TW200923711A - Method for setting duplication limitation for computer file of human machine interface - Google Patents

Method for setting duplication limitation for computer file of human machine interface Download PDF

Info

Publication number
TW200923711A
TW200923711A TW96143755A TW96143755A TW200923711A TW 200923711 A TW200923711 A TW 200923711A TW 96143755 A TW96143755 A TW 96143755A TW 96143755 A TW96143755 A TW 96143755A TW 200923711 A TW200923711 A TW 200923711A
Authority
TW
Taiwan
Prior art keywords
machine interface
file
storage device
human
computer file
Prior art date
Application number
TW96143755A
Other languages
Chinese (zh)
Other versions
TWI383309B (en
Inventor
Ching-Yang Wu
Wen-Wang Hung
Wen-Kai Li
Hsu-Yuan Kuo
Original Assignee
Delta Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Delta Electronics Inc filed Critical Delta Electronics Inc
Priority to TW96143755A priority Critical patent/TWI383309B/en
Publication of TW200923711A publication Critical patent/TW200923711A/en
Application granted granted Critical
Publication of TWI383309B publication Critical patent/TWI383309B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A method sets duplication limitation for computer file of human machine interface. The computer file is stored to a portable storage device after it is edited and encrypted such that the computer file should be exclusively used with the portable storage device. The computer file is then accessed by a setting-end human machine interface (HMI) to set up a threshold number for duplication. The computer file is checked with the available duplication number thereof when it is accessed by a user-end HMI. The computer file can be successfully duplicated when the available duplication number is large than zero. The computer file cannot be duplicated when the available duplication number reaches zero to limit the duplication times for the computer file.

Description

200923711 九、發明說明: 【發明所屬之技術領域】 本兔明係有關於加密方法,尤其更右 複製次數之加密方法。 〖;可限制檔案 【先前技術】 人機介面(Human Machine Interface,HMl ), ( Operator Interfaced ) , 心父換、溝it與互動之巾„介,操 3進行If 上之按鍵或視窗面板上之觸控圖像,完成指=機介, =機器係對操作者輸入之指令產生對應之二輪:’使 咖者於機器操作上之便利性與 :以揭 不但使得工業自動化控制在執行上更為方便,甚=面 完全取代傳統需要大量配線的控制盤面。 已漸漸 ::式=之操作,主要係透過其内部所 觸控動作,即對機哭絲作者得以用簡單之 圖控軟體,係於==令’而該些人機介面中的 完虚之p^ 、仃壬式之撰寫及編輯,並將編輯 成之%式碼編譯成人機介面可執 或隨身碟等等中間媒介養 S木Y ’透匕满 上進行安裝或更新。 載或稷衣至使用端之人機介面 二5此ί此科技發達的時代,資訊安全之程度已大不如 月1J ’該些數位化之檔幸, 該些禮案落入不明人士、的到骇客惡意竊取,致使 的手中’故將數位化檔案加密,使 200923711 其需要輸入密碼金鑰或其它認證等等之後才具有可读性, ?目前資訊安全研究中之一大課題’然而’雖然目“面 已開發有許多檔案之加密技術,但仍難防 敵,g 一 ^ 八士之破 :且一旦远到破解,該一檔案上之加密機制即形同虛 設,該一被破解之檔案將會被無限制的使用,:二 有!人之權益’再者’目前市面上所使用:^多 口 〇<技術,皆是以檔案將於電腦上使用為前題所設計,尚 0未存在有一為了該些於人機介面上使用之檔案所特二 之加袷方法,如此一來,該些運用於人機介面上之 , 其安全性實令人堪憂。 田木 有鑑於此一狀況,本發明人仍潛心研究,終於 二種可限制檔案之使用次數’且可於檔案遭到非法取ς 後,即令檔案無法使用之加密技術。 【發明内容】 本發明之主要目的’在於提供一種人機介面之槽㈣ 衣:人數加密方法,係對一檔案設定可複製之次數,使該二 棺案具有複製次數之上限。 5 本發明之另一目的,在於提供一種人機介面之檔 ;-人數加密方法m案與—可攜式相 配,致使當該儲存裝置内之該些槽案被非法取得,並2 接或下載至一人機介面上時,該-人機介面亦無 法複製或使用該些樓案。 為達上述目的,本發明係於槽案編輯完成後,儲存至 200923711 二攜式儲存裝置,並連接至m端人機介面,對該儲 ^置中之該㈣進行可複製次數之設t再將該儲存裝 姑灿以加密’使該儲存裝置與該播案無法分開使用,而當 ::、::ΐ置連接至—欲複製該檔案之使用端人機介面上進 1丁硬邊使用端人機介面係判斷該播案之可複製次數 =於〇次,若該權案之可複製次數未大於。次,則該 犏累無法被複製。 【焉施方式】 明如$就本發明之一較佳具體實施例’配合圖式,詳細說 電腦(2 -ί-η. &又 機介面(3)及複數使用端人機介面(4)。剌 之步存裝置(1),將一槽案(11)透過三種不同 1 兵上述二項媒體做資料之交換與傳輸。 .編輯步驟:該檔案(11)係於該一電腦(2 )上進行 長式瑪之撰寫與編輯,撰寫完成且 f面使用之播案後,再對該槽案設定一金錄,= 忒私案之複製次數檢查功能,最後再存至一可样弋之 置。詳細說明請見後述之編輯流程_(二 ^清參閱第一圖,係為本發明之一較佳具體實施例之 =錢圖’由圖可看出,本發明之架構係可概 伤,為一可攜式儲存裝置( 200923711 2.設定步驟:該槽案(11)經由該儲存裝置㈠) 至該設定端人機介面(3),並於輪人—密媽金錄 後,再進-步設定該播案(η )之可複製次數,而於 確定加密後,即將整個儲存震置予以加密。詳細說明 凊見後述之設定流程圖(第四圖)。 =步驟:最後再將該爾置⑴, 欲使用該槽案⑻之使用端人機介面; =用⑽介面…進行該構案⑻之安裝; Ί細說明請見後述之複製流程圖(第五圖)。 々見弟二圖’為可攜式儲存裝置之内部配置 该可攜式儲存裝置内部,主要 ^ 為-資料儲存區⑼、域,分別 (Μ)。該資料儲存區(12)二以:二及一次數暫存區 當-使用端人機介面(4):=存_。", 係從該資料儲存區⑻===案⑻時: 使用,·該金鑰區(13)係儲存—^ 結以稷2 得以判斷該儲存 子山馬孟鑰,使一人機介面 致使該m疋否對應於其内部所儲存之該播案, 〇4)列^該播案無法分開使用,·而該次數暫存區 該槽案(u)被一可複製次數,以供 之用。 立而人機介面(4)複製使用前檢查 體實施例::二:四圖及第五圖,為本發明之-較佳具 參閱第:g成2 &圖、设定流程圖與複製流程®。首請 —圖,為本發心之該㈣(n)於—電觸(2) 200923711 上撰寫編輯之流程圖。係使用一程式編輯器(例如,台達 電所開發之ScreenEditor )進行程式碼之撰寫與編輯 (S31 ),待程式碼編輯完成後,係編譯成一人機介面可 執行之該檔案(11),並對其設定一金鑰密碼, 接著,設定是否要啟動該擋案之複製次數檢查功能。若設 疋不啟動该檔案之複製次數檢查功能,則無法於下述之設 定步驟中,進一步設定該檔案之可複製次數,如此一來认 該檔案即無法被複製。最後,儲存該擋案至一可攜式儲存 裝置(1 ) ( S33 ),藉以與人機介面互相連接。 第四圖為本發明中之該檔案於一設定端人機介面上之 設定流程圖,當該可攜式儲存裝置(丨)連接至一設定端 之人機介面(…夺(S41 ),該人機介面係判斷該槽宰 之複製次數檢查功能是否被啟動(Activated ),若沒有被 啟動’則該人機介面無法對該㈣進行可複製次數之設 2 ’該樓案則無法被複製使用;而若該㈣之複製次數檢 —功旎被啟動,則可於該人機介面上輸入該檔案之一 金餘’以供該人機介面檢查,當該人㈣面確認輸入:金 餘正確無誤之後,即可進—步設定該財(ιη之可” 當確定要加密之後,即會將該㈣之密碼金錄存入 二:裝置内之一金鑰區,接著會將可複製次數存入該儲 ^ Λ褚存裴置與該檔案無法分開使用,當該 =置内之該樓案被非法取得,並以網路或其它心 接下載至-人齡_,因以機介面無法檢查該健存裝 200923711 故該㈣無法被複製使用;而若該儲存裝置内 Γ個播案,則會造成該檔案之金餘與該儲存裝置内之: =區k金料符合之情況,致使該儲存裝置無4 :五圖為本發明中之該槽案於一使用端人機 複製流程圖,當該可攜式儲存裝置(1)連接至 二 =φ(4)時,該人機介面係先檢查該儲存裝置2 ,區中之金錄’是否與該槽案之金输符合 之 跑無法動作’該人機介面無法複製該二 則該人機介面會檢查該儲存裝置⑴中之 :::(二(14),判斷該檔案(11)是否處於可複製 ;狀“S55) ’即’是否具有至少-次之爾-欠數 :於該次數暫存區(14)中判斷出該㈣(11)=可人二 次,則表示該槽案(ιι)不可複: Γ二複製次數大於。次,則表示該樓案 ;可被禝製,此時,即將該檔案(n ) 數減-,存㈣儲存裝置(丨) 禝衣二人 (叫,並進行該槽案⑻之: 本發:二實例,非因此即拘限 可做該設定端人機介面:設定::該使用端人機介面’亦 面,亦可做該使用端人機介面之複制端人機介 ==求稍做調整,不可心 巧之“變化,均同理皆包含^本發明之範圍 200923711 内,合予陳明。 【圖式簡單說明】 弟一圖係為本發明之〜 第二圖係為可攜式錯^佳具體實施例之簡單架構圖。 第三圖係為本發明之二,置之内部配置方塊圖。 第四圖係為本發明之If佳具體實施例之編輯流程圖。 第五圖係為本發日Μ具體實施例之設定流程圖。 一 %佳具體實施例之複製流程圖。 主要元件符號說明】 11…檔案 金输區 12 14 2 …可攜式儲存裝置 …資料儲存區 13 …次數暫存區 …電腦 3…設定端人機介面 4…使用端人機介面 S31 〜S34,S41 〜S45,S51 〜S55 ...步驟200923711 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to an encryption method, in particular, an encryption method for the number of right copy times. 〖; can limit the file [previous technology] Human Machine Interface (HMl), (Operator Interfaced), heart-female change, groove it and interactive towel „ 介, 操 3 on the If button or window panel Touch image, complete finger = machine interface, = machine system to the operator input instructions to produce the corresponding two rounds: 'The convenience of the coffee machine in the operation of the machine: to expose not only make industrial automation control more implementation Convenient, even = face completely replaces the traditional control panel that requires a lot of wiring. Has gradually:: type = operation, mainly through the internal touch action, that is, the author of the machine crying can use a simple graphic control software, tied to ==Order' and the virtual p^, 仃壬-style writing and editing in these human-machine interfaces, and edited into %-code compiled adult machine interface or portable media, etc. Y 'is installed or updated. The man-machine interface that is loaded or used to the end of the second. This is a technology developed era, the degree of information security is not as good as the month 1J 'The digitalization of the file, The ceremonies fall into the unknown The person, the hacker maliciously steals, causing the hand to 'encrypt the digital file, so that 200923711 needs to enter the cryptographic key or other authentication, etc. before it is readable, one of the major issues in information security research 'However' Although the face has been developed with many file encryption technologies, it is still difficult to defend against the enemy, g ^ ^ Ba Shi's break: and once it is far from cracking, the encryption mechanism on the file is ineffective, the one is cracked The file will be used without restrictions: two! People's rights 'further' are currently used on the market: ^Multi-mouth 〇<Technology, all designed with the file used on the computer as the premise, yet there is no one for the use of the human-machine interface The method of adding files to the file, so that the security applied to the human-machine interface is worrying. In view of this situation, the inventors have been concentrating on research and finally have two kinds of encryption technologies that can limit the number of times the files are used, and can be used after the files are illegally taken. SUMMARY OF THE INVENTION The main object of the present invention is to provide a slot (four) clothing for human-machine interface: a method for encrypting a number of people, which is to set a copyable number of times for a file to have an upper limit of the number of times of copying. 5 Another object of the present invention is to provide a human-machine interface file; the number of people encryption method m and the portable type match, so that the slots in the storage device are illegally obtained, and 2 or download When it comes to a human machine interface, the man-machine interface cannot copy or use the buildings. In order to achieve the above purpose, the present invention is stored in the 200923711 two-port storage device after the completion of the slot file editing, and is connected to the m-end human-machine interface, and the (4) copyable number of the storage device is set. The storage device can be encrypted to make the storage device and the broadcast program inseparable from use, and when::::: is connected to the user interface to be copied. The terminal man-machine interface determines the number of times the broadcast can be copied = in times, if the number of copies of the rights is not greater than. Once, the 犏 can't be copied. [Embodiment Mode] As shown in Fig. $, a preferred embodiment of the present invention is combined with a diagram, and the computer (2 - ί-η. & another interface (3) and a plurality of human-machine interfaces (4) are used in detail. The 步 步 step storage device (1), a slot case (11) through the three different 1 soldiers of the above two media for data exchange and transmission. Editing steps: the file (11) is attached to the computer (2) After writing and editing the long-style horse, after writing the completed and f-side broadcast, set a record for the slot, = copy the copy number check function of the private case, and finally save it to a sample. For details, please refer to the editing process described later. (See the first figure, which is a preferred embodiment of the present invention.] It can be seen from the figure that the architecture of the present invention can be wounded. , is a portable storage device (200923711 2. setting step: the slot case (11) via the storage device (1)) to the setting terminal man-machine interface (3), and after the wheel person-Mummy mother recorded, and then Step-by-step sets the number of times the broadcast (η) can be copied, and after determining the encryption, the entire storage is shocked and encrypted. For details, see the setting flow chart (fourth figure) described later. = Step: Finally, set the device to (1), and use the man-machine interface of the slot (8); = install the structure (8) with the (10) interface... For details, please refer to the copy flow chart (fifth figure) described later. 々见弟二图' is the internal configuration of the portable storage device inside the portable storage device, mainly ^ - data storage area (9), domain , respectively (Μ). The data storage area (12) two to: two and one times the temporary storage area - use the terminal man-machine interface (4): = save _. ", from the data storage area (8) == = Case (8): Use, · The key area (13) is stored - ^ is determined by 稷 2 to determine the storage key, so that a human interface causes the m 对应 to correspond to the internal storage Broadcasting, 〇4) column ^ The broadcast cannot be used separately, and the number of times in the temporary storage area (u) is copied for the number of times. The human-machine interface (4) is copied before use. Inspection body embodiment:: two: four diagrams and fifth diagram, which is a preferred embodiment of the present invention: see: g into 2 & diagram, setting flow chart Copy Process®. First-Picture-Picture, this is the heart of the (4)(n)--Electric Touch (2) 200923711. Edit the flow chart. Use a program editor (for example, ScreenEditor developed by Delta Electronics) Writing and editing the code (S31), after the code is edited, compiling the file (11) executable by the human machine interface, and setting a key password for it, and then setting whether to start the file The copy number check function of the file. If the file does not start the copy count check function, the file can not be copied in the following setting steps, so that the file cannot be copied. . Finally, the file is stored to a portable storage device (1) (S33) for interconnection with the human interface. The fourth figure is a flow chart of the setting of the file in a set-end human-machine interface in the present invention, when the portable storage device (丨) is connected to a human-machine interface of a setting end (S41), The man-machine interface determines whether the copy number check function of the slot is activated (Activated). If it is not activated, the human machine interface cannot set the number of copies that can be copied. 2 The case cannot be copied. And if the copy number of the (4) is detected, the function can be entered on the man-machine interface to enter the file for the human-machine interface check. When the person (4) confirms the input: Jin Yu is correct. After the error is correct, you can set the money in the next step. When you are sure that you want to encrypt, you will save the password of (4) into the key area of one of the devices, and then save the number of copies. The storage device can not be used separately from the file. When the site is illegally obtained, and the network or other heart is downloaded to the age of _, the machine interface cannot be checked. The health deposit 200923711, therefore (4) can not be copied; If there is a broadcast in the storage device, the gold balance of the file will be the same as that in the storage device: = area k gold material, so that the storage device has no 4: five maps are the slots in the present invention In the case of a portable human-machine copying flow chart, when the portable storage device (1) is connected to two=φ(4), the human-machine interface first checks the storage device 2, and the gold record in the area is If the file is not compatible with the gold output of the slot case, the man-machine interface cannot copy the two. The human-machine interface will check the storage device (1)::: (2 (14), determine whether the file (11) is Is in the form of copyable; "S55" 'that' has at least - the number of times - the number of short: in the number of times in the temporary storage area (14) to determine the (four) (11) = can be secondary, it means the case (ιι) is irreversible: If the number of times of copying is greater than that of the second time, it means the building; it can be controlled. At this time, the number of files (n) will be reduced-, and (4) storage devices (丨) Call, and carry out the slot case (8): The hair: two instances, so the limit can be used to do the setting man-machine interface: setting:: the use of human-machine interface 'Also, you can also use the copy of the human-machine interface to use the human-machine interface == to make a slight adjustment, not to be arrogant, "all changes are included in the scope of the invention 200923711, combined with Chen Ming BRIEF DESCRIPTION OF THE DRAWINGS [Fig. 1] The second figure is a simple architecture diagram of a portable embodiment. The third figure is the second embodiment of the present invention. Figure 4 is an edit flow chart of a preferred embodiment of the present invention. The fifth figure is a flow chart of the setting of the specific embodiment of the present invention. A copy flow chart of a preferred embodiment. Explanation of symbols] 11...Files transfer area 12 14 2 ...Portable storage device...Data storage area 13...Number of temporary storage area...Computer 3...Setting terminal man-machine interface 4...Using human-machine interface S31~S34,S41~ S45, S51 ~ S55 ... steps

Claims (1)

200923711 a) 申請專利範圍: 一種人機介面之檔案複製次數加密方法, ::::使檔案,限制其之可複製次數之加密ί ',、中该檔案係於一外部電腦上編譯完成,# — 被碼金輪’並啟動—複製次數檢查功能,係包= b) c) d) e) f) g) i) 將一儲存裝置規劃成一資半 次數暫存區; 將該槽案儲存至該儲存裝置内之該資料 將該儲存裝置連接至一人機介面; °°, 於該人機介面上輪入一金鑰以供比對; 於步驟d之後’若該金繪比對正確,則可進一 该擋案設定一可複製次數; /手 2驟e之後,進行確定加密之動作,使該金錄存 置内之該金錄區’而該可複製次數存入 置:衣置内之該次數暫存區,藉此,將該刪 正個力1、,致使_存裝置與該㈣無法分開使 用, Ϊ成功讀取該儲存裝置内之該槽案儲存區中之該標 :’則判斷該檔案之可複製次數是否大於〇次; 右該檔案之可複製次動士认η Α 制數大於〇次,將該檔案之可複 衣次數減1 ; 進行該檔案之複製動作; 如申請專利範圍第1項 中^ 唄所述之加费方法,其中步驟C 亥人機介面係為—設定端人機介面。 金輸 12 2. 200923711 3. 如申請專利範圍第2項所述之加密方法,其中該步驟 g係於一使用端人機介面上進行。 4. 如申請專利範圍第1項所述之加密方法,其中步驟c 中之該人機介面係為一使用端人機介面。 5. 如申請專利範圍第4項所述之加密方法,其中該步驟 g係於一設定端人機介面上進行。 6. 如申請專利範圍第1項所述之加密方法,其中該儲存 裝置係為一可攜式之儲存裝置。 7. 如申請專利範圍第6項所述之加密方法,其中該可攜 式之儲存裝置係為一隨身碟。 13200923711 a) Patent application scope: A method for encrypting the number of times of file copying of the human-machine interface, ::::Encrypting the file, limiting the number of times it can be copied ί ', the file is compiled on an external computer, # - coded gold wheel 'and start - copy number check function, package = b) c) d) e) f) g) i) plan a storage device into a half-time temporary storage area; store the slot to the The data in the storage device is connected to a human machine interface; °°, a key is inserted into the human machine interface for comparison; after step d, if the gold painting is correct, Enter a file to set a copyable number; / after 2 steps e, perform the action of determining the encryption, so that the record can be stored in the record area and the number of copies can be stored: the number of times in the clothing a temporary storage area, whereby the positive force is removed, and the storage device cannot be used separately from the (four), and the target in the storage area of the storage device in the storage device is successfully read: ' Whether the number of times the file can be copied is greater than one time; the right file can be copied If the system is more than 〇, the number of recoats of the file is reduced by 1; the copying action of the file is performed; The man-machine interface is the set-end human-machine interface. Gold input 12 2. 200923711 3. The encryption method described in claim 2, wherein the step g is performed on a human-machine interface. 4. The encryption method according to claim 1, wherein the human interface in step c is a user interface. 5. The encryption method of claim 4, wherein the step g is performed on a set-end human-machine interface. 6. The encryption method of claim 1, wherein the storage device is a portable storage device. 7. The encryption method of claim 6, wherein the portable storage device is a flash drive. 13
TW96143755A 2007-11-19 2007-11-19 Method for setting duplication limitation for computer file of human machine interface TWI383309B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96143755A TWI383309B (en) 2007-11-19 2007-11-19 Method for setting duplication limitation for computer file of human machine interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96143755A TWI383309B (en) 2007-11-19 2007-11-19 Method for setting duplication limitation for computer file of human machine interface

Publications (2)

Publication Number Publication Date
TW200923711A true TW200923711A (en) 2009-06-01
TWI383309B TWI383309B (en) 2013-01-21

Family

ID=44728736

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96143755A TWI383309B (en) 2007-11-19 2007-11-19 Method for setting duplication limitation for computer file of human machine interface

Country Status (1)

Country Link
TW (1) TWI383309B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102759898A (en) * 2011-04-29 2012-10-31 台达电子工业股份有限公司 Man-machine interface device and interface integration method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4831890B2 (en) * 2001-07-06 2011-12-07 パナソニック株式会社 Content management method and content management apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102759898A (en) * 2011-04-29 2012-10-31 台达电子工业股份有限公司 Man-machine interface device and interface integration method thereof
CN102759898B (en) * 2011-04-29 2014-07-02 台达电子工业股份有限公司 Man-machine interface device and interface integration method thereof

Also Published As

Publication number Publication date
TWI383309B (en) 2013-01-21

Similar Documents

Publication Publication Date Title
TWI291109B (en) Method and apparatus for storing data records on a database system
US9647992B2 (en) Secure transfer and tracking of data using removable nonvolatile memory devices
JP5036406B2 (en) Content data management system and method
CN107705114A (en) Copyright data processing method, system and storage medium based on block chain technology
JP5043959B2 (en) Digital content rights management method and system
CN101676926B (en) Touch type electronic equipment and its authority control method
BRPI0615099A2 (en) digital platform migration from first platform to second platform
CN103139391B (en) Method and device of permission validating installation or unloading of application program in mobile phone
JP2006164237A (en) User authentication by combination of speaker reference and reverse turing test
TW201743234A (en) Identity authentication method and device
TW201131467A (en) Storage device and method for using a virtual file in a public memory area to access a plurality of protected files in a private memory area
CN103310139A (en) Input validation method and input validation device
CN112673390B (en) Platform and method for content management
CN104537282B (en) It is a kind of that method is licensed based on encryption flash memory disk and big data computing
TW200840306A (en) Methods and apparatuses for binding content to a separate memory device
JP2001036523A (en) Digital data recording and reproduction system
TWI324349B (en) Secure protable storage device and control method for the same
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
TWI222818B (en) Software protection method and device
TW200923711A (en) Method for setting duplication limitation for computer file of human machine interface
TW200928739A (en) Storage device and access authority management system and method used therefor
TW201124874A (en) Method and device for detecting if a computer file has been copied and method and device for enabling such detection
TW200919391A (en) Platform and method for playing a multimedia teaching content
TW200411392A (en) Data protection method and system for storage unit
US20240152632A1 (en) Contents blockchain platform

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees