Hard disk self-destruction system for preventing computer files from being stolen

A computer and file technology, applied in the protection of internal/peripheral computer components, erasure methods, recording signal processing, etc., can solve problems such as inability to start self-destructing systems, structural security vulnerabilities

Inactive Publication Date: 2021-09-14
郑小元
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The notebook computer and its hard disk self-destruct device in the above-mentioned patent have the following disadvantages: it can be judged whether the hard disk has been stolen according to the state of the screws. There are large security holes in the structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hard disk self-destruction system for preventing computer files from being stolen
  • Hard disk self-destruction system for preventing computer files from being stolen
  • Hard disk self-destruction system for preventing computer files from being stolen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] A hard disk self-destruction system for computer file anti-theft, such as figure 1As shown, it includes a main control center, a mobile terminal, an identification module, a power supply module, a self-destruct module, a feedback module and a tracking module. The main control center is the control core of the self-destruct system, and the main control center is connected to the identification module by communication , the main control center includes a storage module for storing self-destruct program system data; the mobile terminal communicates with the identity recognition module, and the mobile terminal includes but not limited to mobile phones, computers, etc.; the identity recognition module is used to identify the identity of the operator information; the power supply module is electrically connected to the self-destruction module; the self-destruction module is connected to the main control center by communication; the feedback module is respectively connected to ...

Embodiment 2

[0044] A kind of anti-theft hard disk self-destruction system for computer files described in embodiment 1, such as Figure 1-5 As shown, in order to prevent criminals from extracting useful files by repairing the disk; this embodiment makes the following improvements on the basis of Embodiment 1: the self-destruction module also includes a self-destruction structure, and the self-destruction structure includes setting The hard disk body 1 on the inner wall of the body 2 and the fixing seat 4 arranged on the inner wall of one side of the body 2, the top outer wall and the bottom outer wall of the fixing seat 4 are all fixed with an electric push column 5 by bolts, and the switch control end of the electric push column 5 It is electrically connected with the main control center. The extension ends of the two electric push columns 5 are respectively fixed with the second connecting rod 6 and the first connecting rod 3 by bolts. The outer wall on one side is rotationally connecte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hard disk self-destruction system for preventing computer files from being stolen, and relates to the technical field of computer information security, and the problem that a hard disk stealing way is not reliable is solved. The system specifically comprises a main control center, a mobile terminal, an identity recognition module, a power module, a self-destruction module, a feedback module and a tracking module, and is characterized in that the main control center is a control core of the self-destruction system, the main control center is in communication connection with the identity recognition module, and the main control center comprises a storage module used for storing data of a self-destruction program system; and the mobile terminal is in communication connection with the identity recognition module. The time for other people to steal files is shortened through multiple ways, if an operator confirms that the files are stolen and a self-destruction instruction is started, a disk of the self-destruction module is demagnetized in a high-temperature state, and the result sending module sends the starting state of the electromagnetic self-destruction device to the feedback module, so that people can conveniently confirm whether the hard disk is destroyed or not, and the possibility that the hard disk is stolen is reduced.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a hard disk self-destruction system for preventing computer file theft. Background technique [0002] In recent years, many cases of loss of hard disks and computer products that caused leakage of key materials have made people gradually realize the importance of data on hard disks. A survey published by the American Computer Security Research Institute shows that: 67% of enterprises have hardware failures. and the theft of computer products, and the passive loss of computers due to poor management is more common. How to effectively protect the security of key data has become a top priority for computer manufacturers and information security agencies. As a personal portable device, a laptop computer stores important data related to personal life or work in its hard disk. If the computer is lost as a whole, this will give the thief an opportunity to crack and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/80G06F21/88G11B5/024G11B20/00
CPCG06F21/80G06F21/88G11B20/00666G11B5/024
Inventor 郑小元
Owner 郑小元
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products