TW201001226A - Memory device - Google Patents

Memory device Download PDF

Info

Publication number
TW201001226A
TW201001226A TW098108325A TW98108325A TW201001226A TW 201001226 A TW201001226 A TW 201001226A TW 098108325 A TW098108325 A TW 098108325A TW 98108325 A TW98108325 A TW 98108325A TW 201001226 A TW201001226 A TW 201001226A
Authority
TW
Taiwan
Prior art keywords
fingerprint
storage area
program
information
user
Prior art date
Application number
TW098108325A
Other languages
Chinese (zh)
Inventor
Naohiko Kakiuchi
Atsushi Takaba
Original Assignee
Nitty Gritty Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nitty Gritty Inc filed Critical Nitty Gritty Inc
Publication of TW201001226A publication Critical patent/TW201001226A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention is to provide a memory device capable of constituting a thin client system to which all possible antivirus measures are applied simply by connecting the memory device to an external connection terminal of a normal PC to undergo fingerprint authentication. The memory device is provided with a memory body 1a connectable to the external connection terminal provided to a PC 2, and a fingerprint authentication device 1b. The memory body 1a comprises a storage unit 12 composed of a setting registration information storage area 12a, an OS-application storage area 12b, activation information storage areas 12c and 12d, and a fingerprint registration information storage area 12e; and a control unit 11. The fingerprint authentication device 1b comprises a fingerprint sensor 13 and a fingerprint authentication unit 14. The setting registration information storage area 12a is controlled as a confidential area. The OS-application storage area 12b and the activation information storage areas 12c and 12d are controlled by the OS so that writing is prevented from the outside.

Description

201001226 六、發明說明: 【發明所屬之技術領域】 、本發明係有關於一種記憶裝置,特別是關於一種可使用標 準PC(Personal Computer)以建構精簡型電腦系統(Thin aient System)之記憶裝置。 【先前技術】 近年來,隨著企業的0A化(〇ffice Aut_ti〇n,辦公室 体」匕)的進展’一般員工亦可分配到個人專屬的PC,因而 的導人而導致所需成本有向上增加的傾向。再加 U安裝或版树減硬體維 上述I ί技—種精簡型電腦系統,其為了達到降低 分配至—般員工的冗上,不須搭載任 安全上可發揮二 入 工 r侧進行存取,而取得彡===== 企業的區$網3=使用自己家中的pc ’透過網際網路與該 型電腦祕續^ ’,的对,使用精簡 全的防毒對策,則會有彳义^己豕中的% ’無執行萬 須對公司外部保密的資料;:放置:不擊見= 201001226 崎產生。針對上述問顯,甚县昌 詳細檢查員轉-個人家t ρΪ 的f業或許能實施 f多的大型企業,由於實際上== f員工人數 中pc的防毒對策,故此問題更逐一檢查員工自己家 又’即使企業為強化安全層 7配屬的PC帶出至公司外部,不可將 公司將i>c帶出公司外部的員工,要而瞒著 感染到病毒後,在於公司内 ^ _在公司外部 有所謂企業的飼服器遭受到生時,亦具 部保f資訊於網路上糾頁對公司外 PC遺失、自而己=夺:造, 對企業的伺服器進行存取,1 ’ 子在第二人谷易 發生f+箆-人%、g'、斤建構之精簡型電腦系統,則會 广二ΐ漏了麟公司外部保密的資訊關題。 【專利文獻1】日本特許特開20〇4—349965號公報 【發明内容】 發明欲解決之 如此-來,導入精簡型電腦系統雖 效的手段,但在安全層面上仍具妹大的^降低且為有 本發㈣有鑑於上朝題點,目的在於提供 置於任何場所的PC,只要符合鮮PC規格貝 1 憶裝置連接於外部連接端子並執行触認證,即可 :的=沒有感染病毒之虞,更進一步具有= 二 者以外的第二人,決對無法使用之功效。 解決問顳之丰鉛 …為達成上述目的之手段,將參考圖式所標示之耕符號來 進行說明’依據申請專利範圍第1項所界定之發明所涉及之記 憶裝置,係於可連接於標準PC2上所具備之外部連接端子, 201001226 且藉由進行指紋認證,即可建構精簡型電腦系統的記憶裝置^ 上,設置一記憶裝置主體la,可與上述外部連接端子相連接 以及指紋認證裝置lb,用於執行上述指紋認證。上述記憶裝 置主體la至少由記憶部12和控制部n所建構而成。上述記 憶部12係包含有奴登崎_麵域❿、作㈣統—應 ,程式儲魏域12b、啟動資訊、程式、#訊以及指紋登錄資 讯儲存區域12e所建構而成。上述設定登錄資訊儲存區域 l2a,用以儲存在建構精簡型電腦系統之際必要的VPN( Virtual private Network)連線資訊、畫面轉送設定資訊等。上述作業 糸統-應用程式儲存區域12b,至少可儲存第一作業系統 (Opting System)程式及建構精簡型電腦系統所必要的應 用程式。上述啟動資訊,用於啟動上述標準pc2。上述程式二 =十Ϊ啟動資訊被上述標準PC2讀取後,促使使用者進行 指紋認證裝置化。上述資訊’用以所儲存之上述程 述標準PC2上’讀取上述作業系統—應用程 式儲存區域12b。上述驗登職·存區域12e,儲 第至第一作業系統程式或儲存於上述標準 ]ι 式的指紋資·錄用程式。上述控制部 2 卜部參考上述設定登錄胃訊儲存區域m :,域12C、l2d控制成保密區域,在執行 切置A的程式後,使用者即會使用指紋 述指紋認證裝置1b被該使用者執行過指 ,^錄資訊儲存區域12a及上述作業系統ms = 的同時執行是否終止將上述啟動資訊儲存區 保密區域的控制動作。上述指紋認證裝置 lb係由,指紋感測器13以及指紋認證部14 測器13、’用以讀取指紋資料。指紋認證部14, ^拉, 述指紋感測器13所讀取的指紋資料與上述指紋登錄資訊^存 201001226 區域12e所儲存的指紋資料是否一致之判斷,且,上述設定登 ίί訊儲存區域以’储上述第—作㈣賊式控制成保密 品域’上述作業系統-應用程式儲存區域12b及上述啟動資訊 巧區域12e、12d’係藉上述第—作業系統程式控制成無法 外部寫入的狀態,在上述指紋登錄資訊儲存區域12e内建有 1制用韌體,用以控制不被寫入除指紋資料以外的資料。此 户i謂使用者係包括,管理記憶裝置的管理者與使用記憶裝 的使用者(User)兩方。又’所謂絲區域偏,作成即便 心要參考亦無得參考之區域者。再者,所謂無法從外部201001226 VI. Description of the Invention: [Technical Field] The present invention relates to a memory device, and more particularly to a memory device that can use a standard PC to construct a Thin Aient System. [Prior Art] In recent years, with the progress of the company's 0A (〇ffice Aut_ti〇n, office body), the general staff can also be assigned to a personal PC, so the cost of the lead is upward. Increased tendency. Plus U installation or version of the tree to reduce the hardware dimension of the above I ί technology - a streamlined computer system, in order to achieve the reduction of the allocation to the general staff redundancy, do not need to be equipped with the security of the two sides of the work side Take, and get 彡 ===== Enterprise's area $ net 3 = use your own home pc 'through the Internet and this type of computer secret ^ ', the right, using a streamlined anti-virus countermeasures, there will be 彳% of the righteousness has not been executed on the outside of the company;: Placement: Do not hit = 201001226 Saki. In response to the above question, the detailed inspector of the county magistrate turned to the private enterprise t ρΪ's f industry may be able to implement a large number of large enterprises, because in fact == f the number of employees in the anti-virus countermeasures of PC, so the problem is to examine the employees themselves one by one At the same time, even if the company brings the PC with the security layer 7 out to the outside of the company, the company should not bring the company out of the company, but if it is infected with the virus, it will be in the company. Outside the so-called enterprise's feeding device suffered from the time of life, it also has a part of the insurance information on the Internet to correct the page to the company's PC lost, and it has been created: access to the enterprise's server, 1 ' child In the second person valley, it is easy to happen f + 箆 - person%, g', jin construction of a streamlined computer system, it will be leaked out of the company's external confidential information. [Patent Document 1] Japanese Laid-Open Patent Publication No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. No. Hei. In order to have this issue (4), in view of the previous issue, the purpose is to provide a PC placed in any place, as long as it meets the requirements of the fresh PC specification, the device is connected to the external connection terminal and performs touch authentication. After that, there is a second person other than the two, which is absolutely ineffective. To solve the problem of the lead, in order to achieve the above objectives, the description will be made with reference to the symbol of the symbol indicated in the drawing. The memory device according to the invention defined in the first paragraph of the patent application is connected to the standard. The external connection terminal provided on the PC2, 201001226, and by performing fingerprint authentication, can construct a memory device of the simplified computer system, and a memory device main body la can be connected to the external connection terminal and the fingerprint authentication device lb Used to perform the above fingerprint authentication. The memory device main body la is constructed by at least the memory unit 12 and the control unit n. The above-mentioned memory unit 12 is constructed by including a slave board _ area domain, a (four) system, a program storage domain 12b, a startup information, a program, a message, and a fingerprint registration information storage area 12e. The above-mentioned setting login information storage area l2a is used to store VPN (Virtual private Network) connection information and screen transfer setting information necessary for constructing a simplified computer system. The above-mentioned system-application storage area 12b can store at least the first operating system (Opting System) program and the applications necessary for constructing a compact computer system. The above startup information is used to start the above standard pc2. The above program 2 = Ten Commander startup information is read by the standard PC2, and the user is prompted to perform fingerprint authentication. The above information 'reads the above-mentioned operating system-application storage area 12b' from the stored above-mentioned program standard PC2. The above-mentioned inspection and storage area 12e is stored in the first operating system program or stored in the above-mentioned standard] type fingerprint application program. The control unit 2 refers to the above-mentioned settings and registers the stomach information storage area m: the fields 12C and 12d are controlled as the security area. After executing the program for cutting the A, the user uses the fingerprint to describe the fingerprint authentication device 1b to be executed by the user. The over-the-counter, the information storage area 12a and the above-mentioned operating system ms= are simultaneously executed to terminate the control operation of the above-mentioned activation information storage area security area. The fingerprint authentication device lb is used by the fingerprint sensor 13 and the fingerprint authentication unit 14 for reading fingerprint data. The fingerprint authentication unit 14 is configured to determine whether the fingerprint data read by the fingerprint sensor 13 and the fingerprint information stored in the 201001226 area 12e are consistent with each other, and the setting of the fingerprint storage area is 'Storing the above-mentioned (four) thief-type control into the secret category' The above-mentioned operating system-application storage area 12b and the above-mentioned startup information area 12e, 12d' are controlled by the above-mentioned first operating system program to be unable to externally write A firmware is built in the fingerprint registration information storage area 12e to control the data not to be written except the fingerprint data. The user i includes both the administrator who manages the memory device and the user who uses the memory device. In addition, the so-called silk area is biased, and it is made even if there is no reference to the area. Furthermore, the so-called cannot be external

多系^即便使用者想要參考此區域亦無從參考之設定,再 力口上就算是利用 Cro、DMA (Dkect Access)、CGI fo^imon Gateway imerface)程式等、硬體手段、軟體手段 4來參考此區域亦無法參考到此區域之狀態。 依據申請專利範圍第2項所界定之發明所涉及之記憶裝 於上述+請專概’ 1項所狀記憶裝置巾,在上述 12c > 12d USB (Universal serial bus)與FD (Floppy (登錄商標)Disk)的啟動資訊。 f據申請專利範圍第3項所界定之發明所涉及之記憶裝 ΐ ’係可於上述申請專利範圍第1項或第2項之記憶裝置中, 上述啟動資訊儲存區域12c、12d,内建有在上述標準 啟動時無法參考上述作業祕-應雜式贿區= 況,使上述標準PC2的啟動終止之命令。 =康申請專利範圍第4項所界定之發明所涉及之記憶裝 ΐ情上述申請專利範圍第1項至第3項中任一項所述的 ΐ裝置1V使用上述第一作業系統程式啟動上述標準PC2 述第一作業系統程式無法從外部參考安裝於上述標準 PC2的硬碟21之方式進行控制。 番請專利範圍第5項所界定之發明所涉及之記憶裝 上述申請專利範圍第1項至第4項中任一項所述的 ,己厲眾置中’將上述指紋登錄資訊儲存區域12e,分割為管理 201001226 ΐίϊΐΐίΤΓ區域12ei與使用者(如)指紋登錄資訊 事先館存管理理者指__咖域叫内, ^述吕理者奴登錄資訊儲存區域 事先; 勤以=:^於上述指紋登錄資訊儲存區域以而成之 ΪΓΐ! (Application Program Interface) J,, 資·PC2啟_技已參考上膽理者指紋登錄 5 ^内所儲存的指紋資料’或是否已參考上述 次七ser)扎紋登錄資訊儲存區域12e;2所儲存的指紋資料 _貝=於上述第一作業系統程式,在上述標準pc啟動時, Ϊif寫入於上述API介面的資訊,在上述標準pC2啟動時, ^亏'、、°果為管理者的指紋資料之情況下,啟動管理者所使用的 而在參考結果為個者(Use〇的指紋簡之情況下’ Ϊ裝執打、程,式啟動使用者(User)所使用的桌面之處理的程 在上述管理者用的桌面,安裝可將上述管理者設定登錄資 訊儲存區域12ai所儲存的資訊自動地讀出的程式。 、、 依據申請專利範圍第7項所界定之發明所涉及之記憶裝 係可於上述申請專利範圍第1項至第6項中任一項所述的 記憶裝置中,於上述記憶裝置主體la上設置有内建含有上述 使用者的員工ID資訊之RFID標籤15 (Radio Frequency Identification)。 依據申請專利範圍第8項所界定之發明所涉及之記憶裝 置:係可於上述申請專利範圍第1項至第7項中任一項所記載 的記憶裝置中’於上述記憶裝置主體la上設置與網路3連線 用的通信部16。 8 201001226 發明 上述解決手段的發明效果,將以於後所附之實施方式的圖 式中所標示之元件符號來進行說明,依據申請專利範圍第 之發明’在標準PC2啟動時’使記憶部12的啟動資訊 儲存區域12c、12d所儲存的上述標$ pC2啟動的啟動資 述PC2,在該啟動資訊被載人後,執行促使使用者使用 扑的程式。該程式執行後,當使用者使用 祖裝置比時’由指紋感測器13讀取上述使用者的指紋 =厂透過指紋s忍證部14,執行上述被讀取的指紋資料 存於記憶部12的指紋登錄資訊儲存區域12e内儲存之 一致的判斷,依其判斷結果,控制部u執行是否可 外部多考作業系、統-應用程式儲存區域12b的控制。因此 巧者的指紋資料未與上述指紋登錄資訊儲存區域^ 資料不一致的話,則無法由外部參考作業系統-應 用程式儲存區域12b,即使上述標準PC2載人了在上述作業 用Ϊ式健存區域⑶内儲存的第—作㈣統程式那樣 無法參考上述第一作業系統程式,故上述標: ,障梦;ίίΐ °於是’即便可使用記憶裝置的使用者遺失了記 = 二人取得時,由於使用者以外的指紋並無法利用 鋪裝置晴儲存的[作㈣、雜絲啟動pc,故= 二ίίΐ對公司外部須保密的資訊的問題產生。此外,在進行 隱部12的指紋登錄資訊儲存區域内儲 行能藉上述第二作業系,統程式執行的指紋資料 且’、;私式來進行指紋登錄的話,則能儲存指紋資料。 肉己憶部12的作業系統-應用程式儲存區域⑶ 構精簡型電腦系統所必要的應用程式’而且,在 亡^己憶°卩12的設定登錄資訊儲存區域l2a内,能儲存涂搂 所必要的麗連線資訊畫=2; 貝0 ,右旎將記憶裝置1連接於上述標準PC2所具 201001226 程式啟裝置1内所儲存的第—作業系統 使用的PC等,口m隹目己豕中所使用的PC或網ρ加所 接至外部連記憶裝置連 絲铲々上述啟動資訊儲存區域12c、12d係藉上述第一作: 式而控制成無法從外部寫在上述指紋登錄t訊儲i區 $ e内建有_’用以控制 的資°二 的貢料,故無病毒感染的情況發生。 <直'、,、清罵入任思 資;區設定登錄 述f存區域12e、12d控制成保密區域,在上 入存區域12e内建有勤體,其被控制為益法寫 是’即使以上述第二作業“』 又pc2t=/法對記憶裝置寫入任意的_ ^ PC2所具有的CPU20無法存取上述設定登資 :域上述作業系統_應用程式儲存區域12b及、上 儲存區域i2e、i2d(由於使用者無法參考其區域, 斤1法傳補GPU2G存取的命令),故無病絲染的情況發 且,在上述指紋登錄資訊儲存區域12e内建有拿刃體,並 為,法寫入指紋資料以外的資料的方式,所以其區域i 法被寫入指紋貪訊以外的資料,故無病毒感染的情 ?… 儲存str,圍巧 =、12d^事先儲存有標準pc2上安裝的bi〇s ,的啟動資訊的話,即使是舊型的pc,:能 置上安裝的第一作業系統程式來啟動標準PC。 裝 201001226 依據申請專利範圍第3項所界定之發明,於上述啟 儲存區域12c、12d内建有當上述標準PC2啟動時,無法參上 上述作業系統-應用程式儲存區域12b的情況下,用以 ==2成=可於短時間内判別 依據申請專利範圍第4項所界定之發明,由於是控 使用上述第一作業系統程式啟動上述標準PC2之後Γ上、= 二,業系統程式無法從外部參考安裝於上述標準pc 二 =,所以在使用上述第—作業系統程式啟動標準p f硬 的、Ϊϊί部參考硬碟21。因此,更能物咖置感染病毒 抑申請專利範圍第5項所界^之發明,因為在上述管理 事ΐ館存管理者指紋資料,所以若事先將存 裝置的使用者無法連 us使11裝置等不可預測的事態發生。又,在- ί?ί進:ί’ίϊ:的場合時,管理者無須逐-對所購入之記 心裝登錄’因而可達到高效率的作業逮度。 者設管理 證的事實,可被寫===登:ϊΐ :,透過其匕 若事先在其桌面上絲動:的桌面’ 度。 系、.先所而的设定’可達到高效率的作業速 201001226 f Ϊ員工縣使用’當使用者欲從i作室料置 則無法開啟工作室的門,憶裝置的話, 故ίί人^= 必須將記憶農置從標準Pc上卸除 術_漏1題=诚用者的工_容_可防止技 ⑽之跡依據使用之標準 通信部26,利用撥接連線法管理 設置ΪίίΐίϋΐΐΓϋ連線的情況發生時,可因 有所謂透接ϋ無^ 的通信部16 ’所以没 巧連線手段無法與“V連線的有線區域網路連線 【貫施方式】 璧盟最佳實施方式 第1圖係二來進行本發明之較佳實施方式之說明, 情況之說明圖。^第Γ&實施建構精簡型電腦系統的 網路3連線。而且,用t不’用戶終端C和伺服器4係與 和指紋認賴置以記職置主體la 線端’由使用者透過鍵盤或滑鼠等而輸入到用戶 3亀至侧4,舰器 内已儲戶終端c的操作要求,啟_服器4 中的舰5| Γ 以執行應用程式。接著,執行應用程式 面資料,接收财村料_戶4 12 201001226 上顯示所接㈣畫面·的—般所· 兹使用第2圖來具體地說明記憶裝置^第電^圖系為统記情裝 ^ 1的斜視圖。記憶裝置1乃如第2 (a)圖所示形成可 为離成記«置讀la與缺認證裝置lb者,娜裝置主體 la與指紋認證裝置lb係藉由纜線1〇相 ^ la係用於插入於標準PC2所具備的屬外;2接己端T之置= 蟑,指紋認證裝置關顧為讀取人類=^文· 在將記憶裝置主體la插入標準PC2所具備的屬外部連接 之U B料,使讀、裝置主體la;f動於第2⑷圖所示 的前頭方向上’且可如第2 (b)圖所示,使記憶裝置主許 ,指紋認證裝置lb分離。-被分離後,如第2⑻圖所示, 设置於記憶裝置主體la的前端部之連接器部le,可將其 态邛le插人;PC2所具備的屬外部連接端子之USB痒。 指紋認證裝置lb係於上方設置凹部ld,於其凹部μ 略中央位置上设置指紋感測H 13者。此指紋認證裝置化的 ,方法為,讓七類的單根手指頭密接於凹部ld,透過密接於 第2 (b)圖所示的箭頭方向之指頭滑動而可使指紋感測器13 上與凹部Id雄、接的指頭之指紋被讀取。 其次’兹使用第3目,針S]·使用了本發明相關之實施方 所涉及之記憶裝置1的精簡型電腦系統進行詳細說明,第3 ^系精簡型電腦系統的方塊圖。在圖巾,精_電齡統為,由 記憶裝置1和PC2所成的用戶終端c,係透過網路3與伺服器 4連接。 、 σ 記憶裝置1是由記憶裝置主體la和指紋認證裝置lb所建 構而成。而且,記憶裝置主體la係由CPU1〇、控制部u及 憶部12所建構而成。指紋認證裝置lb係由指紋感測器13 ; 指紋認證部14所建構而成。 控制部11係進行記憶裝置1與PC2的資料之傳輸,接著, 控制成無法從外部參考後述之記憶部12的設定登錄資訊儲 區域12a及上述作業系統-應用程式儲存區域12b。且可將^ 13 201001226 述之記憶部12的啟動資訊儲存區域12c、12d控制成保密區 域。並且’依後述之PC2啟動時的指紋認證之結果,進行是 否能從外部參考記憶部12的上述設定登錄資訊儲存區域 及上述作業系統-應用私式儲存區域12b之控制的同時,進行 疋否終止上述啟動資訊儲存區域12c、12d控制作為保密p诚 的控制。 ‘、、’、°°埤 記憶部12,係由可重寫的快閃記憶體等不會因電源關閉 而使資料消失的非揮發性記憶體,設定登錄資訊儲存區域 12a作業糸統-應用私式儲存區域i2b、啟動資即健左f 12c、啟動資訊儲存區域12d及指紋登錄資訊儲存區 建構而成。设疋登錄資讯儲存區域12a,係儲存有在建禮姻政 連線設定、WN連線設定及晝面轉送設定資訊等的 腦系統之際所必要的資訊。此區域為可寫入或讀出的區域,但 透過,述之作業系統-應用程式儲存區域12b所儲存的第二 作業系統(Linux (登錄商標)—based OS)程式,管理成為 無法讓使用者參考的保密區域。因此,在此區域内 丄 法自由地寫入任意的資料。 便用者… 作業糸統-應用程式儲存區域12b,係儲存有可進行輸入 輸出功能、記憶體的管理等之電腦系統整體管 系統的第-作業系統(Linux (登錄商標)—本 財、4面概程式、文書處理軟體或試算 “丄等的應用程式。此區域係藉第—作業系統 転式官理成使用者無法寫入的狀態。 資二^訊=區3,以’健存有啟動PC2用的屬啟動 ^的USB - HDD ( Hard Disk Drive )資訊。且在啟動資 域儲ΐ有啟動PC2用的屬啟動資訊的· — FD 貝。 卜’啟動資乱儲存區域12c、12d内建有每pc2啟勤 紋認證裝置1b的程式、在&業系統— 存有上述如第—作業系統程式一 也貝錢在無法參考作業系統—應用程式儲存區域i2b 14 201001226 時,使PC2啟動終止的命令。 在才曰紋登錄資訊儲存區域12e内,儲存著# | 登錄用的程式,因應此程式所齡之已==== = 域雖為可寫人或讀㈣區域,但 ^ 成林财餘資訊以外@ 旨紋感測器…係當使用者將屬於人類 二 頭岔接於指紋認證裝置lb的凹部ld m =指紋’執行對指紋認證部14:出;=:指; 1:所讀取的指;文資4料it 指:貧 #;i3 12 22、7 =CPpU2〇、硬碟 21、R〇M (Read 〇_ 河刪17) 25及通信部26所建構而成。 输入β 區儲存有主啟動紀錄(MBR,MasterBoot 如Wind。:(登f以的,或,則f存有㈣ 在MRP Μ *节商^ )、Macintosh (登錄商標)等)程式。 祐批偏' 产a 7 .錢知式(B〇〇t 1〇ader)。此外,此硬碟21 下^透過上、求ϊΐϊ第Γ作業系統程式啟動標準PC2的情況 過上述第统程式而無法從外部參考。因此在透 外部參考至的式啟動標準pc2的情況下,是無法從 ROM22 ’内部儲存有m〇s。 ^L^23 ’用以顯示處理結果等之畫面。 用於暫存資料為關閉電源時’會失去資料的揮發性之記憶體’ 輸入部25,可以為指滑鼠或鍵盤等。 15 201001226 等之域晴、細域網路、撥接 證部^認證部41、晝面轉送認 之通路可區域網路、有線區域網路、撥接等 器4 係事先登錄著允許在用戶終端C與飼服 所傳送的ID ^ ί = ^及純’用純行判斷由用戶終端C VPN連線。逸碼疋否允許進行用戶終端c與伺服器4間之 飼服ί ’為事先登錄有允許在用戶終端C與 c傳ΐ的it了Λ ^送的ID及密碼,進行判斷從用戶終端 行晝面^| 否可允許在用戶終端C與舰器4間進 之際H卩Sif存有在使用者使用用戶終端C進行工作 不所必要的應用程式43a、檔案43b等。 實施巧^_使_明相關之 法,第4 己隐波置1來建構精簡型電腦系統的方 圖為侧ΐίΪ在進行指紋登錄之際的處理之流程圖,第5 終端之際的處理之流程圖’第6圖為說明 ΐϊ ^統之際的處理之絲圖。當使用者使用本 統時,式所涉及之記憶裝置1建構精簡型電腦系 則會如3m說登錄。較因為,若未進行指紋登錄’ Ιίί 1 ίϊ使用上述第—作業系統程式啟動pc2。 置1 罟=月指、紋登錄的流程’使用者係將記憶裝 PC^電源(_ su。接下來’ 2切,在PC2的顯示器23上顯示上述第 接,使用者係使職盤或滑鼠等的輸m 執仃儲存於記憶裝置i _記,_ 12之仙者 16 201001226 •y抑1 =pS^S3)。因應其執行的程式,使用者將欲登錄的手 ,早根手&讀於指紋認證裝置lb的凹部Id,讓指頭沿其凹 告動’使指紋感測器13讀取該手指的指紋。當指紋資料 ,^感測器?讀取後,其指紋資料透過指紋認證部14被儲 子,a紋且錄貧訊儲存區域i2e (步驟§4)。此外,即使ρ〇2 被感染病毒,由於在指紋登錄資訊儲存區域12e,内建有韌體 用以控制此區域不被儲存除指紋資訊以外的資料,所以此區域 不會有感染病毒的情況發生。再者,控制部U可靖上述設 ,登?資訊儲存區域以及上述作業系統-應用程式儲存區 =2b控無法從外部參考的方式,且將上毅織訊儲存 ,域12c、12d控制成保密區域,此控制只要指紋認證未成功, ,無法解除。因此,即便使用者使雜盤或賴等的輸入部 f奴對= 己憶部12的上述指、蚊登騎訊儲存區域12e以外之區 巧’進行存取亦無法存取,所以在記憶部12社述指紋登錄 貧訊儲存區域12e以外之區域不會有病毒感染的情況發生。 心當ΐ紋登錄—完成後,使用者係於保持記職置1的記憶 裝置主體la連接於PC2的USB埠插孔的狀態τ,再度啟動 5的電源(步驟S1G)。接著,使用者可使職盤或滑鼠等 的輸入部25 ’變更R〇M22所儲存的m〇s設找訊。變更重 點為’以上述第-作業系統程式的啟動優先順位成為第一優先 方式進行變更。具體而言,以上述第一作業系統程式可 被最先執行的方式,進行將啟動優先順位變更成— 或USB - FD的BIOS設定資訊(步驟S11)。使用者係在變更 BIOS設定資訊後,再次啟動PC2 (步驟S12 )。 當再次啟動PC2時’ PC2内的CPU2〇係讀取出R〇M22 所儲存的BIOS。被讀取出的BIOS係讀取出pC2内的硬碟21 之前端扇區所儲存的MBR21a,將BI〇s的設定資訊,輸出至 MBR21a所儲存的開機程式。接收到BI〇s的設定資訊之開機 程式’係依BIOS所設定的作業系統程式啟動優先順位,依序 搜哥儲存著作業系統程式的區域(步驟Si3)<> 201001226 當啟動優先順位為首位的並非USB-HDD或USB-FD 時’則執行上述第二作業系統程式(步驟S14)。 若啟動優先順位為首位的是USB-HDD或USB-FD 時,則上述開機程式係透過控制部u來進行搜尋在被插入pc2 的USB埠插孔之記憶裝置主體la的記憶部12中,是否儲存 ^ USB - HDD或USB - FD的啟動資訊。當一執行搜尋時, 若啟動優先順位為首位的是USB — HDD時,則會讀取啟動 訊,存區域12c的啟動資訊,若為USB _ FD時,則會讀取啟 動資訊儲存區域12d的啟動資訊。當啟動資訊儲存區域12c或 12d中之任一方所儲存的啟動資訊被讀取至上述開機程 =使时制H讎裝置lb的喊即會 至顯示器23 (步驟S15)。此外,上述開機it 處理f私紋涊證結束以前是呈待機狀態。 23 錄’上述程式内容係保持顯示於顯示器 移至下個步驟之待機狀態。若進行指咬登 錄的j,則可移至下個步驟(步驟S16)。 絲已^行缺登錄,係在使用者因應上述程式内容,以人 頭滑動i早ϊϊϊ頭密接於指紋認證裝£ ib的凹部id並使指 指紋感測器13可讀取該手指的指紋,輸出至ίϊ 自記憶部12 _紋登錄ί訊 所讀取的缺; 出至紋認證㈣將其結果輸 開機程式參考作業系制部11則維持無法由上述 在上述開機程式ϋ rp式儲存區域12b的狀態,執行 程式储存區域-内 訊’參考作業系統-應用貝程式於是其資 18 201001226 12b係依控制部U,而成為無法由上述開 、”。接著’上述開機程式,可依據瓣考 ^ 存之上述作業系 時止啟動PC2的命令以終止pC2的啟動(步驟s⑻。 右/、所登錄的指紋一致,則指紋認證部14將其結 以1诚到此結果的控制部11係將作業系統-應用 J *為由上述開機程式可參考的狀態,執行在 機程式再開始進行處理的指令。此外,在執行上述指令 形成可自外部參考上述設定登錄資訊儲存區域12a, ίϊί 啟動資訊儲存區域12e、12d設㈣為保密區域 …2述開機程式為,接受來自控制部11的指令,從啟動資 =存區域12c、12d所儲存的啟動資訊,讀取:作=貝 f ^式^^區域12b儲存之如上述第—作㈣統程式一般 上述開機程式係將上述第-作業系統程式摘取= 1’^行上述第—作㈣統程式(步驟二。 述第作業系統程式被執行時,首先,上述第一作聿 t統/呈式的fuL(,hieal 祕ee)程式(二^業 的1等)啟動之後,上述第一作業系統程式 的桌面可顯不於PC2内的顯示器23 (步驟S20 )。 的輪5終端C連線於網路3,使_盤或滑鼠等 來‘ ί使路連線處理要求(步驟S21)。具體 i 使:!者使鍵盤或滑鼠等的輸入部25,選擇撥接連 田二了線區域網路連線、有線區域網路連線等之與網路3連線 用以建立其選擇的連線用的各種 CPU10。或孩碼的设疋等〕資訊係被傳送至記憶裝置1内的 CPU10用以執行令使用者所選擇的連線建立用的各種設 19 201001226 定資訊之處理,將其歧資料送^至PC2,並擷取至pc2内 的RAM24 (步,驟S23 ) ’使其處理内容顯示於顯示器 〇 虽網路連線一建立時’使用者係透過網路3與伺服器4連 線’故使用鍵盤或滑鼠等的輸入部25來進行νρΝ連線處理要 求(步驟S25)。具體而言,使用者係使用鍵盤或滑鼠等的輸 入部25,執彳了記憶部12的作業魏_ _程式儲存區域i2b 所儲存的VPN程式,且因應其程式,使用鍵盤或滑鼠等的輸 ^部25輸入舰器4的IP位址,接著,在輸入仍及密碼後, 其輸入的資訊即可傳送至記憶裝置丨内的cpui〇。 ^ 用机4用有所輸入的資訊之處理,將其處理 貧料送出至PC2,鋪取至PC2 _从趣中,同時建立通 =部26與網路3之連線(步驟S26),透過通信部%,對饲服 4 ^專送VPN連線要求資料(id、密碼)(步驟S27 )。 當伺服器4的通信部40透過網路3接收到vpN連線要求 =伺服H 4的WN認證部41係靖在認證處理方面是否允 ^與用戶終端c之間進行VPN連線(步驟s28)。此外,在 N認證部41内’卿先保存有允許存取的ID及密碼。 ^信部4(M系將藉VPN認證部41處理的認證結果資料傳 运至用戶終端C (步驟S29)。 、 接收到已允許存取_聽果之cp⑽,可執行將其結 於顯示器23的處理(步驟S30),將認證結果資料送出 至(步驟S31),使其結果顯示於顯示器23 (步驟幻2)。 号4 ΐ線—建立時,制者係透過_ 3,執行伺服 存!!應用程式43a、檀案43b等的處理,故使用鍵盤 且:鼠4的輸入部25來執行晝面轉送處理要求(步驟幻3 )。 =而言’使用者係使用鍵盤或滑鼠等輸入部25,執行記憶 二^的作業糸、统—應用程式儲存區域⑶所儲存的畫面轉送 ^ ’且因應_式’使用鍵盤或滑鼠等輸入部25輸入饲服 态4的IP位址’接著在輸入ID及密碼後,其所輸入的資訊即 20 201001226 被送至記憶裝置1内的CPU10。 CPU10用以執行用戶所輸入的資訊之處理,將其處理資 料送出至PC2,且操取至PC2内的RAM24中(步驟S34), 透過通信部26轉送傳送晝面要求資料至伺服器4 (ID、密碼) (步驟S35)。 當伺服器4的通信部40 —透過網路3接收到晝面轉送要 求時,伺服器4的晝面轉送認證部42係判斷在認證處理方面 是否允許在與用戶終端C之間進行畫面轉送(步驟S36)。此 外在晝面轉送5忍證部42内’事先保存有允許存取的辽)及密 碼。 口 通信部40用以將晝面轉送認證部42内處理的認Ί 料傳送至用戶終端C (步驟S37)。 接收到已允許存取的認證結果之CPU10,係進行用以讓 其結果顯示於顯示器23的處理(步驟S38),將認證紝要眘粗 送出至PC2 (倾S39) ’使其結果顯示於顯示器且== S40 ) 〇 當畫面轉送建立完成時,使用者可使用鍵盤或滑鼠等的輸 入部25,執行伺服器4内所儲存的應用程式43a、檔 處理之要求(步驟S41)。 一 接收到其處理要求資料的CPU10,係將使用者所 J理要求資料,送出至PC2 (步驟S42),將其處理要 透過通信部26傳送至伺服器4 (步驟S43)。 " 當伺服器4的通信部40透過網路3接收到處理 寺,因應此處理要求資料,執行伺服器4 ;陰卹 應祕式43a、或者是終止程式的 仃檔,的刪除或保存之處理(步驟S44)。 或疋進 40 ㈣4進行因應於處理要錢料的處理時,通例Multi-system ^ Even if the user wants to refer to this area, there is no reference setting, and even if you use the Cro, DMA (Dkect Access), CGI fo^imon Gateway imerface) program, etc., hardware means, software means 4 to refer to This area also cannot be referenced to the status of this area. The memory according to the invention defined in the second application of the patent application scope is installed in the above-mentioned + please-special item 1 memory device towel, in the above 12c > 12d USB (Universal serial bus) and FD (Floppy (registered trademark) )Disk) startup information. The memory device according to the invention as defined in the third aspect of the patent application is the memory device of the first or second aspect of the above-mentioned patent application, wherein the activation information storage areas 12c, 12d have built-in At the start of the above-mentioned standards, it is not possible to refer to the above-mentioned operation secret---------------------------------- The memory device according to any one of claims 1 to 3, wherein the first operating system program starts the above standard using the first operating system program described above. PC2 The first operating system program cannot be controlled by external reference to the hard disk 21 of the above-mentioned standard PC 2. The memory of the invention as defined in the fifth aspect of the patent scope is as described in any one of the above-mentioned patent claims, in the first to fourth items, and the fingerprint is registered in the information storage area 12e, Divided into management 201001226 ΐ ϊΐΐ ϊΐΐ ΤΓ 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 Log in to the information storage area! (Application Program Interface) J,, 资·PC2 启_Technology has referenced the fingerprint information stored in the fingerprint registration 5 ^'s or has referenced the above seven slaves) The fingerprint registration information storage area 12e; 2 stored fingerprint data_be = in the first operating system program, when the standard pc is started, Ϊif is written in the information of the API interface, when the standard pC2 is started, ^ In the case of a loss of ',, ° fruit for the manager's fingerprint data, the start of the use of the manager and the reference result is a person (Use〇's fingerprint is simple] Ϊ装打打,程,式开始用户(U The processing of the desktop used by the ser is installed on the desktop of the manager, and the program for automatically reading the information stored in the login information storage area 12ai by the administrator is installed. The memory device according to any one of claims 1 to 6, wherein the memory device main body 1a is provided with a built-in user RFID ID 15 of the employee ID information. The memory device according to the invention defined in claim 8 is applicable to any one of items 1 to 7 of the above-mentioned patent application. In the memory device, the communication unit 16 for connecting to the network 3 is provided on the memory device main body 1a. 8 201001226 The invention effects of the above-described solution means will be indicated in the drawings of the embodiments attached thereto. The component symbol is used for explanation, and the invention according to the scope of the patent application 'when the standard PC 2 is started' stores the storage information storage area 12c, 12d of the memory unit 12 The startup statement PC2, which is started by the $pC2, executes a program that prompts the user to use the flutter after the activation information is loaded. After the program is executed, when the user uses the progenitor device ratio, the reader is read by the fingerprint sensor 13. Taking the fingerprint of the user=the factory through the fingerprint severance unit 14 and executing the above-mentioned fingerprint data stored in the fingerprint registration information storage area 12e of the storage unit 12, and determining the result, the control unit u Execute whether the external multi-test operation system and the system-application storage area 12b can be controlled. Therefore, if the fingerprint data of the fingerprint is not inconsistent with the fingerprint registration information storage area, the external reference operating system-application storage area cannot be used. 12b, even if the above-mentioned standard PC2 is loaded with the first operating system program stored in the above-mentioned operation type 健-type storage area (3), the above-mentioned standard: 障 梦 ; ί ; ; ; ; 于 于 于 于 于 于Even if the user who can use the memory device loses the record = the two people get it, the fingerprints other than the user cannot be stored by the shop. [4 (4) , the silk starts the pc, so = two ίίΐ problems arising from the confidential information outside the company. In addition, in the fingerprint registration information storage area of the hidden portion 12, fingerprint data that can be executed by the second operating system and the program can be stored, and the fingerprint data can be stored. The operating system of the meat memory department 12 - the application storage area (3) The application program necessary for the compact computer system 'and the storage information storage area l2a in the setting of the death memory can be stored丽丽线资讯画=2; Bei 0, right 旎 connects the memory device 1 to the PC used in the first operating system stored in the 201001226 program startup device 1 of the standard PC2, and the port is in use. The used PC or network ρ is connected to the external memory device and the wire shovel. The above-mentioned startup information storage areas 12c and 12d are controlled by the first method to be unable to write from the outside to the fingerprint registration t-storage. There is a tribute to the $2 built in the area, so there is no virus infection. <Direct',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, Even if the second job "" and the pc2t=/ method are used to write an arbitrary memory to the memory device, the CPU 20 having the PC2 cannot access the above-mentioned settings: the above-mentioned operating system_application storage area 12b and the upper storage area. I2e, i2d (since the user can't refer to the area, the method of transferring the GPU2G access by the jin 2G method), so the disease-free silk dye is generated, and the blade body is built in the fingerprint registration information storage area 12e, and The method of writing data other than fingerprint data, so the area i method is written to the data other than the fingerprint greedy, so there is no virus infection?... Store str, surround =, 12d^ pre-stored on standard pc2 If the startup information of the installed bi〇s, even the old type of pc, can be installed with the first operating system program installed to start the standard PC. 201001226 According to the invention defined in the third application of the patent scope, Open storage area 12c, 12d built-in When the above-mentioned standard PC2 is activated, if it is not possible to participate in the above-mentioned operating system-application storage area 12b, it is possible to determine the invention defined in the fourth application of the patent scope in a short time by using ==2%= After using the above first operating system program to start the above standard PC2, the system program cannot be installed from the external reference to the above standard pc 2=, so the standard pf hard, Ϊϊί is started using the above-mentioned operating system program. The reference is to the hard disk 21. Therefore, it is more effective to infect the virus, and the invention of the fifth application of the patent scope is applied. Because the fingerprint information of the manager is stored in the management office, if the user of the device is stored in advance, Unable to connect to us to make unpredictable events such as 11 devices. Also, in the case of - ί?ί进: ί'ίϊ:, the manager does not need to log in on the purchase of the record, thus achieving high efficiency. The accuracy of the operation. The fact that the management certificate is set can be written === Deng: ϊΐ :, through the 桌面 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 事先 桌面 桌面 桌面 桌面 桌面 桌面 桌面 桌面Achieve high efficiency Industry Speed 201001226 f Ϊ Employee County Use 'When the user wants to use the room material from i, the door of the studio cannot be opened, and the device is recalled, so ίί人^= must reset the memory farm from the standard Pc _ leak 1 question = the user's work _ _ _ can prevent the technology (10) trace according to the standard communication unit 26 used, use the dial-up connection method to manage the settings Ϊ ΐ ΐ ΐ ΐ ϋΐΐΓϋ 的 , , , , , , , , The communication unit 16' is therefore inadvertently connected to the "wired area network of the V connection". The preferred embodiment of the present invention is implemented in the first embodiment of the present invention. Description, an illustration of the situation. ^ Dijon & implements a network 3 connection that builds a thin computer system. Moreover, t is not used by the user terminal C and the server 4 and the fingerprint recognition device is used to record the main body la line end 'by the user through the keyboard or mouse, etc., input to the user 3亀 to the side 4, the ship The operation of the internal storage terminal c requires the ship 5| 中 in the server 4 to execute the application. Then, execute the application plan data, and receive the information on the display of the connected (four) screen on the 4th, 2010-12226. Use the second picture to specify the memory device. Install the oblique view of ^ 1. The memory device 1 is formed as shown in Fig. 2(a), and can be a member of the reading device la and the authentication device lb. The device main body la and the fingerprint authentication device lb are connected by a cable. It is used for insertion into the external part of the standard PC2; 2 is set to the end of the T = 蟑, the fingerprint authentication device is for reading the human = ^ text · The external connection of the memory device main body la is inserted into the standard PC2 The UB material is such that the read and device main body la; f moves in the front direction shown in the second figure (4) and can be separated from the fingerprint authentication device 1b as shown in the second (b). - After being separated, as shown in Fig. 2 (8), the connector portion le provided at the front end portion of the memory device main body 1a can be inserted into the connector; the USB connection of the external connection terminal of the PC 2 is itched. The fingerprint authentication device 1b is provided with a concave portion ld disposed above, and a fingerprint sensing H 13 is disposed at a slightly central position of the concave portion μ. The fingerprint authentication device is configured such that a single finger of seven types is closely attached to the concave portion ld, and the fingerprint sensor 13 can be made to be slid by the finger in the direction of the arrow shown in the second (b). The fingerprint of the recessed Id male and the connected finger is read. Next, the third item, the needle S], and the simplified computer system using the memory device 1 according to the embodiment of the present invention will be described in detail, and the third embodiment is a block diagram of a simplified computer system. In the figure, the user terminal c formed by the memory device 1 and the PC 2 is connected to the server 4 via the network 3. The σ memory device 1 is constructed by the memory device main body 1a and the fingerprint authentication device 1b. Further, the memory device main body la is constructed by the CPU 1A, the control unit u, and the memory unit 12. The fingerprint authentication device 1b is constructed by the fingerprint sensor 13 and the fingerprint authentication unit 14. The control unit 11 transmits the data of the memory device 1 and the PC 2, and then controls the setting of the registration information storage area 12a and the operation system-application storage area 12b of the storage unit 12 which will be described later. Further, the activation information storage areas 12c, 12d of the memory unit 12 described in ^ 13 201001226 can be controlled as a security area. Further, whether or not the control of the setting registration information storage area and the operation system-application private storage area 12b of the external reference storage unit 12 can be performed is performed as a result of the fingerprint authentication at the time of startup of the PC 2, which is described later. The above-described activation information storage areas 12c, 12d control the control as confidential. ', ', ° ° ° memory unit 12, is a non-volatile memory such as rewritable flash memory that does not cause the data to disappear due to power off, setting the login information storage area 12a operating system - application The private storage area i2b, the startup resource, the health left f 12c, the startup information storage area 12d, and the fingerprint login information storage area are constructed. The registration information storage area 12a is provided with information necessary for the brain system such as the establishment of the marriage and marriage connection setting, the WN connection setting, and the face transfer setting information. This area is a writable or readable area, but the second operating system (Linux (registered trademark)-based OS) program stored in the operating system-application storage area 12b is managed to become a user. Reference to the privacy zone. Therefore, in this area, you can freely write arbitrary data. The user-operating system-application storage area 12b is a system-operating system (Linux (registered trademark) - this wealth, 4) that stores the entire system of the computer system that can perform input/output functions and memory management. The general program, the word processing software or the trial application "丄. This area is borrowed from the first - the operating system is a state that cannot be written by the user. 资二^讯=区3, to '健存有Starts the USB-HDD (Hard Disk Drive) information for the PC2, and starts the domain storage with the startup information for the PC2. FD 。. Start the treasury storage area 12c, 12d PC1 is started when the program of each pc2 start-up authentication device 1b is built, and the system is stored in the & industry system - if the above-mentioned operating system program is stored, the application storage area i2b 14 201001226 is not available. The command to terminate. In the 曰 登录 login information storage area 12e, the # | login program is stored, and the program is older than the ==== = field is a writable person or a read (four) area, but Outside of Lin Caiyu's information @ The detector is when the user connects the two ends of the human fingerprint to the fingerprint authentication device lb, the recess ld m = fingerprint 'executes the fingerprint authentication unit 14: out; =: refers to 1: the read finger; the text 4 The material it means: poor #; i3 12 22, 7 = CPpU2 〇, hard disk 21, R 〇 M (Read 〇 _ _ _ _ 17) 25 and the communication department 26 is constructed. The input β area stores the main start record ( MBR, MasterBoot such as Wind.: (After f, or, then f (4) in MRP Μ * Festival quotation ^), Macintosh (registered trademark), etc.) 批 偏 ' ' Production a 7 . B〇〇t 1〇ader). In addition, the hard disk 21 is not able to be externally referenced by the above-mentioned general program when the standard operating system program is started by the third operating system program. Therefore, it is externally referenced. In the case of starting the standard pc2, it is impossible to store m〇s from the ROM 22'. ^L^23 ' is used to display the processing results, etc. The data used for temporary storage is turned off when the power is turned off. The memory 'input unit 25 can be a mouse or a keyboard, etc. 15 201001226, etc., such as domain fine, fine area network, dialing certificate department ^ authentication unit 41,昼 转 认 可 可 可 可 可 可 可 可 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域 区域Terminal C VPN connection. The code is allowed to be served between the user terminal c and the server 4. The ID and password sent by the user terminal C and c are allowed to be registered in advance. It is judged that the user terminal C is allowed to pass between the user terminal C and the ship 4, and the application 43a, the file 43b, and the like which are unnecessary for the user to work using the user terminal C are stored in the H卩Sif. The implementation of the method of _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The flowchart of Fig. 6 is a silk diagram of the processing at the time of the description. When the user uses the system, the memory device 1 involved in the configuration constructs a compact computer system and logs in as described in 3m. This is because if you did not perform fingerprint login, you can use the above-mentioned operating system program to start pc2. Set 1 罟 = month finger, pattern registration process 'users will memory PC ^ power supply (_ su. Next '2 cut, display the above mentioned on the PC23 display 23, the user is making the job or slip The mouse's output m is stored in the memory device i _ note, _ 12 of the fairy 16 201001226 • y 1 = pS ^ S3). In response to the program executed by the user, the user reads the hand to be logged in, and reads the fingerprint Id of the fingerprint authentication device 1b and causes the fingerprint sensor 13 to read the fingerprint of the finger. When the fingerprint data is read, the fingerprint data is stored by the fingerprint authentication unit 14, and the image storage area i2e is recorded (step § 4). In addition, even if ρ〇2 is infected with a virus, since the firmware is built in the fingerprint registration information storage area 12e to control the area from being stored except the fingerprint information, there is no virus infection in this area. . Furthermore, the control unit U can control the above-mentioned settings, the information storage area and the above-mentioned operating system-application storage area=2b control cannot be externally referenced, and the storage of the domain is controlled, and the domains 12c and 12d are controlled to be kept secret. Area, this control cannot be released as long as the fingerprint authentication is unsuccessful. Therefore, even if the user makes access to the input unit f of the miscellaneous disc or the singer = the above-mentioned finger of the memory unit 12, and the area other than the mosquito boarding storage area 12e, the access cannot be accessed, so in the memory unit. 12 The fingerprints are not registered in the area other than the poor storage area 12e. After the completion of the registration, the user activates the power supply of the memory device main unit 1a of the PC 2 to the USB port of the PC 2, and restarts the power supply of 5 (step S1G). Next, the user can change the m〇s stored in the R〇M22 by the input unit 25' of the job or mouse to set up the search. The change point is 'the first priority mode is changed by the first priority of the first-operation system program. Specifically, the BIOS setting information for changing the boot priority order to - or USB - FD is performed in such a manner that the first operating system program can be executed first (step S11). After changing the BIOS setting information, the user starts PC2 again (step S12). When PC2 is restarted, the CPU2 in PC2 reads out the BIOS stored in R〇M22. The read BIOS reads out the MBR21a stored in the front sector of the hard disk 21 in the pC2, and outputs the setting information of the BI〇s to the boot program stored in the MBR 21a. The boot program that receives the setting information of BI〇s is based on the operating system program set by the BIOS to start the priority order, and sequentially searches the area where the copyright system program is stored (step Si3) <> 201001226 when the priority order is started When the first one is not a USB-HDD or a USB-FD, the second operating system program described above is executed (step S14). If the boot priority is USB-HDD or USB-FD, the boot program is searched by the control unit u for searching in the memory unit 12 of the memory device main 1a of the USB port of the pc2. Save ^ USB - HDD or USB - FD boot information. When performing a search, if the boot priority is USB-HDD, the boot message will be read, and the boot information of the memory area 12c will be read. If it is USB_FD, the boot information storage area 12d will be read. Start the news. When the activation information stored in either of the activation information storage area 12c or 12d is read to the above-described power-on procedure = the scream of the H-device lb is reached to the display 23 (step S15). In addition, the above booting process is in a standby state before the end of the process. 23 Record 'The contents of the above program are kept on the display and moved to the next step. If j is entered, the next step can be moved (step S16). In the case of the above-mentioned program, the user touches the recess id of the fingerprint authentication device and allows the fingerprint sensor 13 to read the fingerprint of the finger. Output to ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ ϊ The state, the execution program storage area - internal communication 'reference operating system - application shell program is its capital 18 201001226 12b according to the control department U, and can not be opened by the above," then the above boot program, can be based on the valve test ^ When the above operation is performed, the command of the PC 2 is started to terminate the startup of the pC2 (step s (8). Right / the registered fingerprints match, the fingerprint authentication unit 14 associates the result with the control unit 11 of the result. The system-application J* is a command that can be referred to by the above-mentioned boot program, and executes an instruction to start processing again in the program. In addition, the above-mentioned command is executed to form a login information storage area from the external reference. 12a, 启动 启动 启动 资讯 资讯 资讯 资讯 资讯 资讯 资讯 资讯 资讯 资讯 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动 启动The above-mentioned first-running system program is generally used to extract the above-mentioned first operating system program = 1'^ the above-mentioned first-fourth (four) unified program (step two. When the operating system program is executed, first, the first operating system program desktop can be displayed after the first operating system (fuial) The display 23 in the PC 2 (step S20). The terminal 5 of the wheel 5 is connected to the network 3, so that the _ disk or the mouse or the like is required to make the connection processing request (step S21). Specifically i: The input unit 25 of the keyboard or the mouse or the like selects various CPUs 10 for connecting the connection to the network 3 such as the connection of the Liantian two-line area network connection and the wired area network connection to establish the selected connection. The information of the child code or the like is transmitted to the CPU 10 in the memory device 1 for execution. The user selects the various settings for the connection establishment 19 201001226 information processing, sends the difference data to PC2, and captures the RAM24 in pc2 (step, step S23) 'displays the processing content on the display 〇 Although the user connects to the server 4 via the network 3 when the network connection is established, the input unit 25 such as a keyboard or a mouse is used to perform the νρΝ connection processing request (step S25). The user uses the input unit 25 such as a keyboard or a mouse to execute the VPN program stored in the operation unit _ _ program storage area i2b of the memory unit 12, and uses a keyboard or a mouse to respond to the program. The part 25 inputs the IP address of the ship 4, and then, after inputting the password and the password, the information input thereto can be transmitted to the cpui port in the memory device. ^ The machine 4 uses the input information to send the processed poor material to the PC2, and then to the PC2 _ from the fun, and establishes the connection between the communication unit 26 and the network 3 (step S26), through The communication unit % requests the VPN connection request data (id, password) for the feeding service (step S27). When the communication unit 40 of the server 4 receives the vpN connection request via the network 3 = the WN authentication unit 41 of the servo H 4, whether or not the VPN connection is performed between the user terminal c and the user terminal c (step s28) . Further, in the N authentication unit 41, the ID and password for which access is permitted are stored first. The Ministry of Information 4 (M) transmits the authentication result data processed by the VPN authentication unit 41 to the user terminal C (step S29). Upon receiving the cp (10) that has been allowed to access the result, it can be performed on the display 23. The processing (step S30) sends the authentication result data to (step S31), and the result is displayed on the display 23 (step magic 2). No. 4 ΐ line - when establishing, the maker performs the servo storage through _ 3! Since the processing of the application 43a, the Tan 43b, and the like is performed using the keyboard and the input unit 25 of the mouse 4, the face transfer processing request is executed (step 3). = The user is input using a keyboard or a mouse. The part 25 performs the operation of the memory, the screen transfer stored in the application storage area (3), and inputs the IP address of the feeding state 4 using the input unit 25 such as a keyboard or a mouse. After inputting the ID and password, the information input 20 201001226 is sent to the CPU 10 in the memory device 1. The CPU 10 is configured to execute the processing of the information input by the user, send the processing data to the PC 2, and operate to the PC 2 In the RAM 24 (step S34), the transfer is transmitted through the communication unit 26. The data is requested to the server 4 (ID, password) (step S35). When the communication unit 40 of the server 4 receives the facet transfer request through the network 3, the face transfer authentication unit 42 of the server 4 determines Whether or not the screen transfer is permitted between the user terminal C and the user terminal C is performed in the authentication process (step S36). Further, in the facet transfer 5, the forcible portion 42 "pre-stores the Liao which allows access" and the password. The port communication unit 40 transmits the authentication processed in the face transfer authentication unit 42 to the user terminal C (step S37). The CPU 10 that has received the authentication result that has been allowed to access performs processing for displaying the result on the display 23 (step S38), and sends the authentication to PC2 (pour S39) to display the result on the display. And == S40) When the screen transfer establishment is completed, the user can execute the application 43a and the file processing request stored in the server 4 using the input unit 25 such as a keyboard or a mouse (step S41). The CPU 10, which has received the processing request data, sends the user's request data to the PC 2 (step S42), and the processing is transmitted to the server 4 via the communication unit 26 (step S43). " When the communication unit 40 of the server 4 receives the processing temple through the network 3, in response to the processing request data, the execution server 4; the vomiting secret type 43a, or the termination program is deleted or saved. Processing (step S44). Or advance 40 (4) 4 to deal with the handling of the required materials, the general case

S45^>將扣處理内容的畫面資料傳送至用戶終端C 接收到晝面資料的CPU10用以執行使其晝面資料顯示於 201001226 處理(步驟S46),將畫面資_以ρα _ 使用)者iif ? 顯示於顯示器23 (步驟s48)。此外,ί 的情況下’即構成反覆進行步驟如〜ί 在使用者結束工作而欲終止PC2的啟 鼠等的輸入部25,輸入使上述第二作ί李ί 輊式的執行終止之指令等的命令(步驟S49)乍業系統 上述第—作鮮'統程式的執行之命令時, Π 於_24内的網際網路連線資訊,連 存;;憶i ?),將其資訊儲 —士冲六疋且錄貝況儲存£域12a (步驟S51)。一 健㈣程摘執行,終 25來係為了使用鍵盤或滑鼠等的輸入部 蓉夕、鱼綠^接連線、無線區域網路連線、有線區域網路連線 j連線㈣仃了各種設定,但若記,_ 12的設定登錄 ^仏内,儲存有網際網路連線資訊的話,由於其資訊 =透過CPU10 f買取,故無須再進行如步驟S2 ,S25、步驟S33亦是為建立VPN連線及晝^^ = 者使用鍵盤或滑鼠等的輸人部25進行Ip位址、ID及= 輸入,但若記憶部12的設定登錄資職存 有 WN連線資訊、晝面轉送奴資訊的話,由於 〇>mo讀取,故無須再進行如步驟S25、步㈣^的設疋定透過 η使用第7圖來說明新追加、變更指紋登錄的方 法’苐7圖係說明在新追加或變更指紋登錄之際的處理之 圖。使用者將記憶裝置1的記憶裝置主體la連接於PC2的^ 埠插孔後,啟動PC2的電源(步驟Sl〇〇)。BI〇s設定之啟 優先順位為首位的若非USB - HDD或usb - fd,則上述第二 作業系統程式會被執行,上述第二作業系統程式的桌面被顯^ 至PC2内的顯示益23 (步驟8101)。邮8設定之啟動優先順 22 201001226 位為首位的若是USB - HDD或USB - FD,則上述第-作章系 ,程式會被執行,啟動上述第一作業系統的⑽程式如 德WlHS (登錄商標)等),上述第一作業系統程式的桌面 被顯不至PC2内的顯示器23 (步驟si〇2)。 等的2=在i面被ϊ示至顯示器23時,使用鍵盤或滑鼠 ^的輸入^25,執讀存於記置丨内的記憶部12 程式(步驟S1G3)。因應其所執行的程式,S45^> transmitting the screen data of the processing content to the user terminal C. The CPU 10 receiving the face data is configured to execute the face data display in the 201001226 process (step S46), and the screen resource _ is used by ρα_) Iif ? is displayed on the display 23 (step s48). In addition, in the case of ί, the steps of the step of repeating the steps such as " ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ The order (step S49) when the system executes the above-mentioned command for the execution of the program, the Internet connection information within _24 is stored; the memory is stored in the _24; The singer rushes to the sixth place and records the condition of the field 12a (step S51). A health (four) process is performed, and in the end, in order to use the input part of the keyboard or mouse, Rong Xi, fish green ^ connection, wireless local area network connection, wired area network connection j connection (four) Various settings, but if you remember, _ 12 settings login ^ ,, stored Internet connection information, because its information = buy through CPU10 f, so no need to proceed as steps S2, S25, step S33 is also Establish VPN connection and 昼^^ = Use the input unit 25 of the keyboard or mouse to perform Ip address, ID and = input. However, if the setting of the memory unit 12 is registered, the WN connection information is stored. If you transfer the slave information, the 〇>mo is read, so there is no need to perform the steps of step S25 and step (4), and the method of adding and changing the fingerprint registration will be described using the seventh figure. A diagram of the processing when a new fingerprint is added or changed. When the user connects the memory device main 1a of the memory device 1 to the jack of the PC 2, the user turns on the power of the PC 2 (step S1). If the BI〇s setting is the first priority, if not the USB-HDD or usb-fd, the second operating system program will be executed, and the desktop of the second operating system program is displayed to the display benefit 23 in the PC2 ( Step 8101). If the USB-HDD or USB-FD is the first priority, the program will be executed to start the (10) program of the first operating system, such as De WlHS (Login trademark) ), etc., the desktop of the first operating system program is not displayed to the display 23 in the PC 2 (step si〇2). 2 = When the i-side is displayed on the display 23, the memory unit 12 program stored in the recording cassette is read using the keyboard or the input ^25 of the mouse ^ (step S1G3). In response to the program that it executes,

=二,指頭沿其凹部ld滑動,使指紋感測器13 4 以·^扣的扣紋。當指紋資料從指紋感測器13被讀取後,A 的指紋-致之處理係在指紋騎“ 舆所’ _打—赠理,直到 收、若與所登錄之指紋一致時,則用戶可因應上述程式内容, 邻f新m錄的手之單根手指絲於献認證裝置1 id滑動,讓指紋感測器13讀取s 、亦能刪除事先登錄的指紋資 、依據上述說明之本發明相關之實施方式,當標準p 被啟動時,記憶部12之啟動資訊儲存區域仏、12 準PC2啟動用的啟動資訊,從標準ρ(:2内的硬碟u =扇區所儲存的MBR2la所儲存的開機程式讀入,: 2啟動資執行促額戶使用上述指紋認證裝置= 該程_ ’用戶使用指紋認證裝置ib時,上述用 戶-ΐίΐΐ料被指紋感測器13讀取’透過指紋認證部14,執 =上述所項取的指紋資料是否與記憶部12的指、纹 tTVi-ΐί^ * ί 執订上相機程式是否可參考作㈣統—應 存區域i2b的控制。因此,若用戶的指紋資料未與 2 23 201001226 程式讀取了在上述作業系往3存£域既’即使上述開機 第-作業系統(Linux、(登錄商^用程^儲存區域12b儲存之 資訊,仍然無法參考上述第二d 〇s)程式那樣的 置,而被第三人取得記憶使用者遺失了記憶裝 \ΚΓ Α ,藉上述才承準PC2所儲存的第二作掌 f (登錄商標),—(登錚商护)耸) Ϊ =能在上述第二作業系統執行的 錄”式,進仃指紋登錄的話,則能儲存指紋資料。、种且 内,儲存;卩12的作業系統—應用程式儲存區域^ Ϊ ϊίί構_電腦系統所必要的應用程式(VPN程 接料賴於上述鮮PC2所賊的外部連 述第一作業系統程式啟動pc2的話,則可建 ===系統。於是,無論是在公司内部所使用的PC 的ΐ,或網咖所使用的Pc等,若為標準PC規格 記憶裝置1連接於外部連接端子即可建構精簡 又’上述設定登錄資訊儲存區域12a係藉上述第一作辈糸 成保密區域,上述作業系統-應用程式儲存‘或 bQ及上述啟動資訊儲存區域12c、12d係藉上述第一作業系 =成無法從外部寫人,在上述指紋登錄資訊儲存區S α内建有f猶,用以控制不被寫人指紋資料以外的資料,所 24 201001226 =使鲜PC2感麵毒,由於記财置l >法$入任立的 身料’故無病毒感染的情況發生。 歸罵入任思的 又,控制部11係控制成無法從外部參 訊儲存區域12a及上述作業系統— 且錄-貝 才曰紋登錄#訊儲存區域12e内建有勒 =述 於是’即使以增==二 標準PC2職㈣Cp㈣沒錢上 ,上述作業系統-應用程式 立 進行存取(使用者無法4ii;= ί而Γ1 ΐΐ進行存取的命令),故無病毒感染的問題發 且,日為在上述指紋登錄資訊儲存區域】2e内建有勒 不被寫入除指欲資料以外的資料,所以該區域益 法被寫入射日紋資訊以外的資料,故無病毒感染的情形。”、、 又,在上述啟動資訊儲存區域12c、12d 有準PC2之刪奴資輯必定存在的 型的PC ’亦能以記億裝置所安裳的 上述第一作業系統程式來啟動標準PC。 又,因為是作成在上述啟動資訊儲存區域12c、12d,内 5當亡述標準PC2啟動時’無法參考上述作業系統一應用 程式儲存輯12b的航,使上述鮮pc2終止啟動的命令, 所以使用者可於短時間内判斷標準PC2啟動時之指紋認證是 成功或是失敗。 又,由於控制成在使用上述第一作業系統程式啟動上述標 準PC2後,上述弟一作業系統程式無法從外部參考裝設於上 述標準PC2的硬碟2卜所以在朗上述第—作㈣統程式啟 動標準PC2之後,無法從外部參考硬碟21。因此,更能避免 記憶裝置感染病毒的危險性。 又,在其他實施方式,亦可如第8圖所示,將記憶部12ι 25 201001226 矾、士样八利1 N文登錄貢訊儲存區域12e2。透 f者取得^理者_話,則可 、使用疏裝置1之祕管理者缺資料事 指紋登錄資訊儲存區域12el。若事先文的 話,則在與使用者(User)益法遠级/者才曰紋貝料的 使用記憶裝置i的無法預料的^ 管理者變得無須對所有該記憶裝置^ 所說日觸登錄指紋的作業,可達到工作 此外’如第9圖所示,亦可將却捨 彳絲理者 用者(User)設定登錄資訊儲在卩+ Λ〜 若辜弈你其押本说/曰二、 °σ或12a;2。透過上述的分割, 線資訊、ί面轉送網連線資訊、㈣連 =’將管理者用_際網路連線資使^置1 =送設定#訊事先财於管理者設定魏區ί= 2, the finger slides along its concave portion ld, so that the fingerprint sensor 13 4 is buckled with a button. After the fingerprint data is read from the fingerprint sensor 13, the fingerprint-processing of A is performed on the fingerprint riding _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ In response to the above program content, the single finger of the hand recorded by the neighboring f slides on the authentication device 1 id, so that the fingerprint sensor 13 can read s, and can also delete the previously registered fingerprint, and the invention according to the above description In the related embodiment, when the standard p is activated, the startup information storage area 记忆12 of the memory unit 12 starts the startup information for the PC2, and the MBR2la stored in the standard ρ(:2 hard disk u=sector) The stored boot program is read in: 2 Startup capital execution and use of the above fingerprint authentication device = The process _ 'When the user uses the fingerprint authentication device ib, the above-mentioned user-ΐίΐΐ material is read by the fingerprint sensor 13 'through fingerprint authentication In step 14, whether the fingerprint data obtained by the above item and the finger of the memory unit 12 and tTVi-ΐί^* ί are used to control whether the camera program can be referred to as (four) system-storage area i2b. Therefore, if the user Fingerprint data not with 2 23 201001226 Read the program in the above-mentioned operation system, even if the above-mentioned boot-up operation system (Linux, (the information stored in the login service ^ storage area 12b, still cannot refer to the second d 〇 s) program The user who lost the memory by the third person lost the memory device ΚΓ Α , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , The recording system that can be executed in the above-mentioned second operating system can store fingerprint data if it is fingerprinted. It can be stored in the storage system. 作业12 operating system - application storage area ^ ϊ ί ί ί _ computer system The necessary application (the VPN program depends on the external computer system thief's external connection to the first operating system program to start pc2, then you can build === system. So, whether it is used in the company's internal PC ΐ , or the Pc used by the Internet cafe, if the standard PC specification memory device 1 is connected to the external connection terminal, the construction can be simplified and the above-mentioned setting login information storage area 12a is formed by the first generation to create a secret area. system applications The program storage 'or bQ and the above-mentioned startup information storage areas 12c, 12d are borrowed from the above-mentioned first operating system = can not be written from outside, and the fingerprint registration information storage area S α is built in the above-mentioned fingerprint registration information storage area S α to control not to be written. Information other than human fingerprint data, 24 201001226 = Make fresh PC2 sensational, because of the memory of the l > law $ into the body of the body 'there is no virus infection. 骂 骂 任 任 任 任 任The control unit 11 is controlled so as not to be able to read from the external reference storage area 12a and the above-mentioned operating system--and the recording-before-in-line registration-information storage area 12e has a built-in ==“even if it is increased==two standard PC2 jobs (four) Cp (four) If there is no money, the above operating system-application is accessed (the user cannot access 4ii; = ί and Γ1 ΐΐ access command), so there is no virus infection problem, and the day is in the fingerprint login information storage area 】 2e built-in has not been written in addition to the information required by the information, so the regional benefits are written into the data other than the Japanese-style information, so there is no virus infection. Further, in the above-described startup information storage areas 12c and 12d, the PC of the type in which the suffix of the PC2 must exist can also start the standard PC by the first operating system program that the singular device is installed. In addition, since it is created in the above-described startup information storage areas 12c and 12d, when the standard PC 2 is started, it is impossible to refer to the navigation of the operating system-application storage unit 12b, and the fresh pc2 is terminated. In a short period of time, it can be judged whether the fingerprint authentication of the standard PC2 is successful or failed. Further, since the control is such that the standard PC2 is started by using the first operating system program, the above-mentioned operating system program cannot be externally referenced. The hard disk 2 is set on the standard PC2. Therefore, after the standard PC2 is started, the hard disk 21 cannot be externally referenced. Therefore, the risk of the memory device being infected with the virus can be avoided. In the embodiment, as shown in FIG. 8, the memory unit 12 ι 25 201001226 矾, 士型八利1 N text is registered in the tribute storage area 12e2. , the secret manager of the device 1 can be used to log in to the information storage area 12el. If the text is used in advance, the user can use the memory of the user. i's unpredictable ^ The manager becomes unnecessary to work on all the memory devices, and the work of logging in to the fingerprints can be done. In addition, as shown in Fig. 9, it can also be used by the user ( User) Set the login information to be stored in 卩+ Λ~ If you want to play your book, say 曰2, °σ or 12a; 2. Through the above division, line information, 面面转网connection information, (4) even = ' The administrator will use the _ network connection to make the ^ set 1 = send the setting #讯先财管理 administrator set Wei District ί

tfi ^ ΐ^ίίΐΐ^ 'VPN 桌,述^=的 在管理者用的桌面上事先的桌面’二種桌面。 鼠等的輸入部25、讀入管理去理者能執行使用鍵盤或滑 儲存之管理者用的網際網路連心^錄;身訊儲存區严12a〗所 轉送設定資訊的指令之程式。接』5、PN連線資訊及晝面 紋登錄資訊儲存區域12要,,f先作成以_控制成指 用的API t,寫入在PC2 =1、、文貝訊以外的資料儲存所利 時,已讀取管理者指紋登錄資 26 201001226 訊儲存區域12ei的指紋資訊的狀態;或是已讀取使用者(User) 扣,登錄資訊儲存區域12¾的指紋資訊的狀態。藉此,管理 者月&以,5圖所說明之流程步驟來啟動pc2,其相異處為在第 6圖所示的步驟S20,當執行上述第一作業系統程式時,首先, 上述第一作業系統程式的GUI程式(例如χ _ wifld〇ws (登錄 商祆)等)啟動,讀入控制著指紋登錄資訊儲存區域12e的韌 ,所利用的API,執行確認是否已讀人管理者指紋登錄資訊儲 ^域12ei的指紋資訊;或是已讀人使用者(User)指紋登錄 貝,儲存(1域12e2的指紋資訊4讀人管理者指紋登錄資訊 J存,域12ei的指紋資訊’則使PC2 _顯示器23顯示上述 4二!!業祕程式之管理者㈣*面’若讀人使用者(㈣) 才曰紋登錄資訊儲存區域%的指紋資訊,則使上述第一作業 系統=的使用者(User)用的顯示桌面pc2内的顯示器23。 用的桌面被顯示於顯示11,則管理者係使用鍵盤 或π鼠專的輸入部25,執行可執行讀取管理者設定登錄 =域二广斤儲存之管理者用的網際網路連線資訊,°ν ΐ送設定資訊的指令之程式。於是,CPU20 ^、進仃#取㈣者奴登錄資魏域%内 =網際網”線資訊、ypN連線資訊及晝面轉送設 ^貝_處理。依該處理’即使管理者未進行第6圖所之 ^驟S21、步驟S25及倾S33的設定步驟 ^ =:=〇為止的處理,還是可隨時?皮執=: ifi it 記憶裝置1的場合時,無須對全部記憶裝 置1反覆進行相同的设定作業,因而可達到工 … 又,在其他實施方式中,亦可如第10 ^效率化。_ 憶裝置主體la上,更可安裝有内建著l、f 不,於上述έ己 訊之咖職is的記财貞工ω資 用者的員幻时默 1工證使用,在用戶從工作室離開之際,若: 2 作至的門口附近之讀卡機讀取記憶裝置l時,則無 27 201001226 有機Πί:ί:二内r進而可防1技=變得沒 過設置於所使用的標準PC2之通信部%,了 體2 ^ ;^^ίίί;:~Η 路連線等之連線手段與網路3連線的,|f況發生。…5 此外,在上述的實施方式中,係使 =屬外部連接端子之璋的USB記 裝置卜1〗及丨2 ’但亦可為連接於USB蜂的記 = ff^T) ^ + (} ^ ( ί 錄商,)4)),未舰於須個聰記憶 又,在上述的實施方式中,係將記憶震置】插入^ g 埠來作使用,但若為能連接於 先順位設為前段祕的連接形式,_可不動優 ^ H的記㈣置卜11、12雖使耽賊置主體1a、 裝置1b為分離之構成,但亦可使用未分 減輯取方法上,雖是使狀_手之單根手 „於指紋認證裝置lb的上方之凹部ld = ,之指頭滑動而使指紋感測器13讀取密接於凹部 =,但是讓指减測輯取指_方法亦可使用其他的方 杳賴鮮PC2軸使崎記贱腦進行本發明之 實施方式的說明,但當然亦可以桌上鶴電腦來實施本 28 201001226 再者,上述的記憶裝置l、UL係具備CPTJ1〇,即 具備CPU10,亦可使用設置於PC2的CPU2〇。但若考 , 毒的入侵’貞UX在能確實進行防毒對策的記憶裝置i^丙 上備有CPU10者為宜。 12 【圖式簡單說明】 第1圖係使用本發明相關之實施方式,建構精簡型電 統的情況之說明圖。 承 第2圖第2 (a)圖係為本發明相關之實施方式所涉及之 憶裝置的斜視圖。第2 (b)圖係本發明相關之實施 々 方式所涉及之記憶裝置的分離狀態圖。 第3圖係使用本發明相關之實施方式,建構精簡型電 統的情況之方塊圖。 、 ,4圖係用於說明進行指紋登錄時處理之流程圖。 第5圖,用於說明啟動用戶終端時處理之流程圖。 f 6圖係用於說明建構精簡型電腦系統時處理之流程圖。 第7圖係用於說明新追加、或變更指紋登錄時處理之流程 圖。 ,8圖係顯示本發明的另一實施方式之記憶部。 第9圖係|員示本發明的再一實施方式之記憶部。 第1〇圖係使用本發明的另一實施方式,建構精簡型電腦系 統的情況之方塊圖。 、 第11圖錢用本發明的再—實施方式,建構精簡型電腦系 統的情況之方塊圖。 、 【主要元件符號說明】 1h、丨2 :記憶裝置 la、、1¾ :記憶裝置主體 lb :指紋認證裝置 lc :纜線 29 201001226 le :連接器部 Id :凹部Tfi ^ ΐ^ ίίΐΐ^ 'VPN table, said ^= The desktop on the desktop for the administrator's desktop. The input unit 25 of the mouse or the like, the read-in management person can execute the Internet connection for the administrator who uses the keyboard or the slide storage, and the program for transferring the setting information by the body storage area strict 12a. Connected to the 5, PN connection information and 昼 登录 login information storage area 12, f first made into _ control into the API t used for writing, written in PC2 =1, the data storage other than Wenbei News At the time, the state of the fingerprint information of the manager's fingerprint registration area 12 201001226 is stored; or the state of the fingerprint information of the user information deduction and the information storage area 123⁄4 has been read. Thereby, the manager month & starts the pc2 by the process steps described in FIG. 5, and the difference is the step S20 shown in FIG. 6, when the first operating system program is executed, first, the above A GUI program of an operating system program (for example, _ _ wifld〇ws (registered commerce), etc.) is activated, and reads the control of the fingerprint of the fingerprint registration information storage area 12e, and uses the API to perform confirmation to confirm whether the fingerprint of the person manager has been read. Login information storage domain 12ei fingerprint information; or read user user (User) fingerprint login shell, storage (1 domain 12e2 fingerprint information 4 reader management fingerprint login information J, domain 12ei fingerprint information ' Let PC2_Monitor 23 display the above-mentioned 4-2!! The manager of the secret program (4)*face' If the reader user ((4)) only prints the fingerprint information of the information storage area %, the first operating system = The user (User) displays the display 23 in the desktop pc2. The used desktop is displayed on the display 11, and the administrator uses the keyboard or the π mouse-specific input unit 25 to execute the executable read manager setting login=domain. Management of Erguangjin Storage Using the Internet connection information, °ν ΐ send the command to set the information. So, CPU20 ^, 仃 取 取 (4) slaves log in to the domain of the domain = Internet network information, ypN connection information and According to the process, even if the manager does not perform the processing of step S21, step S25, and step S33 of Fig. 6 ^=:=〇, it is still possible =: ifi it In the case of the memory device 1, it is not necessary to perform the same setting operation for all the memory devices 1 in the same manner, and thus, in other embodiments, the efficiency can be improved as in the tenth embodiment. On the main body la, it is also possible to install a built-in l, f no, in the above-mentioned 咖 之 之 is is is is is ω ω ω ω ω ω ω ω ω ω ω ω 工 工 工 工 工 工 工 工 工In the meantime, if: 2, the card reader near the doorway reads the memory device l, then there is no 27 201001226 organic Π ί: ί: two inner r and then can prevent 1 technology = has not been set in the standard used % of the communication part of PC2, the connection of the body 2 ^ ; ^^ ̄ ί ί ί ί ί ί ί ί ί Further, in the above-described embodiment, it is assumed that the USB device of the external connection terminal is 11 and '2' but may be connected to the USB bee = ff^T) ^ + (} ^ ( ί 商商,) 4)), unsold in need of a Cong memory, in the above embodiment, the memory is shocked] inserted ^ g 埠 for use, but if it can be connected to the first position For the connection form of the former paragraph secret, _ can not move the excellent ^ H note (four) set out 11, 12 although the thief set the main body 1a, the device 1b is separated, but can also use the undivided method, although Make the _ hand's single hand „ in the recess ld = above the fingerprint authentication device lb, the finger slides to make the fingerprint sensor 13 read in close contact with the recess =, but let the finger reduce the acquisition of the finger _ method can also The description of the embodiment of the present invention is carried out by using the other PCs and the PC2 axis, but of course, the table crane computer can be used to implement the present invention. 28 201001226 Further, the memory device 1 and the UL system described above have CPTJ1. That is, the CPU 10 is provided, and the CPU 2 set to the PC 2 can also be used. However, if the test, the poison intrusion 贞 UX is suitable for the CPU 10 that can reliably carry out anti-virus measures. [Embodiment of the drawings] Fig. 1 is an explanatory view showing a case where a simplified electric system is constructed by using an embodiment related to the present invention. Fig. 2(a) is a perspective view of a memory device according to an embodiment of the present invention. Fig. 2(b) is a diagram showing the separation state of the memory device according to the embodiment of the present invention. Figure 3 is a block diagram showing the construction of a compact system using the embodiments of the present invention. , , 4 is used to explain the flow chart when processing fingerprint login. Figure 5 is a flow chart for explaining the processing when the user terminal is activated. The f 6 diagram is used to illustrate the flow chart for processing a compact computer system. Figure 7 is a flow chart for explaining the process of newly adding or changing the fingerprint registration. 8 shows a memory portion of another embodiment of the present invention. Fig. 9 is a view showing a memory unit according to still another embodiment of the present invention. Fig. 1 is a block diagram showing a case where a simplified computer system is constructed by using another embodiment of the present invention. Fig. 11 is a block diagram showing the case of constructing a compact computer system by using the re-embodiment of the present invention. [Main component symbol description] 1h, 丨2: Memory device la,, 13⁄4: Memory device main body lb: Fingerprint authentication device lc: Cable 29 201001226 le : Connector part Id : Concave part

2 : PC 3 :網路 4 :伺服器2 : PC 3 : Network 4 : Server

10、20 : CPU 11 :控制部 12 ’ 12! ’ 122 ·•記憶部 12a :設定登錄資訊儲存區域 12a!:管理者設定登錄資訊儲存區域 12az :使用者(User)設定登錄資訊儲存區域 12b :作業系統及應用程式儲存區域 12c、12d :啟動資訊儲存區域 12e :指紋登錄資訊儲存區域 12e〗:管理者指紋登錄資訊儲存區域 12e2 :使用者(User)指紋登錄資訊儲存區域 13 :指紋感測器 14 :指紋認證部 15 : RFID 標籤 16 :通信部 21 :硬碟 21a :主啟動紀錄(MBR)10, 20 : CPU 11 : Control unit 12 ' 12! ' 122 · Memory unit 12a : Setting registration information storage area 12a!: Administrator setting login information storage area 12az : User setting user registration information storage area 12b : Operating system and application storage area 12c, 12d: startup information storage area 12e: fingerprint registration information storage area 12e: manager fingerprint registration information storage area 12e2: user fingerprint login information storage area 13: fingerprint sensor 14 : Fingerprint authentication unit 15 : RFID tag 16 : Communication unit 21 : Hard disk 21 a : Master startup record (MBR)

22 : ROM 23 :顯示器22 : ROM 23 : Display

24 : RAM 25 :輸入部 26 :通信部 40 :通信部 41 : VPN認證部 42 :晝面轉送認證部 30 201001226 43 :記憶部 43a :應用程式 43b :檔案 C:用戶終端 S1-S4、S10-S19、S20-S52、S100-S105 :各步驟流程 3124 : RAM 25 : input unit 26 : communication unit 40 : communication unit 41 : VPN authentication unit 42 : face transfer authentication unit 30 201001226 43 : memory unit 43a : application program 43b : file C : user terminals S1 - S4 , S10 - S19, S20-S52, S100-S105: Step 31 of each step

Claims (1)

201001226 七、申請專利範圍: f 5 PC (Personal Computer) ^ 。備的-外。卩連接端子,且透過進行—指紋繼而可建 型電腦系統的記憶裝置,具有能連接於該外部連接端子一: 憶裝置主體及能執行該指紋認證的一指紋認證裝己^ ί主體係由—記憶部和—控制部所構成,其中,該記憶 / 一汉疋登錄貧訊儲存區域’用以至少儲存在建構 糸統之際所必要之VPN (Vi^alPr〇vateN 晝面轉送設定資訊等; -作業系統-翻程式儲存區域,用以至少儲存—第 系統(Operating System,作業系統)程 = 統所需的朗程式; 从動貢訊儲存區域,用以至少儲存可啟動該標準PC的-啟tr貝訊;儲存著在該啟動資訊被該標準pc讀取後 用認證錢的-程式及該程式“後會被 -指紋登錄資訊儲存區域,用以儲存—指紋資料, ^存可利賴行該第—健系絲錢該鮮Pc 2 第二作業系統程式的指紋資料登錄用程式; 、 儲控制成無法從外部參考該設定登錄資訊 ;===:執行過促使該“用= =證j置,用者的指紋認證之時,依據該= 部參考該設定登錄資訊儲存區域及該作 業,統-應用私式儲存區域的控制,同時執行是否 動資訊儲存區域控制成保密區域之控制, 、 其中,該指紋認證裝置係包含: 32 201001226 一,紋,,器,用以讀取指紋資料的;以及 ^指紋遇,部’用以執行藉該指紋感測器讀取的指紋資料與 u指紋登錄貧訊儲存區域所儲存的指紋資料是否一致之判斷, 登錄資訊儲存區域’係藉該第—作業系統程式 區域該作業系統-應贿式儲存區域及該啟動資 ,係藉該第—作業系統程式控制成無法從外部寫 區域喊摘體,肋控制不被寫 2 圍第1項所述之記憶裝置,其中,在該啟動資 ^ 5 USB (Universal serial bus) - FD ^Py (登錄商標)Disk)之啟動資訊。 利範圍第1項或第2項所述之記憶裝置,其中,在 儲存區域’内建有在該標準pc啟動時,無法參 應用程式儲存區域時,使該標準PC的啟動 3;中任-項所述之記憶裝置, 你普么^用~第作業系統程式啟動該標準pc後,該第一 之方ί進^=無法從外部參考被裝設_標準PC的硬碟 盆項至第4項中任-項所述之記憶裝置’ 與—使时(User)指紋登__存區 資料 資訊館存區域,事先儲存管理者指紋 6 1申請補細第5項所述之記歸置,㈣,# ;===錄:挪 在内建於該指对>L义辟_疋貝讯等 知紋且錄貝訊儲存區域之韌體所利用之A朽 33 201001226 ^ApplicationPrograminterface)中,寫入在該標準 時’參考該管理者指紋登錄資訊儲存區域所儲存的指 ,,或是參考該使用者(User)餘登錄魏儲存區域= 存的指紋資料之資訊,在該第一作業系統程式,於該& Pf—啟動時’讀人被寫入該API的資訊,在該標準Pc ^ 日寺安裝當參考管理者的驗資料之時,啟動—f理者用的桌 面;^在參考使用者的指、纹資料之時,啟動一使用者用的^ 面之=里程式’在該管理者用的桌面,安裝將該管理者設定 登錄育訊儲存區域所儲存的資訊自動地讀出的程式。 .如申睛專利範圍g1項至第6項中任一項所述之記憶裝置, 其中,親’It裝置主體係具有喊該使用者㈣IID資訊 之 RFID (Radion Frequency Identification)標籤。 •如申請專利範圍第1項至第7項中任—項所述之記 , 其中,献憶裝置主體係具有與網路連線用之通信部。 34201001226 VII, the scope of application for patents: f 5 PC (Personal Computer) ^. Prepared - outside.卩Connecting the terminal, and through the fingerprint-printing device, the memory device of the computer system can be connected to the external connection terminal: a device body and a fingerprint authentication device capable of performing the fingerprint authentication are provided by the main system The memory unit and the control unit are configured, wherein the memory/one-hit login to the poor memory storage area is used to store at least the VPN necessary for constructing the system (Vi^alPr〇vateN, the transfer information, etc.; - operating system - a program storage area for storing at least - the operating system required to operate the system; the slave tribute storage area for storing at least the standard PC - Tr 贝 讯 ;; stored in the startup information is read by the standard pc after the use of the certification money - the program and the program will be - fingerprint login information storage area for storage - fingerprint data, The fingerprint data registration program of the second Pc 2 second operating system program is executed; the storage control is unable to externally refer to the setting login information; ===: the execution has prompted the " = = certificate j, when the user's fingerprint authentication, according to the = part reference to the setting login information storage area and the operation, the system - the application of the private storage area control, while executing whether the information storage area is controlled into a secret area Control, wherein, the fingerprint authentication device comprises: 32 201001226 a pattern, a device for reading fingerprint data; and a fingerprint portion, a portion for performing a fingerprint read by the fingerprint sensor Judging whether the data is consistent with the fingerprint data stored in the U-fingerprint storage area, the login information storage area is borrowed from the first operating system program area, the operating system, the bribe storage area, and the startup capital. The first-operation system program is controlled so that the body cannot be shouted from the external write area, and the rib control is not written to the memory device described in item 1, wherein the boot device 5 USB (Universal serial bus) - FD ^Py (Login trademark) Disk) startup information. The memory device of item 1 or 2, wherein in the storage area, when the standard pc is started, when the application storage area cannot be used, the startup of the standard PC is performed; The memory device described in the item, after you start the standard pc with the operating system program, the first party ί进^= can not be installed from the external reference _ standard PC hard disk bowl item to the 4th In the item, the memory device described in any of the items and the user fingerprints are stored in the storage area, and the manager's fingerprint is stored in advance. (4), # ;===录: Moved in the built-in pair of > L _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ When writing in the standard, refer to the finger stored in the administrator's fingerprint login information storage area, or refer to the user (User) to log in the Wei storage area = stored fingerprint information, in the first operating system program. , at the & Pf - at startup - the reader is written to the API information, in the Quasi-Pc ^ Riji installation When the reference manager's inspection data, start the desktop for the use of the user; ^ When referring to the user's finger and grain data, start a user's ^face = mileage 'On the desktop for the administrator, install the program that automatically reads the information stored in the management information storage area. The memory device according to any one of the preceding claims, wherein the master system of the pro-It device has an RFID (Radion Frequency Identification) tag that calls the user (IV) IID information. • As described in the first to seventh items of the patent application scope, wherein the main system of the memory device has a communication unit for connecting to the network. 34
TW098108325A 2008-06-30 2009-03-13 Memory device TW201001226A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2008170583A JP2010009473A (en) 2008-06-30 2008-06-30 Memory device

Publications (1)

Publication Number Publication Date
TW201001226A true TW201001226A (en) 2010-01-01

Family

ID=41465832

Family Applications (1)

Application Number Title Priority Date Filing Date
TW098108325A TW201001226A (en) 2008-06-30 2009-03-13 Memory device

Country Status (3)

Country Link
JP (1) JP2010009473A (en)
TW (1) TW201001226A (en)
WO (1) WO2010001731A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130190383A1 (en) * 2010-04-26 2013-07-25 Marina Biotech, Inc. Nucleic acid compounds with conformationally restricted monomers and uses thereof
US9600709B2 (en) 2012-03-28 2017-03-21 Synaptics Incorporated Methods and systems for enrolling biometric data

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG113483A1 (en) * 2003-10-30 2005-08-29 Ritronics Components S Pte Ltd A biometrics parameters protected usb interface portable data storage device with usb interface accessible biometrics processor
JP2006221411A (en) * 2005-02-10 2006-08-24 Sharp Corp Authentication algorithm evaluation device and method
US7739726B2 (en) * 2005-11-14 2010-06-15 Route1 Inc. Portable device for accessing host computer via remote computer
JP2007179214A (en) * 2005-12-27 2007-07-12 Kosugi Masami Network service anonymous billing system
WO2008001823A1 (en) * 2006-06-27 2008-01-03 Science Park Corporation Computer data management method, program, and recording medium

Also Published As

Publication number Publication date
JP2010009473A (en) 2010-01-14
WO2010001731A1 (en) 2010-01-07

Similar Documents

Publication Publication Date Title
US10419426B2 (en) Cached credentials for offline domain join and login without local access to the domain controller
US10565383B2 (en) Method and apparatus for secure credential entry without physical entry
US9792441B2 (en) Portable desktop device and method of host computer system hardware recognition and configuration
JP6140177B2 (en) Techniques for applying and sharing remote policies on mobile devices
JP4299316B2 (en) Information processing system
JP4293234B2 (en) Connection management method and connection management server in thin client
US7797278B2 (en) Migratable backup and restore
TWI326427B (en) Biometrics signal input device, computer system having the biometrics signal input device, and control method thereof
US20120303762A1 (en) Zero Configuration Set-Up for Thin Client Computers
US20140359284A1 (en) Computer program and method for biometrically secured, transparent encryption and decryption
US9703969B2 (en) Image forming system, service providing server, information processing terminal, image forming device and non-transitory computer readable recording medium
WO2018133678A1 (en) Device configuration method, apparatus and system
US11298613B2 (en) Information processing device, data acquisition method, and program
JP2007300161A (en) Electronic apparatus and authentication management method of electronic apparatus system
JP2010262586A (en) Memory device, memory device system, and method therefor
WO2005078595A1 (en) Removable external storage device and automatic activation program
TW201001226A (en) Memory device
JP2005092745A (en) Personal computer control system using mobile storage medium and mobile storage medium
JP2008146551A (en) Password information management system, terminal and program
JP2006268632A (en) Computer system, storage server, retrieval server, terminal device and retrieval method
TWI259399B (en) Computer system having entertainment mode capabilities
JP2003271482A (en) Information communication terminal setting method
JP2007233444A (en) Information processor and authentication method
KR20040061052A (en) Usb apparatus having a remote control function and remote controlling method thereof
JP2007233437A (en) Information processor and authentication method