CN112287303A - Destroying equipment suitable for traceable confidential medium - Google Patents
Destroying equipment suitable for traceable confidential medium Download PDFInfo
- Publication number
- CN112287303A CN112287303A CN202011542545.7A CN202011542545A CN112287303A CN 112287303 A CN112287303 A CN 112287303A CN 202011542545 A CN202011542545 A CN 202011542545A CN 112287303 A CN112287303 A CN 112287303A
- Authority
- CN
- China
- Prior art keywords
- module
- medium
- confidential
- confidential medium
- contact type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 claims abstract description 35
- 230000006378 damage Effects 0.000 claims abstract description 32
- 238000005070 sampling Methods 0.000 claims description 13
- 238000000034 method Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 239000003153 chemical reaction reagent Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000000123 paper Substances 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000011343 solid material Substances 0.000 description 1
- 239000011345 viscous material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B09—DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
- B09B—DISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
- B09B3/00—Destroying solid waste or transforming solid waste into something useful or harmless
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a destruction device suitable for traceable confidential media. The confidential medium contact type charging module in the device is connected with an electrode of a confidential medium, and the confidential medium ID identification module is connected with the contact type identification chip; the confidential medium integrity detection module is connected with the confidential medium; the control module is respectively connected with the confidential medium contact type charging module, the confidential medium ID recognition module and the confidential medium integrity detection module; the sorting system is connected with the control module; the contact type destroying circuit module is respectively connected with the sorting system and the crushing module. According to the invention, on the basis of identifying the ID information of the confidential medium and judging the current integrity of the medium, the destruction operation is carried out, so that the confidential medium is completely destroyed in the final destruction link, and the risk of secret leakage is reduced.
Description
Technical Field
The present invention relates to the field of processing of record carriers, and in particular to a destruction device suitable for traceable security media.
Background
In the field of security, with the continuous progress of science and technology, a large number of security means are applied to the field of information protection. Most storage media are traceable to only digital devices such as compact disks, floppy disks, flash disks, hard disks, and the like. Traditional non-digital solid media such as paper, solid materials, reagents and the like do not have a good traceability means. Is a hole in existing security measures.
Meanwhile, the existing security measures have no detection method for the integrity of the medium, and particularly in the medium destroying stage, if problems occur in destroying personnel, the effective destroying of the medium is difficult to ensure, so that the medium is a leak in the security measures.
The existing method and system for detecting the integrity of the confidential medium can effectively solve the problems of source tracing and medium integrity detection. However, in order to consider the source, a circuit and a chip are added on the medium, and the existing crushing equipment can only crush the main body of the medium and cannot identify the circuit chip of the medium and complete the integrity detection function. For convenience of management, a destruction device suitable for traceable secure media is needed.
Disclosure of Invention
The invention aims to provide a destroying device suitable for traceable confidential media, so that the confidential media can be destroyed more thoroughly and accurately in the final destroying link.
In order to achieve the purpose, the invention provides the following scheme:
a destruction device suitable for use with traceable security media, comprising: the device comprises a confidential medium contact type charging module, a confidential medium ID recognition module, a confidential medium integrity detection module, a sorting system, a contact type destroying circuit module, a crushing module and a control module;
the confidential medium contact type charging module is connected with an electrode of the confidential medium; the contact type charging module of the confidential medium is used for supplying power to the contact type identification chip on the confidential medium; the contact type identification chip on the confidential medium is used for broadcasting the ID of the confidential medium;
the confidential medium ID identification module is connected with the contact type identification chip; the ID identification module of the confidential medium is used for identifying the ID of the confidential medium;
the confidential medium integrity detection module is connected with the confidential medium; the confidential medium integrity detection module is used for detecting whether the confidential medium is complete or not to obtain a detection result;
the control module is respectively connected with the confidential medium contact type charging module, the confidential medium ID recognition module and the confidential medium integrity detection module; the control module is used for determining an identification result according to the ID of the confidential medium and the detection result; the recognition result comprises: whether the ID can be identified and whether the secure media is intact;
the sorting system is connected with the control module; the sorting system is used for carrying out sorting operation according to the identification result;
the contact type destroying circuit module is respectively connected with the sorting system and the crushing module; the contact type destroying circuit module and the crushing module are used for destroying the confidential medium.
Optionally, the secure media contact charging module includes: two electric brushes; the electric brush is in contact connection with the electrode of the medium; the electrodes are located on a surface of the security medium.
Optionally, the secure media integrity detection module includes: the device comprises a signal source, a first electric brush, a second electric brush and an ADC (analog to digital converter) sampling circuit;
the signal source is respectively connected with the control module and the first electric brush; the signal source is used for generating a first waveform signal;
the ADC sampling circuit is respectively connected with the control module and the second electric brush; the ADC sampling circuit is used for obtaining a second waveform signal;
the control module is used for comparing the second waveform signal with the first waveform signal and detecting whether the confidential medium is complete or not according to a comparison result.
Optionally, the contact destruction circuit module comprises a third brush and a fourth brush;
the third electric brush and the fourth electric brush are both in contact with electrodes of a contact type self-destruction circuit arranged on the surface of the confidential medium; the third electric brush and the fourth electric brush are used for supplying power and breaking down and destroying the contact type identification chip on the confidential medium according to a control contact type self-destruction circuit of the control module.
Optionally, the confidential medium ID identification module is an RFID signal receiver.
Optionally, the method further includes: a personnel RFID identification module;
the personnel RFID identification module is connected with the control module; the personnel RFID identification module is used for storing information of operators; the control module is used for judging whether the operator has destruction permission according to the information of the operator.
Optionally, the method further includes: a device storage frame to be destroyed;
the equipment storage frame to be destroyed is connected with the sorting system; and the device storage frame to be destroyed is used for storing the confidential medium when the identification result is that the ID cannot be identified or the confidential medium is incomplete.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the destroying device suitable for the traceable confidential medium provided by the invention detects whether the confidential medium is complete or not through the confidential medium integrity detection module and identifies the ID of the confidential medium to obtain an identification result; and controlling the sorting operation of the sorting system according to the recognition result; when the identification result is that the ID information can be identified and the confidential medium is complete, thoroughly destroying the confidential medium through the contact type destroying circuit module and the crushing module; if the ID information is not recognizable or the security medium is not complete, the destruction is not performed. Further, the confidential medium is destroyed more thoroughly and accurately in the final destroying link, and the loophole of the existing confidential field is filled.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of a destruction apparatus suitable for traceable security media according to the present invention;
FIG. 2 is a schematic diagram of a security media integrity check module according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a destroying device suitable for traceable confidential media, so that the confidential media can be destroyed more thoroughly and accurately in the final destroying link.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a schematic structural diagram of a destruction apparatus for a traceable security medium according to the present invention, and as shown in fig. 1, the destruction apparatus for a traceable security medium according to the present invention includes: the device comprises a confidential medium contact type charging module 1, a confidential medium ID recognition module 2, a confidential medium integrity detection module 3, a sorting system 4, a contact type destruction circuit module 5, a crushing module 6 and a control module 8. The confidential media are mainly classified into paper media and non-paper media; the non-paper media includes: optical disks, floppy disks, flash disks, hard disks, physical materials, reagents, and the like.
The confidential medium contact type charging module 1 is connected with an electrode of the confidential medium; the confidential medium contact type charging module 1 is used for supplying power to a contact type identification chip on the confidential medium; the contact identification chip on the secure media is used to broadcast the ID of the secure media.
The confidential medium ID identification module 2 is connected with the contact type identification chip; the secure media ID identification module 2 is used for identifying the ID of the secure media. The contact identification chip has a unique ID.
The confidential medium integrity detection module 3 is connected with the confidential medium; the confidential medium integrity detection module 3 is used for detecting whether the confidential medium is intact or not to obtain a detection result.
The control module 8 is respectively connected with the confidential medium contact type charging module 1, the confidential medium ID recognition module 2 and the confidential medium integrity detection module 3; the control module 8 is used for determining an identification result according to the ID of the confidential medium and the detection result; the recognition result comprises: whether the ID can be identified and whether the secure media is intact.
The sorting system 4 is connected with the control module 8; and the sorting system 4 is used for carrying out sorting operation according to the identification result.
The contact type destruction circuit module 5 is respectively connected with the sorting system 4 and the crushing module 6; the contact type destruction circuit module 5 and the crushing module 6 are used for performing the destruction operation of the confidential medium.
The secure media contact charging module 1 includes: two electric brushes; the electric brush is in contact connection with the electrode of the medium; the electrodes are located on a surface of the security medium.
When the medium to be crushed is paper, the electric brush of the confidential medium contact type charging module 1 can be controlled by a motor to move the position according to the type of the paper due to the uniform specification of the paper; when the medium to be crushed is other medium, the electric brush is made of conductive viscous material, such as conductive adhesive, and can be manually moved to the electrode.
As shown in fig. 2, the secure media integrity check module 3 includes: signal source 31, first brush 321, second brush 322, and ADC sampling circuit 33.
The signal source 31 is respectively connected with the control module 8 and the first brush 321; the signal source 31 is configured to generate a first waveform signal. The first waveform signal is a sine wave, a square wave or a triangular wave with a set frequency.
Further, the frequency of the sine wave, the square wave or the triangular wave with the set frequency is changed from low frequency 0hz to high frequency 10KHz or higher in sequence when being generated each time.
The ADC sampling circuit 33 is connected to the control module 8 and the second brush 322, respectively; the ADC sampling circuit 33 is configured to obtain a second waveform signal.
The control module 8 is configured to compare the second waveform signal with the first waveform signal, and detect whether the confidential medium is complete according to a comparison result.
When the second waveform signal cannot be obtained in the ADC sampling circuit 33, the circuit is considered to be open, and the administrator or the security specialist is reported, and it is determined that the security medium is not complete; when the ADC sampling circuit 33 obtains a corresponding waveform, but does not match the characteristics of the integrity detection circuit, it may be considered that the integrity detection circuit on the confidential medium is short-circuited, and reports to an administrator or a confidential specialist, and determines that the confidential medium is incomplete; when the corresponding waveform is obtained in the ADC sampling circuit 33 and the spectrum characteristic matches the circuit characteristic of the integrity check circuit, the integrity of the secure media is determined.
After the circuit is pasted to a confidential medium, the circuit characteristics of the integrity detection circuit are measured and obtained through the confidential medium integrity detection module 3 during initialization, a first waveform signal is input in the measurement process, a second waveform signal is obtained through ADC sampling, the characteristics of the first waveform signal and the second waveform signal are extracted, and the first waveform signal and the second waveform signal are bound with the confidential medium ID and stored and serve as a spectrum characteristic source of the integrity detection judgment basis.
In addition, the integrity detection circuit is composed of circularly reciprocating conducting wires, filter circuits with uncertain pass bands and stop bands are randomly distributed in the integrity detection circuit, the integrity detection circuit has unique characteristic information characteristics, and when signals pass through the circuit from low frequency to high frequency respectively, different attenuation effects are achieved.
The contact destruction circuit module 5 comprises a third brush and a fourth brush.
The third electric brush and the fourth electric brush are both in contact with electrodes of a contact type self-destruction circuit arranged on the surface of the confidential medium; the third electric brush and the fourth electric brush are used for supplying power and breaking down and destroying the contact type identification chip on the confidential medium according to the control contact type self-destruction circuit of the control module 8.
The breakdown destruction is generally achieved by reverse power supply or voltage increase.
The secret medium ID identification module 2 is an RFID signal receiver.
The invention provides a destroying device suitable for traceable confidential media, which further comprises: personnel RFID identification module.
The personnel RFID identification module is connected with the control module 8; the personnel RFID identification module is used for storing information of operators; the control module 8 is configured to determine whether the operator has a destruction permission according to the information of the operator.
In order to process non-destructible security media, the invention provides a destruction device suitable for traceable security media, further comprising: and a device storage frame to be destroyed.
The equipment storage frame to be destroyed is connected with the sorting system 4; and the device storage frame to be destroyed is used for storing the confidential medium when the identification result is that the ID cannot be identified or the confidential medium is incomplete.
From the above, in order to increase the confidentiality, the destruction device suitable for the traceable confidential medium of the invention only performs the destruction operation when a plurality of precondition are satisfied.
The precondition comprises that the ID information of the medium to be destroyed can be identified, the medium to be destroyed is complete, and the current operator has the authority.
The ID information of the medium to be destroyed can be identified, which means that the equipment can effectively identify the ID information of the current medium to be destroyed.
The completeness of the medium to be destroyed means that the device detects the completeness of the current medium through the confidential medium completeness detection module 3.
After the media ID information and the operator information are acquired, the control module 8 will automatically query the database to determine whether the current person has the right to destroy the media.
After the precondition is met, the medium enters a destroying link; otherwise, the administrator or security specialist will be notified, and the medium is returned to the operator or entered into the device storage box to be destroyed.
After the media is destroyed, the destruction information is bound with the media ID and is transmitted back to the control module 8.
After the medium returns to an operator or enters a storage frame of the device to be destroyed, the medium can be destroyed automatically after the medium information is uniformly checked by personnel with higher authority or security personnel.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.
Claims (7)
1. A destruction device adapted for use with traceable security media, comprising: the device comprises a confidential medium contact type charging module, a confidential medium ID recognition module, a confidential medium integrity detection module, a sorting system, a contact type destroying circuit module, a crushing module and a control module;
the confidential medium contact type charging module is connected with an electrode of the confidential medium; the contact type charging module of the confidential medium is used for supplying power to the contact type identification chip on the confidential medium; the contact type identification chip on the confidential medium is used for broadcasting the ID of the confidential medium;
the confidential medium ID identification module is connected with the contact type identification chip; the ID identification module of the confidential medium is used for identifying the ID of the confidential medium;
the confidential medium integrity detection module is connected with the confidential medium; the confidential medium integrity detection module is used for detecting whether the confidential medium is complete or not to obtain a detection result;
the control module is respectively connected with the confidential medium contact type charging module, the confidential medium ID recognition module and the confidential medium integrity detection module; the control module is used for determining an identification result according to the ID of the confidential medium and the detection result; the recognition result comprises: whether the ID can be identified and whether the secure media is intact;
the sorting system is connected with the control module; the sorting system is used for carrying out sorting operation according to the identification result;
the contact type destroying circuit module is respectively connected with the sorting system and the crushing module; the contact type destroying circuit module and the crushing module are used for destroying the confidential medium.
2. A destruction device for traceable security media in accordance with claim 1, wherein the security media contact charging module comprises: two electric brushes; the electric brush is in contact connection with the electrode of the medium; the electrodes are located on a surface of the security medium.
3. A destruction device for traceable security media according to claim 1, wherein said security media integrity detection module comprises: the device comprises a signal source, a first electric brush, a second electric brush and an ADC (analog to digital converter) sampling circuit;
the signal source is respectively connected with the control module and the first electric brush; the signal source is used for generating a first waveform signal;
the ADC sampling circuit is respectively connected with the control module and the second electric brush; the ADC sampling circuit is used for obtaining a second waveform signal;
the control module is used for comparing the second waveform signal with the first waveform signal and detecting whether the confidential medium is complete or not according to a comparison result.
4. A destruction device for traceable security media, according to claim 1, wherein the contact destruction circuit module comprises a third brush and a fourth brush;
the third electric brush and the fourth electric brush are both in contact with electrodes of a contact type self-destruction circuit arranged on the surface of the confidential medium; the third electric brush and the fourth electric brush are used for supplying power and breaking down and destroying the contact type identification chip on the confidential medium according to a control contact type self-destruction circuit of the control module.
5. The destruction device for a traceable security media of claim 1, wherein the security media ID identification module is an RFID signal receiver.
6. A destruction device for traceable security media, according to claim 1, further comprising: a personnel RFID identification module;
the personnel RFID identification module is connected with the control module; the personnel RFID identification module is used for storing information of operators; the control module is used for judging whether the operator has destruction permission according to the information of the operator.
7. A destruction device for traceable security media, according to claim 1, further comprising: a device storage frame to be destroyed;
the equipment storage frame to be destroyed is connected with the sorting system; and the device storage frame to be destroyed is used for storing the confidential medium when the identification result is that the ID cannot be identified or the confidential medium is incomplete.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011542545.7A CN112287303B (en) | 2020-12-24 | 2020-12-24 | Destroying equipment suitable for traceable confidential medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011542545.7A CN112287303B (en) | 2020-12-24 | 2020-12-24 | Destroying equipment suitable for traceable confidential medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112287303A true CN112287303A (en) | 2021-01-29 |
CN112287303B CN112287303B (en) | 2021-04-02 |
Family
ID=74426048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011542545.7A Active CN112287303B (en) | 2020-12-24 | 2020-12-24 | Destroying equipment suitable for traceable confidential medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112287303B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113435424A (en) * | 2021-08-27 | 2021-09-24 | 北京中超伟业信息安全技术股份有限公司 | Method and system for identifying destroying granularity of confidential medium |
CN114528950A (en) * | 2022-04-24 | 2022-05-24 | 北京中超伟业信息安全技术股份有限公司 | Destroying method and system for identifying type of confidential medium based on three-dimensional point cloud |
CN116116507A (en) * | 2023-04-17 | 2023-05-16 | 北京中超伟业信息安全技术股份有限公司 | Destroying device and method for encrypting mobile storage equipment |
CN117457032A (en) * | 2023-12-25 | 2024-01-26 | 山东万里红信息技术有限公司 | Storage medium destroying method based on volume identification |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070176031A1 (en) * | 2006-01-31 | 2007-08-02 | Fuji Xerox Co., Ltd. | Disposal processing apparatus, disposal processing information management system, and disposal processing method |
CN103279704A (en) * | 2013-06-08 | 2013-09-04 | 大唐微电子技术有限公司 | Detecting device and system of chip physical integrity |
CN103611607A (en) * | 2013-11-25 | 2014-03-05 | 张忠义 | Device and method for destroying secret electronic information carriers |
CN205581873U (en) * | 2016-03-30 | 2016-09-14 | 池州职业技术学院 | Solid state hard drives that intelligence was destroyed |
CN108985110A (en) * | 2018-08-31 | 2018-12-11 | 太原禾木科技有限公司 | A kind of method and apparatus that concerning security matters carrier information is quickly destroyed |
CN111933203A (en) * | 2020-07-14 | 2020-11-13 | 深圳佰维存储科技股份有限公司 | Method, circuit, device, medium and equipment for judging physical destruction of memory chip |
-
2020
- 2020-12-24 CN CN202011542545.7A patent/CN112287303B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070176031A1 (en) * | 2006-01-31 | 2007-08-02 | Fuji Xerox Co., Ltd. | Disposal processing apparatus, disposal processing information management system, and disposal processing method |
CN103279704A (en) * | 2013-06-08 | 2013-09-04 | 大唐微电子技术有限公司 | Detecting device and system of chip physical integrity |
CN103611607A (en) * | 2013-11-25 | 2014-03-05 | 张忠义 | Device and method for destroying secret electronic information carriers |
CN205581873U (en) * | 2016-03-30 | 2016-09-14 | 池州职业技术学院 | Solid state hard drives that intelligence was destroyed |
CN108985110A (en) * | 2018-08-31 | 2018-12-11 | 太原禾木科技有限公司 | A kind of method and apparatus that concerning security matters carrier information is quickly destroyed |
CN111933203A (en) * | 2020-07-14 | 2020-11-13 | 深圳佰维存储科技股份有限公司 | Method, circuit, device, medium and equipment for judging physical destruction of memory chip |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113435424A (en) * | 2021-08-27 | 2021-09-24 | 北京中超伟业信息安全技术股份有限公司 | Method and system for identifying destroying granularity of confidential medium |
CN114528950A (en) * | 2022-04-24 | 2022-05-24 | 北京中超伟业信息安全技术股份有限公司 | Destroying method and system for identifying type of confidential medium based on three-dimensional point cloud |
CN114528950B (en) * | 2022-04-24 | 2022-07-12 | 北京中超伟业信息安全技术股份有限公司 | Destroying method and system for identifying type of confidential medium based on three-dimensional point cloud |
CN116116507A (en) * | 2023-04-17 | 2023-05-16 | 北京中超伟业信息安全技术股份有限公司 | Destroying device and method for encrypting mobile storage equipment |
CN117457032A (en) * | 2023-12-25 | 2024-01-26 | 山东万里红信息技术有限公司 | Storage medium destroying method based on volume identification |
CN117457032B (en) * | 2023-12-25 | 2024-03-22 | 山东万里红信息技术有限公司 | Storage medium destroying method based on volume identification |
Also Published As
Publication number | Publication date |
---|---|
CN112287303B (en) | 2021-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112287303B (en) | Destroying equipment suitable for traceable confidential medium | |
US10149169B1 (en) | Non-contact electromagnetic illuminated detection of part anomalies for cyber physical security | |
Lohrke et al. | Key extraction using thermal laser stimulation: A case study on xilinx ultrascale fpgas | |
CN105576453B (en) | A kind of intelligent and safe wiring board and its control method | |
CN103760451B (en) | The interface access module detection method of a kind of intelligent cipher key equipment and equipment | |
CN101802628A (en) | A method for detecting, identifying and locating partial discharges occurring in a discharge site along an electric apparatus | |
Liu et al. | Concurrent hardware Trojan detection in wireless cryptographic ICs | |
WO2021082593A1 (en) | Pollution classification method, apparatus and device, medium, and data obtaining system | |
GB2556411A (en) | Active ASIC intrusion shield | |
US20220341990A1 (en) | A method and apparatus for detection of counterfeit parts, compromised or tampered components or devices, tampered systems such as local communication networks, and for secure identification of components | |
CN104655992A (en) | GIS partial discharge detection equipment and method | |
CN103869236A (en) | Method and jig for testing infrared touch screen PCBA | |
Kranz | PD pulse sequence analysis and its relevance for on-site PD defect identification and evaluation | |
CN109406897B (en) | Detection device and detection method for secondary fusion equipment | |
CN106549366A (en) | Electrical Safety detection protection circuit, switchgear or socket | |
CN111314292A (en) | Data security inspection method based on sensitive data identification | |
CN102636768A (en) | Online check method for online monitor of lightning arrester | |
Nguyen et al. | Void discharge behaviours as a function of cavity size and voltage waveform under very low‐frequency excitation | |
CN107991551B (en) | Detection platform with tracing function | |
CN102478618A (en) | Online monitoring method for partial discharging of 500 KV cross-linked cable | |
CN202162201U (en) | Physical disk destroying device | |
CN112257099A (en) | Confidential equipment identification device suitable for emergency destruction vehicle | |
KR101836089B1 (en) | Data storage medium permanent destruction device | |
US20080315892A1 (en) | Methods and apparatus using one or more supernodes when testing for shorts between nodes of a circuit assembly | |
CN110377502A (en) | Function test method, device and terminal device based on script |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |