CN113626845A - Storage device capable of effectively reducing false destruction probability - Google Patents

Storage device capable of effectively reducing false destruction probability Download PDF

Info

Publication number
CN113626845A
CN113626845A CN202110951702.8A CN202110951702A CN113626845A CN 113626845 A CN113626845 A CN 113626845A CN 202110951702 A CN202110951702 A CN 202110951702A CN 113626845 A CN113626845 A CN 113626845A
Authority
CN
China
Prior art keywords
destruction
storage device
unit
control unit
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110951702.8A
Other languages
Chinese (zh)
Inventor
吴飞
孙永泉
习亮
王浩
任艳慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN202110951702.8A priority Critical patent/CN113626845A/en
Publication of CN113626845A publication Critical patent/CN113626845A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/30Means for acting in the event of power-supply failure or interruption, e.g. power-supply fluctuations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a storage device capable of effectively reducing the probability of false destruction, and belongs to the field of storage. The cover opening detection unit is connected with the microswitch, the microswitch is additionally arranged under the fastening screw of the storage device, and the cover opening detection unit is used for detecting the screwing-in and screwing-out of each fastening screw through the microswitch and outputting a cover opening monitoring result; the destruction control unit is connected with the uncovering detection unit and used for identifying illegal operation according to the uncovering monitoring result and outputting a destruction instruction to the main control unit; the main control unit is connected with the destroying control unit and the storage unit; the main control unit includes: the device comprises a protocol conversion unit and a destroying execution unit, wherein the destroying execution unit is used for executing destroying operation and destroying data in the storage unit. The invention is compatible with the traditional storage equipment, can effectively prevent information stealing by illegal uncovering and effectively prevent mistaken destruction.

Description

Storage device capable of effectively reducing false destruction probability
Technical Field
The invention belongs to the field of storage, and particularly relates to storage equipment capable of effectively reducing the probability of false destruction.
Background
With the development of storage technology, the capacity of storage equipment is larger and wider, and the application is wider and wider. Meanwhile, with the social progress, no matter countries, enterprises, groups, and individuals pay more and more attention to information security. This puts higher demands on the security of the data stored in the storage device.
For some fields sensitive to information security, once an information storage device is subjected to external illegal operation, huge losses are caused to countries, enterprises or individuals. Therefore, the storage device is required to recognize information leakage which may happen in time and destroy the stored information in time, so as to avoid reading, writing, tampering and the like of the information by illegal users.
The traditional method for improving the data storage security mainly comprises the following steps:
1. data encryption:
data in the storage device is encrypted by means of encrypted storage, so that unauthorized persons are prevented from reading and tampering the data. ("a solid state disk safety encryption system", patent application No. CN201019091001.0)
2. And (3) access authority control:
information is primarily signed by entering various forms of passwords or by means of software.
3. Remote control:
the storage device is used as a terminal and is managed in a centralized way through the remote device. And once the storage device is found to be lost, destroying the keys and data stored in the storage device through manual remote control. GSM remote destroying (Intelligent destroy solid hard disk, patent application No. CN201010194719.2)
However, the conventional methods have respective disadvantages:
data encryption: data in the storage device is encrypted by means of conventional encrypted storage. Due to the complexity of the storage protocol, the simple encryption algorithm is easy to break, and the complex encryption algorithm has the problems of influencing data bandwidth, losing storage equipment capacity, prolonging response time, reducing reliability and the like.
And (3) access authority control: the traditional security policy is to add access right control on the storage device interface, but this method also has inherent security defects. Once the storage device case is opened, the important data stored in the storage particles can be directly read by a simple tool.
Remote destruction: destruction can only be initiated passively if the administrator is explicitly aware that the storage device has been stolen, at which point the data in the storage device may have been stolen or tampered with.
Due to the objective existence of the random fault of the hardware, the destroying method has the possibility of destroying the valid data by mistake.
Disclosure of Invention
Technical problem to be solved
The invention aims to solve the technical problem of how to provide a storage device capable of effectively reducing the probability of mistaken destruction so as to solve the problem that the existing storage device destruction methods have the possibility of mistakenly destroying valid data.
(II) technical scheme
In order to solve the technical problems, the invention provides a storage device capable of effectively reducing the probability of mistaken destruction, which comprises a shell structure, an uncovering detection unit, a destruction control unit, a microswitch, a main control unit and a storage unit,
the machine shell structural part is used for providing physical protection for the storage equipment;
the cover opening detection unit is connected with the microswitch, the microswitch is additionally arranged below the fastening screw of the storage device, and the cover opening detection unit is used for detecting the screwing-in and screwing-out of each fastening screw through the microswitch and outputting a cover opening monitoring result;
the destruction control unit is connected with the uncovering detection unit and used for identifying illegal operation according to the uncovering monitoring result and outputting a destruction instruction to the main control unit;
the main control unit is connected with the destroying control unit and the storage unit; the main control unit includes: a protocol conversion unit and a destroying execution unit; the protocol conversion unit is used for realizing the conversion from the storage protocol to the interface protocol and acquiring data from the storage unit or storing the data into the storage unit; the destruction execution unit is used for executing destruction operation and destroying data in the storage unit;
the storage unit is used for storing the service data.
Further, the storage device comprises 6 fastening screws, and a micro switch is added below each fastening screw.
Further, when the fastening screw is screwed down, the microswitch is triggered to be closed, and the uncovering detection unit detects '1'; when the fastening switch is unscrewed, the microswitch bounces, and the cover opening detection unit detects '0'.
Further, the one end of micro-gap switch is connected to the power VCC, and micro-gap switch's the other end passes through resistance ground connection and connects the detecting element that uncaps, and when micro-gap switch closed, the detecting element that uncaps was connected to the VCC, detects the high level, corresponds "1", and when micro-gap switch flicked, the detecting element ground connection of uncapping detected the low level, corresponds "0".
Further, in the destruction operation, the destruction execution unit writes all 1, then writes all 0, and then writes all 1 to the storage unit.
Furthermore, the storage device also comprises a power supply system, wherein the power supply system comprises a battery, a charging and discharging circuit, a power supply switching circuit, a power failure detection circuit and a low power consumption control circuit, and provides uninterrupted power for the storage device.
Furthermore, the fastening screws only have one preset correct opening sequence, whether the screw screwing-up sequence is consistent with the preset sequence or not is detected through the single chip microcomputer in the destruction control unit, and if the screw screwing-up sequence is not consistent with the preset sequence, data destruction of the storage device is started.
Furthermore, a test program is preset in the destruction control unit, after the screw is screwed down, the screw is screwed back for a half circle, the screw is lifted, the micro switch is triggered to be turned on, the destruction control unit detects that the micro switch is turned on, the built-in buzzer is driven to sound, and an operator is informed that the triggering and the destruction are effective; and if not, reworking to detect the machining and manufacturing errors of each part.
Further, the destruction control unit identifies the uncovering sequence, and if a certain screw is loosened, namely the screw is changed from '1' to '0' before uncovering, the destruction control unit ignores the error and does not trigger destruction.
Further, the destruction control unit samples the destruction signal at a high speed through software, 10uS is collected once, and 3 ten thousand '0's are collected to judge that the screw is actually lifted.
(III) advantageous effects
The invention provides a storage device capable of effectively reducing the probability of false destruction, which is compatible with the traditional storage device in appearance and use; taking 6 conventional screws as an example, there are 720 arrangement combinations. If the uncapping sequence is wrong, data destruction is triggered, the correct uncapping sequence is solidified into a processor static storage area of a destruction control unit before delivery, and a manufacturer stores the data as secret information, so that information is effectively prevented from being stolen by illegal uncapping; software fault tolerance and back-screwing tests are added, so that mistaken destruction is effectively prevented; the application is acquired from a certain type of project, and the acceptance and the review of a relevant organization are passed.
Drawings
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a schematic diagram of the microswitch of the present invention;
fig. 3 is a schematic diagram of the decap detection of the present invention.
Detailed Description
In order to make the objects, contents and advantages of the present invention clearer, the following detailed description of the embodiments of the present invention will be made in conjunction with the accompanying drawings and examples.
The invention provides a high-reliability data destruction method. When an unauthorized person tries to open the shell of the storage device and reads and writes the storage chip in the storage device, the internal data is destroyed immediately.
The storage device capable of effectively reducing the false destruction probability comprises a shell structure, an uncovering detection unit, a destruction control unit, a microswitch, a main control unit and a storage unit.
The machine shell structural part is used for providing physical protection for the storage equipment;
the cover opening detection unit is connected with the microswitch, in order to be compatible with the traditional storage device and not change the appearance of the storage device, the microswitch is added under the screw of the storage device, and the cover opening detection unit is used for detecting the screwing-in and screwing-out of each screw through the microswitch and outputting a cover opening monitoring result. When the fastening screw is screwed down, the microswitch is triggered to be closed, and the uncovering detection unit detects that the position is '1'. When the fastening switch is unscrewed, the microswitch bounces, and the uncovering detection unit detects that the position is '0'. As shown in fig. 2 and 3, the power VCC is connected with one end of the microswitch, the other end of the microswitch is grounded and connected with the cover opening detection unit through the resistor, when the microswitch is closed, the cover opening detection unit is connected to the VCC to detect a high level corresponding to "1", and when the microswitch is flicked, the cover opening detection unit is grounded to detect a low level corresponding to "0".
The destruction control unit is connected with the uncovering detection unit and used for identifying illegal operation according to the uncovering monitoring result and outputting a destruction instruction to the main control unit.
The main control unit is connected with the destroying control unit and the storage unit. The main control unit includes: a protocol conversion unit and a destroy execution unit. The protocol conversion unit is used for realizing the conversion from the storage protocol to the interface protocol and acquiring data from the storage unit or storing the data into the storage unit; the destruction execution unit is used for executing destruction operation and destroying data in the storage unit;
the storage unit is used for storing the service data. In the destroying process, the destroying execution unit writes all 1, then writes all 0 and then writes all 1 to the storage unit. Ensuring that data before destruction cannot be recovered.
The storage device capable of effectively reducing the probability of false destruction also comprises a power supply system, wherein the power supply system comprises a battery, a charging and discharging circuit, power switching, power failure detection and low power consumption control, and uninterrupted power is provided for the storage device.
The hard disk shell is provided with 6 fastening screws which are bound to be removed if an unauthorized person tries to open the hard disk. And 6 screws on the hard disk only have a preset correct opening sequence. A micro switch is added under each fastening screw.
In the destruction control unit, a low-cost single chip microcomputer is used for detecting whether the screw turning-up sequence is consistent with the preset sequence or not, and if not, data destruction of the storage device is started.
To improve the reliability of mass production. The following two issues need to be concerned in the engineering implementation process: one is the production and manufacturing link before leaving the factory, and the other is the use link after leaving the factory.
And a production and manufacturing link before delivery. Because the internal space of the storage device is small, the trigger stroke of the microswitch is very short, and in addition, the tolerance generated in the production, processing and manufacturing processes only identifies the uncapping sequence in a mechanical mode, the data is easily destroyed by mistake. Therefore, a factory inspection function is added in the destruction control module to counteract the random failure of hardware. In order to ensure the reliable state of the product leaving the factory, a test program needs to be preset in the destruction control unit, and after the screw is screwed down, the screw is screwed back for half a turn (which is equivalent to that the screw is lifted up to trigger the micro switch to be turned on). If the destruction control unit detects that the micro switch is turned on, the built-in buzzer is driven to sound, and an operator is informed to trigger the effective destruction; and if not, reworking to detect the machining and manufacturing errors of each part. The product can be delivered from the factory after the test without problems.
And a use link after the departure. With a small probability of screw loosening occurring during transport and use. In order to ensure that the phenomenon of mistaken destruction does not occur, a software fault-tolerant method is added.
Through a large amount of statistics, the hardware failure rate caused by the tolerance of hard disk screws and micro switches after the equipment leaves a factory is 0.01%. The hardware failure is mainly characterized in that the uplifted state is not uplifted or is always uplifted in the normal sequential uncovering process. On the same storage device, the probability of the faults of two hard disk screws and a microswitch occurring at the same time is 0.1/million. Therefore, in the software fault-tolerant design, only one error needs to be ignored to meet the use requirement in most cases. The specific implementation is that the uncovering sequence is identified through the destruction control unit, if a certain screw is loosened, namely the screw is changed from '1' to '0' before uncovering, the software ignores the error and does not trigger destruction. Meanwhile, in order to prevent the inaccuracy of vibration and manual operation, 300mS software is added for shaking removal, the starting process is subjected to delay judgment, and mistaken destruction is effectively prevented. The specific implementation method is that the destruction control unit samples the destruction signal at a high speed through software, 10uS is collected once, and 3 ten thousand '0's are collected to judge that the screw is actually lifted. Therefore, the storage safety is ensured, and the random fault of the hardware is shielded.
Aiming at the small size of the solid-state disk, the stroke of a hardware trigger switch is short; the importance of user information, the fact that the user information is not easy to restore once destroyed, and the like, needs to add corresponding anti-error destroying treatment in the destroying control module. The invention has the following characteristics:
1. the solid state disk appearance is not changed. The fastening screw is used for inputting the cover-opening password, and the appearance of the password input device is not different from that of a common storage device.
2. Simple encryption algorithm (external data is reordered when being written into the storage unit through the main control unit, and is recovered when being read out) + recessive cover removal and destruction.
3. Software debounce is added. Counteracting the error destruction caused by vibration, manual operation, electromagnetic interference and the like;
4. and increasing software fault tolerance. Identifying the uncapping sequence through a destruction control unit, and if the uncapping sequence is wrong, immediately destroying the full-disk data; and if the uncapping sequence is correct, the data of the storage unit is not destroyed. In order to prevent individual screws from loosening, the originally correct uncapping sequence is identified as wrong, and data is further destroyed by mistake. And adding a software fault-tolerant algorithm. If a certain screw is loosened, namely the certain screw is changed from '1' to '0' before the cover is opened, as long as the sequence is correct in the subsequent cover opening process, the destroying control unit ignores the error and does not trigger the destroying. For example, the following steps are carried out: assume that the correct uncap sequence is 123456 and No. 3 screws are loose before uncap. Then, when the lid is actually opened, the software recognizes the opening sequence as 312456. In this sequence, the destruction control unit does not trigger destruction.
5. And adding a back-screwing half-circle test program before the equipment leaves the factory. Ensuring that the microswitch enters the working area.
Through a large number of practical applications, the measures can effectively reduce the probability of non-triggering and false triggering destruction caused by the random hardware fault of the encryption storage device destruction module.
The storage equipment capable of effectively reducing the probability of false destruction has the following advantages:
1. compatible in appearance and use with legacy storage devices;
2. taking 6 conventional screws as an example, there are 720 arrangement combinations. If the uncapping sequence is wrong, data destruction is triggered, the correct uncapping sequence is solidified into a processor static storage area of a destruction control unit before delivery, and a manufacturer stores the data as secret information, so that information is effectively prevented from being stolen by illegal uncapping;
3. software fault tolerance and back-screwing tests are added, so that mistaken destruction is effectively prevented;
4. the application is acquired from a certain type of project, and the acceptance and the review of a relevant organization are passed.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A storage device capable of effectively reducing the probability of false destruction is characterized by comprising a shell structure, an uncovering detection unit, a destruction control unit, a microswitch, a main control unit and a storage unit,
the machine shell structural part is used for providing physical protection for the storage equipment;
the cover opening detection unit is connected with the microswitch, the microswitch is additionally arranged below the fastening screw of the storage device, and the cover opening detection unit is used for detecting the screwing-in and screwing-out of each fastening screw through the microswitch and outputting a cover opening monitoring result;
the destruction control unit is connected with the uncovering detection unit and used for identifying illegal operation according to the uncovering monitoring result and outputting a destruction instruction to the main control unit;
the main control unit is connected with the destroying control unit and the storage unit; the main control unit includes: a protocol conversion unit and a destroying execution unit; the protocol conversion unit is used for realizing the conversion from the storage protocol to the interface protocol and acquiring data from the storage unit or storing the data into the storage unit; the destruction execution unit is used for executing destruction operation and destroying data in the storage unit;
the storage unit is used for storing the service data.
2. The storage device capable of effectively reducing the probability of false destruction according to claim 1, wherein the storage device comprises 6 fastening screws, and a micro switch is added below each fastening screw.
3. The storage device capable of effectively reducing the probability of false destruction according to claim 1, wherein when the fastening screw is tightened, the micro switch is triggered to be closed, and the uncovering detection unit detects '1'; when the fastening switch is unscrewed, the microswitch bounces, and the cover opening detection unit detects '0'.
4. The storage device capable of effectively reducing the probability of false destruction according to claim 3, wherein a power source VCC is connected to one end of the micro switch, the other end of the micro switch is grounded through a resistor and connected to the uncapping detection unit, when the micro switch is closed, the uncapping detection unit is connected to VCC, a high level is detected, corresponding to "1", and when the micro switch is flicked, the uncapping detection unit is grounded, a low level is detected, corresponding to "0".
5. The storage device capable of effectively reducing the probability of false destruction according to claim 1, wherein the destruction operation is performed by writing all 1, then all 0, and then all 1 to the storage unit by the destruction execution unit.
6. The storage device capable of effectively reducing the probability of false destruction according to claim 1, further comprising a power supply system, wherein the power supply system comprises a battery, a charging and discharging circuit, power switching, power failure detection and low power consumption control, and provides uninterrupted power for the storage device.
7. The storage device capable of effectively reducing the probability of false destruction according to any one of claims 1 to 6, wherein the fastening screws only have one preset correct opening sequence, in the destruction control unit, the single chip microcomputer detects whether the screw turning-up sequence is consistent with the preset sequence, and if not, the data destruction of the storage device is started.
8. The storage device capable of effectively reducing the probability of false destruction according to any one of claims 1 to 6, wherein a test program is preset in the destruction control unit, after the screw is tightened, the screw is screwed back for a half circle, the screw is lifted, the micro switch is triggered to be turned on, the destruction control unit detects that the micro switch is turned on, the built-in buzzer is driven to sound, and an operator is informed to trigger the destruction to be effective; and if not, reworking to detect the machining and manufacturing errors of each part.
9. The storage device according to any one of claims 1 to 6, wherein the destruction control unit recognizes the uncovering sequence, and if a certain screw is loosened, that is, changed from "1" to "0" before uncovering, the destruction control unit ignores the error and does not trigger destruction.
10. The storage device capable of effectively reducing the probability of false destruction according to any one of claims 1 to 6, wherein the destruction control unit samples the destruction signal at a high speed through software, 10uS is collected once, and 3 ten thousand '0's are collected to judge that the screw is actually lifted.
CN202110951702.8A 2021-08-17 2021-08-17 Storage device capable of effectively reducing false destruction probability Pending CN113626845A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110951702.8A CN113626845A (en) 2021-08-17 2021-08-17 Storage device capable of effectively reducing false destruction probability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110951702.8A CN113626845A (en) 2021-08-17 2021-08-17 Storage device capable of effectively reducing false destruction probability

Publications (1)

Publication Number Publication Date
CN113626845A true CN113626845A (en) 2021-11-09

Family

ID=78386571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110951702.8A Pending CN113626845A (en) 2021-08-17 2021-08-17 Storage device capable of effectively reducing false destruction probability

Country Status (1)

Country Link
CN (1) CN113626845A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426784A (en) * 2015-11-05 2016-03-23 天津津航计算技术研究所 Solid state disk data destruction system
CN107818257A (en) * 2017-11-23 2018-03-20 迈普通信技术股份有限公司 One kind illegally tears machine data self-desttruction equipment and electronic equipment open
CN110020560A (en) * 2019-04-22 2019-07-16 山东超越数控电子股份有限公司 A kind of electronic hard disk system and method with data self-destruction protection
CN212586888U (en) * 2020-07-10 2021-02-23 北京计算机技术及应用研究所 Trigger structure for self-destruction of illegal shutdown data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426784A (en) * 2015-11-05 2016-03-23 天津津航计算技术研究所 Solid state disk data destruction system
CN107818257A (en) * 2017-11-23 2018-03-20 迈普通信技术股份有限公司 One kind illegally tears machine data self-desttruction equipment and electronic equipment open
CN110020560A (en) * 2019-04-22 2019-07-16 山东超越数控电子股份有限公司 A kind of electronic hard disk system and method with data self-destruction protection
CN212586888U (en) * 2020-07-10 2021-02-23 北京计算机技术及应用研究所 Trigger structure for self-destruction of illegal shutdown data

Similar Documents

Publication Publication Date Title
CN101533441B (en) Device for providing secure execution environment and method for executing secure code thereof
US9465755B2 (en) Security parameter zeroization
EP2958047B1 (en) Usb security gateway
CN103109294B (en) There is the computing machine motherboard of peripheral defencive function
CN101795261B (en) Information protection system and method based on mobile data safety
US8601536B2 (en) Bus monitor for enhancing SOC system security and realization method thereof
CN100489728C (en) Method for establishing trustable operational environment in a computer
CN103902934B (en) A kind of cabinet tamper machine method for detecting and device
CN104361298B (en) The method and apparatus of Information Security
CN113626845A (en) Storage device capable of effectively reducing false destruction probability
CN107563226A (en) A kind of Memory Controller, processor module and key updating method
CN110874495B (en) Solid state disk based on automatic locking write protection function and tamper-proof method
CN1021089C (en) Protecting mechanism for stored information
KR20210021283A (en) Prevent tampering through computer
CN115460609B (en) Detection device for password card and password card
CN115600258A (en) Data security management method and system of personal storage device
CN1285050C (en) Digital certification protecting device based on fingerprint
CN110837662A (en) Honeypot module for cryptographic algorithm IP core

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination