TW201802701A - Local data sharing system and method in which a server device transmits encipher data and a key for deciphering the enciphered data to an electronic device separately - Google Patents

Local data sharing system and method in which a server device transmits encipher data and a key for deciphering the enciphered data to an electronic device separately Download PDF

Info

Publication number
TW201802701A
TW201802701A TW105120876A TW105120876A TW201802701A TW 201802701 A TW201802701 A TW 201802701A TW 105120876 A TW105120876 A TW 105120876A TW 105120876 A TW105120876 A TW 105120876A TW 201802701 A TW201802701 A TW 201802701A
Authority
TW
Taiwan
Prior art keywords
processing unit
electronic device
data
key
identification information
Prior art date
Application number
TW105120876A
Other languages
Chinese (zh)
Other versions
TWI622886B (en
Inventor
吳政璋
許志鵬
施杰煥
Original Assignee
中華數位科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中華數位科技股份有限公司 filed Critical 中華數位科技股份有限公司
Priority to TW105120876A priority Critical patent/TWI622886B/en
Publication of TW201802701A publication Critical patent/TW201802701A/en
Application granted granted Critical
Publication of TWI622886B publication Critical patent/TWI622886B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed is a local data sharing system. A processing module of an electronic device generates a data request that inquires enciphered data and contains user identification information of the electronic device, and transmits the data request to a server device. When a processing unit of the server device determines the user identification information matches identification data of the user in a first authorization list, the processing unit transmits enciphered data to the electronic device. When the processing unit of the server device receives a key request from the electronic device, with the processing unit determining the electronic device is located in an authorization area according to the key request and the identification data, the processing unit transmits a key to the electronic device to allow the processing module of the electronic device to decipher the enciphered data.

Description

區域性資料分享系統及方法Regional data sharing system and method

本發明是有關於一種資料分享系統及方法,特別是指一種區域性資料分享系統及方法。The present invention relates to a data sharing system and method, and particularly to a regional data sharing system and method.

現有的資料分享系統是將數位資料儲存於一伺服器中,以供擁有權限的使用者操作電子裝置連線至該伺服器,藉此存取數位資料。若擁有數位資料的任一使用者在網路上散布該數位資料,則所有沒有權限的使用者也能取得該數位資料,造成對使用者及數位資料提供者的困擾。Existing data sharing systems store digital data in a server for users with authority to operate electronic devices to connect to the server, thereby accessing the digital data. If any user who owns the digital data distributes the digital data on the network, all users who do not have the permission can also obtain the digital data, causing distress to the user and the digital data provider.

現有的控管數位資料的方法是將數位資料加密,並且在認證過內建於電子裝置的身分後,才提供該電子裝置解密的資料,藉此控管該數位資料。The existing method of controlling digital data is to encrypt the digital data and provide the data decrypted by the electronic device only after the identity of the electronic device is authenticated, thereby controlling the digital data.

然而,對於希望在僅在特定地理場域公開該數位資訊的數位資訊提供者而言,上述的方法無法滿足其需求。However, for a digital information provider who wishes to disclose the digital information only in a specific geographic field, the above method cannot meet its needs.

因此,本發明之其中一目的,即在提供一種區域性資料分享系統,可規範一電子裝置僅能在一被授權區域解開一由伺服器單元提供的加密資料。Therefore, one of the objectives of the present invention is to provide a regional data sharing system, which can regulate an electronic device to unlock an encrypted data provided by a server unit only in an authorized area.

於是,本發明一種區域性資料分享系統,包含一伺服器裝置及至少一電子裝置。該伺服器裝置包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一用戶識別資訊。該至少一電子裝置包括一處理模組。該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器裝置,該資料請求包含一用戶識別資訊。當該伺服器裝置的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置。當該伺服器裝置的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置。該電子裝置的處理模組使用該金鑰將該加密資料解密。Therefore, a regional data sharing system of the present invention includes a server device and at least one electronic device. The server device includes a storage unit and a processing unit electrically connected to the storage unit. The storage unit stores encrypted data, a key for decrypting the encrypted data, a first authorized list, and an authorized Area identification data, the first authorized list contains user identification information. The at least one electronic device includes a processing module. The processing module of the electronic device generates a data request for obtaining the encrypted data, and transmits the data request to the server device. The data request includes a user identification information. When the processing unit of the server device receives the data request, the processing unit determines whether the user identification information of the data request is the same as the user identification information of the first authorized list, and when the processing unit determines the data request If the user identification information is the same as the user identification information of the first authorized list, the processing unit transmits the encrypted data to the electronic device. When the processing unit of the server device receives a key request from the electronic device for obtaining the key, the processing unit determines whether the electronic device is located in the authorized area according to the key request and the identification data. When the processing unit determines that the electronic device is located in the authorized area according to the key request and the identification data, the processing unit transmits the key to the electronic device. The processing module of the electronic device uses the key to decrypt the encrypted data.

在一些實施態樣中,該第一授權名單包含多個用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置。當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置。該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該金鑰請求的該用戶識別資訊尚未被加入一出席清單,則該處理單元將該金鑰請求的該用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置,供該出席清單中的用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。In some implementation forms, the first authorized list includes a plurality of user identification information, and the regional data sharing system includes a plurality of electronic devices. When the processing unit of the server device receives the data request from one of the electronic devices, the processing unit determines whether the user identification information of the data request is the same as one of the user identification information of the first authorized list. The unit determines that the user identification information of the data request is the same as one of the user identification information of the first authorized list, and the processing unit transmits the encrypted data to the one of the electronic devices. The key request includes user identification information. When the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit determines the one of the electronic devices according to the key request and the identification data. Located in the authorized area, and the user identification information requested by the key has not been added to a attendance list, the processing unit adds the user identification information requested by the key to the attendance list, and judges the presence of Whether the number of user identification information reaches a predetermined attendance threshold, and when the processing unit judges that the number of user identification information in the attendance list reaches the predetermined attendance threshold, the processing unit transmits the key to the user identification information in the attendance list The corresponding electronic device is used by the electronic device corresponding to the user identification information in the attendance list to decrypt the encrypted data using the key.

在一些實施態樣中,該儲存單元還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置。當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置。該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊相同,則該處理單元將該金鑰傳送至所述其中一電子裝置,供所述其中一電子裝置使用該金鑰將該加密資料解密。所述其中一電子裝置的處理模組將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密。In some implementation forms, the storage unit further stores a second authorization list, the second authorization list containing user identification information different from the user identification information of the first authorization list, and the regional data sharing system Contains multiple electronic devices. When the processing unit of the server device receives the data request from one of the electronic devices, the processing unit determines whether the user identification information of the data request is the same as the user identification information of the first authorized list or the second authorized list When the processing unit judges that the user identification information of the data request is the same as the user identification information of the first authorized list or the second authorized list, the processing unit transmits the encrypted data to one of the electronic devices. The key request includes user identification information. When the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit determines the one of the electronic devices according to the key request and the identification data. Located in the authorized area, and the processing unit judges that the user identification information of the data request is the same as the user identification information of the first authorized list, the processing unit transmits the key to one of the electronic devices for The one of the electronic devices uses the key to decrypt the encrypted data. The processing module of one of the electronic devices transmits the key to another electronic device corresponding to the user identification information of the second authorized list for the other electronic device to decrypt the encrypted data using the key.

在一些實施態樣中,該電子裝置還包括一電連接該處理模組的GPS模組,該GPS模組產生一該電子裝置所在位置的GPS座標,該金鑰請求還包含該GPS座標,該伺服器裝置所儲存的該辨別資料包含該被授權區域的一GPS座標範圍。當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。In some embodiments, the electronic device further includes a GPS module electrically connected to the processing module. The GPS module generates a GPS coordinate at a location of the electronic device. The key request further includes the GPS coordinate. The identification data stored by the server device includes a GPS coordinate range of the authorized area. When the processing unit determines that the GPS coordinate requested by the key falls within the GPS coordinate range of the discrimination data, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,還包含一位於該被授權區域內的存取點,當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者的該金鑰請求。該伺服器裝置所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該位址其中至少該者。當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,該處理單元判斷該電子裝置位於該被授權區域內。In some embodiments, an access point located in the authorized area is further included. When the electronic device is connected to a communication network through the access point, the electronic device receives a media access control bit from the access point. At least one of an IP address, a service setting identifier, and an IP address, and generates the key request including the media access control address, the service setting identifier, and at least one of the IP address. The identification data stored by the server device includes at least one of the media access control address, the service setting identifier, and the address. When the processing unit judges at least one of the media access control address requested by the key, the service setting identifier and the IP address, the media access control address of the identification data, and the service setting identifier It is the same as at least one of the IP address, and the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,還包含一位於該被授權區域內的通訊裝置,該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求。該伺服器裝置所儲存的該辨別資料包含該識別碼。當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。In some embodiments, a communication device located in the authorized area is also included. The communication device uses an short-range communication technology to send an identification code. When the electronic device is located in the authorized area, the electronic device uses the The short-range communication technology receives the identification code and generates the key request including the identification code. The identification data stored by the server device includes the identification code. When the processing unit determines that the identification code requested by the key is the same as the identification code of the identification data, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該電子裝置還包括一電連接該處理模組的影像拍攝模組,該影像拍攝模組用於拍攝該電子裝置所在環境以產生一影像,該金鑰請求還包含該影像。該伺服器裝置所儲存的該辨別資料包含一相關於該被授權區域的參考影像。當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。In some embodiments, the electronic device further includes an image capturing module electrically connected to the processing module. The image capturing module is configured to capture an environment in which the electronic device is located to generate an image. The key request further includes the image capturing module. image. The identification data stored by the server device includes a reference image related to the authorized area. When the processing unit uses an image comparison technique to determine that the image requested by the key is similar to the reference image of the identification data, the processing unit determines that the electronic device is located in the authorized area.

本發明之另一目的,在於提供一區域性資料分享方法,可規範一電子裝置僅能在一被授權區域解開一由伺服器單元提供的加密資料。Another object of the present invention is to provide a regional data sharing method, which can regulate an electronic device to unlock an encrypted data provided by a server unit only in an authorized area.

於是,本發明一種區域性資料分享方法,由一伺服器裝置及至少一電子裝置共同執行,該伺服器裝置包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一用戶識別資訊,且該電子裝置包括一處理模組,該方法包含以下步驟:(A)該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器裝置,該資料請求包含一用戶識別資訊;(B)當該伺服器裝置的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置; (C)當該伺服器裝置的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置;及(D)該電子裝置的處理模組使用該金鑰將該加密資料解密。Therefore, a regional data sharing method of the present invention is jointly performed by a server device and at least one electronic device. The server device includes a storage unit and a processing unit electrically connected to the storage unit. The storage unit stores encrypted data. A key for decrypting the encrypted data, a first authorized list, and identification data related to an authorized area, the first authorized list contains user identification information, and the electronic device includes a processing module, The method includes the following steps: (A) the processing module of the electronic device generates a data request for obtaining the encrypted data, and transmits the data request to the server device, the data request including a user identification information; ( B) When the processing unit of the server device receives the data request, the processing unit determines whether the user identification information of the data request is the same as the user identification information of the first authorized list, and when the processing unit determines the data request The user identification information of is the same as the user identification information of the first authorized list, the processing unit encrypts the (C) when the processing unit of the server device receives a key request from the electronic device for obtaining the key, the processing unit judges based on the key request and the identification data Whether the electronic device is located in the authorized area, and when the processing unit determines that the electronic device is located in the authorized area according to the key request and the identification data, the processing unit transmits the key to the electronic device; and ( D) The processing module of the electronic device uses the key to decrypt the encrypted data.

在一些實施態樣中,該方法是由該伺服器裝置及多個電子裝置執行,該第一授權名單包含多個用戶識別資訊,其中, 在該步驟(A)中,當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置;在該步驟(C)中,該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該金鑰請求的該用戶識別資訊尚未被加入一出席清單 ,則該處理單元將該金鑰請求的該用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置,供該出席清單中的用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。In some embodiments, the method is performed by the server device and a plurality of electronic devices. The first authorized list includes a plurality of user identification information. In step (A), when the server device The processing unit receives the data request from one of the electronic devices, the processing unit determines whether the user identification information of the data request is the same as one of the user identification information of the first authorized list, and when the processing unit determines that the data request The user identification information is the same as one of the user authorization information of the first authorized list, and the processing unit transmits the encrypted data to one of the electronic devices; in step (C), the key request includes a user identification Information, when the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit determines that one of the electronic devices is located in the authorized area according to the key request and the identification data, and The user identification information requested by the key has not been added to a attendance list, the processing unit requests the user identification requested by the key Information is added to the attendance list, and it is determined whether the number of user identification information in the attendance list reaches a predetermined attendance threshold. When the processing unit judges that the number of user identification information in the attendance list reaches the predetermined attendance threshold, the processing unit will The key is transmitted to the electronic device corresponding to the user identification information in the attendance list, and the electronic device corresponding to the user identification information in the attendance list uses the key to decrypt the encrypted data.

在一些實施態樣中,該方法是由該伺服器裝置及多個電子裝置執行,該儲存單元還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊,其中,在步驟(D)後,還包含:(E)所述其中一電子裝置的處理模組將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密;其中,在該步驟(A)中,當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置;在該步驟(C)中,該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊相同,則該處理單元將該金鑰傳送至所述其中一電子裝置,供所述其中一電子裝置使用該金鑰將該加密資料解密。In some embodiments, the method is performed by the server device and a plurality of electronic devices. The storage unit further stores a second authorization list, and the second authorization list includes a user different from the first authorization list. The user identification information of the identification information, after step (D), further includes: the processing module of one of the electronic devices described in (E) transmits the key to another user identification corresponding to the second authorized list An electronic device of information for the other electronic device to decrypt the encrypted data using the key; wherein, in step (A), when the processing unit of the server device receives the data from one of the electronic devices Request, the processing unit determines whether the user identification information of the data request is the same as the user identification information of the first authorized list or the second authorized list, and when the processing unit determines that the user identification information of the data request is identical to the first The user identification information of the authorized list or the second authorized list is the same, and the processing unit transmits the encrypted data to one of the electronic devices. In step (C), the The key request includes user identification information. When the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit determines that one of the electronic devices is located on the basis of the key request and the identification data. Within the authorized area, and the processing unit determines that the user identification information of the data request is the same as the user identification information of the first authorized list, the processing unit transmits the key to one of the electronic devices for the One of the electronic devices uses the key to decrypt the encrypted data.

在一些實施態樣中,該方法的該電子裝置還包括一電連接該處理模組的GPS模組,其中,在步驟(C)前,還包含:(F)該GPS模組產生一該電子裝置所在位置的GPS座標,該金鑰請求還包含該GPS座標,該伺服器裝置所儲存的該辨別資料包含該被授權區域的一GPS座標範圍;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。In some embodiments, the electronic device of the method further includes a GPS module electrically connected to the processing module, wherein before step (C), it further includes: (F) the GPS module generates an electronic The GPS coordinates of the device location, the key request also includes the GPS coordinates, and the identification data stored by the server device includes a GPS coordinate range of the authorized area; wherein, in step (C), when the The processing unit determines that the GPS coordinate requested by the key falls within the GPS coordinate range of the identification data, and the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該方法還由一位於該被授權區域內的存取點共同執行,該伺服器裝置所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該位址其中至少一者,其中,在步驟(C)前,還包含:(G)當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少該者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者的該金鑰請求;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,該處理單元判斷該電子裝置位於該被授權區域內。In some implementations, the method is also performed jointly by an access point located in the authorized area. The identification data stored by the server device includes the media access control address, the service setting identifier, and At least one of the addresses, wherein, before step (C), the method further includes: (G) when the electronic device is connected to a communication network via the access point, the electronic device receives a media access from the access point Controlling at least one of the address, a service setting identifier, and an IP address, and generating the key request including the media access control address, the service setting identifier, and at least one of the IP address; Wherein, in the step (C), when the processing unit judges that at least one of the media access control address, the service setting identifier, and the IP address requested by the key is stored with the media of the identification data. Taking at least one of the control address, the service setting identifier and the IP address is the same, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該方法還由一位於該被授權區域內的通訊裝置共同執行,該伺服器裝置所儲存的該辨別資料包含該識別碼,其中,在步驟(C)前,還包含:(H)該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。In some implementation aspects, the method is also jointly performed by a communication device located in the authorized area, and the identification data stored by the server device includes the identification code, and before step (C), the method further includes: : (H) The communication device uses a short-range communication technology to send an identification code. When the electronic device is located in the authorized area, the electronic device uses the short-range communication technology to receive the identification code and generate an identification code containing the identification code. The key request; wherein, in step (C), when the processing unit determines that the identification code of the key request is the same as the identification code of the identification data, the processing unit determines that the electronic device is located in the authorized area Inside.

在一些實施態樣中,該方法的該電子裝置還包括一電連接該處理模組的影像拍攝模組,該伺服器裝置所儲存的該辨別資料包含一相關於該被授權區域的參考影像,其中,在步驟(C)前,還包含:(I)該影像拍攝模組拍攝該電子裝置所在環境以產生一影像;其中,在該步驟(C)中,該金鑰請求還包含該影像且當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。In some implementation aspects, the electronic device of the method further includes an image capturing module electrically connected to the processing module, and the identification data stored by the server device includes a reference image related to the authorized area, Wherein, before step (C), the method further includes: (I) the image capturing module captures an environment where the electronic device is located to generate an image; wherein, in step (C), the key request further includes the image and When the processing unit uses an image comparison technique to determine that the image requested by the key is similar to the reference image of the identification data, the processing unit determines that the electronic device is located in the authorized area.

本發明至少具有以下功效:在本發明區域性資料分享系統及區域性資料分享方法中,該伺服器裝置的處理單元判斷該電子裝置與該第一授權名單的用戶識別資訊相同後,將該加密資料傳送至屬於該第一授權名單內的該電子裝置,藉此確保加密資料是被預先被傳送至該第一授權名單內的電子裝置,然後,該伺服器裝置的處理單元以不同的方式判斷該電子裝置之所在區域是位於該被授權區域內,才將該金鑰傳送至位於該被授權區域的該電子裝置,以供該電子裝置的處理模組將該加密資料解密,藉此確保該加密資料僅於該被授權區域內被使用。The present invention has at least the following effects: In the regional data sharing system and the regional data sharing method of the present invention, after the processing unit of the server device judges that the electronic device is the same as the user identification information of the first authorized list, it encrypts the The data is transmitted to the electronic device belonging to the first authorized list, thereby ensuring that the encrypted data is transmitted to the electronic device included in the first authorized list in advance, and then the processing unit of the server device judges in different ways The area where the electronic device is located is in the authorized area, and then the key is transmitted to the electronic device located in the authorized area for the processing module of the electronic device to decrypt the encrypted data, thereby ensuring that the Encrypted data is only used in this authorized area.

在本發明被詳細描述之前,應當注意在以下的說明內容中,類似的元件是以相同的編號來表示。Before the present invention is described in detail, it should be noted that in the following description, similar elements are represented by the same numbers.

請參閱圖1,本發明一種區域性資料分享系統100的一第一實施例包含一伺服器單元1及一電子裝置2。Please refer to FIG. 1, a first embodiment of a regional data sharing system 100 according to the present invention includes a server unit 1 and an electronic device 2.

該伺服器單元1包括一儲存單元11、一通訊單元12,及一電連接該儲存單元11與通訊單元12的處理單元13。該儲存單元11儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域301的辨別資料。在本實施例中,該第一授權名單包含一用戶識別資訊,該用戶識別資訊為例如一對應於被授權的電子裝置的國際移動設備識別碼(International Mobile Equipment Identity,IMEI),但不以此為限,在其他的實施態樣中,該用戶識別資訊也可以例如為一被授權的使用者帳號。The server unit 1 includes a storage unit 11, a communication unit 12, and a processing unit 13 electrically connecting the storage unit 11 and the communication unit 12. The storage unit 11 stores encrypted data, a key for decrypting the encrypted data, a first authorized list, and identification data related to an authorized area 301. In this embodiment, the first authorized list includes user identification information, and the user identification information is, for example, an International Mobile Equipment Identity (IMEI) corresponding to the authorized electronic device, but not the same. For limitation, in other embodiments, the user identification information may also be, for example, an authorized user account.

在本實施例中,該被授權區域301是例如一GPS座標範圍,也可以是一特定地點譬如一會議室或教室,但不以此為限。In this embodiment, the authorized area 301 is, for example, a GPS coordinate range, and may also be a specific location such as a conference room or classroom, but is not limited thereto.

該伺服器單元1的處理單元13利用該通訊單元12以有線或無線的方式連接至一通訊網路201。The processing unit 13 of the server unit 1 uses the communication unit 12 to connect to a communication network 201 in a wired or wireless manner.

該電子裝置2包括一儲存模組21、一通訊模組22、一GPS模組24及一電連接該儲存模組21、該通訊模組22及該GPS模組24的處理模組25。在本實施例中,該電子裝置2的處理模組25可透過該通訊模組22連接至該通訊網路201而經由該伺服器單元1的通訊單元12與該處理單元13進行有線或無線通訊。在本實施例中,該電子裝置2可以是一平板電腦、一智慧型手機或筆記型電腦等等。The electronic device 2 includes a storage module 21, a communication module 22, a GPS module 24, and a processing module 25 electrically connected to the storage module 21, the communication module 22, and the GPS module 24. In this embodiment, the processing module 25 of the electronic device 2 may be connected to the communication network 201 through the communication module 22 and perform wired or wireless communication with the processing unit 13 through the communication unit 12 of the server unit 1. In this embodiment, the electronic device 2 may be a tablet computer, a smart phone, or a notebook computer.

請參閱圖1及圖2,該區域性資料分享系統100的第一實施例例如用以執行本發明區域性資料分享方法的一第一實施例,該實施例包含以下步驟。Please refer to FIG. 1 and FIG. 2. The first embodiment of the regional data sharing system 100 is, for example, a first embodiment for performing the regional data sharing method of the present invention. The embodiment includes the following steps.

在步驟S21中,該電子裝置2的處理模組25產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元1的該處理單元13。該資料請求包含該電子裝置2的用戶識別資訊。該用戶識別資訊例如為該電子裝置2的國際移動設備識別碼(International Mobile Equipment Identity,IMEI),但不以此為限,在其他的實施態樣中,該用戶識別資訊也可以例如為操作該電子裝置2的使用者的使用者帳號。In step S21, the processing module 25 of the electronic device 2 generates a data request for obtaining the encrypted data, and transmits the data request to the processing unit 13 of the server unit 1. The data request includes user identification information of the electronic device 2. The user identification information is, for example, the International Mobile Equipment Identity (IMEI) of the electronic device 2, but is not limited thereto. In other implementations, the user identification information may also be, for example, an operation of the device. A user account of a user of the electronic device 2.

在步驟S22中,當該伺服器單元1的處理單元13接收到來自該電子裝置2的該資料請求,該處理單元13判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊是否相同,若結果為是,則進入步驟S23。在本實施例中,若結果為否,則進入步驟S29,結束本方法,但不以此為限。In step S22, when the processing unit 13 of the server unit 1 receives the data request from the electronic device 2, the processing unit 13 determines the user identification information of the data request and the user identification information of the first authorized list. If they are the same, if the result is yes, go to step S23. In this embodiment, if the result is no, the process proceeds to step S29 to end the method, but is not limited thereto.

於步驟S23中,該伺服器單元1的處理單元13將該加密資料傳送至該電子裝置2。In step S23, the processing unit 13 of the server unit 1 transmits the encrypted data to the electronic device 2.

由上述可知,藉由該區域性資料系統100的第一實施例執行步驟S21~S23能確保僅具有與該第一授權名單相同的用戶識別資訊的電子裝置2才能夠取得到該加密資料,換句話說,加密資料的提供者可藉由設定該第一授權名單以規範能取得該加密資料的使用者的之權限。It can be known from the above that by performing steps S21 to S23 in the first embodiment of the regional data system 100, it is ensured that only the electronic device 2 having the same user identification information as the first authorized list can obtain the encrypted data, and In other words, the provider of encrypted data can set the first authorized list to regulate the permissions of users who can obtain the encrypted data.

在步驟S24中,該電子裝置2的GPS模組24產生一該電子裝置2所在位置的GPS座標。In step S24, the GPS module 24 of the electronic device 2 generates a GPS coordinate of the location of the electronic device 2.

在步驟S25中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該電子裝置2之該GPS座標,該電子裝置2並將該金鑰請求傳送至該伺服器單元1。In step S25, the processing module 25 of the electronic device 2 generates a key request for obtaining the key. The key request includes the GPS coordinates of the electronic device 2. The electronic device 2 receives the key. The request is transmitted to the server unit 1.

在步驟S26中,當該伺服器單元1的處理單元13接收到來自該電子裝置2的金鑰請求,該處理單元13根據該金鑰請求中的GPS座標及該辨別資料中GPS座標範圍判斷該電子裝置2是否位於該被授權區域301內,若結果為是,則進入步驟S27。In step S26, when the processing unit 13 of the server unit 1 receives the key request from the electronic device 2, the processing unit 13 judges the key according to the GPS coordinates in the key request and the GPS coordinate range in the discrimination data. Whether the electronic device 2 is located in the authorized area 301, and if the result is yes, the process proceeds to step S27.

在步驟S27中,該處理單元13將該金鑰傳送至該電子裝置2。In step S27, the processing unit 13 transmits the key to the electronic device 2.

在步驟S28中,該電子裝置2使用該金鑰將該加密資料解密。In step S28, the electronic device 2 uses the key to decrypt the encrypted data.

由上述可知,透過區域性資料系統100的第一實施例執行步驟S24~S28,能確保只有位於該GPS座標範圍內的電子裝置2才能取得該金鑰,藉此規範取得該加密資料的使用者的僅於該GPS座標範圍內使用該資料,進而滿足該加密資料提供者希望該加密資料僅在該GPS座標範圍公開之需求。It can be known from the above that by performing steps S24 to S28 through the first embodiment of the regional data system 100, it can be ensured that only the electronic device 2 located within the GPS coordinate range can obtain the key, thereby regulating users who obtain the encrypted data. Uses the data only within the GPS coordinate range, thereby satisfying the requirement that the encrypted data provider wants the encrypted data to be disclosed only within the GPS coordinate range.

補充說明的是,在本實施例的步驟S26中伺服器單元1僅判斷該電子裝置2是否位於該被授權區域301內,但不以此為限。在其他的實施例中,步驟S25中該電子裝置2的處理模組25所產生的金鑰請求還可包含該電子裝置2的用戶識別資料,並且在該步驟S26中該伺服器單元1的處理單元13還判斷該用戶識別資料及該第一授權名單的用戶識別資料是否相同,若結果也為是,才進入步驟S27。如此以來,即可確保接收該金鑰請求的電子裝置2位於該授權區域內且屬於該第一授權名單。再者,在本實施例中是以一電子裝置2舉例說明,但不以此為限,在其他實施態樣中,也可藉多個電子裝置2實施本實施例,只要建立多個電子裝置2的用戶識別資訊於該第一授權名單即可。It is added that, in step S26 in this embodiment, the server unit 1 only determines whether the electronic device 2 is located in the authorized area 301, but is not limited thereto. In other embodiments, the key request generated by the processing module 25 of the electronic device 2 in step S25 may further include user identification information of the electronic device 2, and the processing of the server unit 1 in step S26 The unit 13 also judges whether the user identification data and the user identification data of the first authorized list are the same, and if the result is also yes, it proceeds to step S27. In this way, it can be ensured that the electronic device 2 receiving the key request is located in the authorized area and belongs to the first authorized list. Furthermore, in this embodiment, an electronic device 2 is used as an example, but it is not limited thereto. In other implementations, this embodiment may be implemented by using multiple electronic devices 2 as long as multiple electronic devices are established. The user identification information of 2 can be in the first authorized list.

此外,在本實施例步驟S24~S26中,該處理單元13是透過比對該金鑰請求的GPS座標是否落在該辨別資料的GPS座標範圍內,而判斷該電子裝置2是否位於該被授權區域301內,但其判斷方式不以此為限。在本發明區域性資料分享方法的第二至第四實施例中將分別說明其他三個判斷該電子裝置2是否位於該被授權區域301內的實施態樣。In addition, in steps S24 to S26 of this embodiment, the processing unit 13 determines whether the electronic device 2 is located in the authorized area by comparing whether the GPS coordinates requested for the key fall within the GPS coordinates range of the discrimination data. The area 301 is not limited to this. In the second to fourth embodiments of the regional data sharing method of the present invention, three other implementation manners for determining whether the electronic device 2 is located in the authorized area 301 will be described respectively.

請參閱圖3,本發明區域性資料分享系統100一第二實施例包含一伺服器單元1、一電子裝置2及一位於該被授權區域31內的存取點3。在本實施例中,該伺服器單元1與該第一實施例大致相同,差別在於本實施例的辨別資料是例如包括一該存取點3的媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,但不以此為限。在本實施例中,該電子裝置2與該第一實施例大致相同,差別在於本實施例的電子裝置2還包括一短距通訊模組23。在本實施例中,該短訊通訊模組23譬如支援WiFi技術、藍芽(Blue tooth)技術及NFC(Near Field Communication)技術其中至少一者。Referring to FIG. 3, a second embodiment of a regional data sharing system 100 of the present invention includes a server unit 1, an electronic device 2, and an access point 3 located in the authorized area 31. In this embodiment, the server unit 1 is substantially the same as the first embodiment. The difference is that the identification data in this embodiment is, for example, a media access control address including the access point 3, and a service setting identifier. And at least one of an IP address, but not limited to this. In this embodiment, the electronic device 2 is substantially the same as the first embodiment, except that the electronic device 2 in this embodiment further includes a short-range communication module 23. In this embodiment, the short message communication module 23 supports, for example, at least one of WiFi technology, Bluetooth technology and NFC (Near Field Communication) technology.

該存取點3具有一通訊器31、一短距通訊器32及一電連接該通訊器31及該短距通訊器32的控制器33。在本實施例中,該存取點3具有媒體存取控制位址、一服務設定識別符及一IP位址其 中至少該者。在本實施例中,該存取點3的控制器33利用該通訊器31連接至該通訊網路201並經由該伺服器單元1的通訊單元12與該處理單元13進行有線或無線通訊。在本實施例中,該短距通訊器32支援例如WiFi技術、藍芽(Blue tooth)技術及NFC(Near Field Communication)技術其中至少該者,該存取點3的控制器33利用該短距通訊器32經由該電子裝置2的短距通訊模組23與該處理模組25進行短距無線通訊。如此一來,該電子裝置2即可經由該存取點3與該伺服器單元1進行資料的雙向傳輸。The access point 3 has a communicator 31, a short-range communicator 32, and a controller 33 electrically connected to the communicator 31 and the short-range communicator 32. In this embodiment, the access point 3 has at least one of a media access control address, a service setting identifier, and an IP address. In this embodiment, the controller 33 of the access point 3 uses the communicator 31 to connect to the communication network 201 and performs wired or wireless communication with the processing unit 13 through the communication unit 12 of the server unit 1. In this embodiment, the short-range communicator 32 supports at least one of, for example, WiFi technology, Blue tooth technology, and NFC (Near Field Communication) technology. The controller 33 of the access point 3 uses the short-range The communicator 32 performs short-range wireless communication with the processing module 25 via the short-range communication module 23 of the electronic device 2. In this way, the electronic device 2 can perform two-way data transmission with the server unit 1 through the access point 3.

請參閱圖3及圖4,該區域性資料分享系統100的第二實施例例如用以執行本發明區域性資料分享方法的一第二實施例,在本實施例中,步驟S41~S43與第一實施例的步驟S21~S23相同,且步驟S47~S49與第一實施例的步驟S27~S29相同。主要差異在於用以判斷該電子裝置2是否位於該被授權區域301內的步驟S44~S46,說明如下。Please refer to FIG. 3 and FIG. 4. The second embodiment of the regional data sharing system 100 is, for example, a second embodiment for implementing the regional data sharing method of the present invention. In this embodiment, steps S41 to S43 and the first Steps S21 to S23 of one embodiment are the same, and steps S47 to S49 are the same as steps S27 to S29 of the first embodiment. The main difference lies in steps S44 to S46 for determining whether the electronic device 2 is located in the authorized area 301, as described below.

在步驟S44中,該電子裝置2由該存取點3接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者。In step S44, the electronic device 2 receives at least one of a media access control address, a service setting identifier, and an IP address from the access point 3.

在步驟S45中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者,並將該金鑰請求傳送至該伺服器單元1。In step S45, the processing module 25 of the electronic device 2 generates a key request for obtaining the key. The key request includes the media access control address, the service setting identifier, and the IP address. At least one of them, and sends the key request to the server unit 1.

在步驟S46中,該伺服器單元1的處理單元13是判斷該金鑰請求的媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,則該處理單元13判斷該電子裝置2位於該被授權區域301內,並進入步驟S47。若結果為否,則進入步驟S49,結束本實施例,但不以此為限。In step S46, the processing unit 13 of the server unit 1 judges the media access control address of the key request, the service setting identifier, and the IP address of at least one of the media access and the identification data. At least one of the control address, the service setting identifier, and the IP address is the same, the processing unit 13 determines that the electronic device 2 is located in the authorized area 301, and proceeds to step S47. If the result is no, the process proceeds to step S49 to end the embodiment, but is not limited thereto.

藉由該區域性資料系統100的第二實施例執行步驟S44~S48能確保使用該金鑰開啟該加密資料的電子裝置2是位於存取點3的有效通訊範圍內,藉此規範取得該加密資料的使用者的僅於該存取點3的有效通訊範圍內使用該加密資料,進而滿足該加密資料提供者希望該加密資料僅在該存取點3的有效通訊範圍內公開之需求。在本實施例中,存取點3的有效通訊範圍即定義出該被授權區域301,因此,透過將該存取點3設置在一特定地點例如會議室或教室,即可規範使用者在該特定地點才能使用該加密資料。By performing the steps S44 to S48 in the second embodiment of the regional data system 100, it can be ensured that the electronic device 2 that uses the key to open the encrypted data is located within the effective communication range of the access point 3, thereby obtaining the encryption in a standardized manner. The user of the data uses the encrypted data only within the effective communication range of the access point 3, thereby satisfying the requirement that the encrypted data provider wants the encrypted data to be disclosed only within the effective communication range of the access point 3. In this embodiment, the effective communication range of the access point 3 defines the authorized area 301. Therefore, by setting the access point 3 in a specific place such as a conference room or classroom, users can be regulated in the area. Specific locations can use this encrypted data.

請參閱圖5,本發明區域性資料分享系統100一第三實施例包含一伺服器單元1、一電子裝置2及一位於該被授權區域31內的通訊裝置4。在本實施例中,該伺服器單元1及該電子裝置2與本系統的第二實施例大致相同,主要差別在於該辨別資料包括該通訊裝置4的識別碼。Referring to FIG. 5, a third embodiment of a regional data sharing system 100 according to the present invention includes a server unit 1, an electronic device 2, and a communication device 4 located in the authorized area 31. In this embodiment, the server unit 1 and the electronic device 2 are substantially the same as the second embodiment of the system. The main difference is that the identification data includes the identification code of the communication device 4.

在本實施例中,該通訊裝置4包含一短距通訊單元41及一電連接該短距通訊單元41的控制單元42。在本實施例中,該通訊裝置4利用該短距通訊單元42以一短距離通訊技術發送一識別碼至該電子裝置2的短距通訊模組23,具體而言,該短距離通訊技術例如支援WiFi技術、藍芽(Blue tooth)技術及NFC(Near Field Communication)技術其中至少該者。在本實施例中,該通訊裝置4例如為一信標裝置(Beacon Device),以單向廣播(Unidirectional Broadcasr )的方式向外發送一包含該識別碼的藍芽信號,但不以此為限。In this embodiment, the communication device 4 includes a short-range communication unit 41 and a control unit 42 electrically connected to the short-range communication unit 41. In this embodiment, the communication device 4 uses the short-range communication unit 42 to send an identification code to the short-range communication module 23 of the electronic device 2 using a short-range communication technology. Specifically, the short-range communication technology is, for example, Support at least one of WiFi technology, Blue tooth technology and NFC (Near Field Communication) technology. In this embodiment, the communication device 4 is, for example, a beacon device, and sends a Bluetooth signal including the identification code in a unidirectional broadcast (Unidirectional Broadcasr) manner, but is not limited thereto. .

請參閱圖5及圖6,該區域性資料分享系統100的第三實施例例如用以執行本發明區域性資料分享方法的一第三實施例,在本實施例中,步驟S61~S63與第一實施例的步驟S21~S23相同,且步驟S67~S69與第一實施例的步驟S27~S29相同。主要差異在於判斷該電子裝置2是否位於該被授權區域301內的步驟S64~S66,說明如下。Please refer to FIG. 5 and FIG. 6. The third embodiment of the regional data sharing system 100 is, for example, a third embodiment for implementing the regional data sharing method of the present invention. In this embodiment, steps S61 to S63 and the first Steps S21 to S23 of one embodiment are the same, and steps S67 to S69 are the same as steps S27 to S29 of the first embodiment. The main difference lies in steps S64 to S66 of judging whether the electronic device 2 is located in the authorized area 301, as described below.

在步驟S64中,該電子裝置2由該通訊裝置4接收該識別碼。In step S64, the electronic device 2 receives the identification code from the communication device 4.

在步驟S65中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該識別碼,並將該金鑰請求傳送至該伺服器單元1。In step S65, the processing module 25 of the electronic device 2 generates a key request for obtaining the key, the key request includes the identification code, and transmits the key request to the server unit 1.

在步驟S66中,該伺服器單元1的處理單元13是判斷該金鑰請求的識別碼與該辨別資料的識別碼是否相同,若結果為是,則該處理單元13判斷該電子裝置2位於該被授權區域301內,並進入步驟S67。若結果為否,則進入步驟S69,結束本實施例,但不以此為限。In step S66, the processing unit 13 of the server unit 1 determines whether the identification code of the key request and the identification code of the identification data are the same. If the result is yes, the processing unit 13 determines that the electronic device 2 is located in the In the authorized area 301, the process proceeds to step S67. If the result is no, the process proceeds to step S69 to end the embodiment, but is not limited thereto.

該區域性資料系統100透過執行本實施例的步驟S64~S68,確保能使用該金鑰開啟該加密資料的電子裝置2是位於通訊裝置4的有效通訊範圍內,藉此規範取得該加密資料的使用者的僅於該通訊裝置4的有效通訊範圍內使用該資料,進而滿足該加密資料提供者希望該加密資料僅在該通訊裝置4的有效通訊範圍內公開之需求。在本實施例中,通訊裝置4的有效通訊範圍即定義出該被授權區域301,因此,透過將該通訊裝置4設置在一特定地點例如會議室或教室,即可規範使用者在該特定地點才能使用該加密資料。The regional data system 100 executes steps S64 to S68 of this embodiment to ensure that the electronic device 2 that can use the key to open the encrypted data is within the effective communication range of the communication device 4, thereby regulating the acquisition of the encrypted data. The user uses the data only within the effective communication range of the communication device 4, thereby satisfying the requirement that the encrypted data provider wants the encrypted data to be disclosed only within the effective communication range of the communication device 4. In this embodiment, the effective communication range of the communication device 4 defines the authorized area 301. Therefore, by setting the communication device 4 in a specific place such as a conference room or classroom, users can be regulated in the specific place To use the encrypted data.

請參閱圖7,本發明區域性資料分享系統100一第四實施例包含一伺服器單元1及一電子裝置2。在本實施例中,該伺服器單元1與該第一實施例大致相同,差別在於本實施例的辨別資料例如包括一相關於該被授權區域301的參考影像。在本實施例中,該電子裝置2與該第一實施例大致相同,差別在於本實施例的電子裝置2還包括一電連接該處理模組的影像拍攝模組26,該影像拍攝模組26用於拍攝該電子裝置2所在環境以產生一影像。Referring to FIG. 7, a fourth embodiment of a regional data sharing system 100 according to the present invention includes a server unit 1 and an electronic device 2. In this embodiment, the server unit 1 is substantially the same as the first embodiment. The difference is that the identification data of this embodiment includes, for example, a reference image related to the authorized area 301. In this embodiment, the electronic device 2 is substantially the same as the first embodiment, except that the electronic device 2 in this embodiment further includes an image capturing module 26 electrically connected to the processing module. The image capturing module 26 It is used for shooting the environment where the electronic device 2 is located to generate an image.

請參閱圖7及圖8,該區域性資料分享系統100的第四實施例例如用以執行本發明區域性資料分享方法的一第四實施例,在本實施例中,步驟S81~S83與第一實施例的步驟S21~S23相同,且步驟S87~S89與第一實施例的步驟S27~S29相同。主要差異在於判斷該電子裝置2是否位於該被授權區域301內的步驟S84~S86,說明如下。Please refer to FIG. 7 and FIG. 8. The fourth embodiment of the regional data sharing system 100 is, for example, a fourth embodiment for implementing the regional data sharing method of the present invention. In this embodiment, steps S81 to S83 and the first Steps S21 to S23 of one embodiment are the same, and steps S87 to S89 are the same as steps S27 to S29 of the first embodiment. The main difference lies in steps S84 to S86 of determining whether the electronic device 2 is located in the authorized area 301, as described below.

在步驟S84中,該電子裝置2的影像拍攝模組26拍攝該電子裝置2所在環境以產生一影像。In step S84, the image capturing module 26 of the electronic device 2 captures the environment in which the electronic device 2 is located to generate an image.

在步驟S85中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該影像,並將該金鑰請求傳送至該伺服器單元1。In step S85, the processing module 25 of the electronic device 2 generates a key request for obtaining the key, the key request includes the image, and transmits the key request to the server unit 1.

在步驟S86中,該伺服器單元1的處理單元13使用一影像比對技術判斷該金鑰請求的影像與該辨別資料的參考影像相似,若結果為是,則該處理單元13判斷該電子裝置2位於該被授權區域301內,並進入步驟S87。若結果為否,則進入步驟S89,結束本實施例,但不以此為限。In step S86, the processing unit 13 of the server unit 1 uses an image comparison technique to determine that the image requested by the key is similar to the reference image of the identification data. If the result is yes, the processing unit 13 determines the electronic device 2 is located in the authorized area 301, and it proceeds to step S87. If the result is no, the process proceeds to step S89 to end the embodiment, but is not limited thereto.

請參閱圖9,本發明一種區域性資料分享系統100一第五實施例與第一實施例大致相同,差別在於本實施例還包含多個電子裝置2,且在本實施例中,該伺服器單元1與每一電子裝置2的結構及功能與該第一實施例大致相同,於此不再贅述。Please refer to FIG. 9. A fifth embodiment of a regional data sharing system 100 according to the present invention is substantially the same as the first embodiment, except that this embodiment further includes a plurality of electronic devices 2. In this embodiment, the server The structures and functions of the unit 1 and each electronic device 2 are substantially the same as those of the first embodiment, and details are not described herein again.

請參閱圖9及圖10,該區域性資料分享系統100的第五實施例例如用以執行本發明區域性資料分享方法的一第五實施例,該實施例包含以下步驟。Please refer to FIG. 9 and FIG. 10. The fifth embodiment of the regional data sharing system 100 is, for example, a fifth embodiment for executing the regional data sharing method of the present invention. The embodiment includes the following steps.

在步驟S101中,其中一電子裝置2的處理模組25產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元1。該資料請求包含所述其中一電子裝置2的用戶識別資訊。In step S101, a processing module 25 of one of the electronic devices 2 generates a data request for obtaining the encrypted data, and transmits the data request to the server unit 1. The data request includes user identification information of one of the electronic devices 2.

在步驟S102中,當該伺服器單元1的處理單元13接收到來自所述其中一電子裝置2的資料請求,該處理單13判斷該資料請求的用戶識別資訊與該第一授權名單的用戶識別資訊是否相同,若結果為是,則進入步驟S103。若結果為否,則進入步驟S110,結束本實施例,但不以此為限。In step S102, when the processing unit 13 of the server unit 1 receives a data request from one of the electronic devices 2, the processing form 13 judges the user identification information of the data request and the user identification of the first authorized list. If the information is the same, if the result is yes, go to step S103. If the result is no, proceed to step S110 to end the embodiment, but not limited to this.

於步驟S103中,該處理單元13將該加密資料傳送至所述其中一電子裝置2。In step S103, the processing unit 13 transmits the encrypted data to one of the electronic devices 2.

在步驟S104中,所述其中一電子裝置2的GPS模組24產生一所述其中一電子裝置2所在位置的GPS座標。In step S104, the GPS module 24 of one of the electronic devices 2 generates a GPS coordinate of the location of one of the electronic devices 2.

在步驟S105中,所述其中一電子裝置2產生一用於索取該金鑰的金鑰請求,該金鑰請求包含所述其中一電子裝置2之用戶識別資訊及該GPS座標,且所述其中一電子裝置2將該金鑰請求傳送至該伺服器單元1。In step S105, one of the electronic devices 2 generates a key request for obtaining the key, and the key request includes user identification information of the one electronic device 2 and the GPS coordinates, and wherein An electronic device 2 transmits the key request to the server unit 1.

在步驟S106中,當該伺服器單元1的處理單元13接收到來自所述其中一電子裝置2的金鑰請求,該處理單元13根據該金鑰請求的GPS座標及該辨別資料的GPS座標範圍判斷所述其中一電子裝置2是否位於該被授權區域301內且判斷所述其中一電子裝置2的用戶識別資訊是否尚未被加入一出席清單,若結果皆為是,則進入步驟S107。若結果為否,則進入步驟S110,結束本實施例,但不以此為限。補充說明的是,判斷所述其中一電子裝置2是否位於該被授權區域301內的方式不以此為限,在其他的實施態樣中,也可透過譬如第二至第四實施例所揭露的方法並配合對應的系統實施例執行進行判斷,換句話說,該被授權區域301也可以為一特定地點譬如會議室或教室等等。In step S106, when the processing unit 13 of the server unit 1 receives a key request from one of the electronic devices 2, the processing unit 13 according to the GPS coordinates requested by the key and the GPS coordinate range of the identification data. It is determined whether the one electronic device 2 is located in the authorized area 301 and whether the user identification information of the one electronic device 2 has not been added to a attendance list. If the results are all yes, the process proceeds to step S107. If the result is no, proceed to step S110 to end the embodiment, but not limited to this. It is added that the manner of determining whether one of the electronic devices 2 is located in the authorized area 301 is not limited to this. In other implementations, it can also be disclosed through, for example, the second to fourth embodiments. The method is implemented in accordance with the implementation of the corresponding system embodiment. In other words, the authorized area 301 may also be a specific place such as a conference room or a classroom.

在步驟S107中,該處理單元13將該金鑰請求的用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元13判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,則進入步驟S108。若結果為否,則進入步驟S110,結束本實施例,但不以此為限。在本實施例中,該預定出席門檻是指預設的電子裝置2的數量,因此,若每一電子裝置2是由一使用者所操作,則該預定出席門檻代表位於該被授權區內的使用者的出席人數,而出席人數必須到達該門檻,才能進入步驟S108。In step S107, the processing unit 13 adds the user identification information requested by the key to the attendance list, and determines whether the number of user identification information in the attendance list reaches a predetermined attendance threshold. When the processing unit 13 judges the attendance If the number of user identification information in the list reaches the predetermined attendance threshold, the process proceeds to step S108. If the result is no, proceed to step S110 to end the embodiment, but not limited to this. In this embodiment, the predetermined attendance threshold refers to a preset number of electronic devices 2. Therefore, if each electronic device 2 is operated by a user, the predetermined attendance threshold represents a person located in the authorized area. The number of attendees of the user must reach the threshold before proceeding to step S108.

在步驟S108中,該處理單元13將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置2。In step S108, the processing unit 13 transmits the key to the electronic device 2 corresponding to the user identification information in the attendance list.

在步驟S109中,該出席清單中的用戶識別資訊對應之電子裝置2使用該金鑰將該加密資料解密。In step S109, the electronic device 2 corresponding to the user identification information in the attendance list uses the key to decrypt the encrypted data.

由上述可知,透過以區域性資料分享系統100的第五實施例執行步驟S106~S109,不僅能確保只有位於該GPS座標範圍(即被授權區域301,也可以是一會議室或教室)內的電子裝置2才能使用該金鑰開啟該加密資料,且還能確保當該電子裝置2使用該金鑰開起該加密資料時,位於該GPS座標範圍內的電子裝置2數量已到達一預定出席門檻。換句話說,加密資料的提供者可藉由設定該預定出席門檻,進而控管每一使用該加密資料的使用者必須位於該GPS座標範圍內而且位於該GPS座標範圍內的使用者人數達到一定數量才能得到該金鑰。As can be seen from the above, by performing steps S106 to S109 with the fifth embodiment of the regional data sharing system 100, not only can it be ensured that only the GPS coordinate range (that is, the authorized area 301, but also a conference room or classroom) is located. Only the electronic device 2 can use the key to open the encrypted data, and can also ensure that when the electronic device 2 uses the key to open the encrypted data, the number of electronic devices 2 located within the GPS coordinate range has reached a predetermined threshold for attendance . In other words, the provider of encrypted data can set the predetermined attendance threshold, and then control that each user using the encrypted data must be located within the GPS coordinate range and the number of users within the GPS coordinate range reaches a certain number. Quantity to get the key.

請回顧圖9,本發明一種區域性資料分享系統100一第六實施例該第五實施例大致相同,主要差別在於該伺服器單元1的儲存單元11還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊。Referring back to FIG. 9, a sixth embodiment of a regional data sharing system 100 according to the present invention is substantially the same as the fifth embodiment. The main difference is that the storage unit 11 of the server unit 1 also stores a second authorized list. The authorized list includes user identification information different from the user identification information of the first authorized list.

請參閱9及圖11,該區域性資料分享系統100的第六實施例例如用以執行本發明區域性資料分享方法的一第六實施例,該實施例包含以下步驟。Please refer to FIG. 9 and FIG. 11. The sixth embodiment of the regional data sharing system 100 is, for example, a sixth embodiment of the regional data sharing method of the present invention. The embodiment includes the following steps.

在步驟S111中,其中一電子裝置2的處理模組25產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元1。該資料請求包含所述其中一電子裝置2的用戶識別資訊。In step S111, one of the processing modules 25 of the electronic device 2 generates a data request for obtaining the encrypted data, and transmits the data request to the server unit 1. The data request includes user identification information of one of the electronic devices 2.

在步驟S112中,當該伺服器單元1的處理單元13接收到來自所述其中一電子裝置2的資料請求,該處理單元13判斷該資料請求的用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元13判斷該資料請求的用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,則進入步驟S113。若該資料請求的用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊皆不相同,則進入步驟S120,結束本實施例,但不以此為限。In step S112, when the processing unit 13 of the server unit 1 receives a data request from one of the electronic devices 2, the processing unit 13 determines the user identification information of the data request and the first authorized list or the first If the user identification information of the two authorized lists is the same, when the processing unit 13 judges that the user identification information of the data request is the same as the user identification information of the first authorized list or the second authorized list, it proceeds to step S113. If the user identification information requested by the data is different from the user identification information of the first authorized list or the second authorized list, the process proceeds to step S120 to end the embodiment, but is not limited thereto.

在步驟S113中,該處理單元13將該加密資料傳送至所述其中一電子裝置2。In step S113, the processing unit 13 transmits the encrypted data to one of the electronic devices 2.

在步驟S114中,該GPS模組24產生一所述其中一電子裝置2所在位置的GPS座標。In step S114, the GPS module 24 generates a GPS coordinate of a location where one of the electronic devices 2 is located.

在步驟S115中,所述其中一電子裝置2產生一用於索取該金鑰的金鑰請求,該金鑰請求包含所述其中一電子裝置2之用戶識別資訊及該GPS座標,且所述其中一電子裝置2將該金鑰請求傳送至該伺服器單元1。In step S115, the one of the electronic devices 2 generates a key request for obtaining the key, and the key request includes the user identification information of the one of the electronic devices 2 and the GPS coordinates, and An electronic device 2 transmits the key request to the server unit 1.

在步驟S116中,當該伺服器單元1的處理單元13接收到來自所述其中一電子裝置2的金鑰請求,該處理單元13根據該金鑰請求的GPS座標及該辨別資料的GPS座標範圍判斷所述其中一電子裝置2是否位於該GPS座標範圍(即該被授權區域301,也可以是一會議室或教室)內且該資料請求的用戶識別資訊與該第一授權名單的用戶識別資訊是否相同,若答案皆為是,則進入步驟S117。若其中一結果為否,則進入步驟S120,結束本實施例,但不以此為限。補充說明的是,判斷所述其中一電子裝置2是否位於該被授權區域301內的方式不以此為限,在其他的實施態樣中,也可透過譬如第二至第四實施例所揭露的方法並配合對應的系統實施例執行進行判斷,換句話說,該被授權區域301也可以為一特定地點譬如會議室或教室等等。In step S116, when the processing unit 13 of the server unit 1 receives a key request from one of the electronic devices 2, the processing unit 13 according to the GPS coordinates requested by the key and the GPS coordinate range of the identification data. Determine whether one of the electronic devices 2 is located in the GPS coordinate range (that is, the authorized area 301 or a conference room or classroom) and the user identification information requested by the data and the user identification information of the first authorized list If they are the same, if all the answers are yes, go to step S117. If one of the results is no, proceed to step S120 to end the embodiment, but not limited to this. It is added that the manner of determining whether one of the electronic devices 2 is located in the authorized area 301 is not limited to this. In other implementations, it can also be disclosed through, for example, the second to fourth embodiments. The method is implemented in accordance with the implementation of the corresponding system embodiment. In other words, the authorized area 301 may also be a specific place such as a conference room or a classroom.

在步驟S117中,該處理單元13將該金鑰傳送至所述其中一電子裝置2。In step S117, the processing unit 13 transmits the key to one of the electronic devices 2.

在步驟S118中,所述其中一電子裝置2使用該金鑰將該加密資料解密。In step S118, one of the electronic devices 2 uses the key to decrypt the encrypted data.

在步驟S119中,所述其中一電子裝置2的處理模組25將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置2,供所述另一電子裝置2使用該金鑰將該加密資料解密。In step S119, the processing module 25 of one of the electronic devices 2 transmits the key to another electronic device 2 corresponding to the user identification information of the second authorized list for use by the other electronic device 2. The key decrypts the encrypted data.

由上述可知,透過以區域性資料分享系統100的第六實施例執行步驟S116~S119,當持有一與該第一授權名單具有相同的用戶識別資訊的電子裝置2之持有者(譬如一會議之主席)在該被授權區域31內,其他持有對應於第二授權名單的用戶識別資訊之電子裝置2的使用者(譬如與會者)才能取得該金鑰並且使用該加密資料It can be known from the above that by performing steps S116 to S119 with the sixth embodiment of the regional data sharing system 100, when a holder of an electronic device 2 (for example, a In the authorized area 31, other users (such as participants) of the electronic device 2 holding the user identification information corresponding to the second authorized list can obtain the key and use the encrypted data.

綜上所述,在本發明區域性資料分享系統100及區域性資料分享方法的第一至第四實施例中,該伺服器單元1的處理單元13判斷該電子裝置2及該第一授權名單的用戶識別資訊相同後,則將該加密資料傳送至屬於該第一授權名單內的電子裝置2,藉此確保加密資料是被預先被傳送至該第一授權名單內的電子裝置2,接者,以不同的方式判斷該電子裝置2之所在區域是位於該被授權區域301內,才將該金鑰傳送至位於該被授權區域301的電子裝置2,以供該電子裝置2的處理模組25將該加密資料解密,藉此確保該加密資料僅於該被授權區域301內被使用。在第五實施例中,該處理單元13還需進一步判斷出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,才將金鑰傳送至出席清單的用戶識別資訊所對應的電子裝置,換句話說,加密資料的提供者可透過設定該預定出席門檻確保位於該被授權區域31內的電子裝置2之使用者的出席人數到達一預定數量才讓各個使用者使用該金鑰解開該加密資料。在第六實施例中,該處理單元13還需進一步判斷其中一電子裝置2的用戶識別資訊與該第一授權名單的用戶識別資訊是相同且位於被授權區域301內,其中一電子裝置2才會接收到該金鑰,並將該金鑰傳送至另一對應於第二授權名單的用戶識別資訊之電子裝置2,換句話說,當持有一與該第一授權名單具有相同的用戶識別資訊的電子裝置2之持有者(譬如一會議之主席)在該被授權區域31內,其他持有對應於第二授權名單的用戶識別資訊之電子裝置2的使用者(譬如與會者)才能取得該金鑰並且使用該加密資料。故確實能達成本發明之目的。In summary, in the first to fourth embodiments of the regional data sharing system 100 and the regional data sharing method of the present invention, the processing unit 13 of the server unit 1 determines the electronic device 2 and the first authorized list. After the identification information of the users is the same, the encrypted data is transmitted to the electronic device 2 belonging to the first authorized list, thereby ensuring that the encrypted data is transmitted to the electronic device 2 in the first authorized list in advance. , In different ways, determine whether the area of the electronic device 2 is located in the authorized area 301, and then transmit the key to the electronic device 2 located in the authorized area 301 for the processing module of the electronic device 2 25 decrypt the encrypted data, thereby ensuring that the encrypted data is only used within the authorized area 301. In the fifth embodiment, the processing unit 13 further needs to determine whether the number of user identification information in the attendance list reaches a predetermined attendance threshold before transmitting the key to the electronic device corresponding to the user identification information in the attendance list. In other words, the provider of the encrypted data can set the predetermined attendance threshold to ensure that the number of users of the electronic device 2 located in the authorized area 31 reaches a predetermined number before allowing each user to unlock the encryption using the key. data. In the sixth embodiment, the processing unit 13 further needs to determine that the user identification information of one of the electronic devices 2 is the same as the user identification information of the first authorized list and is located in the authorized area 301. One of the electronic devices 2 is Will receive the key and send it to another electronic device 2 corresponding to the user identification information of the second authorized list, in other words, when holding a user identification that is the same as the first authorized list The holder of the electronic device 2 (such as the chairman of a conference) in the authorized area 31, other users (such as the participants) of the electronic device 2 holding the user identification information corresponding to the second authorized list Obtain the key and use the encrypted data. Therefore, it can indeed achieve the purpose of the invention.

惟以上所述者,僅為本發明之實施例而已,當不能以此限定本發明實施之範圍,凡是依本發明申請專利範圍及專利說明書內容所作之簡單的等效變化與修飾,皆仍屬本發明專利涵蓋之範圍內。However, the above are only examples of the present invention. When the scope of implementation of the present invention cannot be limited in this way, any simple equivalent changes and modifications made in accordance with the scope of the patent application and the content of the patent specification of the present invention are still Within the scope of the invention patent.

100‧‧‧區域性資料分享系統
1‧‧‧伺服器單元
11‧‧‧儲存單元
12‧‧‧通訊單元
13‧‧‧處理單元
2‧‧‧電子裝置
21‧‧‧儲存模組
22‧‧‧通訊模組
23‧‧‧短距通訊模組
24‧‧‧GPS模組
25‧‧‧處理模組
26‧‧‧影像拍攝模組
3‧‧‧存取點
31‧‧‧通訊器
32‧‧‧短距通訊器
33‧‧‧控制器
4‧‧‧通訊裝置
41‧‧‧短距通訊單元
42‧‧‧控制單元
201‧‧‧通訊網路
301‧‧‧被授權區域
S21~S29‧‧‧步驟
S41~S49‧‧‧步驟
S61~S69‧‧‧步驟
S81~S89‧‧‧步驟
S101~S110‧‧‧步驟
S111~S120‧‧‧步驟
100‧‧‧ regional data sharing system
1‧‧‧Server Unit
11‧‧‧Storage Unit
12‧‧‧ communication unit
13‧‧‧processing unit
2‧‧‧ electronic device
21‧‧‧Storage Module
22‧‧‧Communication Module
23‧‧‧Short Range Communication Module
24‧‧‧GPS Module
25‧‧‧Processing Module
26‧‧‧Image capture module
3‧‧‧Access Point
31‧‧‧Communicator
32‧‧‧Short Range Communicator
33‧‧‧Controller
4‧‧‧ communication device
41‧‧‧Short-range communication unit
42‧‧‧control unit
201‧‧‧Communication Network
301‧‧‧authorized area
S21 ~ S29‧‧‧step
S41 ~ S49‧‧‧step
S61 ~ S69‧‧‧step
S81 ~ S89‧‧‧step
S101 ~ S110‧‧‧step
S111 ~ S120‧‧‧step

本發明之其他的特徵及功效,將於參照圖式的實施方式中清楚地呈現,其中: 圖1是本發明區域性資料分享系統的一第一實施例的一方塊圖; 圖2是本發明區域性資料分享方法的一第一實施例的一流程圖; 圖3是本發明區域性資料分享系統的一第二實施例的一方塊圖; 圖4是本發明區域性資料分享方法的一第二實施例的一流程圖; 圖5是本發明區域性資料分享系統的一第三實施例的一方塊圖; 圖6是本發明區域性資料分享方法的一第三實施例的一流程圖; 圖7是本發明區域性資料分享系統的一第四實施例的一方塊圖; 圖8是本發明區域性資料分享方法的一第四實施例的一流程圖; 圖9是本發明區域性資料分享系統的一第五實施例的一方塊圖; 圖10是本發明區域性資料分享方法的一第五實施例的一流程圖;及 圖11是本發明區域性資料分享方法的一第六實施例的一流程圖。Other features and effects of the present invention will be clearly presented in the embodiment with reference to the drawings, wherein: FIG. 1 is a block diagram of a first embodiment of the regional data sharing system of the present invention; FIG. 2 is the present invention A flowchart of a first embodiment of a regional data sharing method; FIG. 3 is a block diagram of a second embodiment of a regional data sharing system according to the present invention; FIG. 4 is a first embodiment of a regional data sharing method according to the present invention; A flowchart of two embodiments; FIG. 5 is a block diagram of a third embodiment of a regional data sharing system of the present invention; FIG. 6 is a flowchart of a third embodiment of a regional data sharing method of the present invention; 7 is a block diagram of a fourth embodiment of the regional data sharing system of the present invention; FIG. 8 is a flowchart of a fourth embodiment of the regional data sharing method of the present invention; FIG. 9 is a regional data of the present invention A block diagram of a fifth embodiment of the sharing system; FIG. 10 is a flowchart of a fifth embodiment of the regional data sharing method of the present invention; and FIG. 11 is a sixth implementation of the regional data sharing method of the present invention A flowchart.

100‧‧‧區域性資料分享系統 100‧‧‧ regional data sharing system

1‧‧‧伺服器單元 1‧‧‧Server Unit

11‧‧‧儲存單元 11‧‧‧Storage Unit

12‧‧‧通訊單元 12‧‧‧ communication unit

13‧‧‧處理單元 13‧‧‧processing unit

2‧‧‧電子裝置 2‧‧‧ electronic device

21‧‧‧儲存模組 21‧‧‧Storage Module

22‧‧‧通訊模組 22‧‧‧Communication Module

24‧‧‧GPS模組 24‧‧‧GPS Module

25‧‧‧處理模組 25‧‧‧Processing Module

Claims (14)

一種區域性資料分享系統,包含: 一伺服器單元,包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一用戶識別資訊;及 至少一電子裝置,包括一處理模組; 該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器裝置,該資料請求包含一用戶識別資訊; 當該伺服器裝置的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置; 當該伺服器裝置的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置; 該電子裝置的處理模組使用該金鑰將該加密資料解密。A regional data sharing system includes: a server unit including a storage unit and a processing unit electrically connected to the storage unit, the storage unit storing encrypted data, a key for decrypting the encrypted data, a first An authorized list and identification information related to an authorized area, the first authorized list includes user identification information; and at least one electronic device, including a processing module; the processing module of the electronic device generates a request for obtaining The data request of the encrypted data is transmitted to the server device, and the data request includes user identification information; when the processing unit of the server device receives the data request, the processing unit judges the data request Whether the user identification information is the same as the user identification information of the first authorized list, and when the processing unit determines that the user identification information of the data request is the same as the user identification information of the first authorized list, the processing unit The encrypted data is transmitted to the electronic device; when the processing unit of the server device receives a An electronic device and a key request for obtaining the key, the processing unit determines whether the electronic device is located in the authorized area according to the key request and the identification information, and when the processing unit according to the key request and the identification The data determines that the electronic device is located in the authorized area, and the processing unit transmits the key to the electronic device; the processing module of the electronic device uses the key to decrypt the encrypted data. 如請求項1所述的區域性資料分享系統,其中,該第一授權名單包含多個用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置; 當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置; 該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該金鑰請求的該用戶識別資訊尚未被加入一出席清單,則該處理單元將該金鑰請求的該用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置,供該出席清單中的用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。The regional data sharing system according to claim 1, wherein the first authorized list includes a plurality of user identification information, and the regional data sharing system includes a plurality of electronic devices; when the processing unit of the server device receives To the data request from one of the electronic devices, the processing unit determines whether the user identification information of the data request is the same as one of the user identification information of the first authorized list, and when the processing unit determines the user identification of the data request The information is the same as one of the user identification information of the first authorized list, the processing unit transmits the encrypted data to one of the electronic devices; the key request includes a user identification information, and when the processing unit of the server device receives To the key request from one of the electronic devices, and the processing unit judges that one of the electronic devices is located in the authorized area according to the key request and the identification data, and the user identification information requested by the key has not been Adding a attendance list, the processing unit adds the user identification information requested by the key to the The attendance list and determine whether the number of user identification information in the attendance list reaches a predetermined attendance threshold. When the processing unit determines that the number of user identification information in the attendance list reaches the predetermined attendance threshold, the processing unit uses the key The electronic device corresponding to the user identification information in the attendance list is used by the electronic device corresponding to the user identification information in the attendance list to decrypt the encrypted data using the key. 如請求項1所述的區域性資料分享系統,其中,該儲存單元還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置; 當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置; 該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊相同,則該處理單元將該金鑰傳送至所述其中一電子裝置,供所述其中一電子裝置使用該金鑰將該加密資料解密; 所述其中一電子裝置的處理模組將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密。The regional data sharing system according to claim 1, wherein the storage unit further stores a second authorization list, and the second authorization list includes user identification information different from the user identification information of the first authorization list, The regional data sharing system includes multiple electronic devices. When the processing unit of the server device receives the data request from one of the electronic devices, the processing unit determines the user identification information and the first of the data request. Whether the user identification information of the authorized list or the second authorized list is the same. When the processing unit determines that the user identification information of the data request is the same as the user identification information of the first authorized list or the second authorized list, the processing unit will The encrypted data is transmitted to one of the electronic devices; the key request includes user identification information, when the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit is based on the key The request and the identification information determine that one of the electronic devices is located in the authorized area, and the processing If the user identification information of the data request is the same as the user identification information of the first authorized list, the processing unit sends the key to the one of the electronic devices for the one of the electronic devices to use the key Decrypt the encrypted data; the processing module of one of the electronic devices transmits the key to another electronic device corresponding to the user identification information of the second authorized list for the other electronic device to use the key Decrypt the encrypted material. 如請求項1至3其中任一項所述的區域性資料分享系統,其中,該電子裝置還包括一電連接該處理模組的GPS模組,該GPS模組產生一該電子裝置所在位置的GPS座標,該金鑰請求還包含該GPS座標,該伺服器裝置所儲存的該辨別資料包含該被授權區域的一GPS座標範圍; 當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。The regional data sharing system according to any one of claims 1 to 3, wherein the electronic device further includes a GPS module electrically connected to the processing module, and the GPS module generates a location of the electronic device. GPS coordinates, the key request also includes the GPS coordinates, and the identification data stored by the server device includes a GPS coordinate range of the authorized area; when the processing unit determines that the GPS coordinates requested by the key fall on the identification Within the GPS coordinate range of the data, the processing unit determines that the electronic device is located in the authorized area. 如請求項1至3其中任一項所述的區域性資料分享系統,還包含一位於該被授權區域內的存取點,當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者的該金鑰請求; 該伺服器裝置所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該位址其中至少該者; 當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,該處理單元判斷該電子裝置位於該被授權區域內。The regional data sharing system according to any one of claims 1 to 3, further comprising an access point located in the authorized area. When the electronic device is connected to a communication network via the access point, the electronic device Receiving, by the access point, at least one of a media access control address, a service setting identifier, and an IP address, and generating the media access control address, the service setting identifier, and the IP address Among them, the key request of at least one of them; the identification data stored by the server device includes at least one of the media access control address, the service setting identifier, and the address; when the processing unit judges the gold At least one of the media access control address, the service setting identifier, and the IP address requested by the key, and the media access control address, the service setting identifier, and the IP address of the identification data The same is true, the processing unit determines that the electronic device is located in the authorized area. 如請求項1至3其中任一項所述的區域性資料分享系統,還包含一位於該被授權區域內的通訊裝置,該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求; 該伺服器裝置所儲存的該辨別資料包含該識別碼; 當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。The regional data sharing system according to any one of claims 1 to 3, further comprising a communication device located in the authorized area. The communication device uses a short-range communication technology to send an identification code. When the electronic device Located within the authorized area, the electronic device uses the short-range communication technology to receive the identification code and generates the key request containing the identification code; the identification data stored by the server device includes the identification code; when the The processing unit determines that the identification code requested by the key is the same as the identification code of the identification data, and the processing unit determines that the electronic device is located in the authorized area. 如請求項1至3其中任一項所述的區域性資料分享系統,該電子裝置還包括一電連接該處理模組的影像拍攝模組,該影像拍攝模組用於拍攝該電子裝置所在環境以產生一影像,該金鑰請求還包含該影像; 該伺服器裝置所儲存的該辨別資料包含一相關於該被授權區域的參考影像; 當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。According to the regional data sharing system according to any one of claims 1 to 3, the electronic device further includes an image capturing module electrically connected to the processing module, and the image capturing module is used to capture the environment where the electronic device is located. To generate an image, the key request also includes the image; the identification data stored by the server device includes a reference image related to the authorized area; when the processing unit uses an image comparison technique to determine the key The requested image is similar to the reference image of the identification data, and the processing unit determines that the electronic device is located in the authorized area. 一種區域性資料分享方法,由一伺服器裝置及至少一電子裝置共同執行,該伺服器裝置包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一用戶識別資訊,且該電子裝置包括一處理模組,該方法包含以下步驟: (A)該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器裝置,該資料請求包含一用戶識別資訊; (B)當該伺服器裝置的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置; (C)當該伺服器裝置的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置;及 (D)該電子裝置的處理模組使用該金鑰將該加密資料解密。A regional data sharing method is jointly performed by a server device and at least one electronic device. The server device includes a storage unit and a processing unit electrically connected to the storage unit. The storage unit stores encrypted data, and is used for A key for decrypting the encrypted data, a first authorized list, and identification data related to an authorized area. The first authorized list includes user identification information, and the electronic device includes a processing module. The method includes the following: Steps: (A) the processing module of the electronic device generates a data request for obtaining the encrypted data, and transmits the data request to the server device, the data request includes a user identification information; (B) when the The processing unit of the server device receives the data request, the processing unit determines whether the user identification information of the data request is the same as the user identification information of the first authorized list, and when the processing unit determines the user identification of the data request If the information is the same as the user identification information of the first authorized list, the processing unit transmits the encrypted data to Electronic device; (C) when the processing unit of the server device receives a key request from the electronic device and used to obtain the key, the processing unit determines whether the electronic device is based on the key request and the identification data Located in the authorized area, when the processing unit determines that the electronic device is located in the authorized area based on the key request and the identification data, the processing unit transmits the key to the electronic device; and (D) the electronic device The processing module of the device uses the key to decrypt the encrypted data. 如請求項8所述的區域性資料分享方法,是由該伺服器裝置及多個電子裝置執行,該第一授權名單包含多個用戶識別資訊,其中, 在該步驟(A)中,當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置; 在該步驟(C)中,該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該金鑰請求的該用戶識別資訊尚未被加入一出席清單 ,則該處理單元將該金鑰請求的該用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置,供該出席清單中的用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。The regional data sharing method according to claim 8 is executed by the server device and multiple electronic devices, and the first authorized list includes multiple user identification information. In the step (A), when the The processing unit of the server device receives the data request from one of the electronic devices, the processing unit determines whether the user identification information of the data request is the same as one of the user identification information of the first authorized list, and when the processing unit judges The user identification information of the data request is the same as one of the user authorization information of the first authorized list, and the processing unit transmits the encrypted data to one of the electronic devices; in step (C), the key request Containing user identification information, when the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit determines that one of the electronic devices is located in the authorized device according to the key request and the identification data Within the area and the user identification information requested by the key has not been added to a attendance list, the processing unit requests the key The user identification information of the attendance list is added to the attendance list, and it is determined whether the number of user identification information in the attendance list reaches a predetermined attendance threshold. When the processing unit judges that the number of user identification information in the attendance list reaches the predetermined attendance threshold, The processing unit transmits the key to the electronic device corresponding to the user identification information in the attendance list, and the electronic device corresponding to the user identification information in the attendance list uses the key to decrypt the encrypted data. 如請求項8所述的區域性資料分享方法,是由該伺服器裝置及多個電子裝置執行,該儲存單元還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊,其中,在步驟(D)後,還包含: (E)所述其中一電子裝置的處理模組將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密; 其中,在該步驟(A)中,當該伺服器裝置的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置; 在該步驟(C)中,該金鑰請求包含一用戶識別資訊,當該伺服器裝置的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊相同,則該處理單元將該金鑰傳送至所述其中一電子裝置,供所述其中一電子裝置使用該金鑰將該加密資料解密。The regional data sharing method according to claim 8, is performed by the server device and a plurality of electronic devices, and the storage unit further stores a second authorization list. The second authorization list includes a second authorization list that is different from the first authorization list. The user identification information of the user identification information of the authorized list, wherein after step (D), it further includes: (E) the processing module of one of the electronic devices transmits the key to another corresponding to the second authorization The electronic device of the user identification information of the list is used by the other electronic device to decrypt the encrypted data using the key; wherein, in step (A), when the processing unit of the server device receives the information from one of the electronic devices, For the data request of the device, the processing unit determines whether the user identification information of the data request is the same as the user identification information of the first authorized list or the second authorized list. When the processing unit determines the user identification information of the data request Same as the user identification information of the first authorized list or the second authorized list, the processing unit transmits the encrypted data to one of the electronic devices; In step (C), the key request includes user identification information. When the processing unit of the server device receives a key request from one of the electronic devices, and the processing unit judges based on the key request and the identification data If one of the electronic devices is located in the authorized area, and the processing unit determines that the user identification information of the data request is the same as the user identification information of the first authorized list, the processing unit transmits the key to the One of the electronic devices is used by one of the electronic devices to decrypt the encrypted data using the key. 如請求項8至10任一項所述的區域性資料分享方法,該電子裝置還包括一電連接該處理模組的GPS模組,其中,在步驟(C)前,還包含: (F)該GPS模組產生一該電子裝置所在位置的GPS座標,該金鑰請求還包含該GPS座標,該伺服器裝置所儲存的該辨別資料包含該被授權區域的一GPS座標範圍; 其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。According to the regional data sharing method according to any one of claims 8 to 10, the electronic device further includes a GPS module electrically connected to the processing module, and before step (C), the method further includes: (F) The GPS module generates a GPS coordinate of the location of the electronic device, the key request also includes the GPS coordinate, and the identification data stored by the server device includes a GPS coordinate range of the authorized area; In step (C), when the processing unit determines that the GPS coordinate requested by the key falls within the GPS coordinate range of the discrimination data, the processing unit determines that the electronic device is located in the authorized area. 如請求項8至10任一項所述的區域性資料分享方法,還由一位於該被授權區域內的存取點共同執行,該伺服器裝置所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該位址其中至少一者,其中,在步驟(C)前,還包含: (G)當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少該者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者的該金鑰請求; 其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,該處理單元判斷該電子裝置位於該被授權區域內。The regional data sharing method according to any one of claims 8 to 10 is also performed jointly by an access point located in the authorized area, and the identification data stored by the server device includes the media access control At least one of an address, the service setting identifier, and the address, wherein, before step (C), further comprising: (G) when the electronic device is connected to a communication network via the access point, the electronic device is The access point receives at least one of a media access control address, a service setting identifier, and an IP address, and generates a media access control address, the service setting identifier, and the IP address. At least the key request of the person; wherein in the step (C), when the processing unit judges the media access control address, the service setting identifier and the IP address requested by the key, at least one of the The media access control address, the service setting identifier, and the IP address of the identification data are at least the same, and the processing unit determines that the electronic device is located in the authorized area. 如請求項8至10任一項所述的區域性資料分享方法,還由一位於該被授權區域內的通訊裝置共同執行,該伺服器裝置所儲存的該辨別資料包含該識別碼,其中,在步驟(C)前,還包含: (H)該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求; 其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。According to the regional data sharing method described in any one of claims 8 to 10, a communication device located in the authorized area is also jointly executed, and the identification data stored in the server device includes the identification code, wherein, Before step (C), the method further includes: (H) The communication device sends an identification code using a short-range communication technology. When the electronic device is located in the authorized area, the electronic device receives the identification using the short-range communication technology. And the key request including the identification code is generated; wherein, in step (C), when the processing unit judges that the identification code requested by the key is the same as the identification code of the identification data, the processing unit It is determined that the electronic device is located in the authorized area. 如請求項8至10其中任一項所述的區域性資料分享方法,該電子裝置還包括一電連接該處理模組的影像拍攝模組,該伺服器裝置所儲存的該辨別資料包含一相關於該被授權區域的參考影像,其中,在步驟(C)前,還包含: (I)該影像拍攝模組拍攝該電子裝置所在環境以產生一影像; 其中,在該步驟(C)中,該金鑰請求還包含該影像且當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。According to the regional data sharing method according to any one of claims 8 to 10, the electronic device further includes an image capturing module electrically connected to the processing module, and the identification data stored by the server device includes a correlation The reference image in the authorized area, before step (C), further includes: (I) the image capturing module captures an environment in which the electronic device is located to generate an image; wherein, in step (C), The key request further includes the image, and when the processing unit judges that the image requested by the key is similar to the reference image of the identification data using an image matching technology, the processing unit determines that the electronic device is located in the authorized area .
TW105120876A 2016-07-01 2016-07-01 Regional data sharing system and method TWI622886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105120876A TWI622886B (en) 2016-07-01 2016-07-01 Regional data sharing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105120876A TWI622886B (en) 2016-07-01 2016-07-01 Regional data sharing system and method

Publications (2)

Publication Number Publication Date
TW201802701A true TW201802701A (en) 2018-01-16
TWI622886B TWI622886B (en) 2018-05-01

Family

ID=61725155

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105120876A TWI622886B (en) 2016-07-01 2016-07-01 Regional data sharing system and method

Country Status (1)

Country Link
TW (1) TWI622886B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI759908B (en) * 2020-10-15 2022-04-01 威聯通科技股份有限公司 The method of generating the authorization allow list and the information security system using it

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201032084A (en) * 2009-02-16 2010-09-01 Fineart Technology Co Ltd System for managing the external access of electronic file and method of the same
WO2013154532A1 (en) * 2012-04-10 2013-10-17 Intel Corporation Techniques to monitor connection paths on networked devices
TW201408088A (en) * 2012-08-15 2014-02-16 Muchtel Technology Inc Location based digital right access authentication method and system thereof
TWI499931B (en) * 2013-12-17 2015-09-11 Inwellcom Technology Corp File management system and method
CN105516110B (en) * 2015-12-01 2019-12-20 趣增信息科技(上海)有限公司 Mobile device security data transmission method

Also Published As

Publication number Publication date
TWI622886B (en) 2018-05-01

Similar Documents

Publication Publication Date Title
EP2938112B1 (en) Portable authorization device
WO2015135337A1 (en) Method and system for encrypted communications
CN102739643A (en) Permitting access to a network
CN102739642A (en) Permitting access to a network
US7930556B2 (en) Fingerprint system and method for access control
US10097666B2 (en) Accessing a service using an encrypted token
TWI581599B (en) Key generation system, data signature and encryption system and method
US9148757B2 (en) Method for tracking a mobile device onto a remote displaying unit
WO2011131093A1 (en) Encryption communication method, apparatus and system
JP2015500585A (en) Simplified management of group secrets by group members
US10356067B2 (en) Device and method for providing user-configured trust domains
JP2016019233A (en) Communication system, communication device, key managing device and communication method
US20160050184A1 (en) Method for secure e-mail exchange
KR20180120605A (en) Mobile-based equipment service system using encrypted code offloading
TWI622886B (en) Regional data sharing system and method
CN110830240B (en) Communication method and device of terminal and server
KR101568940B1 (en) Authentication method for device to device communication in mobile open iptv system and device to device communication method in mobile open iptv system
KR20140059457A (en) Telematics system and the information securing method
KR101845610B1 (en) Security system of moving object information and security method of moving object information using the system
JPWO2016132454A1 (en) Application delivery method, application delivery program, and server
KR20150018024A (en) Data sharing method and data sharing system
US20180131676A1 (en) Code encryption
JP6654934B2 (en) Authentication system
KR101834632B1 (en) Security system of moving object information and security method of moving object information using the system
JP2018078592A (en) Communication system, communication device, key management device, and communication method