CN112783561A - Key destroying method for wearable equipment - Google Patents
Key destroying method for wearable equipment Download PDFInfo
- Publication number
- CN112783561A CN112783561A CN202110011586.1A CN202110011586A CN112783561A CN 112783561 A CN112783561 A CN 112783561A CN 202110011586 A CN202110011586 A CN 202110011586A CN 112783561 A CN112783561 A CN 112783561A
- Authority
- CN
- China
- Prior art keywords
- terminal
- destroying
- key
- state
- power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/442—Shutdown
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44594—Unloading
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a key destroying method of wearable equipment, which comprises the following steps: s1, long-pressing the key-destroying key; s2, the terminal immediately restarts to enter the bootstrap program, and makes the terminal work in the state of abnormally starting the bootstrap program, and enters the destroying process, and the terminal can still keep the state after being electrified again after power failure; s3, in the bootstrap program, erasing each partition according to the sequence, recording the erasing progress, and when forced power down, the next power up will continue; and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port. According to the invention, once the elimination action is executed, the special mode is immediately entered, and even if the current action is interrupted, the elimination action can be continuously executed after the next power-on.
Description
Technical Field
The invention relates to the technical field of key destroying methods, in particular to a key destroying method of wearable equipment.
Background
The conventional key destruction processing generally has the following defects:
1. formatting the user partition while the system is running (clearing the file store list, not the data itself)
2. The terminal can still be started after being cleared, only part of data cannot be quoted, an interface cannot be started normally, and operation can be actually carried out through the usb, the serial port and the like, so that operation is carried out, and even the data in the storage chip is exported and recovered by using a technical means.
3. Can be interrupted, and the cleaning action can not be continued when the computer is started next time after the physical way forces power failure.
Disclosure of Invention
The present invention is directed to a method for destroying a key of a wearable device, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a key destroying method of a wearable device comprises the following steps:
s1, long-pressing the key-destroying key;
s2, the terminal immediately restarts and enters the bootstrap program, and the bootstrap program works in the state of abnormally starting the system kernel, and enters the destroying process, and the terminal can still keep the state after being electrified again after power failure;
s3, in the bootstrap program, erasing each partition according to the sequence, recording the erasing progress, and when forced power down, the next power up will continue;
and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port.
Preferably, the key destroying key is structurally subjected to invagination processing.
Preferably, the terminal is in a destruction process and cannot be started after destruction, and the interface has a prompt for response.
Preferably, the terminal can be booted after being re-burned by original factory firmware.
Preferably, the manner in which the state can still be maintained after the terminal is powered on again after the power failure in step S2 is that after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space that is not easy to lose, and the state can still be read when the terminal is powered on next time, and the incomplete destruction action is continuously completed.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, once the elimination action is executed, the special mode is immediately entered, and even if the current action is interrupted, the elimination action can be continuously executed after the next power-on;
2. according to the invention, the terminal after executing the clearing action can not be started normally, and the kernel partition of the system operation is cleared.
3. According to the invention, after the destruction is finished, the terminal does not have the function of starting the system any more, and after the destruction, the terminal does not have the function of interaction through the usb, the serial port and the like.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: a key destroying method of a wearable device comprises the following steps:
s1, long-pressing the key-destroying key;
s2, the terminal immediately restarts and enters the bootstrap program, and the bootstrap program works in the state of abnormally starting the system kernel, and enters the destroying process, and the terminal can still keep the state after being electrified again after power failure;
after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space which is not easy to lose, the state can be still read when the terminal is started next time, and incomplete destruction actions are continuously completed.
After entering an abnormal flow, erasing the partitions with smaller data volumes, such as ramdisk and kernel, at first.
Once the ramdisk and the kernel are erased, the system cannot be started, the original files of the kernel and the ramdisk are not opened to the outside, and the original files are not repaired by a designated maintenance unit and cannot be recovered by updating the firmware;
s3, in the bootstrap program, erasing each partition according to the sequence, recording the erasing progress, and when forced power down, the next power up will continue;
and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port.
And after the system enters an abnormal state, the storage is destroyed, and the destroyed subarea sentence does not have files required by the system operation and cannot operate the system.
The special processing is carried out on the guide subarea, and in the destroyed or destroyed state, the guide subarea can not initialize and open the usb controller any more, so that the system does not have the usb function, and usb interaction is never avoided.
And if the destruction action is finished, the guide partition controls the main processing to close, the main processing cannot enter a normal mode, a recovery mode or a shutdown charging mode from the guide mode, the guide partition does not support serial port interaction, and the recovery mode, the normal mode and the shutdown charging mode are possible to control the hardware through the serial port.
Specifically, the key destruction key is structurally subjected to invagination processing.
Specifically, the terminal can not be started after the terminal is in the destroying process and is destroyed, and the interface has a prompt for response,
a. and developing the function by guiding the partition, wherein in the destruction state, the partition can directly enter the destruction flow through judging the state, and cannot be changed through external conditions, and forced erasing actions are carried out on partitions such as ramdisk, kernel, kernel _ recovery, system, user and the like in the destruction flow.
b. The system is normally started, the system programs stored in partitions such as ramdsik, kernel, system, user and the like cannot be separated, the partitions are erased, and hardware does not have working conditions.
c. The boot partition displays the exception status and erase progress on the lcd and displays a shutdown countdown.
Specifically, the terminal can be booted after being re-burned by original factory firmware.
Specifically, the method that the state can still be maintained after the terminal is powered on again after the power failure in step S2 is that after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space that is not easy to lose, and the state can still be read when the terminal is powered on next time, and the incomplete destruction action is continuously completed.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (5)
1. A key destroying method of wearable equipment is characterized by comprising the following steps:
s1, long-pressing the key-destroying key;
s2, the terminal immediately restarts to enter the bootstrap program, and the bootstrap program works in the state of the abnormal bootstrap program kernel, and enters the destruction flow, and the state can be still maintained after the power is off and the power is on again;
s3, in the boot program, erasing each partition according to the sequence, wherein the erasing mode is to use invalid data to cover, and record the erasing progress, and when forced power down, the next power up will continue;
and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port.
2. The method for destroying keys of a wearable device according to claim 1, wherein: the key destroying key is internally processed structurally.
3. The method for destroying keys of a wearable device according to claim 1, wherein: the terminal is in a destroying process and cannot be started after being destroyed, and the interface has a prompt for response.
4. The method for destroying keys of a wearable device according to claim 1, wherein: the terminal can be started after being re-burned by original factory firmware.
5. The method for destroying keys of a wearable device according to claim 1, wherein: the manner in which the state can still be maintained after power is turned off and power is turned on again in step S2 is that after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space that is not easy to lose, and the state can still be read when the terminal is turned on next time, and the incomplete destruction action is continuously completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110011586.1A CN112783561A (en) | 2021-01-06 | 2021-01-06 | Key destroying method for wearable equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110011586.1A CN112783561A (en) | 2021-01-06 | 2021-01-06 | Key destroying method for wearable equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112783561A true CN112783561A (en) | 2021-05-11 |
Family
ID=75755598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110011586.1A Pending CN112783561A (en) | 2021-01-06 | 2021-01-06 | Key destroying method for wearable equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112783561A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102289623A (en) * | 2011-09-02 | 2011-12-21 | 湖南国安思科计算机系统有限公司 | Anti-leakage laptop |
CN102662804A (en) * | 2012-03-21 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Power-down-prevention irreversible self-destroying method for solid state disk |
CN104200174A (en) * | 2014-08-27 | 2014-12-10 | 成都卫士通信息产业股份有限公司 | Automatic destruction structure for information of electronic equipment |
CN107995617A (en) * | 2017-12-21 | 2018-05-04 | 鸿秦(北京)科技有限公司 | A kind of solid storage device for supporting telesecurity to destroy design |
CN110909395A (en) * | 2018-09-14 | 2020-03-24 | 武汉海康存储技术有限公司 | Method and device for destroying data of nonvolatile storage device |
-
2021
- 2021-01-06 CN CN202110011586.1A patent/CN112783561A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102289623A (en) * | 2011-09-02 | 2011-12-21 | 湖南国安思科计算机系统有限公司 | Anti-leakage laptop |
CN102662804A (en) * | 2012-03-21 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Power-down-prevention irreversible self-destroying method for solid state disk |
CN104200174A (en) * | 2014-08-27 | 2014-12-10 | 成都卫士通信息产业股份有限公司 | Automatic destruction structure for information of electronic equipment |
CN107995617A (en) * | 2017-12-21 | 2018-05-04 | 鸿秦(北京)科技有限公司 | A kind of solid storage device for supporting telesecurity to destroy design |
CN110909395A (en) * | 2018-09-14 | 2020-03-24 | 武汉海康存储技术有限公司 | Method and device for destroying data of nonvolatile storage device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4965824B2 (en) | Information processing apparatus and data relief method | |
KR100283243B1 (en) | How to boot the operating system | |
US20040030877A1 (en) | Using system BIOS to update embedded controller firmware | |
CN101470615B (en) | Single-key controlled method for automatically repairing system configuration | |
EP1879109A1 (en) | Information processing device, program, and storage medium | |
CN110083404B (en) | Data processing method and system of human-computer interface equipment and human-computer interface equipment | |
JP4940599B2 (en) | Information processing apparatus, information processing apparatus control program, and information processing apparatus control method | |
CN105183521A (en) | Method for installing computing operation system and USB port storage device | |
US7219221B2 (en) | System and method for automatic booting based on single flash ROM | |
CN111078469A (en) | Data processing method and data processing equipment | |
EP3879396B1 (en) | Fail safe update of firmware in an audio processing chip | |
CN106484567A (en) | A kind of using method of flash data backup and system | |
CN112882757A (en) | Embedded system double-partition safe starting method | |
CN112783561A (en) | Key destroying method for wearable equipment | |
CN1183451C (en) | BIOS updating method of computer system | |
CN112035171A (en) | Factory setting restoration method and system based on UEFI firmware | |
US7222230B2 (en) | System and method for manual fail-safe bootstrap based on a single flash ROM | |
CN111382009B (en) | Automatic system maintenance method and computer equipment with automatic maintenance function | |
CN111045709B (en) | Firmware upgrading method and firmware upgrading device | |
CN113849235A (en) | Control method and device and electronic equipment | |
JP6775651B1 (en) | Information processing equipment, control methods, and programs | |
KR101022468B1 (en) | Embedded computer system for reducing the time for rebooting the unusually logged off system | |
JP4572205B2 (en) | Flash memory drive device, control method thereof, and program thereof | |
JP2003122644A (en) | Computer and its storage device | |
US11250929B2 (en) | System for detecting computer startup and method of system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |