KR20100018188A - Method for performing lock-setting on a file and terminal implementing the method - Google Patents
Method for performing lock-setting on a file and terminal implementing the method Download PDFInfo
- Publication number
- KR20100018188A KR20100018188A KR1020080076848A KR20080076848A KR20100018188A KR 20100018188 A KR20100018188 A KR 20100018188A KR 1020080076848 A KR1020080076848 A KR 1020080076848A KR 20080076848 A KR20080076848 A KR 20080076848A KR 20100018188 A KR20100018188 A KR 20100018188A
- Authority
- KR
- South Korea
- Prior art keywords
- file
- fat
- terminal
- lock
- attribute field
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Abstract
Description
The present invention relates to a method for locking a file and a terminal for performing the same.
Recently, embedded terminals such as mobile phones or MP3 players provide various additional functions in addition to communication functions or music playback functions which are unique to each other.
For example, the embedded terminal may store an image file or a text file and provide a viewer function to view the image file or the text file. As a result, someone other than the owner of these devices can view image files, video files, or text files stored on the device.
In order to prevent access to a file stored in the embedded terminal by another person, the embedded terminal provides a lock setting function to allow access to the file only when a predetermined password is input to the image file or the text file. Accordingly, in order to access a locked file in the embedded terminal, the user of the embedded terminal had to enter a password.
To this end, when a file is locked, a method of indicating whether the file is locked or not is displayed in a specific area of the file. For example, whether or not to lock the file is indicated by predefining a mark using the EXIF area of the JPEG file as the image file.
However, if you use this method to indicate whether the JPEG file is directly locked, the mobile device opens the file each time to check whether the file is locked, and searches the EXIF area to determine whether there is a specific bit pattern. The processing of the steps had to be carried out. For example, if you execute the photo album function, a list of photo files stored in the current album directory will be displayed, and there will be a need to distinguish and display files that are not locked.
For example, if you display a thumbnail list, the locked file must be handled differently depending on whether or not the lock is set, such as showing a lock icon instead of a thumbnail. As the number of files increases, the processing speed becomes an important problem. It is difficult to expect a fast process by directly locking the file using the EXIF area.
An object of the present invention for solving the above problems is to provide a file lock setting method that can facilitate the lock setting of the file in the terminal and a terminal for performing the same.
One embodiment of the present invention for achieving the above object is, a memory for storing a file (File Allocation Table) directory entry for each of the files and files, and when a lock setting for the file is selected when the file is stored, It provides a terminal including a control unit for displaying whether or not to lock the file in the file attribute field of the FAT directory entry associated with the file.
Here, the controller may indicate whether to lock the file by using a reserved bit of the file attribute field.
Here, the reserved bit may be the most significant bit of the file attribute field.
Here, when the lock setting for the file is selected, the controller may receive a password related to the file from the user.
Here, when access to the locked file occurs, the controller may request a user to input a password related to the file.
Here, the file may include an image file, a video file, a text file, and a sound file.
Another embodiment of the present invention for achieving the above object is, when storing a file in the terminal, determining whether the lock setting for the file is selected, and if the lock setting for the file is selected, And indicating whether to lock the file in a file attribute field of a file directory allocation (FAT) directory entry.
Here, whether to lock the file may be indicated by using a reserved bit of the file attribute field.
Here, the reserved bit may be the most significant bit of the file attribute field.
The file lock setting method may further include receiving a password related to the file from a user when a lock setting for the file is selected.
The file lock setting method may further include requesting a user to input a password related to the file when access to the locked file occurs.
Here, the file may include an image file, a video file, a text file, and a sound file.
According to the present invention as described above, it is possible to lock the file without changing the contents of the file because the terminal indicates whether to lock the file using the attribute field of the directory entry of the FAT. Accordingly, when the terminal accesses the locked file, the terminal can break the lock on the file without opening each file, and thus the time for reading the lock is shorter than in the conventional technology.
Further, according to the present invention, even if the terminal is connected to an external device such as a PC, since the contents of the existing FAT directory entry are not changed, the PC can access the files stored in the terminal without any obstacle. .
As the invention allows for various changes and numerous embodiments, particular embodiments will be illustrated in the drawings and described in detail in the written description. However, this is not intended to limit the present invention to specific embodiments, it should be understood to include all modifications, equivalents, and substitutes included in the spirit and scope of the present invention. Like reference numerals are used for like elements in describing each drawing.
Terms such as first, second, A, and B may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component. The term and / or includes a combination of a plurality of related items or any item of a plurality of related items.
When a component is referred to as being "connected" or "connected" to another component, it may be directly connected to or connected to that other component, but it may be understood that other components may be present in between. Should be. On the other hand, when a component is said to be "directly connected" or "directly connected" to another component, it should be understood that no other component exists in the middle.
The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting of the present invention. Singular expressions include plural expressions unless the context clearly indicates otherwise. In this application, the terms "comprise" or "have" are intended to indicate that there is a feature, number, step, operation, component, part, or combination thereof described in the specification, and one or more other features. It is to be understood that the present invention does not exclude the possibility of the presence or the addition of numbers, steps, operations, components, components, or a combination thereof.
Unless defined otherwise, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art. Terms such as those defined in the commonly used dictionaries should be construed as having meanings consistent with the meanings in the context of the related art and shall not be construed in ideal or excessively formal meanings unless expressly defined in this application. Do not.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Embedded terminals, such as mobile phones and MP3 players, use FAT instead of their own format when considering file system compatibility. Here, FAT (File Allocation Table) refers to an area for recording location information and the like of a file stored in a memory in a file system.
For example, when an embedded terminal copies files from a PC, copies files after connecting to a removable storage device via USB, or uses an external storage medium such as an SD card, the format method is to maintain compatibility using FAT. It is common.
The FAT uses information called a directory entry to manage each file. The information includes a file name, a creation time, and status information. One-byte attribute field of these fields is used to record the state of the file as read only, system, hidden, etc.
The embedded terminal according to the present invention indicates whether a corresponding file is locked using a bit not used in the attribute field of the FAT directory entry.
Hereinafter, the configuration of the embedded terminal according to the present invention will be described with reference to FIG.
1 is a block diagram showing the configuration of an embedded terminal according to an embodiment of the present invention.
Referring to FIG. 1, the embedded
The
The
Specifically, the
The
In addition, a directory entry is recorded in association with each cluster of the
2 shows the structure of a FAT directory entry.
Referring to FIG. 2, the
The present invention indicates whether to lock a file by using a field (hereinafter, referred to as a file attribute field) 303 for storing file attributes among the fields constituting the
3 is a diagram illustrating the structure of a general file attribute field.
Referring to FIG. 3, the
In addition, the upper two
As described above, the FAT indicates the file attribute by using each bit of each 1-byte attribute field, but the upper two
That is, since the embedded
Therefore, even if the embedded terminal is masked and used, the Windows operating system of the PC does not even inquire this area anyway when the terminal is connected to the PC as a removable disk. This experiment confirmed that there is no problem in marking this area in existing operating systems such as Windows and Linux.
Accordingly, when the
Specifically, when the
Subsequently, when an access occurs to a file stored in the
Accordingly, when an access occurs to a file stored in the
If the file is locked, the
Meanwhile, according to another embodiment of the present invention, when a predetermined file is locked, the predetermined reserved
4 is a flowchart illustrating a method for locking a file according to an embodiment of the present invention.
Referring to FIG. 4, the embedded terminal determines whether a file is stored in
Subsequently, the embedded terminal determines whether to lock the file in
In addition, the embedded terminal may set a lock on the file if a predetermined condition is satisfied. In this case, the password associated with the file may be a password determined by default. For example, the user may determine in advance that the corresponding file is automatically locked when a picture is taken or recorded in the embedded terminal. In this case, the embedded terminal may lock the picture file or the sound file according to the recording.
If the lock setting is selected for the file, the embedded terminal indicates whether the lock is set in the file attribute field of the FAT directory entry in
5 is a flowchart illustrating a method of controlling access to a locked file according to an embodiment of the present invention.
Referring to FIG. 5, the embedded terminal determines whether access to a file stored in the
Specifically, the embedded terminal refers to a predetermined reserved bit of the file attribute field of the FAT directory entry related to the accessed file to determine whether the file is locked. As a result, the embedded terminal checks in
If the predetermined reserved bit of the attribute field of the FAT directory entry of the file is locked, the embedded terminal receives the password from the user in
The embedded terminal then determines whether the password received from the user in
If the password entered from the user is a legitimate password, then access to the file is allowed in
Files locked in the above detailed description include image files, video files, text files, and sound files.
Although described above with reference to a preferred embodiment of the present invention, those skilled in the art will be variously modified and changed within the scope of the invention without departing from the spirit and scope of the invention described in the claims below I can understand that you can.
1 is a block diagram showing the configuration of an embedded terminal according to an embodiment of the present invention.
2 shows the structure of a FAT directory entry.
3 is a diagram illustrating the structure of a general file attribute field.
4 is a flowchart illustrating a method for locking a file according to an embodiment of the present invention.
5 is a flowchart illustrating a method of controlling access to a locked file according to an embodiment of the present invention.
<Explanation of symbols for the main parts of the drawings>
100: embedded terminal
120: control unit
130: FAT
140: memory
150: display unit
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080076848A KR20100018188A (en) | 2008-08-06 | 2008-08-06 | Method for performing lock-setting on a file and terminal implementing the method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080076848A KR20100018188A (en) | 2008-08-06 | 2008-08-06 | Method for performing lock-setting on a file and terminal implementing the method |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20100018188A true KR20100018188A (en) | 2010-02-17 |
Family
ID=42088972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020080076848A KR20100018188A (en) | 2008-08-06 | 2008-08-06 | Method for performing lock-setting on a file and terminal implementing the method |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20100018188A (en) |
-
2008
- 2008-08-06 KR KR1020080076848A patent/KR20100018188A/en not_active Application Discontinuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5530235A (en) | Interactive contents revealing storage device | |
US8239395B2 (en) | Storage device presenting to hosts only files compatible with a defined host capability | |
KR100738172B1 (en) | Electronic device for managing removable storage medium, method and storage medium therefor | |
US7861311B2 (en) | Apparatus and method of managing hidden area | |
EP1942636B1 (en) | System and method for a portable memory device to access and acquire additional memory from a remote location | |
US20030225960A1 (en) | Method for partitioning memory mass storage device | |
US20120265792A1 (en) | Data storage access device | |
US8819315B2 (en) | Storage device with display unit and method of displaying information | |
US20080005531A1 (en) | Data Storage Device | |
JP5558093B2 (en) | Semiconductor device and memory system | |
KR20100018188A (en) | Method for performing lock-setting on a file and terminal implementing the method | |
TWI407327B (en) | Method and system for processing data, and storage device controller | |
JP2005157768A (en) | Method for storing electronic file, implementation device, and processing program | |
JP2006106941A (en) | File synchronization system | |
JP2005109869A (en) | Method for managing encryption key | |
JP2007148566A (en) | Data writing device and data reading device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |