Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An instruction-based data security protection system

A data security and protection system technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems that have not been seen in public reports, and achieve the effect of preventing equipment design data leakage and protecting data security

Active Publication Date: 2019-04-05
CHINA ACAD OF LAUNCH VEHICLE TECH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In China, the concept of remote security protection of equipment data applied by the present invention has just been put on the agenda, and the technology is still in the pre-research state, and no public reports have been seen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An instruction-based data security protection system
  • An instruction-based data security protection system
  • An instruction-based data security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention is further described below.

[0038] A data security protection system based on instructions. According to the functions and characteristics of the chip where the data resides and its circuit board in the device, different data security protection modes are set, and the conditional self-triggering or command destruction mode is set. The criterion for data destruction conditions is valid After that, the data can be overwritten or block deleted in logical ways, and the data can be quickly and safely protected at the software level, or the high-voltage pulse voltage can be generated by destroying the control circuit and the voltage conversion circuit to break down and burn down or control the blowing up of small pyrotechnics Or complexly destroy the chip and core circuit where the data is located, and irreversibly physically destroy it at the hardware level, so that the data can be quickly and thoroughly protected, and solve the problem of rapidity, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data safety protection system based on instructions comprises an instruction receiving module, an illegal operation sensing module, a power circuit, a destruction control circuit, a voltage conversion circuit, a safety loading circuit, a high-voltage damage circuit and an initiating explosive device circuit. According to the invention, different protection trigger modes are set; quick data logicdestruction is performed based on the instruction; Complete destruction of data storage hardware, data safety protection of thorough destruction of key circuits of the equipment is realized; the rapidity of data remote protection is solved; thoroughness, high reliability and system miniaturization are realized; The contradiction between concealment, micro power consumption and strong adaptabilitysolves the safety problem that the equipment data can be stolen or illegally used, solves the design data leakage risk caused by plagiarism and cracking of the key circuit, can ensure the safe use ofthe equipment, and has a better application and popularization value.

Description

technical field [0001] The invention belongs to the field of electrical and electronic design, and relates to an instruction-based data safety protection system. Background technique [0002] In China, the concept of remote security protection of equipment data applied by the present invention has just been put on the agenda, and the technology is still in a pre-research state, and no public reports have been seen yet. The remote data security protection technology focuses on logic protection, such as hard disk with remote destruction function, remote query, mobile phone prompt and remote destruction function, and the data in the hard disk can be destroyed through a text message. [0003] Data remote security protection technology is developing rapidly abroad. In 2014, the U.S. Defense Advanced Research Projects Agency (DARPA) cooperated with IBM Corporation, Xerox Corporation, Honeywell Aerospace Corporation and SRI International Research Institute to carry out the "Vanishe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/81G06F21/88G06F21/78
CPCG06F21/78G06F21/81G06F21/88
Inventor 曾发荣刚陈玉坤曾贵明梁君罗臻张声艳王健康李海伟冯忠伟
Owner CHINA ACAD OF LAUNCH VEHICLE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products