[go: up one dir, main page]

HK1151875B - Method of clearing data in a computer and computer - Google Patents

Method of clearing data in a computer and computer Download PDF

Info

Publication number
HK1151875B
HK1151875B HK11106010.0A HK11106010A HK1151875B HK 1151875 B HK1151875 B HK 1151875B HK 11106010 A HK11106010 A HK 11106010A HK 1151875 B HK1151875 B HK 1151875B
Authority
HK
Hong Kong
Prior art keywords
computer
data
command
clearing
wireless module
Prior art date
Application number
HK11106010.0A
Other languages
Chinese (zh)
Other versions
HK1151875A1 (en
Inventor
于红旗
徐欣
吴佳
Original Assignee
湖南源科创新科技有限公司
Filing date
Publication date
Priority claimed from CN201010280524.2A external-priority patent/CN101916233B/en
Application filed by 湖南源科创新科技有限公司 filed Critical 湖南源科创新科技有限公司
Publication of HK1151875A1 publication Critical patent/HK1151875A1/en
Publication of HK1151875B publication Critical patent/HK1151875B/en

Links

Abstract

The present invention provides a data clearing method and computer for a computer, the method comprising: the computer receiving a command to clear data through a wireless network, or sensing a command to generate clear data upon disassembly; The computer clears data from its own memory.Computers include memory, wireless modules, as well as control chips, sensors, and power supplies; The control chip is connected to the memory, wireless module, sensor, and power supply respectively, and obtains the command to clear data through the wireless module or sensor, executes the command, and clears the data in the memory.The present invention adopts the method of obtaining the user's startup authorization before powering on, which improves the confidentiality of computer data; Data can also be cleared by matching passwords successfully; Or after unsuccessful matching, obtain the user's command and perform data clearing.This improves the confidentiality of user data, keeping it in a confidential state and preventing leaks.

Description

Data clearing method of computer and computer
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a data clearing method for a computer and a computer.
Background
The importance and daily increase of computers in our lives, and the convenience and high efficiency of the computers in use make the computers more and more believed and more dependent on the computers. The most important data is often handed to it for storage.
Data safety hidden dangers also exist in data stored in a computer, and the data safety hidden dangers are roughly divided into two types: memory failures and illegal reads.
The former can prevent memory failure and the like by using a hard disk of the best quality as an accessory, and adopting a protection device for preventing falling and shock.
For illegal reading, many computer users, whether individuals or enterprises, have no security awareness on data, do not protect data, and the notebook where the relevant data of the company is located is stolen, so that the relevant departments spend much energy to remedy the situation.
For illegal reading, passwords can be set on the computer, but each password can be cracked as time goes by. Therefore, even if the password is set on the computer, the data can still be read and the confidentiality is lost because the data cannot be timely clear after the password is cracked because the password is unique and the computer is stolen.
Disclosure of Invention
The invention aims to provide a data clearing method of a computer and the computer, which can solve the problem that data can still be read because the data cannot be cleared in time when the computer is stolen.
According to an aspect of the present invention, there is provided a data clearing method of a computer, including: the computer receiving a command to clear data, or a command to generate the clear data upon sensing detachment, over a wireless network; the computer clears the data in its memory.
Further, before the computer receives the command to clear data through the wireless network, the method further includes: the computer outputs a prompt for matching the password and matches whether the received password is correct; if yes, entering the system; if not, a request to clear data is sent through the wireless network.
Further, before the computer outputs the matching password hint, the method further comprises: the computer receives a power-on signal and sends a request for power-on or not through the wireless network; the computer judges whether a power-on command is received or not within preset time, if so, the power-on command is executed, and the computer is started; if not, the power supply is turned off.
Further, the memory is a solid state disk or a mechanical hard disk.
Further, the computer receives a command for clearing data through a short message or an email.
According to another aspect of the present invention, there is also provided a computer including a memory, a wireless module, and further including: a control chip, a sensor and a power supply; the control chip is respectively connected with the memory, the wireless module, the sensor and the power supply, and responds to a data clearing command from the wireless module or the sensor to clear data in the memory; the wireless module is used for receiving a command for clearing data from a wireless network; the sensor is used for sensing that the computer is detached and then generating the data clearing command, and the memory, the wireless module, the control chip, the sensor and the power supply are packaged in the computer.
Further, the memory is a solid state disk or a mechanical hard disk.
Further, the wireless module is a communication module adopting GSM, CDMA, wifi or 3G communication technology.
Further, the control chip further comprises: and the password matching module is used for controlling the computer to output a prompt of matching the password before receiving the command of clearing the data through the wireless module, and controlling the computer to enter a system or controlling the wireless module to send a request of clearing the data according to the matching condition of the password.
Further, the control chip further comprises: the power supply control module is used for sending a request for power up through the wireless module after the computer receives a power-up signal and before the password matching module outputs a matched password prompt; and selecting to execute the power-on command or to turn off the power supply according to the received power-on command within a predetermined time.
Further, the computer is a desktop computer or a notebook computer.
In the embodiment, the power-on is started only by obtaining the starting authorization of the user, so that the data confidentiality of the computer is improved; data clearing can be carried out according to whether the matching of the passwords is successful; or after the matching is unsuccessful and the command of the user is obtained, the data is cleared. Therefore, the data confidentiality of the user is improved, the data of the user is kept in a confidential state, and the disclosure is prevented.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a diagram showing an internal structure of a computer according to a first embodiment;
FIG. 2 shows a flow chart of the second embodiment;
FIG. 3 shows a flow chart of a third embodiment;
FIG. 4 is a flowchart of a fourth embodiment;
FIG. 5 shows a flow chart of example five;
fig. 6 shows a structure diagram of a notebook computer in the sixth embodiment.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings in conjunction with embodiments. The scheme in the embodiment of the invention can clear the data in the notebook computer in time.
Referring to fig. 1, fig. 1 is a computer configuration diagram in a first embodiment of the present invention, including: a control chip 10, a wireless module 12, a hard disk 14, a sensor 16 and a power supply 18.
The control chip 10 may be integrated on a motherboard of a computer, and is connected to the wireless module 12, the hard disk 14, the sensor 16, and the power supply 18 through corresponding data lines. The wireless module 12 may adopt communication technologies such as GSM, CDMA, Wifi, or 3G; the hard disk 14 can be a Solid State Disk (SSD) or a mechanical hard disk, and the power supply 18 can also be a storage battery; these components are packaged in a computer and if the computer is removed without authorization, the sensor 16 will send a trigger signal to the control chip 10 to clear the data.
The following describes in detail the data clearing process based on the computer in the first embodiment by the second embodiment. Referring to fig. 1 and 2, the method comprises the following steps:
s20: the control chip 10 receives a command to clear data;
the control chip 10 receives a command of the wireless module 12 or a command of the sensor 16 and recognizes that the command is a command to clear data.
S22: the control chip 10 clears the data in the hard disk 14.
After the control chip 10 receives the command, it clears the data in the hard disk 14.
By the scheme, when the computer of the user is lost, the computer can clear the data in the computer after obtaining the data clearing command, so that the data of the user is kept secret, and the secret leakage is prevented.
The case of clearing data of two kinds in the first embodiment will be described below with the third embodiment and the fourth embodiment. First, the third embodiment is explained, referring to fig. 1 and fig. 3, including the following steps:
s30: the computer is started and the control chip 10 receives a command signal for clearing data from the user via the wireless module 12.
The user can send out a command for clearing data through a network terminal, such as a mobile phone, a computer connected with the internet and the like. After the computer is started, the wireless module 12 receives a message from the network, such as a short message, a command of packet data, or a mail, so as to obtain a command of clearing data sent by the user.
S32: the control chip 10 activates the hard disk 14 and performs an operation of erasing data.
In the process of clearing data, a user can send a command of clearing data through a network terminal, such as a mobile phone, a computer connected with the internet and the like, after the computer is lost. After the computer is started, the wireless module 12 receives messages from the network, such as short messages, packet data commands or mails, so as to obtain a command for clearing data sent by the user, and clear the data in the hard disk 14, so that the data of the user is kept secret, and the disclosure of secret is prevented.
After the computer is lost, a thief can disassemble the computer, in order to avoid automatic consumption of data, the thief can disassemble the computer, so as to obtain the data inside, and in order to avoid divulgence of the data in the computer, the scheme in the fourth embodiment is used for clearing the data, and the method comprises the following steps:
s40: the computer is removed and the sensor 16 signals a clear of the data.
The control chip 10, wireless module 12, hard disk 14, sensor 16 and power supply 18 are packaged within a computer. The sensor 16 senses that the computer is removed and sends a trigger signal to the control chip 10 to trigger the clearing of data.
S42: after receiving the trigger signal, the control chip 10 clears the data in the hard disk 14.
By the scheme in the fourth embodiment, the control chip 10 can obtain the command for clearing data, and clear the data in the hard disk 14, so that the data of the user is kept secret, and the disclosure of secret is prevented.
In the embodiment, the starting authorization of the user can be obtained after the computer is started, so that the confidentiality of computer data is improved; the data can also be cleared by whether the matching of the password is successful or by adopting the scheme in the third embodiment after the matching is unsuccessful, which is explained by the fifth embodiment, referring to fig. 5, and includes the following steps:
s500: when the computer is started, the wireless module 12 sends a command of whether to start;
the wireless module 12 may send a message, such as a short message, a command for packet data, or a mail, to the network to alert the user whether to start the computer.
S502: the wireless module 12 judges whether a starting command of the user is received within a preset time, if so, S504 is executed, and the computer is started; if not, the method waits for triggering again and returns to the step S500.
S504: starting the computer and judging whether the password is input correctly; if yes, the computer is turned on in S506, and if not, the computer is turned on in S508 or S512.
S508: the control chip 10 sends a message of clearing data to the user through the wireless module 12.
The wireless module 12 may send a message to the user to clear the data by a short message, a command to group data, or a mail.
After receiving the information, the user can reply a command of whether to clear the data or not through a network terminal, such as a mobile phone, a computer connected with the internet and the like.
S510: the control chip 10 judges whether a command signal from a user is received through the wireless module 12 within a predetermined time; if so, S512 is performed, and if not, S514 is performed.
After S508, the wireless module 12 receives a message from the network, such as a short message, a command of packet data, or a mail, so as to obtain whether the user issues a command to clear data.
S512: the control chip 10 activates the hard disk 14 and performs an operation of erasing data.
Preferably, when the other users permitted by the user use the computer, the user may input wrong passwords, and the user may also choose to reply to a command of forcing to enter the system and the like so as to remotely assist the other users to use the computer.
S514: the control chip 10 computer is shut down.
In the embodiment, the computer is powered on to start up after obtaining the start authorization of the user, so that the data confidentiality of the computer is improved; data clearing can be carried out according to whether the matching of the passwords is successful; or after the matching is unsuccessful and the command of the user is obtained, the data is cleared. Therefore, the data confidentiality of the user is improved, the data of the user is kept in a confidential state, and the disclosure is prevented.
While various embodiments of the method of the present invention have been described in detail above, the method of the present invention may be integrated into various components as in embodiment one, which may be installed in a mini-server, desktop computer, or mobile notebook computer. A structure of a notebook computer is described in detail below by way of a sixth embodiment, and with reference to fig. 6, the notebook computer includes: the hard disk 14, the wireless module 12, the control chip 10, the sensor 16 and the power supply 18;
the control chip 10 is respectively connected with the hard disk 14, the wireless module 12, the sensor 16 and the power supply 18, and responds to a data clearing command from the wireless module 12 or the sensor 16 to clear data in the hard disk 14;
the wireless module 12 is configured to receive a command for clearing data from a wireless network;
the sensor 16 is configured to sense that the notebook computer is detached and generate the command for clearing data.
Further, the hard disk 14 is a solid state hard disk or a mechanical hard disk.
Further, the wireless module 12 is a communication module using GSM, CDMA, wifi or 3G communication technology.
Further, the control chip 10 further includes:
the password matching module 100 is configured to control the notebook computer to output a prompt for matching the password before receiving the command for clearing data through the wireless module 12, and to determine whether the received password is correct;
if yes, controlling the notebook computer to enter a system; if not, the wireless module 12 is controlled to send a command for clearing data.
Further, the control chip 10 further includes:
a power control module 102, configured to send a request for power up via the wireless module 12 after receiving a power-up signal and before the password matching module 100 outputs a matching password prompt;
judging whether a received power-on command is received or not within preset time, if so, executing the power-on command, and starting the notebook computer; if not, the power supply is turned off.
In the embodiment, the notebook computer is powered on and started only after obtaining the starting authorization of the user, so that the data confidentiality of the computer is improved; data clearing can be carried out according to whether the matching of the passwords is successful; or after the matching is unsuccessful and the command of the user is obtained, the data is cleared. Therefore, the data confidentiality of the user is improved, the data of the user is kept in a confidential state, and the disclosure is prevented.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or they may be separately fabricated into various integrated circuit modules, or multiple modules or steps thereof may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A method for clearing data from a computer, comprising:
the computer outputs a prompt for matching the password and matches whether the received password is correct;
if yes, entering the system; if not, sending a request for clearing data through the wireless network;
the computer receives a command for clearing data or a command for forcing to enter a system through a wireless network;
if the computer receives the command for clearing the data or senses that the computer is disassembled to generate the clearing data through a wireless network, the computer clears the data in the memory of the computer;
and if the computer receives the command of forcing the computer to enter the system through the wireless network, the computer enters the system.
2. The method of claim 1, wherein prior to the computer outputting the matching password hint, further comprising:
the computer receives a power-on signal and sends a request for power-on or not through the wireless network;
the computer judges whether a power-on command is received or not within preset time, if so, the power-on command is executed, and the computer is started; if not, the power supply is turned off.
3. The method of claim 1, wherein the memory is a solid state disk or a mechanical disk.
4. The method of claim 1, wherein the computer receives the command to clear data by text message or mail.
5. A computer comprising a memory, a wireless module, and further comprising:
a control chip, a sensor and a power supply;
the control chip is respectively connected with the memory, the wireless module, the sensor and the power supply, and responds to a command for clearing data from the wireless module or the sensor to clear the data in the memory, or responds to a command for forcing the computer to enter the system from the wireless module to control the computer to enter the system, wherein the control chip further comprises:
the password matching module is used for controlling the computer to output a prompt of matching the password before receiving a data clearing command through the wireless module, and controlling the computer to enter a system or controlling the wireless module to send a data clearing request according to the matching condition of the password;
the wireless module is used for receiving a command for clearing data or a command for forcing the data to enter a system in a wireless network;
the sensor is used for generating the command of clearing data after sensing that the computer is disassembled,
the memory, the wireless module, the control chip, the sensor and the power supply are packaged in the computer.
6. The computer of claim 5, wherein the memory is a solid state disk or a mechanical disk.
7. The computer of claim 5, wherein the wireless module is a communication module using GSM, CDMA, wifi or 3G communication technology.
8. The computer of claim 5, further comprising within the control chip:
the power supply control module is used for sending a request for power up through the wireless module after the computer receives a power-up signal and before the password matching module outputs a matched password prompt; and selecting to execute the power-on command or to turn off the power supply according to the received power-on command within a predetermined time.
9. The computer of claim 8, wherein the computer is a desktop or laptop computer.
HK11106010.0A 2011-06-14 Method of clearing data in a computer and computer HK1151875B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010280524.2A CN101916233B (en) 2010-09-14 2010-09-14 Computer and data elimination method thereof

Publications (2)

Publication Number Publication Date
HK1151875A1 HK1151875A1 (en) 2012-02-10
HK1151875B true HK1151875B (en) 2013-11-22

Family

ID=

Similar Documents

Publication Publication Date Title
JP5446439B2 (en) COMMUNICATION CONTROL DEVICE, DATA MAINTENANCE SYSTEM, COMMUNICATION CONTROL METHOD, AND PROGRAM
KR101712846B1 (en) Mechanism for facilitating efficent operations paths for storage devices in computing systems
EP2895982B1 (en) Hardware-enforced access protection
CN101916233B (en) Computer and data elimination method thereof
US8621195B2 (en) Disabling communication ports
US9667412B2 (en) Key, system and method of unlocking electronic device using the key
CN101937404B (en) Control method for accessing computer memory and computer thereof
US20090083534A1 (en) Remote pc bootup via a handheld communication device
CN104850796A (en) Storage equipment and access method thereof
WO2019090702A1 (en) Terminal security protection method and device
HK1151875B (en) Method of clearing data in a computer and computer
US8850559B2 (en) Security method of a portable device
CN104182693A (en) Electronic device and method for protecting electronic device
JP5565030B2 (en) Confidential information erasing method, confidential information erasing device and program thereof
JP6545614B2 (en) Information processing apparatus and apparatus capable of remote control
US9008622B2 (en) Information processing apparatus and wireless communication module setting method
US20120254572A1 (en) Information terminal and security management method
TWI506469B (en) Data security method, electronic device and external storage device
JP2018028875A (en) Information processing apparatus
TW201539245A (en) Power supply device and electronic device with the power supply device
HK1152398B (en) Control method for access to a computer memory in a computer and computer
CN105335647A (en) Data security method, electronic device and external storage device