[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN118246083A - Self-destruction computer control method, system, equipment and storage medium - Google Patents

Self-destruction computer control method, system, equipment and storage medium Download PDF

Info

Publication number
CN118246083A
CN118246083A CN202410292720.3A CN202410292720A CN118246083A CN 118246083 A CN118246083 A CN 118246083A CN 202410292720 A CN202410292720 A CN 202410292720A CN 118246083 A CN118246083 A CN 118246083A
Authority
CN
China
Prior art keywords
self
destruction
module
computer
destruction module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410292720.3A
Other languages
Chinese (zh)
Inventor
徐建平
叶继丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Chuangzhicheng Technology Co ltd
Original Assignee
Shenzhen Chuangzhicheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chuangzhicheng Technology Co ltd filed Critical Shenzhen Chuangzhicheng Technology Co ltd
Priority to CN202410292720.3A priority Critical patent/CN118246083A/en
Publication of CN118246083A publication Critical patent/CN118246083A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to the technical field of military equipment, in particular to a self-destruction computer control method, a self-destruction computer control system, self-destruction computer control equipment and a storage medium, wherein the self-destruction computer control method comprises the following steps: acquiring a starting signal of a self-destruction module in the self-destruction computer; transmitting the starting signal to a self-destruction module of the self-destruction computer, and starting the self-destruction module; judging whether a stop signal of the self-destruction module exists or not within a preset time; if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module; if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer. The application effectively prevents leakage of information, privacy and working confidential files, thereby improving the information security performance of the military notebook computer and reducing the confidential information loss.

Description

Self-destruction computer control method, system, equipment and storage medium
Technical Field
The application relates to the technical field of military equipment, in particular to a self-destruction computer control method, a self-destruction computer control system, self-destruction computer control equipment and a self-destruction computer control storage medium.
Background
Currently, we are rapidly moving into an information explosion era, and data is an integral part of our lives and works. In this large background, the security problem of military notebook computers is also becoming increasingly prominent as an important carrier for data storage. Since a great amount of personal privacy information, company business secrets, government agency documents, military secrets and other important data are often stored in the military notebook computer, once equipment is lost or stolen, a great risk of data leakage is likely to be faced.
In the prior art, the device is generally provided with high-level security software and complex security measures such as system passwords and security passwords, and when the data is stolen, the internal security software can be started to erase or format important data. However, this method has some technical drawbacks, such as slow speed, strong dependency and low security level. A stealer may not be able to steal data from the external interface of the military notebook computer, but may easily steal important data by physically cracking the internal data storage medium after opening the shell, which may cause a huge loss.
The prior art is therefore still to be improved based on the above-mentioned problems.
Disclosure of Invention
The application aims to provide a self-destruction computer control method, a system, equipment and a storage medium, which aim to solve the problems of low speed, strong dependence and lower security level of a method for protecting data in a computer from being stolen through data formatting when the computer is stolen.
The application provides a self-destruction computer control method, which comprises the following steps:
Acquiring a starting signal of a self-destruction module in the self-destruction computer;
Transmitting the starting signal to a self-destruction module of the self-destruction computer, and starting the self-destruction module;
judging whether a stop signal of the self-destruction module exists or not within a preset time;
if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module;
if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer.
By adopting the technical scheme, when a stealer operates the self-destruction computer, the starting signal of the self-destruction module in the self-destruction computer is obtained when the preset condition is met, and the starting signal is transmitted to the self-destruction module, so that the operation time of the stealer on the self-destruction computer is reduced, and the possibility of the stealer obtaining confidential information is reduced; judging whether a stop signal of the self-destruction module exists or not in a preset time after the self-destruction module is started, and identifying whether the self-destruction computer is used by an owner under a preset condition, so that the possibility that the owner triggers the self-destruction module by mistake is reduced, and the use safety of the self-destruction computer is improved; when the stop signal of the self-destruction module exists, the self-destruction module can be rapidly closed, the situation of data loss or physical damage is flexibly reflected and reduced, when the stop signal of the self-destruction module does not exist, the self-destruction module is judged to be used by a non-owner, the self-destruction module is operated to logically destroy the data in the self-destruction computer, and/or the self-destruction computer body is physically destroyed, so that the comprehensiveness of destroying is improved, the leakage of information, privacy and working confidential files is effectively prevented, the information safety performance of the military notebook computer is improved, and the confidential information loss is reduced.
In one possible implementation manner of the present application, the steps before the step of obtaining the start signal of the self-destruction module in the self-destruction computer include:
Acquiring a starting signal of the self-destruction computer;
and generating a starting signal of the self-destruction module based on the starting signal.
By adopting the technical scheme, when the self-destruction computer is started, the starting signal of the self-destruction module is generated according to the acquired starting signal, so that the operation time of a thief on the self-destruction computer is reduced, the thief cannot start the computer and then the external equipment steals the data of the computer, the leakage of information, privacy and working confidential files is effectively prevented, and the normalization and the data security of the self-destruction computer are improved.
In one possible implementation manner of the present application, the steps before the step of obtaining the start signal of the self-destruction module in the self-destruction computer include:
Acquiring range position information of the usable range of the self-destruction computer;
Acquiring real-time position information of the self-destruction computer;
Judging whether the self-destructing computer is in the usable range or not based on the real-time position information and the range position information;
if the self-destruction computer is not in the usable range, sending out prompt information and generating a starting signal of the self-destruction module;
If the self-destruction computer is in the usable range, sending out normal use prompt information.
By adopting the technical scheme, the usable range of the self-destruction computer, the hard disk and the like is limited, and when the self-destruction computer leaves the specified usable range area, the self-destruction computer is destroyed by the self-destruction module operated by the self-destruction computer. The possibility of theft of the self-destruction computer is reduced, the operation distance of the self-destruction computer which can be operated by a thief is shortened, the self-destruction computer can be tracked and retrieved in time, and the situation that data in the self-destruction computer is stolen is effectively prevented.
In one possible implementation manner of the present application, the steps before the step of obtaining the start signal of the self-destruction module in the self-destruction computer include:
acquiring induction information of an acceleration sensor of the self-destruction computer;
and if the acceleration corresponding to the sensing information reaches a preset range, generating a starting signal of the self-destruction module.
By adopting the technical scheme, the self-destruction type computer is reduced in accidents, such as falling of the self-destruction type computer caused by crash, competing with others and the like, the whole acceleration of the self-destruction type computer is sensed through the acceleration sensor in the self-destruction type computer, the existence of the unexpected environment of the self-destruction type computer is judged, when the acceleration of the self-destruction type computer is in a preset range, the self-destruction type computer is not required to be logically destroyed and/or physically destroyed by a self-destruction module, and even if a person accidentally acquiring the self-destruction type computer cannot acquire the data information stored in the self-destruction type computer.
In one possible embodiment of the present application, the method further comprises:
Obtaining a disassembled signal of the disassembled and separated storage medium on the self-destruction computer;
Transmitting the disassembled signal to a sub self-destruction module of a storage medium based on the disassembled signal, and starting the sub self-destruction module;
and operating the sub self-destruction module to physically destroy the storage medium.
Through adopting above-mentioned technical scheme, when storage media such as self-destruct computer inside data storage chip, solid state disk, FLASH chip and inside TF card are dismantled and are separated self-destruct computer body by the stealer, obtain the storage media and dismantle the detached signal by the separation to generate the start-up signal of self-destruct module, self-destruct module opens the sub self-destruct module in the self-powered drive storage medium on the storage media module simultaneously, physical destruction is carried out to the storage media who is dismantled the separation, breaks through the storage media who disassembles when the stealer, reduces the risk that the data that is not destroyed by timely logic destruction is broken.
In one possible embodiment of the present application, the method further comprises:
judging the universality of the storage medium and the new access equipment;
and if the storage medium and the new access equipment do not have universality, running a sub self-destruction module in the storage medium, and physically destroying the storage medium.
Through adopting above-mentioned technical scheme, carry out the definition of self-destruction module again, when the storage medium leaves original equipment, install new equipment again after, judge the commonality of storage medium and new access equipment, if do not possess the commonality, insert other equipment and try to break data and can lead to the storage medium directly to be burnt out etc. physical destruction under the unclear self-destruction module definition's of stealer condition, increase simultaneously and verify the flow, the condition that does not take place physical destruction when reducing the storage medium and being dismantled takes place, the security of storage data when increasing the storage medium and being stolen.
In one possible implementation manner of the present application, the step of running the self-destruction module to logically destroy and/or physically destroy the self-destruction computer includes:
Running the self-destruction module to logically destroy the self-destruction computer;
acquiring the running condition of the logic destruction in real time;
if the running condition of the logic destruction is interrupt running, running the self-destruction module to physically destroy the self-destruction computer;
If the running condition of the logic destruction is normal running, when the running condition is that the running is finished, the self-destruction module is operated to physically destroy the self-destruction computer.
By adopting the technical scheme, the self-destruction computer can primarily delete and format the internally stored data through logic destruction, so that the difficulty of data recovery of a stolen person is increased, and meanwhile, the running condition of the logic destruction process is detected in real time, so that the self-destruction computer can sufficiently delete and format the internal data; when the logic destruction is interrupted, the self-destruction module is immediately started to physically destroy the self-destruction computer, the possibility that a stealer recovers and breaks internal data through a storage medium is reduced, when the logic destruction operation is completed, the data is further destroyed through the physical destruction, the difficulty of the stealer in acquiring the data is improved, and meanwhile the safety of the data is improved.
The second object of the present application is to provide a self-destruction computer control system, which comprises:
a starting signal acquisition module: the method comprises the steps of acquiring a starting signal of a self-destruction module in a self-destruction computer;
the self-destruction module is started up: the self-destruction module is used for transmitting the starting signal to the self-destruction module of the self-destruction computer and starting the self-destruction module;
The stop signal existence judging module: the self-destruction module is used for judging whether a stop signal of the self-destruction module exists or not in preset time;
the self-destruction module is closed: if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module;
The self-destruction module operates the module: and if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer.
By adopting the technical proposal, the utility model has the advantages that,
The third object of the present application is to provide a self-destructing computer control apparatus, comprising:
The system comprises a memory and a processor, wherein the memory stores a computer program which can be loaded by the processor and execute the self-destruction computer control method.
A fourth object of the present application is to provide a storage medium.
The fourth object of the present application is achieved by the following technical solutions:
a storage medium in which a computer program is stored that can be loaded by a processor and that performs a self-destructing computer control method as described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. When a stealer operates the self-destruction computer, acquiring a starting signal of a self-destruction module in the self-destruction computer according to preset conditions, and transmitting the starting signal to the self-destruction module, so that the operation time of the stealer on the self-destruction computer is reduced, and the possibility of the stealer acquiring confidential information is reduced; judging whether a stop signal of the self-destruction module exists or not in a preset time after the self-destruction module is started, and identifying whether the self-destruction computer is used by an owner under a preset condition, so that the possibility that the owner triggers the self-destruction module by mistake is reduced, and the use safety of the self-destruction computer is improved; when the stop signal of the self-destruction module exists, the self-destruction module can be rapidly closed, the situation of data loss or physical damage is flexibly reflected and reduced, when the stop signal of the self-destruction module does not exist, the self-destruction module is judged to be used by a non-owner, the self-destruction module is operated to logically destroy the data in the self-destruction computer, and/or the self-destruction computer body is physically destroyed, so that the comprehensiveness of destroying is improved, the leakage of information, privacy and working confidential files is effectively prevented, the information safety performance of the military notebook computer is improved, and the confidential information loss is reduced.
2. Limiting the usable range of the self-destruction computer, hard disk and the like, and when the self-destruction computer leaves the specified usable range area, the self-destruction module is operated by the self-destruction computer to destroy the self-destruction computer. The possibility of theft of the self-destruction computer is reduced, the operation distance of the self-destruction computer which can be operated by a thief is shortened, the self-destruction computer can be tracked and retrieved in time, and the situation that data in the self-destruction computer is stolen is effectively prevented.
Drawings
FIG. 1 is a schematic flow chart of a self-destructing computer control method according to an embodiment of the present application;
Fig. 2 is a schematic diagram of a virtual structure of a self-destruction computer control system according to an embodiment of the application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
Embodiments of the application are described in further detail below with reference to the drawings.
The embodiment of the application provides a detection and processing method for preventing candid photograph, and referring to fig. 1, the main flow of the method is described as follows:
S1: acquiring a starting signal of a self-destruction module in the self-destruction computer;
Wherein, the self-destruction module is arranged in the self-destruction computer, and the self-destruction computer is internally provided with a preset condition for triggering the self-destruction module to be started or run. When the self-destruction computer reaches a preset condition, the internal components of the self-destruction computer are triggered to generate a starting signal of the self-destruction module, and the system acquires the starting signal and rapidly transmits the starting signal to the self-destruction module to control the self-destruction module to be started or operated.
S2: transmitting the starting signal to a self-destruction module of the self-destruction computer, and starting the self-destruction module;
The system transmits a starting signal to the self-destruction module in the self-destruction computer, so that the self-destruction module is started but not started to operate.
S3: judging whether a stop signal of the self-destruction module exists or not within a preset time;
When the self-destruction module acquires the starting signal and is started, the self-destruction module starts to judge whether the stopping signal exists, and when the self-destruction module acquires the stopping signal within a preset time, the self-destruction module is closed to stop the subsequent running program to logically destroy or physically destroy the self-destruction computer and the internal storage medium; when the self-destruction module does not acquire a stop signal within a preset time, the self-destruction module starts to run a program to logically destroy and/or physically destroy the self-destruction computer and the internal storage medium. The preferable stop signal can be a correct starting signal when a user correctly inputs the password for verification, or a signal for closing the self-destruction module by a remote control signal, and the like.
S4: if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module;
When the user correctly inputs the password to verify that the correct starting signal is generated in the self-destruction computer or the self-destruction computer obtains a closing signal for closing the self-destruction module by a remote control signal, the existence of the stopping signal of the self-destruction module is judged, the system transmits the stopping signal of the self-destruction module to the self-destruction module, the self-destruction module is closed, and the self-destruction module stops running.
S5: if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer.
If the self-destruction module is judged to be not in the stop signal within the preset time, the self-destruction module starts to run to logically destroy and/or physically destroy the self-destruction computer. Logical destruction includes destroying the data without damaging the physical storage medium. Logical destruction includes data deletion formatting, data coverage and population, and the like. The logic destruction mode can be realized by installing software in the self-destruction computer or starting installed hardware to process data on the storage medium of the self-destruction computer. The physical destruction includes directly destroying main storage media such as storage media, for example, chips, solid state disks, etc., and the physical destruction mode generally adopts the following means: crushing a hammer or other weight; destroying the strong acid solution; destroying the explosive; the high voltage breaks down the chip, and the application preferably breaks down the storage medium through the high voltage, so that flash memory particles on the storage medium are burnt out. When the self-destruction module operates and performs physical destruction, the self-destruction computer starts the internal discharge assembly to release high voltage, and the storage medium and the like which are electrically connected are broken down and burned.
Specifically, in some possible embodiments, the step before obtaining the start signal of the self-destruction module in the self-destruction computer includes:
Acquiring a starting signal of the self-destruction computer;
and generating a starting signal of the self-destruction module based on the starting signal.
When the owner or the stealer starts the self-destruction computer, the self-destruction computer generates a starting signal, and based on the starting signal, the self-destruction module starting signal is generated. The owner can stop the operation of the self-destruction module by means of completing safe login verification and the like, and a stealer cannot leave enough time to transfer the self-destruction computer after starting up, or acquire or crack the data in the self-destruction computer through external equipment.
Specifically, in some possible embodiments, the step before obtaining the start signal of the self-destruction module in the self-destruction computer includes:
Acquiring range position information of the usable range of the self-destruction computer;
Acquiring real-time position information of the self-destruction computer;
Judging whether the self-destructing computer is in the usable range or not based on the real-time position information and the range position information;
if the self-destruction computer is not in the usable range, sending out prompt information and generating a starting signal of the self-destruction module;
If the self-destruction computer is in the usable range, sending out normal use prompt information.
The self-destruction computer is provided with a GPS module, a usable range of the self-destruction computer is preset, for example, an area is set according to the size of the area of the command post, and the left side of the position of the area is input into the self-destruction computer to be used as range position information of the usable range of the self-destruction computer. The self-destructing computer senses the real-time position of the self-destructing computer in real time, and correspondingly uploads the real-time position information, so that the real-time position information and the range position information are compared, and whether the self-destructing computer is in a usable range is judged through comparison. If the real-time position of the self-destruction computer corresponding to the real-time position information is within the usable range, the self-destruction computer is judged to be within the usable range, the self-destruction computer does not generate a starting signal of the self-destruction module and sends out normal use prompt information, and light is preferably used for feedback. If the real-time position of the self-destruction computer corresponding to the real-time position information is not in the usable range, the self-destruction computer is judged to be illegally used or stolen, and the self-destruction computer generates a starting signal of the self-destruction module.
Specifically, in some possible embodiments, the step before obtaining the start signal of the self-destruction module in the self-destruction computer includes:
acquiring induction information of an acceleration sensor of the self-destruction computer;
and if the acceleration corresponding to the sensing information reaches a preset range, generating a starting signal of the self-destruction module.
When the self-destruction computer is applied to a fighter plane and the fighter plane is hit to crash, the pilot who possibly loses life or does not lose life can leave the most precious time for escape in order to ensure that the data in the self-destruction computer is not leaked, but the data is destroyed in an effective escape opportunity. Therefore, when the aircraft begins to crash, the system acquires the induction information induced by the acceleration sensor arranged in the self-destruction computer, senses the acceleration change of the current self-destruction computer, and generates a starting signal of the self-destruction module when the acceleration corresponding to the induction information reaches the preset range through the preset range. Or automatically shortening the preset time to judge the stop signal after the start signal of the self-destruction module is generated, and skipping the logic destruction flow to directly enter the physical destruction flow, so that the self-destruction computer is physically destroyed without manual intervention.
Specifically, in some possible embodiments, the method further comprises:
Obtaining a disassembled signal of the disassembled and separated storage medium on the self-destruction computer;
Transmitting the disassembled signal to a sub self-destruction module of a storage medium based on the disassembled signal, and starting the sub self-destruction module;
and operating the sub self-destruction module to physically destroy the storage medium.
The self-destruction module and/or the sub self-destruction module receive the disassembled signal to start, so that the preset time for judging the existence of the stop signal can be shortened, the sub self-destruction module is operated to physically destroy the corresponding storage medium, and the self-destruction module is operated to physically destroy the self-destruction computer body.
Specifically, in some possible embodiments, the method further comprises:
judging the universality of the storage medium and the new access equipment;
and if the storage medium and the new access equipment do not have universality, running a sub self-destruction module in the storage medium, and physically destroying the storage medium.
When the storage medium is installed in the new access device, the stealer can detach the detached and separated medium and the universality of the new access device, namely the storage medium is incompatible with the new access device, namely the storage medium and the new access device are not universal, and when the storage medium is accessed to the new access device, the sub self-destruction module operates to physically destroy the storage medium.
Specifically, in some possible embodiments, the step of running the self-destruction module to logically destroy and/or physically destroy the self-destruction computer includes:
Running the self-destruction module to logically destroy the self-destruction computer;
acquiring the running condition of the logic destruction in real time;
if the running condition of the logic destruction is interrupt running, running the self-destruction module to physically destroy the self-destruction computer;
If the running condition of the logic destruction is normal running, when the running condition is that the running is finished, the self-destruction module is operated to physically destroy the self-destruction computer.
The self-destruction module is operated by the self-destruction computer, and can primarily delete and format the data stored in the self-destruction computer through logic destruction, so that the difficulty of recovering the data by a stealer is increased; meanwhile, the running state of the logic destroyed flow is detected in real time, so that the self-destruction computer can sufficiently delete and format the internal data; when the logic destruction is interrupted, namely the running condition of the logic destruction is the interrupt running, the system immediately starts the self-destruction module to physically destroy the self-destruction computer, so that the possibility that a stealer can recover and crack the internal data through the storage medium is reduced. When the logic destruction normally operates and the operation is completed, the data is further destroyed through physical destruction, the difficulty of a stealer in acquiring the data is improved, and meanwhile, the safety of the data is improved.
In another embodiment of the present application, referring to fig. 2, a self-destructing computer control system includes:
the start signal acquisition module 100: the method comprises the steps of acquiring a starting signal of a self-destruction module in a self-destruction computer;
Self-destruction module activation module 200: the self-destruction module is used for transmitting the starting signal to the self-destruction module of the self-destruction computer and starting the self-destruction module;
Stop signal presence determination module 300: the self-destruction module is used for judging whether a stop signal of the self-destruction module exists or not in preset time;
Self-destruct module shutdown module 400: if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module;
self-destruction module running module 500: and if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer.
The self-destruction computer control system provided in this embodiment can achieve the same technical effects as the foregoing embodiments due to the functions of each module and the logic connection between each module, and the principle analysis can refer to the related descriptions of the steps of the self-destruction computer control method, which are not described here again.
The embodiment of the application also provides self-destruction computer control equipment, which comprises a memory and a processor, wherein the memory stores a computer program which can be loaded by the processor and execute the self-destruction computer control method.
The embodiment of the application also provides a storage medium, wherein a computer program capable of being loaded by a processor and executing the self-destruction computer control method is stored.
The storage medium provided in this embodiment, after being loaded and executed on a processor, implements the steps of the foregoing embodiment, so that the same technical effects as those of the foregoing embodiment can be achieved, and the principle analysis can be seen from the related description of the foregoing method steps, which is not further described herein.
The storage medium includes, for example: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, may expressly or implicitly include at least one such feature. In the description of the present invention, the meaning of "a plurality" is at least two, such as two, three, etc., unless explicitly defined otherwise, for descriptive purposes only and not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated.
Thus, any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present invention.
The embodiments of the present application are all preferred embodiments of the present application, and are not intended to limit the scope of the present application in this way, therefore: all equivalent changes in structure, shape and principle of the application should be covered in the scope of protection of the application.

Claims (10)

1. A self-destructing computer control method, comprising:
Acquiring a starting signal of a self-destruction module in the self-destruction computer;
Transmitting the starting signal to a self-destruction module of the self-destruction computer, and starting the self-destruction module;
judging whether a stop signal of the self-destruction module exists or not within a preset time;
if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module;
if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer.
2. The method of claim 1, wherein the step of obtaining the start signal of the self-destruct module in the self-destruct computer comprises:
Acquiring a starting signal of the self-destruction computer;
and generating a starting signal of the self-destruction module based on the starting signal.
3. The method of claim 1, wherein the step of obtaining the start signal of the self-destruct module in the self-destruct computer comprises:
Acquiring range position information of the usable range of the self-destruction computer;
Acquiring real-time position information of the self-destruction computer;
Judging whether the self-destructing computer is in the usable range or not based on the real-time position information and the range position information;
if the self-destruction computer is not in the usable range, sending out prompt information and generating a starting signal of the self-destruction module;
If the self-destruction computer is in the usable range, sending out normal use prompt information.
4. The method of claim 1, wherein the step of obtaining the start signal of the self-destruct module in the self-destruct computer comprises:
acquiring induction information of an acceleration sensor of the self-destruction computer;
and if the acceleration corresponding to the sensing information reaches a preset range, generating a starting signal of the self-destruction module.
5. The method of claim 1, further comprising:
Obtaining a disassembled signal of the disassembled and separated storage medium on the self-destruction computer;
Transmitting the disassembled signal to a sub self-destruction module of a storage medium based on the disassembled signal, and starting the sub self-destruction module;
and operating the sub self-destruction module to physically destroy the storage medium.
6. The method of claim 5, further comprising:
judging the universality of the storage medium and the new access equipment;
and if the storage medium and the new access equipment do not have universality, running a sub self-destruction module in the storage medium, and physically destroying the storage medium.
7. The method according to claim 1, wherein the step of running the self-destruction module to logically destroy and/or physically destroy the self-destruction computer comprises:
Running the self-destruction module to logically destroy the self-destruction computer;
acquiring the running condition of the logic destruction in real time;
if the running condition of the logic destruction is interrupt running, running the self-destruction module to physically destroy the self-destruction computer;
If the running condition of the logic destruction is normal running, when the running condition is that the running is finished, the self-destruction module is operated to physically destroy the self-destruction computer.
8. A self-destructing computer control system, comprising:
a starting signal acquisition module: the method comprises the steps of acquiring a starting signal of a self-destruction module in a self-destruction computer;
the self-destruction module is started up: the self-destruction module is used for transmitting the starting signal to the self-destruction module of the self-destruction computer and starting the self-destruction module;
The stop signal existence judging module: the self-destruction module is used for judging whether a stop signal of the self-destruction module exists or not in preset time;
the self-destruction module is closed: if the stop signal of the self-destruction module exists, transmitting the stop signal of the self-destruction module to the self-destruction module, and closing the self-destruction module;
The self-destruction module operates the module: and if the stop signal of the self-destruction module does not exist, the self-destruction module is operated to logically destroy and/or physically destroy the self-destruction computer.
9. A self-destructing computer control device, comprising: a memory and a processor, the memory having stored thereon a computer program capable of being loaded by the processor and executing the method of controlling a self-destructing computer according to any one of the claims 1-7.
10. A storage medium storing a computer program capable of being loaded by a processor and executing a method of controlling a self-destructing computer according to any one of claims 1-7.
CN202410292720.3A 2024-03-14 2024-03-14 Self-destruction computer control method, system, equipment and storage medium Pending CN118246083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410292720.3A CN118246083A (en) 2024-03-14 2024-03-14 Self-destruction computer control method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410292720.3A CN118246083A (en) 2024-03-14 2024-03-14 Self-destruction computer control method, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN118246083A true CN118246083A (en) 2024-06-25

Family

ID=91554819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410292720.3A Pending CN118246083A (en) 2024-03-14 2024-03-14 Self-destruction computer control method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118246083A (en)

Similar Documents

Publication Publication Date Title
US7099110B2 (en) Dead on demand disk technology
CN100489728C (en) Method for establishing trustable operational environment in a computer
US20080219122A1 (en) Dead on demand technology
KR101732889B1 (en) Apparatus and method for guaranteeing safe execution of a shell command in an embedded system
US8635698B2 (en) Antivirus system and method for removable media devices
CN1545657A (en) Computer hard disk data backup and recovery method
EP2788915B1 (en) Data security device
JPH03502263A (en) COMPUTER DATA AND SOFTWARE INTEGRITY PROTECTION APPARATUS AND METHODS
CN103902934A (en) Computer case disassembling prevention detecting method and device
US9135473B2 (en) Method and apparatus for erasure of data from a data storage device located on a vehicle
CN110622163B (en) Auxiliary storage device with independent recovery area and equipment suitable for same
US20210117110A1 (en) Data processing method and storage device
CN111090857B (en) Method for defending file from malicious software attack, computer system and recording medium
CN114510755A (en) Anti-dismantling protection method for terminal equipment, terminal equipment and readable storage medium
TWI607338B (en) Storage device, data protection method therefor, and data protection system
CN118246083A (en) Self-destruction computer control method, system, equipment and storage medium
CN104361298B (en) The method and apparatus of Information Security
CN110874495B (en) Solid state disk based on automatic locking write protection function and tamper-proof method
CN115017480A (en) Computer safety protection management and control system based on intelligent control
CN107229869A (en) Secure user data is locked
CN113138901A (en) Server uncovering detection method and system
CN103927492B (en) A kind of data processing equipment and data guard method
CN110490010B (en) Automatic data destruction method based on multi-factor environmental perception
CN116305334B (en) Computer software encryption protection device
JP2003122444A (en) System and method for assuring security of computer cpu

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination