CN112783561A - Key destroying method for wearable equipment - Google Patents

Key destroying method for wearable equipment Download PDF

Info

Publication number
CN112783561A
CN112783561A CN202110011586.1A CN202110011586A CN112783561A CN 112783561 A CN112783561 A CN 112783561A CN 202110011586 A CN202110011586 A CN 202110011586A CN 112783561 A CN112783561 A CN 112783561A
Authority
CN
China
Prior art keywords
terminal
destroying
key
state
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110011586.1A
Other languages
Chinese (zh)
Inventor
邢大静
雷杰
朱健安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sutai Intelligent Technology Shanghai Co ltd
Original Assignee
Sutai Intelligent Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sutai Intelligent Technology Shanghai Co ltd filed Critical Sutai Intelligent Technology Shanghai Co ltd
Priority to CN202110011586.1A priority Critical patent/CN112783561A/en
Publication of CN112783561A publication Critical patent/CN112783561A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/442Shutdown
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a key destroying method of wearable equipment, which comprises the following steps: s1, long-pressing the key-destroying key; s2, the terminal immediately restarts to enter the bootstrap program, and makes the terminal work in the state of abnormally starting the bootstrap program, and enters the destroying process, and the terminal can still keep the state after being electrified again after power failure; s3, in the bootstrap program, erasing each partition according to the sequence, recording the erasing progress, and when forced power down, the next power up will continue; and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port. According to the invention, once the elimination action is executed, the special mode is immediately entered, and even if the current action is interrupted, the elimination action can be continuously executed after the next power-on.

Description

Key destroying method for wearable equipment
Technical Field
The invention relates to the technical field of key destroying methods, in particular to a key destroying method of wearable equipment.
Background
The conventional key destruction processing generally has the following defects:
1. formatting the user partition while the system is running (clearing the file store list, not the data itself)
2. The terminal can still be started after being cleared, only part of data cannot be quoted, an interface cannot be started normally, and operation can be actually carried out through the usb, the serial port and the like, so that operation is carried out, and even the data in the storage chip is exported and recovered by using a technical means.
3. Can be interrupted, and the cleaning action can not be continued when the computer is started next time after the physical way forces power failure.
Disclosure of Invention
The present invention is directed to a method for destroying a key of a wearable device, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a key destroying method of a wearable device comprises the following steps:
s1, long-pressing the key-destroying key;
s2, the terminal immediately restarts and enters the bootstrap program, and the bootstrap program works in the state of abnormally starting the system kernel, and enters the destroying process, and the terminal can still keep the state after being electrified again after power failure;
s3, in the bootstrap program, erasing each partition according to the sequence, recording the erasing progress, and when forced power down, the next power up will continue;
and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port.
Preferably, the key destroying key is structurally subjected to invagination processing.
Preferably, the terminal is in a destruction process and cannot be started after destruction, and the interface has a prompt for response.
Preferably, the terminal can be booted after being re-burned by original factory firmware.
Preferably, the manner in which the state can still be maintained after the terminal is powered on again after the power failure in step S2 is that after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space that is not easy to lose, and the state can still be read when the terminal is powered on next time, and the incomplete destruction action is continuously completed.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, once the elimination action is executed, the special mode is immediately entered, and even if the current action is interrupted, the elimination action can be continuously executed after the next power-on;
2. according to the invention, the terminal after executing the clearing action can not be started normally, and the kernel partition of the system operation is cleared.
3. According to the invention, after the destruction is finished, the terminal does not have the function of starting the system any more, and after the destruction, the terminal does not have the function of interaction through the usb, the serial port and the like.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: a key destroying method of a wearable device comprises the following steps:
s1, long-pressing the key-destroying key;
s2, the terminal immediately restarts and enters the bootstrap program, and the bootstrap program works in the state of abnormally starting the system kernel, and enters the destroying process, and the terminal can still keep the state after being electrified again after power failure;
after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space which is not easy to lose, the state can be still read when the terminal is started next time, and incomplete destruction actions are continuously completed.
After entering an abnormal flow, erasing the partitions with smaller data volumes, such as ramdisk and kernel, at first.
Once the ramdisk and the kernel are erased, the system cannot be started, the original files of the kernel and the ramdisk are not opened to the outside, and the original files are not repaired by a designated maintenance unit and cannot be recovered by updating the firmware;
s3, in the bootstrap program, erasing each partition according to the sequence, recording the erasing progress, and when forced power down, the next power up will continue;
and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port.
And after the system enters an abnormal state, the storage is destroyed, and the destroyed subarea sentence does not have files required by the system operation and cannot operate the system.
The special processing is carried out on the guide subarea, and in the destroyed or destroyed state, the guide subarea can not initialize and open the usb controller any more, so that the system does not have the usb function, and usb interaction is never avoided.
And if the destruction action is finished, the guide partition controls the main processing to close, the main processing cannot enter a normal mode, a recovery mode or a shutdown charging mode from the guide mode, the guide partition does not support serial port interaction, and the recovery mode, the normal mode and the shutdown charging mode are possible to control the hardware through the serial port.
Specifically, the key destruction key is structurally subjected to invagination processing.
Specifically, the terminal can not be started after the terminal is in the destroying process and is destroyed, and the interface has a prompt for response,
a. and developing the function by guiding the partition, wherein in the destruction state, the partition can directly enter the destruction flow through judging the state, and cannot be changed through external conditions, and forced erasing actions are carried out on partitions such as ramdisk, kernel, kernel _ recovery, system, user and the like in the destruction flow.
b. The system is normally started, the system programs stored in partitions such as ramdsik, kernel, system, user and the like cannot be separated, the partitions are erased, and hardware does not have working conditions.
c. The boot partition displays the exception status and erase progress on the lcd and displays a shutdown countdown.
Specifically, the terminal can be booted after being re-burned by original factory firmware.
Specifically, the method that the state can still be maintained after the terminal is powered on again after the power failure in step S2 is that after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space that is not easy to lose, and the state can still be read when the terminal is powered on next time, and the incomplete destruction action is continuously completed.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (5)

1. A key destroying method of wearable equipment is characterized by comprising the following steps:
s1, long-pressing the key-destroying key;
s2, the terminal immediately restarts to enter the bootstrap program, and the bootstrap program works in the state of the abnormal bootstrap program kernel, and enters the destruction flow, and the state can be still maintained after the power is off and the power is on again;
s3, in the boot program, erasing each partition according to the sequence, wherein the erasing mode is to use invalid data to cover, and record the erasing progress, and when forced power down, the next power up will continue;
and S4, after the destruction is completed, the terminal does not have the function of starting the system any more, and the terminal does not have the function of interaction through the usb and the serial port.
2. The method for destroying keys of a wearable device according to claim 1, wherein: the key destroying key is internally processed structurally.
3. The method for destroying keys of a wearable device according to claim 1, wherein: the terminal is in a destroying process and cannot be started after being destroyed, and the interface has a prompt for response.
4. The method for destroying keys of a wearable device according to claim 1, wherein: the terminal can be started after being re-burned by original factory firmware.
5. The method for destroying keys of a wearable device according to claim 1, wherein: the manner in which the state can still be maintained after power is turned off and power is turned on again in step S2 is that after the terminal enters an abnormal flow, the current abnormal state and the destruction progress are stored in a storage space that is not easy to lose, and the state can still be read when the terminal is turned on next time, and the incomplete destruction action is continuously completed.
CN202110011586.1A 2021-01-06 2021-01-06 Key destroying method for wearable equipment Pending CN112783561A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110011586.1A CN112783561A (en) 2021-01-06 2021-01-06 Key destroying method for wearable equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110011586.1A CN112783561A (en) 2021-01-06 2021-01-06 Key destroying method for wearable equipment

Publications (1)

Publication Number Publication Date
CN112783561A true CN112783561A (en) 2021-05-11

Family

ID=75755598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110011586.1A Pending CN112783561A (en) 2021-01-06 2021-01-06 Key destroying method for wearable equipment

Country Status (1)

Country Link
CN (1) CN112783561A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289623A (en) * 2011-09-02 2011-12-21 湖南国安思科计算机系统有限公司 Anti-leakage laptop
CN102662804A (en) * 2012-03-21 2012-09-12 浪潮电子信息产业股份有限公司 Power-down-prevention irreversible self-destroying method for solid state disk
CN104200174A (en) * 2014-08-27 2014-12-10 成都卫士通信息产业股份有限公司 Automatic destruction structure for information of electronic equipment
CN107995617A (en) * 2017-12-21 2018-05-04 鸿秦(北京)科技有限公司 A kind of solid storage device for supporting telesecurity to destroy design
CN110909395A (en) * 2018-09-14 2020-03-24 武汉海康存储技术有限公司 Method and device for destroying data of nonvolatile storage device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289623A (en) * 2011-09-02 2011-12-21 湖南国安思科计算机系统有限公司 Anti-leakage laptop
CN102662804A (en) * 2012-03-21 2012-09-12 浪潮电子信息产业股份有限公司 Power-down-prevention irreversible self-destroying method for solid state disk
CN104200174A (en) * 2014-08-27 2014-12-10 成都卫士通信息产业股份有限公司 Automatic destruction structure for information of electronic equipment
CN107995617A (en) * 2017-12-21 2018-05-04 鸿秦(北京)科技有限公司 A kind of solid storage device for supporting telesecurity to destroy design
CN110909395A (en) * 2018-09-14 2020-03-24 武汉海康存储技术有限公司 Method and device for destroying data of nonvolatile storage device

Similar Documents

Publication Publication Date Title
JP4965824B2 (en) Information processing apparatus and data relief method
KR100283243B1 (en) How to boot the operating system
US20040030877A1 (en) Using system BIOS to update embedded controller firmware
CN101470615B (en) Single-key controlled method for automatically repairing system configuration
EP1879109A1 (en) Information processing device, program, and storage medium
CN110083404B (en) Data processing method and system of human-computer interface equipment and human-computer interface equipment
JP4940599B2 (en) Information processing apparatus, information processing apparatus control program, and information processing apparatus control method
CN105183521A (en) Method for installing computing operation system and USB port storage device
US7219221B2 (en) System and method for automatic booting based on single flash ROM
CN111078469A (en) Data processing method and data processing equipment
EP3879396B1 (en) Fail safe update of firmware in an audio processing chip
CN106484567A (en) A kind of using method of flash data backup and system
CN112882757A (en) Embedded system double-partition safe starting method
CN112783561A (en) Key destroying method for wearable equipment
CN1183451C (en) BIOS updating method of computer system
CN112035171A (en) Factory setting restoration method and system based on UEFI firmware
US7222230B2 (en) System and method for manual fail-safe bootstrap based on a single flash ROM
CN111382009B (en) Automatic system maintenance method and computer equipment with automatic maintenance function
CN111045709B (en) Firmware upgrading method and firmware upgrading device
CN113849235A (en) Control method and device and electronic equipment
JP6775651B1 (en) Information processing equipment, control methods, and programs
KR101022468B1 (en) Embedded computer system for reducing the time for rebooting the unusually logged off system
JP4572205B2 (en) Flash memory drive device, control method thereof, and program thereof
JP2003122644A (en) Computer and its storage device
US11250929B2 (en) System for detecting computer startup and method of system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination