CN116226944A - Encrypted data memory, anti-disassembly detection structure, method and equipment - Google Patents
Encrypted data memory, anti-disassembly detection structure, method and equipment Download PDFInfo
- Publication number
- CN116226944A CN116226944A CN202310449677.2A CN202310449677A CN116226944A CN 116226944 A CN116226944 A CN 116226944A CN 202310449677 A CN202310449677 A CN 202310449677A CN 116226944 A CN116226944 A CN 116226944A
- Authority
- CN
- China
- Prior art keywords
- periodic signal
- preset
- circuit
- control unit
- linear network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides an encrypted data memory, a tamper detection structure, a tamper detection method and tamper detection equipment. Through setting up linear network circuit, little control unit and self-destruction circuit in the protective housing to with the installation anchor point electric connection on linear network circuit and the protective housing, once the protective housing is impaired, linear network circuit and the electric connection of installation anchor point just can change, and then make the casing signal change. Since the target periodic signal is generated based on the housing signal and the preset periodic signal, the target periodic signal correspondence will change as long as the housing signal changes. Once the target periodic signal changes, the micro control unit can judge that the protective shell is damaged, and then the self-destruction circuit is controlled to destroy the encrypted data memory. Even if the protective shell is opened, the encrypted data memory is destroyed and cannot be used, so that the anti-disassembly detection capability of the memory is effectively improved, and the safety of data in the memory is ensured.
Description
Technical Field
The present invention relates to the field of tamper detection technologies, and in particular, to an encrypted data storage, a tamper detection structure, a tamper detection method, and a tamper detection device.
Background
The existing anti-disassembly device is internally provided with a travel switch, the travel switch is in a pressed state by utilizing a protective shell, and a processor arranged in the anti-disassembly device can start a corresponding anti-disassembly protection function according to the state of the travel switch.
This tamper-evident principle has the drawback of: if the destroyer bonds and fixes the travel switch by glue after locally destroying the shell of the anti-dismantling device, and then dismantles the rest shell, the switch state cannot be changed because the travel switch cannot be released, so that the processor cannot start the protection function, and the anti-dismantling detection function cannot be effectively realized.
Therefore, how to improve the anti-disassembly detection capability is a technical problem to be solved at present.
Disclosure of Invention
The embodiment of the invention solves the technical problems that the existing memory is easy to be broken by physical means and the corresponding anti-disassembly detection capability is not high by providing an encryption data memory, an anti-disassembly detection structure, an anti-disassembly detection method and anti-disassembly detection equipment.
In a first aspect, the present invention provides a tamper detection structure applied to an encrypted data storage, the tamper detection structure including:
the protection shell is provided with a plurality of installation anchor points;
the linear network circuit is arranged in the protective shell and is electrically connected with the installation anchor point, and the linear network circuit is used for generating a shell signal according to the electrical connection between the linear network circuit and the installation anchor point;
the micro control unit is arranged in the protective shell and is used for generating a preset periodic signal and sending the preset periodic signal to the linear network circuit;
the self-destruction circuit is arranged in the protective shell and is electrically connected with the micro control unit;
the linear network circuit is further configured to: generating a target periodic signal based on the housing signal and the preset periodic signal;
the micro control unit is further configured to: based on the target periodic signal and the preset periodic signal, judging whether the protective shell is complete or not; if not, the self-destruction circuit is controlled to destroy the encrypted data memory.
Optionally, the tamper detection structure further includes:
the input end of the amplifying circuit is electrically connected with the micro control unit, the output end of the amplifying circuit is electrically connected with the linear network circuit, and the amplifying circuit is used for processing the preset periodic signal so that the linear network circuit receives the processed preset periodic signal;
the input end of the conditioning circuit is electrically connected with the linear network circuit, the output end of the conditioning circuit is electrically connected with the micro-control unit, and the conditioning circuit is used for processing the target periodic signal so that the micro-control unit can receive the processed target periodic signal.
Optionally, the tamper detection structure further includes:
and the backup power supply is used for providing electric energy for the linear network circuit, the micro control unit and the self-destruction circuit.
Optionally, the micro control unit is specifically configured to: when the fact that the preset relation between the target periodic signal and the preset periodic signal is not met is detected, judging that the protective shell is damaged, and controlling the self-destruction circuit to destroy the encrypted data memory;
and when the fact that the preset relation between the target periodic signal and the preset periodic signal is met is detected, judging that the protective shell is complete, and continuing to generate the preset periodic signal.
Optionally, the micro control unit is specifically configured to determine that the target periodic signal and the preset periodic signal do not satisfy the preset relationship when any one or more of the following conditions are detected:
the difference between the amplitude characteristic of the target periodic signal and the phase amplitude characteristic of the preset periodic signal is larger than a first preset threshold value;
the difference between the frequency characteristic of the target periodic signal and the frequency characteristic of the preset periodic signal is larger than a second preset threshold value;
the difference between the phase characteristic of the target periodic signal and the phase characteristic of the preset periodic signal is greater than a third preset threshold.
Optionally, the micro control unit is further configured to: and when the protection shell is judged to be damaged, erasing the target codes in the preset storage unit of the micro control unit.
In a second aspect, the present invention provides a tamper detection method applied to any one of the tamper detection structures in the first aspect, where the method includes: generating a preset periodic signal and transmitting the preset periodic signal to the linear network circuit; based on the target periodic signal and the preset periodic signal, judging whether the protective shell is complete or not; if not, the self-destruction circuit is controlled to destroy the encrypted data memory; the target periodic signal is obtained by processing a shell signal and the preset periodic signal by the linear network circuit; the housing signal is generated according to an electrical connection of the linear network circuit and the installation anchor.
Optionally, the determining whether the protective shell is complete based on the target periodic signal and the preset periodic signal includes: when the fact that the preset relation between the target periodic signal and the preset periodic signal is not met is detected, judging that the protective shell is damaged; otherwise, judging that the protective shell is complete.
In a third aspect, the present invention provides an anti-tamper detection device, according to an embodiment of the present invention, including a memory, a processor, and code stored on the memory and executable on the processor, the processor implementing any of the embodiments of the second aspect when executing the code.
In a fourth aspect, according to an embodiment of the present invention, an encrypted data storage device is provided, including any one of the tamper-proof detecting structures in the first aspect, and a storage body electrically connected to the self-destruction circuit.
One or more technical solutions provided in the embodiments of the present invention at least have the following technical effects or advantages:
firstly, the linear network circuit, the micro control unit and the self-destruction circuit are all arranged in the protective shell, the linear network circuit is electrically connected with the installation anchor point on the protective shell, once the protective shell is damaged, the electrical connection between the linear network circuit and the installation anchor point is changed, and then the shell signal is changed. Then, since the target periodic signal is generated based on the housing signal and the preset periodic signal, the target periodic signal correspondence is changed whenever the housing signal is changed. Because the micro-control unit can judge whether the protective housing is complete based on the target periodic signal and the preset periodic signal, once the target periodic signal changes, the micro-control unit can judge that the protective housing is damaged, and then the self-destruction circuit is controlled to destroy the encrypted data memory. And then just can destroy the encryption data memory by the first time that the protective housing was destroyed, even the protective housing is opened, encryption data memory just destroyed and can't be used, has effectively improved the tamper-proof detection ability of memory, has ensured the safety of data in the memory.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a tamper evident structure according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a tamper detection method according to an embodiment of the present invention;
fig. 3 is a schematic view of a tamper detection device according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention solves the technical problems that the existing memory is easy to be broken by physical means and the corresponding anti-disassembly detection capability is not high by providing an encryption data memory, an anti-disassembly detection structure, an anti-disassembly detection method and anti-disassembly detection equipment.
The technical scheme provided by the embodiment of the invention aims to solve the technical problems, and the overall thought is as follows:
firstly, a linear network circuit, a micro control unit, an encryption data memory and a self-destruction circuit are arranged in a protective shell so as to protect the electronic elements, an installation anchor point on the protective shell is electrically connected with the linear network circuit, and once the protective shell is damaged, the electrical connection between the linear network circuit and the installation anchor point is changed, so that a shell signal is changed. As long as the shell signal changes, the target periodic signal correspondingly changes, and the micro control unit can judge that the protective shell is damaged, so as to control the self-destruction circuit to destroy the encrypted data memory.
In order to better understand the above technical solutions, the following detailed description will refer to the accompanying drawings and specific embodiments.
First, the term "and/or" appearing herein is merely an association relationship describing associated objects, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be capable of operation in sequences other than those illustrated or otherwise described.
In a first aspect, the present invention provides a tamper detection structure, which can be applied to an encrypted data storage device, and is used for detecting whether the encrypted data storage device is disassembled or not. Of course, the tamper detection structure can also be applied to the anti-theft field, for example, for detecting whether the safe is illegally opened, and then sending out an alarm signal when detecting that the safe is illegally opened.
Referring to fig. 1, the tamper detection structure includes: a protective housing 100, a linear network circuit 101, a micro control unit 102 and a self-destructing circuit 103.
Wherein, the protective case 100 is provided with a plurality of installation anchor points 1001, these installation anchor points 1001 can be set up in arbitrary position in the protective case 100, in order to detect better that the protective case 100 is destroyed, installation anchor points 1001 can be set up in the position where the protective case 100 is easily opened. For example, the mounting anchor points 1001 may be provided at the hinge or the weld joint portion of the protective case 100, or the mounting anchor points 1001 may be provided at four corners of the protective case 100.
The protective housing 100 may be made of a metal material to ensure that the protective housing 100 has sufficient rigidity, and the protective housing 100 may be made of an aluminum alloy or stainless steel.
The linear network circuit 101 is disposed in the protective housing 100, the linear network circuit 101 is electrically connected to the installation anchor point 1001, and the linear network circuit 101 can generate a housing signal according to the electrical connection between the linear network circuit 101 and the installation anchor point 1001. In particular, the housing signal may be a regular signal or an irregular signal, for example, the linear network circuit 101 may be capable of generating a regular signal in the case where the protective housing 100 is installed well, and the linear network circuit 101 may be capable of generating a signal that does not conform to a specific rule in the case where the protective housing 100 is damaged.
The linear network circuit 101 is also configured to: a target periodic signal is generated based on the housing signal and the preset periodic signal and forwarded to the micro control unit 102. As an alternative embodiment, the linear network circuit 101 may generate a housing signal and forward a preset periodic signal generated at the output of the micro control unit 102 to forward the preset periodic signal to the input of the micro control unit 102.
It should be noted that, once the protective case 100 is partially or completely destroyed, the target periodic signal obtained by the micro control unit 102 may vary in amplitude, frequency, or phase characteristics.
The micro-control unit 102 is disposed in the protective housing 100, and the micro-control unit 102 includes a digital-to-analog conversion unit 1021 and an analog-to-digital conversion unit 1022, wherein the digital-to-analog conversion unit is used as an output end of the micro-control unit 102, and the analog-to-digital conversion unit is used as an input end of the micro-control unit 102.
The digital-to-analog conversion unit is electrically connected with the linear network circuit 101, and is used for generating a preset periodic signal and transmitting the preset periodic signal to the linear network circuit 101 through the connection between the digital-to-analog conversion unit and the linear network circuit 101. The preset periodic signal can be customized according to the requirement.
In order to make the preset periodic signal generated by the digital-to-analog conversion unit easier to receive, the above tamper detection structure may further be provided with an amplifying circuit 104. The input end of the amplifying circuit 104 is electrically connected to the micro-control unit 102, the output end of the amplifying circuit 104 is electrically connected to the linear network circuit 101, and the amplifying circuit 104 is used for processing the preset periodic signal so that the linear network circuit 101 receives the processed preset periodic signal.
Specifically, an input end of the amplifying circuit 104 is electrically connected to the digital-to-analog conversion unit, and an output end of the amplifying circuit 104 is electrically connected to the linear network circuit 101.
As an alternative embodiment, a conditioning circuit 105 may also be provided in the tamper detection arrangement. The input end of the conditioning circuit 105 is electrically connected with the linear network circuit 101, the output end of the conditioning circuit 105 is electrically connected with the micro-control unit 102, and the conditioning circuit 105 is used for processing the target periodic signal so that the micro-control unit 102 receives the processed target periodic signal.
Specifically, an input end of the conditioning circuit 105 is electrically connected to the linear network circuit 101, and an output end of the conditioning circuit 105 is electrically connected to the analog-to-digital conversion unit.
The micro control unit 102 is further configured to: based on the target periodic signal and the preset periodic signal, determining whether the protective case 100 is complete; if not, the self-destruction circuit 103 is controlled to destroy the encrypted data memory.
Specifically, the micro control unit 102 is specifically configured to: when the fact that the preset relation between the target periodic signal and the preset periodic signal is not met is detected, judging that the protective shell 100 is damaged, and controlling the self-destruction circuit 103 to destroy the encrypted data memory; and when the preset relation between the target periodic signal and the preset periodic signal is detected, judging that the protective shell 100 is complete, and continuously generating the preset periodic signal.
In a specific implementation process, the micro control unit 102 is specifically configured to determine that the target periodic signal and the preset periodic signal do not satisfy the preset relationship when any one or more of the following conditions are detected:
in the first case, the difference between the amplitude characteristic of the target periodic signal and the amplitude characteristic of the preset periodic signal is greater than a first preset threshold.
And in the second case, the difference between the frequency characteristic of the target periodic signal and the frequency characteristic of the preset periodic signal is larger than a second preset threshold value.
And in the third case, the difference between the phase characteristic of the target periodic signal and the phase characteristic of the preset periodic signal is larger than a third preset threshold value.
The first preset threshold, the second preset threshold and the third preset threshold can be set according to actual application scenes, and in order to improve the fault tolerance of the anti-disassembly detection structure, the first preset threshold, the second preset threshold and the third preset threshold can be set to be larger.
It should be noted that, when the first, second and third cases are detected, the micro control unit 102 may not have a sequence. Namely, when the difference value between the amplitude characteristic of the target periodic signal and the amplitude characteristic of the preset periodic signal is detected to be larger than a first preset threshold value, judging that the preset relation between the target periodic signal and the preset periodic signal is not met; and when detecting that the difference between the phase characteristic of the target periodic signal and the phase characteristic of the preset periodic signal is larger than a third preset threshold value, judging that the target periodic signal and the preset periodic signal do not meet the preset relation.
In one embodiment, the micro control unit 102 may detect whether the first situation occurs, then detect whether the second situation occurs, and finally detect whether the third situation occurs. If the micro control unit 102 does not detect the first case and the second case, but detects the third case, it still determines that the predetermined relationship between the target periodic signal and the predetermined periodic signal is not satisfied, that is, it determines that the protective case 100 is damaged.
If none of the first, second, and third cases is detected by the micro control unit 102, a new preset periodic signal is regenerated, and a new target signal generated based on the new preset periodic signal is reacquired.
In the tamper detection structure, the self-destruction circuit 103 is also disposed in the protective housing 100, and the self-destruction circuit 103 is electrically connected to the micro-control unit 102, so as to respond to the control of the micro-control unit 102. Specifically, the self-destruction circuit 103 performs physical destruction, such as breakdown burn, of the encrypted data memory in response to a destruction instruction of the micro control unit 102.
It will be appreciated that the tamper detection structure may also be provided with a backup power supply 106 in order to maintain proper operation of the tamper detection structure. The backup power supply 106 is used to supply power to the linear network circuit 101, the micro control unit 102, the amplifying circuit 104, and the self-destruction circuit 103.
In order not to obtain the principle of tamper detection by an unauthorized person after the tamper detection structure fails, the micro control unit 102 may further erase the target code in the preset storage unit of the micro control unit 102 while determining that the protective case 100 is damaged.
Specifically, the preset storage unit may be an area in which codes for executing the above embodiments are stored, such as a register, a buffer, a RAM, and a ROM of the micro control unit 102.
Of course, it is understood that the linear network circuit 101, the micro control unit 102, the self-destruction circuit 103, the amplifying circuit 104, and the conditioning circuit 105 may be disposed on a circuit board (not shown), and the backup power source 106 may be disposed in the protective case 100.
In a second aspect, based on the same inventive concept, the present invention provides a tamper detection method applied to any tamper detection structure in the first aspect through an embodiment of the present invention.
Referring to fig. 2, the tamper detection method may include the following steps:
step S201: and generating a preset periodic signal and transmitting the preset periodic signal to the linear network circuit.
Step S202: judging whether the protective shell is complete or not based on the target periodic signal and the preset periodic signal; if not, the self-destruction circuit is controlled to destroy the encrypted data memory.
Wherein, the target periodic signal is obtained by processing the shell signal and the preset periodic signal by the linear network circuit 101; the housing signal is generated from the electrical connection of the linear network circuit 101 to the mounting anchor 1001.
As an alternative embodiment, it may be determined that the protective case 100 is damaged when it is detected that the preset relationship between the target periodic signal and the preset periodic signal is not satisfied; otherwise, the protective case 100 is judged to be complete.
Wherein, after judging that the protective shell 100 is damaged, the self-destruction circuit 103 is controlled to destroy the encrypted data memory; after determining that the protective case 100 is complete, the preset periodic signal is continuously generated.
Specifically, when any one or more of the following conditions are detected, it is determined that the preset relationship between the target periodic signal and the preset periodic signal is not satisfied:
in the first case, the difference between the amplitude characteristic of the target periodic signal and the amplitude characteristic of the preset periodic signal is greater than a preset threshold.
And in the second case, the difference between the frequency characteristic of the target periodic signal and the frequency characteristic of the preset periodic signal is larger than a second preset threshold value.
And in the third case, the difference between the phase characteristic of the target periodic signal and the phase characteristic of the preset periodic signal is larger than a third preset threshold value.
As an alternative embodiment, the object code in the preset storage unit of the micro control unit 102 is erased when it is determined that the protective case 100 is damaged.
For the specific implementation of the tamper detection method, reference may be made to the implementation of the micro control unit 102 in the first aspect, and for brevity of description, details are not repeated here.
In a third aspect, based on the same inventive concept, an embodiment of the present invention provides an anti-tamper detection apparatus, which can be applied to an encrypted data storage.
Referring to fig. 3, an anti-disassembly detection apparatus provided in an embodiment of the present invention includes: memory 301, processor 302, and code stored on the memory and executable on processor 302, processor 302 implements any of the embodiments of the tamper detection methods described above when the code is executed.
Where in FIG. 3 a bus architecture (represented by bus 300), bus 300 may comprise any number of interconnected buses and bridges, with bus 300 linking together various circuits, including one or more processors, represented by processor 302, and memory, represented by memory 301. Bus 300 may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., as are well known in the art and, therefore, will not be described further herein. Bus interface 305 provides an interface between bus 300 and receiver 303 and transmitter 304. The receiver 303 and the transmitter 304 may be the same element, i.e. a transceiver, providing a unit for communicating with various other apparatus over a transmission medium. The processor 302 is responsible for managing the bus 300 and general processing, while the memory 301 may be used to store data used by the processor 302 in performing operations.
According to a fourth aspect of the present invention, there is provided an encrypted data storage device according to an embodiment of the present invention, including the tamper detection structure of any one of the first aspects, and a storage body electrically connected to the self-destruction circuit.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
since the target periodic signal is generated based on the housing signal and the preset periodic signal, the target periodic signal correspondence will change as long as the housing signal changes. Because the micro control unit 102 can determine whether the protection shell 100 is complete based on the target periodic signal and the preset periodic signal, once the target periodic signal changes, the micro control unit 102 can determine that the protection shell 100 is damaged, and further control the self-destruction circuit 103 to destroy the encrypted data memory. Even if the protective shell 100 is opened, the encrypted data storage is destroyed and cannot be used, so that the anti-disassembly detection capability of the storage is effectively improved, and the safety of data in the storage is ensured. In addition, the micro control unit 102 obtains the signal generated by itself and the signal obtained by processing the signal generated by itself, so that malicious cracking by means of externally injecting an analog signal can be effectively prevented.
It will be appreciated by those skilled in the art that embodiments of the invention may be provided as a method, system, or computer product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the invention may take the form of a computer product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer instructions. These computer instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (10)
1. A tamper detection structure for use with an encrypted data store, the tamper detection structure comprising:
the protection shell is provided with a plurality of installation anchor points;
the linear network circuit is arranged in the protective shell and is electrically connected with the installation anchor point, and the linear network circuit is used for generating a shell signal according to the electrical connection between the linear network circuit and the installation anchor point;
the micro control unit is arranged in the protective shell and is used for generating a preset periodic signal and sending the preset periodic signal to the linear network circuit;
the self-destruction circuit is arranged in the protective shell and is electrically connected with the micro control unit;
the linear network circuit is further configured to: generating a target periodic signal based on the housing signal and the preset periodic signal;
the micro control unit is further configured to: based on the target periodic signal and the preset periodic signal, judging whether the protective shell is complete or not; if not, the self-destruction circuit is controlled to destroy the encrypted data memory.
2. The tamper detection structure of claim 1, further comprising:
the input end of the amplifying circuit is electrically connected with the micro control unit, the output end of the amplifying circuit is electrically connected with the linear network circuit, and the amplifying circuit is used for processing the preset periodic signal so that the linear network circuit receives the processed preset periodic signal;
the input end of the conditioning circuit is electrically connected with the linear network circuit, the output end of the conditioning circuit is electrically connected with the micro-control unit, and the conditioning circuit is used for processing the target periodic signal so that the micro-control unit can receive the processed target periodic signal.
3. The tamper detection structure of claim 1, further comprising:
and the backup power supply is used for providing electric energy for the linear network circuit, the micro control unit and the self-destruction circuit.
4. The tamper detection structure according to claim 1, wherein the micro control unit is specifically configured to:
when the fact that the preset relation between the target periodic signal and the preset periodic signal is not met is detected, judging that the protective shell is damaged, and controlling the self-destruction circuit to destroy the encrypted data memory;
and when the fact that the preset relation between the target periodic signal and the preset periodic signal is met is detected, judging that the protective shell is complete, and continuing to generate the preset periodic signal.
5. The tamper detection structure of claim 4, wherein the micro control unit is specifically configured to determine that the predetermined relationship is not satisfied between the target periodic signal and the predetermined periodic signal when any one or more of:
the difference between the amplitude characteristic of the target periodic signal and the amplitude characteristic of the preset periodic signal is larger than a first preset threshold value;
the difference between the frequency characteristic of the target periodic signal and the frequency characteristic of the preset periodic signal is larger than a second preset threshold value;
the difference between the phase characteristic of the target periodic signal and the phase characteristic of the preset periodic signal is greater than a third preset threshold.
6. The tamper detection structure of claim 5, wherein the micro control unit is further configured to:
and when the protection shell is judged to be damaged, erasing the target codes in the preset storage unit of the micro control unit.
7. A tamper detection method applied to a tamper detection structure according to any one of claims 1-6, the method comprising:
generating a preset periodic signal and transmitting the preset periodic signal to the linear network circuit;
based on the target periodic signal and the preset periodic signal, judging whether the protective shell is complete or not; if not, the self-destruction circuit is controlled to destroy the encrypted data memory;
the target periodic signal is obtained by processing a shell signal and the preset periodic signal by the linear network circuit; the housing signal is generated according to an electrical connection of the linear network circuit and the installation anchor.
8. The method of claim 7, wherein the determining whether the protective case is complete based on the target periodic signal and the preset periodic signal comprises:
when the fact that the preset relation between the target periodic signal and the preset periodic signal is not met is detected, judging that the protective shell is damaged; otherwise, judging that the protective shell is complete.
9. A tamper detection device comprising a memory, a processor and code stored on the memory and executable on the processor, wherein the processor implements the method of claim 7 or 8 when executing the code.
10. An encrypted data memory comprising the tamper-evident structure of any one of claims 1-6, and a memory body electrically connected to the self-destructing circuit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310449677.2A CN116226944B (en) | 2023-04-25 | 2023-04-25 | Encrypted data memory, anti-disassembly detection structure, method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310449677.2A CN116226944B (en) | 2023-04-25 | 2023-04-25 | Encrypted data memory, anti-disassembly detection structure, method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116226944A true CN116226944A (en) | 2023-06-06 |
CN116226944B CN116226944B (en) | 2023-08-04 |
Family
ID=86589461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310449677.2A Active CN116226944B (en) | 2023-04-25 | 2023-04-25 | Encrypted data memory, anti-disassembly detection structure, method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116226944B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1993026125A1 (en) * | 1992-06-10 | 1993-12-23 | Scientific-Atlanta, Inc. | Interdiction method and apparatus with random mode jamming |
CN204302981U (en) * | 2014-12-12 | 2015-04-29 | 北京壹人壹本信息科技有限公司 | A kind of tamper organic electronic device |
US9799180B1 (en) * | 2016-01-29 | 2017-10-24 | Square, Inc. | Multiplexed tamper detection system |
WO2018111601A1 (en) * | 2016-12-16 | 2018-06-21 | Square, Inc. | Tamper detection system |
CN109782154A (en) * | 2019-02-27 | 2019-05-21 | 大唐微电子技术有限公司 | A kind of tamper detection protection circuit, implementation method and tamper chip |
US20220253565A1 (en) * | 2019-10-29 | 2022-08-11 | Feitian Technologies Co., Ltd. | Terminal anti-tamper detection method and apparatus |
CN114925407A (en) * | 2022-05-31 | 2022-08-19 | 无锡华大国奇科技有限公司 | Method for protecting disassembly data |
-
2023
- 2023-04-25 CN CN202310449677.2A patent/CN116226944B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1993026125A1 (en) * | 1992-06-10 | 1993-12-23 | Scientific-Atlanta, Inc. | Interdiction method and apparatus with random mode jamming |
CN204302981U (en) * | 2014-12-12 | 2015-04-29 | 北京壹人壹本信息科技有限公司 | A kind of tamper organic electronic device |
US9799180B1 (en) * | 2016-01-29 | 2017-10-24 | Square, Inc. | Multiplexed tamper detection system |
WO2018111601A1 (en) * | 2016-12-16 | 2018-06-21 | Square, Inc. | Tamper detection system |
CN109782154A (en) * | 2019-02-27 | 2019-05-21 | 大唐微电子技术有限公司 | A kind of tamper detection protection circuit, implementation method and tamper chip |
US20220253565A1 (en) * | 2019-10-29 | 2022-08-11 | Feitian Technologies Co., Ltd. | Terminal anti-tamper detection method and apparatus |
CN114925407A (en) * | 2022-05-31 | 2022-08-19 | 无锡华大国奇科技有限公司 | Method for protecting disassembly data |
Non-Patent Citations (1)
Title |
---|
郝英好;赵楠;线珊珊;: "自毁技术与装置研究", 中国高新技术企业, no. 14 * |
Also Published As
Publication number | Publication date |
---|---|
CN116226944B (en) | 2023-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104156298B (en) | Application monitoring method and device | |
CN110472421B (en) | Mainboard and firmware safety detection method and terminal equipment | |
KR100988414B1 (en) | Data security apparatus | |
CN112039894B (en) | Network access control method, device, storage medium and electronic equipment | |
CN105488421B (en) | Battery-free intrusion detection system and method for industrial and metering devices | |
US10387646B2 (en) | Input/output parameter selection | |
CN116226944B (en) | Encrypted data memory, anti-disassembly detection structure, method and equipment | |
JP2012238331A (en) | Data protection method and computing apparatus | |
CN103824005A (en) | Anti-copying system embedded with configurable IP core and anti-copying method | |
CN105787394A (en) | Hard disk data destruction system and method | |
JP7531033B2 (en) | Preventing unauthorized access to your computer | |
Burbano et al. | Online attack recovery in cyberphysical systems | |
CN110362983B (en) | Method and device for ensuring consistency of dual-domain system and electronic equipment | |
CN104700909A (en) | Nuclear power plant group pile safety system | |
CN105989273B (en) | Application program login method, device and electronic equipment | |
CN104598789A (en) | Protection method of hot-plugging functional module device and electronic device | |
CN113138901A (en) | Server uncovering detection method and system | |
CN113806792A (en) | File cloud storage method and device, readable storage medium and electronic equipment | |
CN110874495B (en) | Solid state disk based on automatic locking write protection function and tamper-proof method | |
CN113792304A (en) | Database access system and method | |
KR101986638B1 (en) | Malware preventing system and method for object file to protect | |
CN105550599A (en) | Linux virtual file system-based tamper-proof method and system | |
CN105446751A (en) | Information processing method and electronic equipment | |
RU2185657C2 (en) | Resident-software integrity control and protection system | |
KR102580888B1 (en) | Method and System for Analyzing Malicious Code based in Chatbot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 430200 Wuhan Donghu New Technology Development Zone Dongyi Industrial Park Guanggu Avenue Financial Backend Service Center Base Construction Project Phase II, 2.7 (2012-083), Building B26, No. 503 (Wuhan Area of Free Trade Zone), Wuhan, Hubei Province Applicant after: Duodian Zhilian (Wuhan) Technology Co.,Ltd. Address before: 430000 No. 503, building B26, financial backstage service center, Guanggu Avenue, Donghu New Technology Development Zone, Wuhan, Hubei Province Applicant before: WEISHENG (WUHAN) TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |