CN103514390A - Method and device for data self-destroying and digital device - Google Patents
Method and device for data self-destroying and digital device Download PDFInfo
- Publication number
- CN103514390A CN103514390A CN201310430771.XA CN201310430771A CN103514390A CN 103514390 A CN103514390 A CN 103514390A CN 201310430771 A CN201310430771 A CN 201310430771A CN 103514390 A CN103514390 A CN 103514390A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- destroying
- data
- self
- processing module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 13
- 230000008878 coupling Effects 0.000 claims description 12
- 238000010168 coupling process Methods 0.000 claims description 12
- 238000005859 coupling reaction Methods 0.000 claims description 12
- 230000006378 damage Effects 0.000 claims description 7
- 238000005516 engineering process Methods 0.000 description 2
- 230000013011 mating Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method and device for data self-destroying and a digital device. The data self-destroying method comprises the steps that an input fingerprint is obtained, if the input fingerprint is matched with a self-destroying fingerprint is judged, if yes, protected data are deleted without any prompt information, when an owner is coerced to open a storage device, due to the fact that a self-destroying fingerprint for automatically destroying data in the storage device is registered in advance, as long as a finger corresponding to the self-destroying fingerprint is used for recording the fingerprint, the obtained secret data can be automatically deleted under the condition that a menacer even does not know, the menacer still thinks that operation is carried out on the condition that the owner is in cooperation without thinking that the owner once obtains the secret data, and personal safety of the owner is protected to a certain extent.
Description
Technical field
The present invention relates to field of encryption, particularly relate to a kind of data from destroying method, device and digital equipment.
Background technology
The data encryption of digital camera, Digital Video etc. is very common function, thereby in equipment loss or unauthorized situation, by other people unauthorized access.
For example, but for some situation, when being forced, equipment everyone still need password to tell intimidator, like this, intimidator is data in fetch equipment smoothly still, bring very large threat to the proprietary personal safety of equipment.
Summary of the invention
The object of this invention is to provide a kind of data that can auto-destruct data from destroying method, device and digital equipment.
For solving the problems of the technologies described above, as first aspect of the present invention, provide a kind of data from destroying method, comprising: obtain input fingerprint; Relatively input fingerprint and whether mate from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.
Further, if do not mated, point out user typing fingerprint again.
Further, also comprise: relatively input fingerprint and whether mate with checking fingerprint, if coupling allows access protected data.
Further, also comprise: if do not mated, point out user typing fingerprint again.
As second aspect of the present invention, provide a kind of data from apparatus for destroying, comprising: fingerprint acquisition module, for obtaining input fingerprint; From destroying processing module, for relatively inputting fingerprint and whether mating from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.
Further, certainly destroy processing module and also comprise: the first Tip element, in unmatched situation, prompting user is typing fingerprint again.
Further, also comprise: whether checking processing module, have in relatively inputting fingerprint and mate with checking fingerprint, if coupling allows access protected data.
Further, checking processing module also comprises: the second Tip element, in unmatched situation, prompting user is typing fingerprint again.
As San Ge of the present invention aspect, a kind of digital equipment is provided, comprising: storage unit, for storing data and the fingerprint of destruction certainly for data being carried out certainly destroy; Also comprise that above-mentioned data are from apparatus for destroying, it obtains the fingerprint of destruction certainly of storing in storage unit.
When everyone is forced and must opens memory device; due to registered in advance for the fingerprint of destruction certainly of the data of auto-destruct memory device; therefore; only need utilization certainly to destroy the corresponding finger of fingerprint with this and carry out fingerprint typing; can be in the situation that coercing people and knowing nothing; automatically delete the secret data that it has obtained; and now coerce people, also think that everyone is the operation of carrying out in the situation that coordinating; thereby can not think that everyone once obtained secret data, may protect to a certain extent proprietary personal safety.
Accompanying drawing explanation
Fig. 1 has schematically shown process flow diagram of the present invention.
Embodiment
Below embodiments of the invention are elaborated, but the multitude of different ways that the present invention can be defined by the claims and cover is implemented.
As a first aspect of the present invention, provide a kind of data from destroying method, comprising: obtain input fingerprint; Relatively input fingerprint and whether mate from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.Preferably, if do not mated, point out user typing fingerprint again.
When everyone is forced and must opens memory device; due to registered in advance for the fingerprint of destruction certainly of the data of auto-destruct memory device; therefore; only need utilization certainly to destroy the corresponding finger of fingerprint with this and carry out fingerprint typing; can be in the situation that coercing people and knowing nothing; automatically delete the secret data that it has obtained; and now coerce people, also think that everyone is the operation of carrying out in the situation that coordinating; thereby can not think that everyone once obtained secret data, may protect to a certain extent proprietary personal safety.
Preferably, also comprise: relatively input fingerprint and whether mate with checking fingerprint, if coupling allows access protected data.Preferably, also comprise: if do not mated, point out user typing fingerprint again.
When the normal accessing storage device of needs, can use chartered checking fingerprint, after checking fingerprint is by checking, can normal visit data equipment.If passage not, can denied access, but still can retain the secret data in memory device.
As a second aspect of the present invention, provide a kind of data from apparatus for destroying, comprising: fingerprint acquisition module, for obtaining input fingerprint; From destroying processing module, for relatively inputting fingerprint and whether mating from destroying fingerprint, if coupling is deleted protected data in the situation that not providing any information.
Preferably, certainly destroy processing module and also comprise: the first Tip element, in unmatched situation, prompting user is typing fingerprint again.
Preferably, also comprise: whether checking processing module, have in relatively inputting fingerprint and mate with checking fingerprint, if coupling allows access protected data.
Preferably, checking processing module also comprises: the second Tip element, in unmatched situation, prompting user is typing fingerprint again.
As a third aspect of the present invention, a kind of digital equipment is provided, comprising: storage unit, for storing data and the fingerprint of destruction certainly for data being carried out certainly destroy; Also comprise that above-mentioned data are from apparatus for destroying, it obtains the fingerprint of destruction certainly of storing in storage unit.
For example, digital equipment can refer to the various portable digital equipments of the prior art such as digital camera, video camera, recording pen, panel computer, mobile phone, notebook computer, video playback apparatus (such as MP4 etc.).
Obviously, digital equipment in the present invention, can also refer to various portable set of the prior art (such as digital camera, video camera, recording pen, panel computer, mobile phone, notebook computer, video playback apparatus (such as MP4 etc.)) and the system forming with computer that this equipment is used in conjunction with.Now, storage unit is arranged in portable set, and data are arranged in computer from apparatus for destroying.
Those skilled in the art will also understand is that, in conjunction with the described various illustrative logical blocks of disclosure herein, unit, circuit and algorithm steps, may be implemented as electronic hardware, computer software or both combinations.For this interchangeability of hardware and software is clearly described, with regard to the function of various exemplary components, square, unit, circuit and step, it has been carried out to general description.This function is implemented as software or is implemented as hardware and depends on concrete application and the design constraint that imposes on whole system.Those skilled in the art can realize described function in every way for every kind of concrete application, but this realization determines should not be interpreted as causing departing from the scope of the present invention.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (9)
1. data, from a destroying method, is characterized in that, comprising:
Obtain input fingerprint;
Whether more described input fingerprint is destroyed fingerprint with oneself and is mated, if coupling is deleted protected data in the situation that not providing any information.
2. data according to claim 1, from destroying method, is characterized in that, if do not mated, point out user typing fingerprint again.
3. data according to claim 1, from destroying method, is characterized in that, also comprise:
Whether more described input fingerprint mates with checking fingerprint, if coupling allows the described protected data of access.
4. data according to claim 1, from destroying method, is characterized in that, also comprise: if do not mated, point out user typing fingerprint again.
5. data, from an apparatus for destroying, is characterized in that, comprising:
Fingerprint acquisition module, for obtaining input fingerprint;
From destroying processing module, for more described input fingerprint, destroy fingerprint with oneself and whether mate, if coupling is deleted protected data in the situation that not providing any information.
6. data according to claim 5, from apparatus for destroying, is characterized in that, describedly also comprise from destroying processing module:
The first Tip element, in unmatched situation, prompting user is typing fingerprint again.
7. data according to claim 5, from apparatus for destroying, is characterized in that, also comprise:
Whether checking processing module, have in more described input fingerprint and mate with checking fingerprint, if coupling allows the described protected data of access.
8. data according to claim 5, from apparatus for destroying, is characterized in that, described checking processing module also comprises:
The second Tip element, in unmatched situation, prompting user is typing fingerprint again.
9. a digital equipment, is characterized in that, comprising: storage unit, for storing data and the fingerprint of destruction certainly for described data being carried out certainly destroy; Also comprise that in claim 5 to 8, the data described in any one are from apparatus for destroying, it obtains store in described storage unit described from destroying fingerprint.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310430771.XA CN103514390A (en) | 2013-09-18 | 2013-09-18 | Method and device for data self-destroying and digital device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310430771.XA CN103514390A (en) | 2013-09-18 | 2013-09-18 | Method and device for data self-destroying and digital device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103514390A true CN103514390A (en) | 2014-01-15 |
Family
ID=49897097
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310430771.XA Pending CN103514390A (en) | 2013-09-18 | 2013-09-18 | Method and device for data self-destroying and digital device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103514390A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205410A (en) * | 2015-09-14 | 2015-12-30 | 维沃移动通信有限公司 | Method and terminal for managing data |
WO2017185464A1 (en) * | 2016-04-29 | 2017-11-02 | 宇龙计算机通信科技(深圳)有限公司 | Data clearing method and terminal device |
CN109831300A (en) * | 2017-11-23 | 2019-05-31 | 航天信息股份有限公司 | A kind of cipher key destruction method and device |
CN113568846A (en) * | 2021-07-29 | 2021-10-29 | 联想长风科技(北京)有限公司 | Method and device for destroying encrypted hard disk |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299690A (en) * | 2008-06-26 | 2008-11-05 | 蓝汛网络科技(北京)有限公司 | Method, system and apparatus for monitoring multimedia contents |
CN102710328A (en) * | 2012-04-27 | 2012-10-03 | 深圳光启创新技术有限公司 | Method and system for modifying fingerprint information |
CN102930194A (en) * | 2012-09-20 | 2013-02-13 | 无锡华御信息技术有限公司 | Data security operating system and method based on authority management and control |
CN102968600A (en) * | 2012-10-30 | 2013-03-13 | 国网电力科学研究院 | Full life-cycle management method for sensitive data file based on fingerprint information implantation |
CN103279698A (en) * | 2013-05-06 | 2013-09-04 | 天津踏浪科技股份有限公司 | Electronic record keeping hand-held terminal based on fingerprint identification |
-
2013
- 2013-09-18 CN CN201310430771.XA patent/CN103514390A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299690A (en) * | 2008-06-26 | 2008-11-05 | 蓝汛网络科技(北京)有限公司 | Method, system and apparatus for monitoring multimedia contents |
CN102710328A (en) * | 2012-04-27 | 2012-10-03 | 深圳光启创新技术有限公司 | Method and system for modifying fingerprint information |
CN102930194A (en) * | 2012-09-20 | 2013-02-13 | 无锡华御信息技术有限公司 | Data security operating system and method based on authority management and control |
CN102968600A (en) * | 2012-10-30 | 2013-03-13 | 国网电力科学研究院 | Full life-cycle management method for sensitive data file based on fingerprint information implantation |
CN103279698A (en) * | 2013-05-06 | 2013-09-04 | 天津踏浪科技股份有限公司 | Electronic record keeping hand-held terminal based on fingerprint identification |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205410A (en) * | 2015-09-14 | 2015-12-30 | 维沃移动通信有限公司 | Method and terminal for managing data |
CN105205410B (en) * | 2015-09-14 | 2018-06-26 | 维沃移动通信有限公司 | Data managing method and terminal |
WO2017185464A1 (en) * | 2016-04-29 | 2017-11-02 | 宇龙计算机通信科技(深圳)有限公司 | Data clearing method and terminal device |
CN109831300A (en) * | 2017-11-23 | 2019-05-31 | 航天信息股份有限公司 | A kind of cipher key destruction method and device |
CN113568846A (en) * | 2021-07-29 | 2021-10-29 | 联想长风科技(北京)有限公司 | Method and device for destroying encrypted hard disk |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7793108B2 (en) | Method of creating password schemes for devices | |
US20180152296A1 (en) | Electronic data protection method and device and terminal device | |
CN105279449A (en) | Context based data access control | |
CN103902862A (en) | Mobile device management method and device and mobile device | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
KR101659590B1 (en) | Secure deletion of data stored in a memory | |
CN105574418A (en) | Data encryption method and apparatus | |
CN103377364A (en) | Fingerprint verification method for electronic device and system | |
US20130254899A1 (en) | Data protecting system and protecting method | |
US9563773B2 (en) | Systems and methods for securing BIOS variables | |
CN103514390A (en) | Method and device for data self-destroying and digital device | |
KR20140051487A (en) | Device and method for protecting data in terminal | |
US9043931B2 (en) | USB drive with multiple printed circuit board layers for storing data in a memory | |
WO2015176531A1 (en) | Terminal data writing and reading methods and devices | |
CN108287988B (en) | Security management system and method for mobile terminal file | |
JP7105495B2 (en) | Segmented key authenticator | |
CN105631302A (en) | State control method and device of mobile equipment | |
CN106326782A (en) | Information processing method and electronic device | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
US20150020165A1 (en) | System of executing application and method thereof | |
CN104182706B (en) | A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card | |
KR101559915B1 (en) | A system of managing shared data in the smart phone by using couple finger-prints | |
US10779432B1 (en) | Modular edge data center that autonomously secures information technology components, computing workload, and data in response to unexpected loss of communication | |
CN104065855A (en) | Camera device | |
CN113868702A (en) | Object moving method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20160108 Address after: Nanshan District Kewei road Shenzhen City, Guangdong province 518000 No. 1 kendat East Building Room 501 Applicant after: Shenzhen City Hui teckwin Multimedia Limited Address before: 408, room 2, 198, Washington garden, Washington Road, Nanshan District, Shenzhen,, Guangdong Applicant before: Wu Xianhong |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140115 |