Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protecting box

A protection box and security technology, applied in computer security devices, circuit security components, internal/peripheral computer component protection, etc., can solve sensitive data information theft and other issues

Active Publication Date: 2008-03-19
PAX COMP TECH SHENZHEN
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiment of the present invention is to provide a security protection box, aiming at solving the problem that sensitive data information of electronic circuit components is stolen through physical means

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protecting box
  • Safety protecting box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0009] The embodiment of the present invention encloses important components on the protected circuit board by arranging a box-shaped circuit board with a thick middle part and a thick outer periphery and circuit wiring on the vulnerable side of the protected circuit board. Once the act of destroying important electronic components or stealing sensitive data and information on the electronic components occurs, the traces on the safety protection box will be disconnected or short-circuited, triggering the relevant circuit to destroy or erase the protected circuit board Protect sensitive data an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is applicable to the field of electronic circuit protection and provides a safety protection box used for surrounding the protected area of a protected circuit wafer and providing protection for the components in the area. The safety protection box consists of a circuit wafer. The circuit wafer has thin middle and thick periphery and thus a box shape is formed. Wiring layers are arranged on the circuit wafer. When suffering from a physical attack, the wiring layers trigger the interrelated circuits to erase or destroy the information on the components in the protected area. The present invention protects the components in the protected area by covering a circuit wafer which is thin in the middle and thick in the periphery, on the protected area of a protected circuit wafer.

Description

Technical field [0001] The invention belongs to the field of electronic circuit protection, and in particular relates to a safety protection box for protecting components on a circuit board from attacks. Background technique [0002] Nowadays, some highly sensitive data information stored in electronic circuits, such as bank information, passwords, registration codes, etc., are often attacked and stolen without authorization. Therefore, the protection of these data is getting higher and higher. Various forms of protection devices and methods continue to appear. Among them, a more effective way to prevent sensitive data from being attacked without authorization is to store in a memory device to encrypt and decrypt sensitive data. Program or data software to prevent sensitive data information from being stolen. However, this method relies on the encryption and decryption keys stored in the memory device, and the encryption and decryption keys also need to be physically and electron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/02G06F21/86
CPCH05K1/0275H05K1/0284H05K5/0208H05K2201/10151H05K1/141G06F21/86H05K2201/047
Inventor 同存良史书宪
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products