Data security protection device

A protection device and data security technology, applied in the field of information security, can solve the problems of high power consumption of the protection device, reduced protection reliability, insufficient service life, etc. Effect

Active Publication Date: 2021-03-05
武汉船舶通信研究所
View PDF22 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These commonly used protective devices generally use batteries to supply power to the controller that performs data destruction actions in the terminal equipment. Once the device is disassembled illegally, the controller cannot normally receive the power provided by the battery after the device is disassembled, which will lead to the termination of the destruction process; , the battery power gradually decays during long-term

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection device
  • Data security protection device
  • Data security protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0035] figure 1 For a schematic diagram of the composition and structure of a data security protection device provided in this embodiment, see figure 1 , the device includes an energy storage battery, a motion detection module, a power supply module and a microprocessor;

[0036] Wherein, the power output end of the energy storage battery is respectively connected to the action detection modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data safety protection device which comprises an energy storage battery, an action detection module, a power supply module and a microprocessor. The electric energy output end of the energy storage battery is connected with the action detection module and the power supply module; the action detection module is used for controlling an internal switch to be closed when an external trigger action is detected, and generating a destruction signal and a trigger signal; the power supply module converts electric energy provided by the energy storage battery into stable working voltage required by the microprocessor after receiving the trigger signal; the microprocessor generates a power supply self-locking instruction after being powered on, and controls the power supplymodule to lock the current power supply state to ensure that the power supply module continuously supplies power to the microprocessor after the internal switch fails; a local data destruction actionis executed according to a destruction signal generated by the action detection module. The battery supplies power to the microprocessor to execute the destroying action in emergency, the self-lockingfunction of the power supply module is matched, the problem that the electric quantity of the battery is insufficient at the key moment is solved, and the high-reliability and ultra-low-power-consumption safety protection capacity of equipment is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically relates to a data security protection device, which is mainly used in application scenarios with special requirements for data protection. Background technique [0002] In the field of information security, data protection is extremely important. At present, there are many physical security protection methods at the equipment level. A dedicated protective chip with high precision. These commonly used protective devices generally use batteries to power the controller that performs data destruction actions in the terminal equipment. In case of illegal disassembly, the controller cannot normally receive the power provided by the battery after the device is disassembled, which will cause the destruction process to be suspended; in addition , the battery power gradually decays during long-term use. If the battery power of the controller is exhausted during the proce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78H01M10/44
CPCG06F21/78H01M10/44Y02E60/10
Inventor 张步张力吴志兵周勋向守坤林飞余和舟刘莹余品朱明詹鹏刘立波张鸿禹程川黄钟向雯
Owner 武汉船舶通信研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products