Check patentability & draft patents in minutes with Patsnap Eureka AI!

Sensitive data protection system

A technology for sensitive data and protection systems, applied in the fields of digital data protection, electrical digital data processing, instruments, etc., can solve problems such as undetectable, achieve good security, and overcome the defects of drilling and stealing sensitive data.

Inactive Publication Date: 2012-07-04
深圳市莱克科技有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can effectively prevent data theft by drilling holes in a certain procedure. However, when the drilling holes are smaller than the distance between the lines, the detection circuit cannot detect the drilling holes, and the self-destruct circuit will not be triggered to destroy the data by itself, and the sensitive data will be destroyed. Stealing and failing to achieve the purpose of its effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data protection system
  • Sensitive data protection system
  • Sensitive data protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Below in conjunction with accompanying drawing, the present invention will be further described.

[0023] The sensitive data protection system of the present invention includes:

[0024] Protective shell: used to install sensitive data storage modules, the protective shell itself can convert the mechanical deformation of the protective shell into corresponding electrical signals;

[0025] Signal monitoring module: used to monitor the electrical signal of the protective shell in real time and convert the signal into a digital signal;

[0026] Controller: It is used to receive the digital signal of the signal detection module, compare it with the pre-recorded standard value, and judge whether there is any abnormality. After the abnormality is found, the controller will issue a command to clear the sensitive data;

[0027] Power supply module: used to supply power to the data protection system, which is powered by battery and / or external power supply. When there is extern...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive data protection system. The sensitive data protection system comprises a protection shell, a signal monitoring module, a controller, a power module and an interface module, wherein the protection shell can convert mechanical deformation of the protection shell into corresponding electric signals by self. When no external force is applied, the protection shell can generate an initial electric signal value received and recorded by a controller. When the shell is damaged by mechanical deformation, the electric signal generated by the shell is changed, and the controller detects a change value and controls a storage module to remove sensitive data. Compared with the prior art, the sensitive data protection system has the characteristics that the security detection is carried out by utilizing the electric signal generated by any mechanical deformation of the shell, the defect that gaps among densely-distributed monitoring lines are utilized for drilling to steal the sensitive data in the prior art can be overcome, so that the data security is better.

Description

technical field [0001] The invention relates to a sensitive data protection system. Background technique [0002] The security protection of sensitive data in computer systems has always been a research topic that has attracted much attention. For the sensitive data stored in the computer system, it is usually protected based on the management method of software, and it is determined whether to allow the protected sensitive data to be read by setting the authority of the visitor. [0003] The software-based management method protects sensitive data, which can prevent all unauthorized users from reading sensitive data in form. However, other people can still use the method of line monitoring to obtain sensitive data, and its security cannot be guaranteed. Although some people install and store protection management software and sensitive data on the same chip to prevent others from illegally obtaining sensitive data through line monitoring, the cost is too high, and it cann...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/60
Inventor 肖厅钱浩
Owner 深圳市莱克科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More