Self-destroying protection method based on malicious invasion of file system and device thereof

A malicious intrusion and file system technology, applied in computer security devices, internal/peripheral computer component protection, digital data protection, etc., to avoid illegal reading, prevent illegal copying, and improve data security.

Inactive Publication Date: 2014-07-23
LEADER TECH BEIJING DIGITAL TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for some professionals, they may try to bypass the method of connecting the device to the computer, directly disassemble the anti-counterfeiting identification device, take out the memory (such as tf card or nandflash, etc.), and then use a special device (such as card reader, etc.) to read the content of its physical layer to the computer and then crack it, so as to use illegal operations to obtain data with high confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-destroying protection method based on malicious invasion of file system and device thereof
  • Self-destroying protection method based on malicious invasion of file system and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The invention provides a self-destruction protection method based on malicious intrusion of a file system, which includes the following steps:

[0034] When the content of the specified file in the public disk does not match the content of the specific file, the number of malicious intrusions into the hidden disk is accumulated, otherwise the hidden disk and the public disk are opened;

[0035] When the number of malicious intrusions into the hidden disk reaches the upper limit, the file system of the hidden disk is deleted, so that the hidden disk cannot be read.

[0036] Such as figure 1 As shown, the present invention provides a self-destruction protection method based on malicious intrusion of a file system, which specifically includes the following steps:

[0037] S10. The device is initialized.

[0038] S20. Connect the device and the computer, and determine whether a connection is established between the device and the computer.

[0039] If it is determined that the connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a self-destroying protection method based on a malicious invasion of a file system. The method comprises the steps that when the content of a specified file in a common disk is not matched with the content in a specific file, the number of times of the malicious invasion of a hidden disk is accumulated; when the number of times of the malicious invasion of the hidden disk reaches an upper limit, the file system of the hidden disk is deleted, and the content in the hidden disk cannot be read. A device executing the method comprises a file type detection module, a content comparison module, an accumulating module, a comparison module for the number of times and a file system deleting module. The file type detection module is used for detecting the type of the specified file stored in the common disk of equipment, the content comparison module is used for distinguishing whether the content of the specified file is matched with that of the specific file or not, the accumulating module is used for accumulating the number of times of the malicious invasion of the hidden disk, the comparison module for the number of times is used for comparing the accumulated number of times of the malicious invasion of the hidden disk and the upper limit value of the accumulated number of times, and the file system deleting module is used for deleting information in an FAT area of the hidden disk. According to the method and the device, the safety of data in the equipment can be improved, and the data are effectively prevented from being illegally copied.

Description

Technical field [0001] The invention relates to a file self-destruction protection method, in particular to a self-destruction protection method and device based on malicious intrusion of a file system. Background technique [0002] At present, the existing anti-counterfeiting identification devices all have a file system for storing the necessary resources of the device (such as the switch screen, configuration information, etc.) and user data. Because this kind of data is a file with a high level of confidentiality, if these data are copied illegally, it may cause unnecessary losses. Therefore, they are often stored in a hidden area in the anti-counterfeiting identification device. After connecting with the computer, only the correct operation method can be used to open the hidden area to perform related operations on the data. [0003] However, for some professionals, they may try to bypass the method of connecting the device to the computer, and directly disassemble the anti-c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F12/14G06F21/60
CPCG06F21/554G06F21/78
Inventor 姚为唐巧提万宏宇
Owner LEADER TECH BEIJING DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products