TWI237483B - Mobile phone with file encrypting function and method of file encryption thereof - Google Patents

Mobile phone with file encrypting function and method of file encryption thereof Download PDF

Info

Publication number
TWI237483B
TWI237483B TW93100405A TW93100405A TWI237483B TW I237483 B TWI237483 B TW I237483B TW 93100405 A TW93100405 A TW 93100405A TW 93100405 A TW93100405 A TW 93100405A TW I237483 B TWI237483 B TW I237483B
Authority
TW
Taiwan
Prior art keywords
file
mobile phone
computer
transmission channel
scope
Prior art date
Application number
TW93100405A
Other languages
Chinese (zh)
Other versions
TW200524361A (en
Inventor
Cheng-Shing Lai
Qing-Hua Li
Xiao-Long Fan
Original Assignee
Inventec Appliances Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Corp filed Critical Inventec Appliances Corp
Priority to TW93100405A priority Critical patent/TWI237483B/en
Publication of TW200524361A publication Critical patent/TW200524361A/en
Application granted granted Critical
Publication of TWI237483B publication Critical patent/TWI237483B/en

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A mobile phone with file encrypting function and method of file encryption thereof is disclosed. The host of mobile phone has encrypting software. The encrypting software encrypts/decrypts the file transmitted from the computer base on a key. The method of file encryption mainly comprises the following steps: (a) establish a transmitting channel between the computer and the mobile phone, (b) divide a first file into at least one first packet, (c) proceed a process of packet encryption/decryption to encrypt/decrypt and transform a first packet into a second packet and then transmit to the computer, (d) repeat the process of packet encryption/decryption until all the first packets are encrypted/decrypted, (e) compose all the second packets to form a second file. Certainly, the whole file can be transmitted to the mobile phone at a time and transmitted back to the computer after being encrypted/decrypted.

Description

1237483 五、發明說明(1) 發明所屬之技術領域 本發明是有關於一種具有檔案保密功能的行動電話 及其檔案保密方法,且特別是有關於一種藉由行動電話 與電腦之連結,即可對儲存於電腦内之檔案進行加密/解 密的行動電話。 先前技術 近年來,資訊科技突飛猛進,舉凡電腦 (Computer)、個人數位助理(Personal digital assistant, PDA)以及行動電話(Mobile Phone)等電子資 訊產品在生活周遭隨處可見。尤其,人們對電腦之依賴 性更是與日倶增,許多影音資訊、文字資訊、程式以及 個人資料等皆以電子檔案形式儲存於電腦中。在這些儲 存於電腦内的檔案中,不乏對個人具有私密性,或是對 團體具有機密性的重要檔案。因此,人們需要對檔案的 保密需求越來越高。 目前有恨多保密配件可以經由與電腦連接,而對儲 存於電腦内的檔案進行加密/解密。但是,這些保密配件 只具有加密/解密的單一功能,而且為達到安全性與便利 性,保密配件需要另外收藏或是單獨隨身攜帶,但卻會 造成保密配件之使用者的負擔。此外,習知保密配件之 使用者需要記憶一密碼,當欲對儲存於電腦内的檔案進 行加密/解密時輸入此密碼,才能進行檔案的加密/解密 動作。若習知保密配件之使用者遺忘此密碼時,將無法 對儲存於電腦内的檔案進行加密/解密,而因此引起之損1237483 V. Description of the invention (1) The technical field to which the invention belongs The present invention relates to a mobile phone with a file security function and a method for file security, and more particularly to a mobile phone and a computer through A mobile phone that encrypts / decrypts files stored on your computer. Prior technology In recent years, information technology has been advancing by leaps and bounds. Electronic information products such as Computers, Personal Digital Assistants (PDAs), and Mobile Phones are everywhere in life. In particular, people's dependence on computers is increasing day by day. Many video and audio information, text information, programs, and personal data are stored on computers as electronic files. Among the files stored on the computer, there are many important files that are private to the individual or confidential to the group. Therefore, the need for confidentiality of archives is increasing. At present, many security accessories can be connected to a computer to encrypt / decrypt files stored in the computer. However, these security accessories have only a single function of encryption / decryption. In order to achieve security and convenience, the security accessories need to be stored separately or carried with them, but it will cause a burden on the users of the security accessories. In addition, users who are familiar with security accessories need to memorize a password. When they want to encrypt / decrypt files stored in the computer, enter this password to perform file encryption / decryption. If the user of the security accessory forgets this password, the file stored in the computer cannot be encrypted / decrypted, and the damage caused by it

11813TWF.PTD 第7頁 1237483 五、發明說明(2) 失係難以估計的。 發明内容 因此,本發明的目的就是在提供一種具有檔案保密 功能的行動電話及其檔案保密方法,適於藉由隨身攜帶 之行動電話對儲存於電腦内之檔案進行加密/解密,而不 需另外攜帶保密配件以及記憶密碼。 基於上述目的,本發明提出一種具有檔案保密功能 的行動電話,適於對儲存在一電腦内之一檔案進行加密/ 解密。其中,電腦内具有一第一保密軟體,且電腦與行 動電話之間具有一傳輸通道。 本實施例之行動電話主要係由一主機、一行動通訊 收發器以及一人機界面所構成。其中,主機内具有一第 二保密軟體。第二保密軟體係對應於第一保密軟體。而 且,第二保密軟體係適於根據一密鑰而對儲存在電腦内 之檔案進行加密/解密。行動通訊收發器係電性耦接於主 機。人機界面係電性耦接於主機,且適於輸入操作指令 並顯示訊息。 此外,本實施例之行動電話例如更具有一識別碼, 而密鑰係與識別碼相關連。電腦與行動電話之間的傳輸 通道例如係有線傳輸通道或無線傳輸通道。 上述人機界面例如係由一輸出裝置以及一輸入裝置 所構成。其中,輸出裝置係電性耦接於主機,適於顯示 訊息以提供行動電話之使用者閱讀。輸入裝置係電性耦 接於主機,適於提供行動電話之使用者能夠輸入操作指11813TWF.PTD Page 7 1237483 V. Description of the invention (2) The loss is difficult to estimate. SUMMARY OF THE INVENTION Therefore, an object of the present invention is to provide a mobile phone with a file security function and a file security method thereof, which are suitable for encrypting / decrypting a file stored in a computer by a mobile phone that is carried around without additional Bring confidential accessories and remember passwords. Based on the above object, the present invention proposes a mobile phone with a file security function, which is suitable for encrypting / decrypting a file stored in a computer. Among them, the computer has a first security software, and there is a transmission channel between the computer and the mobile phone. The mobile phone in this embodiment is mainly composed of a host, a mobile communication transceiver, and a human-machine interface. Among them, the host has a second secret software. The second security software system corresponds to the first security software. Moreover, the second security software system is adapted to encrypt / decrypt files stored in the computer based on a key. The mobile communication transceiver is electrically coupled to the host. The human-machine interface is electrically coupled to the host, and is suitable for inputting operation instructions and displaying messages. In addition, the mobile phone in this embodiment has, for example, an identification code, and the key is associated with the identification code. The transmission channel between the computer and the mobile phone is, for example, a wired transmission channel or a wireless transmission channel. The human-machine interface is composed of an output device and an input device, for example. The output device is electrically coupled to the host, and is suitable for displaying messages to be read by the user of the mobile phone. The input device is electrically coupled to the host, and is suitable for users of mobile phones to input operating instructions.

11813TWF.PTD 第8頁 1237483 五、發明說明(3) 令至行動電話。當然,人機界面亦可係觸控螢幕或其他 整合式的人機界面。 基於上述目的,本發明再提出一種檔案保密方法, 適於藉由一行動電話對儲存在一電腦内之一第一檔案進 行加密/解密。 本實施例之檔案保密方法主要包括下列步驟:(a)建 立一傳輸通道於行動電話與電腦之間。(b)自電腦傳輸第 一槽案至行動電話。(c)根據一密鍮對第一槽案進行加密 /解密以形成一第二檔案。(d)傳輸第二檔案至電腦。 基於上述目的,本發明更提出一種檔案保密方法, 適於藉由一行動電話對儲存在一電腦内之一第一檔案進 行加密/解密。 本實施例之檔案保密方法主要包括下列步驟:(a)建 立一傳輸通道於行動電話與電腦之間。(b)切割第一檔案 以形成多個第一封包。(c )對第一封包進行一封包加密/ 解密步驟。(d )重複上述之封包加密/解密步驟直到所有 第一封包皆完成加密/解密。(e )組合所有第二封包以形 成一第二檔案。 其中,上述之封包加密/解密步驟包括:(1)自電腦 傳輸第一封包之一至行動電話。(2 )根據一密鑰對傳輸至 行動電話之第一封包進行加密/解密,以形成一第二封 包。(3)自行動電話傳輸上述之第二封包至電腦。 此外,上述兩種實施例之檔案保密方法中,行動電 話例如更具有一識別碼,而密鑰係與識別碼相關連。電11813TWF.PTD Page 8 1237483 V. Description of Invention (3) Order to mobile phone. Of course, the man-machine interface can also be a touch screen or other integrated man-machine interface. Based on the above objectives, the present invention further proposes a file security method suitable for encrypting / decrypting a first file stored in a computer by a mobile phone. The file security method of this embodiment mainly includes the following steps: (a) establishing a transmission channel between a mobile phone and a computer. (B) Transfer the first case from the computer to the mobile phone. (C) Encrypt / decrypt the first slot case according to a key to form a second file. (D) Transfer the second file to the computer. Based on the above objectives, the present invention further proposes a file security method suitable for encrypting / decrypting a first file stored in a computer by a mobile phone. The file security method of this embodiment mainly includes the following steps: (a) establishing a transmission channel between a mobile phone and a computer. (B) Cut the first file to form a plurality of first packets. (C) Perform a packet encryption / decryption step on the first packet. (D) Repeat the above-mentioned packet encryption / decryption steps until all the first packets have been encrypted / decrypted. (E) Combine all the second packets to form a second file. Among them, the above-mentioned packet encryption / decryption steps include: (1) transmitting one of the first packets from the computer to the mobile phone. (2) Encrypt / decrypt the first packet transmitted to the mobile phone according to a key to form a second packet. (3) Transfer the above second packet from the mobile phone to the computer. In addition, in the file security methods of the above two embodiments, the mobile phone has, for example, an identification code, and the key is associated with the identification code. Electricity

11813TWF.PTD 第9頁 1237483 五、發明說明(4) 3的傳輸通道例如係有線傳輸通道或無 腦與行動電話之 線傳輪通道。 根據本發 檔案保密 結合槽案 ’不需額 對重要檔 及其檔案 要,而對 之上述和 特舉較佳 明所提出之具有檔案保密功能 方法,不僅具有行動電話之行 保密功能,使行動電話之功能 外記憶一密碼,即可根據行動 案進行加密/解密。所以,本實 保密方法,可使行動電話之使 重要檔案進行加密/解密。 其他目的、特徵、和優點能更 實施例,並配合所附圖式,作 綜上所述, 的行動電話及其 動通訊功能,更 更為廣泛。而且 電話之識別碼來 施例之行動電話 用者隨時視其需 為讓本發明 明顯易懂,下文 詳細說明如下。 第1圖繪示為根據本發明所提出之較佳實施例的具有 ^密功能的行動電話之方塊圖。請參照第1圖,行動 一 1 - 〇主要係由一主機110、一行動通訊收發器12 〇以及 ,界面1 3 0所構成。其中,行動通訊收發器丨2 〇係電 旬分Ϊ於主機110,以提供行動電話100最基本之行動通 1 。人機界面1 3 0係電性耦接於主機丨丨〇,且適 入知作指令並顯示訊息。 把於翰 _ $ f 1圖繪示為根據本發明所提出之較佳實施例的呈女 Ξ案電腦 1〇與之電間腦具之 傳輸通道70 動電話100可對儲存在電二=二經由 < 一檔案11813TWF.PTD Page 9 1237483 V. Description of the Invention (4) 3 The transmission channel is, for example, a wired transmission channel or a wireless transmission channel of a brain and a mobile phone. According to the case of the file confidentiality combination of this issue, "there is no need for important files and their files, but the methods mentioned above and special mentions have a file security function method, which not only has the security function of mobile phones, but also makes mobile phones It can memorize a password outside the function, and then it can be encrypted / decrypted according to the action plan. Therefore, the real security method enables the mobile phone to encrypt / decrypt important files. Other objects, features, and advantages can be further implemented in conjunction with the accompanying drawings to make the mobile phone and its mobile communication function more comprehensive. In addition, the identification code of the phone is the mobile phone of the embodiment. The user may at any time as needed to make the present invention obvious and easy to understand. The detailed description is as follows. FIG. 1 is a block diagram of a mobile phone with an encryption function according to a preferred embodiment of the present invention. Please refer to Fig. 1. Action 1-〇 is mainly composed of a host 110, a mobile communication transceiver 12 〇, and interface 130. Among them, the mobile communication transceiver 20 is connected to the host 110 to provide the most basic mobile communication of the mobile phone 100 1. The human-machine interface 130 is electrically coupled to the host 丨 丨 〇, and is suitable for instructions and displays messages. The picture of Yu Han_ $ f 1 is shown as the transmission channel between the computer and the brain device of the son-in-law computer 10 according to the preferred embodiment of the present invention. The mobile phone 100 can Via < a file

1237483 五、發明說明⑸ ' --- 進仃加密/解密。其中,電腦5〇内具有一第一保密軟體, 110内具有一第二保密軟體。第二保密軟體係對應於 第—保密軟體。而且,第二保密軟體係適於根據一密〜鑰、 而對儲存在電腦5 0内之檔案進行加密/解密。 — 此外,行動電話1 0 0例如更具有一識別碼,而上述之 雄、輪係與識別碼相關連。由於一般行動電話皆具有一獨 無二的識別碼,因此使用者不需要記憶任何密碼,即 可根據與識別碼相關之密鑰對檔案進行加密/解密。所 以’不需擔心因忘記密碼而無法對檔案進行加密/解密, 尤其是可以避免在急需要使用加密後的檔案時,卻盔 解密而造成損失。 … ^ 另外,電腦50與行動電話1 00之間的傳輸通道7〇例如 係有線傳輸通道。其中,電腦5 0例如係與一傳輸線連 接’而傳輸線例如係連接於電腦上的RS 2 3 2埠、通用串列 匯流排(Uni versa 1 serial bus, USB)埠以及平行谭 (Parallel port)等各式連接埠。 當然,電腦50與行動電話100之間的傳輸通道7〇亦可 為,線傳輸通道。其中,電腦50例如具有一第一無線收 發器,而行動電話例如具有一第二無線收發器。在第一 收發器與第一收發器間’例如係採用紅外線、藍芽 (Bluetooth)以及無線區域網路(Wireless 1〇c^ network WLAN)等各種無線傳輸媒介與傳輸協定來作為 傳輸管道。 此外,第1圖所示之人機界面130例如係由一影像輸1237483 V. Description of the invention '--- Encrypt / decrypt. Among them, the computer 50 has a first security software and 110 has a second security software. The second security software system corresponds to the first-security software. Moreover, the second security software system is suitable for encrypting / decrypting files stored in the computer 50 based on a secret key. — In addition, the mobile phone 100 has, for example, an identification code, and the aforementioned male and female trains are associated with the identification code. Since ordinary mobile phones have unique identification codes, users do not need to remember any passwords, they can encrypt / decrypt files based on the keys associated with the identification codes. Therefore, there is no need to worry about being unable to encrypt / decrypt the file due to forgetting the password, especially to avoid the loss caused by the decryption of the helmet when the encrypted file is urgently needed. … ^ In addition, the transmission channel 70 between the computer 50 and the mobile phone 100 is, for example, a wired transmission channel. Among them, the computer 50 is connected to a transmission line, for example, and the transmission line is connected to a computer's RS 2 3 2 port, a universal serial bus (Universal 1 serial bus, USB) port, and a parallel port. Various ports. Of course, the transmission channel 70 between the computer 50 and the mobile phone 100 may also be a line transmission channel. The computer 50 has, for example, a first wireless transceiver, and the mobile phone has, for example, a second wireless transceiver. Between the first transceiver and the first transceiver, for example, various wireless transmission media and transmission protocols such as infrared rays, Bluetooth, and Wireless 1c ^ network WLAN are used as transmission channels. In addition, the human-machine interface 130 shown in FIG. 1 is

1237483 五、發明說明(6) 出裝置以及一指令輸入裝置所構成。其中,影像輸出裝 置係電性耦接於主機,適於顯示訊息以提供行動電話之 使用者閱讀。指令輸入裝置係電性耦接於主機,適於提 供行動電話之使用者能夠輸入操作指令至行動電話。當 然,人機界面130亦可係觸控螢幕或其他整合式的人機界 面〇 第3圖繪示為根據本發明所提出之較佳實施例的檔案 保密方法之流程圖。本較佳實施例之檔案保密方法係適 於藉由一行動電話,對儲存在一電腦内之一第一檔案進 行加密/解密。其中,行動電話以及電腦之特徵已於前面 敘述,在此不再贅述。 請參照第3圖,步驟S 3 1 0係建立一傳輸通道於行動電 話與電腦之間。其中,傳輸通道亦如前述,包括無線傳 輸通道或是有線傳輸通道。第一檔案之選擇,係由使用 者於電腦上執行前述之第一保密軟體,而在軟體界面中 完成檔案之選定。 接著,進入步驟S 320,自電腦傳輸第一檔案至行動 電話。之後執行步驟S 3 3 0,根據一密鑰對傳輸至行動電 話之第一檔案進行加密/解密,以形成一第二檔案。最後 執行步驟S 3 40,自行動電話傳輸第二檔案至電腦。其 中,步驟S330係由使用者於行動電話上執行前述之第二 保密軟體,而第二保密軟體則根據密鑰完成第一封包之 加密/解密。 為避免檔案大小超出行動電話的記憶體空間,而造1237483 V. Description of the invention (6) The output device and a command input device are composed. Among them, the image output device is electrically coupled to the host, and is suitable for displaying messages to be read by the user of the mobile phone. The command input device is electrically coupled to the host, and is suitable for providing a user of a mobile phone to input operation instructions to the mobile phone. Of course, the man-machine interface 130 may also be a touch screen or other integrated man-machine interface. FIG. 3 shows a flowchart of a file security method according to a preferred embodiment of the present invention. The file security method of the preferred embodiment is suitable for encrypting / decrypting a first file stored in a computer by a mobile phone. Among them, the characteristics of mobile phones and computers have been described above, and will not be repeated here. Referring to FIG. 3, step S310 is to establish a transmission channel between the mobile phone and the computer. Among them, the transmission channel is also the same as described above, including a wireless transmission channel or a wired transmission channel. The first file is selected by the user running the aforementioned first security software on a computer, and the file is selected in the software interface. Then, the method proceeds to step S320, where the first file is transmitted from the computer to the mobile phone. Then, step S330 is performed to encrypt / decrypt the first file transmitted to the mobile phone according to a key to form a second file. Finally, execute step S 3 40 to transfer the second file from the mobile phone to the computer. In step S330, the user executes the aforementioned second security software on the mobile phone, and the second security software completes the encryption / decryption of the first packet according to the key. To prevent file sizes from exceeding the memory space of your mobile phone,

11813TWF.PTD 第12頁 1237483 五、發明說明(7) 成前述較佳實施例的施行困難,本發明再提出另一較佳 實施例。第4圖繪示為根據本發明所提出之另一較佳實施 例的檔案保密方法之流程圖。本較佳實施例之檔案保密 方法係適於藉由一行動電話,對儲存在一電腦内之一第 一檔案進行加密/解密。 請參照第4圖,步驟S 4 1 0係建立一傳輸通道於行動電 話與電腦之間。步驟S 4 2 0係切割第一檔案以形成多個第 一封包。其中,傳輸通道亦如前述,包括無線傳輸通道 或是有線傳輸通道。第一檔案之選擇,係由使用者於電 腦上執行前述之第一保密軟體,而在軟體界面中完成檔 案之選定。 完成步驟S410以及步驟S420後,則進入步驟S430。 步驟S430係自電腦傳輸第一封包之一至行動電話。接著 執行步驟S440,根據一密鑰對傳輸至行動電話之第一封 包進行加密/解密,以形成一第二封包。之後執行步驟 S450,自行動電話傳輸上述之第二封包至電腦。其中, 步驟S440係由使用者於行動電話上執行前述之第二保密 軟體,而第二保密軟體則根據密鑰完成第一封包之加密/ 解密。 完成步驟S 4 5 0後則進行步驟4 6 0,判斷是否所有第一 封包皆完成加密/解密。若尚有第一封包未完成加密/密 解,則回到步驟S43 0。若所有第一封、包皆完成加密/解 密,則進入步驟S47 0。步驟S47 0係組合所有第二封包以 形成一第二檔案。其中,步驟S470係由第一保密軟體於11813TWF.PTD Page 12 1237483 V. Description of the invention (7) It is difficult to implement the foregoing preferred embodiment, and the present invention proposes another preferred embodiment. FIG. 4 is a flowchart of a file security method according to another preferred embodiment of the present invention. The file security method of the preferred embodiment is adapted to encrypt / decrypt a first file stored in a computer by a mobile phone. Referring to FIG. 4, step S410 is to establish a transmission channel between the mobile phone and the computer. Step S 4 2 0 is to cut the first file to form a plurality of first packets. Among them, the transmission channel is also the same as above, including a wireless transmission channel or a wired transmission channel. The first file is selected by the user running the aforementioned first security software on a computer, and the file selection is completed in the software interface. After completing steps S410 and S420, the process proceeds to step S430. Step S430 is transmitting one of the first packets from the computer to the mobile phone. Then step S440 is executed to encrypt / decrypt the first packet transmitted to the mobile phone according to a key to form a second packet. Then step S450 is executed to transmit the second packet from the mobile phone to the computer. In step S440, the user executes the aforementioned second security software on the mobile phone, and the second security software completes the encryption / decryption of the first packet according to the key. After step S 450 is completed, step 4 60 is performed to determine whether all the first packets have been encrypted / decrypted. If there is still no encryption / decryption of the first packet, it returns to step S430. If all the first packets and packets have been encrypted / decrypted, go to step S470. Step S47 0 combines all the second packets to form a second file. Among them, step S470 is performed by the first security software in

11813TWF.PTD 第13頁 1237483 五、發明說明(8) 電腦上完成。 綜上所述,根據本發明所提出之較佳實施例的具有 檔案保密功能的行動電話及其檔案保密方法具有下列優 點: (a) 結合行動通訊以及檔案保密兩大功能,因此使得 行動電話具有更大附加價值。 (b) 可對重要檔案進行加密/解密,進而避免檔案洩 漏所造成之損失。 (c) 行動電話幾乎是現在人們的隨身必需品,不需要 額外攜帶保密配件,可減輕使用者負擔。 (d )檔案加密/解密的密鑰係與行動電話的識別碼相 關,不需要另外記憶密碼,避免遺忘密碼所造成之損 失。 雖然本發明已以較佳實施例揭露如上,然其並非用 以限定本發明,任何熟習此技藝者,在不脫離本發明之 精神和範圍内,當可作些許之更動與潤飾,因此本發明 之保護範圍當視後附之申請專利範圍所界定者為準。11813TWF.PTD Page 13 1237483 V. Description of the invention (8) Completed on a computer. In summary, the mobile phone with file security function and its file security method according to the preferred embodiment of the present invention have the following advantages: (a) Combining the two functions of mobile communication and file security, so that the mobile phone has Greater added value. (b) Encrypt / decrypt important files to avoid losses due to file leakage. (c) Mobile phones are almost a necessity for people nowadays. They do not need to carry extra security accessories, which can reduce the burden on users. (d) The key for file encryption / decryption is related to the identification code of the mobile phone. It is not necessary to remember the password separately to avoid the loss caused by forgetting the password. Although the present invention has been disclosed in the preferred embodiment as above, it is not intended to limit the present invention. Any person skilled in the art can make some modifications and retouching without departing from the spirit and scope of the present invention. Therefore, the present invention The scope of protection shall be determined by the scope of the attached patent application.

11813TWF.PTD 第14頁 1237483 圖式簡單說明 第1圖繪示為根據本發明所提出之較佳實施例的具有 檔案保密功能的行動電話之方塊圖。 第2圖繪示為根據本發明所提出之較佳實施例的具有 檔案保密功能的行動電話與電腦之方塊圖。 第3圖繪示為根據本發明所提出之較佳實施例的檔案 I 保密方法之流程圖。 I 第4圖繪示為根據本發明所提出之另一較佳實施例的 i檔案保密方法之流程圖。 【圖式標示說明】 50 :電腦 | 7 0 :傳輸通道 1 0 0 :行動電話 1 1 0 ··主機 1 2 0 :行動通訊收發器 1 3 0 ··人機界面 步驟S310、步驟410 :建立一傳輸通道於行動電話與 電腦之間 步驟S 3 20 :自電腦傳輸第一檔案至行動電話 步驟S 330 :根據一密鑰對傳輸至行動電話之第一檔 案進行加密/解密,以形成一第二檔案 步驟S3 40 :自行動電話傳輸第二檔案至電腦 步驟S4 20 :切割第一檔案以形成多個第一封包 步驟S4 3 0 ··自電腦傳輸第一封包之一至行動電話 步驟S440 :根據一密鑰對傳輸至行動電話之第一封11813TWF.PTD Page 14 1237483 Brief Description of Drawings Figure 1 shows a block diagram of a mobile phone with file security function according to a preferred embodiment of the present invention. FIG. 2 is a block diagram of a mobile phone and a computer with a file security function according to a preferred embodiment of the present invention. FIG. 3 is a flowchart of a method for protecting a file I according to a preferred embodiment of the present invention. I FIG. 4 is a flowchart illustrating a method for protecting an i-file according to another preferred embodiment of the present invention. [Illustration of diagrammatic representation] 50: computer | 7 0: transmission channel 1 0 0: mobile phone 1 1 0 · · host 1 2 0: mobile communication transceiver 1 3 0 · · man-machine interface step S310, step 410: establishment A transmission channel between the mobile phone and the computer Step S 3 20: Transfer the first file from the computer to the mobile phone Step S 330: Encrypt / decrypt the first file transmitted to the mobile phone according to a key to form a first file Two file steps S3 40: Transfer the second file from the mobile phone to the computer Step S4 20: Cut the first file to form a plurality of first packets Step S4 3 0 · Transfer one of the first packets from the computer to the mobile phone Step S440: According to The first key pair transmitted to the mobile phone

11813TWF.PTD 第15頁 1237483 圖式簡單說明 包進行加密/解密,以形成一第二封包 步驟S4 5 0 :自行動電話傳輸上述之第二封包至電腦 步驟S4 6 0 :判斷是否所有第一封包皆完成加密/解密 步驟S 4 7 0 ··組合所有第二封包以形成一第二檔案11813TWF.PTD Page 15 1237483 The diagram briefly explains the packet is encrypted / decrypted to form a second packet. Step S4 50: Transfer the second packet from the mobile phone to the computer. Step S4 6 0: Determine whether all the first packets are. Complete the encryption / decryption steps S 4 7 0 ··· Combine all second packets to form a second file

11813TWF.PTD 第16頁11813TWF.PTD Page 16

Claims (1)

1237483 六、申請專利範圍 1. 一種具有檔案保密功能的行動電話,適於對儲存 在一電腦内之一檔案進行加密/解密,其中該電腦具有一 第一保密軟體,且該電腦與該行動電話之間具有一傳輸 通道,該行動電話至少包括: 一主機,具有一第二保密軟體,該第二保密軟體係 對應於該第一保密軟體,該第二保密軟體係適於根據一 密鑰而對儲存在該電腦内之該檔案進行加密/解密; 一行動通訊收發器,電性耦接於該主機;以及 一人機界面,電性耦接於該主機,適於輸入操作指 令並顯不訊息。 2. 如申請專利範圍第1項所述之具有檔案保密功能的 行動電話,更具有一識別碼,而該密鑰係與該識別碼相 關連。 3. 如申請專利範圍第1項所述之具有檔案保密功能的 行動電話,其中該傳輸通道包括有線傳輸通道。 4. 如申請專利範圍第1項所述之具有檔案保密功能的 行動電話,其中該傳輸通道包括無線傳輸通道。 5. 如申請專利範圍第1項所述之具有檔案保密功能的 行動電話,其中該人機界面包括: 一輸出裝置,電性耦接於該主機,適於顯示訊息; 以及 一輸入裝置,電性耦接於該主機,適於輸入操作指 令 〇 6. 如申請專利範圍第1項所述之具有檔案保密功能的1237483 VI. Scope of patent application 1. A mobile phone with file security function, suitable for encrypting / decrypting a file stored in a computer, wherein the computer has a first security software, and the computer and the mobile phone There is a transmission channel between them. The mobile phone includes at least: a host computer with a second security software, the second security software system corresponds to the first security software, and the second security software system is adapted to be based on a key. Encrypt / decrypt the file stored in the computer; a mobile communication transceiver electrically coupled to the host; and a man-machine interface electrically coupled to the host, suitable for inputting operating instructions and displaying messages . 2. The mobile phone with file security function described in item 1 of the scope of patent application has an identification code, and the key is associated with the identification code. 3. The mobile phone with file security function as described in item 1 of the scope of patent application, wherein the transmission channel includes a wired transmission channel. 4. The mobile phone with file security function described in item 1 of the scope of patent application, wherein the transmission channel includes a wireless transmission channel. 5. The mobile phone with file security function according to item 1 of the scope of patent application, wherein the man-machine interface includes: an output device electrically coupled to the host, suitable for displaying messages; and an input device, an electronic device Is coupled to the host, suitable for inputting operation instructions. 6. As described in item 1 of the scope of patent application, 11813TWF.PTD 第17頁 1237483 六、申請專利範圍 行動電話,其中該人機界面包括觸控螢幕。 7. —種檔案保密方法,適於藉由一行動電話對儲存 在一電腦内之一第一檔案進行加密/解密,該檔案保密方 法至少包括: 建立一傳輸通道於該行動電話與該電腦之間; 自該電腦傳輸該第一檔案至該行動電話; 根據一密鑰對該第一檔案進行加密/解密以形成一第 二檔案;以及 傳輸該第二檔案至該電腦。 8. 如申請專利範圍第7項所述之檔案保密方法,其中 該行動電話更具有一識別碼,而該密鑰係與該識別碼相 關連。 9. 如申請專利範圍第7項所述之檔案保密方法,其中 該傳輸通道包括有線傳輸通道。 1 0.如申請專利範圍第7項所述之檔案保密方法,其 中該傳輸通道包括無線傳輸通道。 11. 一種檔案保密方法,適於藉由一行動電話對儲存 在一電腦内之一第一檔案進行加密/解密,該檔案保密方 法至少包括: 建立一傳輸通道於該行動電話與該電腦之間; 切割該第一檔案以形成複數個第一封包; 對該些第一封包進行一封包加密/解密步驟,該封包 加密/解密步驟包括: 自該電腦傳輸該些第一封包之一至該行動電11813TWF.PTD Page 17 1237483 6. Scope of patent application Mobile phone, in which the man-machine interface includes a touch screen. 7. A file security method suitable for encrypting / decrypting a first file stored in a computer by a mobile phone, the file security method at least includes: establishing a transmission channel between the mobile phone and the computer Transmitting the first file from the computer to the mobile phone; encrypting / decrypting the first file according to a key to form a second file; and transmitting the second file to the computer. 8. The file confidentiality method described in item 7 of the scope of patent application, wherein the mobile phone further has an identification code, and the key is associated with the identification code. 9. The file security method described in item 7 of the scope of patent application, wherein the transmission channel includes a wired transmission channel. 10. The file security method described in item 7 of the scope of patent application, wherein the transmission channel includes a wireless transmission channel. 11. A file security method adapted to encrypt / decrypt a first file stored in a computer by a mobile phone, the file security method at least comprises: establishing a transmission channel between the mobile phone and the computer Cutting the first file to form a plurality of first packets; performing a packet encryption / decryption step on the first packets, the packet encryption / decryption step including: transmitting one of the first packets from the computer to the mobile phone; 11813TWF.PTD 第18頁 1237483 六、申請專利範圍 話; 根據一密鑰對傳輸至該行動電話之該第一封包 進行加密/解密以形成一第二封包; 自該行動電話傳輸該第二封包至該電腦; 重複該封包加密/解密步驟直到所有該些第一封包皆 完成加密/解密;以及 組合所有該些第二封包以形成一第二檔案。 1 2.如申請專利範圍第1 1項所述之檔案保密方法,其 中該行動電話更具有一識別碼,而該密鑰係與該識別碼 相關連。 1 3.如申請專利範圍第1 1項所述之檔案保密方法,其 中該傳輸通道包括有線傳輸通道。^ 1 4.如申請專利範圍第1 1項所述之檔案保密方法,其 中該傳輸通道包括無線傳輸通道。11813TWF.PTD Page 18 1237483 6. Application scope of patent; Encrypt / decrypt the first packet transmitted to the mobile phone according to a key to form a second packet; transmit the second packet from the mobile phone to The computer; repeating the packet encryption / decryption steps until all the first packets are encrypted / decrypted; and combining all the second packets to form a second file. 12 2. The file security method described in item 11 of the scope of patent application, wherein the mobile phone further has an identification code, and the key is associated with the identification code. 1 3. The method for file security described in item 11 of the scope of patent application, wherein the transmission channel includes a wired transmission channel. ^ 1 4. The file security method described in item 11 of the scope of patent application, wherein the transmission channel includes a wireless transmission channel. 11813TWF.PTD 第19頁11813TWF.PTD Page 19
TW93100405A 2004-01-08 2004-01-08 Mobile phone with file encrypting function and method of file encryption thereof TWI237483B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW93100405A TWI237483B (en) 2004-01-08 2004-01-08 Mobile phone with file encrypting function and method of file encryption thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW93100405A TWI237483B (en) 2004-01-08 2004-01-08 Mobile phone with file encrypting function and method of file encryption thereof

Publications (2)

Publication Number Publication Date
TW200524361A TW200524361A (en) 2005-07-16
TWI237483B true TWI237483B (en) 2005-08-01

Family

ID=36821466

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93100405A TWI237483B (en) 2004-01-08 2004-01-08 Mobile phone with file encrypting function and method of file encryption thereof

Country Status (1)

Country Link
TW (1) TWI237483B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI762272B (en) * 2021-04-14 2022-04-21 崴強科技股份有限公司 Encryption method

Also Published As

Publication number Publication date
TW200524361A (en) 2005-07-16

Similar Documents

Publication Publication Date Title
JP4253543B2 (en) Hardware protection key and reissuing method
CN103458382B (en) Hardware encryption transmission and storage method and system for mobile phone private short message
US8792636B2 (en) Protocol for protecting content protection data
JP4597784B2 (en) Data processing device
CA2516568A1 (en) System and method of protecting data on a communication device
JP3457184B2 (en) Search device and medium storing control program therefor
CN101685425A (en) Mobile storage device and method of encrypting same
JP2005130028A (en) Encryption key, and encryption apparatus and decryption apparatus using the same
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
WO2015117437A1 (en) File encryption/decryption method and device
JP2011505034A (en) Disposable virtual secret information authentication system and authentication method
WO2010038763A1 (en) Information management system, terminal unit, server device and program
CN104915583A (en) Interface decryption processing method and mobile terminal
JP2009153196A (en) Cryptographic communication method
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
KR20130038894A (en) Data processing terminal, method of processing data therof, data processing system and method of processing data thereof
TWI237483B (en) Mobile phone with file encrypting function and method of file encryption thereof
WO2023065772A1 (en) Log data processing method and apparatus, storage medium, and electronic device
US20050273604A1 (en) [mobile phone with file encryption function and method of encrypting/decrypting file thereof]
US11924337B2 (en) Sensitive data management system
CN101639928A (en) Image data encryption and decryption method and system thereof
JP2008287689A (en) Group encryption and decryption system and method, and program
CN106156571A (en) Encrypting fingerprint instrument, encrypting fingerprint instrument encrypting and deciphering system and encipher-decipher method
KR102343711B1 (en) Passive encryption system
KR102666331B1 (en) A method and terminal device for encrypting a message

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees