CN110210260B - Data self-destruction system and method - Google Patents

Data self-destruction system and method Download PDF

Info

Publication number
CN110210260B
CN110210260B CN201910513429.3A CN201910513429A CN110210260B CN 110210260 B CN110210260 B CN 110210260B CN 201910513429 A CN201910513429 A CN 201910513429A CN 110210260 B CN110210260 B CN 110210260B
Authority
CN
China
Prior art keywords
destruction
data
power supply
supply system
monitoring unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910513429.3A
Other languages
Chinese (zh)
Other versions
CN110210260A (en
Inventor
高阳
赵孝雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Forward Industrial Co Ltd
Original Assignee
Shenzhen Forward Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Forward Industrial Co Ltd filed Critical Shenzhen Forward Industrial Co Ltd
Priority to CN201910513429.3A priority Critical patent/CN110210260B/en
Publication of CN110210260A publication Critical patent/CN110210260A/en
Application granted granted Critical
Publication of CN110210260B publication Critical patent/CN110210260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data self-destruction system and a method thereof, relating to the technical field of communication, the embodiment of the invention provides the data self-destruction system, which comprises the following steps: the monitoring unit is used for destroying data in the storage unit under the condition that the first destroying instruction is received, namely when the storage unit is stolen by opening the whole machine by someone, the data information in the storage unit is immediately and automatically destroyed through the monitoring unit, so that the leakage of the data information of the whole machine is prevented, and the confidentiality of the data information of the whole machine is improved.

Description

Data self-destruction system and method
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data self-destruction system and method.
Background
After the external power supply of the communication equipment with the data storage function such as a switch is disconnected, the prior art cannot perform data destruction operation, and a stealer can open the whole machine to steal the storage chip and read data from the storage chip, so that the data of the whole machine is leaked, and the data security is insufficient.
Aiming at the problem of insufficient safety of data resources of the whole machine in the prior art, no effective solution is provided at present.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a self-destruction system and method, which can perform data destruction operation during power failure, so as to alleviate the technical problem of insufficient security of data resources during power failure.
In a first aspect, an embodiment of the present invention provides a data self-destruction system, including: the monitoring unit, the sensor and the storage unit; the sensor is used for sending a first destroying instruction to the monitoring unit under the condition of detecting the interrupt signal; the monitoring unit is used for destroying the data in the storage unit under the condition of receiving the first destroying instruction.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where the first possible implementation manner further includes a main power supply system and a main control unit, and the monitoring unit is further configured to detect an on/off state of the main power supply system when receiving the first destruction instruction, and perform corresponding operations on the storage unit and the main control unit according to the on/off state.
With reference to the first possible implementation manner of the first aspect, an embodiment of the present invention provides a second possible implementation manner of the first aspect, where the monitoring unit is further configured to destroy data in the storage unit when the main power supply system is in a closed state; or, under the condition that the main power supply system is in an open state, closing a storage bus interface between the monitoring unit and the main control unit, and destroying data in the storage unit.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present invention provides a third possible implementation manner of the first aspect, where the monitoring unit is configured to close a storage bus interface between the monitoring unit and the main control unit and destroy data in the storage unit when receiving a second destruction instruction sent by the main control unit.
With reference to the first aspect or the first possibility of the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, where the monitoring unit is further configured to generate a destruction time point, generate a destruction record according to the destruction time point, and store the destruction record.
With reference to the first possible implementation manner of the first aspect, an embodiment of the present invention provides a fifth possible implementation manner of the first aspect, where the monitoring unit is further configured to detect a terminal voltage of the main power supply system, and obtain an on/off state of the main power supply system according to a comparison between the terminal voltage and a start threshold.
With reference to the first possible implementation manner of the first aspect, an embodiment of the present invention provides a sixth possible implementation manner of the first aspect, where the main power supply system is configured to supply power to the data self-destruction system and/or the battery power supply system.
With reference to the first possible implementation manner of the first aspect, an embodiment of the present invention provides a seventh possible implementation manner of the first aspect, where the data self-destruction system further includes a battery power supply system, and the battery power supply system is configured to supply power to the data self-destruction system when the main power supply system is in an off state.
In a second aspect, an embodiment of the present invention further provides a data self-destruction method, including: under the condition that the interrupt signal is detected, the sensor sends a first destroying instruction to the monitoring unit; and under the condition of receiving the first destruction instruction, the monitoring unit destroys the data in the storage unit.
With reference to the second aspect, an embodiment of the present invention provides a first possible implementation manner of the second aspect, where, in a case that the first destruction instruction is received, the step of destroying, by the monitoring unit, the data in the storage unit includes: under the condition of receiving a first destroying instruction, detecting the opening and closing state of a main power supply system; and respectively carrying out corresponding operation on the storage unit and the main control unit according to the opening and closing states.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention provides a data self-destruction system and a method, comprising the following steps: when someone opens the whole machine to steal the storage unit, the main power supply system or the battery power supply system provides working power supply for the storage unit, the monitoring unit and the sensor, the data information in the storage unit can be immediately and automatically destroyed through the monitoring unit, leakage of the data information of the whole machine is prevented, and the confidentiality of the data information of the whole machine is improved. Meanwhile, the battery power supply system can be charged when the main power supply system is in a starting state, the battery does not need to be replaced, the use is simple and convenient, and the cruising ability of the data self-destruction system is improved.
Additional features and advantages of the disclosure will be set forth in the description which follows, or in part may be learned by the practice of the above-described techniques of the disclosure, or may be learned by practice of the disclosure.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic structural diagram of a data self-destruction system according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of another data self-destruction system according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of another data self-destruction system according to an embodiment of the present invention;
fig. 4 is a flowchart of a data self-destruction method according to an embodiment of the present invention.
Icon: 100-a monitoring unit; 120-a sensor; 140-a storage unit; 200-a main power supply system; 220-a master control unit; 300-battery powered system.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, not all, embodiments of the present invention.
Based on the fact that the safety of data resources of the whole machine is insufficient at present, the data self-destruction system and the data self-destruction method provided by the embodiment of the invention can prevent the leakage of data information of the whole machine and improve the confidentiality of the data information of the whole machine.
In order to facilitate understanding of the embodiment, a detailed description is first given of a data self-destruction system disclosed in the embodiment of the present invention.
Example 1
As shown in fig. 1, a schematic structural diagram of a data self-destruction system provided in an embodiment of the present invention includes: a monitoring unit 100, a sensor 120 and a storage unit 140. The data self-destruction system can be applied to communication equipment with a data storage function, such as a switch. The memory unit 140 and the monitoring unit 100 are connected by a memory bus, and the memory bus may be a NAND memory bus.
The sensor 120 is configured to send a first destruction instruction to the monitoring unit 100 in case an interrupt signal is detected. The sensor 120 may be an ultrasonic displacement sensor, a photoelectric displacement sensor, a hall displacement sensor, or the like. The interrupt signal is that the target component of the whole machine generates displacement, the storage unit 140 can be taken out through a gap generated by the movement of the target component, the selection of the target component is different according to different designs of the whole machine, wherein the target component can be an upper cover of the whole machine, and when people open the upper cover of the whole machine, the upper cover moves to generate displacement, and the interrupt signal is generated. A first destruction instruction corresponding to the interrupt signal is set in the sensor 120 in advance, and when the sensor 120 receives the interrupt signal, the first destruction instruction is immediately sent to the monitoring unit 100, so that the first destruction instruction is a passive destruction instruction sent by the sensor 120 to the monitoring unit 100, and according to the first destruction instruction, without user control, the monitoring unit 100 can automatically destroy the data information in the storage unit 140. Meanwhile, the transmission mode of the first destruction instruction may adopt a real-time transmission mode such as a wired transmission mode, a wireless transmission mode, and the like, so as to shorten the reaction time of the sensor 120.
The monitoring unit 100 is configured to destroy the data in the storage unit 140 when receiving the first destruction instruction. The storage unit 140 stores data information such as software images, encryption algorithms, and keys of the entire device. The monitoring unit 100 can read and destroy the data information in the storage unit 140, and may adopt a microcomputer system such as an EPLD (Erasable Programmable Logic Device) or a single chip microcomputer. The storage unit 140 and the monitoring unit 100 are connected by a storage bus, so that the monitoring unit 100 can rapidly destroy the data information in the storage unit 140 by the storage bus when receiving the first destruction instruction. Meanwhile, the destruction speed directly affects the destruction effect, and if the destruction speed is too slow, the complete machine may be powered off, so that the data information in the storage unit 140 is not completely destroyed, and thus, part of the data information is leaked. Therefore, the storage unit 140 can adopt a Nand-flash memory with a faster data destruction speed, so that the time required for data destruction is shortened, the risk of data information leakage is reduced, and the security of the data self-destruction system is improved.
The embodiment of the invention provides a data self-destruction system, which comprises: the monitoring unit is used for destroying data in the storage unit under the condition that the first destroying instruction is received, namely when the storage unit is stolen by opening the whole machine by someone, the data information in the storage unit is immediately and automatically destroyed through the monitoring unit, so that the leakage of the data information of the whole machine is prevented, and the confidentiality of the data information of the whole machine is improved.
As shown in fig. 2, a schematic structural diagram of a data self-destruction system provided in an embodiment of the present invention includes: the main power supply system 200 comprises a voltage conversion circuit which converts alternating current high voltage electricity input from the outside into direct current low voltage electricity to provide a working power supply for the whole machine, and the main control unit 220 comprises a main power supply system 200. The main control unit 220 is a control chip of the whole machine, and accesses and controls the data information of the storage unit 140 by controlling the monitoring unit 100. The master control unit 220 is connected with the monitoring unit 100 through a storage bus and a control bus.
The monitoring unit 100 is further configured to detect an open/close state of the main power supply system 200 when the first destruction instruction is received, and perform corresponding operations on the storage unit 140 and the main control unit 220 according to the open/close state. When the main power supply system 200 is in the on state, the main power supply system 200 has a voltage input, i.e., the whole machine is powered on. When the main power supply system 200 is in the off state, the main power supply system 200 has no voltage input, i.e. the whole machine is powered off. The monitoring unit 100 is further configured to detect a terminal voltage of the main power supply system 200, and obtain an on/off state of the main power supply system according to a comparison between the terminal voltage and a start threshold. A starting threshold of the main power supply system 200 needs to be preset in the monitoring unit 100, and when it is detected that the terminal voltage of the main power supply system 200 is greater than or equal to the starting threshold, it is determined that the main power supply system 200 is in an on state; when it is detected that the terminal voltage of the main power supply system 200 is smaller than the startup threshold, it is determined that the main power supply system 200 is in the shutdown state. The monitoring unit 100 performs a data destruction operation on the storage unit 140 according to the state of the main power supply system 200, where the data destruction operation process needs to destroy all data information in the storage unit 140, and the destruction operation process involves the storage unit 140 and the main control unit 220.
The monitoring unit 100 is also used for destroying data in the storage unit 140 in case the main power supply system 200 is in a closed state. Or in the case that the main power supply system 200 is in the on state, the storage bus interface between the monitoring unit 100 and the main control unit 220 is closed, and the data in the storage unit is destroyed. When the monitoring unit 100 receives the first destruction instruction and detects that the main power supply system 200 is in the off state, all data information in the storage unit 140 is destroyed directly through the storage bus. When the monitoring unit 100 receives the first destruction instruction and detects that the main power supply system 200 is in the on state, the storage bus interface between the monitoring unit 100 and the main control unit 220 is first closed, so that the data of the storage unit 140 is prevented from being read, written and stored by the main control unit 220 in the process of destroying the data information in the storage unit 140, and then the data information in the storage unit 140 is completely destroyed, so that the data information is prevented from being destroyed by mistake.
The monitoring unit 100 is configured to close a storage bus interface between the monitoring unit 100 and the main control unit 220 and destroy data in the storage unit 140 when receiving the second destruction instruction sent by the main control unit 220. When the main power supply system 200 is in an on state, the storage buses at the two ends of the monitoring unit 100 are directly connected, that is, the main control unit 220 can directly control the storage unit 140, and at this time, the monitoring unit 100 is transparent, so that data on the storage buses can be transmitted, and the data in the storage unit 140 can be conveniently destroyed and read by the software of the whole machine. The second destruction instruction is a user active destruction instruction sent by the main control unit 220 to the monitoring unit 100, and when the user needs to destroy the data information of the storage unit 140, the user may input the second destruction instruction by using an external button, a control interface, or the like.
When the monitoring unit 100 starts the data information destruction operation of the storage unit 140, the monitoring unit 100 is further configured to generate a destruction time point, where the destruction time point may be a start time of the data information destruction operation performed by the monitoring unit 100, generate a destruction record according to the destruction time point, and store the destruction record in the storage space of the monitoring unit 100, so that a user can take and view the data information conveniently through the main control unit 220.
As shown in fig. 3, a schematic structural diagram of a data self-destruction system provided in an embodiment of the present invention includes: the battery power supply system 300, the battery power supply system 300 includes an energy storage battery, and is used for supplying power to the data self-destruction system when the main power supply system 200 is in the off state. When the main power supply system 200 is in the off state, the battery power supply system 300 starts supplying power. In consideration of battery endurance, the power supply range of the battery power supply system 300 covers only the storage monitoring unit 100, the sensor 120, and the storage unit 140. Meanwhile, the memory cell 140 operates in a standby mode, such as an Nor-flash memory and a Nand-flash memory, which can both receive a bus command to enter the standby mode, so that the current of the memory cell 140 is reduced to a few tenths of that of the normal operation. The monitoring unit 100 also enters a low power consumption state, only the destruction module for data destruction operation therein is turned on, and other interfaces and functional units are all turned off. The sensor 120 may take the form of a physical key sensing or periodic wake-up detection chip to reduce power consumption. This can greatly increase the power supply time of the battery power supply system 300. If the monitoring unit 100 adopts a single chip microcomputer, the storage unit 140 adopts a Nand-flash memory, the sensor 120 adopts a photoelectric displacement sensor, and when the main power supply system 200 is in a closed state, the energy storage battery adopts a 5000mAh battery, theoretically, the data self-destruction system can stand by for 5 months. The main power supply system 200 is used for supplying power to the data self-destruction system and/or the battery power supply system 300, when the main power supply system 200 is in an on state, the main power supply system 200 is used for supplying power to the data self-destruction system, and when the terminal voltage in the battery power supply system 300 is lower than the rated voltage of the energy storage battery, the main power supply system 200 supplies power to the battery power supply system 300, and the cruising ability of the data self-destruction system is improved.
The embodiment of the invention provides a data self-destruction system, which comprises: when someone opens the whole machine to steal the storage unit, the main power supply system or the battery power supply system provides working power supply for the storage unit, the monitoring unit and the sensor, the data information in the storage unit can be immediately and automatically destroyed through the monitoring unit, leakage of the data information of the whole machine is prevented, and the confidentiality of the data information of the whole machine is improved. Meanwhile, the battery power supply system can be charged when the main power supply system is in a starting state, the battery does not need to be replaced, the use is simple and convenient, and the cruising ability of the data self-destruction system is improved.
Example 2
As shown in fig. 4, a flowchart of a data self-destruction method provided in the embodiment of the present invention includes steps S401 to S402, which are specifically as follows:
step S401, under the condition that the interrupt signal is detected, the sensor sends a first destroying instruction to the monitoring unit;
step S402, in the case of receiving the first destruction instruction, the monitoring unit destroys the data in the storage unit.
The step S402 of the above embodiment includes: under the condition of receiving a first destroying instruction, detecting the opening and closing state of a main power supply system; and respectively carrying out corresponding operation on the storage unit and the main control unit according to the opening and closing states.
The data self-destruction method provided by the embodiment of the invention has the same technical characteristics as the data self-destruction system provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The computer program product for performing the data self-destruction method provided in the embodiment of the present invention includes a computer readable storage medium storing a nonvolatile program code executable by a processor, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, which is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. A data self-destruction system, comprising: the monitoring unit, the sensor and the storage unit;
the sensor is used for sending a first destroying instruction to the monitoring unit under the condition of detecting an interrupt signal;
the monitoring unit is used for destroying the data in the storage unit under the condition of receiving the first destroying instruction;
the monitoring unit is further used for detecting the opening and closing states of the main power supply system under the condition that the first destruction instruction is received, and respectively carrying out corresponding operations on the storage unit and the main control unit according to the opening and closing states;
the monitoring unit is further used for destroying the data in the storage unit under the condition that the main power supply system is in a closed state;
or,
and under the condition that the main power supply system is in an open state, closing a storage bus interface between the monitoring unit and the main control unit, and destroying the data in the storage unit.
2. The data self-destruction system according to claim 1, wherein the monitoring unit is configured to close the storage bus interface between the monitoring unit and the main control unit and destroy the data in the storage unit when receiving a second destruction instruction sent by the main control unit.
3. The data self-destruction system according to claim 1, wherein the monitoring unit is further configured to generate a destruction time point, generate a destruction record according to the destruction time point, and store the destruction record.
4. The data self-destruction system as claimed in claim 1, wherein the monitoring unit is further configured to detect a terminal voltage of the main power supply system, and obtain the on/off state of the main power supply system according to a comparison between the terminal voltage and a start threshold.
5. The data self-destruction system according to claim 1, wherein the main power supply system is used for supplying power to the data self-destruction system and/or a battery power supply system.
6. The data self-destruction system according to claim 1, further comprising a battery power supply system,
the battery power supply system is used for supplying power to the data self-destruction system under the condition that the main power supply system is in a closed state.
7. A data self-destruction method is characterized by comprising the following steps:
under the condition that the interrupt signal is detected, the sensor sends a first destroying instruction to the monitoring unit; under the condition that the first destroying instruction is received, the monitoring unit destroys data in the storage unit;
wherein, the step of destroying the data in the storage unit by the monitoring unit when the first destruction instruction is received includes:
under the condition that the first destroying instruction is received, detecting the opening and closing state of a main power supply system;
respectively carrying out corresponding operation on the storage unit and the main control unit according to the opening and closing states;
wherein, under the condition that the main power supply system is in a closed state, the data in the storage unit is destroyed;
or,
and under the condition that the main power supply system is in an open state, closing a storage bus interface between the monitoring unit and the main control unit, and destroying the data in the storage unit.
CN201910513429.3A 2019-06-13 2019-06-13 Data self-destruction system and method Active CN110210260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910513429.3A CN110210260B (en) 2019-06-13 2019-06-13 Data self-destruction system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910513429.3A CN110210260B (en) 2019-06-13 2019-06-13 Data self-destruction system and method

Publications (2)

Publication Number Publication Date
CN110210260A CN110210260A (en) 2019-09-06
CN110210260B true CN110210260B (en) 2020-12-08

Family

ID=67792537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910513429.3A Active CN110210260B (en) 2019-06-13 2019-06-13 Data self-destruction system and method

Country Status (1)

Country Link
CN (1) CN110210260B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612390B (en) * 2020-03-31 2022-12-06 上海钎劢科技设备有限公司 Environment monitoring type storage device and method
CN114077757B (en) * 2020-08-14 2023-12-19 台山市培英职业技术学校 Data security storage device and method
CN114050902B (en) * 2021-11-10 2023-12-19 南京南瑞信息通信科技有限公司 Key protection system and method for improving applicability of password card

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217177A (en) * 2013-05-31 2014-12-17 中晟国计科技有限公司 One-computer double-network physical isolation double-display computer with switching circuit
CN108241320A (en) * 2017-12-18 2018-07-03 北京车和家信息技术有限公司 Operating mode control method and operating mode control system

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8112807B2 (en) * 2007-11-07 2012-02-07 Qualcomm Incorporated Systems, methods, and apparatuses for erasing memory on wireless devices
CN101504630A (en) * 2009-03-02 2009-08-12 成都市华为赛门铁克科技有限公司 Data destroying method of memory device and memory device
CN201465553U (en) * 2009-05-04 2010-05-12 同方股份有限公司 Mobile storage device with self-destruction function
CN101634972A (en) * 2009-09-01 2010-01-27 成都市华为赛门铁克科技有限公司 Data protection method and data protection device of movable storage equipment and movable storage equipment
EP2795509A4 (en) * 2011-12-22 2015-09-02 Intel Corp Always-available embedded theft reaction subsystem
CN203013274U (en) * 2012-12-26 2013-06-19 中国航空工业集团公司第六三一研究所 Data self-destructive electronic hard disk
EP3975014A1 (en) * 2013-03-15 2022-03-30 INTEL Corporation Technologies for secure storage and use of biometric authentication information
CN103942505A (en) * 2014-04-14 2014-07-23 立德高科(北京)数码科技有限责任公司 Device and method for attacking current computer with unmatched hardware identity
MA40477A (en) * 2014-08-26 2016-03-03 Pahmet Llc SYSTEM AND METHOD FOR SELF-CONTROLLED OR REMOTE-CONTROLLED DESTRUCTION OF STORED INFORMATION OR COMPONENTS
CN204440401U (en) * 2015-03-26 2015-07-01 山东超越数控电子有限公司 A kind of anti-violence disassembles computing machine
CN105574444A (en) * 2015-12-11 2016-05-11 无锡市同芯恒通科技有限公司 Device for important data destruction of disassembly trigger device
CN206209730U (en) * 2016-11-10 2017-05-31 天津光电聚能专用通信设备有限公司 A kind of Information Security equipment
CN108039951A (en) * 2017-12-27 2018-05-15 长沙深蓝未来智能技术有限公司 How anti-symbiotic type row be counter to separate self-desttruction equipment
CN109697345B (en) * 2018-11-26 2020-06-05 维沃移动通信有限公司 Data destruction method and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217177A (en) * 2013-05-31 2014-12-17 中晟国计科技有限公司 One-computer double-network physical isolation double-display computer with switching circuit
CN108241320A (en) * 2017-12-18 2018-07-03 北京车和家信息技术有限公司 Operating mode control method and operating mode control system

Also Published As

Publication number Publication date
CN110210260A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
CN110210260B (en) Data self-destruction system and method
US20070260892A1 (en) System and method for authenticating a power source
CN101261663B (en) Method and system for protection of secure electronic modules against attacks
CN104220994A (en) System and method for protecting data stored on a removable data storage device
EP2866215A1 (en) Touch screen terminal and alarm method thereof
US11493967B2 (en) Thermal shutdown with hysteresis
US20120254967A1 (en) External device having at least one memory
CN111465927A (en) System and method for power mode selection in a computing device
CN103049694A (en) Core safety architecture implementation method of intelligent financial transaction terminal
CN101782951A (en) Hard disc remote destroying antitheft system and method
CN105573372B (en) A kind of control method and device of intelligent terminal
EP1542180B1 (en) Electronic data processing device
CN112099613B (en) Server case cover opening detection method and device
CN113608930B (en) System chip and electronic device
CN201600704U (en) Hard disk remote destruction anti-theft system
CN109460982A (en) Digital asset wallet anti-dismantling device and method
CN111340495B (en) Payment machine and payment method
CN113434915A (en) Case intrusion state detection device and method and edge server
WO2013100899A1 (en) Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely
CN105740677B (en) A kind of method for start-up and shutdown, system and intelligent mobile terminal
CN114139221B (en) Key state detection method, device, equipment and medium
CN210627201U (en) Intelligent key equipment with anti-dismantling self-destruction function
US9305452B2 (en) Battery over-charge and over-discharge protection system and battery protection method able to release a protection state
Mozny et al. Design of physical security for constrained end devices within the IoT ecosystem
CN207336603U (en) A kind of electric energy meter preventing fraudulent use of electricity monitoring device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant