CN105160271B - Reducible file protection device control method and reducible file protection method - Google Patents
Reducible file protection device control method and reducible file protection method Download PDFInfo
- Publication number
- CN105160271B CN105160271B CN201510537535.7A CN201510537535A CN105160271B CN 105160271 B CN105160271 B CN 105160271B CN 201510537535 A CN201510537535 A CN 201510537535A CN 105160271 B CN105160271 B CN 105160271B
- Authority
- CN
- China
- Prior art keywords
- data
- protection
- file
- document
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
本发明关于一种可还原式文件保护装置控制方法及可还原式文件保护方法,文件提供者对文件内容设定保密内容后,设定一保密内容保护模式,根据保密内容保护模式,可还原式文件保护装置将保密内容进行搬移,亦可于搬移后,以替代性内容取代原文件内容的保密内容。接着,输入身份认证密钥对保密内容进行加密;若使用者欲开启保护后的文件,将被要求确认身份数据,若身份确认数据与身份认证密钥相符,可还原式文件保护装置将已搬移保密内容的原文件内容以及保密内容,还原为原文件内容,若身份确认数据与身份认证密钥不相符,则开启已搬移保密内容的原文件内容;藉此,可达到对电子文件保护的机密性及现有加密技术不易还原与使用不便的问题。
The present invention relates to a control method of a restorable file protection device and a restorable file protection method. After the file provider sets confidential content for the file content, a confidential content protection mode is set. According to the confidential content protection mode, the restorable file protection device moves the confidential content, and can also replace the confidential content of the original file content with alternative content after the move. Then, the identity authentication key is input to encrypt the confidential content; if the user wants to open the protected file, he will be required to confirm the identity data. If the identity confirmation data is consistent with the identity authentication key, the restorable file protection device restores the original file content and the confidential content of the moved confidential content to the original file content. If the identity confirmation data is inconsistent with the identity authentication key, the original file content of the moved confidential content is opened; thereby, the confidentiality of the electronic file protection can be achieved and the problem of the existing encryption technology being difficult to restore and inconvenient to use can be solved.
Description
技术领域technical field
本发明提供一种可还原式文件保护装置控制方法及可还原式文件保护方法,尤指对一种具有防护数据区以及自定义区的文件,经过设定保密内容和保密内容保护模式后,根据保密内容保护模式将保密内容搬移至自定义区进行加密,并根据保密内容保护模式对文件的保密内容进行保护以及还原的方法。The present invention provides a reversible file protection device control method and a reversible file protection method, especially for a file with a protected data area and a custom area, after setting the confidential content and the confidential content protection mode, according to In the confidential content protection mode, the confidential content is moved to the custom area for encryption, and the confidential content of the file is protected and restored according to the confidential content protection mode.
背景技术Background technique
由于环保意识的崛起,人们于文件传递时,渐渐地以电子文件的方式进行交换,而在电子文件传递时,若电子文件中具有机密性的文件,使用者未对电子文件进行加密,而电子文件不经意流出时,将造成企业或个人发生不可预期的损失。Due to the rise of environmental protection awareness, people gradually exchange files in the form of electronic files when transferring files. When transferring electronic files, if there are confidential files in the electronic files, the user does not encrypt the electronic files, and the electronic files When files flow out inadvertently, it will cause unexpected losses to enterprises or individuals.
现有技术是以加密的方式,将电子文件进行加密,当使用者欲阅览加密的电子文件时,经由解密的方式,将加密的电子文件进行解密后,方才能阅读或使用该电子文件。The prior art encrypts electronic files in an encrypted manner. When users want to read encrypted electronic files, they can only read or use the electronic files after decrypting the encrypted electronic files through decryption.
然而,上述的方式,若文件提供者仅希望提供使用者阅览或使用电子文件的部分内容,而另外的内容不提供该名使用者阅览或使用时,需先将电子文件进行编修后,再提供给该名使用者阅览或使用,若不进行先行编修,该名使用者将可阅览或使用全部的电子文件内容,且若文件提供者欲提供多名使用者阅览或使用相同电子文件,而每位使用者能阅览或使用的电子文件的内容有所差异时,需先将电子文件进行多份复制,且根据每名使用者可观看的权限调整电子文件的内容,前述方式将相当费时,不仅仅要维护多份复制的文件且机密性亦存在相当的风险。However, in the above-mentioned method, if the document provider only wishes to provide the user to read or use part of the content of the electronic document, and the other content is not provided for the user to read or use, the electronic document needs to be edited first, and then Provided to the user to read or use, if not edited first, the user will be able to read or use all the contents of the electronic file, and if the file provider intends to provide multiple users to read or use the same electronic file, And when the content of the electronic document that each user can read or use is different, it is necessary to make multiple copies of the electronic document first, and adjust the content of the electronic document according to the viewing authority of each user. The aforementioned method will be quite time-consuming , not only to maintain multiple copies of files but also confidentiality is also at considerable risk.
另外,现有技术亦有经由遮蔽的方式,将电子文件中的机密信息进行删除,并以使用者无法解读的符号取代删除的内容,以达到确实保密的效果。In addition, the prior art also deletes the confidential information in the electronic document by means of masking, and replaces the deleted content with symbols that cannot be read by the user, so as to achieve the effect of secrecy.
然而,前述的方式,将致使电子文件的内容经由遮蔽的过程后,电子文件便已完全无法复原回原始的电子文件内容,若文件提供者欲通过原始的电子文件进行编辑,以提供给其他使用者使用时,文件提供者须先将已经被删除内容的文件进行重新填写,接着,根据使用者可观看的权限,将电子文件进行遮蔽保密,以提供该名使用者阅览或使用,如此一来,将使文件提供者于操作上,相当不便。However, the aforementioned method will cause the content of the electronic file to go through the masking process, and the electronic file cannot be restored to the original electronic file content. If the file provider wants to edit the original electronic file for other users When the user uses the file, the file provider must first refill the file that has been deleted, and then, according to the user's viewing authority, mask the electronic file and keep it secret, so that the user can read or use it. , will make the file provider quite inconvenient in operation.
综上所述,如何改善上述电子文件的机密性以及现有加密方式的不便性的问题,实乃业界目前有进一步改善的必要。To sum up, how to improve the confidentiality of the above-mentioned electronic documents and the inconvenience of the existing encryption methods is actually a need for further improvement in the industry.
发明内容Contents of the invention
为解决上述电子文件的机密性以及不便性的问题,本发明提供一种可还原式文件保护装置控制方法,用以执行下列步骤:In order to solve the above-mentioned problems of confidentiality and inconvenience of electronic files, the present invention provides a method for controlling a reversible file protection device, which is used to perform the following steps:
令一可还原式文件保护装置显示一文件,该文件具有一防护数据区以及一自定义区,且该防护数据区储存一未防护数据;Make a reversible file protection device display a file, the file has a protected data area and a custom area, and the protected data area stores an unprotected data;
令该可还原式文件保护装置由一文件提供者,开启一文件保护程序;causing the reversible file protection device to be started by a file provider with a file protection program;
令该可还原式文件保护装置于开启该文件保护程序后,由该文件提供者根据该未防护数据,设定一保密内容;Make the reversible file protection device set a confidential content according to the unprotected data by the file provider after the file protection program is activated;
令该可还原式文件保护装置于设定该保密内容后,设定一保密内容保护模式;Make the reversible file protection device set a security content protection mode after setting the security content;
令该可还原式文件保护装置根据该保密内容保护模式,将该保密内容搬移至该自定义区;order the reversible file protection device to move the confidential content to the custom area according to the confidential content protection mode;
令该可还原式文件保护装置将已搬移该保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据;ordering the reversible file protection device to store the unprotected data from which the confidential content has been moved in the protected data area to replace the unprotected data, so as to generate a first protected data;
令该可还原式文件保护装置由该文件提供者输入一身份认证密钥对该保密内容进行加密;Make the reversible file protection device encrypt the confidential content by inputting an identity authentication key from the file provider;
其中,当该可还原式文件保护装接收一控制信号,以开启该文件时,要求一使用者输入一身份确认数据;Wherein, when the reversible file protection device receives a control signal to open the file, a user is required to input an identity confirmation data;
令该可还原式文件保护装置根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,该可还原式文件保护装置将通过该文件保护程序,自该自定义区搬移该保密内容与该防护数据区的该第一防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,令该可还原式文件保护装置显示该第一防护数据。make the reversible file protection device compare the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, the reversible file protection device The confidential content and the first protected data in the protected data area will be moved from the custom area through the file protection program to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key , causing the reversible file protection device to display the first protection data.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置根据该保密内容保护模式,对该保密内容进行复制,且将复制后的保密内容搬移至该自定义区。In the control method of the reversible file protection device described above, the reversible file protection device copies the confidential content according to the confidential content protection mode, and moves the copied confidential content to the self-defined area.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置将该保密内容搬移至该自定义区后,以一替代性内容取代该未防护数据的该保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生该第一防护数据。In the control method of the reversible file protection device described above, after the reversible file protection device moves the confidential content to the custom area, replaces the confidential content of the unprotected data with a substitute content, and transfers the The unprotected data replaced by the alternative content is stored in the protected data area to replace the unprotected data to generate the first protected data.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置于产生该第一防护数据后,进一步包含:令该可还原式文件保护装置设定一文件共用保护规则,该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式;令该可还原式文件保护装置根据该文件共用保护规则的该文件保密内容,对该第一防护数据设定该文件保密内容;令该可还原式文件保护装置根据该文件共用保护规则的该文件保密内容保护模式,将该文件保密内容搬移至该自定义区,且将已搬移该文件保密内容的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生一第二防护数据;令该可还原式文件保护装置由该使用者输入该身份认证密钥,对该保密内容以及该文件保密内容进行加密;其中,当该可还原式文件保护装置接收该控制信号,以开启该文件时,要求该使用者输入该身份确认数据;令该可还原式文件保护装置根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,将可还原式文件保护装置通过该文件保护程序,自该自定义区搬移该保密内容、该文件保密内容与该防护数据区的该第二防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,令该可还原式文件保护装置显示该第二防护数据。In the method for controlling a reversible file protection device as described above, after generating the first protection data, the reversible file protection device further includes: making the reversible file protection device set a file sharing protection rule, the file The sharing protection rule has a file security content and a file security content protection mode; make the reversible file protection device set the file security content to the first protected data according to the file security content of the file sharing protection rule; order The reversible file protection device moves the confidential content of the file to the self-defined area according to the protection mode of the confidential content of the file in the common protection rule for the file, and stores the first protected data of the confidential content of the file that has been moved to the Protected data area, to replace the first protected data, so as to generate a second protected data; make the reversible file protection device input the identity authentication key by the user, encrypt the confidential content and the confidential content of the document ; Wherein, when the reversible file protection device receives the control signal to open the file, the user is required to input the identity confirmation data; the reversible file protection device confirms the identity according to the identity confirmation data The data is compared with the identity authentication key, and when the identity confirmation data matches the identity authentication key, the reversible file protection device moves the confidential content and the file from the self-defined area through the file protection program. Confidential content and the second protected data in the protected data area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, make the reversible file protection device display the second protected data.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置于设定该文件保密内容后,对该文件保密内容进行复制,且将复制后的文件保密内容搬移至该自定义区。In the control method of the reversible file protection device described above, the reversible file protection device copies the confidential content of the file after setting the confidential content of the file, and moves the copied confidential content of the file to the custom Area.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置将该文件保密内容搬移至该自定义区后,以一替代性内容取代该第一防护数据的该文件保密内容,并将该替代性内容取代的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生该第二防护数据。In the control method of the reversible file protection device described above, after the reversible file protection device moves the confidential content of the file to the self-defined area, it replaces the confidential content of the file in the first protected data with an alternative content, and storing the first protected data replaced by the alternative content in the protected data area, so as to replace the first protected data, so as to generate the second protected data.
如上所述的可还原式文件保护装置控制方法,当该可还原式文件保护装置接收该控制信号,以开启该文件,要求该使用者输入该身份确认数据时,该使用者将储存该身份确认数据的一认证装置与可还原式文件保护装置连接,使将该身份确认数据传送至该可还原式文件保护装置。In the method for controlling a reversible file protection device as described above, when the reversible file protection device receives the control signal to open the file and requires the user to input the identity confirmation data, the user will store the identity confirmation A data authentication device is connected to the reversible file protection device, so that the identity confirmation data is transmitted to the reversible file protection device.
为达前述目的,本发明另外提供一种可还原式文件保护装置控制方法,用以执行下列步骤:To achieve the aforementioned purpose, the present invention additionally provides a method for controlling a reversible file protection device, which is used to perform the following steps:
令一可还原式文件保护装置与一服务器建立一连结,并自该服务器接收一文件共用保护规则以及一身份认证密钥,该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式;Make a reversible file protection device establish a connection with a server, and receive a file sharing protection rule and an identity authentication key from the server, the file sharing protection rule has a file security content and a file security content protection mode;
令该可还原式文件保护装置显示一文件,该文件具有一防护数据区以及一自定义区,且该防护数据区储存一未防护数据;causing the reversible file protection device to display a file, the file has a protected data area and a custom area, and the protected data area stores unprotected data;
令该可还原式文件保护装置由一文件提供者,开启一文件保护程序;causing the reversible file protection device to be started by a file provider with a file protection program;
令该可还原式文件保护装置于开启该文件保护程序后,根据该文件共用保护规则的该文件保密内容,对该原始文件设定该文件保密内容,且于设定完该文件保密内容后,根据该文件共用保护规则的该文件保密内容保护模式,将该文件保密内容搬移至该自定义区;Make the reversible file protection device set the file security content to the original file according to the file security content of the file sharing protection rule after starting the file protection program, and after setting the file security content, Move the confidential content of the file to the custom area according to the protection mode of the confidential content of the file in the common protection rule for the file;
令该可还原式文件保护装置将已搬移该文件保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据;ordering the reversible file protection device to store the unprotected data that has moved the confidential content of the file into the protected data area to replace the unprotected data, so as to generate a first protected data;
令该可还原式文件保护装置根据该身份认证密钥,对该文件保密内容进行加密;Make the reversible file protection device encrypt the confidential content of the file according to the identity authentication key;
其中,当该可还原式文件保护装置接收一控制信号,以开启该文件时,要求一使用者输入一身份确认数据;令该可还原式文件保护装置根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,该可还原式文件保护装置将通过该文件保护程序,自该自定义区搬移该文件保密内容与该防护数据区的该第一防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,令该可还原式文件保护装置显示该第一防护数据。Wherein, when the reversible file protection device receives a control signal to open the file, a user is required to input an identity confirmation data; the reversible file protection device is made to input the identity confirmation data according to the identity confirmation data Compared with the identity authentication key, when the identity confirmation data matches the identity authentication key, the reversible file protection device will move the confidential content of the file from the self-defined area through the file protection program. The first protected data in the protected data area is used to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the reversible file protection device is made to display the first protected data.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置于设定该文件保密内容后,对该文件保密内容进行复制,且将复制后的文件保密内容搬移至该自定义区。In the control method of the reversible file protection device described above, the reversible file protection device copies the confidential content of the file after setting the confidential content of the file, and moves the copied confidential content of the file to the custom Area.
如上所述的可还原式文件保护装置控制方法,该可还原式文件保护装置将该文件保密内容搬移至该自定义区后,以一替代性内容取代该未防护数据的该文件保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生该第一防护数据。In the control method of the above-mentioned reversible file protection device, after the reversible file protection device moves the confidential content of the file to the self-defined area, replaces the confidential content of the file of the unprotected data with a substitute content, and The unprotected data replaced by the alternative content is stored in the protected data area, so as to replace the unprotected data, so as to generate the first protected data.
另外,为解决上述电子文件的机密性以及不便性的问题,本发明提供一种可还原式文件保护方法,用以执行下列步骤:In addition, in order to solve the above-mentioned confidentiality and inconvenience problems of electronic files, the present invention provides a reversible file protection method for performing the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据;Make a file have a protected data area and a custom area, and the protected data area stores an unprotected data;
开启一文件保护程序;Start a file protection program;
对该未防护数据设定一保密内容;Set a confidentiality content for the unprotected data;
于设定该保密内容后,设定一保密内容保护模式;After setting the confidential content, set a confidential content protection mode;
根据该保密内容保护模式,将该保密内容搬移至该自定义区;Move the confidential content to the custom area according to the protection mode of the confidential content;
将已搬移该保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据;storing the unprotected data from which the confidential content has been moved in the protected data area to replace the unprotected data, so as to generate a first protected data;
输入一身份认证密钥对该保密内容进行加密;Enter an identity authentication key to encrypt the confidential content;
其中,当接收一控制信号,以开启该文件时,要求输入一身份确认数据;Wherein, when receiving a control signal to open the file, it is required to input an identity confirmation data;
当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序自该自定义区搬移该保密内容与该防护数据区的该第一防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第一防护数据。When the identity confirmation data matches the identity authentication key, move the confidential content and the first protected data in the protected data area from the custom area through the file protection program to restore the unprotected data, and when the file protection program When the identity confirmation data does not match the identity authentication key, the first protection data is displayed.
如上所述的可还原式文件保护方法,根据该保密内容保护模式后,对该保密内容进行复制,且将复制后的保密内容搬移至该自定义区。In the reversible file protection method described above, the confidential content is copied according to the confidential content protection mode, and the copied confidential content is moved to the self-defined area.
如上所述的可还原式文件保护方法,于搬移该保密内容后,以一替代性内容取代该未防护数据的该保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生该第一防护数据。In the reversible file protection method described above, after moving the confidential content, replace the confidential content of the unprotected data with an alternative content, and store the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data to generate the first protected data.
如上所述的可还原式文件保护方法,于产生该第一防护数据后,进一步包含:设定一文件共用保护规则,该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式;根据该文件共用保护规则的该文件保密内容,对该第一防护数据设定该文件保密内容;根据该文件共用保护规则的该文件保密内容保护模式,将该文件保密内容搬移至该自定义区,且将已搬移该文件保密内容的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生一第二防护数据;输入该身份认证密钥,对该保密内容以及该文件保密内容进行加密;其中,当接收该控制信号,以开启该文件时,要求输入该身份确认数据;根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序,自该自定义区搬移该保密内容、该文件保密内容与该防护数据区的该第二防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第二防护数据。The reversible file protection method described above, after generating the first protection data, further includes: setting a file sharing protection rule, the file sharing protection rule has a file security content and a file security content protection mode; according to According to the confidential content of the file shared by the file protection rule, the confidential content of the file is set for the first protected data; according to the protection mode of the confidential content of the file shared by the file shared protection rule, the confidential content of the file is moved to the self-defined area, And store the first protected data that has moved the confidential content of the document into the protected data area to replace the first protected data, so as to generate a second protected data; input the identity authentication key, the confidential content and the The confidential content of the file is encrypted; wherein, when the control signal is received to open the file, the identity confirmation data is required to be input; according to the identity confirmation data, the identity confirmation data is compared with the identity authentication key, and when the When the identity confirmation data matches the identity authentication key, the confidential content, the confidential content of the file and the second protected data in the protected data area are moved from the custom area through the file protection program to restore the unprotected data , and when the identity confirmation data does not match the identity authentication key, the second protection data is displayed.
如上所述的可还原式文件保护方法,于设定该文件保密内容后,对该文件保密内容进行复制,且将复制后的文件保密内容搬移至该自定义区。In the reversible file protection method described above, after setting the confidential content of the file, the confidential content of the file is copied, and the copied confidential content of the file is moved to the custom area.
如上所述的可还原式文件保护方法,于搬移该文件保密内容后,以一替代性内容取代该第一防护数据的该文件保密内容,并将该替代性内容取代的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生该第二防护数据。In the reversible file protection method described above, after moving the confidential content of the file, replace the confidential content of the first protected data with an alternative content, and store the first protected data replaced by the alternative content to the protected data area to replace the first protected data to generate the second protected data.
通过上述所揭露的技术特征,本发明的可还原式文件保护装置控制方法及可还原式文件保护方法,文件提供者可依据使用者可阅览或使用的权限不同,于相同的未防护数据中,进而提供不同的防护数据来阅览或使用,并可在使用者身分与权限确认后,将防护数据还原为未防护数据,以降低文件提供者于制作电子文件不便性以及提升机密性的效果。Through the technical features disclosed above, the control method of the reversible file protection device and the reversible file protection method of the present invention, the file provider can, in the same unprotected data, Furthermore, different protected data are provided for viewing or use, and after the user identity and authority are confirmed, the protected data can be restored to unprotected data, so as to reduce the inconvenience of the document provider in making electronic documents and improve the confidentiality.
附图说明Description of drawings
图1A是本发明可还原式文件保护装置控制方法第一实施例架构图。FIG. 1A is a structure diagram of the first embodiment of the method for controlling a reversible file protection device according to the present invention.
图1B是本发明可还原式文件保护装置控制方法第一实施例架构图。FIG. 1B is a structure diagram of the first embodiment of the control method of the reversible file protection device of the present invention.
图2是本发明第二实施例架构图。Fig. 2 is a structure diagram of the second embodiment of the present invention.
图3是本发明第一实施例举例示意图。Fig. 3 is an example schematic diagram of the first embodiment of the present invention.
图4是本发明第二实施例举例示意图。Fig. 4 is an example schematic diagram of the second embodiment of the present invention.
图5是本发明第三实施例示意图。Fig. 5 is a schematic diagram of a third embodiment of the present invention.
图6是本发明第一实施例的可还原式文件保护方法流程图。FIG. 6 is a flow chart of a method for restoring a file in the first embodiment of the present invention.
图7是本发明第一实施例的可还原式文件保护方法另一流程图。FIG. 7 is another flow chart of the reversible file protection method according to the first embodiment of the present invention.
图8是本发明第一实施例的可还原式文件保护方法另一流程图。FIG. 8 is another flow chart of the reversible file protection method according to the first embodiment of the present invention.
图9是本发明第二实施例的可还原式文件保护方法流程图。FIG. 9 is a flow chart of a reversible file protection method according to the second embodiment of the present invention.
图10是本发明第二实施例的可还原式文件保护方法另一流程图。FIG. 10 is another flow chart of the reversible file protection method according to the second embodiment of the present invention.
图11是本发明第二实施例的可还原式文件保护方法另一流程图。FIG. 11 is another flow chart of the reversible file protection method according to the second embodiment of the present invention.
附图标号说明:Explanation of reference numbers:
11 可还原式文件保护装置 12 服务器11 Restorable file protector 12 Server
13 通用串列端口装置 2 文件提供者13 Universal Serial Port Device 2 File Provider
21 防护数据区 22 自定义区21 Protection data area 22 Custom area
3 使用者 4 管理者3 users 4 managers
311 未防护数据 312 第一防护数据311 Unprotected data 312 First protected data
313 第二防护数据 411 文件共用保护规则313 Second Protection Data 411 File Sharing Protection Rules
具体实施方式detailed description
以下配合图式及本发明的实施例,进一步阐述本发明为达成预定发明目的所采取的技术手段。The technical means adopted by the present invention to achieve the intended purpose of the invention will be further described below in conjunction with the drawings and the embodiments of the present invention.
请参考图1A以及图1B,图1A以及图1B是本发明可还原式文件保护装置控制方法第一实施例架构图,本发明提供一种可还原式文件保护装置11,该可还原式文件保护装置11可为一可携式电脑或一台式主机。本实施例文件提供者以及使用者亦可藉由同一可还原式文件保护装置操作可还原式文件保护装置控制方法。Please refer to Fig. 1A and Fig. 1B, Fig. 1A and Fig. 1B are the framework diagram of the first embodiment of the control method of the reversible file protection device of the present invention, the present invention provides a reversible file protection device 11, the reversible file protection device The device 11 can be a portable computer or a desktop host. In this embodiment, the file provider and the user can also operate the control method of the reversible file protection device through the same retrievable file protection device.
详细而言,由于组织中,每个人的权责不同,因此,当文件提供者2欲依据使用者3可阅览或使用的权限,提供文件给使用者3时,首先,文件提供者2操作可还原式文件保护装置11,可还原式文件保护装置11将根据文件提供者2的操作显示文件,而文件的文件格式于设计时,为提供使用者具有后续扩充功能的效果,因此,文件具有防护数据区以及一自定义区,而未防护数据储存于防护数据区。In detail, due to the different rights and responsibilities of each person in the organization, when the file provider 2 intends to provide files to the user 3 according to the user 3's permission to read or use, first, the file provider 2 can operate Restorable file protection device 11, the restoreable file protection device 11 will display files according to the operation of the file provider 2, and the file format of the file is designed to provide users with the effect of subsequent expansion functions, so the file has protection The data area and a custom area, and the unprotected data is stored in the protected data area.
接着,文件提供者2通过可还原式文件保护装置11,开启文件保护程序,于开启文件保护程序后,文件提供者2根据未防护数据,设定一保密内容,当文件提供者2设定完保密内容后,进一步,设定一保密内容保护模式。接着,可还原式文件保护装置11根据保密内容保护模式将保密内容搬移至该自定义区,且将已搬移该保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据,于第一防护数据产生后,文件提供者2输入一身份认证密钥,以对保密内容进行加密。Then, the file provider 2 opens the file protection program through the reversible file protection device 11. After opening the file protection program, the file provider 2 sets a confidential content according to the unprotected data. When the file provider 2 finishes setting After the confidential content is secured, further, a confidential content protection mode is set. Then, the reversible file protection device 11 moves the confidential content to the self-defined area according to the confidential content protection mode, and stores the unprotected data that has moved the confidential content into the protected data area to replace the unprotected data, To generate a first protection data, after the first protection data is generated, the file provider 2 inputs an identity authentication key to encrypt the confidential content.
更进一步,文件提供者2经由网际网络或移动式储存媒介,将已防护的文件传递给使用者3,由于文件提供者2是根据使用者3所能阅览或使用的权限进行防护,因此,当使用者3接获文件后,仅能阅览或使用第一防护数据,若使用者欲进一步阅览或使用文件,将送出控制信号,以开启该未防护数据,可还原式文件保护装置11接收到控制信号时,将要求使用者3输入身份确认数据,使用者可通过台式电脑输入身份确认数据,或可通过储存有身份确认数据的认证装置与可还原式文件保护装置11连接,以将认证装置内的身份确认数据传送至可还原式文件保护装置11,该认证装置可为一通用串列端口(Universal Serial Bus:USB)装置13。Furthermore, the file provider 2 transmits the protected file to the user 3 via the Internet or a removable storage medium. Since the file provider 2 protects the file according to the permissions that the user 3 can read or use, when After the user 3 receives the file, he can only read or use the first protected data. If the user wants to read or use the file further, he will send a control signal to open the unprotected data, and the reversible file protection device 11 receives the control When the signal is signaled, the user 3 will be required to input identity confirmation data, and the user can input the identity confirmation data through a desktop computer, or can be connected with the reversible file protection device 11 by storing the authentication device with the identity confirmation data, so that the identity confirmation data in the authentication device The identity confirmation data is sent to the reversible file protection device 11 , and the authentication device can be a Universal Serial Bus (USB) device 13 .
接着,当使用者3输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符,可还原式文件保护装置11将通过该文件保护程序,从该自定义区搬移该保密内容与防护数据区的第一防护数据,以还原并显示该未防护数据,反之,当使用者3所输入的该身份确认数据与该身份认证密钥不相符时,可还原式文件保护装置11将显示第一防护数据,提供给未通过身份确认的使用者3阅览或使用。Next, when the user 3 finishes inputting the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key , the reversible file protection device 11 will move the confidential content and the first protected data in the protected data area from the self-defined area through the file protection program, so as to restore and display the unprotected data; otherwise, when the user 3 When the input identity confirmation data does not match the identity authentication key, the reversible file protection device 11 will display the first protection data and provide it to the user 3 who has not passed the identity verification to read or use.
更者,上述实施例亦可使文件提供者于可还原式文件保护装置11对未防护数据设定保密内容后,进一步,设定保密内容保护模式,可还原式文件保护装置11将根据该保密内容保护模式,将保密内容搬移至自定义区,且搬移该保密内容后,以一替代性内容取代未防护数据的保密内容的位置,并将替代性内容取代的未防护数据储存至该防护数据区,以取代该未防护数据,使产生该第一防护数据。What's more, the above-mentioned embodiment can also enable the file provider to further set the confidential content protection mode after the reversible file protection device 11 sets the confidential content for the unprotected data, and the reversible file protection device 11 will Content protection mode, move the confidential content to the custom area, and after moving the confidential content, replace the position of the confidential content of the unprotected data with an alternative content, and store the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data to generate the first protected data.
另外,亦可于设定完保密内容保护模式后,可还原式文件保护装置11根据保密内容保护模式,先对保密内容进行复制,以产生另一保密内容,随后,将复制的保密内容搬移至该自定义区,且搬移该保密内容后,以一替代性内容取代未防护数据的保密内容,并将替代性内容取代的未防护数据储存至该防护数据区,以取代该未防护数据,使产生该第一防护数据。In addition, after setting the confidential content protection mode, the reversible file protection device 11 first copies the confidential content according to the confidential content protection mode to generate another confidential content, and then moves the copied confidential content to The custom area, and after moving the confidential content, replace the confidential content of the unprotected data with an alternative content, and store the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data, so that The first protection data is generated.
请参考图2,图2是本发明第二实施例架构图,首先,文件提供者2操作的可还原式文件保护装置11将从服务器12接收管理者4设定的一文件共用保护规则,而该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式,并将该文件共用保护规则储存至可还原文件保护装置11中。接着,由于组织中,每个人的权责不同,因此,当文件提供者2欲依据使用者3可阅览或使用的权限,提供文件给使用者3时,首先,文件提供者2操作可还原式文件保护装置11,可还原式文件保护装置11将根据文件提供者2的操作显示文件,而文件的文件格式于设计时,为提供使用者具有后续扩充功能的效果,因此,文件具有防护数据区以及一自定义区,而防护数据区储存有一未防护数据。Please refer to FIG. 2. FIG. 2 is a structure diagram of the second embodiment of the present invention. First, the reversible file protection device 11 operated by the file provider 2 will receive a file sharing protection rule set by the administrator 4 from the server 12, and The file sharing protection rule has a file security content and a file security content protection mode, and the file sharing protection rule is stored in the recoverable file protection device 11 . Next, since the rights and responsibilities of each person in the organization are different, when the file provider 2 intends to provide the file to the user 3 according to the user 3's permission to read or use it, first, the file provider 2 operates the reversible The file protection device 11, the reversible file protection device 11 will display files according to the operation of the file provider 2, and the file format of the file is designed to provide users with the effect of subsequent expansion functions. Therefore, the file has a protected data area and a custom area, and the protected data area stores a non-protected data.
接着,文件提供者2通过可还原式文件保护装置11,开启文件保护程序,于开启文件保护程序后,文件提供者2根据未防护数据,设定一保密内容,当文件提供者2设定完保密内容后,设定一保密内容保护模式。接着,根据保密内容保护模式,将保密内容搬移至该自定义区,随后,可还原式文件保护装置11将已搬移该保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据,接着,文件提供者2设定该文件共用保护规则,可还原式保护装置11将根据该文件共用保护规则的该文件保密内容,对该第一防护数据设定该文件保密内容,随后,可还原式文件保护装置11根据该文件保密内容保护模式将文件保密内容搬移至该自定义区(此时该自定义区包含有保密内容与文件保密内容),且将已搬移文件保密内容的该第一防护数据储存至防护数据区,以取代该第一防护数据,使产生一第二防护数据,于第二防护数据产生后,文件提供者2通过可还原式文件保护装置11输入一身份认证密钥,以对文件保密内容以及保密内容进行加密。Then, the file provider 2 opens the file protection program through the reversible file protection device 11. After opening the file protection program, the file provider 2 sets a confidential content according to the unprotected data. When the file provider 2 finishes setting After securing the content, set a security content protection mode. Next, according to the protection mode of the confidential content, the confidential content is moved to the self-defined area, and subsequently, the reversible file protection device 11 stores the unprotected data which has moved the confidential content into the protected data area to replace the unprotected data. Data, so that a first protection data is generated, then, the file provider 2 sets the file sharing protection rule, and the reversible protection device 11 sets the confidential content of the file according to the file sharing protection rule to the first protection data The confidential content of the file is determined, and subsequently, the reversible file protection device 11 moves the confidential content of the file to the self-defined area according to the protection mode of the confidential content of the file (this time, the self-defined area includes the confidential content and the confidential content of the file), and Store the first protection data of the confidential content of the moved file in the protection data area to replace the first protection data, so that a second protection data is generated. After the second protection data is generated, the file provider 2 can restore The file protection device 11 inputs an identity authentication key to encrypt the confidential content of the file and the confidential content.
更者,上述实施例亦可于设定文件保密内容保护模式,可还原式文件保护装置11将根据该文件保密内容保护模式,将文件保密内容搬移至自定义区,且搬移该文件保密内容后,以一替代性内容取代该第一防护数据的文件保密内容的位置,并将替代性内容取代的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生该第二防护数据。What's more, the above embodiment can also set the file confidential content protection mode, the reversible file protection device 11 will move the file confidential content to the custom area according to the file confidential content protection mode, and after moving the file confidential content , replacing the position of the confidential content of the file of the first protection data with an alternative content, and storing the first protection data replaced by the replacement content in the protection data area, so as to replace the first protection data, so that the first protection data is generated 2. Protection data.
另外,亦可于设定完文件保密内容保护模式后,可还原式文件保护装置11根据文件保密内容保护模式,先对该文件保密内容进行复制,以产生另一文件保密内容,随后,将复制的文件保密内容搬移至该自定义区,且搬移该文件保密内容后,以一替代性内容取代该第一防护数据的文件保密内容,并将替代性内容取代的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生该第二防护数据。In addition, after setting the file security content protection mode, the reversible file protection device 11 first copies the file security content according to the file security content protection mode to generate another file security content, and then copies move the confidential content of the file to the custom area, and after moving the confidential content of the file, replace the confidential content of the file of the first protected data with an alternative content, and store the first protected data replaced by the alternative content in the The protected data area replaces the first protected data to generate the second protected data.
更进一步,文件提供者2经由网际网络或移动式储存媒介,将文件传递给使用者3,由于文件提供者2以及管理者4是根据使用者3所能阅览或使用的权限对未防护数据设定保密内容以及文件保密内容,当保密内容以及文件保密内容设定后,将产生第二防护数据,因此,当使用者3接获文件后,仅能阅览或使用第二防护数据,若使用者3欲进一步阅览或使用文件,须送出控制信号,以开启该未防护数据,可还原式文件保护装置11将要求使用者3输入身份确认数据。Furthermore, the file provider 2 transmits the file to the user 3 via the Internet or a removable storage medium, because the file provider 2 and the manager 4 set the unprotected data according to the authority that the user 3 can read or use. Set the confidential content and the confidential content of the file. When the confidential content and the confidential content of the file are set, the second protection data will be generated. Therefore, when the user 3 receives the file, he can only read or use the second protection data. If the user 3. If you want to read or use the file further, you must send a control signal to open the unprotected data, and the reversible file protection device 11 will require the user 3 to input identity confirmation data.
接着,当使用者3输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符,可还原式文件保护装置11将通过该文件保护程序,自该自定义区搬移保密内容、文件保密内容与防护数据区的第二防护数据,以还原为未防护数据,反之,当使用者3所输入的身份确认数据与身份认证密钥不相符时,可还原式文件保护装置11将显示第二防护数据,提供给未通过身份确认的使用者3进行阅览或使用。Next, when the user 3 finishes inputting the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key , the reversible file protection device 11 will move the confidential content, the file confidential content and the second protected data in the protected data area from the self-defined area through the file protection program, so as to restore unprotected data; otherwise, when the user 3 When the input identity confirmation data does not match the identity authentication key, the reversible file protection device 11 will display the second protection data and provide it to the user 3 who has not passed the identity verification for viewing or use.
更进一步,上述的第一实施例或第二实施例更可于可还原式文件保护装置11于产生该第一防护数据或第二防护数据后,由文件提供者2设定一文件管控规则,令该可还原式文件保护装置11根据该文件管控规则,禁止列印文件、禁止复制文件、禁止编辑文件、设定文件的使用期限、设定文件的使用次数以及使用时间、于文件显示浮水印或于文件中自动添加文字。Furthermore, in the above-mentioned first embodiment or second embodiment, after the reversible file protection device 11 generates the first protection data or the second protection data, the file provider 2 can set a file control rule, Make the reversible file protection device 11 prohibit printing files, prohibit copying files, prohibit editing files, set the use period of files, set the number of times and use time of files, and display watermarks on files according to the file control rules. Or add text automatically in the file.
举例而言,请参考图3,图3是本发明第一实施例举例示意图。文件提供者2操作可还原式文件保护装置11,可还原式文件保护装置11将根据文件提供者的操作显示文件,而文件的文件格式于设计时,为提供使用者具有后续扩充功能的效果,因此,文件具有防护数据区21以及一自定义区22,而防护数据区21储存一未防护数据311。For example, please refer to FIG. 3 , which is an exemplary schematic diagram of the first embodiment of the present invention. The file provider 2 operates the reversible file protection device 11, and the reversible file protection device 11 will display files according to the operation of the file provider, and the file format of the file is designed to provide users with the effect of subsequent expansion functions. Therefore, the file has a protected data area 21 and a custom area 22 , and the protected data area 21 stores an unprotected data 311 .
接着,文件提供者2通过可还原式文件保护装置11,开启文件保护程序,于开启文件保护程序后,文件提供者2根据未防护数据311,设定一保密内容(如:“安”“护”),当文件提供者设定完保密内容(如:“安”“护”)后,进一步,设定一保密内容保护模式(如:隐藏模式)。接着,根据该保密内容保护模式(如:隐藏模式),将保密内容(如:“安”“护”)搬移至该自定义区22,且将已搬移该保密内容(如:“安”“护”)的未防护数据311储存至该防护数据区21,以取代未防护数据311,使产生一第一防护数据312,于第一防护数据312产生后,文件提供者2经由可还原式文件保护装置11输入一身份认证密钥,以对保密内容(如:“安”“护”)进行加密。Then, the file provider 2 opens the file protection program through the reversible file protection device 11. After opening the file protection program, the file provider 2 sets a secret content (such as: "security" and "protection") according to the unprotected data 311. "), after the file provider has set the confidential content (such as: "security" and "protection"), further, set a confidential content protection mode (such as: hidden mode). Then, according to the secret content protection mode (such as: hidden mode), the secret content (such as: "safety" and "protection") is moved to the self-defined area 22, and the secret content (such as: "safety" "" protection") unprotected data 311 is stored in the protected data area 21 to replace the unprotected data 311, so that a first protected data 312 is generated. After the first protected data 312 is generated, the file provider 2 passes the reversible The protection device 11 inputs an identity authentication key to encrypt the confidential content (such as: "security" and "protection").
更进一步,文件提供者2经由网际网络或移动式储存媒介,将文件传递给使用者3,由于文件提供者2是根据使用者3所能阅览或使用的权限,对未防护数据311进行设定保密内容,当保密内容设定后,将产生第一防护数据312,因此,当使用者3接获文件后,仅能阅览或使用第一防护数据312,若使用者3欲进一步阅览或使用文件311,须送出控制信号,以开启未防护数据311,而可还原式文件保护装置11接收到控制信号后,将要求使用者3输入身份确认数据。Furthermore, the file provider 2 transmits the file to the user 3 via the Internet or a removable storage medium, because the file provider 2 sets the unprotected data 311 according to the permission that the user 3 can read or use Confidential content, when the confidential content is set, the first protected data 312 will be generated. Therefore, when the user 3 receives the file, he can only read or use the first protected data 312. If the user 3 wants to further read or use the file 311 , a control signal must be sent to open the unprotected data 311 , and the reversible file protection device 11 will require the user 3 to input identity confirmation data after receiving the control signal.
接着,当使用者3输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符,可还原式文件保护装置11将通过该文件保护程序,自该自定义区22搬移保密内容(如:“安”“护”)与防护数据区21的第一防护数据312,以还原为未防护数据311,反之,当使用者3输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥不相符时,可还原式文件保护装置11将显示第一防护数据312。Next, when the user 3 finishes inputting the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key , the reversible file protection device 11 will move the confidential content (such as: "safety" and "protection") and the first protection data 312 of the protection data area 21 from the self-defined area 22 through the file protection program, so as to restore the original protection data 311, on the contrary, when the user 3 has input the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data and the identity When the authentication keys do not match, the reversible file protection device 11 will display the first protection data 312 .
再举一例,请参考图4,图4是本发明第二实施例举例示意图。可还原式文件保护装置11与服务器12建立连结后,管理者4将经由服务器12设定文件共用保护规则411后,并将文件共用保护规则411传送至可还原式文件保护装置11中进行储存,而该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式,文件提供者2操作可还原式文件保护装置11,可还原式文件保护装置11将根据文件提供者2的操作显示文件,而文件的文件格式于设计时,为提供使用者具有后续扩充功能的效果,因此,文件具有防护数据区21以及一自定义区22,而防护数据区21储存一未防护数据311。For another example, please refer to FIG. 4 , which is a schematic diagram of a second embodiment of the present invention. After the reversible file protection device 11 establishes a connection with the server 12, the administrator 4 will set the file sharing protection rule 411 via the server 12, and transmit the file sharing protection rule 411 to the reversible file protection device 11 for storage. And this file sharing protection rule has a file confidential content and a file confidential content protection mode, the file provider 2 operates the reversible file protection device 11, and the reversible file protection device 11 will display the file according to the operation of the file provider 2, The file format of the file is designed to provide users with the effect of subsequent expansion functions. Therefore, the file has a protected data area 21 and a custom area 22 , and the protected data area 21 stores an unprotected data 311 .
接者,文件提供者2通过可还原式文件保护装置11,开启文件保护程序,于开启文件保护程序后,文件提供者2根据未防护数据311,设定一保密内容(如:“资安防护系统”),当文件提供者设定完保密内容(如:“资安防护系统”)后,进一步,设定一保密内容保护模式(如:遮蔽模式)。接着,根据该保密内容保护模式(如:遮蔽模式),可还原式文件保护装置11将保密内容(如:“资安防护系统”)搬移至该自定义区22,以替代性内容(如:“*”)取代该未防护数据的该保密内容(如:“资安防护系统”),并将已搬移该保密内容(如:“资安防护系统”)的该未防护数据储存至该防护数据区21,以取代该未防护数据,使产生一第一防护数据312,进一步,文件提供者2设定该文件共用保护规则411,可还原式保护装置11将根据该文件共用保护规则411的文件保密内容(如:“英威康”),对该第一防护数据312设定该文件保密内容(如:“英威康”)。Then, the file provider 2 opens the file protection program through the reversible file protection device 11. After opening the file protection program, the file provider 2 sets a confidential content (such as: "Information Security Protection") according to the unprotected data 311. system"), after the file provider sets up the confidential content (such as: "information security protection system"), further, set a confidential content protection mode (such as: masking mode). Then, according to the confidential content protection mode (such as: masking mode), the reversible file protection device 11 moves the confidential content (such as: "information security protection system") to the self-defined area 22 to replace the content (such as: "*") replaces the confidential content of the unprotected data (such as "information security protection system"), and stores the unprotected data that has moved the confidential content (such as "information security protection system") into the protected Data area 21, to replace the unprotected data, so that a first protected data 312 is generated. Further, the file provider 2 sets the file sharing protection rule 411, and the reversible protection device 11 will be based on the file sharing protection rule 411. For the confidential content of the file (such as "Invik"), set the confidential content of the file (such as "Invik") to the first protection data 312 .
接着,于设定完文件保密内容(如:“英威康”),可还原式文件保护装置11将根据文件保密内容保护模式(如:遮蔽模式),将文件保密内容(如:“英威康”)搬移至该自定义区22(此时该自定义区22包含有“资安防护系统”以及“英威康”),以一替代性内容(如:“*”)取代该第一防护数据312的该文件保密内容(如:“英威康”),并将替代性内容(如:“*”)取代的该第一防护数据312储存至该防护数据区21,以取代第一防护数据312,使产生一第二防护数据313,于第二防护数据313产生后,文件提供者2输入一身份认证密钥,以对文件保密内容(如:“英威康”)以及保密内容(如:“资安防护系统”)进行加密。Then, after setting the confidential content of the file (such as: "Invik"), the reversible file protection device 11 will set the confidential content of the file (such as: "Invik") according to the protection mode (such as: masking mode) ) to the self-defining area 22 (the self-defining area 22 now contains "Information Security Protection System" and "Invikon"), and replaces the first protection data 312 with an alternative content (such as: "*") The confidential content of the file (such as: "Invik"), and the first protection data 312 replaced by the alternative content (such as: "*") is stored in the protection data area 21 to replace the first protection data 312, A second protection data 313 is generated. After the second protection data 313 is generated, the file provider 2 inputs an identity authentication key to keep the confidential content of the file (such as: "Invik") and the confidential content (such as: "data security system") to encrypt.
更进一步,文件提供者2经由网际网络或移动式储存媒介,将文件传递给使用者3,当使用者3接获文件后,仅能阅览或使用第二防护数据313,若使用者欲进一步阅览或使用文件311,进一步,送出控制信号,以开启该未防护数据311,而可还原式文件保护装置11接收到控制信号后,将要求使用者3输入身份确认数据。Furthermore, the file provider 2 transmits the file to the user 3 via the Internet or a removable storage medium. After receiving the file, the user 3 can only view or use the second protected data 313. If the user wants to view further Or use the file 311, further, send a control signal to open the unprotected data 311, and the reversible file protection device 11 will require the user 3 to input identity confirmation data after receiving the control signal.
接着,当使用者3输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符,可还原式文件保护装置11将通过该文件保护程序,从该自定义区22搬移文件保密内容(如:“英威康”)以及保密内容(如:“资安防护系统”)与防护数据区21的第二防护数据313,以还原为未防护数据311,反之,当使用者2输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥不相符时,可还原式文件保护装置11将显示第二防护数据313。Next, when the user 3 finishes inputting the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key , the reversible file protection device 11 will move the confidential content of the file (such as: "Invikon") and the confidential content (such as: "information security protection system") and the protected data area from the self-defined area 22 through the file protection program 21 of the second protected data 313 to be restored to the unprotected data 311, on the contrary, after the user 2 has input the identity confirmation data, the reversible file protection device 11 will combine the identity confirmation data with the identity authentication key according to the identity confirmation data After comparison, when the identity confirmation data does not match the identity authentication key, the reversible file protection device 11 will display the second protection data 313 .
更进一步,请参考图5,图5是本发明第三实施例示意图。可还原式文件保护装置11与服务器12建立连结后,将自服务器12接收管理者4设定的文件共用保护规则411,并将文件共用保护规则411储存至可还原式文件保护装置11。首先,文件提供者2操作可还原式文件保护装置11,可还原式文件保护装置11将根据文件提供者2的操作显示文件,而文件的文件格式于设计时,为提供使用者具有后续扩充功能的效果,因此,文件具有防护数据区21以及一自定义区22,而防护数据区21储存有一未防护数据311。Further, please refer to FIG. 5 , which is a schematic diagram of a third embodiment of the present invention. After establishing a connection with the server 12 , the recoverable file protection device 11 receives the file sharing protection rules 411 set by the administrator 4 from the server 12 and stores the file sharing protection rules 411 in the recoverable file protection device 11 . Firstly, the file provider 2 operates the reversible file protection device 11, and the reversible file protection device 11 will display files according to the operation of the file provider 2, and the file format of the file is designed to provide users with subsequent expansion functions Therefore, the file has a protected data area 21 and a custom area 22, and the protected data area 21 stores an unprotected data 311.
接着,文件提供者2通过可还原式文件保护装置11,开启文件保护程序,于开启文件保护程序后,文件提供者2选择文件共用保护规则411。接着,于选择文件共用保护规则411后,可还原式保护装置11将根据该文件共用保护规则411,对未防护数据311中的数据设定一文件保密内容(如统一编号的号码:12345678)和一文件保密内容保护模式。接着,可还原式文件保护装置11根据文件保密内容保护模式(如:隐藏模式),将文件保密内容(如统一编号的号码:12345678)搬移至该自定义区22,且将已搬移文件保密内容的未防护数据311储存至防护数据区21,以取代该未防护数据,使产生一第一防护数据312,于第一防护数据312产生后,文件提供者2通过可还原式文件保护装置11输入一身份认证密钥,以对文件保密内容进行加密。Next, the file provider 2 starts the file protection program through the reversible file protection device 11 , and after starting the file protection program, the file provider 2 selects the file sharing protection rule 411 . Then, after selecting the file sharing protection rule 411, the reversible protection device 11 will set a file security content (such as the number of the unified number: 12345678) and A file confidential content protection mode. Then, the reversible file protection device 11 moves the confidential content of the file (such as the number of the unified number: 12345678) to the self-defined area 22 according to the protection mode of the confidential content of the file (such as: hidden mode), and transfers the confidential content of the file The unprotected data 311 is stored in the protected data area 21 to replace the unprotected data, so that a first protected data 312 is generated. After the first protected data 312 is generated, the file provider 2 inputs it through the reversible file protection device 11 An identity authentication key to encrypt the confidential content of the file.
更者,上述实施例亦可于设定文件保密内容保护模式后,可还原式文件保护装置11根据该文件保密内容保护模式,将文件保密内容搬移至自定义区22,且搬移该文件保密内容后,以一替代性内容取代该未防护数据的文件保密内容的位置,并将替代性内容取代的该未防护数据储存至该防护数据区21,以取代该未防护数据,使产生该第一防护数据。What's more, in the above embodiment, after setting the file confidential content protection mode, the reversible file protection device 11 can move the file confidential content to the user-defined area 22 according to the file confidential content protection mode, and move the file confidential content Afterwards, replace the position of the confidential content of the file of the unprotected data with an alternative content, and store the unprotected data replaced by the alternative content in the protected data area 21 to replace the unprotected data, so that the first Protection data.
另外,亦可于设定完文件保密内容保护模式后,可还原式文件保护装置11根据文件保密内容保护模式,先对该文件保密内容进行复制,以产生另一文件保密内容,随后,将复制的文件保密内容搬移至该自定义区22,且搬移该文件保密内容后,以一替代性内容取代该未防护数据的文件保密内容,并将替代性内容取代的该未防护数据储存至该防护数据区21,以取代该未防护数据,使产生该第一防护数据。In addition, after setting the file security content protection mode, the reversible file protection device 11 first copies the file security content according to the file security content protection mode to generate another file security content, and then copies The confidential content of the file is moved to the custom area 22, and after the confidential content of the file is moved, the confidential content of the file of the unprotected data is replaced by an alternative content, and the unprotected data replaced by the alternative content is stored in the protected The data area 21 is used to replace the unprotected data to generate the first protected data.
更进一步,文件提供者2经由网际网络或移动式储存媒介,将文件传递给使用者3,由于文件提供者2是根据使用者3所能阅览或使用的权限,对未防护数据311进行防护后,将产生第一防护数据312,因此,当使用者3接获文件后,仅能阅览或使用第一防护数据312,若使用者3欲进一步阅览或使用文件,进一步,送出控制信号,以开启该未防护数据,而可还原式文件保护装置11接收到控制信号后,将要求使用者3通过可还原式文件保护装置11输入身份确认数据。Furthermore, the file provider 2 transmits the file to the user 3 via the Internet or a removable storage medium. Since the file provider 2 protects the unprotected data 311 according to the authority that the user 3 can read or use , will generate the first protection data 312, therefore, when the user 3 receives the file, he can only read or use the first protection data 312, if the user 3 wants to further read or use the file, further, send a control signal to open The unprotected data, after receiving the control signal, the reversible file protection device 11 will require the user 3 to input identity confirmation data through the reversible file protection device 11 .
接着,当使用者3输入完身份确认数据后,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符,可还原式文件保护装置11将通过该文件保护程序,自该自定义区搬移文件保密内容与防护数据区的第一防护数据312,以还原为未防护数据311,反之,当使用者3输入完身份确认数据,可还原式文件保护装置11根据身份确认数据,将身份确认数据与身份认证密钥进行比对,当该身份确认数据与该身份认证密钥不相符时,可还原式文件保护装置11将显示第一防护数据312。Next, when the user 3 finishes inputting the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key , the reversible file protection device 11 will move the confidential content of the file and the first protected data 312 in the protected data area from the self-defined area through the file protection program to restore the unprotected data 311; otherwise, when the user 3 inputs After completing the identity confirmation data, the reversible file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data. When the identity confirmation data does not match the identity authentication key, the reversible file protection The device 11 will display the first protection data 312 .
上述实施例,该可还原式文件保护装置11将该文件保密内容搬移至该自定义区后,以一替代性内容取代该未防护数据的该文件保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生该第一防护数据。In the above embodiment, after the reversible file protection device 11 moves the confidential content of the file to the self-defined area, replaces the confidential content of the file of the unprotected data with a substitute content, and replaces the secure content of the file with the substitute content. Unprotected data is stored in the protected data area to replace the unprotected data to generate the first protected data.
再者,本发明的可还原式文件保护方法,请参考图6,图6是前述本发明第一实施例的可还原式文件保护方法流程图,用以执行下列步骤:Furthermore, please refer to FIG. 6 for the reversible file protection method of the present invention. FIG. 6 is a flow chart of the reversible file protection method according to the first embodiment of the present invention, which is used to perform the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据(S611);Make a file have a protected data area and a custom area, and store an unprotected data in the protected data area (S611);
开启一文件保护程序(S612);Open a file protection program (S612);
对该未防护数据设定一保密内容(S613);Setting a confidentiality content for the unprotected data (S613);
于设定该保密内容后,设定一保密内容保护模式(S614);After setting the secret content, set a secret content protection mode (S614);
根据该保密内容保护模式,将该保密内容搬移至该自定义区(S615);Move the confidential content to the custom area according to the confidential content protection mode (S615);
将已搬移该保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据(S616);storing the unprotected data that has moved the confidential content into the protected data area to replace the unprotected data, so as to generate a first protected data (S616);
输入一身份认证密钥对该保密内容进行加密(S617);Entering an identity authentication key to encrypt the confidential content (S617);
其中,当接收一控制信号,以开启该文件时,要求输入一身份确认数据(S618);Wherein, when receiving a control signal to open the file, it is required to input an identity confirmation data (S618);
当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序自该自定义区搬移该保密内容与该防护数据区的该第一防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第一防护数据(S619)。When the identity confirmation data matches the identity authentication key, move the confidential content and the first protected data in the protected data area from the custom area through the file protection program to restore the unprotected data, and when the file protection program When the identity confirmation data does not match the identity authentication key, the first protection data is displayed (S619).
另外,请参考图7,图7是前述本发明第一实施例的可还原式文件保护方法另一流程图,用以执行下列步骤:In addition, please refer to FIG. 7. FIG. 7 is another flow chart of the aforementioned reversible file protection method according to the first embodiment of the present invention, which is used to perform the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据(S711);Make a file have a protected data area and a custom area, and store an unprotected data in the protected data area (S711);
开启一文件保护程序(S712);Open a file protection program (S712);
对该未防护数据设定一保密内容(S713);Setting a confidentiality content for the unprotected data (S713);
于设定该保密内容后,设定一保密内容保护模式(S714);After setting the secret content, set a secret content protection mode (S714);
根据该保密内容保护模式,将该保密内容搬移至该自定义区(S715);Move the confidential content to the custom area according to the confidential content protection mode (S715);
以一替代性内容取代该未防护数据的该保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据(S716);replacing the confidential content of the unprotected data with an alternative content, and storing the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data, so that a first protected data is generated (S716 );
输入一身份认证密钥对该保密内容进行加密(S717);Entering an identity authentication key to encrypt the confidential content (S717);
其中,当接收一控制信号,以开启该文件时,要求输入一身份确认数据(S718);Wherein, when receiving a control signal to open the file, it is required to input an identity confirmation data (S718);
当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序自该自定义区搬移该保密内容与该防护数据区的该第一防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第一防护数据(S719)。When the identity confirmation data matches the identity authentication key, move the confidential content and the first protected data in the protected data area from the custom area through the file protection program to restore the unprotected data, and when the file protection program When the identity confirmation data does not match the identity authentication key, the first protection data is displayed (S719).
另外,请参考图8,图8是前述本发明第一实施例的可还原式文件保护方法另一流程图,用以执行下列步骤:In addition, please refer to FIG. 8 . FIG. 8 is another flow chart of the aforementioned reversible file protection method according to the first embodiment of the present invention, which is used to perform the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据(S811);Make a file have a protected data area and a custom area, and store an unprotected data in the protected data area (S811);
开启一文件保护程序(S812);Open a file protection program (S812);
对该未防护数据设定一保密内容,且将该保密内容进行复制(S813);Setting a confidential content for the unprotected data, and copying the confidential content (S813);
于设定该保密内容后,设定一保密内容保护模式(S814);After setting the secret content, set a secret content protection mode (S814);
根据该保密内容保护模式,将复制的该保密内容搬移至该自定义区(S815);According to the confidential content protection mode, move the copied confidential content to the custom area (S815);
以一替代性内容取代该未防护数据的该保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据(S816);replacing the confidential content of the unprotected data with an alternative content, and storing the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data, so that a first protected data is generated (S816 );
输入一身份认证密钥对该保密内容进行加密(S817);Entering an identity authentication key to encrypt the confidential content (S817);
其中,当接收一控制信号,以开启该文件时,要求输入一身份确认数据(S818);Wherein, when receiving a control signal to open the file, it is required to input an identity confirmation data (S818);
当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序自该自定义区搬移该保密内容与该防护数据区的该第一防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第一防护数据(S819)。When the identity confirmation data matches the identity authentication key, move the confidential content and the first protected data in the protected data area from the custom area through the file protection program to restore the unprotected data, and when the file protection program When the identity confirmation data does not match the identity authentication key, display the first protection data (S819).
另外,请参考图9,图9是前述本发明第二实施例的可还原式文件保护方法流程图,用以执行下列步骤:In addition, please refer to FIG. 9. FIG. 9 is a flow chart of the aforementioned reversible file protection method according to the second embodiment of the present invention, which is used to perform the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据(S911);Make a file have a protected data area and a custom area, and store an unprotected data in the protected data area (S911);
开启一文件保护程序(S912);Open a file protection program (S912);
对该未防护数据设定一保密内容(S913);Setting a confidentiality content for the unprotected data (S913);
于设定该保密内容后,设定一保密内容保护模式(S914);After setting the secret content, set a secret content protection mode (S914);
根据该保密内容保护模式,将该保密内容搬移至该自定义区(S915);Move the confidential content to the custom area according to the confidential content protection mode (S915);
将已搬移该保密内容的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据(S916);storing the unprotected data that has moved the confidential content into the protected data area to replace the unprotected data, so as to generate a first protected data (S916);
设定一文件共用保护规则,该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式(S917);Setting a file sharing protection rule, the file sharing protection rule has a file security content and a file security content protection mode (S917);
根据该文件共用保护规则的该文件保密内容,对该第一防护数据设定该文件保密内容(S918);According to the confidential content of the file in the file sharing protection rule, set the confidential content of the file to the first protected data (S918);
根据该文件共用保护规则的该文件保密内容保护模式,将该文件保密内容搬移至该自定义区(S919);Move the confidential content of the file to the self-defined area according to the protection mode of the confidential content of the file in the common protection rule for the file (S919);
将已搬移该文件保密内容的该第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生一第二防护数据(S920);storing the first protected data whose confidential content of the file has been moved to the protected data area, to replace the first protected data, so as to generate a second protected data (S920);
输入一身份认证密钥对该保密内容以及该文件保密内容进行加密(S921);Entering an identity authentication key to encrypt the confidential content and the confidential content of the file (S921);
其中,当接收该控制信号,以开启该文件时,要求输入该身份确认数据(S922);Wherein, when the control signal is received to open the file, the identity confirmation data is required to be input (S922);
根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序,自该自定义区搬移该保密内容、该文件保密内容与该防护数据区的该第二防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第二防护数据(S923)。According to the identity confirmation data, compare the identity confirmation data with the identity authentication key, and when the identity confirmation data matches the identity authentication key, move the confidential content from the self-defined area through the file protection program , the confidential content of the file and the second protected data in the protected data area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, display the second protected data (S923).
请参考图10,图10是前述本发明第二实施例的可还原式文件保护方法另一流程图,用以执行下列步骤:Please refer to FIG. 10. FIG. 10 is another flow chart of the aforementioned reversible file protection method according to the second embodiment of the present invention, which is used to perform the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据(S11001);Make a file have a protected data area and a custom area, and store an unprotected data in the protected data area (S11001);
开启一文件保护程序(S1002);Open a file protection program (S1002);
对该未防护数据设定一保密内容(S1003);Setting a confidentiality content for the unprotected data (S1003);
于设定该保密内容后,设定一保密内容保护模式(S1004);After setting the secret content, set a secret content protection mode (S1004);
根据该保密内容保护模式,将该保密内容搬移至该自定义区(S1005);According to the protection mode of the confidential content, move the confidential content to the self-defined area (S1005);
以一替代性内容取代该未防护数据的该保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据(S1006);replacing the confidential content of the unprotected data with an alternative content, and storing the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data, so that a first protected data is generated (S1006 );
设定一文件共用保护规则,该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式(S1007);Setting a file sharing protection rule, the file sharing protection rule has a file security content and a file security content protection mode (S1007);
根据该文件共用保护规则的该文件保密内容,对该第一防护数据设定该文件保密内容(S1008);According to the confidential content of the file in the file sharing protection rule, set the confidential content of the file to the first protected data (S1008);
根据该文件共用保护规则的该文件保密内容保护模式,将该文件保密内容搬移至该自定义区(S1009);Move the confidential content of the file to the self-defined area according to the protection mode of the confidential content of the file in the common protection rule for the file (S1009);
以替代性内容取代该第一防护数据的该文件保密内容,并将该替代性内容取代的第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生一第二防护数据(S1010);replacing the confidential content of the file of the first protection data with alternative content, and storing the first protection data replaced by the replacement content in the protection data area, so as to replace the first protection data, so as to generate a second protection data (S1010);
输入一身份认证密钥对该保密内容以及该文件保密内容进行加密(S1011);Entering an identity authentication key to encrypt the confidential content and the confidential content of the file (S1011);
其中,当接收该控制信号,以开启该文件时,要求输入该身份确认数据(S1012);Wherein, when the control signal is received to open the file, the identity confirmation data is required to be input (S1012);
根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序,自该自定义区搬移该保密内容、该文件保密内容与该防护数据区的该第二防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第二防护数据(S1013)。According to the identity confirmation data, compare the identity confirmation data with the identity authentication key, and when the identity confirmation data matches the identity authentication key, move the confidential content from the self-defined area through the file protection program , the confidential content of the file and the second protected data in the protected data area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, display the second protected data (S1013).
请参考图11,图11是前述本发明第二实施例的可还原式文件保护方法另一流程图,用以执行下列步骤:Please refer to FIG. 11. FIG. 11 is another flow chart of the aforementioned reversible file protection method according to the second embodiment of the present invention, which is used to perform the following steps:
令一文件中具有一防护数据区及一自定义区,且该防护数据区储存一未防护数据(S1101);Make a file have a protected data area and a custom area, and store an unprotected data in the protected data area (S1101);
开启一文件保护程序(S1102);Open a file protection program (S1102);
对该未防护数据设定一保密内容(S1103);Setting a confidentiality content for the unprotected data (S1103);
于设定该保密内容后,设定一保密内容保护模式(S1104);After setting the secret content, set a secret content protection mode (S1104);
根据该保密内容保护模式,将该保密内容搬移至该自定义区(S1105);According to the protection mode of the confidential content, move the confidential content to the self-defined area (S1105);
以一替代性内容取代该未防护数据的该保密内容,并将该替代性内容取代的该未防护数据储存至该防护数据区,以取代该未防护数据,使产生一第一防护数据(S1106);replacing the confidential content of the unprotected data with an alternative content, and storing the unprotected data replaced by the alternative content in the protected data area to replace the unprotected data, so that a first protected data is generated (S1106 );
设定一文件共用保护规则,该文件共用保护规则具有一文件保密内容以及一文件保密内容保护模式(S1107);Setting a file sharing protection rule, the file sharing protection rule has a file security content and a file security content protection mode (S1107);
根据该文件共用保护规则的该文件保密内容,对该第一防护数据设定该文件保密内容(S1108);According to the confidential content of the file in the file sharing protection rule, set the confidential content of the file to the first protected data (S1108);
根据该文件共用保护规则的该文件保密内容保护模式,将该文件保密内容进行复制,且将复制的该文件保密内容搬移至该自定义区(S1109);Copying the confidential content of the file according to the protection mode of the confidential content of the file in the file sharing protection rule, and moving the confidential content of the copied file to the self-defined area (S1109);
以替代性内容取代该第一防护数据的该文件保密内容,并将该替代性内容取代的第一防护数据储存至该防护数据区,以取代该第一防护数据,使产生一第二防护数据(S1110);replacing the confidential content of the file of the first protection data with alternative content, and storing the first protection data replaced by the replacement content in the protection data area, so as to replace the first protection data, so as to generate a second protection data (S1110);
输入一身份认证密钥对该保密内容以及该文件保密内容进行加密(S1111);Entering an identity authentication key to encrypt the confidential content and the confidential content of the file (S1111);
其中,当接收该控制信号,以开启该文件时,要求输入该身份确认数据(S1112);Wherein, when the control signal is received to open the file, the identity confirmation data is required to be input (S1112);
根据该身份确认数据,将该身份确认数据与该身份认证密钥进行比对,当该身份确认数据与该身份认证密钥相符时,通过该文件保护程序,自该自定义区搬移该保密内容、该文件保密内容与该防护数据区的该第二防护数据,以还原该未防护数据,而当该身份确认数据与该身份认证密钥不相符时,显示该第二防护数据(S1113)。According to the identity confirmation data, compare the identity confirmation data with the identity authentication key, and when the identity confirmation data matches the identity authentication key, move the confidential content from the self-defined area through the file protection program , the confidential content of the file and the second protected data in the protected data area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, display the second protected data (S1113).
以上所述仅是本发明的较佳实施例而已,并非对本发明做任何形式上的限制,虽然本发明已以较佳实施例揭露如上,然而并非用以限定本发明,任何本领域技术人员,在不脱离本发明技术方案的范围内,当可利用上述揭示的技术内容作出些许更动或修饰为等同变化的等效实施例,但凡是未脱离本发明技术方案的内容,依据本发明的技术实质对以上实施例所作的任何简单修改、等同变化与修饰,均仍属于本发明技术方案的范围内。The above description is only a preferred embodiment of the present invention, and does not limit the present invention in any form. Although the present invention has been disclosed as above with preferred embodiments, it is not intended to limit the present invention. Any person skilled in the art, Within the scope of not departing from the technical solution of the present invention, when the technical content disclosed above can be used to make some changes or be modified into equivalent embodiments with equivalent changes, but all the content that does not depart from the technical solution of the present invention, according to the technical content of the present invention In essence, any simple modifications, equivalent changes and modifications made to the above embodiments still fall within the scope of the technical solution of the present invention.
Claims (22)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510537535.7A CN105160271B (en) | 2015-08-28 | 2015-08-28 | Reducible file protection device control method and reducible file protection method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510537535.7A CN105160271B (en) | 2015-08-28 | 2015-08-28 | Reducible file protection device control method and reducible file protection method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN105160271A CN105160271A (en) | 2015-12-16 |
| CN105160271B true CN105160271B (en) | 2017-11-10 |
Family
ID=54801123
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510537535.7A Active CN105160271B (en) | 2015-08-28 | 2015-08-28 | Reducible file protection device control method and reducible file protection method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN105160271B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108564207B (en) * | 2018-03-30 | 2021-05-18 | 合肥工业大学 | BIM-based construction engineering intelligent bidding decision management system |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101533654A (en) * | 2008-03-14 | 2009-09-16 | 株式会社东芝 | Apparatus, method, and computer program product for processing information |
| CN101859359A (en) * | 2009-04-08 | 2010-10-13 | 黄金富 | Secret treatment method and software for dividing file contents in to two parts, and decryption reader |
| CN103198261A (en) * | 2012-01-09 | 2013-07-10 | 鸿富锦精密工业(深圳)有限公司 | Method and system for protecting file content security |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| NZ533176A (en) * | 2001-12-25 | 2005-10-28 | Ntt Docomo Inc | Device and method for restricting content access and storage |
| KR101859646B1 (en) * | 2011-12-16 | 2018-05-18 | 삼성전자주식회사 | Secure data protecting memory device, data protecting method using the secure data |
| US9161095B2 (en) * | 2013-02-22 | 2015-10-13 | Arris Technology, Inc. | Extending blackout control |
-
2015
- 2015-08-28 CN CN201510537535.7A patent/CN105160271B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101533654A (en) * | 2008-03-14 | 2009-09-16 | 株式会社东芝 | Apparatus, method, and computer program product for processing information |
| CN101859359A (en) * | 2009-04-08 | 2010-10-13 | 黄金富 | Secret treatment method and software for dividing file contents in to two parts, and decryption reader |
| CN103198261A (en) * | 2012-01-09 | 2013-07-10 | 鸿富锦精密工业(深圳)有限公司 | Method and system for protecting file content security |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105160271A (en) | 2015-12-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20150350278A1 (en) | Secure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system | |
| US20100043070A1 (en) | File-access control apparatus and program | |
| KR102227525B1 (en) | Document creation system using augmented reality and virtual reality and method for processing thereof | |
| CA3091874C (en) | Method for controlling reproduction of an item | |
| JP2010538349A (en) | Digital copyright management method for compressed files | |
| CN101833625A (en) | File and folder safety protection method based on dynamic password and system thereof | |
| KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
| CN105160271B (en) | Reducible file protection device control method and reducible file protection method | |
| JP4662138B2 (en) | Information leakage prevention method and system | |
| KR20170050482A (en) | Apparatus, system, and method for 3d-printing-contents protection | |
| JP5631251B2 (en) | Information leakage prevention method | |
| US11386196B1 (en) | Content wallet device and self-sovereign identity and copyright authentication system using the same | |
| JP3984951B2 (en) | Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium | |
| TWI559170B (en) | The control method of the rewritable file protection device, and the method of reducing the file protection | |
| JP2007108833A (en) | Device for storing a plurality of passwords and password management method | |
| CN101794260A (en) | Automatically imported method of encryption key for mobile storage device | |
| JP4192738B2 (en) | Electronic document editing device, electronic document editing program | |
| WO2010134517A1 (en) | System for browsing or viewing/listening to the contents of removable memory media | |
| JP7012927B2 (en) | File management methods, systems, terminals and programs | |
| WO2006118101A1 (en) | Confidential information processing host device and confidential information processing method | |
| JP2006164096A (en) | Encrypted data access control method | |
| JP2006018335A (en) | Content storage preparation method, content storage method, content use method, terminal system, and storage medium connectable terminal device | |
| JP5635639B2 (en) | File security system | |
| JP2006011916A (en) | Network calibration method for compilations | |
| JP6707499B2 (en) | Information processing apparatus, information processing system, program, recording medium, and information processing method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |