CN112287303A - Destroying equipment suitable for traceable confidential medium - Google Patents

Destroying equipment suitable for traceable confidential medium Download PDF

Info

Publication number
CN112287303A
CN112287303A CN202011542545.7A CN202011542545A CN112287303A CN 112287303 A CN112287303 A CN 112287303A CN 202011542545 A CN202011542545 A CN 202011542545A CN 112287303 A CN112287303 A CN 112287303A
Authority
CN
China
Prior art keywords
module
medium
confidential
confidential medium
contact type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011542545.7A
Other languages
Chinese (zh)
Other versions
CN112287303B (en
Inventor
罗远哲
刘瑞景
申慈恩
徐盼云
孟小钰
刘洁
李玉琼
王军亮
张春涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Original Assignee
Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing China Super Industry Information Security Technology Ltd By Share Ltd filed Critical Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Priority to CN202011542545.7A priority Critical patent/CN112287303B/en
Publication of CN112287303A publication Critical patent/CN112287303A/en
Application granted granted Critical
Publication of CN112287303B publication Critical patent/CN112287303B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B09DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
    • B09BDISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
    • B09B3/00Destroying solid waste or transforming solid waste into something useful or harmless

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a destruction device suitable for traceable confidential media. The confidential medium contact type charging module in the device is connected with an electrode of a confidential medium, and the confidential medium ID identification module is connected with the contact type identification chip; the confidential medium integrity detection module is connected with the confidential medium; the control module is respectively connected with the confidential medium contact type charging module, the confidential medium ID recognition module and the confidential medium integrity detection module; the sorting system is connected with the control module; the contact type destroying circuit module is respectively connected with the sorting system and the crushing module. According to the invention, on the basis of identifying the ID information of the confidential medium and judging the current integrity of the medium, the destruction operation is carried out, so that the confidential medium is completely destroyed in the final destruction link, and the risk of secret leakage is reduced.

Description

Destroying equipment suitable for traceable confidential medium
Technical Field
The present invention relates to the field of processing of record carriers, and in particular to a destruction device suitable for traceable security media.
Background
In the field of security, with the continuous progress of science and technology, a large number of security means are applied to the field of information protection. Most storage media are traceable to only digital devices such as compact disks, floppy disks, flash disks, hard disks, and the like. Traditional non-digital solid media such as paper, solid materials, reagents and the like do not have a good traceability means. Is a hole in existing security measures.
Meanwhile, the existing security measures have no detection method for the integrity of the medium, and particularly in the medium destroying stage, if problems occur in destroying personnel, the effective destroying of the medium is difficult to ensure, so that the medium is a leak in the security measures.
The existing method and system for detecting the integrity of the confidential medium can effectively solve the problems of source tracing and medium integrity detection. However, in order to consider the source, a circuit and a chip are added on the medium, and the existing crushing equipment can only crush the main body of the medium and cannot identify the circuit chip of the medium and complete the integrity detection function. For convenience of management, a destruction device suitable for traceable secure media is needed.
Disclosure of Invention
The invention aims to provide a destroying device suitable for traceable confidential media, so that the confidential media can be destroyed more thoroughly and accurately in the final destroying link.
In order to achieve the purpose, the invention provides the following scheme:
a destruction device suitable for use with traceable security media, comprising: the device comprises a confidential medium contact type charging module, a confidential medium ID recognition module, a confidential medium integrity detection module, a sorting system, a contact type destroying circuit module, a crushing module and a control module;
the confidential medium contact type charging module is connected with an electrode of the confidential medium; the contact type charging module of the confidential medium is used for supplying power to the contact type identification chip on the confidential medium; the contact type identification chip on the confidential medium is used for broadcasting the ID of the confidential medium;
the confidential medium ID identification module is connected with the contact type identification chip; the ID identification module of the confidential medium is used for identifying the ID of the confidential medium;
the confidential medium integrity detection module is connected with the confidential medium; the confidential medium integrity detection module is used for detecting whether the confidential medium is complete or not to obtain a detection result;
the control module is respectively connected with the confidential medium contact type charging module, the confidential medium ID recognition module and the confidential medium integrity detection module; the control module is used for determining an identification result according to the ID of the confidential medium and the detection result; the recognition result comprises: whether the ID can be identified and whether the secure media is intact;
the sorting system is connected with the control module; the sorting system is used for carrying out sorting operation according to the identification result;
the contact type destroying circuit module is respectively connected with the sorting system and the crushing module; the contact type destroying circuit module and the crushing module are used for destroying the confidential medium.
Optionally, the secure media contact charging module includes: two electric brushes; the electric brush is in contact connection with the electrode of the medium; the electrodes are located on a surface of the security medium.
Optionally, the secure media integrity detection module includes: the device comprises a signal source, a first electric brush, a second electric brush and an ADC (analog to digital converter) sampling circuit;
the signal source is respectively connected with the control module and the first electric brush; the signal source is used for generating a first waveform signal;
the ADC sampling circuit is respectively connected with the control module and the second electric brush; the ADC sampling circuit is used for obtaining a second waveform signal;
the control module is used for comparing the second waveform signal with the first waveform signal and detecting whether the confidential medium is complete or not according to a comparison result.
Optionally, the contact destruction circuit module comprises a third brush and a fourth brush;
the third electric brush and the fourth electric brush are both in contact with electrodes of a contact type self-destruction circuit arranged on the surface of the confidential medium; the third electric brush and the fourth electric brush are used for supplying power and breaking down and destroying the contact type identification chip on the confidential medium according to a control contact type self-destruction circuit of the control module.
Optionally, the confidential medium ID identification module is an RFID signal receiver.
Optionally, the method further includes: a personnel RFID identification module;
the personnel RFID identification module is connected with the control module; the personnel RFID identification module is used for storing information of operators; the control module is used for judging whether the operator has destruction permission according to the information of the operator.
Optionally, the method further includes: a device storage frame to be destroyed;
the equipment storage frame to be destroyed is connected with the sorting system; and the device storage frame to be destroyed is used for storing the confidential medium when the identification result is that the ID cannot be identified or the confidential medium is incomplete.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the destroying device suitable for the traceable confidential medium provided by the invention detects whether the confidential medium is complete or not through the confidential medium integrity detection module and identifies the ID of the confidential medium to obtain an identification result; and controlling the sorting operation of the sorting system according to the recognition result; when the identification result is that the ID information can be identified and the confidential medium is complete, thoroughly destroying the confidential medium through the contact type destroying circuit module and the crushing module; if the ID information is not recognizable or the security medium is not complete, the destruction is not performed. Further, the confidential medium is destroyed more thoroughly and accurately in the final destroying link, and the loophole of the existing confidential field is filled.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of a destruction apparatus suitable for traceable security media according to the present invention;
FIG. 2 is a schematic diagram of a security media integrity check module according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a destroying device suitable for traceable confidential media, so that the confidential media can be destroyed more thoroughly and accurately in the final destroying link.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a schematic structural diagram of a destruction apparatus for a traceable security medium according to the present invention, and as shown in fig. 1, the destruction apparatus for a traceable security medium according to the present invention includes: the device comprises a confidential medium contact type charging module 1, a confidential medium ID recognition module 2, a confidential medium integrity detection module 3, a sorting system 4, a contact type destruction circuit module 5, a crushing module 6 and a control module 8. The confidential media are mainly classified into paper media and non-paper media; the non-paper media includes: optical disks, floppy disks, flash disks, hard disks, physical materials, reagents, and the like.
The confidential medium contact type charging module 1 is connected with an electrode of the confidential medium; the confidential medium contact type charging module 1 is used for supplying power to a contact type identification chip on the confidential medium; the contact identification chip on the secure media is used to broadcast the ID of the secure media.
The confidential medium ID identification module 2 is connected with the contact type identification chip; the secure media ID identification module 2 is used for identifying the ID of the secure media. The contact identification chip has a unique ID.
The confidential medium integrity detection module 3 is connected with the confidential medium; the confidential medium integrity detection module 3 is used for detecting whether the confidential medium is intact or not to obtain a detection result.
The control module 8 is respectively connected with the confidential medium contact type charging module 1, the confidential medium ID recognition module 2 and the confidential medium integrity detection module 3; the control module 8 is used for determining an identification result according to the ID of the confidential medium and the detection result; the recognition result comprises: whether the ID can be identified and whether the secure media is intact.
The sorting system 4 is connected with the control module 8; and the sorting system 4 is used for carrying out sorting operation according to the identification result.
The contact type destruction circuit module 5 is respectively connected with the sorting system 4 and the crushing module 6; the contact type destruction circuit module 5 and the crushing module 6 are used for performing the destruction operation of the confidential medium.
The secure media contact charging module 1 includes: two electric brushes; the electric brush is in contact connection with the electrode of the medium; the electrodes are located on a surface of the security medium.
When the medium to be crushed is paper, the electric brush of the confidential medium contact type charging module 1 can be controlled by a motor to move the position according to the type of the paper due to the uniform specification of the paper; when the medium to be crushed is other medium, the electric brush is made of conductive viscous material, such as conductive adhesive, and can be manually moved to the electrode.
As shown in fig. 2, the secure media integrity check module 3 includes: signal source 31, first brush 321, second brush 322, and ADC sampling circuit 33.
The signal source 31 is respectively connected with the control module 8 and the first brush 321; the signal source 31 is configured to generate a first waveform signal. The first waveform signal is a sine wave, a square wave or a triangular wave with a set frequency.
Further, the frequency of the sine wave, the square wave or the triangular wave with the set frequency is changed from low frequency 0hz to high frequency 10KHz or higher in sequence when being generated each time.
The ADC sampling circuit 33 is connected to the control module 8 and the second brush 322, respectively; the ADC sampling circuit 33 is configured to obtain a second waveform signal.
The control module 8 is configured to compare the second waveform signal with the first waveform signal, and detect whether the confidential medium is complete according to a comparison result.
When the second waveform signal cannot be obtained in the ADC sampling circuit 33, the circuit is considered to be open, and the administrator or the security specialist is reported, and it is determined that the security medium is not complete; when the ADC sampling circuit 33 obtains a corresponding waveform, but does not match the characteristics of the integrity detection circuit, it may be considered that the integrity detection circuit on the confidential medium is short-circuited, and reports to an administrator or a confidential specialist, and determines that the confidential medium is incomplete; when the corresponding waveform is obtained in the ADC sampling circuit 33 and the spectrum characteristic matches the circuit characteristic of the integrity check circuit, the integrity of the secure media is determined.
After the circuit is pasted to a confidential medium, the circuit characteristics of the integrity detection circuit are measured and obtained through the confidential medium integrity detection module 3 during initialization, a first waveform signal is input in the measurement process, a second waveform signal is obtained through ADC sampling, the characteristics of the first waveform signal and the second waveform signal are extracted, and the first waveform signal and the second waveform signal are bound with the confidential medium ID and stored and serve as a spectrum characteristic source of the integrity detection judgment basis.
In addition, the integrity detection circuit is composed of circularly reciprocating conducting wires, filter circuits with uncertain pass bands and stop bands are randomly distributed in the integrity detection circuit, the integrity detection circuit has unique characteristic information characteristics, and when signals pass through the circuit from low frequency to high frequency respectively, different attenuation effects are achieved.
The contact destruction circuit module 5 comprises a third brush and a fourth brush.
The third electric brush and the fourth electric brush are both in contact with electrodes of a contact type self-destruction circuit arranged on the surface of the confidential medium; the third electric brush and the fourth electric brush are used for supplying power and breaking down and destroying the contact type identification chip on the confidential medium according to the control contact type self-destruction circuit of the control module 8.
The breakdown destruction is generally achieved by reverse power supply or voltage increase.
The secret medium ID identification module 2 is an RFID signal receiver.
The invention provides a destroying device suitable for traceable confidential media, which further comprises: personnel RFID identification module.
The personnel RFID identification module is connected with the control module 8; the personnel RFID identification module is used for storing information of operators; the control module 8 is configured to determine whether the operator has a destruction permission according to the information of the operator.
In order to process non-destructible security media, the invention provides a destruction device suitable for traceable security media, further comprising: and a device storage frame to be destroyed.
The equipment storage frame to be destroyed is connected with the sorting system 4; and the device storage frame to be destroyed is used for storing the confidential medium when the identification result is that the ID cannot be identified or the confidential medium is incomplete.
From the above, in order to increase the confidentiality, the destruction device suitable for the traceable confidential medium of the invention only performs the destruction operation when a plurality of precondition are satisfied.
The precondition comprises that the ID information of the medium to be destroyed can be identified, the medium to be destroyed is complete, and the current operator has the authority.
The ID information of the medium to be destroyed can be identified, which means that the equipment can effectively identify the ID information of the current medium to be destroyed.
The completeness of the medium to be destroyed means that the device detects the completeness of the current medium through the confidential medium completeness detection module 3.
After the media ID information and the operator information are acquired, the control module 8 will automatically query the database to determine whether the current person has the right to destroy the media.
After the precondition is met, the medium enters a destroying link; otherwise, the administrator or security specialist will be notified, and the medium is returned to the operator or entered into the device storage box to be destroyed.
After the media is destroyed, the destruction information is bound with the media ID and is transmitted back to the control module 8.
After the medium returns to an operator or enters a storage frame of the device to be destroyed, the medium can be destroyed automatically after the medium information is uniformly checked by personnel with higher authority or security personnel.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (7)

1. A destruction device adapted for use with traceable security media, comprising: the device comprises a confidential medium contact type charging module, a confidential medium ID recognition module, a confidential medium integrity detection module, a sorting system, a contact type destroying circuit module, a crushing module and a control module;
the confidential medium contact type charging module is connected with an electrode of the confidential medium; the contact type charging module of the confidential medium is used for supplying power to the contact type identification chip on the confidential medium; the contact type identification chip on the confidential medium is used for broadcasting the ID of the confidential medium;
the confidential medium ID identification module is connected with the contact type identification chip; the ID identification module of the confidential medium is used for identifying the ID of the confidential medium;
the confidential medium integrity detection module is connected with the confidential medium; the confidential medium integrity detection module is used for detecting whether the confidential medium is complete or not to obtain a detection result;
the control module is respectively connected with the confidential medium contact type charging module, the confidential medium ID recognition module and the confidential medium integrity detection module; the control module is used for determining an identification result according to the ID of the confidential medium and the detection result; the recognition result comprises: whether the ID can be identified and whether the secure media is intact;
the sorting system is connected with the control module; the sorting system is used for carrying out sorting operation according to the identification result;
the contact type destroying circuit module is respectively connected with the sorting system and the crushing module; the contact type destroying circuit module and the crushing module are used for destroying the confidential medium.
2. A destruction device for traceable security media in accordance with claim 1, wherein the security media contact charging module comprises: two electric brushes; the electric brush is in contact connection with the electrode of the medium; the electrodes are located on a surface of the security medium.
3. A destruction device for traceable security media according to claim 1, wherein said security media integrity detection module comprises: the device comprises a signal source, a first electric brush, a second electric brush and an ADC (analog to digital converter) sampling circuit;
the signal source is respectively connected with the control module and the first electric brush; the signal source is used for generating a first waveform signal;
the ADC sampling circuit is respectively connected with the control module and the second electric brush; the ADC sampling circuit is used for obtaining a second waveform signal;
the control module is used for comparing the second waveform signal with the first waveform signal and detecting whether the confidential medium is complete or not according to a comparison result.
4. A destruction device for traceable security media, according to claim 1, wherein the contact destruction circuit module comprises a third brush and a fourth brush;
the third electric brush and the fourth electric brush are both in contact with electrodes of a contact type self-destruction circuit arranged on the surface of the confidential medium; the third electric brush and the fourth electric brush are used for supplying power and breaking down and destroying the contact type identification chip on the confidential medium according to a control contact type self-destruction circuit of the control module.
5. The destruction device for a traceable security media of claim 1, wherein the security media ID identification module is an RFID signal receiver.
6. A destruction device for traceable security media, according to claim 1, further comprising: a personnel RFID identification module;
the personnel RFID identification module is connected with the control module; the personnel RFID identification module is used for storing information of operators; the control module is used for judging whether the operator has destruction permission according to the information of the operator.
7. A destruction device for traceable security media, according to claim 1, further comprising: a device storage frame to be destroyed;
the equipment storage frame to be destroyed is connected with the sorting system; and the device storage frame to be destroyed is used for storing the confidential medium when the identification result is that the ID cannot be identified or the confidential medium is incomplete.
CN202011542545.7A 2020-12-24 2020-12-24 Destroying equipment suitable for traceable confidential medium Active CN112287303B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011542545.7A CN112287303B (en) 2020-12-24 2020-12-24 Destroying equipment suitable for traceable confidential medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011542545.7A CN112287303B (en) 2020-12-24 2020-12-24 Destroying equipment suitable for traceable confidential medium

Publications (2)

Publication Number Publication Date
CN112287303A true CN112287303A (en) 2021-01-29
CN112287303B CN112287303B (en) 2021-04-02

Family

ID=74426048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011542545.7A Active CN112287303B (en) 2020-12-24 2020-12-24 Destroying equipment suitable for traceable confidential medium

Country Status (1)

Country Link
CN (1) CN112287303B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113435424A (en) * 2021-08-27 2021-09-24 北京中超伟业信息安全技术股份有限公司 Method and system for identifying destroying granularity of confidential medium
CN114528950A (en) * 2022-04-24 2022-05-24 北京中超伟业信息安全技术股份有限公司 Destroying method and system for identifying type of confidential medium based on three-dimensional point cloud
CN116116507A (en) * 2023-04-17 2023-05-16 北京中超伟业信息安全技术股份有限公司 Destroying device and method for encrypting mobile storage equipment
CN117457032A (en) * 2023-12-25 2024-01-26 山东万里红信息技术有限公司 Storage medium destroying method based on volume identification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070176031A1 (en) * 2006-01-31 2007-08-02 Fuji Xerox Co., Ltd. Disposal processing apparatus, disposal processing information management system, and disposal processing method
CN103279704A (en) * 2013-06-08 2013-09-04 大唐微电子技术有限公司 Detecting device and system of chip physical integrity
CN103611607A (en) * 2013-11-25 2014-03-05 张忠义 Device and method for destroying secret electronic information carriers
CN205581873U (en) * 2016-03-30 2016-09-14 池州职业技术学院 Solid state hard drives that intelligence was destroyed
CN108985110A (en) * 2018-08-31 2018-12-11 太原禾木科技有限公司 A kind of method and apparatus that concerning security matters carrier information is quickly destroyed
CN111933203A (en) * 2020-07-14 2020-11-13 深圳佰维存储科技股份有限公司 Method, circuit, device, medium and equipment for judging physical destruction of memory chip

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070176031A1 (en) * 2006-01-31 2007-08-02 Fuji Xerox Co., Ltd. Disposal processing apparatus, disposal processing information management system, and disposal processing method
CN103279704A (en) * 2013-06-08 2013-09-04 大唐微电子技术有限公司 Detecting device and system of chip physical integrity
CN103611607A (en) * 2013-11-25 2014-03-05 张忠义 Device and method for destroying secret electronic information carriers
CN205581873U (en) * 2016-03-30 2016-09-14 池州职业技术学院 Solid state hard drives that intelligence was destroyed
CN108985110A (en) * 2018-08-31 2018-12-11 太原禾木科技有限公司 A kind of method and apparatus that concerning security matters carrier information is quickly destroyed
CN111933203A (en) * 2020-07-14 2020-11-13 深圳佰维存储科技股份有限公司 Method, circuit, device, medium and equipment for judging physical destruction of memory chip

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113435424A (en) * 2021-08-27 2021-09-24 北京中超伟业信息安全技术股份有限公司 Method and system for identifying destroying granularity of confidential medium
CN114528950A (en) * 2022-04-24 2022-05-24 北京中超伟业信息安全技术股份有限公司 Destroying method and system for identifying type of confidential medium based on three-dimensional point cloud
CN114528950B (en) * 2022-04-24 2022-07-12 北京中超伟业信息安全技术股份有限公司 Destroying method and system for identifying type of confidential medium based on three-dimensional point cloud
CN116116507A (en) * 2023-04-17 2023-05-16 北京中超伟业信息安全技术股份有限公司 Destroying device and method for encrypting mobile storage equipment
CN117457032A (en) * 2023-12-25 2024-01-26 山东万里红信息技术有限公司 Storage medium destroying method based on volume identification
CN117457032B (en) * 2023-12-25 2024-03-22 山东万里红信息技术有限公司 Storage medium destroying method based on volume identification

Also Published As

Publication number Publication date
CN112287303B (en) 2021-04-02

Similar Documents

Publication Publication Date Title
CN112287303B (en) Destroying equipment suitable for traceable confidential medium
US10149169B1 (en) Non-contact electromagnetic illuminated detection of part anomalies for cyber physical security
Lohrke et al. Key extraction using thermal laser stimulation: A case study on xilinx ultrascale fpgas
CN105576453B (en) A kind of intelligent and safe wiring board and its control method
CN103760451B (en) The interface access module detection method of a kind of intelligent cipher key equipment and equipment
CN101802628A (en) A method for detecting, identifying and locating partial discharges occurring in a discharge site along an electric apparatus
Liu et al. Concurrent hardware Trojan detection in wireless cryptographic ICs
WO2021082593A1 (en) Pollution classification method, apparatus and device, medium, and data obtaining system
GB2556411A (en) Active ASIC intrusion shield
US20220341990A1 (en) A method and apparatus for detection of counterfeit parts, compromised or tampered components or devices, tampered systems such as local communication networks, and for secure identification of components
CN104655992A (en) GIS partial discharge detection equipment and method
CN103869236A (en) Method and jig for testing infrared touch screen PCBA
Kranz PD pulse sequence analysis and its relevance for on-site PD defect identification and evaluation
CN109406897B (en) Detection device and detection method for secondary fusion equipment
CN106549366A (en) Electrical Safety detection protection circuit, switchgear or socket
CN111314292A (en) Data security inspection method based on sensitive data identification
CN102636768A (en) Online check method for online monitor of lightning arrester
Nguyen et al. Void discharge behaviours as a function of cavity size and voltage waveform under very low‐frequency excitation
CN107991551B (en) Detection platform with tracing function
CN102478618A (en) Online monitoring method for partial discharging of 500 KV cross-linked cable
CN202162201U (en) Physical disk destroying device
CN112257099A (en) Confidential equipment identification device suitable for emergency destruction vehicle
KR101836089B1 (en) Data storage medium permanent destruction device
US20080315892A1 (en) Methods and apparatus using one or more supernodes when testing for shorts between nodes of a circuit assembly
CN110377502A (en) Function test method, device and terminal device based on script

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant