CN110298205B - Multi-power-supply storage module data self-destruction method - Google Patents
Multi-power-supply storage module data self-destruction method Download PDFInfo
- Publication number
- CN110298205B CN110298205B CN201910584011.1A CN201910584011A CN110298205B CN 110298205 B CN110298205 B CN 110298205B CN 201910584011 A CN201910584011 A CN 201910584011A CN 110298205 B CN110298205 B CN 110298205B
- Authority
- CN
- China
- Prior art keywords
- storage module
- destruction
- upper computer
- self
- power supply
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention relates to a multi-power-supply storage module data self-destruction method, which is characterized by comprising the following steps: the upper computer sends a self-destruction preprocessing instruction to the storage module; the storage module acquires an instruction to perform read-write prohibition processing on internal data; the upper computer sends a first power supply switching instruction to the storage module; the storage module acquires an instruction to switch a first power supply mode; the upper computer sends a self-destruction instruction to the storage module; the storage module acquires an instruction to carry out data self-destruction processing; the upper computer sends a second power supply switching instruction to the storage module; the storage module acquires an instruction to perform second power supply mode switching processing; the upper computer sends a self-destruction unlocking instruction to the storage module; and the storage module acquires the instruction to unlock the internal data and read and write the internal data. According to the invention, after the upper computer initiates a data self-destruction process, the storage module can smoothly destroy data even if the working power supply of the upper computer is damaged by switching the power supply of the storage module.
Description
Technical Field
The invention relates to the technical field of single-chip microcomputer embedded systems, in particular to a multi-power-supply storage module data self-destruction method.
Background
The single chip microcomputer applied to the related fields of financial payment or mobile security and the like needs to download and install the key data on the storage medium. Once this key is obtained by a third party through an attack, the entire payment or security application is compromised. Therefore, in the field of financial payment, after the single chip microcomputer receives the attack early warning, the data in the data area storing the key data needs to be subjected to self-destruction processing. In the prior art, a single power supply mode is adopted by the single chip microcomputer for an upper computer-control party responsible for initiating the self-destruction process and a storage module-executing party responsible for executing the self-destruction process, and the power supplies of the upper computer-control party and the storage module-executing party are the same. This leads to the following drawbacks: in the self-destruction process, if the only power supply is suddenly powered off, even if the upper computer sends a self-destruction instruction, the storage module still can not complete the started self-destruction operation due to the sudden power off, and finally the data self-destruction processing of the single chip microcomputer fails.
Disclosure of Invention
The invention aims to solve the technical defects and provides a data self-destruction method of a multi-power-supply storage module.
In order to achieve the above object, the present invention provides a data self-destruction method for a multi-power-supply storage module, comprising:
the upper computer initializes the value of a local data self-destruction state word as an initial state value;
the upper computer sends a self-destruction preprocessing instruction to the storage module;
after the storage module acquires the self-destruction preprocessing instruction sent by the upper computer, internal data read-write prohibition processing is carried out to generate a first execution result, a local data read-write permission status word is set according to the first execution result, and the first execution result is sent to the upper computer;
the upper computer acquires the first execution result sent by the storage module to generate a first instruction state;
when the first instruction state is successful in execution, the upper computer sends a first power supply switching instruction to the storage module;
after the storage module acquires the first power supply switching instruction sent by the upper computer, the storage module performs first power supply mode switching processing to generate a second execution result, sets a local power supply mode status word according to the second execution result, and sends the second execution result to the upper computer;
the upper computer acquires the second execution result sent by the storage module to generate a second instruction state;
when the second instruction state is successful in execution, the upper computer sends a self-destruction instruction to the storage module;
after the storage module acquires the self-destruction instruction sent by the upper computer, the data self-destruction processing is carried out on an internal self-destruction data area of the storage module to generate a third execution result, and the third execution result is sent to the upper computer;
the upper computer acquires the third execution result sent by the storage module to generate a third instruction state;
when the third instruction state is successful in execution, the upper computer sends a second power supply switching instruction to the storage module;
after the storage module acquires the second power supply switching instruction sent by the upper computer, second power supply mode switching processing is carried out to generate a fourth execution result, the local power supply mode status word is set according to the fourth execution result, and the fourth execution result is sent to the upper computer;
the upper computer acquires the fourth execution result sent by the storage module to generate a fourth instruction state;
when the fourth instruction state is successful in execution, the upper computer sends a self-destruction unlocking instruction to the storage module;
after the storage module acquires the self-destruction unlocking instruction sent by the upper computer, internal data unlocking read-write processing is carried out to generate a fifth execution result, the local data read-write permission status word is set according to the fifth execution result, and the fifth execution result is sent to the upper computer;
the upper computer obtains the fifth execution result sent by the storage module to generate a fifth instruction state;
and when the fifth instruction state is successful in execution, the upper computer sets the value of the local data self-destruction state word as a success state value.
Further, the method further comprises:
when the first instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a preprocessing failure value and quits self-destruction processing;
when the second instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a first power supply switching failure value and quits self-destruction processing;
when the third instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a data self-destruction failure value and quits self-destruction processing;
when the fourth instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a second power supply switching failure value and quits self-destruction processing;
and when the fifth instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a read-write unlocking failure value and quits the self-destruction processing.
Further, the setting a local data read-write permission status word according to the first execution result specifically includes:
and when the value of the first execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word as a closed state.
Further, after the storage module obtains the first power supply switching instruction sent by the upper computer, the storage module performs first power supply mode switching processing to generate a second execution result, and sets a local power supply mode status word according to the second execution result, which specifically includes:
after the storage module acquires the first power supply switching instruction sent by the upper computer, acquiring a local power supply mode status word;
when the value of the power supply mode status word is in a first power supply mode, the storage module performs first power supply mode switching processing, and generates a second execution result according to an execution status value of the first power supply mode switching;
and when the value of the second execution result is that the execution is successful, the storage module sets the value of the local power supply mode status word as a second power supply mode.
Further, after the storage module obtains the self-destruction instruction sent by the upper computer, the storage module performs data self-destruction processing on an internal self-destruction data area of the storage module to generate a third execution result, which specifically includes:
after the storage module acquires the self-destruction instruction sent by the upper computer, acquiring a starting address value of the internal self-destruction data area to generate a first starting address, and acquiring an ending address value of the internal self-destruction data area to generate a first ending address;
the storage module initializes first erasing data, second erasing data and third erasing data;
the storage module carries out first physical erasing processing on the internal self-destruction data area according to the first erasing data, the first starting address and the first ending address;
after the first physical erasure is successfully executed, the storage module performs a second physical erasure processing on the internal self-destruction data area according to the second erasure data, the first start address and the first end address;
after the second physical erasure is successfully executed, the storage module performs third physical erasure processing on the internal self-destruction data area according to the third erasure data, the first start address and the first end address;
and when the third physical erasure is successfully executed, the storage module generates a third execution result according to the execution state value of the third physical erasure.
Preferably, the method further comprises:
the first physical erasure is specifically that the memory module performs sequential byte writing processing on the internal self-destruction data area from the first start address to the first end address according to the value of the first erasure data;
the second physical erasure is specifically that the memory module performs sequential byte writing processing on the internal self-destruction data area from the first start address to the first end address according to the value of the second erasure data;
the third physical erasing is specifically that the memory module performs sequential byte writing processing on the internal self-destruction data area from the first start address to the first end address according to the value of the third erasing data.
Preferably, the method further comprises:
after the first physical erasing execution fails, the storage module sets the value of the third execution result as the execution failure, the storage module quits the data self-destruction and sends the value of the third execution result to the upper computer;
after the second physical erasing execution fails, the storage module sets the value of the third execution result as the execution failure, the storage module quits the data self-destruction and sends the value of the third execution result to the upper computer;
and after the third physical erasing execution fails, the storage module sets the value of the third execution result as the execution failure, quits the data self-destruction and sends the value of the third execution result to the upper computer.
Further, after the storage module obtains the second power supply switching instruction sent by the upper computer, the storage module performs second power supply mode switching processing to generate a fourth execution result, and sets the local power supply mode status word according to the fourth execution result, which specifically includes:
after the storage module acquires the second power supply switching instruction sent by the upper computer, acquiring a local power supply mode status word;
when the value of the power supply mode status word is in a second power supply mode, the storage module performs second power supply mode switching processing, and generates a fourth execution result according to an execution status value of the second power supply mode switching;
and when the value of the fourth execution result is that the execution is successful, the storage module sets the value of the power supply mode status word as a first power supply mode.
Further, the setting a local data read-write permission status word according to the fifth execution result specifically includes:
and when the value of the fifth execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word to be in an open state.
According to the data self-destruction method of the multi-power-supply storage module, after the upper computer initiates a data self-destruction process, the power supply of the storage module is switched, so that the working power supply of the storage module is not restricted by the working power supply of the upper computer. And then, even if the working power supply of the upper computer is damaged, the self-destruction action of the storage module on the data in the storage medium can be continuously and smoothly completed.
Drawings
Fig. 1 is a schematic working diagram of a data self-destruction method for a multi-power-supply storage module according to an embodiment of the present invention;
fig. 2 is a schematic working diagram of a data self-destruction method for a multi-power-supply storage module according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The complete process of the data self-destruction of the method comprises the following steps: the method comprises five parts of self-destruction preprocessing, first power supply switching processing, data self-destruction processing, second power supply switching processing and self-destruction after-unlocking processing. The method of the invention relates to two operation parties, an upper computer and a storage module, wherein the upper computer is a controller initiating a data self-destruction path in a single chip microcomputer, and the storage module is an executive party executing a data self-destruction process.
And the upper computer enters a flow 1 after initializing the value of the self-destruction state word to be in an initial state.
The process 1 is a self-destruction pretreatment process. Initiating a self-destruction preprocessing instruction to the storage module by the upper computer, and requiring the storage module to enter a self-destruction preprocessing state; after receiving the self-destruction preprocessing instruction, the storage module performs internal data read-write forbidding processing on the data area needing self-destruction operation, so that the access function of the data area is cut off, and the possibility of detecting the data is also closed from the data use level while the subsequent data erasure is not influenced; after the storage module finishes the internal data read-write forbidding processing, a first execution result for identifying the internal data read-write forbidding processing execution state is returned to the upper computer, and a local data read-write permission state word is set to be in a closed state for being used for inquiry; and the upper computer generates a first instruction state as an execution return state of the self-destruction preprocessing instruction according to the received first execution result, judges the first instruction state, and continues to execute the subsequent flow to enter the flow 2 when the first instruction state is the execution success.
And a process 2, a first power switching process. Initiating a first power supply switching instruction to the storage module by the upper computer, and requiring the storage module to enter a first power supply switching processing state; after receiving the first power supply switching instruction, the storage module performs first power supply mode switching processing, switches the power supply of the working environment of the storage module from the first power supply to the second power supply, and provides working power supply of a source different from the source of the upper computer for subsequent data erasing so as to ensure that the subsequent data erasing can not be influenced by power failure of the upper computer; after the storage module finishes the first power supply mode switching processing, a second execution result which identifies the execution state of the first power supply mode switching processing is returned to the upper computer, and the value of the local power supply mode status word is set to be a second power supply mode for query and use; and the upper computer generates a second instruction state as an execution return state of the first power supply switching instruction according to the received second execution result, judges the second instruction state, and continues to execute the subsequent flow when the second instruction state is successful, and enters the flow 3.
And 3, a data self-destruction processing flow. Initiating a self-destruction instruction to the storage module by the upper computer, and requiring the storage module to enter a self-destruction state; after receiving the self-destruction instruction, the storage module carries out data self-destruction processing, and carries out three times of physical erasing on a data area stored by the internal self-destruction data, namely: first, second and third physical data erasing processes (the physical data erasing process is not limited by local data read-write authority status word); after the storage module finishes data erasing processing, a third execution result which identifies the self-destruction processing execution state of the data is returned to the upper computer; and the upper computer generates a third instruction state as an execution return state of the self-destruction instruction according to the received third execution result, judges the third instruction state, and continues to execute the subsequent flow and enters the flow 4 when the third instruction state is the execution success.
And 4, a second power supply switching processing flow. Initiating a second power supply switching instruction to the storage module by the upper computer, and requiring the storage module to enter a second power supply switching processing state; after receiving the second power supply switching instruction, the storage module performs second power supply mode switching processing, and switches the power supply of the working environment of the storage module from the second power supply to the first power supply; after the storage module finishes the second power supply mode switching processing, a fourth execution result for identifying the execution state of the second power supply mode switching processing is returned to the upper computer, and the value of the local power supply mode status word is set as the first power supply mode for query and use; and the upper computer generates a fourth instruction state as an execution return state of the second power supply switching instruction according to the received fourth execution result, judges the fourth instruction state, and continues to execute a subsequent flow and enters a flow 5 when the fourth instruction state is successful in execution.
And 5, a self-destruction and post-unlocking processing flow. Initiating a self-destruction unlocking instruction to the storage module by the upper computer, and requiring the storage module to enter a self-destruction unlocking state; after receiving the self-destruction unlocking instruction, the storage module performs internal data unlocking read-write processing on the data area subjected to self-destruction operation, so as to recover the access function of the data area; after the storage module finishes the internal data unlocking read-write processing, a fifth execution result for marking the execution state of the internal data unlocking read-write processing is returned to the upper computer, and a local data read-write permission state word is set to be in an open state for being inquired and used; and the upper computer generates a fifth instruction state as an execution return state of the self-destruction after-unlocking instruction according to the received fifth execution result.
And the upper computer judges the fifth instruction state, and sets the value of the self-destruction state word as a success state value when the fifth instruction state is the execution success.
So far, through the process 1-5, the single chip completes the whole process of data self-destruction. The key flow is a flow 3, in the whole process of the flow 3, the power supply of the storage module is completely separated from the power supply of the upper computer, and even if the first power supply of the upper computer is disabled, the storage module can smoothly complete the data self-destruction flow by means of the switched second power supply.
In the first embodiment of the present invention, as shown in fig. 1, which is a schematic working diagram of a multi-power-supply storage module data self-destruction method provided in the first embodiment of the present invention, the method specifically includes the following steps:
And step 102, the upper computer sends a self-destruction preprocessing instruction to the storage module.
103, after the storage module obtains the self-destruction preprocessing instruction sent by the upper computer, the storage module performs internal data read-write inhibition processing to generate a first execution result, sets a local data read-write permission status word according to the first execution result, and sends the first execution result to the upper computer,
the method specifically comprises the following steps: step 1031, after the storage module obtains the self-destruction preprocessing instruction sent by the upper computer, the internal data read-write forbidding processing is carried out, and a first execution result is generated according to the execution state value of the internal data read-write forbidding;
step 1032, when the value of the first execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word as a closed status;
and 1033, the storage module sends the first execution result to the upper computer.
And 104, the upper computer acquires a first execution result sent by the storage module to generate a first instruction state.
And 105, when the first instruction state is that the execution is successful, the upper computer sends a first power supply switching instruction to the storage module.
the method specifically comprises the following steps: step 1061, after the storage module acquires a first power supply switching instruction sent by the upper computer, acquiring a local power supply mode status word;
step 1062, when the value of the power supply mode status word is the first power supply mode, the storage module performs the first power supply mode switching process, and generates a second execution result according to the execution status value of the first power supply mode switching;
step 1063, when the value of the second execution result is that the execution is successful, the storage module sets the value of the local power supply mode status word as the second power supply mode;
step 1061, the storage module sends the second execution result to the upper computer.
And step 107, the upper computer acquires a second execution result sent by the storage module to generate a second instruction state.
And step 108, when the second instruction is executed successfully, the upper computer sends a self-destruction instruction to the storage module.
the method specifically comprises the following steps: step 1091, after the storage module obtains a self-destruction instruction sent by the upper computer, performing first physical erasing processing on a data area in which internal self-destruction data is stored;
step 1092, after the first physical erase is successfully executed, the memory module performs a second physical erase process on the data area where the internal self-destruct data is stored;
step 1093, after the second physical erase is successfully executed, the storage module performs a third physical erase process on the data area where the internal self-destruction data is stored;
step 1094, after the third physical erase is successfully executed, the storage module generates a third execution result according to the execution status value of the third physical erase;
and step 1095, the storage module sends the third execution result to the upper computer.
And step 110, the upper computer acquires a third execution result sent by the storage module to generate a third instruction state.
And step 111, when the third instruction state is that the execution is successful, the upper computer sends a second power supply switching instruction to the storage module.
the method specifically comprises the following steps: step 1121, after acquiring a second power supply switching instruction sent by the upper computer, the storage module acquires a local power supply mode status word;
step 1122, when the value of the power supply mode status word is the second power supply mode, the storage module performs a second power supply mode switching process, and generates a fourth execution result according to the execution status value of the second power supply mode switching;
step 1123, when the fourth execution result is successful, the storage module sets the value of the power supply mode status word to the first power supply mode;
and step 1124, the storage module sends the fourth execution result to the upper computer.
And 113, the upper computer acquires a fourth execution result sent by the storage module to generate a fourth instruction state.
And step 114, when the fourth instruction state is that the execution is successful, the upper computer sends a self-destruction unlocking instruction to the storage module.
115, after the storage module obtains the self-destruction unlocking instruction sent by the upper computer, the internal data unlocking read-write processing is carried out to generate a fifth execution result, the data read-write permission status word is set according to the fifth execution result, and the fifth execution result is sent to the upper computer,
the method specifically comprises the following steps: 1151, after the storage module acquires a self-destruction unlocking instruction sent by the upper computer, performing internal data unlocking read-write processing, and generating a fifth execution result according to an execution state value of the internal data unlocking read-write;
step 1152, when the value of the fifth execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word to be in an open state;
and 1153, the storage module sends the fifth execution result to the upper computer.
And step 116, the upper computer acquires a fifth execution result sent by the storage module to generate a fifth instruction state.
And step 117, when the fifth instruction state is execution success, the upper computer sets the value of the data self-destruction state word as a success state value.
In the second embodiment of the present invention, as shown in fig. 2, which is a schematic working diagram of a multi-power-supply storage module data self-destruction method provided in the second embodiment of the present invention, the second embodiment specifically includes the following steps:
the method specifically comprises the following steps: step 2031, after the storage module obtains the self-destruction preprocessing instruction sent by the upper computer, the internal data read-write forbidding processing is carried out, and a first execution result is generated according to the execution state value of the internal data read-write forbidding;
step 2032, when the first execution result is successful, the storage module sets the value of the local data read-write permission status word as a closed status;
step 2033, the storage module sends the first execution result to the upper computer.
And 204, the upper computer acquires a first execution result sent by the storage module to generate a first instruction state.
And step 206, the upper computer sends a first power supply switching instruction to the storage module.
the method specifically comprises the following steps: step 2071, after acquiring a first power supply switching instruction sent by an upper computer, a storage module acquires a local power supply mode status word;
step 2072, when the value of the power supply mode status word is the first power supply mode, the storage module performs the first power supply mode switching process, and generates a second execution result according to the execution status value of the first power supply mode switching;
step 2073, when the second execution result is successful, the storage module sets the value of the local power supply mode status word as the second power supply mode;
and 2074, the storage module sends the second execution result to the upper computer.
And step 208, the upper computer acquires a second execution result sent by the storage module to generate a second instruction state.
And step 210, the upper computer sends a self-destruction instruction to the storage module.
the method specifically comprises the following steps: step 2111, after the storage module acquires a self-destruction instruction sent by the upper computer, performing first physical erasing processing on a data area in which the internal self-destruction data is stored;
step 2112, after the first physical erase is successfully executed, the storage module performs a second physical erase process on the data area in which the internal self-destruction data is stored;
step 2113, after the second physical erase is successfully executed, the storage module performs a third physical erase process on the data area where the internal self-destruction data is stored;
step 2113, after the third physical erase is successfully executed, the storage module generates a third execution result according to the execution status value of the third physical erase;
and step 2114, the storage module sends the third execution result to the upper computer.
And step 212, the upper computer acquires a third execution result sent by the storage module to generate a third instruction state.
Step 213, determining whether the third command status is a success status, and if the third command status is a success status, going to step 214; if the third instruction state is not a success state, proceed to step 430.
And step 214, the upper computer sends a second power supply switching instruction to the storage module.
the method specifically comprises the following steps: step 2151, after the storage module obtains a second power supply switching instruction sent by the upper computer, local power supply mode status words are obtained;
step 2152, when the value of the power supply mode status word is the second power supply mode, the storage module performs second power supply mode switching processing, and generates a fourth execution result according to the execution status value of the second power supply mode switching;
step 2153, when the fourth execution result is successful, the storage module sets the value of the local power supply mode status word as the first power supply mode;
and step 2154, the storage module sends the fourth execution result to the upper computer.
And step 216, the upper computer acquires a fourth execution result sent by the storage module to generate a fourth instruction state.
And step 218, the upper computer sends a self-destruction unlocking instruction to the storage module.
the method specifically comprises the following steps: 2191, after the storage module obtains the self-destruction unlocking instruction sent by the upper computer, the internal data unlocking read-write processing is carried out, and a fifth execution result is generated according to the execution state value of the internal data unlocking read-write;
step 2192, when the value of the fifth execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word to be in an open state;
and 2193, the storage module sends the fifth execution result to the upper computer.
And step 220, the upper computer acquires a fifth execution result sent by the storage module to generate a fifth instruction state.
In step 222, when the fifth instruction is executed successfully, the upper computer sets the value of the data self-destruction status word as a successful status value.
And step 410, setting the value of the data self-destruction state word as a preprocessing failure value by the upper computer, and exiting self-destruction processing.
The main reason for the error is that the error occurs when the memory module closes the read-write permission of the self-destruction data area.
In step 420, the upper computer sets the value of the data self-destruction status word as the first power supply switching failure value and exits the self-destruction processing.
The main reason for this error is that the switching fails when the memory module performs the first power supply switching.
And step 430, setting the value of the data self-destruction state word as a data self-destruction failure value by the upper computer and quitting the self-destruction processing.
The main reason for this error is that the erase failure error occurs when the memory module physically erases the self-destructive data area.
And step 440, setting the value of the data self-destruction state word as a second power supply switching failure value by the upper computer and quitting the self-destruction processing.
The main reason for this error is that the switching fails when the storage module performs the second power supply switching.
And step 450, setting the value of the data self-destruction state word as a read-write unlocking failure value by the upper computer and quitting the self-destruction processing.
The main reason for the error is that the error occurs when the memory module opens the read-write permission of the self-destruction data area.
According to the data self-destruction method for the multi-power-supply storage module, after the upper computer initiates a data self-destruction process on the storage module powered by multiple power supplies, the second power supply is used for supplying power to the self-destruction action of the storage module through switching of the power supply, and smooth completion of the data self-destruction action is guaranteed. By using the method of the invention, the equipment safety of the single chip microcomputer is improved, and the method is more in line with the strict requirements of the financial and safety fields on data protection.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (8)
1. A multi-power-supply storage module data self-destruction method is characterized by comprising the following steps:
the upper computer initializes the value of a local data self-destruction state word as an initial state value;
the upper computer sends a self-destruction preprocessing instruction to the storage module;
after the storage module acquires the self-destruction preprocessing instruction sent by the upper computer, internal data read-write prohibition processing is carried out to generate a first execution result, a local data read-write permission status word is set according to the first execution result, and the first execution result is sent to the upper computer;
the upper computer acquires the first execution result sent by the storage module to generate a first instruction state;
when the first instruction state is successful in execution, the upper computer sends a first power supply switching instruction to the storage module;
after the storage module acquires the first power supply switching instruction sent by the upper computer, the storage module performs first power supply mode switching processing to generate a second execution result, sets a local power supply mode status word according to the second execution result, and sends the second execution result to the upper computer;
the upper computer acquires the second execution result sent by the storage module to generate a second instruction state;
when the second instruction state is successful in execution, the upper computer sends a self-destruction instruction to the storage module;
after the storage module acquires the self-destruction instruction sent by the upper computer, the data self-destruction processing is carried out on an internal self-destruction data area of the storage module to generate a third execution result, and the third execution result is sent to the upper computer;
the upper computer acquires the third execution result sent by the storage module to generate a third instruction state;
when the third instruction state is successful in execution, the upper computer sends a second power supply switching instruction to the storage module;
after the storage module acquires the second power supply switching instruction sent by the upper computer, second power supply mode switching processing is carried out to generate a fourth execution result, the local power supply mode status word is set according to the fourth execution result, and the fourth execution result is sent to the upper computer;
the upper computer acquires the fourth execution result sent by the storage module to generate a fourth instruction state;
when the fourth instruction state is successful in execution, the upper computer sends a self-destruction unlocking instruction to the storage module;
after the storage module acquires the self-destruction unlocking instruction sent by the upper computer, internal data unlocking read-write processing is carried out to generate a fifth execution result, the local data read-write permission status word is set according to the fifth execution result, and the fifth execution result is sent to the upper computer;
the upper computer obtains the fifth execution result sent by the storage module to generate a fifth instruction state;
and when the fifth instruction state is successful in execution, the upper computer sets the value of the local data self-destruction state word as a success state value.
2. The method of claim 1, further comprising:
when the first instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a preprocessing failure value and quits self-destruction processing;
when the second instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a first power supply switching failure value and quits self-destruction processing;
when the third instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a data self-destruction failure value and quits self-destruction processing;
when the fourth instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a second power supply switching failure value and quits self-destruction processing;
and when the fifth instruction state is execution failure, the upper computer sets the value of the data self-destruction state word as a read-write unlocking failure value and quits the self-destruction processing.
3. The method according to claim 1, wherein the setting a local data read-write permission status word according to the first execution result specifically includes:
and when the value of the first execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word as a closed state.
4. The method according to claim 1, wherein after the storage module obtains the first power supply switching instruction sent by the upper computer, the storage module performs first power supply mode switching processing to generate a second execution result, and sets a local power supply mode status word according to the second execution result, specifically including:
after the storage module acquires the first power supply switching instruction sent by the upper computer, acquiring a local power supply mode status word;
when the value of the power supply mode status word is in a first power supply mode, the storage module performs first power supply mode switching processing, and generates a second execution result according to an execution status value of the first power supply mode switching;
and when the value of the second execution result is that the execution is successful, the storage module sets the value of the local power supply mode status word as a second power supply mode.
5. The method according to claim 1, wherein after the storage module obtains the self-destruction instruction sent by the upper computer, the storage module performs data self-destruction processing on an internal self-destruction data area of the storage module to generate a third execution result, specifically comprising:
after the storage module acquires the self-destruction instruction sent by the upper computer, acquiring a starting address value of the internal self-destruction data area to generate a first starting address, and acquiring an ending address value of the internal self-destruction data area to generate a first ending address;
the storage module initializes first erasing data, second erasing data and third erasing data;
the storage module carries out first physical erasing processing on the internal self-destruction data area according to the first erasing data, the first starting address and the first ending address;
after the first physical erasure is successfully executed, the storage module performs a second physical erasure processing on the internal self-destruction data area according to the second erasure data, the first start address and the first end address;
after the second physical erasure is successfully executed, the storage module performs third physical erasure processing on the internal self-destruction data area according to the third erasure data, the first start address and the first end address;
after the third physical erasure is successfully executed, the storage module generates a third execution result according to the execution state value of the third physical erasure;
the first erasing data, the second erasing data and the third erasing data are respectively data stored in the internal self-destruction data area;
the first physical erasure is specifically that the memory module performs sequential byte writing processing on the internal self-destruction data area from the first start address to the first end address according to the value of the first erasure data;
the second physical erasure is specifically that the memory module performs sequential byte writing processing on the internal self-destruction data area from the first start address to the first end address according to the value of the second erasure data;
the third physical erasing is specifically that the memory module performs sequential byte writing processing on the internal self-destruction data area from the first start address to the first end address according to the value of the third erasing data.
6. The method of claim 5, further comprising:
after the first physical erasing execution fails, the storage module sets the value of the third execution result as the execution failure, the storage module quits the data self-destruction and sends the value of the third execution result to the upper computer;
after the second physical erasing execution fails, the storage module sets the value of the third execution result as the execution failure, the storage module quits the data self-destruction and sends the value of the third execution result to the upper computer;
and after the third physical erasing execution fails, the storage module sets the value of the third execution result as the execution failure, quits the data self-destruction and sends the value of the third execution result to the upper computer.
7. The method according to claim 1, wherein after the storage module obtains the second power supply switching instruction sent by the upper computer, performing second power supply mode switching processing to generate a fourth execution result, and setting the local power supply mode status word according to the fourth execution result specifically includes:
after the storage module acquires the second power supply switching instruction sent by the upper computer, acquiring a local power supply mode status word;
when the value of the power supply mode status word is in a second power supply mode, the storage module performs second power supply mode switching processing, and generates a fourth execution result according to an execution status value of the second power supply mode switching;
and when the value of the fourth execution result is that the execution is successful, the storage module sets the value of the power supply mode status word as a first power supply mode.
8. The method according to claim 1, wherein the setting the local data read-write permission status word according to the fifth execution result specifically includes:
and when the value of the fifth execution result is that the execution is successful, the storage module sets the value of the local data read-write permission status word to be in an open state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910584011.1A CN110298205B (en) | 2019-06-28 | 2019-06-28 | Multi-power-supply storage module data self-destruction method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910584011.1A CN110298205B (en) | 2019-06-28 | 2019-06-28 | Multi-power-supply storage module data self-destruction method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110298205A CN110298205A (en) | 2019-10-01 |
CN110298205B true CN110298205B (en) | 2021-03-19 |
Family
ID=68029759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910584011.1A Active CN110298205B (en) | 2019-06-28 | 2019-06-28 | Multi-power-supply storage module data self-destruction method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110298205B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107818257A (en) * | 2017-11-23 | 2018-03-20 | 迈普通信技术股份有限公司 | One kind illegally tears machine data self-desttruction equipment and electronic equipment open |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL183024A0 (en) * | 2007-05-06 | 2008-03-20 | Gita Technologies Ltd | Safe self-destruction of data |
CN101615235A (en) * | 2009-08-04 | 2009-12-30 | 青岛海信智能商用设备有限公司 | A kind of self-destruction system for memory data |
CN104461945A (en) * | 2014-12-25 | 2015-03-25 | 浪潮集团有限公司 | Remote control crash-proof irreversible self-destroying method for solid-state drive |
CN105825151A (en) * | 2016-04-11 | 2016-08-03 | 浪潮集团有限公司 | Method for remotely controlling self destruction of solid-state disk |
CN106372542B (en) * | 2016-11-04 | 2024-02-20 | 上海控易电子科技有限公司 | Data protection self-destruction system |
CN108537069B (en) * | 2018-01-17 | 2021-07-06 | 中北大学 | Self-destruction method for data of storage tester |
-
2019
- 2019-06-28 CN CN201910584011.1A patent/CN110298205B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107818257A (en) * | 2017-11-23 | 2018-03-20 | 迈普通信技术股份有限公司 | One kind illegally tears machine data self-desttruction equipment and electronic equipment open |
Also Published As
Publication number | Publication date |
---|---|
CN110298205A (en) | 2019-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5327497A (en) | Preboot protection of unauthorized use of programs and data with a card reader interface | |
CN110020560B (en) | Electronic disk system and method with data self-destruction protection function | |
EP1001331B1 (en) | Pre-boot security controller | |
CN103207975A (en) | Method for protecting password and computer | |
US8359481B2 (en) | Secured coprocessor comprising an event detection circuit | |
CN108108631A (en) | A kind of root key processing method and relevant apparatus | |
US20120110238A1 (en) | Data security in solid state memory | |
CN100474324C (en) | Authentication method and authentication apparatus | |
US10705141B2 (en) | Method for managing a return of a product for analysis and corresponding product | |
CN105934751B (en) | Data erasure for target devices | |
KR102195344B1 (en) | Security system and method for computer using usb storage medium | |
CN111130602B (en) | Near field communication card data writing system, method, device and medium | |
JP2001356963A (en) | Semiconductor device and its control device | |
CN105005721B (en) | Computer mandate opening control system and method based on computer booting key | |
CN100583119C (en) | Mobile memory and method for controlling data download of computer | |
US20190196981A1 (en) | Systems And Methods For Providing Connected Anti-Malware Backup Storage | |
CN110795776A (en) | Safety hard disk | |
CN114793159A (en) | Random encryption method applied to automobile ECU controller | |
KR100966236B1 (en) | Computer with authentication type ssd and operating method of it | |
EP2207120A2 (en) | System operating method using hardware lock and electronic device started by utilizing hardware lock | |
CN110298205B (en) | Multi-power-supply storage module data self-destruction method | |
US20180373603A1 (en) | Web Application System and Database Utilization Method Therefor | |
CN218068848U (en) | Embedded software encryption protection system based on CPLD | |
CN109583206B (en) | Method, device, equipment and storage medium for monitoring access process of application program | |
CN106446629A (en) | Security encryption method and system for intelligent mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100080, Beijing, Suzhou Street, Haidian District No. 20, building 2, on the north side of the four floor Applicant after: Zhaoxun Hengda Technology Co., Ltd Address before: 100080, Beijing, Suzhou Street, Haidian District No. 20, building 2, on the north side of the four floor Applicant before: MEGAHUNT MICROELECTRONIC TECH. (BEIJING) Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |