kind of data destruction method and systems, applied to electronic equipment, in practical applications, by obtaining the currently monitored data of the electronic equipment in real time, and when determining that the current monitoring data meet preset condition, it controls the electronic equipment and enters BIOS state, later, it is handled using to be destroyed data of the destruction program prestored to default store path, and restarts electronic equipment after having handled, to realize the thorough destruction to data to be destroyed, speed is very fast;Moreover, the data destroying process is completed under BIOS state, it will not will destroy object and its process shows, carry out data destroying, unhidden and used time longer technical problem to solve and crush software using file in the prior art.

Description

A kind of data destruction method and system
Technical field
The invention mainly relates to data destroying technical fields, more particularly to a kind of data destruction method and are System.
Background technique
With the development of information technology, electronic equipment is applied to all trades and professions more and more widely, at the same time, data letter The security maintenance of breath is also more and more important.Thus, in practical applications, when computer or other electronic equipments are being thrown aside, turned Before selling or donating, in order to avoid causing country, enterprise or the heavy losses of individual because of information leakage, it is necessary to set these electronics Standby interior all data complete deletions, and can not restore, i.e., data are thoroughly destroyed.
It has been found that currently used data destruction method is usually to utilize file to crush software to complete, specifically, working as When user determines that certain data need to destroy, will starting this document crush software the data are destroyed, it is seen then that it is existing this Kind data destruction method must be operated before the data display interface of electronic equipment by user, not have concealment, moreover, File crush the used time it is longer, when the data volume that needs especially are destroyed is larger, existing this data destruction method without The quick destruction of method realization data.
Summary of the invention
In view of this, solving the present invention provides a kind of data destruction method and system and utilizing file in the prior art Crush the method for software realization data destroying Destruction is not hidden and used time longer technical problem.
To achieve the goals above, this application provides following technical schemes:
A kind of data destruction method is applied to electronic equipment, which comprises
The currently monitored data of the electronic equipment are obtained in real time;
When the currently monitored data meet preset condition, controls the electronic equipment and enter BIOS state;
It is handled using to be destroyed data of the destruction program prestored to default store path;
The electronic equipment is restarted after complete to the data processing to be destroyed.
Preferably, the currently monitored data meet preset condition specifically:
Determine that the electronic equipment receives the data destroying request of user's input based on the currently monitored data;
Then the control electronic equipment enters BIOS state specifically:
By triggering default hot key, controls the electronic equipment and restart and enter BIOS state.
Preferably, the currently monitored data meet preset condition specifically:
Determine the electronic equipment by illegal invasion based on the currently monitored data.
Preferably, it is described using to be destroyed data of the destruction program prestored to default store path carry out processing include:
The file system of the electronic equipment is analyzed using the destruction program prestored;
The region block of the corresponding hard disk of data to be destroyed is searched based on preset store path;
Junk data is written to the region block found.
Preferably, the method also includes:
When the currently monitored data meet preset condition, the first prompt information is exported.
A kind of data destroying system is applied to electronic equipment, the system comprises:
Module is obtained, for obtaining the currently monitored data of the electronic equipment in real time;
First control module, for when the currently monitored data meet preset condition, control the electronic equipment into Enter BIOS state;
Processing module, for being handled using to be destroyed data of the destruction program prestored to default store path;
Second control module, for restarting the electronic equipment after the data processing to be destroyed is complete.
Preferably, first control module includes:
First determines receiving unit, for determining whether the electronic equipment receives use based on the currently monitored data The data destroying request of family input;
First control unit, for determining that the electronic equipment receives legitimate user's input in first determination unit Data destroying request when, control the electronic equipment by triggering default hot key and restart and enter BIOS state.
Preferably, first control module includes:
Second determination unit, for determining the electronic equipment whether by illegal invasion based on the currently monitored data;
Second control unit, for controlling when second determination unit determines the electronic equipment by illegal invasion The electronic equipment enters BIOS state.
Preferably, the processing module includes:
Analytical unit, for analyzing the file system of the electronic equipment using the destruction program prestored;
Searching unit, for searching the region block of the corresponding hard disk of data to be destroyed based on preset store path;
Writing unit, for junk data to be written to the region block found.
Preferably, the system also includes:
Cue module, for exporting the first prompt information when the currently monitored data meet preset condition.
It can be seen that compared with prior art, this application provides a kind of data destruction method and systems, it is applied to electronics Equipment, in practical applications, by obtaining the currently monitored data of the electronic equipment in real time, once it is determined that the currently monitored number When according to meeting preset condition, that is, can control the electronic equipment enter BIOS (Basic Input Output System, it is substantially defeated Enter output system) state, at this point, the data to be destroyed of default store path are handled using the destruction program prestored, Electronic equipment is restarted after having handled can be completed thorough destruction to data to be destroyed, and speed is very fast;Moreover, the data destroying Process is completed under BIOS state, will not will destroy object and its process shows, to solve in the prior art Software is crushed using file and carries out data destroying, unhidden and used time longer technical problem.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of data destruction method embodiment of the present invention;
Fig. 2 is the part flow diagram of another data destruction method embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data destroying system embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of data destroying system specific embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another data destroying system specific embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another data destroying system specific embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
This application provides a kind of data destruction method and systems, are applied to electronic equipment and pass through reality in practical applications When obtain the currently monitored data of the electronic equipment, once it is determined that when the current monitoring data meet preset condition, i.e., controllably It makes the electronic equipment and enters BIOS (Basic Input Output System, basic input output system) state, at this point, can It is handled using to be destroyed data of the destruction program prestored to default store path, restarts electronic equipment after having handled The thorough destruction to data to be destroyed is completed, speed is very fast;Moreover, the data destroying process is completed under BIOS state , it will not will destroy object and its process shows, be counted to solve and crush software using file in the prior art According to destruction, unhidden and used time longer technical problem.
A kind of flow diagram of data destruction method embodiment of the present invention shown in referring to Fig.1, this method can be applied to Electronic equipment, such as computer, then specific steps of data destruction method provided by the present embodiment can include:
Step S110: the currently monitored data of electronic equipment are obtained in real time.
Wherein, acquired the currently monitored data can be the action message of the electronic equipment component, that is to say, that this Embodiment can carry out real-time monitoring, when user operates the component, the component by certain component to the electronic equipment Corresponding operational order will be exported, at this point, the currently monitored data in step S110 are specifically as follows the operation of component output Instruction, and the operational order is for indicating that user operates the component.
Certainly, the present embodiment can also carry out real-time monitoring to certain communication interface or channel of the electronic equipment, once hair After existing external world's input signal, corresponding operating can be carried out according to external world's input signal, at this point, current acquired in step S110 The extraneous input signal that monitoring data are specifically as follows certain communication interface of electronic equipment or channel receives.
It can be seen that the particular content of the currently monitored data of electronic equipment acquired in the present embodiment can be according to the electricity The actual monitoring of sub- equipment requires determination, and the present invention is not construed as limiting the particular content that it is indicated.
Step S120: when monitoring data meet preset condition in this prior, controlling electronic devices enters BIOS state.
Based on above-mentioned analysis it is found that according to the difference of the detection requirement to electronic equipment, the acquired electronic equipment The particular content of the currently monitored data is different.Wherein, if certain component that the current monitoring data are the electronic equipment is based on user When operating the operational order of output to it, specifically, can default settings one triggering destroy preset path data data destroying The hot key of program, in practical applications, such as when needing replacing, throwing aside, resell or donate the electronic equipment, in order to avoid leakage The confidential information stored in the electronic equipment, user usually can destroy program by the hot key log-on data, set to the electronics The confidential information of standby interior storage is thoroughly destroyed, so, the present embodiment can be by being monitored the hot key, and will be based on using Family operates the operational order of output to it as entering the BIOS state of electronic equipment to start preset data destroying program Judgment criteria, that is to say, that the present embodiment can determine that electronic equipment receives the data of user's input based on the currently monitored data Request is destroyed, the electronic equipment is controlled and enters BIOS state.
As another embodiment of the present invention, in order to further increase the safety of the confidential information stored in electronic equipment, The present embodiment corresponding operation password can be preset for data destroying operation or setting user logs in stepping on for the electronic equipment Land password determines whether the user is legitimate user by the operation password or modification logging of monitoring user's input, if so, The data destroying request for receiving legitimate user input, controls the electronic equipment and enters BIOS state;If it is not, exportable corresponding Warning message, certainly, if illegal user still continues to invade by back door to the electronic equipment, as illegal user attempts to decode When operation password or modification logging, in order to avoid the confidential data leakage stored in the electronic equipment, data pin also can star Ruin program.
In addition, if by the operation of setting or entrance will be logged in presetting file under store path, file or disk As legal path, upper section monitoring process is considered as supervising the legal path for the data for reading default store path in path It surveys, in addition to this, the application can also simultaneously be monitored other communication interfaces, once monitor that user passes through the illegal route When invasion prestores the data in file, file or disk under path, can controlling electronic devices enter BIOS state, so as to Start follow-up data and destroys program.
The step of based on above-mentioned analysis it is found that according to the particular content of acquired the currently monitored data, in step S120 The currently monitored data meet preset condition be specifically as follows based on the currently monitored data determine electronic equipment receive user input Data destroying request;Or based on the currently monitored data determine electronic equipment by illegal invasion, currently, or its He, the present invention is not especially limited this, and those skilled in the art can determine according to actual needs, and the present invention is herein no longer one by one Explanation.
Optionally, when acquired the currently monitored data meet preset condition, the first prompt information can also be exported, with User is reminded to destroy the confidential information in the electronic equipment, wherein first prompt information specifically can be to refer to Show that lamp form, buzzer form or voice broadcast form carry out data, the present invention is not especially limited this.
Step S130: it is handled using to be destroyed data of the destruction program prestored to default store path.
It has been found that existing data destruction method such as crushes the file or file that software destroys needs by file Folder is thoroughly destroyed, specifically, this method needs user to find the file or folder for needing to destroy in electronic equipment, then Starting this document crushes software and destroys to it, it is clear that the destruction path and destruction object are all visible, so that existing Data destruction method does not have concealment, compares moreover, crushing software using this document the crushing process of file or folder It is time-consuming, so that the efficiency of data destroying is lower.
For the problems in available data destroying method, in this implementation practical application, when determination needs to carry out data destroying When, controlling electronic devices enters BIOS state first, restarts the destruction program prestored under the BIOS state to default storage The data to be destroyed in path are destroyed, it is clear that the operation for the data destroying operation completed under the BIOS state of electronic equipment Process and its destroy object etc. be all it is sightless, there is concealment, moreover, using the program progress data destroying used time is destroyed very It is short, substantially increase the efficiency of data destroying.
Wherein, in the practical application of the present embodiment, it is desirable that the confidential information storage of electronic equipment storage is limited to default Store path under, that is to say, that the store path of the confidential information is destruction journey that is fixed, being write based on the store path Sequence is merely able to destroy the data stored in file, file or the disk under the store path.
It should be noted that those skilled in the art are in combination with the technical knowledge in the field and the actual needs of the present embodiment It does not write and states destruction program, the present invention is not especially limited the specific code of the destruction program at this, only if it were not for this field Technical staff, which makes the creative labor, determining belongs to the scope of the present invention.
Optionally, a kind of part flow diagram of data destroying embodiment of the present invention as shown in Figure 2, in BIOS state Under following steps can specifically include to the treatment process of data to be destroyed:
Step S131: the file system of the destruction program analysis electronic equipment prestored is utilized.
Wherein, the file system of the electronic equipment can be FAT (File Allocation Table, file configuration table) Or NTFS (New Technology File System, New Technology File System).
Step S132: the region block of the corresponding hard disk of data to be destroyed is searched based on preset store path.
How to be analyzed, is obtained by the file system to electronic equipment in this present embodiment it should be noted that closing The detailed process in the region the corresponding hard disk block of data to be destroyed belongs to the conventional techniques hand of this field under preset store path Section, this will not be detailed here by the present invention.
Step S133: junk data is written to the region block found.
Wherein, in order to realize the thorough destruction to data to be destroyed, the present embodiment can be to the region block found repeatedly Junk data is inputted, data to be destroyed is avoided to be reduced.
Step S140: electronic equipment is restarted after complete to the data processing to be destroyed.
In the present embodiment practical application, the thorough destruction to data to be destroyed is completed in the BIOS state of electronic equipment Afterwards, the electronic equipment can be restarted to ensure that the data to be destroyed are thoroughly destroyed.
In conclusion in the practical application of the present embodiment, by obtaining the currently monitored data of electronic equipment in real time, and When determining that the current monitoring data meet preset condition, controls after the electronic equipment enters BIOS state, utilize the pin prestored It ruins program to handle the data to be destroyed of default store path, and restarts electronic equipment after having handled, thus realization pair The thorough destruction of data to be destroyed, improves data destroying speed;Moreover, because the data destroying process is under BIOS state It completes, will not will destroy object and its Destruction shows, to solve soft using file crushing in the prior art Part carries out the unhidden technical problem of data destroying.
Referring to a kind of structural schematic diagram of data destroying system embodiment of the present invention shown in Fig. 3, which can be answered With in electronic equipment, the data destroying system provided by the present embodiment is specific can include:
Module 310 is obtained, for obtaining the currently monitored data of the electronic equipment in real time;
First control module 320, for when acquired the currently monitored data meet preset condition, controlling electronic devices Into BIOS state.
Optionally, in the present embodiment, as shown in figure 4, first control module 320 can specifically include:
First determines receiving unit 321, for determining whether the electronic equipment receives based on the currently monitored data The data destroying request inputted to user.
First control unit 322, for determining that the electronic equipment receives legitimate user in first determination unit When the data destroying request of input, is restarted by the triggering default hot key control electronic equipment and enter BIOS state.
As another embodiment of the present invention, as shown in figure 5, first control module 320 can specifically include:
Second determination unit 323, for determining whether the electronic equipment is illegally entered based on the currently monitored data It invades.
Second control unit 324, for controlling when second determination unit determines the electronic equipment by illegal invasion It makes the electronic equipment and enters BIOS state.
Processing module 330, for being handled using to be destroyed data of the destruction program prestored to default store path.
Wherein, as shown in fig. 6, the processing module 330 can specifically include:
Analytical unit 331, for analyzing the file system of the electronic equipment using the destruction program prestored;
Searching unit 332, for searching the area block of the corresponding hard disk of data to be destroyed based on preset store path Domain;
Writing unit 333, for junk data to be written to the region block found.
In the practical application of the present embodiment, in order to ensure the thorough destruction to data to be destroyed, which can Junk data is repetitively written to the region block found.
Second control module 340, for restarting electronic equipment after data processing to be destroyed is complete.
Optional, on the basis of the various embodiments described above, the data destroying system that the application proposes can also include:
Cue module, for exporting the first prompt information when the currently monitored data meet preset condition.
Based on above-mentioned analysis it is found that the present embodiment obtains the currently monitored data of electronic equipment by obtaining module in real time, And when determining that the current monitoring data meet preset condition, which is controlled by the first control module and enters BIOS state Afterwards, it is handled, and handled using data to be destroyed of the destruction program prestored to default store path by processing module The electronic equipment is controlled by the second control module after complete to restart, to realize the thorough destruction to data to be destroyed, improves number According to destruction speed;Moreover, because processing module is to complete destruction to data to be destroyed under BIOS state, will not will destroy pair As and its Destruction show, thus solve in the prior art using file crush software carry out data destroying it is unhidden The technical issues of.
In addition, for the various embodiments described above, it should be noted that when the pin for the confidential information for completing to store in electronic equipment After ruining, directly the electronic equipment can also be closed, wait need using when be then turned on, that is to say, that the present invention to complete data The reboot operation for destroying the electronic equipment of operation does not limit the specific time, can be and is immediately performed after completing to destroy operation, It is also possible to restart again when need to use, this belongs to the scope of the present invention.
In addition, such as first, second or the like relational terms are used merely to grasp one in the various embodiments described above Make or unit or module and another is operated or unit or module distinguish, without necessarily requiring or implying these units or There are any actual relationship or orders between module or operation.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment For, since it is corresponding with method disclosed in embodiment, so being described relatively simple, related place is referring to method part illustration .
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of data destruction method, which is characterized in that be applied to electronic equipment, which comprises
The currently monitored data of the electronic equipment are obtained in real time;
When the currently monitored data meet preset condition, controls the electronic equipment and enter BIOS state;
It is handled using to be destroyed data of the destruction program prestored to default store path;The destruction program prestored is The destruction program that store path is write is preset based on this;
The electronic equipment is restarted after complete to the data processing to be destroyed;
Wherein, the currently monitored data meet preset condition specifically:
The communication interface or channel of electronic equipment are monitored, is determined and is occurred based on the monitoring data to communication interface or channel The data in file, file or disk under path are prestored by the illegal route invasion.
2. the method according to claim 1, wherein the currently monitored data meet preset condition specifically:
Determine that the electronic equipment receives the data destroying request of user's input based on the currently monitored data;
Then the control electronic equipment enters BIOS state specifically:
By triggering default hot key, controls the electronic equipment and restart and enter BIOS state.
3. the method according to claim 1, wherein the currently monitored data meet preset condition specifically:
Determine the electronic equipment by illegal invasion based on the currently monitored data.
4. method according to claim 1-3, which is characterized in that the destruction program that the utilization prestores is to default The data to be destroyed of store path carry out processing
The file system of the electronic equipment is analyzed using the destruction program prestored;
The region block of the corresponding hard disk of data to be destroyed is searched based on preset store path;
Junk data is written to the region block found.
5. method according to claim 1-3, which is characterized in that the method also includes:
When the currently monitored data meet preset condition, the first prompt information is exported.
6. a kind of data destroying system, which is characterized in that it is applied to electronic equipment, the system comprises:
Module is obtained, for obtaining the currently monitored data of the electronic equipment in real time;
First control module enters for when the currently monitored data meet preset condition, controlling the electronic equipment BIOS state;
Processing module, for being handled using to be destroyed data of the destruction program prestored to default store path;It is described pre- The destruction program deposited is the destruction program presetting store path based on this and writing;
Second control module, for restarting the electronic equipment after the data processing to be destroyed is complete;
Wherein, the currently monitored data meet preset condition specifically:
The communication interface or channel of electronic equipment are monitored, is determined and is occurred based on the monitoring data to communication interface or channel The data in file, file or disk under path are prestored by the illegal route invasion.
7. system according to claim 6, which is characterized in that first control module includes:
First determines receiving unit, defeated for determining whether the electronic equipment receives user based on the currently monitored data The data destroying request entered;
First control unit, for determining that receiving unit determines that the electronic equipment receives legitimate user's input described first Data destroying request when, control the electronic equipment by triggering default hot key and restart and enter BIOS state.
8. system according to claim 6, which is characterized in that first control module includes:
Second determination unit, for determining the electronic equipment whether by illegal invasion based on the currently monitored data;
Second control unit, for when second determination unit determines the electronic equipment by illegal invasion, described in control Electronic equipment enters BIOS state.
9. according to the described in any item systems of claim 6-8, which is characterized in that the processing module includes:
Analytical unit, for analyzing the file system of the electronic equipment using the destruction program prestored;
Searching unit, for searching the region block of the corresponding hard disk of data to be destroyed based on preset store path;
Writing unit, for junk data to be written to the region block found.
10. according to the described in any item systems of claim 6-8, which is characterized in that the system also includes:
Cue module, for exporting the first prompt information when the currently monitored data meet preset condition.
CN201510094739.8A 2015-03-03 2015-03-03 A kind of data destruction method and system Active CN105989310B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510094739.8A CN105989310B (en) 2015-03-03 2015-03-03 A kind of data destruction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510094739.8A CN105989310B (en) 2015-03-03 2015-03-03 A kind of data destruction method and system

Publications (2)

Publication Number Publication Date
CN105989310A CN105989310A (en) 2016-10-05
CN105989310B true CN105989310B (en) 2019-11-26

Family

ID=57039512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510094739.8A Active CN105989310B (en) 2015-03-03 2015-03-03 A kind of data destruction method and system

Country Status (1)

Country Link
CN (1) CN105989310B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106776908B (en) * 2016-11-30 2020-02-14 Oppo广东移动通信有限公司 Data cleaning method and device and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7502256B2 (en) * 2004-11-30 2009-03-10 Siliconsystems, Inc. Systems and methods for reducing unauthorized data recovery from solid-state storage devices
CN101404692B (en) * 2008-11-05 2011-09-14 宇龙计算机通信科技(深圳)有限公司 Data processing method and system for mobile terminal, and mobile terminal
CN103729310A (en) * 2014-01-14 2014-04-16 北京深思数盾科技有限公司 Method for protecting hardware data
CN104298927B (en) * 2014-09-24 2018-04-27 青岛海信移动通信技术股份有限公司 A kind of terminal anti-theft method and terminal

Also Published As

Publication number Publication date
CN105989310A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
JP6100898B2 (en) Method and device for processing messages
US11750623B2 (en) System and method for conducting a detailed computerized surveillance in a computerized environment
US10904286B1 (en) Detection of phishing attacks using similarity analysis
US6570610B1 (en) Security system with proximity sensing for an electronic device
CN106096425A (en) System permission starting method, device and equipment
US20170316170A1 (en) Usage control method and system for medical detection device, and medical detection device
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
JP2010146457A (en) Information processing system and program
CN110826053A (en) Container-based data sandbox operation result safe output method and device
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
DE102016105936A1 (en) Electronic device and method for running applications in different security environments
US20190050476A1 (en) Extraction of policies from natural language documents for physical access control
US8978150B1 (en) Data recovery service with automated identification and response to compromised user credentials
KR102133197B1 (en) Method and device for unlocking a terminal screen
CN105989310B (en) A kind of data destruction method and system
CN105630318A (en) Operation interaction method and device
CN104598401A (en) Domestic platform peripheral equipment management and control system and management and control method thereof
CN111581630A (en) Computer unlocking method, device, equipment and medium
CN103207972B (en) Device and method for recovering and analyzing login password of computer operation system
CN105701378A (en) Terminal device control method and device
CN110895843B (en) Intelligent access control card authority management device
CN108933678A (en) O&M auditing system
US20210012037A1 (en) Proofing against tampering with a computer
CN113360354A (en) User operation behavior monitoring method, device, equipment and readable storage medium
CN106657024B (en) Method and device for preventing cookie from being tampered

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant