Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal equipment against data theft

A technology of terminal equipment and data, which is applied in the field of information security, can solve problems such as damaged power supply and self-destruct circuit cannot work normally, so as to improve protection performance, reduce the risk of data theft, and reduce the possibility of important data leakage Effect

Active Publication Date: 2020-07-14
NAVY MEDICINE RES INST OF PLA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the terminal equipment is lost, the stealer may destroy the power supply in a targeted manner.
Even if there is a self-destruct circuit in the terminal equipment, the self-destruct circuit will not work properly because there is no power supply

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal equipment against data theft
  • Terminal equipment against data theft
  • Terminal equipment against data theft

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In the prior art, in order to prevent data in the terminal from being stolen, security software such as anti-theft is installed in the terminal, or a complicated system password is set in the terminal. However, the above method can only prevent a stealer from stealing data through the peripheral interface of the terminal. Stealers can physically disassemble the terminal, take out the memory chip and crack it physically, and use special software and other means to steal important data from the memory chip, causing huge losses.

[0021] In the embodiment of the present invention, the self-destruction circuit is powered by a separate backup power supply, and when the self-destruction circuit is triggered, a self-destruction signal is generated. When the self-destruction trigger identification port of the main controller detects a self-destruction signal, it generates a self-destruction control command and sends it to the target chip to control the target chip to perform a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal device with a data interception prevention function comprises a main power supply, a reserve power supply, a self-destruction circuit, a target chip and a main controller, and the main controller is provided with a self-destruction trigger identification port, wherein the main power supply is coupled with the main controller and is used for supplying power to the main controller; the reserve power supply is used for supplying power to the self-destruction circuit when the self-destruction circuit is triggered; the input end of the self-destruction circuit is coupled with the reservepower supply, the output end of the self-destruction circuit is coupled with the self-destruction trigger identification port, and the self-destruction circuit is used for generating a self-destruction signal when triggered and inputting the self-destruction signal to the self-destruction trigger identification port; the main controller is coupled with the target chip and used for generating a self-destruction control instruction when the self-destruction signal is input to the self-destruction trigger identification port and sending the self-destruction control instruction to the target chipso as to control the target chip to execute self-destruction operation. According to the technical scheme, the protective performance of the terminal device can be effectively improved, and the datainterception risk can be reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a terminal device for preventing data theft. Background technique [0002] Today, when information and data are widely used, some important data are usually stored in the memory chip of the terminal device, such as the user's personal privacy data, business secrets, even government agency documents, military industry secrets and other information. If the terminal device is lost or stolen, these important data may be stolen. [0003] In order to prevent the data in the terminal device from being stolen, security software such as anti-theft is installed in the terminal device, or a complicated system password is set in the terminal device. However, the above method can only prevent a stealer from stealing data through the peripheral interface of the terminal device. Stealers can physically disassemble the terminal equipment, take out the memory chip from it and perform physica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78G06F1/30
Inventor 王世锋陈杰张建闫硕安伟马骏方以群
Owner NAVY MEDICINE RES INST OF PLA