Terminal equipment against data theft
A technology of terminal equipment and data, which is applied in the field of information security, can solve problems such as damaged power supply and self-destruct circuit cannot work normally, so as to improve protection performance, reduce the risk of data theft, and reduce the possibility of important data leakage Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In the prior art, in order to prevent data in the terminal from being stolen, security software such as anti-theft is installed in the terminal, or a complicated system password is set in the terminal. However, the above method can only prevent a stealer from stealing data through the peripheral interface of the terminal. Stealers can physically disassemble the terminal, take out the memory chip and crack it physically, and use special software and other means to steal important data from the memory chip, causing huge losses.
[0021] In the embodiment of the present invention, the self-destruction circuit is powered by a separate backup power supply, and when the self-destruction circuit is triggered, a self-destruction signal is generated. When the self-destruction trigger identification port of the main controller detects a self-destruction signal, it generates a self-destruction control command and sends it to the target chip to control the target chip to perform a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


