Key data self-destruction and automatic restoration method and device based on embedded system

An embedded system and key data technology, which is applied to data error detection, electrical digital data processing, and response error generation in the direction of redundancy in computing, and can solve the problem of one-key restoration of unrealized system interface buttons and damage to memory chips Problems such as physical structure, incomplete deletion of data, etc., to achieve the effect of ensuring non-recoverability, guaranteeing no damage, and avoiding hardware changes

Active Publication Date: 2022-03-11
KYLIN CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are problems in the above data destruction methods and restoration methods. First, the key data self-destruction method uses the rm command to delete key data. The problem faced is that the deletion of data is not complete, and the original data can be recovered through technical means; secondly, Although the method of clearing the data disk by physical means of miniature bombs and circuit short circuits is relatively thorough, it also destroys the physical structure of the memory chip and cannot be reused.
For the one-key restore method, it is feasible to restore the system through physical buttons, but in some embedded application environments, users will not specially reserve one-key restore buttons or DIP switches, and cannot restore the system without modifying the existing hardware conditions. To achieve this function on a basic basis, the traditional method is not intuitive enough, and the one-key restoration of the system interface button has not been realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key data self-destruction and automatic restoration method and device based on embedded system
  • Key data self-destruction and automatic restoration method and device based on embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following is attached Figure 1-2 and specific implementation modes The method and device for self-destruction and automatic restoration of key data based on embedded systems proposed by the present invention will be further described in detail. The advantages and features of the present invention will become clearer from the following description. It should be noted that the drawings are in a very simplified form and all use imprecise scales, which are only used to facilitate and clearly assist the purpose of illustrating the embodiments of the present invention. In order to make the objects, features and advantages of the present invention more comprehensible, please refer to the accompanying drawings. It should be noted that the structures, proportions, sizes, etc. shown in the drawings attached to this specification are only used to match the content disclosed in the specification, for those who are familiar with this technology to understand and read, and are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key data self-destruction and automatic restoration method based on an embedded system, comprising the following steps: writing random data to the disk where the key data of the original system is located, destroying the key data, and generating an existing system; judging whether restoration is required Key data, if necessary, proceed to the following steps, if not, end; assign the boot partition of the existing system to the partition where the recovery program is located, restart the existing system to enter the partition where the recovery program is located, and copy the original system image Burn to the partition where the existing system is located. The partition where the existing system is located is separated from the partition where the recovery program is located. The partition where the existing system is located includes the boot partition of the existing system; after the programming is completed, the boot partition of the existing system Reassign to the system to boot the original system. The key data self-destruction method in the method eliminates data completely without destroying the physical structure, and the automatic restoration method does not depend on hardware modification.

Description

technical field [0001] The invention relates to the technical field of embedded systems, in particular to a method and device for self-destruction and automatic restoration of key data based on embedded systems. Background technique [0002] Embedded is widely used in daily life, followed by the gradual improvement of people's requirements for its security performance. As the carrier of embedded system applications, embedded operating system security is also one of the focuses of many researchers. [0003] There are two main methods for self-destruction of key data: the first method is to delete key data through the rm command or other commands; the second method is to physically destroy the disk with key data by binding a miniature bomb , or destroy the disk that stores key data by short-circuiting the memory chip or boosting the voltage. The existing one-key recovery method for embedded systems is based on physical keys or high and low levels of DIP switches to select the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/14G06F8/61G06F8/65
CPCG06F11/1428G06F11/1433G06F8/63G06F8/65
Inventor 邓明良唐峰韩雪
Owner KYLIN CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products