CN114564765A - Shell opening monitoring system - Google Patents

Shell opening monitoring system Download PDF

Info

Publication number
CN114564765A
CN114564765A CN202210023775.5A CN202210023775A CN114564765A CN 114564765 A CN114564765 A CN 114564765A CN 202210023775 A CN202210023775 A CN 202210023775A CN 114564765 A CN114564765 A CN 114564765A
Authority
CN
China
Prior art keywords
monitoring system
initial value
shell
reconfiguration
volatile memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210023775.5A
Other languages
Chinese (zh)
Inventor
李国瑞
孙马秋
宋咏超
姜林剑
武长龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Password Cloud Core Technology Co ltd
Original Assignee
Beijing Password Cloud Core Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Password Cloud Core Technology Co ltd filed Critical Beijing Password Cloud Core Technology Co ltd
Priority to CN202210023775.5A priority Critical patent/CN114564765A/en
Publication of CN114564765A publication Critical patent/CN114564765A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention belongs to the technical field of shell opening monitoring, and discloses a shell opening monitoring system, which comprises a magnetic force monitoring system and a lock-free switch monitoring system; the magnetic force monitoring system comprises: a permanent magnet disposed on the housing; the magnetic sensor is arranged on the encryption equipment and used for detecting the magnetic strength and the angle of the permanent magnet; also comprises the following steps: whether the initial value needs to be reconfigured; if the reconfiguration is not needed, detecting whether the current magnetic strength and angle are the same as the initial values, if not, the shell is opened abnormally and is marked as an abnormal state; if the two signals are the same, entering a normal working mode; if the reconfiguration is needed, the reconfiguration is carried out; the no lock switch monitoring system includes: a battery; a volatile memory; and the non-locking switch is arranged on the encryption equipment, when the shell is opened, the non-locking switch disconnects the battery from the volatile memory, and the volatile memory automatically eliminates data.

Description

Shell opening monitoring system
Technical Field
The invention belongs to the technical field of shell opening monitoring, and particularly relates to a shell opening monitoring system.
Background
The encryption device needs to monitor whether the illegal person is opened by the illegal shell in order to prevent the illegal person from stealing important data through the dismantling device. At present, the shell opening monitoring on the market is realized in a single mode, such as a mechanical button or an illumination mode, and the principle is that the state of the mechanical button can be changed or the illumination can be changed when the shell is opened so as to achieve the purpose of monitoring.
However, when the shell is opened and analyzed without being powered on, a corresponding coping method is easily found, for example, a non-lock switch is pressed or a photosensitive sensor is covered and then powered on, which causes the data protection means to be invalid.
Therefore, a need exists for a closure opening monitoring system that solves the above-mentioned problems.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a shell opening monitoring system, two modes are jointly used for protection, even if one coping mode is found, the other mode also plays a role, and double protection can solve the problem that other uncovering monitoring is easy to crack.
In order to achieve the purpose, the invention adopts the following technical scheme:
providing a housing opening monitoring system, which comprises a magnetic force monitoring system and a lock-free switch monitoring system;
the magnetic force monitoring system comprises:
a permanent magnet disposed on the housing;
the magnetic sensor is arranged on the encryption equipment and used for detecting the magnetic strength and the angle of the permanent magnet;
also comprises the following steps:
whether the initial value needs to be reconfigured;
if the reconfiguration is not needed, detecting whether the current magnetic strength and angle are the same as the initial values, if not, the shell is opened abnormally and is marked as an abnormal state; if the two signals are the same, entering a normal working mode;
if the reconfiguration is needed, the reconfiguration is carried out;
the lock-free switch monitoring system comprises:
a battery;
a volatile memory;
the non-lock switch is arranged on the encryption equipment, the shell abuts against a key of the non-lock switch when closed, the battery is connected with the volatile memory through the non-lock switch, the non-lock switch disconnects the battery from the volatile memory when the shell is opened, and the volatile memory automatically eliminates data.
As a preferred technical scheme of the shell opening monitoring system, after the shell opening monitoring system is started, whether reconfiguration is needed or not is determined according to whether a command for reconfiguring an initial value is input or not in a second preset time.
As a preferred technical scheme of the shell opening monitoring system, the reconfiguration comprises a configuration state waiting configuration instruction, and the configuration instruction comprises setting an initial value, updating the initial value and quitting the configuration;
setting an initial value comprises reading the magnetic strength and the angle currently detected by the magnetic sensor and storing the magnetic strength and the angle as initial values;
updating the initial value comprises reading the magnetic strength and the angle currently detected by the magnetic sensor to replace the stored initial value and storing the initial value;
and exiting the configuration after the initial value is set or updated.
As a preferred technical scheme of the shell opening monitoring system, an initial value needs to be set after the initial use or abnormal opening.
As a preferred technical scheme of the shell opening monitoring system, the initial value needs to be updated after the shell is normally opened.
As a preferred technical scheme of a shell opening monitoring system, in a normal working mode, whether encrypted data in a volatile memory are intact is checked at intervals of first preset time, if the encrypted data are incomplete, an abnormal state is entered, and encryption and decryption work is stopped.
As a preferred embodiment of the housing opening monitoring system, the permanent magnet is fixed to the housing by a screw.
As a preferred technical scheme of the shell opening monitoring system, the key stroke of the lock-free switch key is 0.1mm-0.2 mm.
As a preferable technical scheme of the shell opening monitoring system, the shell and the encryption device are fixed through screws.
Compared with the prior art, the invention has the following beneficial effects:
the non-lock switch can detect whether the shell is opened or not, and the volatile memory automatically eliminates data after the shell is opened; the magnetic force monitoring system can determine whether the shell is abnormally opened or not, if the shell is abnormally opened, the shell is marked to be in an abnormal state, and the encryption and decryption work is stopped.
Magnetic force monitoring system and no lock switch monitoring system monitor the shell jointly and whether opened, and two kinds of modes protect jointly, just if find one of them reply mode, another kind of mode still plays a role, and dual protection can be solved other uncapping monitoring and cracked problem easily.
Drawings
FIG. 1 is a schematic structural diagram of a magnetic force monitoring system provided by the present invention;
FIG. 2 is a schematic structural diagram of a lock-less switch monitoring system according to the present invention;
FIG. 3 is a schematic flow diagram of a magnetometric monitoring system provided by the present invention.
Wherein, 1, a shell; 2. an encryption device; 3. a permanent magnet; 4. a magnetic force sensor; 5. a battery; 6. a volatile memory; 7. a non-locking switch; 71. and (6) pressing a key.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that the terms "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings or orientations or positional relationships that are conventionally placed when the products of the present invention are used, and are used only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the devices or elements to be referred to must have specific orientations, be constructed in specific orientations, and operate, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance. In the description of the present invention, "a plurality" means two or more unless otherwise specified.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; either mechanically or electrically. The specific meanings of the above terms in the present invention can be understood in a specific case to those of ordinary skill in the art.
In the present invention, unless otherwise expressly stated or limited, "above" or "below" a first feature means that the first and second features are in direct contact, or that the first and second features are not in direct contact but are in contact with each other via another feature therebetween. Also, the first feature being "on," "above" and "over" the second feature includes the first feature being directly on and obliquely above the second feature, or merely indicating that the first feature is at a higher level than the second feature. "beneath," "under" and "beneath" a first feature includes the first feature being directly beneath and obliquely beneath the second feature, or simply indicating that the first feature is at a lesser elevation than the second feature.
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The embodiment discloses a housing opening monitoring system which comprises a magnetic force monitoring system and a lock-free switch monitoring system.
The shell 1 and the encryption equipment 2 are fixed through screws, so that the fixing stability can be ensured, and the shell 1 cannot be opened by itself in the transportation and normal vibration process.
As shown in fig. 1 and 3, wherein the magnetism monitoring system includes a permanent magnet 3 and a magnetism sensor 4, the permanent magnet 3 is disposed on the housing 1, and in order to ensure the stability of the fixation thereof, specifically, the permanent magnet 3 is fixed on the housing 1 by screws. The magnetic sensor 4 is arranged on the encryption device 2, and is positioned in the shell 1 after the shell 1 is buckled. The magnetic sensor 4 is used for detecting the magnetic strength and the angle of the permanent magnet 3, the shell 1 is opened, the distance and the angle between the permanent magnet 3 and the magnetic sensor 4 are changed, the magnetic strength and the angle detected by the magnetic sensor 4 are changed, and whether the shell 1 is illegally opened can be judged according to whether the magnetic strength and the angle are changed.
The magnetic force monitoring system also comprises the following steps:
whether the initial value needs to be reconfigured;
if the reconfiguration is not needed, detecting whether the current magnetic strength and angle are the same as the initial values, if not, the shell 1 is opened abnormally and is marked as an abnormal state; if the two signals are the same, entering a normal working mode;
if the reconfiguration is needed, the reconfiguration is carried out;
specifically, after the computer is started, in a second preset time, whether reconfiguration is needed or not is determined according to whether an instruction for reconfiguring an initial value is input or not.
The reconfiguration comprises a configuration state waiting configuration instruction, and the configuration instruction comprises setting an initial value, updating the initial value and quitting the configuration;
setting an initial value comprises reading the magnetic strength and the angle currently detected by the magnetic sensor 4 and storing the magnetic strength and the angle as initial values;
updating the initial value comprises reading the magnetic strength and the angle currently detected by the magnetic sensor 4 to replace the stored initial value and storing;
and exiting the configuration after the initial value is set or updated.
Initial values need to be set after initial use or abnormal opening. The initial value needs to be updated after the normal opening of the housing 1.
The specific monitoring configuration process comprises the following steps:
s1, after the computer is started, in a second preset time (specifically 1S, the setting can be carried out according to a specific actual condition), whether an initial value reconfiguration instruction is received or not is waited, and the initial value reconfiguration instruction is artificial external input; step S2 is performed if a reconfiguration initial value instruction is received, step S4 is performed if a reconfiguration initial value instruction is not received,
s2, waiting for a configuration instruction;
s3, determining which one of the initial value setting, the initial value updating and the configuration quitting is the configuration instruction;
if the command is the initial value setting command, reading the intensity and angle of the magnetic force currently detected by the magnetic sensor 4 and storing the intensity and angle as initial values, and then performing step S2;
if the command is the command for updating the initial value, the intensity and the angle of the magnetic force currently detected by the magnetic sensor 4 are read and stored as the initial values, the stored initial values are replaced in the process, and then the step S2 is performed;
if the command is an exit configuration command, go to step S4;
s4, acquiring the intensity and the angle of the magnetic force currently detected by the magnetic sensor 4;
s5, comparing whether the current magnetic strength and angle are the same as the initial values, if so, entering a normal working mode; if the difference is not the case 1 is opened abnormally, the state is marked as abnormal, and the encryption and decryption work is stopped.
When the magnetic force sensor is illegally disassembled, the position of the permanent magnet 3 relative to the magnetic force sensor 4 is inevitably changed, so that the strength and the angle of the magnetic force are changed; when the intensity and the angle of the magnetic force are different from the initial values, the abnormal state is judged, and the data protection operation can be carried out immediately, so that the defect that other monitoring methods for opening the shell 1 are easy to crack is overcome.
When the shell 1 is normally opened and closed, the initial value can be reset, and the equipment is prevented from entering an abnormal state by mistake.
As shown in fig. 2, the lock-less switch monitoring system includes a battery 5, a volatile memory 6(ram), and a lock-less switch 7. The battery 5 is a disposable long-acting battery 5, which can keep sufficient circuits for many years, and when the encryption device 2 runs, the circuits of the battery 5 are not consumed, so that the long-acting performance of the battery 5 is further ensured. The volatile memory 6 has the characteristics of high data reading and writing speed and power failure data loss.
The non-lock switch 7 is arranged on the encryption device 2 and is positioned in the shell 1 when the shell 1 is buckled. When the housing 1 is closed, the push button 71 abuts on the non-lock switch 7, and the push button 71 is pressed. In particular, a cylinder is provided inside the housing 1, wherein the cylinder abuts against the key 71. The battery 5 and the volatile memory 6 are connected through the non-lock switch 7, when the shell 1 is opened, the key 71 rebounds, the non-lock switch 7 disconnects the battery 5 and the volatile memory 6, and the volatile memory 6 automatically eliminates data. The key stroke of the key 71 of the non-lock switch 7 is 0.1mm-0.2mm, preferably 0.15mm in the embodiment, and the key stroke is relatively small, so that the connection between the battery 5 and the volatile memory 6 can be released only by slightly prying the shell 1, and the data is protected.
And in the normal working mode, checking whether the data in the volatile memory 6 is intact every first preset time, if the data is incomplete, entering an abnormal state, and stopping encryption and decryption. Wherein the data comprises a key required for encryption and encrypted data to be protected. When the product leaves a factory, the encrypted data is set through a special configuration instruction, when the shell 1 is intact, the stored power supply is normal, the encrypted data in the memory can be kept intact even if the encryption device 2 is in a power-off state, and once the lock-free switch 7 is bounced open after being pressed and eliminated after the shell 1 is opened, the power supply of the volatile memory 6 is disconnected, so that the sensitive data is automatically eliminated, and the function of data protection is achieved.
The non-lock switch 7 can detect whether the shell 1 is opened or not, and the volatile memory 6 automatically eliminates data after the shell is opened; the magnetic force monitoring system can determine whether the shell 1 is abnormally opened or not, if the shell 1 is abnormally opened, the shell is marked as an abnormal state, and the encryption and decryption work is stopped.
Magnetic force monitoring system and no lock switch monitoring system monitor the shell 1 jointly and whether opened, and two kinds of modes protect jointly, just if find one of them answer mode, another kind of mode still plays a role, and dual protection can be solved other uncapping monitoring and cracked problem easily.
It should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.

Claims (9)

1. A shell opening monitoring system is characterized by comprising a magnetic force monitoring system and a lock-free switch monitoring system;
the magnetic force monitoring system comprises:
a permanent magnet (3) provided on the housing (1);
the magnetic sensor (4) is arranged on the encryption equipment (2), and the magnetic sensor (4) is used for detecting the magnetic strength and the angle of the permanent magnet (3);
also comprises the following steps:
whether the initial value needs to be reconfigured;
if the reconfiguration is not needed, detecting whether the current magnetic strength and angle are the same as the initial values, if not, the shell (1) is opened abnormally and is marked as an abnormal state; if the two signals are the same, entering a normal working mode;
if the reconfiguration is needed, the reconfiguration is carried out;
the lock-free switch monitoring system comprises:
a battery (5);
a volatile memory (6);
the unlocking switch (7) is arranged on the encryption equipment (2), when the shell (1) is closed, the unlocking switch abuts against a key (71) of the unlocking switch (7) to enable the key (71) to be pressed down, the battery (5) is connected with the volatile memory (6) through the unlocking switch (7), when the shell (1) is opened, the unlocking switch (7) disconnects the battery (5) from the volatile memory (6), and the volatile memory (6) automatically eliminates data.
2. The system of claim 1, wherein the reconfiguration is determined to be required within a second predetermined time after power-on based on whether a command to reconfigure the initial value is input.
3. The enclosure opening monitoring system of claim 2, wherein the reconfiguration includes a configuration state wait configuration instruction, the configuration instruction including setting an initial value, updating the initial value, exiting the configuration;
setting an initial value comprises reading the intensity and the angle of the magnetic force currently detected by the magnetic sensor (4) and storing the intensity and the angle as initial values;
updating the initial value comprises reading the magnetic strength and the angle currently detected by the magnetic sensor (4) to replace the stored initial value and storing the initial value;
and exiting the configuration after the initial value is set or updated.
4. A housing opening monitoring system according to claim 3 wherein an initial value is required to be set after initial use or abnormal opening.
5. A housing opening monitoring system according to claim 3, characterized in that the initial value needs to be updated after normal opening of the housing (1).
6. The housing opening monitoring system of claim 1,
and in the normal working mode, checking whether the data in the volatile memory (6) is intact every first preset time, and if the data is incomplete, entering an abnormal state and stopping encryption and decryption.
7. Housing opening monitoring system according to claim 1, characterized in that the permanent magnet (3) is fixed to the housing (1) by means of screws.
8. A housing opening monitoring system according to claim 1, characterized in that the stroke of the key (71) of the non-locking switch (7) is 0.1-0.2 mm.
9. The housing opening monitoring system according to claim 1, characterized in that the housing (1) and the encryption device (2) are fixed by screws.
CN202210023775.5A 2022-01-10 2022-01-10 Shell opening monitoring system Pending CN114564765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210023775.5A CN114564765A (en) 2022-01-10 2022-01-10 Shell opening monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210023775.5A CN114564765A (en) 2022-01-10 2022-01-10 Shell opening monitoring system

Publications (1)

Publication Number Publication Date
CN114564765A true CN114564765A (en) 2022-05-31

Family

ID=81711237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210023775.5A Pending CN114564765A (en) 2022-01-10 2022-01-10 Shell opening monitoring system

Country Status (1)

Country Link
CN (1) CN114564765A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI816555B (en) * 2022-09-20 2023-09-21 緯穎科技服務股份有限公司 Electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006059228A (en) * 2004-08-23 2006-03-02 Nec Commun Syst Ltd Storage device and data management system
US20120131680A1 (en) * 2009-07-09 2012-05-24 Tsutomu Baba Detection method for detecting fraud
CN103200291A (en) * 2013-03-05 2013-07-10 惠州Tcl移动通信有限公司 Mobile terminal and detection method realizing inspection of cover opening and closing states
CN214846983U (en) * 2021-03-12 2021-11-23 百富计算机技术(深圳)有限公司 Anti-dismantling POS machine

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006059228A (en) * 2004-08-23 2006-03-02 Nec Commun Syst Ltd Storage device and data management system
US20120131680A1 (en) * 2009-07-09 2012-05-24 Tsutomu Baba Detection method for detecting fraud
CN103200291A (en) * 2013-03-05 2013-07-10 惠州Tcl移动通信有限公司 Mobile terminal and detection method realizing inspection of cover opening and closing states
CN214846983U (en) * 2021-03-12 2021-11-23 百富计算机技术(深圳)有限公司 Anti-dismantling POS machine

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI816555B (en) * 2022-09-20 2023-09-21 緯穎科技服務股份有限公司 Electronic device

Similar Documents

Publication Publication Date Title
KR101051246B1 (en) Consumer abuse detection system and method
EP0892334B1 (en) Cabinet security state detection
US7100210B2 (en) Hood intrusion and loss of AC power detection with automatic time stamp
CN114564765A (en) Shell opening monitoring system
US7733225B2 (en) Intelligent security apparatus for container and mechatronic customs seal, bracket
JP2011188474A (en) Communicating apparatus and equipment logging method
US20110131003A1 (en) Vibration logging in computers
US6489890B1 (en) Security device
JPH11447A (en) Controlling circuit apparatus for playing machine
CN204190886U (en) For the device that the uncovering power-off of Set Top Box is protected
CN101074065B (en) Safety monitor and system for container and against adjacent channel interference
JP2001137516A (en) Game monitoring device
CN101074064B (en) Safety monitor and system for container
US7443660B2 (en) Information processing apparatus in which a storage medium is removably mountable
CN110493295B (en) Data storage medium processing method, server, and storage device
US7020520B2 (en) Defibrillator enclosure system
JP5022063B2 (en) Disaster prevention receiver
CN101464800A (en) Power-on method for computer system
CN220932928U (en) Carbon emission concentration detection alarm device
KR101970706B1 (en) Door lock device for sash, controlling system including the same and controlling method therefor
CN219872460U (en) Virus protection monitoring system
EP3545459B1 (en) Intrusion detections with ambient light sensors and super input/output circuits
CN218276735U (en) Data security device
JP2002229682A (en) Electronic equipment
CN220104191U (en) Intelligent gas flowmeter based on human infrared sensing and shooting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220531

RJ01 Rejection of invention patent application after publication