CN107995617A - A kind of solid storage device for supporting telesecurity to destroy design - Google Patents

A kind of solid storage device for supporting telesecurity to destroy design Download PDF

Info

Publication number
CN107995617A
CN107995617A CN201711392879.9A CN201711392879A CN107995617A CN 107995617 A CN107995617 A CN 107995617A CN 201711392879 A CN201711392879 A CN 201711392879A CN 107995617 A CN107995617 A CN 107995617A
Authority
CN
China
Prior art keywords
gsm
module
mcu
storage device
telesecurity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711392879.9A
Other languages
Chinese (zh)
Inventor
张涛
周洋
陈财森
赵石钏
应书皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hung Qin (beijing) Technology Co Ltd
Original Assignee
Hung Qin (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hung Qin (beijing) Technology Co Ltd filed Critical Hung Qin (beijing) Technology Co Ltd
Priority to CN201711392879.9A priority Critical patent/CN107995617A/en
Publication of CN107995617A publication Critical patent/CN107995617A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Abstract

The present invention provides a kind of solid storage device for supporting telesecurity to destroy design, security strategy control module MCU is provided with solid storage device, it is connected with lower module:1) clock and serial ports:External connection real-time clock, provides clock signal to MCU, reserves serial ports end, and into row data communication and code is downloaded for MCU and outside;2) SATA is controlled:SATA main controllers are connected by I/O port, associated trigger signal is provided for SATA main controllers, allow main controller to perform corresponding anti-plug, it is anti-to disassemble self-destruction action, and feed back and whether complete after the completion of destruction;3) gsm module:Remote destroying instruction is performed, and designs interrelated logic instruction;4) it is directed to the control of power module:MCU controls the power operation of system at the same time, is the work Switching power under different mode.The present invention forms the complete establishment based on GSM channel safety encryption technologies, has not only improved the protection level of key, but also balances the encryption efficiency requirement in routine use for network channel, has prevented the risk of divulging a secret that data are transmitted in gsm networks.

Description

A kind of solid storage device for supporting telesecurity to destroy design
Technical field
The present invention relates to solid state hard disk secure technical field, more particularly, to a kind of solid-state for supporting telesecurity to destroy Storage device designs.
Background technology
Mainly existing GSM telesecurities mechanics of communication and storage destruction technology are analyzed.
With the development of technology and the widespread adoption of GSM network, in today that various attack technologies continue to develop, phase The defects of closing security mechanism also gradually starts to reveal with loophole, and quite a few loophole already becomes illegal molecule Obtain the important channel of classified information.Associated safety mechanism of the security threat being currently known not only from GSM network in itself Object of attack also targeted by this huge market of GSM network by loophole, the mobile network's attack technology increasingly updated.By right The parsing of common attack mode, mainly has the defects of security mechanism at present:
Verification process unification, current GSM network lack identification certification of the user to air interface and system.It is if non- Method molecule sends the broadcasting frequency of oneself using pseudo-base station in a GSM cell, then when the user in lower network just has very much It may log in and be connected in this virtual illegal base station, what such illegal molecule just can be easy pretends to be valid system pair User in system sends and obtains various invalid informations.
Encryption Algorithm cracks, and since network cracks the upgrading of means, the A5 Encryption Algorithm of air interface has been cracked at present, Security reduces, and information is easily stolen in the air in interface due to lacking algorithm protection.
Cipher mode is simple, since GSM network encryption mechanism is using point-to-point, and not end-to-end, so believe Breath is propagated with clear-text way on network, and the possibility stolen greatly improves.
The present invention therefore by improving certification and encryption, respectively using digital signature, digital certificate and protocol authentication and RC4 algorithms, AES, SM4 cryptographic algorithm etc. solve problem above.
The mechanical hard disk used at present is actual by formatting destroyed data since itself " magnetic after effect " exists On can be recovered by special tool(s).Mode is most thoroughly destroyed for mechanical hard disk, can only be by physics or change Effect thoroughly destroys its physical arrangement and storage medium, but so hard disk cannot reuse, Er Qieyou It can just be completed in the destruction only by external force, corresponding destruction machinery equipment must also be provided in Destruction, it is therefore desirable to Pay great cost.And solid state hard disc is since its is special that " electric property and storage architecture of master control+NAND Flash ", can Under conditions of not by external equipment, to reach destruction by algorithm and circuit, and save the time and destroy thoroughly.So this Invention is using solid-state storage can thoroughly quick the characteristics of destroying completes this design safely.
The content of the invention
The present invention provides a kind of solid storage device for supporting telesecurity to destroy design, solves problems with:
1) long-distance identity-certifying and instruction secure transmission are solved the problems, such as.It is being using GSM communication modules in the present invention Remote authentication and data destroying function are realized in system.In view of the security of GSM network, in order to strengthen GSM channel safety guarantees, The present invention has done innovative research improvement in terms of two:Single channel encryption algorithm and the credible algorithm research of GSM channels, by GSM The safety analysis of network, encrypts data channel during information command is transmitted, avoid stealing hard disk instruction because illegal and Caused by information steal secret information generation so that teledata can be performed effectively when safe hard disk is out of control destroys function.
2) data destroying and self-destruction out of control are solved the problems, such as.With the development of data destroying technology, the data of traditional magnetic disk Overriding technology and demagnetization technology have encountered huge bottleneck.Data destroying technology based on conventional magnetic media is not only time-consuming but also takes Power, and appearance and a large amount of popularization with solid state storage technologies, due to its is special " master control+NAND Flash " electronic structures, So that data destroying technology has significant progress and development, solid state hard disc is timely by the data destroying completeness that it possesses The features such as effect property, have become the preferred storage medium of safe hard disk.
In order to strengthen anti-divulging a secret property, prevent pulling out Anti-dismantling auto-destruct technology using anti-plug, hard disk main controller receives pulse and draws After leading, the data that bottom is carried out to storage medium Flash are wiped, so that it is guaranteed that the completeness that confidential data is destroyed, is situated between from storage The bottom of matter ensures the security of data.
Its technical solution is as described below:
A kind of solid storage device for supporting telesecurity to destroy design, is provided with safe plan in solid storage device Slightly control module MCU, the security strategy control module are connected with lower module:
1) clock and serial ports:External connection real-time clock, provides clock signal to MCU, reserves serial ports end, for MCU and outside Portion is into row data communication and downloads code;
2) SATA is controlled:SATA main controllers are connected by I/O port, associated trigger signal is provided for SATA main controllers, allows master control Whether device performs corresponding anti-plug, anti-to disassemble self-destruction action, and feed back and complete after the completion of destruction;
3) gsm module:Remote destroying instruction is performed, and designs interrelated logic instruction;
4) it is directed to the control of power module:MCU controls the power operation of system at the same time, is that the work under different mode is cut Change power supply.
Further, in the gsm module, including each unit module it is as follows:
(1) GSM baseband processing modules, receive SIM card wireless signal, are responsible for liaison;
(2) power management chip, is responsible for providing power supply to gsm module, and is connected with external system power supply;
(3) RF transceiver, arranges in pairs or groups with external antenna and receives and dispatches GSM digital signals, sends control short message;
(4) 26MHz reference clocks, working standard frequency is provided to gsm module;
(5) radio-frequency front-end module, receiving filter, charging circuit part.
Further, realize that the process that telesecurity is destroyed is as described below by the gsm module:
Gsm module is responsible for realizing solid state hard disc and the telecommunication of user, while is determined admittedly using the base station location method of GSM The location of state hard disk;
After gsm module is completed to position the position of hard disk, send short message and communicate with binding mobile phone, positioning is believed Breath, the status information of current solid state hard disc are transmitted to user's hand in the form of ciphertext by built-in encryption algorithm by GSM network Machine and order from the user, complete the realization of remote control and the security protection of information.
Further, the SATA main controllers realize that the method destroyed is as follows:1) a big voltage is accessed by outside, led to Cross hard-disk interface and be directly circulated into solid state hard disc body, so as to be controlled by internal circuit, puncture the Flash I/O and phase of inside Close bypass supply;2) in the case where external condition does not allow, using regular operational voltage, by internal boost chip, gradually lifting is electric Source energy, so as to puncture the Flash I/O and bypass supply of inside one by one.
Further, encryption, channel are implemented when the security strategy control module MCU is communicated with gsm module Encryption Algorithm uses symmetric encipherment algorithm, and symmetric encipherment algorithm and corresponding secret key generating algorithm two parts are included in composition.
Further, the symmetric encipherment algorithm used using SM4 block encryption algorithms as GSM network single channel encryption, Data sending terminal, data transmission side will make it become complicated letter after the processing of special Encryption Algorithm together with encryption key in plain text Number ordered series of numbers, completes data encryption action.
Further, the security strategy control module MCU when communicating with gsm module using the credible algorithm of GSM channels into Confirmation that row is credible, transmitting terminal and receiving terminal all start the work of key function during encrypting and decrypting using credible algorithm, Credible algorithm is realized using asymmetric arithmetic and hash algorithm.
Further, the initialization action of gsm module, its flow are always divided into three steps:
1) after starting gsm module, microcontroller carries out AT instructions and judges whether gsm module work is normal first, if normally Return " OK ", mark response flag bit, then program continues;If gsm module does not return to " OK ", microcontroller judges Gsm module does not start normally, then proceedes to wait;After gsm module normally starts, short disappear is set using AT+CSCA instructions Cease central number;
2) short message mode of gsm module is set as TEXT patterns, and information is transmitted using ASC2 codes, the AT instruction lattice used Formula is AT+CMGF=1, and " OK " is returned after being provided with;After microcontroller receives " OK " of gsm module return, mark is corresponding Flag bit, program continue to perform downwards;
3) after entering normal operating conditions, main control MCU transmission short message is sent, and delete be stored in SIM card in time Stale messages, so that the reading of convenient short message next time, forms conventional operating mode.
Further, security strategy control module MCU uses 8051 microcontrollers.
The present invention has the following advantages:
1. using solid state storage technologies, this scheme possesses the reading and writing data ability of mainstream, and has both the multiple of solid state hard disc Advantage.
2. realizing a kind of design of the safe solid state hard disc based on GSM remote destroyings of innovation, feature is:GSM is long-range The innovative technologies such as control, GSM single channel encryptions, self-destruction out of control, dynamic key.
3. foring the complete establishment based on GSM channel safety encryption technologies, the protection level of key had not only been improved, but also The encryption efficiency requirement for network channel in routine use is balanced, has prevented the wind of divulging a secret that data are transmitted in gsm networks Danger.
Brief description of the drawings
Fig. 1 is soft triggering Shredding Process schematic diagram;
Fig. 2 is module relation figure;
Fig. 3 is gsm module application block diagram;
Fig. 4 is gsm module circuit diagram;
Fig. 5 is MCU initialization flows;
Fig. 6 is the credible design logic figure of channel.
Embodiment
The present invention relates to solid state hard disk secure technical field, is based primarily upon gsm wireless network communication technology, and it is hard to carry out solid-state The destruction Technology design of disk storage data, propose one kind can remote operation reach long-range by master control algorithm and internal circuit design Destruction and the method for self-destruction out of control, so as to fulfill thorough the destroying of solid state hard disc storage data is ensured, and ensure the peace after destroying Quan Xing.
1. the data safety in GSM transmission is realized using single channel encryption algorithm
For mobile communications network, the high efficiency of data transfer is the factor for needing emphasis to consider, therefore in channel Symmetric encipherment algorithm is used effectively to balance the demand between encryption and efficiency in the selection of Encryption Algorithm.One in composition As be made of symmetric encipherment algorithm and corresponding secret key generating algorithm two parts, the algorithm due to algorithm disclose and calculation amount compared with It is small, thus the system resource taken is less, and can quickly data be encrypted with decryption, lifting system efficiency very much.It is common Symmetric encipherment algorithm have DES, IDEA, RC2, AES, the close SM4 algorithms of state etc..In symmetry algorithm encrypting and decrypting computing, due to Algorithm is typically all disclosed, and usually used is identical key, so the key of symmetric cryptography is most important, can not be let out Dew.In the design, with reference to it is current country for Password Management and associated safety product production domesticization require, adoptable current state The symmetric encipherment algorithm that the newest SM4 block encryption algorithms that close office promulgates are used as GSM network single channel encryption.In data sending End, data transmission side will make it become complicated function ordered series of numbers after the processing of special Encryption Algorithm together with encryption key in plain text, Complete data encryption action.After the transmission of air interface, message ciphertext is delivered to receiving terminal, passes through the inverse fortune of key function Calculation restores real cleartext information again, and material is thus formed the data transfer and receive process of a safety.
2. credible confirmation is carried out using the credible algorithm of GSM channels
By further analyzing, in encrypted data transmission environment also with the presence of a kind of drawback, i.e. channel credibility really Recognize.Theoretically analyze, symmetric cryptosystem can be such that receiving terminal is all reduced for the information being subject to by decipherment algorithm Related content, but do not defined for the uniqueness on channel, you can receive the multiple letter that different transmitting terminals pass out Breath, and corresponding key can also translate a variety of information in receiving terminal, such operation will substantially reduce data biography Defeated efficiency, and transmit the authenticity of information.Therefore in the design process, it is necessary to set in view of the credibility of GSM channels Meter.It is worth noting that in a symmetric encryption algorithm, key is whole fixed and unique as key factor, transmitting terminal and receiving terminal It is required for starting using it the work of key function during encrypting and decrypting, this requires before start information transmits, Both sides must be consistent this, so key just becomes the control core of symmetric encipherment algorithm.For the credible calculation of GSM channels Method considers transmission efficiency and security, can be realized using the asymmetric arithmetic and hash algorithm of the practicality of current mainstream.It is non-right Encryption is claimed also to be public key encryption, it is made of asymmetric data Encryption Algorithm and corresponding key schedule, in the design will The SM2 rivest, shamir, adelmans and SM3 hash algorithms that the algorithm used is promulgated for State Commercial Cryptography Administration set to realize that channel is believable Meter.
3. destroy technical Analysis for solid state data
Solid-state common at present is divided into soft destruction with hard disc data destruction mode and destroys two kinds with hard.Soft destruction is that solid-state is hard Disk carries out a kind of popular saying of bottom data destruction, i.e., by the master control algorithm of solid state hard disc by the storage list of NAND Flash Member carries out an erasing operation, makes data mode that full 0 or full F be presented.In actual mechanical process, when solid state hard disc receives triggering After the instruction of destruction, main controller is controlled by applying 0V voltages on NAND Flash storage unit control gates, and in its substrate Upper application 19~21V high voltages, the electric charge for finally making to preserve in storage unit floating boom are discharged by F-N tunnel-effects, reached The purpose that data are thoroughly wiped in NAND Flash physics bottoms.After triggering is destroyed, even if hard disk power down or other reasons are whole Only, hard disk controller will record the time point of destruction process, continue to perform this action again after the power is turned on, until storage unit institute There are the data destroyed.Since the soft object for destroying erasing is bottom data, thus the electric function of solid state hard disc is remained, hard disk It can be used again by initialization operation, correlated process refers to Fig. 1.Hard destroy refers to utilize high-energy by solid state hard disc Flash I/O breakdown, be allowed to damage it is unavailable, so as to achieve the purpose that a kind of strong effective data destroying mode of destruction. In actual design process, since solid state hard disc is a kind of data storage carrier of pure circuit design, FlashI/O and master controller There is 1 certain design pressure voltage Deng chip, in the work of usually hard disk operation, its normal use is supplied using normal voltage, when During generation emergency, its hard destruction function can be completed by two ways:1st, a big voltage is accessed by outside, passed through Hard-disk interface is directly circulated into solid state hard disc body, so as to be controlled by internal circuit, punctures the Flash I/O and correlation of inside Bypass supply;2nd, in the case where external condition does not allow, using regular operational voltage, by internal boost chip, power supply is gradually lifted Energy, so as to puncture the Flash I/O and bypass supply of inside one by one;Since this destruction operation is irreversible, once hair Raw, related device thoroughly loses function, so as to reach most stable of data destroying effect.
4. the safe solid-state memory system design of remote destroying
The control MCU module design of 4.1 security strategies
Security strategy control module (MCU) is that the nucleus module that major function integrates is realized in the design, sees Fig. 2, As security control core, it is responsible for receiving and analyzing external command, then makes a policy and which kind of operation is carried out to instruction.As peace The management module of full strategy, correlation function have:
Clock and serial ports:External connection real-time clock, clock signal is provided to MCU.Reserved serial ports end, for MCU and outside Into row data communication and download code.
For the control of SATA master controls:SATA main control chips are connected by I/O port, associated trigger is provided for SATA main controllers Whether signal, allows main controller to perform corresponding anti-plug, anti-to disassemble self-destruction action, and feed back and complete after the completion of destruction.
For the control of gsm module:Remote destroying instruction is performed, and designs interrelated logic instruction, such as:Disk state, on Electric time counting and remote destroying triggering etc..
For the control of power module:As the key of system design, to extend the service life of battery as far as possible, MCU is same When control the power operation of system, be the work Switching power under different mode.
4.2GSM secure communications module designs
Hardware aspect:Data safety after computer is stolen in order to prevent is invaded and is stolen secret information, therefore in conceptual design Middle key design remote destroying module detected using teleinstruction, control and remote destroying password if necessary is hard to destroy All confidential datas on disk.Fig. 3 is gsm module associated inner application block diagram, and the function of its formant module is as follows:
(1) GSM baseband processing modules, mainly receive SIM card wireless signal, are responsible for liaison;
(2) power management chip, is mainly responsible for and provides power supply to gsm module, and is connected with external system power supply;
(3) RF transceiver, arranges in pairs or groups with external antenna and receives and dispatches GSM digital signals, sends control short message;
(4) 26MHz reference clocks, working standard frequency is provided to gsm module;
(5) radio-frequency front-end module, receiving filter, charging circuit part.
Software aspects:Gsm module is responsible for realizing solid state hard disc and the telecommunication of user, while is determined using the base station of GSM Position method can substantially determine the location of solid state hard disc, after gsm module is completed to position the position of hard disk, send short message and Binding mobile phone communicates, by information such as location information, the states of current solid state hard disc by built-in encryption algorithm with ciphertext Form is transmitted to user mobile phone and order from the user by GSM network, completes the realization of remote control and the safety of information Protection.
In embodiment, 1.GSM secure communications module is realized
(1) hardware realization of GSM secure communications module
Gsm module will be directly connected to battery supply input terminal by external pin powered in the design, so can be with So that after computer shutdown or hard disk are unplugged, gsm module can directly power on start-up operation.In addition controlled for system Aspect, the control pin of gsm module are connected by triode with security strategy MCU, using MCU control gsm module switching on and shutting down with Dormancy, especially when detecting hard disk and being connected or separate with host, can send short massage notice by gsm module, inform user's mesh Preceding state.System circuit diagram is as shown in Figure 4.
(2) software of GSM secure communications module, which is realized, requires
, it is necessary to carry out initialization action to gsm module before communication is started, its flow is always divided into three steps:
After starting gsm module, microcontroller carries out AT instructions and judges whether gsm module work is normal first, if normally returned Return " OK ", mark response flag bit, then program continues.If gsm module does not return to " OK ", microcontroller judges GSM Module does not start normally, then proceedes to wait.After gsm module normally starts, instructed and set in short message using AT+CSCA Heart number.
The short message mode of gsm module is set as TEXT patterns, information is transmitted using ASC2 codes, the AT instruction formats used It is AT+CMGF=1, " OK " is returned after being provided with.After microcontroller receives " OK " of gsm module return, corresponding mark is marked Will position, program continue to perform downwards.
Into after normal operating conditions, main control MCU transmission short message is sent, and delete the mistake being stored in SIM card in time Phase message, so that the reading of convenient short message next time, forms conventional operating mode.
By the use of above AT orders, can substantially accurately by positional information, safe solid-state disc status information and Basic communication function is sent in mobile terminal of mobile telephone by gsm module and background monitoring center, in the specification to order, All instructions must be operated in strict accordance with related pattern, to ensure the normal work of gsm communication module.
2nd, the realization of security strategy control MCU module
Using high speed/low-power consumption/jamproof new 8051 microcontroller, high reliability reset circuit is internally integrated;
Its instruction code completely compatible traditional 8051,111 instruction execution speeds of tradition 8051 raise speed comprehensively, most fast Fast 24 times are instructed, fast 3 times of most slow instruction;
System application is programmable, and without professional programmable device, without dedicated emulated device, user's journey can be directly downloaded by serial ports Sequence, several seconds complete program print;
There are EEPROM functions, house dog;
Inside the MCU again before its startup, it is necessary to carry out initialization flow, including to open house dog program, configuration exterior The contents such as memory.
In secure data area, MCU is the decision-making party of security strategy, as security control core, is responsible for receiving and analyzes External command, then makes a policy and which kind of operation is carried out to instruction.
Before this series of activities starts, inside MCU, (including reset) is, it is necessary to carry out before its work startup A series of initialization flow, including open the contents such as house dog program, configuration external memory storage.
Whole initialization flow is as shown in Figure 5.
3rd, the decryption of GSM channel safeties communication encryption and credible design
The key of channel symmetry Encryption Algorithm is protected using asymmetric arithmetic in the communication of GSM channel safeties, no Periodically to the key make a change of symmetric encipherment algorithm and confirmation, judge so as to carry out credible identification to transmitting terminal channel, avoid Give away secrets caused by the dummy order transmitted by invalid transmitting terminal risk.The related channel confirmed based on symmetric cryptographic key renewal Credible design is as shown in Figure 6.
In the model shown in Fig. 6, for transmitting terminal and the key identification of receiving terminal, it is explained as follows:
Spu:Transmitting terminal public key;Spr;Transmitting terminal private key;Rpu:Receiving terminal public key;Rpr:Receiving terminal private key;
Associated operating steps are described as follows:
First, in transmitting terminal, the plaintext M (symmetric cryptographic key) transmitted for needs, is encrypted to by receiving public key Rpu M1, for the integrality of checking information, a string of summary M2, and then the hair for passing through asymmetric encryption are obtained by M1 using SM3 algorithms M2 is become ciphertext M3 by sending end private key Spr.A group encryption ciphertext M1 has been drawn eventually through model and comprising hash encryption information M3, and pass through air interface (GSM network) and send ciphertext M1 and M3 to receiving terminal;
Secondly, after M1, M3 information are delivered to receiving terminal, in receiving terminal, by algorithm can inverse operation, one side M3 passes through Transmitting terminal public key decryptions form M2, on the other hand by the checking computations of SM3 algorithms, M1 are converted to digest value M2, when both are consistent When, and show that information integrity is consistent, can determine that whether data M1 is unique ciphertext that receiving terminal needs.

Claims (9)

  1. A kind of 1. solid storage device for supporting telesecurity to destroy design, it is characterised in that:Set in solid storage device Security strategy control module MCU is equipped with, the security strategy control module is connected with lower module:
    1) clock and serial ports:External connection real-time clock, gives MCU to provide clock signal, reserves serial ports end, for MCU with it is exterior into Row data communication and download code;
    2) SATA is controlled:SATA main controllers are connected by I/O port, associated trigger signal is provided for SATA main controllers, allows main controller to hold The corresponding anti-plug of row, it is anti-to disassemble self-destruction action, and feed back and whether complete after the completion of destruction;
    3) gsm module:Remote destroying instruction is performed, and designs interrelated logic instruction;
    4) it is directed to the control of power module:MCU controls the power operation of system at the same time, is the work switching electricity under different mode Source.
  2. 2. the solid storage device for supporting telesecurity to destroy design according to claim 1, it is characterised in that:It is described In gsm module, including each unit module it is as follows:
    (1) GSM baseband processing modules, receive SIM card wireless signal, are responsible for liaison;
    (2) power management chip, is responsible for providing power supply to gsm module, and is connected with external system power supply;
    (3) RF transceiver, arranges in pairs or groups with external antenna and receives and dispatches GSM digital signals, sends control short message;
    (4) 26MHz reference clocks, working standard frequency is provided to gsm module;
    (5) radio-frequency front-end module, receiving filter, charging circuit part.
  3. 3. the solid storage device for supporting telesecurity to destroy design according to claim 1, it is characterised in that:Pass through The gsm module realizes that the process that telesecurity is destroyed is as described below:
    Gsm module is responsible for realizing solid state hard disc and the telecommunication of user, while determines that solid-state is hard using the base station location method of GSM The location of disk;
    After gsm module is completed to position the position of hard disk, send short message and communicate with binding mobile phone, by location information, when The status information of preceding solid state hard disc by built-in encryption algorithm in the form of ciphertext by GSM network be transmitted to user mobile phone and come From the order of user, the realization of remote control and the security protection of information are completed.
  4. 4. the solid storage device for supporting telesecurity to destroy design according to claim 1, it is characterised in that:It is described SATA main controllers realize that the method destroyed is as follows:1) a big voltage is accessed by outside, is directly circulated into by hard-disk interface Solid state hard disc body, so as to be controlled by internal circuit, punctures the Flash I/O and associated shunt power supply of inside;2) in outside Under condition does not allow, using regular operational voltage, by internal boost chip, power supply energy is gradually lifted, so as to puncture one by one Internal Flash I/O and bypass supply.
  5. 5. the solid storage device for supporting telesecurity to destroy design according to claim 3, it is characterised in that:It is described Security strategy control module MCU implements encryption when being communicated with gsm module, single channel encryption algorithm is calculated using symmetric cryptography Method, includes symmetric encipherment algorithm and corresponding secret key generating algorithm two parts in composition.
  6. 6. the solid storage device for supporting telesecurity to destroy design according to claim 5, it is characterised in that:Using The symmetric encipherment algorithm that SM4 block encryption algorithms are used as GSM network single channel encryption, in data sending terminal, data transmission side After the processing of special Encryption Algorithm it will be made to become complicated function ordered series of numbers together with encryption key in plain text, complete data encryption and move Make.
  7. 7. the solid storage device for supporting telesecurity to destroy design according to claim 5, it is characterised in that:It is described Credible confirmation is carried out using the credible algorithm of GSM channels when security strategy control module MCU communicates with gsm module, transmitting terminal is with connecing Receiving end all starts the work of key function during encrypting and decrypting using credible algorithm, and credible algorithm uses asymmetric arithmetic And hash algorithm is realized.
  8. 8. the solid storage device for supporting telesecurity to destroy design according to claim 1, it is characterised in that:GSM The initialization action of module, its flow are always divided into three steps:
    1) after starting gsm module, microcontroller carries out AT instructions and judges whether gsm module work is normal first, if normal return " OK ", mark respond flag bit, and then program continues;If gsm module does not return to " OK ", microcontroller judges GSM moulds Block does not start normally, then proceedes to wait;After gsm module normally starts, instructed using AT+CSCA and short message service center is set Number;
    2) short message mode of gsm module is set as TEXT patterns, information is transmitted using ASC2 codes, and the AT instruction formats used are AT+CMGF=1, " OK " is returned after being provided with;After microcontroller receives " OK " of gsm module return, corresponding mark is marked Position, program continue to perform downwards;
    3) enter normal operating conditions after, send main control MCU transmission short message, and in time delete be stored in it is expired in SIM card Message, so that the reading of convenient short message next time, forms conventional operating mode.
  9. 9. the solid storage device for supporting telesecurity to destroy design according to claim 1, it is characterised in that:Safety Strategic control module MCU uses 8051 microcontrollers.
CN201711392879.9A 2017-12-21 2017-12-21 A kind of solid storage device for supporting telesecurity to destroy design Pending CN107995617A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711392879.9A CN107995617A (en) 2017-12-21 2017-12-21 A kind of solid storage device for supporting telesecurity to destroy design

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711392879.9A CN107995617A (en) 2017-12-21 2017-12-21 A kind of solid storage device for supporting telesecurity to destroy design

Publications (1)

Publication Number Publication Date
CN107995617A true CN107995617A (en) 2018-05-04

Family

ID=62038078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711392879.9A Pending CN107995617A (en) 2017-12-21 2017-12-21 A kind of solid storage device for supporting telesecurity to destroy design

Country Status (1)

Country Link
CN (1) CN107995617A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583243A (en) * 2018-12-10 2019-04-05 中国运载火箭技术研究院 A kind of data safety guard system based on instruction
CN109934022A (en) * 2019-02-25 2019-06-25 天津大学 Device and attack resistance method with the attack resistance chip for destroying structure
CN110049487A (en) * 2019-03-27 2019-07-23 山东超越数控电子股份有限公司 A kind of high safety encryption storage remote destroying management system and its working method based on Beidou
CN110347233A (en) * 2019-06-27 2019-10-18 鸿秦(北京)科技有限公司 A kind of solid state hard disk with power down protection and physical destroying function
CN110458273A (en) * 2019-07-17 2019-11-15 陕西千山航空电子有限责任公司 A kind of data storage card
CN111291390A (en) * 2020-01-20 2020-06-16 中国人民解放军海军工程大学 Key data safety destruction triggering system and triggering method
CN111818288A (en) * 2020-07-08 2020-10-23 上海威固信息技术股份有限公司 Multi-format video acquisition and storage system with storage card and video acquisition card separately designed
CN112541186A (en) * 2020-12-21 2021-03-23 中国电子科技集团公司第三十研究所 Password out-of-control resisting system and method based on motion state perception
CN112783561A (en) * 2021-01-06 2021-05-11 素泰智能科技(上海)有限公司 Key destroying method for wearable equipment
CN113312680A (en) * 2021-05-28 2021-08-27 福州优联利众电子商务有限公司 Hard disk for multi-channel remote control disconnection or complete data destruction
CN113472535A (en) * 2021-08-02 2021-10-01 电信科学技术第五研究所有限公司 Active and passive triggering key destruction circuit capable of running for long time
US11243710B1 (en) 2018-04-02 2022-02-08 Dominic B. Picone System and method for remote drive destruction

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101782951A (en) * 2009-11-10 2010-07-21 徐欣 Hard disc remote destroying antitheft system and method
CN201600703U (en) * 2009-11-10 2010-10-06 徐欣 Anti-secret leakage self-destruction system based on solid state disk
CN201707677U (en) * 2010-04-21 2011-01-12 湖南源科高新技术有限公司 High-confidentiality solid hard disk product based on double destroy technology
CN102289623A (en) * 2011-09-02 2011-12-21 湖南国安思科计算机系统有限公司 Anti-leakage laptop
US20170317828A1 (en) * 2016-04-28 2017-11-02 Arnold G. Reinhold System and method for securely storing and utilizing password validation data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101782951A (en) * 2009-11-10 2010-07-21 徐欣 Hard disc remote destroying antitheft system and method
CN201600703U (en) * 2009-11-10 2010-10-06 徐欣 Anti-secret leakage self-destruction system based on solid state disk
CN201707677U (en) * 2010-04-21 2011-01-12 湖南源科高新技术有限公司 High-confidentiality solid hard disk product based on double destroy technology
CN102289623A (en) * 2011-09-02 2011-12-21 湖南国安思科计算机系统有限公司 Anti-leakage laptop
US20170317828A1 (en) * 2016-04-28 2017-11-02 Arnold G. Reinhold System and method for securely storing and utilizing password validation data

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11243710B1 (en) 2018-04-02 2022-02-08 Dominic B. Picone System and method for remote drive destruction
CN109583243A (en) * 2018-12-10 2019-04-05 中国运载火箭技术研究院 A kind of data safety guard system based on instruction
CN109583243B (en) * 2018-12-10 2020-07-14 中国运载火箭技术研究院 Data safety protection system based on instruction
CN109934022A (en) * 2019-02-25 2019-06-25 天津大学 Device and attack resistance method with the attack resistance chip for destroying structure
CN109934022B (en) * 2019-02-25 2023-09-19 天津大学 Device and method for anti-attack chip with destruction structure
CN110049487A (en) * 2019-03-27 2019-07-23 山东超越数控电子股份有限公司 A kind of high safety encryption storage remote destroying management system and its working method based on Beidou
CN110347233A (en) * 2019-06-27 2019-10-18 鸿秦(北京)科技有限公司 A kind of solid state hard disk with power down protection and physical destroying function
CN110458273A (en) * 2019-07-17 2019-11-15 陕西千山航空电子有限责任公司 A kind of data storage card
CN111291390B (en) * 2020-01-20 2022-05-20 中国人民解放军海军工程大学 Triggering system and triggering method for safe destruction of critical data
CN111291390A (en) * 2020-01-20 2020-06-16 中国人民解放军海军工程大学 Key data safety destruction triggering system and triggering method
CN111818288A (en) * 2020-07-08 2020-10-23 上海威固信息技术股份有限公司 Multi-format video acquisition and storage system with storage card and video acquisition card separately designed
CN112541186A (en) * 2020-12-21 2021-03-23 中国电子科技集团公司第三十研究所 Password out-of-control resisting system and method based on motion state perception
CN112783561A (en) * 2021-01-06 2021-05-11 素泰智能科技(上海)有限公司 Key destroying method for wearable equipment
CN113312680A (en) * 2021-05-28 2021-08-27 福州优联利众电子商务有限公司 Hard disk for multi-channel remote control disconnection or complete data destruction
CN113312680B (en) * 2021-05-28 2024-04-09 福州优联利众电子商务有限公司 Hard disk capable of remotely controlling disconnection or thorough destruction of data through multiple channels
CN113472535A (en) * 2021-08-02 2021-10-01 电信科学技术第五研究所有限公司 Active and passive triggering key destruction circuit capable of running for long time
CN113472535B (en) * 2021-08-02 2024-02-27 电信科学技术第五研究所有限公司 Active and passive triggering key destruction circuit capable of running for long time

Similar Documents

Publication Publication Date Title
CN107995617A (en) A kind of solid storage device for supporting telesecurity to destroy design
CN100590639C (en) System and method for managing multiple smart card sessions
CN101599188B (en) IPA security certification-based access control system
CN205140035U (en) Mobile terminal and intelligent communication system who locks
CN201387642Y (en) Single-phase electronic type multi-rate prepayment electric energy meter
CN102315942A (en) Security terminal with Bluetooth and communication method thereof of security terminal and client end
CN103826221A (en) Bluetooth based encryption communication method, and correlation systems and methods
CN102081713A (en) Office system for preventing data from being divulged
CN102201044A (en) Universal serial bus (USB) security key
CN110909338B (en) Security authentication method and system based on security chip and security chip
WO2020030132A1 (en) Control method and device for smart door lock, and storage medium
CN104346586B (en) The method of the storage device and type self-destroyed protection data of type self-destroyed protection data
CN209046890U (en) LoRa encrypts authentication gateway apparatus and system
CN201716734U (en) Usb safe storage encryption device
CN103475482A (en) Filed encrypting and sealing method based on filed service terminal
CN101281497B (en) Ciphering type mobile storage apparatus
CN203301499U (en) SAM (Secure Access Module) encryption dog for oilfield data communication
CN210515295U (en) Security authentication system and information processing device based on security chip
CN101465740B (en) WLAN network card chip capable of supporting PCI interface
CN108182745A (en) The smart lock and its encryption method of a kind of decentralization
CN105138891B (en) It is a kind of based on USBKey without driving encryption and decryption certification telecommunication circuit and method
CN102722668A (en) Wireless safety computer lock and using method thereof
CN106210240B (en) A kind of encryption and decryption method and system based on intelligent terminal gyroscope
CN106027229B (en) A kind of encryption and decryption method and system based on intelligent terminal compass
CN104182363A (en) Storing device for unlocking and encrypting through wireless transmission manner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180504

WD01 Invention patent application deemed withdrawn after publication