CN110490010B - Automatic data destruction method based on multi-factor environmental perception - Google Patents

Automatic data destruction method based on multi-factor environmental perception Download PDF

Info

Publication number
CN110490010B
CN110490010B CN201910749354.9A CN201910749354A CN110490010B CN 110490010 B CN110490010 B CN 110490010B CN 201910749354 A CN201910749354 A CN 201910749354A CN 110490010 B CN110490010 B CN 110490010B
Authority
CN
China
Prior art keywords
factor
data
list
automatically
detection module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910749354.9A
Other languages
Chinese (zh)
Other versions
CN110490010A (en
Inventor
何小林
栗佳慧
周超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tailixin Technology Co ltd
Original Assignee
Beijing Tailixin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tailixin Technology Co ltd filed Critical Beijing Tailixin Technology Co ltd
Priority to CN201910749354.9A priority Critical patent/CN110490010B/en
Publication of CN110490010A publication Critical patent/CN110490010A/en
Application granted granted Critical
Publication of CN110490010B publication Critical patent/CN110490010B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

The invention relates to a data automatic destroying method and system based on multi-factor environmental perception, the method sets a factor list containing multi-factor environmental perception aiming at a storage medium needing to be protected, sets a data reading factor condition with a safety protection mechanism according to the actual requirement of the factor list, detects whether the factor condition under the current read-write request environment accords with the set data reading factor condition by detecting whether the preset factor list exists or not and comparing the factor condition under the read-write request with the preset data reading factor condition, can effectively identify an illegal transfer storage medium and an illegal read-write request, and can automatically execute a data destroying process when the illegal request is identified, thereby preventing the risk of data leakage.

Description

Automatic data destruction method based on multi-factor environmental perception
Technical Field
The invention relates to the technical field of data protection, in particular to an automatic data destruction method based on multi-factor environmental perception.
Background
With the development of information technology, many traditional mechanical devices use information intelligence technology in a large quantity, and information data storage devices are required to be equipped in the devices. These devices are readily accessible under certain conditions, so that reading sensitive data held by the storage device results in the disclosure of critical important information content. Currently, most of existing data destruction technologies pay attention to whether data blocks in a data destruction technology means can read data and destroy data efficiency, but when data destruction is determined, a signal for starting or sending one-key destruction (such as equipment loss, equipment theft and incapability of executing destruction operation in military exercises) needs to be sent at any time, so that the data information stored in the equipment still has a great leakage risk. That is to say, most of the existing technical solutions at present explain that data or storage media can be destroyed quickly after receiving a destruction signal, but do not explain when triggering the destruction signal, for example, in military war, once the device is intercepted by an enemy, and when the destruction signal is not sent, data destruction cannot be completed, resulting in information leakage. How to intelligently and automatically identify the risk of disclosure of the storage device or the whole device and automatically start a data destruction program to eliminate information safety hidden dangers when the risk is identified is a difficult problem to be solved urgently.
The core of the technology of the scheme is that whether the data storage state is wholly dangerous or not is judged by sensing the data environment, so that whether the whole stored data is thoroughly destroyed or not is judged, and the whole data leakage caused by reproducing malicious storage media is avoided. The design of the scheme is mainly characterized in that the key point of protection is that the automatic or manual data destruction triggering technology can be combined with the existing data destruction algorithm when the factor environment changes, so that the technology of the existing mainstream design scheme for rapidly destroying and deleting data is overcome, the data deletion technology is triggered by the factors and the environment without knowing the time and the factors, and the data is deleted and destroyed to eliminate the potential safety hazard of information leakage.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a data automatic destruction method based on multi-factor environment sensing, which judges whether the data storage state has overall danger or not through sensing the data environment, and further triggers a data destruction flow according to the sensed risk, so that overall data leakage caused by maliciously obtaining a storage medium is prevented. The invention also relates to an automatic data destruction system based on the multi-factor environment perception.
In order to achieve the above purpose, the technical scheme adopted by the invention comprises the following steps:
a data automatic destruction method based on multi-factor environment perception is characterized by comprising the following steps:
A. setting a multi-factor checking application program based on multi-factor environment perception aiming at a storage medium needing to be protected, wherein a factor list containing the multi-factor environment perception is preset in the multi-factor checking application program, and a data reading factor condition with a safety protection mechanism is set according to the actual requirement of the factor list;
B. when a read-write request aiming at the data content of a storage medium needing to be protected occurs, automatically starting a multi-factor checking application program, detecting whether a preset factor list exists or not, automatically calling a data destruction instruction to automatically destroy data when the detection result is negative, and entering the following steps when the detection result is positive;
C. checking the factor condition under the current read-write request environment according to the set data read factor condition; and when the multi-factor checking application program judges that the factor condition in the current read-write request environment meets the set data reading factor condition, allowing the data read-write request to be executed, otherwise, automatically calling a data destruction instruction to automatically destroy the data.
Further, a step B' is further provided between the steps B and C, and after detecting that the preset factor list is stored, whether the preset factor list is tampered is further detected, when detecting that the preset factor list is tampered, a data destruction instruction is automatically called to automatically destroy data, and when detecting that the preset factor list is not tampered, the step C is executed again.
Further, in the step B', it is detected whether the preset factor list is tampered with, and the encryption and decryption technology is used to open the factor list after the secret key is obtained, and when the factor list cannot be opened in a plaintext manner or is a messy code, it is determined that the factor list is tampered with, and a data destruction instruction is automatically called to automatically destroy data.
Further, step a generates more than two identical factor lists by adopting a multi-copy mode when the factor list is preset, and checks whether all the factor lists are consistent when step B' detects whether the preset factor list is tampered, and determines that the factor list is tampered and automatically calls a data destruction instruction to automatically destroy data once one list is inconsistent with other factor lists.
Further, the multi-factor checking application program set in step a is a read-only program written into a specific write-once data space in the storage medium; the specific write-once data space is a data space which is in a read-only state after being written once.
Further, the storage medium includes a mechanical hard disk, a solid state hard disk, a removable storage medium and/or a rewritable optical disk.
Further, the multiple factors of environmental perception in the factor list preset in step a include hardware device information on which the storage medium depends, BIOS information used by the storage medium, operating system information used by the storage medium, and/or factor list information; the hardware equipment information depended by the storage medium comprises mainboard information, cpu information, memory information and/or peripheral information; the operating system information used by the storage medium includes operating system version information, specific application value information and/or specific driver information; the factor list information includes list content integrity information and/or list content modification information.
Further, when the data is automatically destroyed, a data destruction algorithm is adopted to automatically delete the data and then formatting operation is continuously executed for a plurality of times on the storage medium.
An automatic data destruction system based on multi-factor environmental perception is characterized by comprising a factor list setting module, a factor list detection module, a factor condition detection module and a data destruction module, wherein the factor list setting module, the factor list detection module and the factor condition detection module are sequentially connected, the factor list detection module and the factor condition detection module are both connected with the data destruction module,
the factor list setting module sets a factor list based on multi-factor environmental perception aiming at a storage medium needing to be protected and sets a data reading factor condition with a safety protection mechanism according to the factor list and actual needs; when a read-write request aiming at the data content of the storage medium needing to be protected occurs, detecting whether a preset factor list exists or not through the factor list detection module, automatically calling a data destruction instruction by the data destruction module to automatically destroy data when the detection result is negative, and directly or indirectly entering the factor condition detection module when the detection result is positive; the factor condition detection module checks the factor condition under the current read-write request environment according to the data reading factor condition set by the factor list setting module, when the factor condition under the current read-write request environment is judged to accord with the set data reading factor condition, the data read-write request is allowed to be executed, otherwise, the data destruction module automatically calls a data destruction instruction to automatically destroy the data.
Further, the system also comprises a list tampering detection module, the factor list detection module is connected with the factor condition detection module through the list tampering detection module, the list tampering detection module is also connected with the data destruction module,
the factor list detection module detects whether a preset factor list is tampered by the list tampering detection module when the preset factor list is detected, automatically calls a data destruction instruction by the data destruction module to automatically destroy data when the preset factor list is detected to be tampered, and enters the factor condition detection module when the preset factor list is detected to be not tampered.
The invention has the beneficial effects that:
the data information on the specific storage medium is protected by adopting the automatic data destruction method based on multi-factor environmental perception, whether the factor condition under the current read-write request environment meets the set data read factor condition is detected by detecting whether a preset factor list exists or not and comparing the factor condition under the read-write request with the preset data read factor condition, and the illegal transfer storage medium and the illegal read-write request can be effectively identified under the condition of double detection; the data destruction process can be automatically performed when an illegal request is recognized, thereby preventing the risk of data leakage. The invention adopts a multi-factor environmental perception data destruction technology, presets certain environmental perception factor conditions (data reading factor conditions) for real-time comparison detection when the data is stored and used, triggers data destruction once inconsistency is found, masters the accurate time and the influencing factors of the data rapid destruction, solves the problem that the data is easy to leak because the existing data destruction technology does not know when to start a data destruction signal through clear environmental perception triggering data deletion, can comprehensively protect the storage medium and the data thereof, and makes up the problem that the traditional data destruction technology cannot intelligently identify the data leakage risk through a method of identifying the judging factor conditions for each data reading and writing request, thereby enabling the data information to be always in a protected state.
Preferably, whether the preset factor list is tampered after the preset factor list is detected to be stored is also detected, that is, the invention sets a multi-factor checking application program based on multi-factor environment sensing, the preset factor list containing the multi-factor environment sensing is stored in a medium of data storage, the factor list is protected from being tampered by adopting the existing data security protection means, and then whether the factor list is stored or not is checked in sequence during data reading, whether the factor list is illegally modified or not, whether the factor condition in the factor list is consistent with the actual environment or not, whether the factor condition in the factor list is not stored and the factor list is tampered although being stored, a data destruction instruction is automatically called to delete data, the factor condition in the factor list is consistent with the actual environment and data is normally read, and the data destruction instruction is not automatically called to delete data. Therefore, under the condition of triple detection, when the intelligent automatic identification storage medium has a risk of divulgence, the data destruction program is immediately and automatically started to eliminate the information potential safety hazard and improve the data safety performance.
The invention also relates to a data automatic destroying system based on the multi-factor environmental perception, which corresponds to the data automatic destroying method based on the multi-factor environmental perception and can be understood as a system for realizing the data automatic destroying method based on the multi-factor environmental perception.
Drawings
Fig. 1 is a flowchart of a data automatic destruction method based on multi-factor environmental awareness according to the present invention.
Fig. 2 is a preferred flowchart of the data automatic destruction method based on multi-factor environmental awareness according to the present invention.
Fig. 3 is a block diagram of the data automatic destruction system based on multi-factor environmental awareness according to the present invention.
Fig. 4 is a block diagram of a preferred structure of the data automatic destruction system based on multi-factor environmental awareness according to the present invention.
Detailed Description
For a clearer understanding of the contents of the present invention, reference will be made to the accompanying drawings and examples.
Fig. 1 is a flowchart of a data automatic destruction method based on multi-factor environmental awareness according to the present invention, which includes a step a of setting a multi-factor check application based on multi-factor environmental awareness for a storage medium to be protected, where a factor list including multi-factor environmental awareness is preset in the multi-factor check application, and a data reading factor condition with a security protection mechanism is set according to an actual need according to the factor list; B. when a read-write request aiming at the data content of a storage medium needing to be protected occurs, automatically starting a multi-factor checking application program and detecting whether a preset factor list exists or not, automatically calling a data destruction instruction to automatically destroy data when the detection result is negative (namely the factor list does not exist), and entering the following steps when the detection result is positive (namely the factor list exists); C. checking the factor condition under the current read-write request environment according to the set data read factor condition; and when the multi-factor checking application program judges that the factor condition in the current read-write request environment meets the set data reading factor condition, allowing the data read-write request to be executed, otherwise, automatically calling a data destruction instruction to automatically destroy the data. According to the method, after factors needing to be checked for data reading and writing and corresponding data reading factor conditions are preset in advance, multi-factor comparison is carried out on data during each reading, and once the conditions are inconsistent with the preset data reading factor conditions, data destruction is triggered immediately. The method can also be combined with the existing data destruction scheme, and the existing data destruction scheme is called once the preset data reading factor conditions are found to be inconsistent.
Specifically, in the method for automatically destroying data based on multi-factor environmental awareness, step a sets a multi-factor check application program, wherein the program is preferably a read-only program written into a specific write-once data space in a storage medium, and the specific write-once data space is a data space in a read-only state after being written once (supported by most hardware storage media, only one data space is allowed to be written once, and the data space area is changed into the read-only state later), and the data space cannot be changed and deleted after being written, and the operation of the multi-factor check application program is triggered when a data read-write request is sent to the storage medium; the storage medium comprises the existing mechanical hard disk, solid state hard disk, removable storage medium, erasable optical disk and the like; the multi-factor checking application program is internally preset with a factor list containing multi-factor environmental sensing, and a data reading factor condition with a safety protection mechanism is set according to the actual requirement of the factor list, wherein the multi-factor is a plurality of environmental sensing factors, preferably comprises hardware equipment information (such as mainboard information, MAC address information, cpu information, memory information, peripheral information and the like) depended by a storage medium, BIOS information used by the storage medium, operating system information (such as operating system version information, specific application program value information, specific drive information and the like) used by the storage medium, and factor list information (such as list content integrity information, list content modification information and the like); the factor of the generated factor list can be a single condition or a combination of a plurality of conditions, and the combination condition can be defined by a user according to the requirement of the user, for example, the version of the operating system is selected as the factor list, and only the condition of judging the version of the operating system can be used as the condition of the data reading factor; two combinations of the version of the operating system and the time for reading the data can also be used as factor lists, and two combination conditions of the version of the operating system and the time for reading the data can be used as data reading factor conditions. Step B, when a read-write request aiming at the data content of the storage medium needing to be protected occurs, automatically starting the multi-factor check application program and detecting whether a preset factor list exists or not, automatically calling a data destruction instruction to automatically destroy the data if the detection result is negative, continuously executing a plurality of formatting operations on the storage medium after automatically deleting the data by adopting a data destruction algorithm when automatically destroying the data, for example, continuously formatting the storage medium for more than 10 times, preferably entering step B' to detect whether the preset factor list is tampered or not when the detection result is that the factor list exists, and executing step C when the preset factor list is detected to be tampered. Preferably, whether a preset factor list is tampered or not can be detected by adopting an encryption and decryption technology or a backup technology, for example, the factor list can be opened only after a secret key is obtained by adopting the encryption and decryption technology, the factor list is determined to be tampered when the factor list cannot be opened in a plaintext mode or the opened factor list is messy codes, and a data destruction instruction is automatically called to automatically destroy data; when the backup technology is adopted, more than two identical factor lists (three factor lists are generated simultaneously) are generated simultaneously by adopting a multi-copy mode when the factor lists are preset in the step A, whether all the factor lists are consistent is checked when whether the preset factor lists are tampered in the step B', and a data destruction instruction is automatically called to automatically destroy data when the factor lists are confirmed to be tampered when one list and the other two factor lists are inconsistent. And step C, checking the factor condition under the current read-write request environment according to the set data reading factor condition, allowing the data read-write request to be executed when the multi-factor checking application program judges that the factor condition under the current read-write request environment meets the set data reading factor condition, and otherwise, automatically calling a data destruction instruction to automatically destroy the data.
When judging whether to trigger data destruction when reading data, the data destruction can be triggered by the data in the storage medium according to a data reading factor condition or by a certain data according to a certain data reading factor condition, and the data destruction can be defined by a user according to the requirement of the user. If the user A defines the data stored in all the storage media, the data is automatically destroyed once the version of the operating system is changed during reading. For example, the set factor list contains the operating system version win7, which has access to IP address 192.168.1.230, MAC address 5E: 23: 3F: 39: 00, motherboard number 0000-. The automatic data destruction method of the invention puts the pre-prepared multi-factor environmental perception factor list into the storage medium together, and starts the list protection mechanism to prevent the list from being modified, when the application process writes in data each time, the multi-factor checking application program is automatically started, the written data is marked according to the data reading factor condition in the multi-factor list, and whether the data meets the data reading factor condition in the factor list is checked when the data is read or modified, once the data meets the data reading factor condition, the environment of the storage medium is changed, and the data destruction is immediately executed.
The invention also relates to a data automatic destroying system based on the multi-factor environmental perception, which corresponds to the data automatic destroying method based on the multi-factor environmental perception, can be understood as a system for realizing the above method for automatically destroying data based on multi-factor environment perception, the system structure is shown in fig. 3, and comprises a factor list setting module, a factor list detection module, a factor condition detection module and a data destruction module, wherein the factor list setting module, the factor list detection module and the factor condition detection module are connected in sequence, the factor list detection module and the factor condition detection module are both connected with the data destruction module, the factor list setting module sets a factor list based on multi-factor environmental perception aiming at a storage medium needing to be protected and sets a data reading factor condition with a safety protection mechanism according to the factor list and actual needs; when a read-write request aiming at the data content of the storage medium needing to be protected occurs, detecting whether a preset factor list exists or not through the factor list detection module, automatically calling a data destruction instruction by the data destruction module to automatically destroy data when the detection result is negative, and directly or indirectly entering the factor condition detection module when the detection result is positive; the factor condition detection module checks the factor condition under the current read-write request environment according to the data reading factor condition set by the factor list setting module, when the factor condition under the current read-write request environment is judged to accord with the set data reading factor condition, the data read-write request is allowed to be executed, otherwise, the data destruction module automatically calls a data destruction instruction to automatically destroy the data.
FIG. 4 is a block diagram of an optimal structure of the system for automatically destroying data based on multi-factor environmental sensing according to the present invention, which includes a list tampering detection module, in addition to the modules shown in FIG. 3, the factor list detection module is connected to the factor condition detection module through the list tampering detection module, the factor list setting module, the factor list detection module, the list tampering detection module and the factor condition detection module are sequentially connected, the factor list detection module, the list tampering detection module and the factor condition detection module are all connected to the data destruction module, the factor list detection module detects whether a preset factor list is tampered by the list tampering detection module when detecting that the preset factor list exists, the data destruction module automatically invokes a data destruction instruction to automatically destroy data when detecting that the preset factor list is tampered, and entering the factor condition detection module when detecting that the preset factor list is not tampered. The system adopts the existing data safety protection means to protect the factor list from being tampered, then when data is read, whether the factor list is stored or not is checked in sequence, whether the factor list is illegally modified or not, whether the factor condition in the factor list is consistent with the actual environment or not, whether the factor list is not stored or not and whether the factor list is stored but is tampered automatically call a data destruction instruction to delete data, whether the factor condition in the factor list is consistent with the actual environment or not, if the factor condition in the factor list is inconsistent with the actual environment or not, the data destruction instruction is automatically called, the data is deleted, a multi-factor environmental sensing data destruction technology is adopted, when the data is stored and used, some environmental sensing factors are preset, corresponding factor conditions (data reading factor conditions) are set for real-time comparison and detection, once the data destruction is triggered after the inconsistency is found, and when the storage medium is intelligently and automatically, and the data destruction program is automatically started immediately to eliminate the information safety hidden danger and improve the data safety performance.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A data automatic destruction method based on multi-factor environment perception is characterized by comprising the following steps:
A. setting a multi-factor checking application program based on multi-factor environment perception aiming at a storage medium needing to be protected, wherein a factor list containing the multi-factor environment perception is preset in the multi-factor checking application program, and a data reading factor condition with a safety protection mechanism is set according to the actual requirement of the factor list;
B. when a read-write request aiming at the data content of a storage medium needing to be protected occurs, automatically starting a multi-factor checking application program, detecting whether a preset factor list exists or not, automatically calling a data destruction instruction to automatically destroy data when the detection result is negative, and entering the following steps when the detection result is positive;
C. checking the factor condition under the current read-write request environment according to the set data read factor condition; and when the multi-factor checking application program judges that the factor condition in the current read-write request environment meets the set data reading factor condition, allowing the data read-write request to be executed, otherwise, automatically calling a data destruction instruction to automatically destroy the data.
2. The method according to claim 1, wherein a step B' is further provided between the steps B and C, and after detecting that the preset factor list exists, whether the preset factor list is tampered is further detected, and when detecting that the preset factor list is tampered, a data destruction instruction is automatically invoked to automatically destroy the data, and when detecting that the preset factor list is not tampered, the step C is performed again.
3. The method according to claim 2, wherein in step B', it is detected whether the predetermined factor list is tampered with, and the factor list is opened only after the secret key is obtained by using an encryption and decryption technique, and when the factor list cannot be opened in a plaintext manner or the opened factor list is a messy code, it is determined that the factor list is tampered with, and a data destruction instruction is automatically invoked to automatically destroy the data.
4. The method of claim 2, wherein step a generates more than two identical factor lists simultaneously in a multi-copy manner when presetting the factor lists, and checks whether all the factor lists are consistent when step B' detects whether the preset factor lists are tampered, and confirms that the factor lists are tampered and automatically calls a data destruction instruction to automatically destroy data once one factor list is inconsistent with other factor lists.
5. The method according to one of claims 1 to 4, wherein the multi-factor check application set in step A is a read-only program written to a specific write-once data space in the storage medium; the specific write-once data space is a data space which is in a read-only state after being written once.
6. Method according to one of claims 1 to 4, wherein the storage medium comprises a mechanical hard disk, a solid state hard disk, a removable storage medium and/or a rewritable optical disk.
7. The method according to one of claims 1 to 4, wherein the multi-factor of environmental perception in the factor list preset in step A comprises hardware device information on which the storage medium depends, BIOS information used by the storage medium, operating system information used by the storage medium and/or factor list information; the hardware equipment information depended by the storage medium comprises mainboard information, cpu information, memory information and/or peripheral information; the operating system information used by the storage medium includes operating system version information, specific application value information and/or specific driver information; the factor list information includes list content integrity information and/or list content modification information.
8. The method according to one of claims 1 to 4, characterized in that, when the data is destroyed automatically, the data destruction algorithm is used to delete the data automatically and then several formatting operations are performed on the storage medium continuously.
9. An automatic data destruction system based on multi-factor environmental perception is characterized by comprising a factor list setting module, a factor list detection module, a factor condition detection module and a data destruction module, wherein the factor list setting module, the factor list detection module and the factor condition detection module are sequentially connected, the factor list detection module and the factor condition detection module are both connected with the data destruction module,
the factor list setting module sets a factor list based on multi-factor environmental perception aiming at a storage medium needing to be protected and sets a data reading factor condition with a safety protection mechanism according to the factor list and actual needs; when a read-write request aiming at the data content of the storage medium needing to be protected occurs, detecting whether a preset factor list exists or not through the factor list detection module, automatically calling a data destruction instruction by the data destruction module to automatically destroy data when the detection result is negative, and directly or indirectly entering the factor condition detection module when the detection result is positive; the factor condition detection module checks the factor condition under the current read-write request environment according to the data reading factor condition set by the factor list setting module, when the factor condition under the current read-write request environment is judged to accord with the set data reading factor condition, the data read-write request is allowed to be executed, otherwise, the data destruction module automatically calls a data destruction instruction to automatically destroy the data.
10. The system of claim 9, further comprising a list tampering detection module, said factor list detection module being coupled to the factor condition detection module via the list tampering detection module, said list tampering detection module being further coupled to the data destruction module,
the factor list detection module detects whether a preset factor list is tampered by the list tampering detection module when the preset factor list is detected, automatically calls a data destruction instruction by the data destruction module to automatically destroy data when the preset factor list is detected to be tampered, and enters the factor condition detection module when the preset factor list is detected to be not tampered.
CN201910749354.9A 2019-08-14 2019-08-14 Automatic data destruction method based on multi-factor environmental perception Active CN110490010B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910749354.9A CN110490010B (en) 2019-08-14 2019-08-14 Automatic data destruction method based on multi-factor environmental perception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910749354.9A CN110490010B (en) 2019-08-14 2019-08-14 Automatic data destruction method based on multi-factor environmental perception

Publications (2)

Publication Number Publication Date
CN110490010A CN110490010A (en) 2019-11-22
CN110490010B true CN110490010B (en) 2021-07-09

Family

ID=68550987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910749354.9A Active CN110490010B (en) 2019-08-14 2019-08-14 Automatic data destruction method based on multi-factor environmental perception

Country Status (1)

Country Link
CN (1) CN110490010B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105868640A (en) * 2016-04-04 2016-08-17 张曦 Hard disk firmware attack preventing system and method
CN106971102A (en) * 2017-03-24 2017-07-21 山东超越数控电子有限公司 A kind of start authentication method and device based on harddisk password module
CN107066901A (en) * 2017-04-20 2017-08-18 孙新宇 A kind of disposable mobile memory and its storage and the method for reading data
CN107122685A (en) * 2017-04-27 2017-09-01 国信优易数据有限公司 A kind of big data method for secure storing and equipment
CN107241452A (en) * 2017-08-15 2017-10-10 江苏北弓智能科技有限公司 A kind of data destruct system and method for mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9183415B2 (en) * 2011-12-01 2015-11-10 Microsoft Technology Licensing, Llc Regulating access using information regarding a host machine of a portable storage drive
CN106407821A (en) * 2016-09-10 2017-02-15 北京力鼎创软科技有限公司 Disk isolation method and system
CN108595988A (en) * 2018-04-27 2018-09-28 成都信息工程大学 It is a kind of to encrypt simultaneously and fault-tolerant hard disk

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105868640A (en) * 2016-04-04 2016-08-17 张曦 Hard disk firmware attack preventing system and method
CN106971102A (en) * 2017-03-24 2017-07-21 山东超越数控电子有限公司 A kind of start authentication method and device based on harddisk password module
CN107066901A (en) * 2017-04-20 2017-08-18 孙新宇 A kind of disposable mobile memory and its storage and the method for reading data
CN107122685A (en) * 2017-04-27 2017-09-01 国信优易数据有限公司 A kind of big data method for secure storing and equipment
CN107241452A (en) * 2017-08-15 2017-10-10 江苏北弓智能科技有限公司 A kind of data destruct system and method for mobile terminal

Also Published As

Publication number Publication date
CN110490010A (en) 2019-11-22

Similar Documents

Publication Publication Date Title
JP4828199B2 (en) System and method for integrating knowledge base of anti-virus software applications
US20100306851A1 (en) Method and apparatus for preventing a vulnerability of a web browser from being exploited
CN101405705B (en) System and method for foreign code detection
US9053321B2 (en) Antivirus system and method for removable media devices
KR100881025B1 (en) Apparatus and method for managing data security
CN107563192B (en) Lesso software protection method and device, electronic equipment and storage medium
EP3682332B1 (en) Method and apparatus for erasing or writing flash data
US20210117110A1 (en) Data processing method and storage device
US10783041B2 (en) Backup and recovery of data files using hard links
KR101828600B1 (en) Context-aware ransomware detection
JP5319830B2 (en) Data protection method and computer apparatus
CN111090857B (en) Method for defending file from malicious software attack, computer system and recording medium
US8250263B2 (en) Apparatus and method for securing data of USB devices
CN106682512B (en) Method, device and system for preventing program from being modified
CN110490010B (en) Automatic data destruction method based on multi-factor environmental perception
KR102149711B1 (en) An apparatus for detecting and preventing ransom-ware behavior using camouflage process, a method thereof and computer recordable medium storing program to perform the method
CN114417326A (en) Abnormality detection method, abnormality detection device, electronic apparatus, and storage medium
CN112069489A (en) Detection method for cross use of internal network and external network of mobile storage medium
US8088172B2 (en) Data processing apparatus, data processing method, and computer readable medium
KR20100026781A (en) Method for blocking malicious code through removable disk and apparatus thereof
KR101845284B1 (en) Malicious code detection system and malicious code detecting method
CN103927492B (en) A kind of data processing equipment and data guard method
US20090094459A1 (en) Method and system for associating one or more pestware-related indications with a file on a computer-readable storage medium of a computer
CN115080966B (en) Dynamic white list driving method and system
CN112395599B (en) Attack detection method and device for system kernel data, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant