Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data security protection device

A protection device and data security technology, applied in the field of information security, can solve the problems of reduced protection reliability, high power consumption of the protection device, insufficient service life, etc., to achieve ultra-low power consumption, ensure high reliability, and improve reliability.

Active Publication Date: 2022-04-29
武汉船舶通信研究所
View PDF22 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These commonly used protective devices generally use batteries to supply power to the controller that performs data destruction actions in the terminal equipment. Once the device is disassembled illegally, the controller cannot normally receive the power provided by the battery after the device is disassembled, which will lead to the termination of the destruction process; , the battery power gradually decays during long-term use. If the battery power of the controller is exhausted during the process of data destruction, the destruction process will also be suspended; the above situations will cause the controller to fail to complete data destruction normally. As a result, the reliability of the protection is seriously reduced; in addition, the protection device also has the problems of relatively high power consumption and insufficient service life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security protection device
  • A data security protection device
  • A data security protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0035] figure 1 For a schematic diagram of the composition and structure of a data security protection device provided in this embodiment, see figure 1 , the device includes an energy storage battery, a motion detection module, a power supply module and a microprocessor;

[0036] Wherein, the power output end of the energy storage battery is respectively connected to the action detection modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data safety protection device, which includes an energy storage battery, an action detection module, a power supply module and a microprocessor; the power output end of the energy storage battery is connected to the action detection module and the power supply module; When the external trigger acts, the internal switch is controlled to close, and the destruction signal and trigger signal are generated; the power supply module converts the electric energy provided by the energy storage battery into the stable working voltage required by the microprocessor after receiving the trigger signal; the microprocessor receives power Then generate a power supply self-locking command, control the power supply module to lock the current power supply state, and ensure that it continues to supply power to the microprocessor after the internal switch fails; execute the local data destruction action according to the destruction signal generated by the action detection module; The battery powers the microprocessor to execute the destruction action, and cooperates with the self-locking function of the power supply module to solve the problem of insufficient battery power at critical moments and ensure the safety protection capability of the device with high reliability and ultra-low power consumption.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically relates to a data security protection device, which is mainly used in application scenarios with special requirements for data protection. Background technique [0002] In the field of information security, data protection is extremely important. At present, there are many physical security protection methods at the equipment level. A dedicated protective chip with high precision. These commonly used protective devices generally use batteries to power the controller that performs data destruction actions in the terminal equipment. In case of illegal disassembly, the controller cannot normally receive the power provided by the battery after the device is disassembled, which will cause the destruction process to be suspended; in addition , the battery power gradually decays during long-term use. If the battery power of the controller is exhausted during the proce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78H01M10/44
CPCG06F21/78H01M10/44Y02E60/10
Inventor 张步张力吴志兵周勋向守坤林飞余和舟刘莹余品朱明詹鹏刘立波张鸿禹程川黄钟向雯
Owner 武汉船舶通信研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products