CN110084074A - A kind of protective device and data equipment - Google Patents

A kind of protective device and data equipment Download PDF

Info

Publication number
CN110084074A
CN110084074A CN201910355796.5A CN201910355796A CN110084074A CN 110084074 A CN110084074 A CN 110084074A CN 201910355796 A CN201910355796 A CN 201910355796A CN 110084074 A CN110084074 A CN 110084074A
Authority
CN
China
Prior art keywords
protective cover
data equipment
attack
detecting unit
attack detecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910355796.5A
Other languages
Chinese (zh)
Other versions
CN110084074B (en
Inventor
胡之斐
李大为
李振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dinghyun Commercial Code Evaluation Technology (shenzhen) Co Ltd
Original Assignee
Dinghyun Commercial Code Evaluation Technology (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dinghyun Commercial Code Evaluation Technology (shenzhen) Co Ltd filed Critical Dinghyun Commercial Code Evaluation Technology (shenzhen) Co Ltd
Publication of CN110084074A publication Critical patent/CN110084074A/en
Application granted granted Critical
Publication of CN110084074B publication Critical patent/CN110084074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation

Abstract

The present invention provides a kind of data equipment and protective device.The protective device, the first protective cover including being open with first, the first attack detecting unit, the second protective cover, the second attack detecting unit and adapter for detecting whether second protective cover is attacked with the second opening in first protective cover for detecting whether first protective cover is attacked;Second protective cover is for accommodating the data equipment;The adapter is located at the first opening and the second opening, connect with the interface of the data equipment;The detection sensitivity of the second attack detecting unit is greater than the first attack detecting unit.Protective device provided by the invention is arranged the first protective cover in the outside of second protective cover and is protected, and carries out duplicate protection, improves safety on the whole.

Description

A kind of protective device and data equipment
Technical field
The present invention relates to field of information security technology more particularly to a kind of protective device and data equipments.
Background technique
With the rapid development of computer technology, computer is increasingly becoming public institution, industrial and commercial enterprises, military-political departments etc. Groundwork mode.The universal and application of computer greatly drives information industry fast-developing, the fast development of information industry A problem is brought, is exactly that information-leakage event is continuously increased, leakage of information is a serious problem, and especially puzzlement is in letter Cease the mechanisms such as finance, security, government, the enterprise of security kernel region.With the continuous development of technology, object has been had already appeared now Reason attack obtains the technology and side channel data acquiring technology of data, both technologies can transported according to computer or chip Perhaps other electrical characteristics detect the calculating or data inside computer or chip to the electromagnetic wave generated in row, this is right Computer or chip data security produce great threat, because both technologies can obtain encryption code key, once Code key is acquired, and ciphertext reforms into plain text, loses the effect of secrecy.Generally, physical attacks can be divided into half intrusive attack It is attacked with intrusive mood.Half intrusive attack refers to the function that hardware is obtained in hardware (such as computer or chip) use process The bypass messages such as consumption, electromagnetic radiation steal hardware information by certain data analysing method.Half intrusive attack mainly for Disclosed cryptographic algorithm is attacked, and for some undocumented cryptographic algorithms, or for storage program, operational data, The key messages such as bus data obtain, and intrusive attack is taken often to become primary selection.Intrusive attack pattern by uncap, The means such as drilling, corrosion realize destruction to hardware package shield (for example, computer or chip carrier), using take pictures, focus from The technologies such as beamlet (Focused Ion Beam, FIB) and microprobe obtain hardware domain structure, modify internal cabling, and reading is deposited Store up data.As it can be seen that attacker can obtain easily in computer or chip after computer or chip are by intrusive mood attack Information.Therefore, intrusive attack is most effective, most thorough means in existing physical attacks, to the information of computer or chip Safety guarantee proposes completely new challenge.
Summary of the invention
To solve the lower technical problem of safety in the prior art, the embodiment of the invention provides a kind of data equipments Protective device and data equipment.
The embodiment of the present invention provides a kind of protective device of data equipment, wherein protects including first with the first opening Shield, for detecting the first attack detecting unit that whether first protective cover attacked, being located in first protective cover The second protective cover with the second opening, for detect the second attack detecting unit that whether second protective cover is attacked and Adapter;Second protective cover is for accommodating the data equipment;The adapter is located at the first opening and the second opening, It is connect with the interface of the data equipment;The detection sensitivity of the second attack detecting unit is greater than the first attack detecting list Member.
Further preferably, first protective cover and/or second protective cover include electromagnetic absorption layer.
Further preferably, further include secure processing module and connect with the secure processing module for protecting the number According to the protection location of equipment, the secure processing module respectively with the first attack detecting unit and the second attack detecting unit Connection, the secure processing module are generated according to the signal that the first attack detecting unit and the second attack detecting unit provide Control signal is transferred to the protection location.
Further preferably, the protection location is located on the adapter, for disconnecting the number when detecting attack According to the connection of equipment.
Further preferably, the protection location is controllable switch or fuse.
Further preferably, the protection location is that the conducting liquid in second protective cover discharges structure, described When second attack detecting unit detects that attack or second protective cover are destroyed, the conducting liquid discharges structure release Conducting liquid.
Further preferably, the secure processing module is more than or equal to or is less than or equal to first threshold according to security parameter, Lock the data equipment;And/or the secure processing module is more than or equal to or is less than or equal to the second threshold according to attack parameter Value, locks the data equipment.
Further preferably, the first attack detecting unit and/or the second attack detecting unit are conductive gauze or light Electric transducer or pressure sensor or temperature sensor or baroceptor or strain gauge or vibrating sensing Device.
It further preferably, further include randomizer, the randomizer is connect with the conductive gauze, is used for Generate interference electromagnetic wave.
The embodiment of the present invention also provides a kind of data equipment, wherein the protective device including above-mentioned data equipment.
The protective device of the data equipment of the embodiment of the present invention second protective cover outside be arranged the first protective cover into Row protection, in the unbroken situation of the first protective cover, the higher second attack detecting unit of detection sensitivity will not trigger alarm Signal reduces maloperation, meanwhile, the higher second attack detecting unit of detection sensitivity ensure that high intrusion detection success rate, Safety is improved on the whole.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without any creative labor, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the data equipment protective device stereoscopic schematic diagram of the embodiment of the present invention.
Fig. 2 is the adaptor structure schematic diagram of the data equipment protective device of the embodiment of the present invention.
Fig. 3 is the data equipment protective device structural schematic diagram of the embodiment of the present invention.
Fig. 4 is the data equipment structural schematic diagram of the embodiment of the present invention.
Fig. 5 is the data equipment fractionation structural representation of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description.It is understood that specific embodiment described herein is only used for explaining the application, rather than to the limit of the application It is fixed.Based on the embodiment in the application, obtained by those of ordinary skill in the art without making creative efforts Every other embodiment, shall fall in the protection scope of this application.
Term " first ", " second ", " third " in the application are used for description purposes only, and should not be understood as instruction or dark Show relative importance or implicitly indicates the quantity of indicated technical characteristic.It follows that define " first ", " second ", The feature of " third " can explicitly or implicitly include at least one of the features.For example, in the model for not departing from the application In the case where enclosing, first kind plane can be known as to the second class plane, and similarly, the second class plane can be known as the first kind and put down Face.First kind plane and the second class plane both plane, but it is not same class plane.It is " more in the description of the present application It is a " it is meant that at least two, such as two, three etc., unless otherwise specifically defined.In addition, term " includes " and " having " and their any deformations, it is intended that cover and non-exclusive include.Such as contain a series of steps or units Process, method, system, product or equipment are not limited to listed step or unit, but optionally further comprising do not arrange Out the step of or unit, or optionally further comprising for the intrinsic other steps of these process, methods, product or equipment or list Member.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Core of the invention thought is using multiple protective, compromise between security and sensitivity, in the case where guaranteeing safety Reduce maloperation, so as to reduce unnecessary loss while obtaining higher-security, be conducive to the popularization of technology with Implement.
Fig. 1 is the data equipment protective device stereoscopic schematic diagram of the embodiment of the present invention.Fig. 2 is the data of the embodiment of the present invention The adaptor structure schematic diagram of equipment protecting equipment.Fig. 3 is the data equipment protective device structural schematic diagram of the embodiment of the present invention. Fig. 1 to Fig. 3 is please referred to, the protective device 1 of the data equipment of the embodiment of the present invention includes the first protection with the first opening 171 Cover 17, for detecting the first attack detecting unit 151 that whether first protective cover 17 attacked, being located at first protective cover 17 The second attack inspection that inside there is the second protective cover 19 of the second opening 191, whether attacked for detecting second protective cover 19 Survey unit 153 and adapter 13;It is preferred that the first attack detecting unit 151 is located at first protective cover 17 and second protection Between cover 19 or on the outside of second protective cover 19 or on the inside of first protective cover 17, the second attack detecting list Member 153 is located in second protective cover 19;Second protective cover 19 is for accommodating the data equipment (not shown), the number According to equipment the equipment such as module can be sent or received for processor, display module, data;The adapter 13 is located at the first opening 171 and second opening 191 at, connect with the interface of the data equipment, for the data equipment of transferring to outside, realize data Using;First opening 171 and the second opening 191 cooperate with the adapter 13 sealing, and guaranteeing will not be by attacker between three It utilizes, implements attack;The detection sensitivity of the second attack detecting unit 153 is greater than the first attack detecting unit 151.This first The attack detecting ability of detection unit 151 is more than or equal to zero.The protective device of the data equipment wraps up the data equipment layer by layer, There are two protective covers to protect for tool, forms duplicate protection.The higher second attack detecting unit 153 of detection sensitivity, which is located at first, to be protected Under shield 17, the variation of external environment does not affect the second attack detecting unit 153 substantially, therefore, base under normal circumstances Originally there is no a possibility that maloperation.When under attack, even if the first protective cover 17 is broken, attacker still cannot obtain institute Key message is needed, key message could be obtained by still needing to break through the second protective cover 19;But the second attack detecting unit 153 detects Sensitivity is greater than the first attack detecting unit 151, and therefore, attacker will trigger the second attack inspection when implementing physics attack It surveys unit 153 and alarm signal occurs, so that data equipment be made to be protected.Certainly, under normal circumstances, attacker is in attack first When protective cover 17, the first attack detecting unit 151 will issue alarm signal.Therefore, the present invention is higher using detection sensitivity Second attack detecting unit 153 and the second protective cover 19 are used as last line of defense, improve intrusion detection (or physical attacks detection or Person's destructive test) success rate;The first protective cover 17 is arranged in the outside of second protective cover 19 to be protected, in the first protective cover The second attack detecting unit 153 will not trigger alarm signal in 17 unbroken situations, reduce maloperation while ensure that height Intrusion detection success rate improves the safety of safety device of the present invention on the whole.
In certain embodiments, which can be layer structure or membrane structure, at this point, second protection Cover can stick on the inner surface of first protective cover or second protective cover can be close to the interior table of first protective cover Face.
The material of first protective cover 17 is rigid plastics or metal, and the material of second protective cover 19 is frangible material Material.In certain embodiments, which includes ontology and the frangible layer on the ontology, the ontology by plastics or Person's metal is made.The frangible layer is preferably the coat of metal, and certainly, which can also be with other coating or film layer.This implementation Example frangible layer or friable material refer to that the intensity of this layer or material is less than 1KPa.First protective cover 17 and the second protective cover 19 In at least one protective cover be it is opaque, attacker cannot by naked eyes or other equipment know internal junction easily Structure.
The protective device of the data equipment of the present embodiment further includes secure processing module 155, the secure processing module 155 In in first protective cover 17.The secure processing module 155 can be located at first protective cover 17 and second protective cover 19 it Between, it can also be located in second protective cover 19.The preferred the latter of the present embodiment guarantees that the secure processing module 155 will not be attacked The person of hitting destroys easily.
The protective device of the data equipment of the present embodiment further includes being connect with the secure processing module 155 for protecting institute State the protection location 131 of data equipment.The secure processing module 155 is attacked with the first attack detecting unit 151 and second respectively The connection of detection unit 153 is hit, the secure processing module 155 is according to the first attack detecting unit 151 and the second attack detecting list The signal that member 153 provides generates control signal and is transferred to the protection location 131.It is preferred that the protection location 131 is located at the adapter On 13, for when detecting attack, (the first attack detecting unit 151 and/or the second attack detecting unit 153 to be detected and attacked When hitting) disconnect the connection of the data equipment;Certainly, in other embodiments, the protection location 131 can be with destroy or The protective device for damaging property, can be destroyed or be damaged to core devices (such as encryption chip, CPU etc.), allow attack Person cannot get valuable information.The protection location 131 is controllable switch or fuse.The protection location 131 is according to the peace Full processing module 155 provides instruction or control signal and generates corresponding movement, such as disconnects the electricity on the adapter 13, makes The data equipment does not work.The controllable switch can be triode or metal-oxide-semiconductor or IGBT or relay etc..The fusing Device can be a fuse or other fusible substances;When attack is detected, which gives the protection Unit 131(, that is, fuse) output larger current, which fuses, so that the data equipment does not work.
In order to further improve the security can, the protective device of the present embodiment preferably data equipment setting security parameter and Attack parameter.It sets when the security parameter dispatches from the factory or is set through authoritative institution, for protecting the protective device of the data equipment Safety in transportational process.The secure processing module 155 is more than or equal to or is less than or equal to first threshold, lock according to security parameter The protective device of the dead data equipment, the data equipment in the protective device of the data equipment cannot work, and guarantee transportational process In safety.By the secure processing module 155, according to the protective device of the data equipment, under fire situation obtains the attack parameter, If attack parameter is more than or equal to or is less than or equal to second threshold, which locks the protection of the data equipment Device, after the protective device for locking data equipment, data equipment in the protective device of the data equipment cannot work, and guarantee The protective device of the data equipment is not by undying attack.It needs to unlock after the protective device of the data equipment is locked, solve By authoritative institution, perhaps company carries out authoritative institution to lock or the security parameter and/or attack parameter are reset to and met by company It is required that numerical value, complete unlock.
As a kind of implementation of the present embodiment, the first attack detecting unit 151 and/or the second attack detecting unit 153 be respectively first sensor and second sensor, the first sensor and second sensor respectively with the secure processing module 155 connections.The first sensor can pass for photoelectric sensor, pressure sensor, temperature sensor, baroceptor, vibration Sensor or strain gauge.The second sensor can also be with photoelectric sensor, pressure sensor, temperature sensor, air pressure transmission Sensor, vibrating sensor or strain gauge.For example, the first sensor is photoelectric sensor, it is located at first protection Between cover 17 and the second protective cover 19 or on the outside of second protective cover 19 or on the inside of first protective cover 17, when First protective cover 17 has light when being physically attacked and destroying and enters between first protective cover 17 and the second protective cover 19, So the photoelectric sensor can generate signal, which is referred to as alarm signal, which is transferred to the safe handling Module 155, which controls the protection location 131 movement and is protected, such as powers off.Second protective cover 19 can be made of fragile paper, which is baroceptor, when second protective cover 19 is destroyed, second sensing The variation that device perceives air pressure generates alarm signal, which is transferred to the secure processing module 155, the safe handling Module 155 controls the protection location 131 movement and is protected, such as powers off.The remolding sensitivity photoelectric sensing of the baroceptor Device is high, therefore, the detection sensitivity of the second attack detecting unit 153 is higher than the first attack detecting unit 151;Or second protection There are certain air pressures in cover 19, which is lower than an atmospheric pressure, when second protective cover 19 is destroyed, second protection Air pressure in cover 19 can appreciate an atmospheric pressure, and baroceptor is very easy to this variation of detection, therefore, there is no need to precision very High baroceptor can realize highly sensitive detection, cost can also be made to reduce.In certain embodiments, second guarantor Shield 19 includes the ontology made of plastics or metal and the frangible layer on the ontology, which is the coat of metal, The second sensor is strain gauge.When the strain gauge perceives the coat of metal stress mutation, alarm signal is generated Number and be sent to the secure processing module 155,155 control and protection unit 131 of secure processing module movement is protected, such as Power-off.
In certain embodiments, which can be layer structure or membrane structure, at this point, second protection Cover can stick on the inner surface of first protective cover or second protective cover can be close to the interior table of first protective cover Face.
As a kind of implementation of the present embodiment, the first attack detecting unit and/or the second attack detecting unit are Conductive gauze.It is preferred that the first attack detecting unit is the first conductive gauze, which is the second conductor wire Net.The first conductive gauze is located on first protective cover 17, which is located on second protective cover 19.This The reticular density of two conductive gauzes is greater than the first conductive gauze.The first conductive gauze and the second conductive gauze respectively with power supply and Between the secure processing module 155, when the conductor wire in the first conductive gauze and the second conductive gauze is broken, the peace Full processing module 155 just can not receive electric current or voltage or receive other signals, the secure processing module 155 it is known that There are attacks.If having electric current or voltage, show not attack, conversely, indicating attack.The secure processing module 155 can also To use other judgment methods, judge whether to be attacked by the first conductive gauze and the second conductive gauze.In order to increase The arrangement of the difficulty of physical attacks, the preferably conductive gauze (the first conductive gauze and/or the second conductive gauze) of the present embodiment is not Rule, it allows attacker to find attacked site there are larger difficulty, improves safety.It is thorough for further difficult attacker Bottom can not find the regularity of conductive gauze arrangement, the present embodiment preferably this be irregularly randomly generated, i.e., conductive gauze arrangement It is random, as long as detection sensitivity can be produced and be met.Further preferably, the protection dress of the data equipment of the present embodiment Setting further includes randomizer, the randomizer connect with the first conductive gauze and/or the second conductive gauze (i.e. with Conductive gauze connection), for generating interference electromagnetic wave.The electric signal that the electric signal and power supply that the randomizer generates generate Together by conductive gauze, the interference electromagnetic wave that conductive gauze generates just has randomness, the frequency and amplitude of the interference electromagnetic wave It is preferred that increasing the difficulty cracked in same range with the electromagnetic wave of the generation of the secure processing module 155 and data equipment.For Difficulty is further increased, the conductor wire of preferably conductive gauze is irregular conductor wire, which includes sectional area Length direction be the conductor wire of variation or surface there is raised or sunken conductor wire or at least there are two bending or Bending be different conductor wire or at least there are two bending or bending be not in the conductor wire of a plane;The variation is Random;Alternatively, the raised or sunken shape or arrangement are random;Alternatively, the shape of the bending or bending or Arrangement is random.The interference electromagnetic wave that conduction gauze of the embodiment of the present invention generates is by randomizer, random arrangement And triple random effects such as irregular conductor wire (this is irregularly random), so that attacker attacks or cracks It has no way of doing it, significantly increases information security.
The adapter 13 includes first end 133 and second end 135, which connect with the interface of data equipment, should First end 133 allows use or power supply etc. of the external equipment to data equipment for external connection.
Protective device 1 in order to facilitate the data equipment of the embodiment of the present invention uses, and the protective device 1 of the data equipment is wrapped Openable upper cover 11 and lower cover 15 are included, which is located on lower lid.Using the data equipment protective device 1 when, Open upper and lower covers, by data equipment be placed in lower cover 15 and by the second end of the adapter 13 135 be inserted into the data equipment Interface, then cover upper cover 11, upper and lower covers lid closed.Upper and lower covers Gai Hehou, the protective device 1 of the data equipment again cannot be by It opens, is removed except nonviolent, ensure that the safety of data equipment.
Fig. 4 is the structural schematic diagram of the data equipment of the embodiment of the present invention.Fig. 5 is the data equipment of the embodiment of the present invention Fractionation structural representation.Referring to figure 4. and Fig. 5, the data equipment 2 of the embodiment of the present invention, including circuit board 273, connect for outside Interface (276,278), controller 277 and the FPGA(field programmable gate array connect) 275, the interface (276,278), controller 277 and FPGA275 is connect with the circuit board 273 respectively, the present embodiment preferably controller 277 by flexible circuit board 279 with Circuit board 273 connects.In the present embodiment, which includes first interface 276 and second interface 278, certainly, In other embodiments, the first interface 276 and second interface 278 be can integrate as an interface.The data equipment 2 further includes tool There is the first protective cover 21 of the first opening (not shown), attacked for detecting whether first protective cover 21 is attacked first It hits detection unit 231, the second protective cover 25 with the second opening (not shown) in first protective cover 21 and uses In detecting the second attack detecting unit 233 for whether being attacked of second protective cover 25.The first attack detecting unit 231 can be with It on first protective cover 21, can also be located on the outer surface of second protective cover 25, may be located on first protection Between cover 21 and second protective cover 25.The second attack detecting unit 233 can be located on second protective cover 25, can also be with In second protective cover 25.The attack detecting ability of the first detection unit 151 is more than or equal to zero.Second protective cover 25 For accommodating the circuit board 273, controller 277 and FPGA275.The interface (276,278) is located at the first opening and the second opening Place is connected for external equipment, and first opening and the second opening cooperate with the interface (276,278) sealing, is guaranteed between three It will not be utilized by attacker, implement attack.The outermost of the interface (276,278) is flushed with first protective cover 21, thus It can prevent the interface (276,278) from being attacked or being detected, ensure that connection safety.Further, preferably the interface (276, 278) outermost is located at the first opening the inside, and such external connection line is all placed in the protection scope of the first protective cover 21 It is interior, further increase the safety of connection.The detection sensitivity of the second attack detecting unit 233 is greater than the first attack detecting Unit 231.Detection sensitivity described in the present embodiment refers to the first attack detecting unit 231 or the second attack detecting unit 233 perception are broken into and (are either attacked or be destroyed) power of ability.The data equipment 2 of the present embodiment has the first protection Cover 21 and the second protective cover 25, when the data equipment 2 is physically attacked, which detects attack, Alarm signal is generated, the attack of attacker can be prevented.Due to the first attack detecting unit 231 detection sensitivity angle compared with It is low, when clever attacker is not detected by the first attack detecting unit 231 when destroying the first protective cover 21, due to the second guarantor The presence of shield 25 needed for attacker cannot still obtain, needs to continue to implement attack.Attacker protects in attack second When covering 25, which detects attack, generates alarm signal, can prevent the attack of attacker.Due to The detection sensitivity of second attack detecting unit 233 is higher, substantially increases attack detecting success rate, ensure that implementation of the present invention The safety of the data equipment 2 of example.Multiple protective protective cover, detection sensitivity high level matches with low level, guarantor while reducing maloperation High attack detecting success rate has been demonstrate,proved, has improved the safety of the data equipment of the embodiment of the present invention on the whole.In order to facilitate assembling And production, the protective cover of the embodiment of the present invention include that upper casing 3 and lower casing 4 are constituted, circuit board 273 waits components to place in lower casing 4, Upper casing is covered again to fix, and completes assembling.The upper protective cover 31 of the upper casing 3 including the first protective cover 21 and the second protective cover 25 it is upper Protective cover 33, the lower casing include the lower protective cover 41 of the first protective cover 21 and the lower protective cover 43 of the second protective cover 25.Further It is preferred that the material of first protective cover 21 is rigid plastics or metal, the material of second protective cover 25 is friable material;Or Person, second protective cover 25 include the ontology made of plastics or metal and the frangible layer on the ontology.The present embodiment Frangible layer or friable material refer to that the intensity of this layer or material is less than 1KPa.In first protective cover 21 and the second protective cover 25 At least one protective cover be it is opaque, attacker cannot by naked eyes or other equipment know internal structure easily. In order to improve safety, distance of the present embodiment preferably between first protective cover 21 and the second protective cover 25 is less than 5mm, attacks in this way The person of hitting can inevitably destroy the second protective cover when breaking through the first protective cover, play safer protection.In order to protect Circuit board 273, the present embodiment preferably circuit board 723 are fixed in the lower protective cover 43 by elastic supporting member for supporting optical member 271.
Further preferably, which further includes the protection location (not shown) connecting with the controller 277, The controller 277 is connect with the first attack detecting unit 231 and the second attack detecting unit 233 respectively, the controller 277 The signal provided according to the first attack detecting unit 231 and the second attack detecting unit 233 generates control signal and is transferred to this Protection location.It is preferred that the protection location is located on the interface (276,278), for (the first attack detecting when detecting attack When unit 231 or the second attack detecting unit 233 detect attack) disconnect the connection of the data equipment 2.The protection location is Controllable switch or fuse.The controllable switch can be triode or metal-oxide-semiconductor or IGBT or relay etc..The fusing Device is a fuse or other fusible substances, and when attack is detected, the controller 277 control is exported to the fuse Larger current, the fuse fuse, so that part of devices or whole devices do not work on the circuit board 273.
In order to further improve the security can, the present embodiment preferably data equipment 2 setting security parameter and attack parameter. It sets when the security parameter dispatches from the factory or is set through authoritative institution, for protecting the safety in 2 transportational process of data equipment.It should Controller 277 is more than or equal to or is less than or equal to first threshold according to security parameter, locks the data equipment, the data equipment 2 It cannot work, guarantee the safety in transportational process.The attack parameter is by the controller 277 according to the data equipment 2 under fire feelings Shape obtains, if attack parameter is more than or equal to or is less than or equal to second threshold, which locks the data equipment 2, locks After data equipment 2, which cannot work, and ensure that the data equipment 2 not by undying attack.The data equipment 2 It needs to unlock after locked, by authoritative institution, perhaps company carries out authoritative institution or company by the security parameter and/or attacks for unlock It hits parameter and resets to satisfactory numerical value, complete unlock.
As a kind of implementation of the present embodiment, the first attack detecting unit 231 and/or the second attack detecting unit 233 be respectively first sensor and second sensor, and the first sensor and second sensor connect with the controller 277 respectively It connects.The first sensor can for photoelectric sensor, pressure sensor, temperature sensor, baroceptor, vibrating sensor or Person's strain gauge.The second sensor can also be with photoelectric sensor, pressure sensor, temperature sensor, baroceptor, vibration Dynamic sensor or strain gauge.For example, the first sensor is photoelectric sensor, it is located at first protective cover 21 and the Between two protective covers 25 or on the outside of second protective cover 25 or on the inside of first protective cover 21, as first guarantor Shield 21 has light and enters between first protective cover 21 and the second protective cover 25 when being physically attacked and destroying, then the light Electric transducer can generate signal, which is referred to as alarm signal, which is transferred to the controller 277, the control Device 277 controls protection location movement and is protected, such as power-off or breaking-up significant data or device.Second protective cover 25 can be made of fragile paper, which is baroceptor, when second protective cover 25 is destroyed, second sensing The variation that device perceives air pressure generates alarm signal, which is transferred to the controller 277, the controller 277 control Protection location movement is protected, such as power-off or breaking-up significant data or device.The remolding sensitivity of the baroceptor Photoelectric sensor is high, therefore, the detection sensitivity of the second attack detecting unit 233 is higher than the first attack detecting unit 231;Or it should There are certain air pressures in second protective cover 25, which is lower than an atmospheric pressure, should when second protective cover 25 is destroyed Air pressure in second protective cover 25 can appreciate an atmospheric pressure, and baroceptor is very easy to this variation of detection and is therefore not required to It wants highly accurate baroceptor that can realize highly sensitive detection, cost can also be made to reduce.In certain embodiments, Second protective cover 25 includes the ontology made of plastics or metal and the frangible layer on the ontology, which is gold Belong to coating, which is strain gauge.When the strain gauge perceives the coat of metal stress mutation, generate Alarm signal is simultaneously sent to the controller 277,277 control and protection unit of controller movement protected, such as power-off or Damage significant data or device.The first sensor can be a variety of of the sensor with second sensor, as long as having one A sensor detects invasion (or attack), which is protected with regard to control and protection unit movement.
As a kind of implementation of the present embodiment, the first attack detecting unit 231 and/or the second attack detecting unit 233 be conductive gauze.It is preferred that the first attack detecting unit 231 is the first conductive gauze, which is Second conductive gauze.The first conductive gauze is located on first protective cover 21, which is located at second protection On cover 25.The reticular density of the second conductive gauze is greater than the first conductive gauze.The first conductive gauze and the second conductive gauze Respectively between power supply and the controller 277, once the conductor wire in the first conductive gauze and the second conductive gauze is broken When, which just can not receive electric current or voltage or receives other signals, the controller 277 it is known that in the presence of Attack.If having electric current or voltage, show not attack, conversely, indicating attack.In order to increase the difficulty of physical attacks, this The arrangement of the preferably conductive gauze (the first conductive gauze and/or the second conductive gauze) of embodiment be it is irregular, allow attacker to seek It looks for attacked site there are larger difficulty, improves safety.For further difficult attacker, conductive gauze row thoroughly can not find The regularity of cloth, the present embodiment preferably this be irregularly randomly generated, i.e., conductive gauze arrangement is random, as long as can produce With meet detection sensitivity.Further preferably, the data equipment 2 of the present embodiment further includes randomizer, this is random Number generator connect and (connect with conductive gauze) with the first conductive gauze and/or the second conductive gauze, for generating interference Electromagnetic wave.The electric signal that the randomizer generates passes through conductive gauze, conductive gauze together with the electric signal that power supply generates The interference electromagnetic wave of generation just has randomness, the electromagnetism that the frequency and amplitude of the interference electromagnetic wave are preferably generated with controller 277 Wave increases the difficulty cracked in same range.The conductor wire of difficulty in order to further increase, preferably conductive gauze is irregular Conductor wire, the irregular conductor wire include sectional area length direction be the conductor wire of variation or surface have it is raised or sunken Conductor wire or at least there are two bending or bending be different conductor wire or at least there are two bending or bending It is not in the conductor wire of a plane;The variation is random;Alternatively, the raised or sunken shape or arrangement are random 's;Alternatively, the shape or arrangement of the bending or bending are random.The interference electricity that conduction gauze of the embodiment of the present invention generates Magnetic wave is triple random by randomizer, random arrangement and irregular conductor wire (this is irregularly random) etc. Effect, has no way of doing it so that attacker attacks or cracks, significantly increases information security.
In order to reduce the data equipment 2 external electromagnetic radiation at work, preferably first protection of the embodiment of the present invention Cover 21 and/or second protective cover 25 further include electromagnetic absorption layer.The electromagnetic adsorption layer is made of electromagnetic wave adsorption material, can To be located at the inside or outside of protective cover.
As a kind of implementation of the present embodiment, the preferably protection location is the conduction in second protective cover 25 Liquid discharges structure, when the second attack detecting Unit 233 is attacked or second protective cover 25 is destroyed, the conducting liquid Discharge structure release conducting liquid.The conducting liquid can flow on the circuit board 273, lead to 273 short circuit of circuit board and stop Work even damage or the shorted devices on the circuit board 273 and stop working even damage.
Although embodiment is illustrated by the attached drawing limited, the those skilled in the art of the art can be in institute It states and carries out a variety of amendments and deformation on the basis of recording.For example, the technology of explanation can be according to the sequence for the method for being different from explanation Execute, and/or explanation system, structure, device, circuit etc. constituent element can according to the method for being different from explanation other Combination of shape and state or combination can reach result appropriate being substituted or being replaced by other constituent elements or equivalent.Therefore, Other constituted modes, other embodiments and what is be equal with Patent request range belong to Patent request range.

Claims (10)

1. a kind of protective device of data equipment, which is characterized in that including having the first protective cover of the first opening, for detecting The first attack detecting unit that whether first protective cover is attacked, in first protective cover with the second opening Second protective cover, for detecting the second attack detecting unit and adapter whether second protective cover is attacked;Described Two protective covers are for accommodating the data equipment;The adapter is located at the first opening and the second opening, sets with the data Standby interface connection;The detection sensitivity of the second attack detecting unit is greater than the first attack detecting unit.
2. the protective device of data equipment according to claim 1, which is characterized in that first protective cover and/or described Second protective cover includes electromagnetic absorption layer.
3. the protective device of data equipment according to claim 1, which is characterized in that further include secure processing module and with institute State secure processing module connection for protecting the protection location of the data equipment, the secure processing module respectively with it is described First attack detecting unit and the connection of the second attack detecting unit, the secure processing module is according to the first attack detecting list The signal that member and the second attack detecting unit provide generates control signal and is transferred to the protection location.
4. the protective device of data equipment according to claim 3, which is characterized in that the protection location is located at the switching On device, for disconnecting the connection of the data equipment when detecting attack.
5. the protective device of data equipment according to claim 4, which is characterized in that the protection location be controllable switch or Person's fuse.
6. the protective device of data equipment according to claim 3, which is characterized in that the protection location is positioned at described the Conducting liquid in two protective covers discharges structure, and the second attack detecting unit detects attack or second protective cover When being destroyed, the conducting liquid discharges structure release conducting liquid.
7. the protective device of data equipment according to claim 3, it is characterised in that:
The secure processing module is more than or equal to or is less than or equal to first threshold according to security parameter, locks the data and sets It is standby;And/or the secure processing module is more than or equal to or is less than or equal to second threshold according to attack parameter, locks the number According to equipment.
8. the protective device of data equipment according to claim 1, which is characterized in that the first attack detecting unit and/ Or second attack detecting unit be conductive gauze or photoelectric sensor or pressure sensor or temperature sensor or gas Pressure sensor or strain gauge or vibrating sensor.
9. the protective device of data equipment according to claim 8, which is characterized in that it further include randomizer, it is described Randomizer is connect with the conductive gauze, for generating interference electromagnetic wave.
10. a kind of data equipment, which is characterized in that the protective device including any one of claim 1 to 9 data equipment.
CN201910355796.5A 2019-01-26 2019-04-29 Protection device and data equipment Active CN110084074B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910075441 2019-01-26
CN2019100754410 2019-01-26

Publications (2)

Publication Number Publication Date
CN110084074A true CN110084074A (en) 2019-08-02
CN110084074B CN110084074B (en) 2021-06-22

Family

ID=67417569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910355796.5A Active CN110084074B (en) 2019-01-26 2019-04-29 Protection device and data equipment

Country Status (1)

Country Link
CN (1) CN110084074B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930648A (en) * 2012-07-03 2013-02-13 青岛海信智能商用系统有限公司 Information security protection device
CN103413105A (en) * 2013-07-08 2013-11-27 北京深思数盾科技有限公司 Device for protecting shell of information safety device
CN205139925U (en) * 2015-11-10 2016-04-06 段少银 Stolen destructors of hard disk of computer
CN105913589A (en) * 2016-01-25 2016-08-31 殷敏鸿 Anti-removal type separation detector
US20160357946A1 (en) * 2015-06-04 2016-12-08 Darin Myman Systems and methods of transforming electronic content
US20170094804A1 (en) * 2015-09-25 2017-03-30 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
CN106887080A (en) * 2017-04-10 2017-06-23 福建强闽信息科技有限公司 A kind of antiwithdrawal device and its application method based on protenchyma network remote alarming
CN206523956U (en) * 2017-02-20 2017-09-26 深圳市证通电子股份有限公司 Paper money supplying module and ATM with intrusion detection feature
CN107506656A (en) * 2017-08-21 2017-12-22 深圳市四季宏胜科技有限公司 A kind of WIFI movable storage devices
CN107978109A (en) * 2017-12-18 2018-05-01 长沙深蓝未来智能技术有限公司 Drum-type tamper sensor
CN207337406U (en) * 2017-09-04 2018-05-08 赵科武 A kind of movable storage device for possessing physics self-destroying function
CN207458250U (en) * 2017-08-23 2018-06-05 百富计算机技术(深圳)有限公司 Mainboard safeguard protection formula POS machine
CN108667981A (en) * 2018-04-23 2018-10-16 佛山市小沙江科技有限公司 A kind of intelligent terminal protection shell
CN108780491A (en) * 2015-11-03 2018-11-09 Ictk控股有限公司 Safety device and its operating method
CN109033891A (en) * 2018-06-21 2018-12-18 北京智芯微电子科技有限公司 Equipment and its security attack test method for SPI interface chip secure attack test
CN109583246A (en) * 2018-11-06 2019-04-05 大唐微电子技术有限公司 A kind of chip makes physical safety detection device and method

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930648A (en) * 2012-07-03 2013-02-13 青岛海信智能商用系统有限公司 Information security protection device
CN103413105A (en) * 2013-07-08 2013-11-27 北京深思数盾科技有限公司 Device for protecting shell of information safety device
US20160357946A1 (en) * 2015-06-04 2016-12-08 Darin Myman Systems and methods of transforming electronic content
US20170094804A1 (en) * 2015-09-25 2017-03-30 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
CN108780491A (en) * 2015-11-03 2018-11-09 Ictk控股有限公司 Safety device and its operating method
CN205139925U (en) * 2015-11-10 2016-04-06 段少银 Stolen destructors of hard disk of computer
CN105913589A (en) * 2016-01-25 2016-08-31 殷敏鸿 Anti-removal type separation detector
CN206523956U (en) * 2017-02-20 2017-09-26 深圳市证通电子股份有限公司 Paper money supplying module and ATM with intrusion detection feature
CN106887080A (en) * 2017-04-10 2017-06-23 福建强闽信息科技有限公司 A kind of antiwithdrawal device and its application method based on protenchyma network remote alarming
CN107506656A (en) * 2017-08-21 2017-12-22 深圳市四季宏胜科技有限公司 A kind of WIFI movable storage devices
CN207458250U (en) * 2017-08-23 2018-06-05 百富计算机技术(深圳)有限公司 Mainboard safeguard protection formula POS machine
CN207337406U (en) * 2017-09-04 2018-05-08 赵科武 A kind of movable storage device for possessing physics self-destroying function
CN107978109A (en) * 2017-12-18 2018-05-01 长沙深蓝未来智能技术有限公司 Drum-type tamper sensor
CN108667981A (en) * 2018-04-23 2018-10-16 佛山市小沙江科技有限公司 A kind of intelligent terminal protection shell
CN109033891A (en) * 2018-06-21 2018-12-18 北京智芯微电子科技有限公司 Equipment and its security attack test method for SPI interface chip secure attack test
CN109583246A (en) * 2018-11-06 2019-04-05 大唐微电子技术有限公司 A kind of chip makes physical safety detection device and method

Also Published As

Publication number Publication date
CN110084074B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
US5353350A (en) Electro-active cradle circuits for the detection of access or penetration
US11704445B2 (en) Tamper resistant module for industrial control system
US5389738A (en) Tamperproof arrangement for an integrated circuit device
Weingart Physical security devices for computer subsystems: A survey of attacks and defenses
US10439998B2 (en) Autonomous sensor system with intrinsic asymmetric encryption
US20120198242A1 (en) Data protection when a monitor device fails or is attacked
US20100242115A1 (en) Security cover
CN105488421B (en) Battery-free intrusion detection system and method for industrial and metering devices
US20080129501A1 (en) Secure chassis with integrated tamper detection sensor
US20080134349A1 (en) Card slot anti-tamper protection system
US20140146485A1 (en) Technique for intrusion detection
CN105825599B (en) A kind of multiple-protection system, method and the POS machine of the anti-intrusion of POS machine
CN108810035A (en) A kind of Network Security Device monitored in real time
Isaacs et al. Tamper proof, tamper evident encryption technology
US20080192240A1 (en) Methods and systems for recognizing tamper events
CN107657183A (en) The data security protection method and device of electronic equipment
CN109522732A (en) A kind of server of encrypted antitheft
CN110084074A (en) A kind of protective device and data equipment
CN104408386B (en) A kind of detaching-proof protection device
CN110096906A (en) A kind of safety device
CN101246454A (en) Information storage equipment protecting equipment and production method for the same
CN107133534A (en) A kind of data protecting device, electronic equipment and data destruction method
CN115413339A (en) Chip, chip packaging structure and electronic equipment
Zhang et al. The security protection technology and architectural design of distributed generation scheduling control systems
CN116469838A (en) Prevent infrared detection chip layout structure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant