CN202189368U - Secret loss preventing notebook computer - Google Patents

Secret loss preventing notebook computer Download PDF

Info

Publication number
CN202189368U
CN202189368U CN201120327698XU CN201120327698U CN202189368U CN 202189368 U CN202189368 U CN 202189368U CN 201120327698X U CN201120327698X U CN 201120327698XU CN 201120327698 U CN201120327698 U CN 201120327698U CN 202189368 U CN202189368 U CN 202189368U
Authority
CN
China
Prior art keywords
notebook computer
module
disc
data
giving away
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201120327698XU
Other languages
Chinese (zh)
Inventor
姚学峰
蒋三龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HUNAN GUOAN SIKE COMPUTER SYSTEM CO Ltd
Original Assignee
HUNAN GUOAN SIKE COMPUTER SYSTEM CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUNAN GUOAN SIKE COMPUTER SYSTEM CO Ltd filed Critical HUNAN GUOAN SIKE COMPUTER SYSTEM CO Ltd
Priority to CN201120327698XU priority Critical patent/CN202189368U/en
Application granted granted Critical
Publication of CN202189368U publication Critical patent/CN202189368U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a secret loss preventing notebook computer mainly comprising a daily work disc, an encryption storage disc, an RFID (Radio Frequency Identification) identity authentication module, a remote control destruction control module and a hardware disassembling detection module. A double-hard-disc frame including a daily work disc and an encryption storage disc is adopted for providing functions of encryption storage disc reading and writing authentication, important data encrypting storage, hard disc dissembling and destructing prevention and remote control destructing for a user. Even if the notebook computer loses, important data in the encryption storage disc can be destructed by the remote control mode. Simultaneously, data in the hard disc can be destructed by adopting the mode of the destruction of a solid state storage medium FLASH hard disc, so that the irretrievability of electronic data after being destructed can be ensured.

Description

The anti-notebook computer of giving away secrets
Technical field
The present invention relates to the notebook-computer system that a kind of user's of preventing sensitive data leaks, refer to a kind of notebook-computer system of encrypting the storage solid state hard disc and destroying control device based on the WCDMA network remote that has especially.
Background technology
Along with the development of VLSI (very large scale integrated circuits), the portability degree of notebook computer is increasingly high, and its popularity of in people's live and work, using is also increasingly high.But notebook computer is portable, also means naturally to be prone to lose.The survey showed that for of american computer safety research institute (Computer Security Institute) announcement; Only be scope nearly weekly 12 on airport, the whole America; 000 notebook computer is stolen; The stolen incident of notebook computer once took place in the enterprise in 2009 57%, and had 800,000 notebook computers stolen approximately in the whole world in 2010.Even if professional secret service also is difficult to escape by luck-and U.K. Ministry of Defence admits in 1999 to calendar year 2001, to have lost 67 notebook computers.The stolen relay encephalovirus that become of notebook computer infects the second largest safety issue that the back people are concerned about.It never only is the value of a computer that notebook computer is lost the loss that is caused the back, and the loss that is caused of divulging a secret important, sensitive data of storing in the computer will be difficult to estimate.At present, when strengthening the theft protection of notebook computer own, mainly be to prevent that through following four kinds of modes the significant data of notebook computer from leaking:
1, access rights is set: prevent that through laptop bios password and operating system login password are set the user from illegally checking, copying hard disc data.Current; Some high-grade notebook computers adopt fingerprint identification technology are combined with system login mode; And the patent No. be 200610144861.2 with the patent No. be that two patents of 01142167.3 propose RFID (Radio Frequency Identify Detection) radio frequency identity identifying technology is landed with operating system and combines, with the access rights qualification that realizes that password is outer.
2, use data encryption technology: the significant data to being stored in the notebook computer carries out encryption.Data encrypted only could be recovered under specific decryption software support in theory.
3, based on notebook computer antitheft monitoring and the destruct system of GPS technology with wireless communication technology." a kind of hard disc of computer anti-thefting monitoring and the anti-destruct system of divulging a secret " scheme that the 213rd of China Arms Industry applied for a patent is: gps receiver and wireless transmitter are installed in relating computer.Judge the position of computing machine by gps receiver,, and according to circumstances send by Master Control Center and to destroy instruction, destroying system in case computing machine exceeds the position of setting then sends warning through wireless transmitter to Master Control Center.
4, use the GSM remote control technology: the utility model patent of application number 200920269288 has proposed a kind of " based on the anti-destruct system of giving away secrets of solid state hard disc "; Its design proposal is: the GSM transceiver module is installed in said solid state hard disc and is realized binding one to one with user mobile phone, can send note to destroy the data in the solid state hard disc through user mobile phone.
More than four kinds of modes can prevent to a certain extent that the significant data in the notebook computer from divulging a secret, yet but there is certain deficiency separately in above four kinds of modes:
The laptop bios password can crack through the mode of removing hard disk or BIOS battery, and the operating system password can easily crack through special software.Thereby the access rights that are provided with through above-mentioned dual mode are also unreliable.And fingerprint recognition is comparatively reliable with the protected mode that the RFID authentication techniques combine with the logon operation system; But the notebook computer hard disk is removed and on other computer during with the mode read and write access of subordinate dish, above-mentioned dual mode can not play the safeguard protection effect as people's malice.
Encryption technology and decryption technology are and deposit that any DEA all has certain relativity and ageing.Whether thereby data encryption storage can not prevent definitely that the significant data that possibly cause after notebook computer is lost from leaking, and more can't judgment data leak.
Utilize the GPS technology to realize that notebook computer location realizes that mainly there are two problems in the mode of data protection: the one, itself there is inaccurate problem in civilian GPS, and for those often need user that the notebook computer position moves very inconvenience just.The 2nd, at the non-constant of indoor GPS signal, above-mentioned defencive function is difficult to prove effective.
The GSM network is when being used widely, and it also highlights in the problem that secure context exists.GSM network using network is to user's unilateral authentication system, fixing AES and limited encryption length, thereby utilize GSM network delivery remote control commands to have sizable potential safety hazard.When destroying in the scheme that simultaneously, application number 200920269288 patents are proposed all is that all data in the unique hard disk of system are all destroyed at every turn.Yet user's significant data is a minority part in the practical application, and routine work data such as operating system all are concerning security matters not, may cause user's very big inconvenience after destroying fully.
Summary of the invention
The present invention proposes and encrypt the storage solid state hard disc and based on the design and the implementation of the anti-notebook computer of giving away secrets of the Remote apparatus for destroying of WCDMA network a kind of having.
The said anti-notebook computer of giving away secrets adopts two hard disc archetectures of routine work dish+encryptions memory disc, encrypts storage for the user provides encryption memory disc access registrar function, significant data, prevents that hardware tears that untie-sell is ruined and Remote destruction four big functions open.Even the situation that notebook computer is lost has taken place, also can destroy the significant data of encrypting in the memory disc through the mode of Remote.The mode that solid storage medium FLASH hardware is destroyed is adopted in the destruction of hard disc data in the present invention program simultaneously, thereby can guarantee to destroy the irrecoverable property of back electronic data.
The said anti-notebook computer of giving away secrets comprises notebook computer main body, routine work dish, encryption memory disc, RFID (Radio Frequency Identification) authentication module, Remote destroys control module and hardware is torn detection module open, and wherein the routine work dish links to each other with the notebook computer main part through SATA II interface; The RFID authentication module is between notebook computer main body and encryption memory disc, and the three links to each other through SATA II interface each other; Remote destruction module and hardware are torn detection module open and are all communicated through main control MCU (MIcro Controller Unit) and encryption memory disc.Wherein Remote destruction module links to each other with MCU through SPI (Serial Peripheral Interface) interface; Hardware is torn detection module open and is linked to each other with MCU through data line, and MCU links to each other with the encryption memory disc through GPIO (General Purpose Input Output).
Said notebook computer main body refers to other parts of notebook computer except that hard disk.
Said encryption memory disc mainly comprises hard disk controller, FLASH storage medium module, power module and hard disk SATA II interface; Encrypt the AES that the data of being stored in the memory disc all can carry out 128bit and encrypt, encrypt memory disc and destroy module and hardware according to RFID authentication module, WCDMA Remote and tear the dependent instruction that detection module sends open and make corresponding action.
Said FLASH storage medium module is meant the parallel memory channel of 4 FLASH that 8 NAND FLASH constitute.
Said RFID authentication module adopts the framework of microcontroller chip+RFID read-write special chip to realize, carries out data communication through the SPI interface between RFID read-write special chip and microcontroller chip.
The bonnet of the said anti-notebook computer of giving away secrets is an integral body, and a touch-switch is set between notebook mainboard and bonnet, through this switch main control MCU I/O pin is connected with GND on the mainboard.Under the normal condition, this I/O is dragged down by mainboard GND, and this device is destroyed when bonnet is removed by malice, and in a single day MCU detects the FLASH hardware of promptly controlling in the encryption disc after this variation and destroy.
Said notebook computer is provided with the WCDMA module, and the WCDMA module is communicated by letter with main control MCU through spi bus.
Said notebook computer adopts inversion boosting chip TPS61170 that the 5V voltage that the hard disc of computer slot provides is risen to 20V; The pin that enables with TPS61170 is connected on the I/O who encrypts disk controller simultaneously; Thereby utilize the output break-make of encrypting disk controller control TPS61170, utilize TPS61170 to produce the pulse voltage of 20V then; The output terminal of TPS61170 connects the drain electrode of four power field effect pipes, the corresponding FLASH passage of each FET, and the source electrode of each FET connects the I/O of FLASH; The control grid of FET is connected on the I/O who encrypts disk controller; Thereby utilize the break-make of encrypting disk controller control FET, the I/O pin of the 20V impulse voltage flashover FLASH that TPS61170 capable of using produces when the conducting of field effect pipe.
The routine work dish mainly is responsible for installing operating system and various application software, the preservation of non-confidential data, the data transmission of carrying interfaces such as USB interface, CD-ROM drive, LAN.The routine work dish is visible all the time for the user, and all can not destroy the data of being stored on this hard disk when no matter in which way trigger data is destroyed.
Encrypt memory disc and mainly be responsible for storage user's important sensitive data.Encrypting memory disc under the default situations is not discerned by main board for notebook computer; When needs use; Can be through swiping the card in the corresponding region to remove of the locking of RFID authentication module to disk read-write with the key card of notebook computer binding, the user can carry out read-write operation to important sensitive data in this dish then.After read-write was accomplished, the user can should be coiled the nonrecognition state that places again through the RFID key card, thereby can guarantee safety of user data.Simultaneously, all deposit data in this dish in all can carry out 128 AES and encrypt, if thereby through the RFID authentication, also can only obtain a string skimble-skamble mess code even obtain data by force.
For the notebook computer that reply possibly occur is lost or runaway condition, comprised Remote in the said anti-notebook computer of giving away secrets and destroyed control module.This module realizes binding through WCDMA network and user mobile phone; When occurring that notebook computer is lost or during out-of-control condition, destroy circuit module data are thoroughly destroyed thereby the user can start the FLASH that encrypts in the memory disc through sending short message by mobile phone or the mode of squeezing into phone.After data destroying was accomplished, Remote is destroyed control module also can beam back user mobile phone with the form of note with the performance level of data destroying.Simultaneously, the position that the positioning service that Remote is destroyed control module WCDMA Virtual network operator also capable of using to be provided confirms to lose notebook computer, and form that can note beams back user mobile phone, to make things convenient for user's finding lost notebook computer as early as possible.
For preventing that the malice of notebook computer is removed, comprised a hardware in the said anti-notebook computer of giving away secrets and torn detection module open.In case hardware is torn detection module open and is detected the said anti-notebook computer bonnet of giving away secrets and tear open, promptly can start the FLASH that encrypts in the memory disc and destroy circuit.And when daily maintenance need be torn notebook computer open, can pass through to bind mobile phone to send this function of instruction time-out, after accomplishing, maintenance also can open this function again through the mobile phone instruction.
System's major function process flow diagram of the anti-notebook computer of giving away secrets is as shown in Figure 2.
1, Remote is destroyed functional sequence
After the anti-notebook computer start of giving away secrets, Remote destruction functional module will power on and send a note indication computer to the user mobile phone of binding and start shooting.If computer is the people's start that maybe can be trusted by the user, then need not any operation, otherwise can judge that promptly notebook computer is in runaway condition, there is the danger of divulging a secret.In case confirm out of controlly, the user can be through sending note or squeezing into phone and destroy instruction to send to the anti-notes computer of giving away secrets.Remote in the anti-notebook computer of giving away secrets is destroyed functional module and is in a single day received the destruction instruction, then carries out the data destroying process of encrypting in the memory disc immediately.After the data destroying success, Remote is destroyed control module will send the affirmation information that destruction is successful to user mobile phone; In case destroy failure, Remote destruction control module will be sent one to user mobile phone and destroyed the indication information of failure and continue execution destruction process, up to destroying successfully.
2, encrypt memory disc access registrar functional sequence
After the anti-notebook computer start of giving away secrets, will at first be started the operating system by daily system disk, this moment, the anti-notebook computer of giving away secrets can not be discerned the encryption memory disc.When the user need carry out the processing of confidential data, must use the RFID key card to swipe the card in the specific region of notebook computer to remove to encrypting the read-write locking of memory disc, notebook computer will recognize the encryption memory disc.The user accomplishes and can use after the processing of confidential data the RFID key card to swipe the card recovering encrypting the read-write locking of memory disc again, and encrypt memory disc and will be in not distinguishable state once more this moment.
3, anti-hardware is torn untie-sell open and is ruined functional sequence
After the anti-notebook computer start of giving away secrets, hardware is torn detection module open and will be worked on power, and is in detected state always.When if the user need tear notebook computer open because of maintenance, can at first send instruction note time-out hardware and tear measuring ability open to notebook computer, can also recover hardware through transmission instruction note after being used to complete and tear measuring ability open.Under the situation of not receiving the user instruction note, be touched in case detect the switchgear that links to each other with the notebook computer bonnet, then can judge has the people just attempting to tear open notebook computer this moment, thereby will directly start the data destroying process of encrypting in the memory disc.After accomplishing, will send data destroying the affirmation information of a destroy state to user mobile phone.
Compare with similar design, the advantage that the present invention has has following 4 points:
1) the invention provides two hard disc archetectures of a kind of routine work dish+encryption memory disc; Adopt RFID (Radio Frequency Identification) hardware access mandate and AES (Advanced Encryption Standard) data encryption principle and encrypt memory disc; Rather than the limiting access measure of initial stage such as setting operation system or BIOS password, prevent that the unauthorized access ability is strong.
2) be different from halfway data destroying modes such as deletion, format, data destroying provided by the present invention adopts FLASH hardware to destroy mode, realizes completely, expendable data destroying.
3) by means of the WCDMA cell phone network, the user can implement Remote to the notebook computer of losing and destroy.After destroy accomplishing, the user can receive the affirmation information that data destroying that notebook computer beams back is whether successful.By means of the WCDMA cell phone network, remote destroying can not receive the restriction of distance, but also can learn the position of losing notebook.Simultaneously, utilize WCDMA network delivery remote control commands to eliminate the potential safety hazard of utilizing the GSM network to exist.
4) for preventing the malice of notebook computer and encryption memory disc is torn open, comprised a hardware among the present invention to tear the measuring ability module open, can protect effectively and encrypt the important sensitive data of being stored in the memory disc.
Description of drawings
The anti-notebook computer of giving away secrets of Fig. 1 is formed structural drawing;
The anti-notebook system functional flow diagram of giving away secrets of Fig. 2;
Fig. 3 encrypts memory disc and forms structured flowchart;
Fig. 4 RFID authentication module structured flowchart;
Fig. 5 notebook computer is torn the testing circuit workflow diagram open;
Fig. 6 hardware is torn the detection module circuit diagram open
Fig. 7 Remote is destroyed the modular structure block diagram
Fig. 8 FLASH chip circuit figure
Fig. 9 TPS61170 carries out the circuit diagram of inversion boosting.
Embodiment
Shown in accompanying drawing 1, the said anti-notebook computer of giving away secrets mainly comprises notebook computer main body, routine work dish, encryption memory disc, RFID authentication module, Remote destroys control module and hardware is torn detection module open.
The routine work dish mainly is responsible for installing operating system and various application software, the preservation of non-confidential data, the data transmission of carrying interfaces such as USB, CD-ROM drive, LAN.The routine work dish is visible all the time for the user, and all can not destroy the data of being stored on this hard disk when no matter in which way trigger data is destroyed.In the present invention program, the routine work dish is connected with the notebook computer main body through the SATAII interface, and it can adopt common mechanical hard disk, also can adopt the new type of solid state hard disk.
As shown in Figure 3, said encryption memory disc mainly comprises hard disk controller, FLASH storage medium module, power module and hard disk SATA II interface.(Solid State Drive, the AES that SSD) difference, the data of being stored in the said encryption memory disc all can be carried out 128bit encrypts with traditional solid state hard disc.In addition, said encryption memory disc also can be destroyed module and hardware according to RFID authentication module, WCDMA Remote and tears the dependent instruction that detection module sends open and make corresponding action.Wherein the WCDMA Remote is destroyed module and is linked to each other with main control MCU (Micro Controller Unit) through SPI (Serial Peripheral Interface) interface, and hardware is torn detection module open and passed through self defined interface and link to each other with main control MCU.Carry out communicating by letter of steering order through GPIO (General Purpose Input Output) interface between main control MCU and the hard disk controller.
Wherein hard disk controller is for encrypting the control center of memory disc, and it mainly serves as the intermediary that is connected of notebook computer and storage medium FLASH.When carrying out when mutual with FLASH, hard disk controller mainly serves as the effect of FLASH read-write controller, the address definition of being responsible for FLASH and management, and the sequential control of FLASH when carrying out data transmission and some the abrasion equilibrium algorithm managements when writing FLASH; When solid state hard disc and computing machine carry out the effect of then serving as the SATA protocol controller when mutual.In the present invention program, adopt PLD Xilinx Spartan XC3S1600E FPGA as the hard disk master controller.FPGA has realized inside one 32 micro-control unit (Micoblaze MCU); Be responsible for the parsing of agreement; The control and the management of the read-write of FLASH chip; (Wear Leveling) and (bad block management) (Bad Block Management) write in cache memory (Cache) implementation of strategies, on average smearing of FLASH.The present invention program focuses on to realizing the related hardware system and the control measures thereof of data security function of keeping secret; And in the above-mentioned hard disk controller about protocol analysis, on average smearing the mechanism of writing, bad block management mechanism etc. and prior art realizes that thinking is identical, so repeat no more at this.
Said storage medium module is meant the parallel memory channel of 4 FLASH that 8 NAND FLASH constitute.NAND FLASH promptly selects FLASH chip commonly used on the market for use, so repeat no more at this.
As shown in Figure 4, the present invention places one-level RFID authentication module between the hard disk controller of encrypting memory disc and notebook computer main body, link to each other through SATA II interface between the three.The RFID authentication module adopts the framework of microcontroller chip+RFID read-write special chip to realize, the microcontroller chip inside programming realized SATA protocol analysis, AES data encryption and and RFID read-write special chip between data communication.Carry out data communication through the SPI interface between RFID read-write special chip and microcontroller chip.After the notebook computer start, the microcontroller chip in the RFID authentication module at first can break off hard disk controller communicates by letter with the intersubjective SATA of notebook computer, thereby makes the encryption memory disc be in not distinguishable state.When the user correctly uses the key card that matches one by one with the anti-notebook computer of giving away secrets to swipe the card; RFID read-write special chip transmits unlock command to microcontroller chip; Microcontroller chip will recover hard disk controller and communicate by letter with the intersubjective SATA of notebook computer then, encrypt memory disc and will be in distinguishable state thereby make.Be provided with one-level AES data encryption module in the microcontroller chip specially, behind the intersubjective SATA communication recovery of hard disk controller and notebook computer, all get into the data of encrypting memory disc through microcontroller chip all can advance 128 AES data encryption.If there is not the RFID Personal Unlocking Key, also be to obtain wherein related information even obtained data by force.Can use the RFID key card will encrypt memory disc after access is accomplished and place not distinguishable state again.In addition, when shutting down at every turn, encrypt memory disc and will be in not distinguishable state automatically.
For preventing that malice dismounting notebook computer to steal the wherein behavior of sensitive information, having designed hardware and having torn detection module open among the present invention.The bonnet of the said anti-notebook computer of giving away secrets is an integral body; One touch-switch is set between notebook mainboard and bonnet; Through this switch main control MCU I/O pin is connected with GND on the mainboard, under the normal condition, this I/O is dragged down by mainboard GND; This device is destroyed when bonnet is removed by malice, and in a single day MCU detects the FLASH hardware of promptly controlling in the encryption disc after this variation and destroy.Even taking place in the destruction process, power down also can when power on next time, continue to destroy, up to destroying successfully.When if the user need tear notebook computer open because of maintenance, can at first send note instruction time-out hardware and tear measuring ability open; Also can reply hardware after the completion and tear measuring ability open through the note instruction.Concrete judgement flow process is as shown in Figure 5.
After the anti-notebook computer start of giving away secrets, hardware is torn detection module open and will be worked on power, and is in detected state always.If receive the pause function instruction note that the user sends, hardware is torn detection module open with break-off.Under the situation of not receiving the user instruction note, be touched in case detect the switchgear that links to each other with the notebook computer bonnet, then can judge has the people just attempting to tear open notebook computer this moment, thereby will directly start the data destroying process of encrypting in the memory disc.After accomplishing, will send data destroying the affirmation information of a destroy state to user mobile phone.
Tear the plug measuring ability open for the realization notebook, select for use the track to track comparer to realize this function in the design.Specifically as shown in Figure 6.
As shown in Figure 6, under the normal condition, because the pull-up resistor of the inverting input of track to track comparer is to draw on weak, it has carried out single-point with mainboard ground again and has been connected simultaneously, thereby it is in logic low state always.And in-phase input end maintains the 3V level under two divider resistance effects, thus in-phase end voltage VP greater than end of oppisite phase voltage VN, comparer is output as logic high.But when the notebook computer bonnet is torn open; The effect that drags down owing to the mainboard ground that no longer exists single-point to connect; Inverting input voltage VN saltus step is a logic high, thereby makes the 3V level of end of oppisite phase voltage 3.3V greater than in-phase end, thereby output hopping is a logic low.Output terminal is connected to the interrupt pin of single-chip microcomputer, and main control MCU can start from dormant state after detecting this look-at-me immediately, and beginning FLASH hardware is destroyed process.Conventional maintenance and need tear open and can at first send note before the notebook computer bonnet and suspend this measuring ability, main control MCU can not done any processing yet when detecting this look-at-me so.
Another characteristic of native system is that Remote is destroyed function; Promptly realize the transmission of steering order with said anti-the communicating by letter of the built-in WCDMA transmission circuit of notebook computer intermodule of giving away secrets through the master control mobile phone; Send the destruction instruction to the SSD controller behind note that main control MCU parsing WCDMA module is received or the telephone order; The SSD controller promptly starts FLASH hardware and destroys process, and it is as shown in Figure 7 specifically to form structure.
As shown in Figure 7, the WCDMA module is communicated by letter with main control MCU through spi bus, with realize main control MCU to its sequential control and command content alternately.In addition, WCDMA module and the extraneous usim card of communicating by letter and also needing dual-mode antenna and Virtual network operator and provided.
Compare with halfway data destroying modes such as available data deletion, formats; Data destroying in this anti-notebook computer of giving away secrets has utilized the fabric of FLASH storage medium; Having adopted the mode of destroying the FLASH hardware configuration, is a kind of mode of data destroying completely.
FLASH physical destroying among the present invention program is based on the electrical specification of NAND FLASH; Because NAND FLASH is as storage unit with three terminal device; Be respectively source electrode, drain and gate; Identical with the principle of work of FET, mainly be to utilize the effect of electric field to control the break-make between source electrode and the drain electrode.Therefore; According to the data destroying standard about disk such as DoD, NAS, and, can adopt the method for the inner integrated FET of overcurrent or over-voltage breakdown FLASH to the said structure characteristic of NAND FLASH; Realize thoroughly destroying electronic hard disc storage data, and reusable not.
According to the databook that NAND FLASH producer provides, the maximum supply voltage that the FLASH storage medium can bear>+5V.But each FLASH storage chip has all been done overvoltage protection at chip internal, so can not FLASH be punctured through the lasting high voltage of voltage pin input to the FLASH chip.Among the present invention through inversion boosting with the PATA interface provide+the 5V boost in voltage produces the high-voltage pulse string of 20V, this high-voltage pulse is connected in series to the I/O pin of NAND FLASH chip, to reach the purpose that punctures FLASH I/O.Preventing giving away secrets, figure is as shown in Figure 8 for notebook data destroying modular structure.
As shown in Figure 8; Adopt inversion boosting chip TPS61170 that the 5V voltage that the hard disc of computer slot provides is risen to 20V among the present invention; The pin that enables with TPS61170 is connected on the I/O who encrypts disk controller simultaneously; Thereby utilize the output break-make of encrypting disk controller control TPS61170, can utilize TPS61170 to produce the pulse voltage of 20V then.The output terminal of TPS61170 connects the drain electrode of four power field effect pipes, the corresponding FLASH passage of each FET, and the source electrode of each FET connects the I/O of FLASH.The control grid of FET then is connected on the I/O who encrypts disk controller; Thereby can utilize the break-make of encrypting disk controller control FET, the I/O pin of the 20V impulse voltage flashover FLASH that TPS61170 capable of using produces when the conducting of field effect pipe.
It is as shown in Figure 9 that wherein TPS61170 carries out the circuit of inversion boosting.
The principle that TPS61170 carries out inversion boosting is following: it mainly relies on the BOOST circuit; Under the less situation of load current; The mutual transformation of electric energy and magnetic energy and the unilateal conduction effect of diode can be relied on, several times of output voltages can be obtained to input voltage.

Claims (5)

1. the anti-notebook computer of giving away secrets; The anti-notebook computer of giving away secrets comprises notebook computer main body, routine work dish, encryption memory disc, RFID (Radio Frequency Identification) authentication module, Remote destroys control module and hardware is torn detection module open; It is characterized in that the routine work dish links to each other with the notebook computer main part through SATA II interface; The RFID authentication module is between notebook computer main body and encryption memory disc, and the three links to each other through SATA II interface each other; Remote destruction module and hardware are torn detection module open and are all communicated through main control MCU (Micro Controller Unit) and encryption memory disc; Wherein Remote destruction module links to each other with MCU through SPI (Serial Peripheral Interface) interface; Hardware is torn detection module open and is linked to each other with MCU through data line, and MCU links to each other with the encryption memory disc through GPIO (General Purpose Input Output).
2. the anti-notebook computer of giving away secrets according to claim 1 is characterized in that, said FLASH storage medium module is meant the parallel memory channel of 4 FLASH that 8 NAND FLASH constitute.
3. the anti-notebook computer of giving away secrets according to claim 1; It is characterized in that; The framework that said RFID authentication module adopts microcontroller chip+RFID read-write special chip carries out data communication through the SPI interface between RFID read-write special chip and microcontroller chip.
4. the anti-notebook computer of giving away secrets according to claim 1; It is characterized in that; The bonnet of the said anti-notebook computer of giving away secrets is an integral body, and a touch-switch is set between notebook mainboard and bonnet, through this switch main control MCU I/O pin is connected with GND on the mainboard.
5. the anti-notebook computer of giving away secrets according to claim 1 is characterized in that said notebook computer is provided with the WCDMA module, and the WCDMA module is communicated by letter with main control MCU through spi bus.
CN201120327698XU 2011-09-02 2011-09-02 Secret loss preventing notebook computer Expired - Fee Related CN202189368U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201120327698XU CN202189368U (en) 2011-09-02 2011-09-02 Secret loss preventing notebook computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201120327698XU CN202189368U (en) 2011-09-02 2011-09-02 Secret loss preventing notebook computer

Publications (1)

Publication Number Publication Date
CN202189368U true CN202189368U (en) 2012-04-11

Family

ID=45920805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201120327698XU Expired - Fee Related CN202189368U (en) 2011-09-02 2011-09-02 Secret loss preventing notebook computer

Country Status (1)

Country Link
CN (1) CN202189368U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289623A (en) * 2011-09-02 2011-12-21 湖南国安思科计算机***有限公司 Anti-leakage laptop
CN111818288A (en) * 2020-07-08 2020-10-23 上海威固信息技术股份有限公司 Multi-format video acquisition and storage system with storage card and video acquisition card separately designed

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289623A (en) * 2011-09-02 2011-12-21 湖南国安思科计算机***有限公司 Anti-leakage laptop
CN111818288A (en) * 2020-07-08 2020-10-23 上海威固信息技术股份有限公司 Multi-format video acquisition and storage system with storage card and video acquisition card separately designed

Similar Documents

Publication Publication Date Title
CN102289623A (en) Anti-leakage laptop
US8112807B2 (en) Systems, methods, and apparatuses for erasing memory on wireless devices
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN102955921A (en) Electronic device and safe starting method
CN102567235B (en) Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk
US20090189765A1 (en) Security apparatus for an electronic device
CN108629206B (en) Secure encryption method, encryption machine and terminal equipment
Müller et al. A systematic assessment of the security of full disk encryption
CN103559435A (en) Method and device for controlling debugging ports of terminal equipment
CN109614799B (en) Information authentication method
CN105631366A (en) Encryption chip and encryption method therefor
CN102855451A (en) Portable computer terminal with safe anti-secret-disclosing function
KR20150034196A (en) Hardware-enforced access protection
CN105426784A (en) Solid state disk data destruction system
CN102438239A (en) Mobile terminal compound information protecting method based on intelligent security card
CN202189368U (en) Secret loss preventing notebook computer
CN103294971A (en) Method for realizing burglary prevention and data protection of hard disk
CN102024115A (en) Computer with user security subsystem
CN201600704U (en) Hard disk remote destruction anti-theft system
CN1312551C (en) Portable secret computer
CN102594827A (en) Double-host security computer based on satellite system
CN102279813A (en) Protecting method of system inside encryption card
CN104239822A (en) Computer and control method thereof
US9262619B2 (en) Computer system and method for protecting data from external threats
JP5160940B2 (en) Hard disk drive

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Hunan Runcore Innovation Technology Co., Ltd.

Assignor: Hunan Guoan Sike Computer System Co., Ltd.

Contract record no.: 2015430000116

Denomination of utility model: Anti-leakage laptop

Granted publication date: 20120411

License type: Exclusive License

Record date: 20150723

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120411

Termination date: 20180902

CF01 Termination of patent right due to non-payment of annual fee