200825741 九、發明說明: 【發明所屬之技術領域】 入齡Π 2有關於Γ種嵌人式#訊儲存裝置及其預先載 力6的、理的方法’特別是有關於經過加密演算法後 加岔的内容,並且盆解宓兩女廿w1 而有其搭載之記憶卡,可透過其 附屬之檢視程式,將數位内、, 円谷開啟亚進行相關作業。 【先前技術】 3科技的快速發展,電腦的普及化,f料也朝著科 ㈣的紙本文書作業’至現今的資料電子 =貧料無須透過紙張來顯示記載。目前的電腦系統, 如被車人的Windows作章系絲 , 作案糸統、微軟的Office文書處理、麥 1 «作業系統、Linux作章系缔笙 體予處理資料。 ’均提供眾多的應用軟 ^998年快閃記憶體硬碟⑶牆―)發明問世之 被詩儲存資料,其具輕巧、攜帶方便、隨插即用 放、/體積料,但料提供A4f料儲存、音樂播 病把錄等多功能’亦同時滿足工作、生活、娛樂等 夕方面的需求。 衫電腦係為多人共用,將個人資料存放於共用電腦 僂雄/使其貧料暴露於外,且有被窺飼偷竊之可能性。 (Data Encryptlon 广,刪)’其係為美國早⑴料國家密碼標準, 工業界應用了 20多年,其鑰匙(key)長度為56bits。 貝枓加密標準(卿)係為目前全世界廣泛使用之加解密演 5 200825741 ‘法。然而近幾年來,資料力 解,徒得標準(DES)已陸續被破 胖便付以其為密碼演糞法嬙杰< 、斤忐機制的系統安全性堪虞。 用以統Γ意卡(如快閃記憶體硬碟或隨身碟)僅被 ,L: 1 料並未受到任何的加密保護,記憶卡 =供貝料*全保護機制,資料 的 險:若將資料加密保護,可在個人電腦pc上::取= 制貝料的便利性與空間使用 嗜,紐皆碎 性’亦可透過軟體的加密保 二^ 須透過該軟體執行,因此亦限制了資料的便 利性與空間使用性。 貝才十旳便 =此’其於上述習知之技術,目前記憶卡上資料安全 f生仍有許多的缺失,而急需要一山 、 H 〜要種斬新的技術解決方案, 疋以本發明提出當使用記 - 丰、仓—細— < 刀口益貝枓日守,需有記憶 卡進仃解岔,其資料始可讀取。 【發明内容】 性,=述發明背景中’習知技術之記憶卡上資料安全 可被任何人隨意使用,因該資料並無加密保護 二十思卡亦未有安全機制保護該資料,因而造成該資料 =皮痛竊取風險。基於上述需求,本發明揭露一種具有 •播功能之嵌人式資訊儲存t置及其預先載人數 官理的方法。 …月揭露之一種具有加解密功能之嵌入式資訊儲存 、^ ’包含.—防護界面安裝程式,用予將防護界面安裳 到資訊處理裝置,㈣護數位内容被任意的不當使用;二 /、有加解⑥、功能之控制晶片’配置於該後人式資訊儲存裝 6 200825741 置中,其具有加密演算法,提供數字位元組來加解密數位 内容;一唯一鍵值,由該控制晶片依加密演算法亂數產生, 用以加密數位内容,並為解密之鑰匙,其為單一且獨特; 一密文檔,客制化數位内容透過加密燒錄程式後,儲存於 該嵌入式資訊儲存裝置中,當執行讀取該密文樓時,必須 比對該具有加解密功能之控制晶片之密碼鑰匙,用以確認 擷取是否經授權。 本發明之主要目的在於提供數位内容加解密方法,該 ® 數位内容透過加密演算法進行加密(例如:高階加密標準 (AES,Advanced Encryption Standard )、DES、3DES、 Blowfish ),以AES高階加密標準為例,但不限定於AES 高階加密標準,其係為2000年10月美國政府機構NIST 評選出的新一代密碼標準,其鑰匙長度分別為128bits、 192bits、256bits,於本發明中所採取的為128bits或是 256bits的高階加密標準,並利用透明式加解密的格式,高 φ 階加密標準128bits密碼安全性為一般56bits資料加密標 準(Data Encryption Standard: DES)密碼之 10 的 20 次方 (1020)倍以上,以此高階加密演算法之檔案是難以解開 的。密文檔的解密鑰匙為該嵌入式資訊儲存裝置之控制晶 片所提供,確認擷取是否授權,若鑰匙正確並授權,便可 解密該密文檔,透過檢視程式即可讀取執行。 本發明之另一目的在於提供具有預先載入數位財產管 理之嵌入式資訊儲存裝置,可預先將數位内容載入至上述 該嵌入式資訊儲存裝置,嵌入式資訊儲存裝置可根據個別 7 200825741 需求將所需數位内容預先載入,數位内容須先經過加密後 在將其載入嵌入式資訊儲存裝置中。因此,嵌入式資訊儲 存裝置便無法被複製移作他用,且嵌入式資訊儲存裝置之 數位内容亦無法被他人或間諜程式窺伺竊取。嵌入式資訊 儲存裝置為數位内容解密之鑰匙(Key),若無嵌入式資訊儲 存裝置則便無法開啟該數位内容。且嵌入式資訊儲存裝置 检碼鑰匙係為單一的(unique),並不會有重複密碼現象,使 知數位内谷的安全性大大提高。 本發明之另一目的在於提供一防護界面用以防止數位 内容不當利用之方法,使用者必須透過該防護界面始可開 =數,内容並讀取,防護界面會向嵌入式資訊儲存裝置之 ,制晶片索取解密餘匙,其為當初作為數位内容加密的唯 鍵值,右無防護界面則該數位内容即無法解密與任何相 關動作’且讀取數位内容之相關檢視程式,亦無法對數位 内容進行相_作,包含:禁止複製、禁止貼上、禁止剪 :動:止存檔、禁止另存新檔、禁止列印、禁止螢幕列印 【實施方式】 細的—些實施例會詳細描述如下。然而,除了詳 ;”田返的,施例外,本發明可以廣泛地在其他的實施利中 ::以月之保護範圍並不受限於下述之實施例, 八係以後述的申請專利範圍為準。 本發明係為一種具有加解密功 置及其預先載人數位財產㈣的料二式貝5請存褒 蚵座g理的方法,係應用於一嵌入式 8 200825741 資訊儲存裝置上,將所雲I你 〜达〜 _而數位内容透過-加密燒錄程式加 戰至肷人式魏儲存裝置予以保護 數位内谷,且隱藏密文播之解密動作,透過防護界面所紀 錄之檢視程式,自動開啟解密後之數位内容。200825741 IX. Inventories: [Technical field of invention] Age-involved Π 2 There is a method of embedding the type of information storage device and its pre-loading force 6 'especially related to the encrypted algorithm岔 岔 , , , , , , 盆 盆 盆 盆 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓 宓[Prior Art] 3 The rapid development of science and technology, the popularization of computers, and the materials are also directed toward the work of the paper (4) to the current data electronic = poor materials do not need to be recorded through paper. The current computer system, such as the Windows of the car, is the chapter of the silk, the crime of the crime, the Microsoft Office document processing, the Mai 1 «Operating system, the Linux chapter is the system to deal with the data. 'All provide a wide range of applications soft ^ 998 flash memory hard disk (3) wall --) The invention of the poetry storage materials, it is light, easy to carry, plug and play, / volume material, but provide A4f material Storage, music, disease recording and other multi-functional 'also meet the needs of work, life, entertainment and other aspects of the evening. The shirt computer is shared by many people, and the personal data is stored in the shared computer. The male/lower exposure is exposed, and there is the possibility of being stolen. (Data Encryptlon is wide, deleted)' It is the national password standard of the United States (1). It has been used in industry for more than 20 years, and its key length is 56bits. The Bessie Encryption Standard (Qing) is currently widely used in the world for encryption and decryption. However, in recent years, the information has been solved, and the standard (DES) has been gradually broken, and the system security of the mechanism of the sputum is used. Used to unify cards (such as flash memory hard drives or flash drives) only, L: 1 material is not protected by any encryption, memory card = for bedding * full protection mechanism, data risk: if Data encryption protection, can be on the personal computer pc:: take = the convenience of the bedding material and the use of space, the new is broken - can also be encrypted by the software encryption ^ must be executed through the software, thus limiting the data Convenience and space usability. Beicai Shiyanzhe = this 'the technology of the above-mentioned, the current data security on the memory card is still a lot of missing, and urgently need a mountain, H ~ to plant a new technical solution, 疋 proposed by the present invention When using the record - Feng, warehouse - fine - < knife mouth Yi Bei 枓 day guard, you need to have a memory card to solve the problem, its data can be read. SUMMARY OF THE INVENTION Sexuality, in the context of the invention, the security of the data on the memory card of the prior art can be used freely by anyone, because the data is not encrypted and protected, and there is no security mechanism to protect the data, thus causing This information = the risk of skin pain stealing. Based on the above needs, the present invention discloses an embedded information storage device with a broadcast function and a method for pre-loading the number of people. ...exposure-embedded embedded information storage with encryption and decryption function, ^ 'include.-Protection interface installation program, used to protect the protection interface to the information processing device, (4) the digital content is improperly used; 2/ There is a solution 6, the function of the control chip 'configured in the post-person information storage device 6 200825741, which has a encryption algorithm, providing digital bytes to encrypt and decrypt digital content; a unique key value, by the control chip Generated according to the encryption algorithm, used to encrypt the digital content, and is the key to the decryption, which is a single and unique; a secret document, the customized digital content is stored in the embedded information storage device through the encryption programming program. In the execution of reading the ciphertext building, the cryptographic key of the control chip with the encryption and decryption function must be used to confirm whether the retrieval is authorized. The main purpose of the present invention is to provide a digital content encryption and decryption method, wherein the digital content is encrypted by an encryption algorithm (for example, Advanced Encryption Standard (AES), DES, 3DES, Blowfish), and the AES high-order encryption standard is For example, but not limited to the AES high-order encryption standard, which is a new-generation cryptographic standard selected by the US government agency NIST in October 2000. The key lengths are 128 bits, 192 bits, and 256 bits, respectively. 128 bits are used in the present invention. Or 256bits high-order encryption standard, and use the transparent encryption and decryption format, high φ-level encryption standard 128bits password security for the general 56bits data encryption standard (Data Encryption Standard: DES) password 10 of the 20th power (1020) times Above, the file of this high-order encryption algorithm is difficult to solve. The decryption key of the secret document is provided by the control chip of the embedded information storage device to confirm whether the retrieval is authorized. If the key is correct and authorized, the secret document can be decrypted and read and executed through the viewing program. Another object of the present invention is to provide an embedded information storage device with pre-loaded digital property management, which can load digital content into the embedded information storage device in advance, and the embedded information storage device can be based on individual 7 200825741 requirements. The required digital content is preloaded and the digital content must be encrypted before being loaded into the embedded information storage device. As a result, the embedded information storage device cannot be copied for other purposes, and the digital content of the embedded information storage device cannot be stolen by others or spyware. The embedded information storage device is the key for decrypting digital content. If there is no embedded information storage device, the digital content cannot be opened. And the embedded information storage device has a unique key, and there is no repeated password phenomenon, which greatly improves the security of the digital valley. Another object of the present invention is to provide a protection interface for preventing improper use of digital content. The user must open the number, content and read through the protection interface, and the protection interface will be directed to the embedded information storage device. The chip acquires the decryption key, which is the unique key value that was originally encrypted as the digital content. If the right unprotected interface is used, the digital content cannot be decrypted and any related action' and the digital viewing device is not related to the digital content. Perform phase-to-action, including: prohibit copying, prohibiting paste, prohibiting cut: move: stop archiving, prohibit saving new file, prohibit printing, prohibit screen printing [implementation] Detailed - some embodiments will be described in detail below. However, in addition to the details; the exception of the field, the invention can be widely used in other implementations: the scope of protection of the month is not limited to the following examples, the application scope of the eight series will be described later. The present invention is a method for storing and decrypting a pre-loaded property and a pre-loaded property (4), which is applied to an embedded 8 200825741 information storage device. I will use the cloud-based I to reach ~ _ and the digital content through the - encryption programming program to the deaf-type Wei storage device to protect the digital valley, and hide the ciphertext broadcast decryption action, through the protection interface recorded viewing program , automatically open the decrypted digital content.
請:考圖示,其中所顯示僅僅是為了說明 =利,物以限制本發明。第一圖所示為本發明二 將:,功能之嵌入式資訊儲存裝置之示意圖。首 加解密功能的嵌入式資訊储存裝置ι〇ι安裝於 貝=理裝置102之上後’便可開始進行下述之步驟。麥 Ί貝訊儲存裝置1G1具有—控制晶片㈣_,其 於貝机處理裝i 102用以產生加解密之 口 L眞。控制晶片⑽採取加密演算法建^ 而唯-鍵值⑽為加㈣算絲數產生且單^ '加二 取的過程中,使用者開啟相關檢視程式1〇4讀取數位:! 301(請表考篦- / μ唄取數位内容 “44二圖)時’須受到防護界面1〇 界面103會向护制曰ΰ ! "隻防4 鍵…唯一鍵值1〇6’唯有唯- 數位内容加.*可透過防護界面103讀取 令川1,然而,其他應用程式1〇9盔 ::執行,亦無法開啟或讀取密文檔二 == “明文;其他應用程式1〇9為資訊處理装置 相關應用程式,其並非開啟密文檔 热 程式104因受到防嗜旯& 相關辁式,檢視 105做杯“ 4 防護’因而無法對密文幹 :做任何相關的健存備份動作,因此 = 數位内容301έγ4, 尤用’ T為任-數位資料(例如電子書、MP3、奶 9 200825741 等)。資訊處理襄置102可為桌上型電腦、手提電腦、個人 ,(綱、行動電話、掌上型資訊處二 生產者在燒錄密文擋1〇5於嵌入式資 亦將防護界面安裝程式1G7—併燒錄於 $ ⑽式則為將防護界面103安裝於資訊處 以便使用者開啟或讀取所需數位内容3〇ι,且 ^安震程式U)7可為自_行安裝亦可為使料安裝 之,不限定其安裝方式。 < :參照第二圖示,於此實施例中,本發明係應用於一 視r =⑻,上述防護界® 1G3包含:一記錄與偵側檢 =式類別模組加,模組2G1用以記錄開啟數位内容3〇1 參 目,才欢視知4 104 ’當使用者透過檢視程< ι〇4讀取數 立内谷301 a守,模組2〇1便啟動偵測是否為數位内容 目關之檢視程式。若結果為數位内容3G1之檢視程式1〇4, 者便可透過;^視知式1〇4開啟讀取數位内容加;反 ^ ’撿視程式所開啟之數位内容為亂碼密文播,無法讀取; /貞測唯-鍵值模組2〇2’用以判斷谈入式資訊儲存裝置 01之控制晶片1〇8所產生的數字位元組是否為原本加密 ,鑰匙,防護界面103索取唯一鍵值1〇6以解密密文檔 使其為可讀取之明文;一禁止檢視程式複製、貼上、 ^下存檔、另存新檔、列印、螢幕列印等功能模組203, 莫=203用以防護數位内容被不當使用而採取之相關禁止 :檢視私式104唯有讀取之—功能;一偵測數位内容 放功限杈組204,模組204偵測判斷數位内容3〇1之有 200825741 效曰期與資訊處 唯有在有效期限内始;讀:::==效二, 位内容可讀取次數模'组2。5,模匕5 ㈣容3〇1之次數是否在數位内容- 數ΐϋ圍内,當使用去士矣 圍時Lhh 數逾越可讀取次數範 讀取^數範圍内始可讀取數位内容。唯有在可 預弈ίΓΓ第三圖示’其係為產生密文槽之示意圖,首先 取所需之數位内容301,並 ==之有效期限與可讀取次數範圍,透職 -鍵# 1Μ子衣101之控制晶片108以演算法產生一唯 程式302使鍵值106係、為一數字位元組,加密燒錄 文檔1〇5。 -鍵值1〇6加密數位内容301以產生一密 、請^照第四圖示,其係為產生加密内容之加密燒錄程 式之圖’首先,於貢訊處理裝置⑽中開啟加密燒錄 程搬,接著,透過加密燒錄程式3〇2上之【增加】按鈕 _新曰所而數位内容3〇1 ’其顯示於加密燒錄程式3〇2 k單4中若要刪除不需要之内容可選取數位内容3〇1 ,透過加密燒錄程式3〇2之【刪除】按鈕4〇2,將之刪除, 最後確疋所需之貧料内容後,可由加密燒錄程式搬之【產 生】知:紐403產生加德、過之密文播(Content.exe) 105,並 將雄、文檔105燒錄至嵌入式資訊儲存裝置1〇1中。加密燒 錄程式302會向控制晶片1〇8索取一唯一鍵值(Unique 200825741Please refer to the illustrations, which are shown for illustrative purposes only. The first figure shows a schematic diagram of the embedded information storage device of the present invention. After the first information decryption function embedded information storage device ι〇ι is mounted on the device 102, the following steps can be started. The Ί 讯 储存 储存 储存 储存 储存 具有 具有 储存 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞 眞The control chip (10) adopts an encryption algorithm to build a ^ and only the key value (10) is added (4) the number of calculations is generated and the single ^ 'plus two is taken, the user opens the relevant viewing program 1〇4 to read the digits:! 301 (Please refer to the table - / μ to capture the digital content "44 two maps" when you must be protected by the interface 1 〇 interface 103 will be guarded! " only 4 keys... unique key value 1 〇 6 'only There is only - digital content plus .* can read the command 1 through the protection interface 103, however, other applications 1 〇 9 helmet:: execution, can not open or read the secret document 2 == "plain text; other applications 1 〇9 is an information processing device related application, which does not open the confidential document hot program 104 because it is protected against embarrassing & related ,, view 105 to make a cup "4 protection" and thus can not do ciphertext: do any related health Backup action, therefore = digital content 301 έ γ4, especially 'T is any-digit data (such as e-book, MP3, milk 9 200825741, etc.). Information processing device 102 can be a desktop computer, laptop, personal, (class The mobile phone and the handheld information department 2 producers are burning the ciphertext block 1〇5 and the embedded device will also install the protection interface 1G7—and burn it in the $(10) type to install the protection interface 103 to the information office. The user opens or reads the required digital content 3〇ι, and ^安The program U) 7 may be installed from the line or the material, and the installation manner is not limited. <RTIgt; </ RTI> Referring to the second diagram, in the embodiment, the invention is applied to a view r = (8), The above-mentioned protection industry® 1G3 includes: a recording and detection side type module, and the module 2G1 is used to record the digital content of the digital content 3〇1, and then the user knows 4 104 'when the user passes the inspection process< Ι〇4 reads the number of 立立谷 301 a 守, module 2〇1 will start to detect whether it is a digital content viewing program. If the result is digital content 3G1 viewing program 1 〇 4, you can pass; ^ 知 式 〇 〇 开启 开启 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取 读取Determining whether the digital byte generated by the control chip 1〇8 of the walk-in information storage device 01 is originally encrypted, and the key, the protection interface 103 requests the unique key value 1〇6 to decrypt the confidential document to make it readable. A function module 20 that prohibits the copying, pasting, archiving, saving new files, printing, screen printing, etc. 3, Mo = 203 to prevent the digital content from being improperly used to prevent: the private 104 is only read - function; a digital content is limited to the group 204, the module 204 detects the judgment digit Content 3〇1 has 200825741 effect period and information office only start within the validity period; read:::==effect two, bit content can read the number of modules 'group 2. 5, module 5 (four) capacity 3〇 Whether the number of 1 is in the digital content - within the number range, when using the taxi, the Lhh number can be read as many times as the number of readings can be read within the range of the number of readings. Only in the foreseeable ΓΓ ΓΓ ΓΓ ΓΓ ΓΓ 其 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' The control chip 108 of the sub-machine 101 generates a program 302 by algorithm to make the key value 106 a digital byte and encrypts the document 1〇5. - The key value 1 〇 6 encrypts the digital content 301 to generate a secret, please take the fourth illustration, which is a diagram of the encrypted programming program for generating the encrypted content. First, the encryption processing is started in the tribute processing device (10). Cheng, then, through the [Add] button on the encryption program 3〇2, the digital content 3〇1 ' is displayed in the encryption program 3〇2 k single 4 to delete unnecessary The content can be selected from the digital content 3〇1, and the [Delete] button 4〇2 of the encryption programming program 3〇2 is deleted, and finally the required poor content is confirmed, and then the encrypted programming program can be moved. 】 Know: New 403 generates Gard, the ciphertext (Content.exe) 105, and burns the male and the document 105 to the embedded information storage device 101. The encryption program 302 will request a unique key value from the control chip 1〇8 (Unique 200825741)
Key)1〇6’再利用唯一舰1〇6將所需數位内|3〇ι以透明 式加解密格式進行加密,產生—密文檔1()5。在另一實施 射,可以預先設定防護界面安裝程式1()7,設定且= 開啟數位内㈣!之相關檢視程4 i 〇 4之類別與偵測判別 數位内容301之讀取有效期限以及其可讀取次數範圍。此 外,密文檔1〇5肖防護界面安裝程式1〇7 —併燒錄至嵌入 式資訊儲存裝置101中,每次僅執行一次燒錄並記錄燒錄 次數,而唯一鍵值106便儲存於控制晶片1〇8中,用以 密密文檔105之输匙。 、請參照第五圖示,其係為本發明具加解密功能之嵌入 ^資訊儲存裝置之預絲人數位財產管理的方法之數位内 容儲存流程圖。首先,於資訊處理裝置1〇2開啟加密燒錄 程式介面302(㈣501),料,選取所需預先载入之數位 内容(步驟502),然後,點選加密燒錄程式介面3〇2之 【增加】按鈕401,將數位内容3〇1新增至加密燒錄程式 霉介面302之選單404中(步驟5〇3);若要刪除不需要之數位 内容3〇1,則於選單中點選數位内容3〇卜並點選加密燒錄 程式介面302之【刪除】按鈕4〇2,將其刪除(步驟5〇4), f到步驟502,持續_並重複上述之•,並結束該重 複流程。然後,設定數位内容301之有效期限與可讀取次 數範圍(步驟505),接著’點選加密燒錄程式介面3〇2之【產 生】按鈕403,並透過嵌入式資訊儲存裝置1〇1之控制晶 片108之加密演算法提供單一唯一鍵值1〇6,進行加密動 作(步驟506),接著,雜數位内容3〇1以唯一鍵值加^為 12 200825741 -密文檔H)5(步驟507)’最後將密文檔1〇5與防護界面安 裝程式W7 —併燒錄至嵌入式資訊儲存裝置ι〇ι,且將唯 一鍵值106儲存記錄於控制晶片1〇8中(步驟5〇8)。 請參照第六圖示,其係為本發明具加解密功能之嵌入 式資訊儲存裝置之預先載人數位財產管理的方法之數位内 容讀取流程圖,首先,安裝散人式資訊儲存裝置⑼Key) 1〇6' re-uses the unique ship 1〇6 to encrypt the required digits in the transparent encryption/decryption format to generate the secret document 1()5. In another implementation, you can preset the protection interface installation program 1 () 7, set and = turn on the digits (four)! Related Category 4 i 〇 4 Category and Detection Discrimination The reading expiration date of the digital content 301 and the range of its readable times. In addition, the secret document is installed in the embedded information storage device 101, and the number of burns is recorded only once, and the unique key value 106 is stored in the control. In the wafer 1-8, the key for the dense document 105. Please refer to the fifth figure, which is a digital content storage flow chart of the method for pre-wired person property management of the embedded information storage device with the encryption and decryption function. First, the information processing device 1〇2 opens the encryption programming interface 302 ((4) 501), selects the pre-loaded digital content (step 502), and then clicks the encryption programming interface 3〇2. Add] button 401, add the digital content 3〇1 to the menu 404 of the encryption programming program 302 (step 5〇3); to delete the unnecessary digital content 3〇1, click in the menu The digital content is 3 并 并 and click the [Delete] button 4 〇 2 of the encryption programming interface 302, delete it (step 5 〇 4), f to step 502, continue _ and repeat the above, and end the repetition Process. Then, the expiration date and the number of readable times of the digital content 301 are set (step 505), and then the [generate] button 403 of the encryption programming interface 3 〇 2 is selected and transmitted through the embedded information storage device 1 〇 1 The encryption algorithm of the control chip 108 provides a single unique key value of 1 〇 6 for performing an encryption operation (step 506), and then, the hexadecimal content 3 〇 1 is incremented by a unique key value to 12 200825741 - confidential document H) 5 (step 507) ' Finally, the secret document 1〇5 and the protection interface installation program W7 are burned to the embedded information storage device ι〇ι, and the unique key value 106 is stored and recorded in the control chip 1〇8 (step 5〇8) . Please refer to the sixth figure, which is a digital content reading flowchart of the method for pre-loading property management of the embedded information storage device with encryption and decryption function. First, the installation of the scattered information storage device (9)
訊處理裝HG2中(步驟6G1),安裝完成之後,防護界面安 裝程式m將防護界面103安裝於資訊處理裝置1〇2(步驟 602) ’且防護界面103隱藏於該資訊處理裝置⑽中並不 被任何應用程賴巾止(㈣6G3),接著,防護界面將密文 :二〇5解密於資訊處理裝置1〇2中(步驟6〇4),控制晶片提 =原加密時之唯-鍵值⑽於防護界自⑼以解密(步驟 5),偵測唯-鍵值餘匙是否正確(步驟_),若唯一鍵值 106不正確則無法·該密文檔1()5且數位内容如 7步驟術);若唯—鍵值⑽正確,則解開該密文槽1〇5 為原數位内容301且複製數位内容3〇1力資訊處理裝置 1〇2中(步驟6G8),隱藏解密過程,使时無感覺地開啟數 = 驟609)。然後’防護界面ι〇3便會偵測檢視 ^ 7 K (步驟61〇),若不正確,則檢視程式 104盔法 項取數位内容301,若讀敌目丨丨☆ * 為亂碼(步驟611),反之,檢 ^式104正確’則透過防護界面H)3開啟檢視程式1〇4 ===容3G1(步驟612),且防護界面⑽禁止檢視程 式1〇4後衣、貼上、剪下、存播、另存新樓、列印、螢幕 列印等複製功能(步驟613),接著,防護界面叫貞測數位 200825741 内合是否超過有效期限或超過可讀取次數範圍(步驟 614)^若已超過數位内容3〇1預設之有效期限或超過預設 之可靖取次數範圍,則使用者便無法開啟數位内容%〗(步 :)’反之,則回到步驟612,持續偵測並重複上述之 饥私,亚結束重複流程。接著,偵測該檢視程式104是否 關閉中止(步,驟616),若尚未關閉中止檢視程式1〇4則回到 v驟612 ’持續偵測並重複上述之流程,並結束重複流程; 馨反之便將防遵界面i 〇3關閉且刪除位於資訊處理裝置1Μ 之數位=容301(步驟617),最候,偵測嵌入式資訊儲存裝 ,ιοί是否仍安裝於資訊處理装置102上(步驟618》若仍 女裝於貧訊處理装置102上則回到步驟612,持續偵測並 =複上述之,並結束重複流程;反之,若拔除嵌入式 資訊儲存裝置101,則關閉防護界面103且刪除位於資訊 處理裝置102之數位内容301(步驟619),結束整個流程。 以上所述僅為本發明之較佳實施例而已,並非用以限 龜定本發明之申請專利範圍,凡其它未脫離本發明所揭示之 精神下所完成之等效改變或修飾,均應包含在下述之專利 申請範圍内。 【圖式簡單說明】 本發明可以藉由某些較佳實施例,以及下述 之說明書與所附圖示之詳細描述來了解,然而並 非為限制其專利申請範圍,應理解者為本發明中 所有之較佳實施例僅為例示之用,其中:χ 第一圖係為本發明具有加解密功能之嵌入 14 200825741 式資訊儲存裝置之示意圖; 第二圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之防護界面之示意圖; 第三圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之產生密文檔之示意圖; 第四圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之加密燒錄程式之示意圖;、 第五圖係為本發明具有加解密功能之嵌入 * 式資訊儲存裝置之預先載入數位財產管理的方 法之數位内容儲存流程圖: 第六圖係為本發明具有加解密功能之嵌入 式資訊儲存裝置之預先載入數位財產管理的方 法之數位内容讀取流程圖。 【主要元件符號說明】 1 0 1 嵌入式資訊儲存裝置 Φ 102 資訊處理裝置 1 〇 3 防護界面 1 0 4 檢視程式 1 0 5 密文檔 1 06 唯一鍵值 1 0 7 防護界面安裝程式 1 0 8 控制晶片 1 0 9 其他應用程式 201 偵測檢視程式類別模組 15 200825741 202 偵測唯一鍵值模組 203 禁止檢視程式複製、貼上、剪下、列印、 存檔、另存新檔、螢幕列印等模組 204 偵测數位内容有效期限模組 205 偵測數位内容可讀取次數模組 301 數位内容 302 加密燒錄程式 401 【增加】按鈕 _ 402【刪除】按鈕 403 【產生】按鈕 404 選單 501、502、503、504、505、506、507 步驟 601、602、603、604、605、606、607、608 步驟 609、610、611、612、613、614、615、616 步驟 617、618、619 步驟In the processing device HG2 (step 6G1), after the installation is completed, the protection interface installation program m installs the protection interface 103 to the information processing device 1〇2 (step 602)' and the protection interface 103 is hidden in the information processing device (10). By any application, it is (4) 6G3, and then the protection interface decrypts the ciphertext: 2〇5 into the information processing device 1〇2 (step 6〇4), and controls the chip to raise the unique key value of the original encryption. (10) In the protection industry, (9) to decrypt (step 5), to detect whether the key-key value is correct (step _), if the unique key value 106 is incorrect, the secret document 1 () 5 and the digital content such as 7 If the key-value (10) is correct, the ciphertext slot 1〇5 is unlocked as the original digit content 301 and the digit content is copied into the information processing device 1〇2 (step 6G8), and the decryption process is hidden. , so that the number of times when there is no feeling = step 609). Then, the 'protection interface ι〇3 will detect the view ^ 7 K (step 61〇). If it is not correct, the view program 104 helmet method takes the digital content 301, if the enemy target 丨丨 * is garbled (step 611) ), on the other hand, if the check 104 is correct, the inspection program 1〇4 ===容3G1 is opened through the protection interface H)3 (step 612), and the protection interface (10) prohibits the viewing program 1〇4, the clothes, the stickers, the scissors Copy function such as downloading, saving, saving new building, printing, screen printing, etc. (step 613), and then, the protection interface is called whether the number of digits in the 200825741 exceeds the expiration date or exceeds the number of readable times (step 614)^ If the expiration date of the digital content of 3〇1 has been exceeded or the preset expiration number range is exceeded, the user cannot open the digital content %〗 (step:). Otherwise, return to step 612 to continue detecting. And repeat the above-mentioned hunger, and end the process. Then, it is detected whether the viewing program 104 is closed (step, step 616). If the abort viewing program 1〇4 has not been closed, then return to step 612 ′ to continuously detect and repeat the above process, and end the repeating process; The anti-compliance interface i 〇 3 is closed and the digits of the information processing device 1 = 301 are deleted (step 617), and at the latest, the embedded information storage device is detected, and ιοί is still installed on the information processing device 102 (step 618). If the woman is still on the poor processing device 102, then return to step 612, continue to detect and repeat the above, and end the repetitive process; otherwise, if the embedded information storage device 101 is removed, the protection interface 103 is closed and deleted. The digital content 301 of the information processing device 102 (step 619) ends the entire process. The above is only the preferred embodiment of the present invention, and is not intended to limit the scope of the patent application of the present invention. Equivalent changes or modifications made in the spirit of the disclosure should be included in the scope of the following patent application. [Simplified description of the drawings] The present invention may be implemented by some preferred embodiments. And the following description of the specification and the accompanying drawings are to be understood by the description of the claims The figure is a schematic diagram of the embedded information of the 200825741 type information storage device with the encryption and decryption function of the present invention; the second figure is a schematic diagram of the protection interface of the embedded information storage device with the encryption and decryption function of the present invention; A schematic diagram of a secret document generated by an embedded information storage device with encryption and decryption function; the fourth diagram is a schematic diagram of an encryption programming program of an embedded information storage device with encryption and decryption function; and the fifth figure is the invention Digital content storage flow chart of pre-loaded digital property management method with embedded and encrypted information storage device with encryption and decryption function: The sixth figure is a pre-loaded digital property of the embedded information storage device with encryption and decryption function of the present invention Digital content reading flowchart of the management method. [Main component symbol description] 1 0 1 Embedded information Storage device Φ 102 Information processing device 1 〇3 Protection interface 1 0 4 View program 1 0 5 Confidential document 1 06 Unique key value 1 0 7 Protection interface installer 1 0 8 Control chip 1 0 9 Other applications 201 Detection viewer The category module 15 200825741 202 detects the unique key value module 203 prohibits the viewing program from copying, pasting, cutting, printing, archiving, saving new files, screen printing, etc. 204 detecting the digital content expiration date module 205 Detect Digital Content Readable Times Module 301 Digital Content 302 Encryption Programming Program 401 [Add] button _ 402 [Delete] button 403 [Generate] button 404 Menu 501, 502, 503, 504, 505, 506, 507 Steps 601, 602, 603, 604, 605, 606, 607, 608 Steps 609, 610, 611, 612, 613, 614, 615, 616 Steps 617, 618, 619 Steps
1616