TW201737151A - Data security system with encryption - Google Patents

Data security system with encryption Download PDF

Info

Publication number
TW201737151A
TW201737151A TW106100149A TW106100149A TW201737151A TW 201737151 A TW201737151 A TW 201737151A TW 106100149 A TW106100149 A TW 106100149A TW 106100149 A TW106100149 A TW 106100149A TW 201737151 A TW201737151 A TW 201737151A
Authority
TW
Taiwan
Prior art keywords
data security
security system
mobile device
server
password
Prior art date
Application number
TW106100149A
Other languages
Chinese (zh)
Other versions
TWI692704B (en
Inventor
蘭夫M 巴露丁
艾力克 雷墨爾
馬可 辛爾
Original Assignee
克萊夫公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/987,749 external-priority patent/US10181055B2/en
Application filed by 克萊夫公司 filed Critical 克萊夫公司
Publication of TW201737151A publication Critical patent/TW201737151A/en
Application granted granted Critical
Publication of TWI692704B publication Critical patent/TWI692704B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.

Description

具有加密性的資料保全系統 Encrypted data security system 相關申請案之交互參照Cross-references to related applications

本案為2010年3月29日提出之同時待審的美國專利申請號12/680,742之部分連續案,本案為2008年9月26日提出之國際申請號PCT/US2008/077766的國家階段,本案主張2007年9月27日提出之美國臨時專利申請序號60/975,814之優惠,並且該臨時專利申請之專利標的在此併入參考。 This case is a partial continuation of the pending US Patent Application No. 12/680,742 filed on March 29, 2010. This case is the national phase of the international application number PCT/US2008/077766 filed on September 26, 2008. The U.S. Provisional Patent Application Serial No. 60/975,814, filed on Sep. 27, 2007, which is incorporated herein by reference.

本專利申請含有由Lev M.Bolotin和Simon B.Johnson所同時提出之標題為”具有加密性的資料保全系統”之美國專利申請之相關的專利標的。該相關的申請係指定給ClevX,LLC並且以案卷編號502-018P-PCT-US.C1所標識。該美國專利申請之專利標的在此併入參考。 This patent application contains the subject matter of the U.S. Patent Application Serial No., the entire disclosure of which is incorporated herein by reference. This related application is assigned to ClevX, LLC and is identified by the docket number 502-018P-PCT-US.C1. The subject matter of this U.S. Patent Application is incorporated herein by reference.

本發明大致係關於電子裝置,並且尤其係關於記憶體裝置。 The present invention generally relates to electronic devices, and more particularly to memory devices.

保全是幾乎所有方面的電腦使用之關鍵性問題。儲存媒介(例如連結至電腦之硬碟)含有有價值的資訊,該資訊易於受到資料竊取。大量的金錢及努力是應用 在保護個人、企業及政府保全資訊。 Preservation is a critical issue in the use of computers in almost all aspects. Storage media (such as hard drives connected to a computer) contain valuable information that is vulnerable to data theft. A lot of money and effort is the application Protecting personal, corporate and government preservation information.

當可攜式記憶體儲存裝置已經變得更小、更容易遺失、更無處不在、更便宜及更大的記憶體容量時,也會造成極大的保全問題。現在能夠秘密地下載大量的資訊至可攜式記憶體儲存裝置內,諸如萬用序列匯流排(USB,Universal Serial Bus)快閃及微型隨身碟、行動電話、攝像機、數位相機、iPOD、MP3/4播放器、智慧手機、掌上及膝上電腦、遊戲設備、認證器、代幣(含有記憶體)等等-通常為,大量儲存裝置(MSD,mass storage device)。 When portable memory storage devices have become smaller, more prone to loss, more ubiquitous, cheaper, and larger memory capacity, they also pose significant security issues. It is now possible to secretly download large amounts of information into portable memory storage devices, such as Universal Serial Bus (USB), flash and mini flash drives, mobile phones, camcorders, digital cameras, iPODs, MP3/ 4 players, smart phones, palm and laptop computers, gaming devices, authenticators, tokens (with memory), etc. - usually, mass storage devices (MSD).

具體而言,有數以百萬計的MSD是使用於備份、轉移、中間儲存器及主儲存器,以供資訊能夠輕易地由電腦下載並帶走。任何MSD之主要目的係在於儲存及提取「可攜式內容」,該「可攜式內容」是僅限於特定所有者而非特定電腦之資料及資訊。 Specifically, millions of MSDs are used in backup, transfer, intermediate storage, and primary storage for information to be easily downloaded and taken away by computers. The primary purpose of any MSD is to store and extract "portable content", which is information and information that is limited to specific owners and not to specific computers.

提供儲存保全之最常見的手法是使用電腦輸入之密碼來認證該使用者。密碼是對照MSD儲存的數值而有效。若發生匹配,則該磁碟機將開啟。或者,該密碼本身是使用作為加密金鑰,用以加密/解密儲存至該MSD內之資料。 The most common way to provide storage security is to authenticate the user with a password entered by the computer. The password is valid against the value stored by the MSD. If a match occurs, the drive will turn on. Alternatively, the password itself is used as an encryption key to encrypt/decrypt data stored in the MSD.

對於支援動態加密之磁碟機,該加密金鑰通常以加密的形式儲存於該媒介上。由於該加密金鑰儲存於該媒介上,所以對於有意規避標準介面而直接讀取該媒介之人士將變得容易取用。因此,密碼是使用作為加密該加密金鑰之金鑰。 For drives that support dynamic encryption, the encryption key is typically stored on the medium in encrypted form. Since the encryption key is stored on the medium, it will be easy for those who directly read the medium to intentionally circumvent the standard interface. Therefore, the password is used as the key to encrypt the encryption key.

對於自我認證的磁碟機,本身的認證次系統是負責用於維持保全。並不需要依賴該磁碟機所連接之主機電腦。因此,密碼無法(或者不需要)由該主機發送藉以解鎖該MSD。事實上,該加密金鑰不再需要儲存在該媒介上。該認證次系統變成用於管理加密金鑰之工具。 For self-certified drives, the own authentication subsystem is responsible for maintaining the security. It does not need to rely on the host computer to which the drive is connected. Therefore, the password cannot be (or is not required to be) sent by the host to unlock the MSD. In fact, the encryption key no longer needs to be stored on the medium. This authentication subsystem becomes a tool for managing encryption keys.

因此,仍然存在用於改良保全之需求。鑑於不斷增加的商業化競爭壓力,結合不斷成長的消費者期望及對於在市場上有意義的產品差異化之該逐漸減少的機會,關鍵在於找到這些問題的答案。此外,降低成本、改善效率及效能及滿足競爭壓力之需求,對於找到這些問題的答案之關鍵必要性甚至增加了更大的急迫性。 Therefore, there is still a need for improved security. Given the ever-increasing commercial competitive pressures, combined with growing consumer expectations and this gradual reduction in product differentiation that is meaningful in the marketplace, the key is to find answers to these questions. In addition, the need to reduce costs, improve efficiency and effectiveness, and meet competitive pressures has even increased the urgency of finding the answers to these questions.

習知該領域者已經長期尋求對於這些問題之解決方法但是先前的開發並未教導或建議任何解決方案,因此,熟習該項技藝之人士已經長期對於這些問題之解決方法束手無策。 It is well known that those in the field have long sought solutions to these problems, but previous developments have not taught or suggested any solutions, and therefore those skilled in the art have long been unable to deal with these problems.

本發明提供一種資料保全系統之操作之方法,包含:提供具有用於與該資料保全系統連接之資料保全系統應用程式的行動裝置;啟動該資料保全系統應用程式;以及維持該資料保全系統與該行動裝置之連接。 The present invention provides a method of operating a data security system, comprising: providing a mobile device having a data security system application for connecting to the data security system; initiating the data security system application; and maintaining the data security system and the The connection of the mobile device.

本發明提供一種資料保全系統,包含:資料保全收發器或接收器;認證次系統,操作上連接至該資料保全收發器或接收器;以及儲存次系統,連接至該認證次系統。 The present invention provides a data security system comprising: a data security transceiver or receiver; an authentication subsystem, operatively coupled to the data security transceiver or receiver; and a storage subsystem coupled to the authentication subsystem.

除了或替代上述提到的目的之外,本發明之特定實施例具有其它目的。當參考附加圖式時,該目的對於熟習該項技藝之人士在閱讀該下列的詳細說明將變得顯而易見。 Specific embodiments of the invention have other objects in addition to or in place of the above-mentioned objects. This will be apparent to those skilled in the art of reading this detailed description.

100‧‧‧資料保全系統 100‧‧‧Data Security System

102‧‧‧外部通訊通道 102‧‧‧External communication channel

104‧‧‧認證次系統 104‧‧‧Certified sub-system

106‧‧‧儲存次系統 106‧‧‧Storage subsystem

108‧‧‧介面控制器 108‧‧‧Interface controller

110‧‧‧加密引擎 110‧‧‧Cryptographic engine

112‧‧‧儲存媒介 112‧‧‧Storage medium

114‧‧‧認證控制器 114‧‧‧Authentication Controller

116‧‧‧加密金鑰 116‧‧‧Encryption Key

118‧‧‧認證金鑰 118‧‧‧Certificate key

120‧‧‧主機電腦系統 120‧‧‧Host computer system

122‧‧‧使用者 122‧‧‧Users

202‧‧‧使用者身份識別 202‧‧‧User identification

206‧‧‧通道 206‧‧‧ channel

300‧‧‧資料保全系統 300‧‧‧Data Security System

301‧‧‧通訊組合 301‧‧‧Communication portfolio

302‧‧‧行動收發器 302‧‧‧Mobile transceiver

304‧‧‧使用者身份識別 304‧‧‧User identification

306‧‧‧資料保全收發器 306‧‧‧Data Security Transceiver

310‧‧‧認證次系統 310‧‧‧Certified Subsystem

320‧‧‧生物識別感測器 320‧‧‧Biometric sensor

322‧‧‧生物識別輸入 322‧‧‧Biometric input

330‧‧‧電機輸入機制 330‧‧‧Motor input mechanism

332‧‧‧唯一碼 332‧‧‧ unique code

400‧‧‧資料保全系統 400‧‧‧Data Security System

402‧‧‧主機應用程式 402‧‧‧Host application

406‧‧‧主機識別碼 406‧‧‧Host ID

408‧‧‧認證次系統 408‧‧‧Certified sub-system

500‧‧‧資料保全方法 500‧‧‧Data preservation method

502‧‧‧步驟方塊 502‧‧‧Steps

504‧‧‧步驟方塊 504‧‧‧Steps

506‧‧‧步驟方塊 506‧‧‧Steps

600‧‧‧資料保全通訊系統 600‧‧‧Data Security Communication System

610‧‧‧行動裝置 610‧‧‧ mobile device

612‧‧‧行動收發器 612‧‧‧Mobile transceiver

614‧‧‧天線 614‧‧‧Antenna

618‧‧‧資料保全系統應用程式 618‧‧‧Data Security System Application

620‧‧‧資料保全系統 620‧‧‧Data Security System

622‧‧‧天線 622‧‧‧Antenna

624‧‧‧資料保全收發器 624‧‧‧Data Security Transceiver

626‧‧‧保全控制器 626‧‧‧Security controller

630‧‧‧主機電腦 630‧‧‧Host computer

640‧‧‧伺服器/控制台 640‧‧‧Server/Console

642‧‧‧使用者管理資料庫 642‧‧‧User Management Database

650‧‧‧雲端 650‧‧‧Cloud

700‧‧‧連接 700‧‧‧Connect

706‧‧‧資料保全系統連接、啟動及發現操作 706‧‧‧Data security system connection, startup and discovery operations

712‧‧‧確認:資料保全系統解鎖訊號 712‧‧‧Confirmation: Data Security System Unlocking Signal

714‧‧‧管理者操作 714‧‧‧Manager operations

716‧‧‧設定其它限制操作 716‧‧‧Set other restrictions

800‧‧‧資料保全系統應用程式啟動操作 800‧‧‧Data Security System Application Startup Operation

802‧‧‧行動裝置ID解鎖訊號 802‧‧‧Mobile device ID unlock signal

804‧‧‧資料保全系統解鎖操作 804‧‧‧Data Security System Unlocking Operation

806‧‧‧確認:資料保全系統解鎖操作 806‧‧‧Confirmation: Data Security System Unlocking Operation

900‧‧‧輸入使用者名稱/密碼操作 900‧‧‧Enter username/password operation

902‧‧‧確認使用者ID訊號 902‧‧‧Confirm user ID signal

904‧‧‧使用者名稱/密碼有效判定 904‧‧‧User name/password valid judgment

906‧‧‧有效使用者訊號 906‧‧‧Active User Signal

908‧‧‧輸入PIN操作 908‧‧‧Enter PIN operation

910‧‧‧確認解鎖訊號 910‧‧‧Check the unlock signal

912‧‧‧使用者授權判定 912‧‧‧User authorization decision

914‧‧‧解鎖允許訊號 914‧‧‧Unlock the allowed signal

916‧‧‧解鎖請求訊號 916‧‧‧Unlock request signal

1000‧‧‧解鎖特定資料保全系統操作 1000‧‧‧Unlock specific data security system operation

1002‧‧‧獲得的位置及/或目前的時間操作 1002‧‧‧Location and/or current time operation

1004‧‧‧確認解鎖訊號 1004‧‧‧ Confirm unlock signal

1006‧‧‧條件符合判定 1006‧‧‧ conditions meet the judgment

1008‧‧‧解鎖允許訊號 1008‧‧‧Unlock the allowed signal

1010‧‧‧確認解鎖訊號 1010‧‧‧Check the unlock signal

1012‧‧‧資料保全系統允許判定 1012‧‧‧Data security system allows for judgment

1100‧‧‧任何指令等待訊號 1100‧‧‧ Any instruction waiting signal

1102‧‧‧重置指令判定 1102‧‧‧Reset command determination

1104‧‧‧執行重置訊號 1104‧‧‧Reset the reset signal

1106‧‧‧重置保全糸統訊號 1106‧‧‧Reset the security signal

1108‧‧‧資料保全系統重置操作 1108‧‧‧Data Security System Reset Operation

1110‧‧‧確認:資料保全系統重置訊號 1110‧‧‧Confirmation: Data Security System Reset Signal

1112‧‧‧確認:資料保全系統重置操作 1112‧‧‧Confirmation: Data Security System Reset Operation

1200‧‧‧解鎖 1200‧‧‧Unlock

1202‧‧‧管理者的密碼解鎖訊號 1202‧‧‧Administrator's password unlocking signal

1204‧‧‧管理者的密碼解鎖訊號 1204‧‧‧Manager's password unlock signal

1300‧‧‧變更密碼判定 1300‧‧‧Change password judgment

1302‧‧‧變更使用者密碼訊號 1302‧‧‧Change User Password Signal

1304‧‧‧變更使用者密碼訊號 1304‧‧‧Change user password signal

第1圖為依據本發明之實施例之資料保全系統之示意圖;第2圖為使用該資料保全系統之認證金鑰交付方法之說明;第3圖為用於讓該使用者與該資料保全系統互動之不同系統之說明;第4圖為該使用者如何能夠使用該主機電腦系統以與資料保全系統互動之說明;以及第5圖為使用用於該資料保全系統之使用者確認之資料保全方法。 1 is a schematic diagram of a data security system according to an embodiment of the present invention; FIG. 2 is a description of a method for delivering a certification key using the data security system; and FIG. 3 is a diagram for the user and the data security system. Description of the different systems of interaction; Figure 4 is a description of how the user can use the host computer system to interact with the data security system; and Figure 5 is a data retention method for user confirmation using the data security system .

第6圖為例示性的資料保全通訊系統。 Figure 6 is an exemplary data security communication system.

第7圖為顯示在行動裝置與該資料保全系統之間之操作的順序之管理者排序圖。 Figure 7 is a manager ranking diagram showing the sequence of operations between the mobile device and the data security system.

第8圖為該行動裝置是認證因素之解鎖排序圖。 Figure 8 is an unlocked sequence diagram of the mobile device as an authentication factor.

第9圖為顯示由該行動裝置使用PIN輸入而解鎖之解鎖排序圖。 Figure 9 is an unlocking sequence diagram showing the unlocking by the mobile device using the PIN input.

第10圖為經由該伺服器/控制台使用PIN輸入及使用者ID/位置/時間確認而解鎖之解鎖排序圖。 Figure 10 is an unlocking sequence diagram of unlocking via the server/console using PIN input and user ID/position/time confirmation.

第11圖為顯示使用伺服器/控制台重置該資料保全系統之重置排序圖。 Figure 11 is a diagram showing the reset sequence of resetting the data security system using the server/console.

第12圖為顯示使用該伺服器/控制台解鎖該資料保全系統之解鎖排序圖。 Figure 12 is a diagram showing the unlocking sequence of unlocking the data security system using the server/console.

第13圖為使用該伺服器/控制台之改變使用者的密碼排序圖。 Figure 13 is a sequence diagram of the password change user using the server/console.

下列實施例將以充分詳細的方式作描述以使得熟悉該項技藝之人士製作及使用本發明。應該瞭解的是,其它實施例依據本發明揭露將是顯而易見的,並且可在不違反本發明之範疇的情況下對系統、製程或機構做出改變。 The following examples are described in sufficient detail to enable those skilled in the art to make and use the invention. It will be appreciated that other embodiments will be apparent in light of the present disclosure, and that changes may be made to the system, process or mechanism without departing from the scope of the invention.

在下列的描述中,將給定各種特定的細節以提供本發明之完整的瞭解。然而,將顯而易見的是,本發明可以在未具有這些特定的細節下而實施。為了避免模糊本發明,某些已知的電路、系統配置及製程步驟並未做詳細揭露。 In the following description, numerous specific details are set forth to provide a complete understanding of the invention. However, it will be apparent that the invention may be practiced without these specific details. In order to avoid obscuring the present invention, certain known circuits, system configurations, and process steps have not been disclosed in detail.

同樣地,該系統之顯示實施例之圖式為半圖解及未按照比例,並且尤其,某些尺寸是為了明確呈現及誇大顯示於該圖式中。其中多個實施例為揭露及描述具有某些共同的特徵,為了該實施例之明確及容易說明、描述及理解,彼此類似及相似的特徵一般將以類似或相同的元件符號作描述。同樣地,雖然在該圖式中之視圖為了容易說明通常顯示類似的方向,但在該圖式中之說明對於大多 數部分是任意方向的。通常,本發明可以以任何方向來進行。 Also, the drawings of the system are shown in the drawings and are not to scale, and in particular, some of the dimensions are shown for clarity and exaggeration. Features of the various embodiments that are similar and similar are generally described with the same or similar elements. Similarly, although the views in this figure generally show similar directions for ease of explanation, the description in the drawings is mostly for The number is in any direction. Generally, the invention can be carried out in any orientation.

在此所使用之名詞「系統」係依據該名詞所使用之上下文而意指及定義為本發明之該方法及該裝置。在此所使用之名詞「方法」係意指及定義為裝置之操作步驟。 The term "system" as used herein is used to mean and define the method and apparatus of the present invention in accordance with the context in which the term is used. The term "method" as used herein is intended to mean and define the operational steps of the device.

為求便利性及不做限制性,名詞「資料」是定義為能夠藉由電腦產生或儲存於電腦中之資訊。名詞「資料保全系統」是定義為意指合併儲存媒介之任何可攜式記憶體裝置。在此所使用之名詞「儲存媒介」意指及定義為任何固態、反及閘快閃及/或磁性資料記錄系統。名詞「上鎖」意指當儲存媒介不可存取時之資料保全系統並且名詞「解鎖」意指當儲存媒介是可存取時之資料保全系統。 For convenience and non-restrictive purposes, the term "data" is defined as information that can be generated by a computer or stored on a computer. The term "data security system" is defined as any portable memory device that is meant to be a combined storage medium. The term "storage medium" as used herein means and is defined as any solid state, anti-gate flash and/or magnetic data recording system. The term "locked" means the data security system when the storage medium is inaccessible and the term "unlocked" means the data security system when the storage medium is accessible.

通常有兩種方法防止儲存裝置篡改: There are usually two ways to prevent storage device tampering:

1.塗敷環氧樹脂於組件上-塗敷至印刷電路板之環氧樹脂可以使得在不破壞儲存媒介之情況下拆解該儲存裝置變得困難。 1. Coating Epoxy on the Assembly - The epoxy applied to the printed circuit board can make it difficult to disassemble the storage device without damaging the storage medium.

2.加密記憶體資料-當資料寫入儲存媒介時對資料進行加密並且該資料需要加密金鑰才得以解密。 2. Encrypted Memory Data - Encrypts the data as it is written to the storage medium and the data requires an encryption key to be decrypted.

現參考第1圖,其中依據本發明之實施例顯示資料保全系統100之示意圖。該資料保全系統100由外部通訊通道102、認證次系統104及儲存次系統106所組成。 Referring now to Figure 1, a schematic diagram of a data security system 100 is shown in accordance with an embodiment of the present invention. The data security system 100 is comprised of an external communication channel 102, an authentication subsystem 104, and a storage subsystem 106.

該儲存次系統106為包含介面控制器108、 加密引擎110及儲存媒介112之電子電路。該儲存媒介112可以是內部或外部硬碟、USB快閃隨身碟、固態硬碟、複合磁碟機、記憶卡、卡式磁帶及包含光碟(例如,藍光光碟、數位多功能影音光碟或DVD及雷射唱片或CD)之光學媒介。該儲存媒介112可以包含資料保護應用、檔案儲存系統及雲端資料儲存系統。該雲端資料儲存系統可以是使用插件(plug-in或“plugin”)應用或安裝在瀏覽器內之擴充軟體而存取,不論是在該主機電腦上或經由有線或無線網路(諸如射頻或光學)、或者透過全球資訊網(World Wide Web)連接至該主機電腦之另一個系統上。 The storage subsystem 106 is configured to include an interface controller 108, Encryption engine 110 and electronic circuitry of storage medium 112. The storage medium 112 can be an internal or external hard drive, a USB flash drive, a solid state drive, a composite drive, a memory card, a cassette, and a compact disc (eg, a Blu-ray disc, a digital versatile disc or a DVD). Optical media for compact discs or CDs. The storage medium 112 can include a data protection application, an archive storage system, and a cloud data storage system. The cloud data storage system can be accessed using a plug-in or "plugin" application or an extension software installed in the browser, either on the host computer or via a wired or wireless network (such as a radio frequency or Optical), or connected to another system on the host computer via the World Wide Web.

介面控制器108包含電子組件,諸如具有軟體或硬體之加密引擎110的微控制器,但該加密引擎110也可以是在儲存次系統106中不同的控制器內。 The interface controller 108 includes electronic components, such as a microcontroller with a software or hardware encryption engine 110, but the encryption engine 110 may also be within a different controller in the storage subsystem 106.

該認證次系統104為包含認證控制器114(諸如微控制器)之電子電路,該認證控制器114可以具有屬於自己的非揮發性記憶體,諸如電子可抹除可程式化唯讀記憶體(EEPROM,Electrically Erasable Programmable Read-Only Memory)。 The authentication subsystem 104 is an electronic circuit including an authentication controller 114 (such as a microcontroller), which may have its own non-volatile memory, such as an electronic erasable programmable read-only memory ( EEPROM, Electrically Erasable Programmable Read-Only Memory).

該外部通訊通道102提供與主機電腦系統120交換資料之工具。萬用序列匯流排(USB)為連接該資料保全系統100至該主機電腦系統120的其中一個最普遍的工具。該外部通訊通道102之其它例子包含火線(Firewire)、無線USB、序列ATA(SATA)、高畫質多媒體介面(HDMI,High Definition Multimedia Interface)、推 薦標準232(RS-232,Recommended Standard 232)及射頻無線網路。 The external communication channel 102 provides a means of exchanging data with the host computer system 120. The Universal Serial Bus (USB) is one of the most common tools for connecting the data security system 100 to the host computer system 120. Other examples of the external communication channel 102 include Firewire, Wireless USB, Serial ATA (SATA), High Definition Multimedia Interface (HDMI), Push Recommended standard 232 (RS-232, Recommended Standard 232) and RF wireless network.

該介面控制器108是能夠將USB封包資料轉譯成為可以寫入USB快閃隨身碟中之該儲存媒介112的資料。 The interface controller 108 is capable of translating USB packet data into the storage medium 112 that can be written to the USB flash drive.

該加密引擎110是實作該介面控制器108之一部分並且從該主機電腦系統120取得明確的文字及/或資料(資訊)然後轉換該文字及/或資料成為寫入該MSD或該儲存媒介112之加密形式。該加密引擎110亦將來自該儲存媒介112之加密資訊轉換並且解密成為明確的資訊給該主機電腦系統120。該加密引擎110亦可以是一個雙控制器次系統,其具有:加密控制器,具有動態加密/解密資料連同管理通訊協定、記憶體及其它操作條件的加密能力;以及通訊/保全控制器,用於處理該通訊、加密金鑰管理及與該加密控制器通訊。 The encryption engine 110 is implemented as part of the interface controller 108 and retrieves explicit text and/or data (information) from the host computer system 120 and then converts the text and/or data into the MSD or the storage medium 112. The form of encryption. The encryption engine 110 also converts and decrypts the encrypted information from the storage medium 112 into explicit information to the host computer system 120. The encryption engine 110 can also be a dual controller subsystem with an encryption controller having dynamic encryption/decryption data along with encryption capabilities for managing communication protocols, memory and other operating conditions, and a communication/security controller. Processing the communication, encryption key management and communication with the encryption controller.

加密引擎110需要加密金鑰116來加密/解密資訊。該加密金鑰116是使用於一種演算法(例如,256位元高級加密標準(AES,Advanced Encryption Standard)加密)中,該演算法藉由加密演算法分別地加密/解密資料以使資料成為不可讀的或可讀的。該加密金鑰116可以儲存至該認證控制器114內部或外部。 The encryption engine 110 requires an encryption key 116 to encrypt/decrypt information. The encryption key 116 is used in an algorithm (for example, 256-bit Advanced Encryption Standard (AES) encryption), which encrypts/decrypts data separately by an encryption algorithm to make the data impossible. Read or readable. The encryption key 116 can be stored internal or external to the authentication controller 114.

一旦具有身份識別號碼或金鑰之使用者122已經對照認證金鑰118進行確認,該加密金鑰116就會藉由該認證次系統104傳輸至該加密引擎110。 Once the user 122 with the identification number or key has confirmed against the authentication key 118, the encryption key 116 is transmitted to the encryption engine 110 by the authentication subsystem 104.

已經發現到,藉由使用該認證金鑰118及該加密金鑰116,本發明之各種實施例之可攜式記憶體儲存裝置可以提供先前在此類裝置中無法獲得之極高程度的保全。 It has been discovered that by using the authentication key 118 and the encryption key 116, the portable memory storage devices of various embodiments of the present invention can provide a very high degree of security that was previously unavailable in such devices.

當該資料保全系統100被上鎖時,該認證金鑰118仍然在該認證次系統104內部並且無法由外部讀取。隱藏該認證金鑰118的其中一個方法是將該認證金鑰118儲存於該認證次系統104內之該認證控制器114中。該認證控制器114設置安全熔絲使得無法存取該認證金鑰118,除非該使用者122已被確認時該認證控制器114允許提取。很多微控制器配備有當燒斷時避免存取任何內部記憶體之安全熔絲。這是眾所周知及廣泛使用的保全特徵。此類微控制器可以使用於該認證控制器114。該認證控制器114可以是微控制器或微處理器。 When the data security system 100 is locked, the authentication key 118 is still internal to the authentication subsystem 104 and cannot be read externally. One method of hiding the authentication key 118 is to store the authentication key 118 in the authentication controller 114 within the authentication subsystem 104. The authentication controller 114 sets a security fuse such that the authentication key 118 cannot be accessed unless the user 122 has been confirmed that the authentication controller 114 allows extraction. Many microcontrollers are equipped with a safety fuse that avoids accessing any internal memory when blown. This is a well-known and widely used security feature. Such a microcontroller can be used with the authentication controller 114. The authentication controller 114 can be a microcontroller or a microprocessor.

該認證金鑰118可以用作為數種功能形式: The authentication key 118 can be used in several functional forms:

1.作為該加密金鑰116,用以直接加密/解密該資訊。 1. As the encryption key 116, it is used to directly encrypt/decrypt the information.

2.作為金鑰,用以回復儲存於可以由該介面控制器108所存取之該資料保全系統100中之該加密金鑰116。 2. As a key, to reply to the encryption key 116 stored in the data security system 100 that is accessible by the interface controller 108.

3.用於供該介面控制器108直接比較以啟動該外部通訊通道102。 3. Used for direct comparison by the interface controller 108 to activate the external communication channel 102.

現參考第2圖,其中顯示配合該資料保全系統100所使用之認證金鑰交付方法之說明。在這個說明中,該認證金鑰118及該加密金鑰116合在一起並且相同。該加密引擎110使用該認證金鑰118作為該加密金鑰116。 Referring now to Figure 2, there is shown a description of the authentication key delivery method used in conjunction with the data security system 100. In this illustration, the authentication key 118 and the encryption key 116 are combined and identical. The encryption engine 110 uses the authentication key 118 as the encryption key 116.

該使用者122必須藉由提供使用者身份識別202、號碼或金鑰至該認證次系統104而與該認證次系統104互動。該認證次系統104對照該認證金鑰118驗證該使用者122。該認證次系統104接著傳輸該認證金鑰118作為該加密金鑰116至該介面控制器108。 The user 122 must interact with the authentication subsystem 104 by providing a user identity 202, number or key to the authentication subsystem 104. The authentication subsystem 104 verifies the user 122 against the authentication key 118. The authentication subsystem 104 then transmits the authentication key 118 as the encryption key 116 to the interface controller 108.

在該介面控制器108中之該加密引擎110使用該認證金鑰118以沿著通道206將明確的資訊轉換成為加密的資訊及將加密的資訊轉換成為明確的資訊。在沒有該加密金鑰116的情況下,任何從該儲存媒介112讀取加密資訊的嘗試通常會造成任何電腦無法採用之資訊。 The encryption engine 110 in the interface controller 108 uses the authentication key 118 to convert explicit information along the channel 206 into encrypted information and to convert the encrypted information into explicit information. In the absence of the encryption key 116, any attempt to read encrypted information from the storage medium 112 will typically result in information that is not available to any computer.

現參考第3圖,其中顯示供該使用者122與資料保全系統300互動之不同的系統。該互動可以是藉由通訊組合301,該通訊組合301可以是與行動電話、智慧手機、智能手錶、穿戴應用或其它無線裝置之實體接觸、有線連接或無線連接。 Referring now to Figure 3, there is shown a different system for the user 122 to interact with the data security system 300. The interaction may be through a communication combination 301, which may be an entity contact, wired connection, or wireless connection with a mobile phone, smart phone, smart watch, wearable application, or other wireless device.

在其中一個認證系統中,行動收發器302係用以傳輸使用者身份識別304至位於認證次系統310中之資料保全收發器306。為了例示性之目的,收發器是用於雙向通訊的靈活性,但是也可使用單向的傳輸之發送器-接收器組合。該認證次系統310包含該認證控制器114,該認證控制器114是連接至位於該儲存次系統106中之該介面控制器108。該使用者身份識別304是藉由來自該資料保全系統300之該儲存次系統106外部之該行動收發器302提供至該認證次系統310內之該資料保全收發器306。 該無線通訊可以包含無線保真(WiFi,Wireless Fidelity)、藍芽(BT,Bluetooth)、藍芽智能、近場通訊(NFC,Near Field Communication)、全球定位系統(GPS,Global Positioning System)、光學、行動通訊(例如,長期演進技術(LTE,Long-Term Evolution)、先進長期演進技術(LTE-A,Long-Term Evolution Advanced))、分碼多重存取(CDMA,Code Division Multiple Access)、寬頻分碼多重存取(WCDMA,Wideband Code Division Multiple Access)、通用移動電信系統(UMTS,Universal Mobile Telecommunications System)、無線寬帶(WiBro,Wireless Broadband)或全球移動通訊系統(GSM,Global System for Mobile Communications)及類似技術。 In one of the authentication systems, the mobile transceiver 302 is configured to transmit the user identity 304 to the data security transceiver 306 located in the authentication subsystem 310. For illustrative purposes, the transceiver is flexible for two-way communication, but a one-way transmitter-receiver combination can also be used. The authentication subsystem 310 includes the authentication controller 114 that is coupled to the interface controller 108 located in the storage subsystem 106. The user identity 304 is provided to the data security transceiver 306 within the authentication subsystem 310 by the mobile transceiver 302 from outside the storage subsystem 106 of the data security system 300. The wireless communication can include Wireless Fidelity (WiFi), Bluetooth (Broadcast), Bluetooth Smart, Near Field Communication (NFC), Global Positioning System (GPS), optical , mobile communications (for example, Long-Term Evolution (LTE), Long-Term Evolution Advanced (LTE-A), CDMA (Code Division Multiple Access), broadband WCDMA (Wideband Code Division Multiple Access), Universal Mobile Telecommunications System (UMTS), Wireless Broadband (WiBro) or Global System for Mobile Communications (GSM) And similar technologies.

該認證次系統310藉由從對照該認證金鑰118而被驗證之該行動收發器302所發送之碼而驗證對照該認證金鑰118之該使用者122。該認證次系統310接著跨越該通訊組合301傳輸該加密金鑰116給該介面控制器108。 The authentication subsystem 310 verifies the user 122 against the authentication key 118 by the code transmitted by the mobile transceiver 302 that is verified against the authentication key 118. The authentication subsystem 310 then transmits the encryption key 116 to the interface controller 108 across the communication combination 301.

該加密引擎110接著使用該加密金鑰116沿著該通道206以將明確的資訊轉換成為加密的資訊及將加密的資訊轉換成為明確的資訊。在沒有該加密金鑰116的情況下,任何從該儲存媒介112讀取加密資訊的嘗試都會造成該主機電腦系統120無法使用之資訊。 The encryption engine 110 then uses the encryption key 116 along the channel 206 to convert the unambiguous information into encrypted information and to convert the encrypted information into explicit information. In the absence of the encryption key 116, any attempt to read encrypted information from the storage medium 112 will result in information that is not available to the host computer system 120.

在視需要的第二認證機制中,藉由讓該使用者122使用生物識別感測器320提供生物識別輸入322而 確認他/她的身份識別是授權的使用者,該認證次系統310便能對照該認證金鑰118驗證該使用者122。生物識別的類型包含指紋、虹膜掃描、聲紋等等。 In the second authentication mechanism as needed, the user 122 is provided with the biometric input 322 using the biometric sensor 320. Acknowledging that his/her identity is an authorized user, the authentication subsystem 310 can verify the user 122 against the authentication key 118. Types of biometrics include fingerprints, iris scans, voiceprints, and more.

在視需要的第三認證機制中,藉由讓該使用者122使用電機輸入機制330提供唯一碼332而確認他/她的身份識別是授權的使用者,該認證次系統310便能對照該認證金鑰118驗證該使用者122。該唯一碼331可以包含數字碼、字母與數字組成的碼或字母碼,例如PIN。該電機輸入機制330是位在該認證次系統310內部。該電機輸入機制330從該資料保全系統300外部接收來自該使用者122之唯一碼332。該唯一碼332是提供給位在該資料保全系統300之該儲存次系統106外部之該認證次系統310內之該電機輸入機制330。 In the third authentication mechanism as needed, by having the user 122 provide the unique code 332 using the motor input mechanism 330 to confirm that his/her identity is an authorized user, the authentication subsystem 310 can compare the authentication. The key 118 verifies the user 122. The unique code 331 may contain a code consisting of a digital code, a letter and a number, or a letter code, such as a PIN. The motor input mechanism 330 is located within the authentication subsystem 310. The motor input mechanism 330 receives a unique code 332 from the user 122 from outside the data security system 300. The unique code 332 is the motor input mechanism 330 provided to the authentication subsystem 310 external to the storage subsystem 106 of the data security system 300.

不論使用哪個方法驗證該使用者122,該認證金鑰118及該加密金鑰116仍然維持隱藏直到該使用者獲得授權。 Regardless of which method is used to authenticate the user 122, the authentication key 118 and the encryption key 116 remain hidden until the user is authorized.

現參考第4圖,其中顯示該使用者122如何可以使用該主機電腦系統120與資料保全系統400互動之說明。 Referring now to Figure 4, there is shown a description of how the user 122 can use the host computer system 120 to interact with the data security system 400.

該主機電腦系統120設有主機應用程式402。該主機應用程式402為軟體或靭體,透過該資料保全系統400之外部通訊通道102進行通訊。 The host computer system 120 is provided with a host application 402. The host application 402 is a software or firmware, and communicates through the external communication channel 102 of the data security system 400.

該主機應用程式402交付與其環境相關聯之主機識別碼406,諸如內部組件序號(例如,硬碟)、網路 卡之媒體存取控制(MAC,Media Access Control)位址、使用者之登入名稱、網際網路協定(IP,Internet Protocol)位址、由該資料保全系統所建立並儲存至該主機之ID、由該資料保全系統所建立並儲存至該網路之ID等等。該主機識別碼406是由位於該資料保全系統400中之認證次系統408所使用。 The host application 402 delivers a host identification code 406 associated with its environment, such as internal component serial numbers (eg, hard drives), networks The media access control (MAC) address of the card, the login name of the user, the Internet Protocol (IP) address, the ID established by the data security system and stored to the host, The ID established by the data security system and stored to the network, and the like. The host identification code 406 is used by the authentication subsystem 408 located in the data security system 400.

當該認證次系統408藉由確認該主機識別碼406而對照該認證金鑰118驗證該使用者122時,該資料保全系統400將解鎖。 When the authentication subsystem 408 verifies the user 122 against the authentication key 118 by validating the host identification code 406, the data security system 400 will be unlocked.

例如,使用者122將被上鎖之資料保全系統400連接至主機電腦系統120。主機應用程式402發送本身的網路卡之MAC位址給該資料保全系統400。該資料保全系統400認知這個MAC位址是合法的並解鎖而不需要第1圖之該使用者122必須輸入使用者身份識別。這種實作並不需要與該使用者122做任何互動。在這個例子中,被驗證的是該主機電腦系統120以及與其相關聯的環境。 For example, user 122 connects the locked data security system 400 to host computer system 120. The host application 402 sends the MAC address of its own network card to the data security system 400. The data security system 400 recognizes that the MAC address is legitimate and unlocks the user 122 that does not require the first picture to enter the user identity. This implementation does not require any interaction with the user 122. In this example, the host computer system 120 and the environment associated therewith are verified.

該資料保全系統400包含:提供儲存於該認證次系統104內之該認證金鑰118;藉由該認證次系統104提供該主機電腦系統120之確認;藉由該認證次系統104提交該保加密金鑰116給該儲存次系統106;以及藉由該儲存次系統106解密該儲存媒介內容而提供存取該儲存媒介112。 The data security system 400 includes: providing the authentication key 118 stored in the authentication subsystem 104; providing the confirmation of the host computer system 120 by the authentication subsystem 104; and submitting the encryption by the authentication subsystem 104 The key 116 is provided to the storage subsystem 106; and the storage medium 112 is accessed by the storage subsystem 106 to decrypt the storage medium.

該資料保全系統更包含用於判讀該生物識別輸入並確認該使用者122的該認證次系統104。 The data security system further includes the authentication subsystem 104 for interpreting the biometric input and confirming the user 122.

該資料保全系統更包含直接使用該認證金鑰118作為該加密金鑰116。 The data security system further includes directly using the authentication key 118 as the encryption key 116.

該資料保全系統更包含使用該認證金鑰118以解密及提取用以解碼內部內容的該加密金鑰116。 The data security system further includes the use of the authentication key 118 to decrypt and extract the encryption key 116 for decoding internal content.

該資料保全系統更包含用於判讀訊號輸入及確認發送單元的該認證次系統104。 The data security system further includes the authentication subsystem 104 for interpreting the signal input and confirming the transmitting unit.

該資料保全系統更包含用於判讀人工鍵入的輸入並確認該使用者122的該認證次系統104。 The data security system further includes an authentication sub-system 104 for interpreting the input of the manual input and confirming the user 122.

該資料保全系統更包含用於判讀由主機常駐軟體應用程式所發送之輸入來確認該主機電腦系統120的該認證次系統104。 The data security system further includes the authentication subsystem 104 for interpreting the input sent by the host resident software application to confirm the host computer system 120.

該資料保全系統更包含在該介面控制器108外部但連接至該外部通訊通道102之該加密引擎110,用於將明確資料轉換成為加密資料以用於解鎖該資料保全系統100。 The data security system is further included in the encryption engine 110 external to the interface controller 108 but connected to the external communication channel 102 for converting explicit data into encrypted data for unlocking the data security system 100.

現參考第5圖,其中顯示針對該資料保全系統100之使用者確認之資料保全方法500。該資料保全方法500包含:在步驟方塊502中對照認證金鑰而確認使用者;在步驟方塊504中使用該認證金鑰用於提取加密金鑰;以及在步驟方塊506中使用該加密金鑰用於透過在主機電腦系統與儲存媒介之間之儲存次系統允許未加密的通訊。 Referring now to Figure 5, there is shown a data security method 500 for user confirmation of the data security system 100. The data preservation method 500 includes: confirming the user against the authentication key in step 502; using the authentication key in step 504 for extracting the encryption key; and using the encryption key in step 506 Unencrypted communication is allowed through the secondary system of storage between the host computer system and the storage medium.

現參考第6圖,其中顯示例示性的資料保全通訊系統600。例示性的資料保全通訊系統600包含行動 裝置610、資料保全系統620、主機電腦630及伺服器/控制台640。該行動裝置610及該伺服器/控制台640是透過雲端650而以有線或無線方式連接,該雲端650可以是網際網路雲端。該行動裝置610及該資料保全系統620是藉由該通訊組合301所連接。 Referring now to Figure 6, an exemplary data security communication system 600 is shown. An exemplary data security communication system 600 contains actions The device 610, the data security system 620, the host computer 630, and the server/console 640. The mobile device 610 and the server/console 640 are connected by wire or wirelessly through the cloud 650, and the cloud 650 can be an internet cloud. The mobile device 610 and the data security system 620 are connected by the communication combination 301.

在該例示性的資料保全通訊系統600中,該通訊組合301包含位於該行動裝罝610中之行動收發器612,其具有天線614與位在該資料保全系統620中之資料保全收發器624之天線622無線地通訊。 In the exemplary data security communication system 600, the communication assembly 301 includes a mobile transceiver 612 located in the mobile device 610 having an antenna 614 and a data security transceiver 624 located in the data security system 620. Antenna 622 communicates wirelessly.

在其中一項實施例中,該行動裝置610可以是智慧手機。在該行動裝置610中,該行動收發器612可以連接至習知的行動裝置組件及連接至資料保全系統應用程式618,該行動收發器612提供資訊給該資料保全系統620使用。 In one of the embodiments, the mobile device 610 can be a smart phone. In the mobile device 610, the mobile transceiver 612 can be coupled to a conventional mobile device component and to a data security system application 618 that provides information to the data security system 620 for use.

該資料保全收發器624是連接至保全控制器626,該保全控制器626可以含有身份識別、密碼、個人資料或包含可以存取該資料保全系統620之不同的行動裝置之資訊。該保全控制器626為連接至類似該認證次系統310、該儲存次系統106(在某些實施例中,該儲存次系統106可以具有加密以加密資料)及該外部通訊通道102之次系統。 The data security transceiver 624 is coupled to the security controller 626, which may contain identification, passwords, personal data, or information including different mobile devices that can access the data security system 620. The security controller 626 is coupled to a system similar to the authentication subsystem 310, the storage subsystem 106 (in some embodiments, the storage subsystem 106 can have encryption to encrypt data) and the external communication channel 102.

該外部通訊通道102可連接至該主機電腦630以允許在特定環境下存取在該儲存次系統106中之資料。 The external communication channel 102 can be coupled to the host computer 630 to allow access to data in the storage subsystem 106 in a particular environment.

該資料保全系統620之其中一項實施例可以僅利用無線連接至該行動裝置610,諸如智慧手機,從而消除第3圖之該生物識別感測器320及該電機輸入機制330。已經發現到,這種實作使得該資料保全系統620更加安全及有用。 One of the embodiments of the data security system 620 can utilize wireless connection to the mobile device 610, such as a smart phone, thereby eliminating the biometric sensor 320 of FIG. 3 and the motor input mechanism 330. It has been found that this implementation makes the data security system 620 more secure and useful.

該資料保全系統應用程式618允許該行動裝置610找到位在該行動裝置610附近之所有資料保全系統並且顯示出他們的狀態(上鎖/解鎖/空白、配對/未配對等等)。 The data security system application 618 allows the mobile device 610 to find all data security systems located near the mobile device 610 and display their status (locked/unlocked/blank, paired/unpaired, etc.).

該資料保全系統應用程式618允許該行動裝置610連接/配對、上鎖、解鎖、改變名稱及密碼,並且重置位在該資料保全系統620上之所有資料。 The data security system application 618 allows the mobile device 610 to connect/pair, lock, unlock, change names and passwords, and reset all data located on the data security system 620.

該資料保全系統應用程式618允許該行動裝置610設定閒置自動上鎖(inactivity auto-lock),以便在預定的閒置時間週期後使該資料保全系統620自動地上鎖,或者設定感應自動上鎖(proximity auto-lock),使得當該行動裝置610沒有位於預定感應距離內持續預定的時間週期時,該資料保全系統620將會上鎖(以改良可靠度及避免訊號彈跳)。 The data security system application 618 allows the mobile device 610 to set an inactivity auto-lock to automatically lock the data security system 620 after a predetermined idle time period, or to set the induction auto-lock (proximity) Auto-lock) such that when the mobile device 610 is not within the predetermined sensing distance for a predetermined period of time, the data security system 620 will be locked (to improve reliability and avoid signal bounce).

該資料保全系統應用程式618允許該行動裝置610記住密碼、使用TouchID及Apple手錶(在此所提及的TouchID及Apple手錶兩者僅為例子,有很多能夠以類似模式使用之具有生物識別感測器及可穿戴裝置的其它行動裝置)以便資料保全系統620可以解鎖而不需要在該 行動裝置上輸入重新進入的密碼。 The data security system application 618 allows the mobile device 610 to remember passwords, use TouchIDs, and Apple watches (both the TouchID and Apple watches mentioned herein are merely examples, and there are many biometrics that can be used in a similar mode. The detector and other mobile devices of the wearable device) so that the data security system 620 can be unlocked without the need for Enter the re-entered password on the mobile device.

該資料保全系統應用程式618允許該行動裝置610經由設定使得僅與特定的行動裝置產生操作,諸如該行動裝置610,以便該資料保全系統620無法用其它行動裝置解鎖(1Phone)。 The data security system application 618 allows the mobile device 610 to be configured to cause operations only with a particular mobile device, such as the mobile device 610, such that the data security system 620 cannot be unlocked (1Phone) with other mobile devices.

該資料保全系統應用程式618允許該行動裝置610設定該資料保全系統620為唯讀。 The data security system application 618 allows the mobile device 610 to set the data security system 620 to be read only.

該資料保全系統應用程式618允許該行動裝置610以使用者模式或管理者模式(管理者的模式覆蓋使用者的設定)操作並且使用該伺服器/控制台640。該伺服器/控制台640為電腦與控制台的組合,該控制台用於輸入資訊進入該電腦。 The data security system application 618 allows the mobile device 610 to operate and use the server/console 640 in a user mode or an administrator mode (the mode of the administrator overrides the settings of the user). The server/console 640 is a combination of a computer and a console for entering information into the computer.

該伺服器/控制台640含有使用者管理資料庫642,該使用者管理資料庫642含有可以經由雲端650傳輸至該行動裝置610之額外資訊,以提供額外的功能性給該行動裝置610。 The server/console 640 includes a user management repository 642 that contains additional information that can be transmitted to the mobile device 610 via the cloud 650 to provide additional functionality to the mobile device 610.

該使用者管理資料庫642允許該伺服器/控制台640建立及確認使用UserID(使用者名稱及密碼)之使用者及阻擋/允許解鎖該資料保全系統620及提供遠端輔助。 The user management repository 642 allows the server/console 640 to establish and confirm users who use the UserID (username and password) and block/allow to unlock the data security system 620 and provide remote assistance.

該使用者管理資料庫642允許該伺服器/控制台640遠端重置或解鎖該資料保全系統620。 The user management repository 642 allows the server/console 640 to remotely reset or unlock the data security system 620.

該使用者管理資料庫642允許該伺服器/控制台640遠端變更該資料保全系統使用者的PIN。 The user management repository 642 allows the server/console 640 to remotely change the PIN of the data security system user.

該使用者管理資料庫642允許該伺服器/控制台640從特定位置(藉由使用地理圍欄)限制/允許解鎖資料保全系統620。 The user management repository 642 allows the server/console 640 to restrict/allow unlocking the data security system 620 from a particular location (by using a geofence).

該使用者管理資料庫642允許該伺服器/控制台640限制/允許在特定的時間週期及不同的時間區域中解鎖資料保全系統620。 The user management repository 642 allows the server/console 640 to restrict/allow the data security system 620 to be unlocked during a particular time period and in different time zones.

該使用者管理資料庫642允許該伺服器/控制台640限制解鎖在特定團隊/組織/網路等等外部之資料保全系統620。 The user management repository 642 allows the server/console 640 to restrict unlocking of the data security system 620 external to a particular team/organization/network or the like.

現參考第7圖,其中顯示呈現在該行動裝置610及該資料保全系統620之間之操作順序之管理者排序圖。 Referring now to Figure 7, there is shown a manager ranking diagram of the operational sequence presented between the mobile device 610 and the data security system 620.

在該資料保全系統620及該行動裝置610之間的連接700首先建立和其它裝置或系統的彼此發現、配對該裝置及系統及連線該裝置與系統。該連接700是使用共享秘密而保全,接著使用該共享秘密以保全(加密)在該資料保全系統620及該行動裝置610之間之通訊而用於所有的未來通訊對話。標準加密演算法係被選擇成既可在該資料保全系統620上有效執行又可被全球保全標準所認可。 The connection 700 between the data security system 620 and the mobile device 610 is first established and discovered with other devices or systems, paired with the device and system, and connected to the device and system. The connection 700 is secured using a shared secret and then used to secure (encrypt) communication between the data security system 620 and the mobile device 610 for all future communication conversations. The standard encryption algorithm is selected to be both validly executed on the data security system 620 and approved by global security standards.

只要該資料保全系統620及該行動裝置610是在彼此之預定距離內,該連接700便由該資料保全系統應用程式618或該保全控制器628或兩者一起操作所維持。再者,若超過該預定距離時,該連接700會維持預定 的時間週期,在該時間週期之後該資料保全系統620便上鎖。 As long as the data security system 620 and the mobile device 610 are within a predetermined distance of each other, the connection 700 is maintained by the data security system application 618 or the security controller 628 or both. Furthermore, if the predetermined distance is exceeded, the connection 700 will remain scheduled. The time period after which the data security system 620 is locked.

在該行動裝置610及該資料保全系統620連接之後,資料保全系統管理者應用程式啟動操作702於該行動裝置610中產生。接著管理者於管理者密碼操作704中設定密碼。而且在該行動裝置610與該資料保全系統620連接之後,該資料保全系統620在資料保全系統連接、啟動及發現操作706中是連接至第6圖之該主機電腦630而由該主機電腦630啟動及發現。 After the mobile device 610 and the data security system 620 are connected, a data security system manager application launch operation 702 is generated in the mobile device 610. The administrator then sets the password in the administrator password operation 704. Moreover, after the mobile device 610 is connected to the data security system 620, the data security system 620 is connected to the host computer 630 of FIG. 6 and activated by the host computer 630 in the data security system connection, startup and discovery operation 706. And found.

在該管理者密碼操作704之後,該行動裝置610發送設定管理者密碼及解鎖訊號708給該資料保全系統620。該設定管理者密碼及解鎖訊號708造成管理者密碼設定及資料保全系統解鎖操作716於該資料保全系統620中產生。 After the administrator password operation 704, the mobile device 610 sends a setup manager password and an unlock signal 708 to the data security system 620. The set manager password and unlock signal 708 causes the administrator password setting and data security system unlocking operation 716 to be generated in the data security system 620.

當該管理者密碼設定及資料保全系統解鎖操作716完成時,確認:資料保全系統解鎖訊號712是發送至該行動裝置610,在該行動裝置610中,確認:資料保全系統解鎖作為管理者操作714操作。該確認:資料保全系統解鎖作為管理者操作714允許設定其它限制操作716使用該行動裝置610而執行。該設定其它限制操作716造成設定管理者限制訊號718發送至該資料保全系統620,其中該管理者限制被設定並且確認:限制設定訊號720回到該行動裝置610。之後,該行動裝置610及該資料保全系統620是在完全可操作的通訊中。 When the administrator password setting and data security system unlocking operation 716 is completed, it is confirmed that the data security system unlocking signal 712 is sent to the mobile device 610, and in the mobile device 610, it is confirmed that the data security system is unlocked as the administrator operation 714. operating. The confirmation: data security system unlocking as manager operation 714 allows setting other restriction operations 716 to be performed using the mobile device 610. The set other limit operation 716 causes the set manager limit signal 718 to be sent to the data security system 620, wherein the manager limit is set and confirmed: the limit set signal 720 is returned to the mobile device 610. Thereafter, the mobile device 610 and the data security system 620 are in fully operational communication.

因為能夠在不與該資料保全系統620實體接觸的情況下與該資料保全系統620通訊,所以與該資料保全系統620的大量互動是需要有資料保全系統唯一識別碼來完成,而該資料保全系統唯一識別碼是印在該資料保全系統620上或是附帶在該資料保全系統620封包,並且對於該資料保全系統620擁有者而言是輕易可取得的。 Because the data security system 620 can communicate with the data security system 620 without physical contact with the data security system 620, a large amount of interaction with the data security system 620 is required to have a data security system unique identification code to complete the system. The unique identification code is printed on the data security system 620 or attached to the data security system 620 package and is readily available to the data security system 620 owner.

在做出可能影響使用者資料之請求時(諸如解鎖或重置該資料保全系統620),需要這種唯一識別碼(unique ID)。未具有正確識別碼而執行這種操作的嘗試將會被忽略並且不造成傷害。該唯一識別碼是用來以一種需要使用者對該資料保全系統620有實體控制的方式對該行動裝置610識別該資料保全系統620,以及用來確認該連接700是建立在已授權、先前已配對之裝置及系統之間,諸如該行動裝置610及該資料保全系統620。一旦這些裝置被配對,便可使用該共享祕密以使通訊加密。 This unique ID is required when making a request that may affect the user's profile, such as unlocking or resetting the data security system 620. Attempts to perform such an operation without the correct identification code will be ignored and will not cause harm. The unique identifier is used to identify the data security system 620 to the mobile device 610 in a manner that requires the user to have physical control of the data security system 620, and to confirm that the connection 700 is established on an authorized, previously Between the paired devices and systems, such as the mobile device 610 and the data security system 620. Once these devices are paired, the shared secret can be used to encrypt the communication.

配對意味著行動裝置及資料保全系統具有建立在過去某個時間並且持續之唯一且定義的關係。 Pairing means that the mobile device and the data security system have a unique and defined relationship that has been established and persisted at some time in the past.

當使用者具有該資料保全系統之實體控制時,該唯一識別碼能夠給予該使用者對該資料保全系統有某些控制。 When the user has physical control of the data security system, the unique identification code can give the user some control over the data security system.

在行動裝置610是智慧手機的情況下,為了增加與資料保全系統620通訊之保全,使用者可以選擇啟用功能,例如在此稱為1Phone之功能。此功能將與資料保全系統620的大量使用者互動限制給一個且只有一個行動 裝置610。這是藉由以在該資料保全系統620與該行動裝置610之間保全地共享之隨機識別碼取代上文所描述之該資料保全系統唯一識別碼而完成。因此,例如,當該使用者解鎖該資料保全系統620時,必須改為給定該1Phone識別碼,而不是呈現該資料保全系統唯一識別碼。在效果上,除了PIN或密碼之外,這方式使得使用者的行動裝置610成為用於使用該資料保全系統620之第二個認證因素。例如,經選擇做為「1Phone」之已配對的使用者手機可以在沒有PIN的情況下使用,並且作為使用者認證單一因素及/或在與任何其它使用者認證因素之組合中。若選擇了此類功能(1Phone),除了之前管理者的解鎖有被啟用,否則該資料保全系統620無法以任何其它手機開啟。 In the case where the mobile device 610 is a smart phone, in order to increase the security of communication with the data security system 620, the user may select an enable function, such as the function referred to herein as 1Phone. This feature will limit the interaction with a large number of users of the Data Security System 620 to one and only one action. Device 610. This is accomplished by replacing the data security system unique identification code described above with a random identification code that is securely shared between the data security system 620 and the mobile device 610. Thus, for example, when the user unlocks the data security system 620, the 1Phone identification code must be given instead of presenting the data security system unique identification code. In effect, in addition to the PIN or password, this approach causes the user's mobile device 610 to become the second authentication factor for use of the data security system 620. For example, a paired user handset selected as "1Phone" can be used without a PIN and as a single factor for user authentication and/or in combination with any other user authentication factor. If such a function (1Phone) is selected, the data security system 620 cannot be turned on with any other mobile phone except that the previous administrator's unlocking is enabled.

將會瞭解的是,其它實施例可能會在該資料保全系統620上要求管理者的密碼以利於使用該1Phone功能。另一個實施例可能要求在在該行動裝置610上的1Phone資料遺失的情況下,該伺服器/控制台640能夠回復該資料保全系統620。 It will be appreciated that other embodiments may require an administrator's password on the data security system 620 to facilitate use of the 1Phone function. Another embodiment may require the server/console 640 to reply to the data security system 620 in the event that the 1Phone data on the mobile device 610 is lost.

該使用者對於該資料保全系統620可以啟用感應自動上鎖功能。在通訊對話期間,第6圖之該資料保全收發器624回報給資料保全系統620對於該行動裝置610之訊號強度量測。在該行動裝置610上之該資料保全系統應用程式618發送給該資料保全系統620該初始訊號功率水準及用於感應之閾值兩者。 The user can enable the induction auto-lock function for the data security system 620. During the communication session, the data security transceiver 624 of FIG. 6 reports to the data security system 620 for signal strength measurements of the mobile device 610. The data security system application 618 on the mobile device 610 sends the data security system 620 both the initial signal power level and the threshold for sensing.

因為該訊號強度會因為該收發器周圍之環境 條件而變動,所以該資料保全系統620會以數學方式平滑化該訊號強度量測以降低假陽性(false positive)的可能性。當該資料保全系統620偵測到所接收的訊號功率已經降到低於預定閾值持續預定的時間週期時,將會立即上鎖該資料保全系統620及避免存取第6圖之該儲存次系統106。 Because the signal strength will be due to the environment around the transceiver. The conditions vary, so the data security system 620 mathematically smoothes the signal strength measurements to reduce the likelihood of false positives. When the data security system 620 detects that the received signal power has dropped below a predetermined threshold for a predetermined period of time, the data security system 620 is immediately locked and the storage subsystem of FIG. 6 is avoided. 106.

該資料保全系統620可以使用於三個不同模式中:使用者模式,其中該資料保全系統620之功能性是由使用者所決定;管理者模式,其中管理者可以設定管理者密碼及強制某些限制於該資料保全系統620(例如,在預定的無活動週期後自動上鎖、唯讀、1Phone)上並且限制不能被使用者移除;以及伺服器模式,其中管理者角色被設定,該伺服器/控制台640可以遠端重置該資料保全系統620、變更使用者密碼或只是解鎖該資料保全系統620。 The data security system 620 can be used in three different modes: user mode, wherein the functionality of the data security system 620 is determined by the user; the manager mode, where the administrator can set the administrator password and enforce certain Restricted to the data security system 620 (eg, automatically locked, read only, 1Phone after a predetermined period of inactivity) and the restriction cannot be removed by the user; and the server mode in which the manager role is set, the servo The console/console 640 can remotely reset the data security system 620, change the user password, or simply unlock the data security system 620.

現參考第8圖,其中顯示該行動裝置610為認證因素之解鎖排序圖。該圖顯示由來自特定行動裝置(該行動裝置610)之該資料保全系統應用程式618所初始化之該資料保全系統620之自動解鎖程序。使用者可以使用僅其中一個與該資料保全系統620初始配對之行動裝置。若該配對的行動裝置610遺失,則該資料保全系統620可能無法解鎖(除非之前設定有如第7圖中所顯示的管理者密碼)。 Referring now to Figure 8, there is shown the mobile device 610 as an unlocked sequence diagram of authentication factors. The figure shows the automatic unlocking procedure of the data security system 620 initialized by the data security system application 618 from a particular mobile device (the mobile device 610). The user can use only one of the mobile devices initially paired with the data security system 620. If the paired mobile device 610 is lost, the data security system 620 may not be able to unlock (unless the administrator password as shown in FIG. 7 is previously set).

類似於第7圖,在該連接700建立之後,資料保全系統應用程式啟動操作800產生。在資料保全系統 連接、啟動及發現操作706之後,需要行動裝置ID解鎖訊號802便從該行動裝置610發送至該資料保全系統620。資料保全系統解鎖操作804產生,然後從該資料保全系統620發送確認:資料保全系統解鎖訊號712。在確認:資料保全系統解鎖操作806之後,該行動裝置610及該資料保全系統620便在完全可操作的通訊中。 Similar to Figure 7, after the connection 700 is established, the data security system application launch operation 800 is generated. Data security system After the connect, start, and discover operations 706, the mobile device ID unlock signal 802 is required to be transmitted from the mobile device 610 to the data security system 620. The data security system unlock operation 804 is generated and then sent an acknowledgment from the data security system 620: the data security system unlock signal 712. After the confirmation: data security system unlock operation 806, the mobile device 610 and the data security system 620 are in fully operational communication.

若個人身份識別碼(PIN,Personal Identification Number)並未設定,則已配對的行動裝置是使用作為單一認證因素(1-authentication factor)。 If the personal identification number (PIN) is not set, the paired mobile device is used as a single authentication factor (1-authentication factor).

現參考第9圖,其中顯示呈現從該行動裝置610使用PIN輸入而解鎖之解鎖排序圖。該圖顯示藉由輸入PIN於該行動裝置610中之該資料保全系統應用程式618內而解鎖該資料保全系統620之流程。 Referring now to Figure 9, there is shown an unlocked sequence diagram presenting unlocking from the mobile device 610 using a PIN entry. The figure shows the flow of unlocking the data security system 620 by entering a PIN into the data security system application 618 in the mobile device 610.

雖然類似於第7及8圖,但輸入使用者名稱/密碼操作900在該資料保全系統應用程式啟動操作800之後產生。在該輸入使用者稱/密碼操作900之後,該行動裝置610發送確認使用者ID訊號902給該伺服器/控制台640。該伺服器/控制台640接著做出使用者名稱/密碼有效判定904。 Although similar to Figures 7 and 8, the input username/password operation 900 is generated after the data security system application launch operation 800. After the user claim/password operation 900 is entered, the mobile device 610 sends a confirmation user ID signal 902 to the server/console 640. The server/console 640 then makes a username/password validity decision 904.

當該使用者名稱/密碼有效判定904確認該使用者時,有效使用者訊號906是發送至該行動裝置610以供使用者於行動裝置610中之輸入PIN操作908輸入正確的PIN。該行動裝置610接著發送確認解鎖訊號910以判定是否正確的PIN已經輸入至該伺服器/控制台640。 When the username/password validity determination 904 confirms the user, the active user signal 906 is sent to the mobile device 610 for the user to enter the correct PIN in the input PIN operation 908 in the mobile device 610. The mobile device 610 then sends a confirmation unlock signal 910 to determine if the correct PIN has been entered into the server/console 640.

該伺服器/控制台640做出使用者授權判定912而判定是否該使用者被授權使用該PIN被授權的特定資料保全系統,例如該資料保全系統620。若被授權,則將解鎖允許訊號914發送至該行動裝置610,該行動裝置610便傳遞解鎖請求訊號916至該資料保全系統620。 The server/console 640 makes a user authorization decision 912 to determine if the user is authorized to use the particular data security system to which the PIN is authorized, such as the data security system 620. If authorized, the unlock enable signal 914 is sent to the mobile device 610, and the mobile device 610 transmits an unlock request signal 916 to the data security system 620.

該資料保全系統解鎖操作804將進行並將確認:資料保全系統解鎖訊號712發送至將進行確認:資料保全系統解鎖操作806的該行動裝置610。 The data security system unlock operation 804 will proceed and send a confirmation: data security system unlock signal 712 to the mobile device 610 that will confirm: data security system unlock operation 806.

現參考第10圖,其中顯示呈現經由該伺服器/控制台640使用PIN輸入及使用者ID/位置/時間確認而解鎖之解鎖排序圖。該圖藉由從該行動裝置610輸入PIN於該資料保全系統應用程式618中、使用UserID(使用者名稱/密碼)於該伺服器/控制台640伺服器中認證及藉由確認地理圍欄允許而於特定位置及於特定時間範圍解鎖該資料保全系統620,顯示解鎖該資料保全系統620之最安全的流程。在沒有輸入PIN、使用者名稱及密碼及讓行動裝置610位於特定(預定)位置及特定(預定)時間的情況下,該資料保全系統620無法解鎖。 Referring now to Figure 10, there is shown an unlocked sequence diagram showing the unlocking via the server/console 640 using PIN entry and user ID/location/time confirmation. The figure is authenticated in the server/console 640 server using the UserID (username/password) by entering the PIN from the mobile device 610 in the data security system application 618 and by confirming the geofence permit. Unlocking the data security system 620 at a particular location and for a particular time frame displays the most secure process for unlocking the data security system 620. The data security system 620 cannot be unlocked without entering a PIN, username and password, and having the mobile device 610 at a particular (predetermined) location and a specific (scheduled) time.

雖然類似於第7-9圖,但在該伺服器/控制台640處,將執行解鎖特定資料保全系統操作1000以允許所需的條件之設定,在該條件之下將操作特定資料保全系統,例如該資料保全系統620,。例如,該條件可以在特定的地理區域內及/或特定的時間範圍內。 Although similar to Figures 7-9, at the server/console 640, an unlock specific data security system operation 1000 will be performed to allow for the setting of required conditions under which the particular data security system will be operated, For example, the data security system 620,. For example, the condition can be within a particular geographic area and/or within a particular time frame.

在該行動裝置610處,將作出目前條件的判 定,例如獲得的位置及/或目前的時間操作1002。將進行此操作以判定該行動裝置610位在何處或該行動裝置610所在處之目前時間為何。亦可以判定關於該行動裝置610之其它的目前條件並藉由確認解鎖訊號1004發送至做出條件符合判定1006之該伺服器/控制台640。 At the mobile device 610, the current condition will be judged For example, the obtained location and/or current time operation 1002. This operation will be performed to determine where the mobile device 610 is located or the current time at which the mobile device 610 is located. Other current conditions for the mobile device 610 may also be determined and sent to the server/console 640 that made the conditional compliance decision 1006 by confirming the unlock signal 1004.

當所需的條件符合時,解鎖允許訊號1008便發送至該行動裝置610以供執行輸入PIN操作908。在輸入該PIN之後,確認解鎖訊號1010是連同PIN及在操作上感應該行動裝置610之該資料保全系統620之身份識別一起發送。該確認解鎖訊號1010是被該伺服器/控制台640所接收並且做出資料保全系統允許判定1012以判定特定的資料保全系統是允許由授權的使用者所解鎖。該伺服器/控制台640確認這個「特定的」使用者是經過授權以使用該特定的資料保全系統。 When the required conditions are met, an unlock enable signal 1008 is sent to the mobile device 610 for performing an input PIN operation 908. After entering the PIN, the confirmation unlock signal 1010 is sent along with the PIN and the identity of the data security system 620 that is operationally sensing the mobile device 610. The confirmation unlock signal 1010 is received by the server/console 640 and a data security system permission decision 1012 is made to determine that the particular data security system is allowed to be unlocked by an authorized user. The server/console 640 confirms that the "specific" user is authorized to use the particular data security system.

在判定已經提供正確的資訊之後,該伺服器/控制台640將提供解鎖允許訊號914至該行動裝置610,該行動裝置610將提供解鎖請求訊號916。該解鎖請求訊號916造成該資料保全系統620進行操作。 After determining that the correct information has been provided, the server/console 640 will provide an unlock enable signal 914 to the mobile device 610, which will provide an unlock request signal 916. The unlock request signal 916 causes the data security system 620 to operate.

現參考第11圖,其中顯示使用該伺服器/控制台640重置該資料保全系統620之重置排序圖。此圖顯示經由該伺服器/控制台640遠端地重置該資料保全系統620的能力。該資料保全系統620可以經由無線連接僅從該行動裝置610接收指令。然而,藉由設定「重置」旗標於該伺服器/控制台640上用於特定的資料保全系統(使用 本身的序號(S/N)),在該行動裝置610上運行之該資料保全系統應用程式618將向該伺服器/控制台640查詢於該使用者管理資料庫642中之任何旗標/未決的請求。當該使用者連接該資料保全系統620時,在該行動裝置610上之該資料保全系統應用程式618將執行等待「重置」指令。在成功的重置(所有使用者資料及憑證消失)之後,該伺服器/控制台640將移除該重置旗標以便當該行動裝置610連接至該特定資料保全系統時,該重置在下一次將不會執行。 Referring now to Figure 11, there is shown a reset sequence diagram for resetting the data security system 620 using the server/console 640. This figure shows the ability to remotely reset the data security system 620 via the server/console 640. The data security system 620 can receive instructions only from the mobile device 610 via a wireless connection. However, by setting a "reset" flag on the server/console 640 for a specific data security system (using The serial number (S/N) itself, the data security system application 618 running on the mobile device 610 will query the server/console 640 for any flag/pending in the user management repository 642. Request. When the user connects to the data security system 620, the data security system application 618 on the mobile device 610 will execute a wait for "reset" command. After a successful reset (all user profiles and credentials disappear), the server/console 640 will remove the reset flag so that when the mobile device 610 is connected to the particular data security system, the reset is under It will not be executed once.

雖然類似於第7-11圖,但該行動裝置610回應於有效使用者訊號906以發送任何指令等待訊號1100至該伺服器/控制台640以做出重置指令判定1102。當該重置指令出現時,執行重置訊號1104將發送至該行動裝置610。 Although similar to Figures 7-11, the mobile device 610 responds to the active user signal 906 to send any command pending signal 1100 to the server/console 640 to make a reset command decision 1102. When the reset command occurs, the execution reset signal 1104 will be sent to the mobile device 610.

該行動裝置610將發送重置保全糸統訊號1106至該資料保全系統620以開始資料保全系統重置操作1108。一旦該資料保全系統重置操作1108完成之後,該資料保全系統620將發送確認:資料保全系統重置訊號1110至該行動裝置610以設定確認:資料保全系統重置操作1112進入操作。之後,該行動裝置610及該資料保全系統620便與該資料保全系統620重置在完全可操作的通訊狀態下。 The mobile device 610 will send a reset security signal 1106 to the data security system 620 to begin a data security system reset operation 1108. Once the data security system reset operation 1108 is completed, the data security system 620 will send an acknowledgment: the data security system reset signal 1110 to the mobile device 610 to set the acknowledgment: data security system reset operation 1112 to enter operation. Thereafter, the mobile device 610 and the data security system 620 are reset to the data security system 620 in a fully operational communication state.

現參考第12圖,其中顯示使用該伺服器/控制台640解鎖該資料保全系統620之解鎖排序圖。此圖顯示經由該伺服器/控制台640遠端地解鎖該資料保全系統 620的能力。該資料保全系統620可以經由無線連接僅從該行動裝置610接收指令。然而,藉由設定「管理者解鎖」旗標於該伺服器/控制台640控制台上用於特定資料保全系統(使用本身的序號(S/N)),在該行動裝置610上運行之該資料保全系統應用程式618將向該伺服器/控制台640查詢任何旗標/未決的請求。當該使用者連接該資料保全系統620時,在該行動裝置610上之該資料保全系統應用程式618將執行等待”管理者解鎖”指令。在成功的管理者解鎖之後,該使用者的資料維持不變,但是該使用者的密碼會被移除(該資料保全系統620無法由該使用者解鎖)。該伺服器/控制台640將移除用於該資料保全糸統620之重置旗標,因此當該行動裝置610連接至該資料保全系統620時,該重置在下一次將不會執行。 Referring now to Figure 12, there is shown an unlocking sequence diagram for unlocking the data security system 620 using the server/console 640. This figure shows remotely unlocking the data security system via the server/console 640 620's ability. The data security system 620 can receive instructions only from the mobile device 610 via a wireless connection. However, by setting the "Manager Unlock" flag on the server/console 640 console for the specific data security system (using its own serial number (S/N)), the mobile device 610 is running on the mobile device 610. The data security system application 618 will query the server/console 640 for any flag/pending requests. When the user connects to the data security system 620, the data security system application 618 on the mobile device 610 will execute a wait "manager unlock" command. After the successful manager is unlocked, the user's profile remains unchanged, but the user's password is removed (the data security system 620 cannot be unlocked by the user). The server/console 640 will remove the reset flag for the data security system 620, so when the mobile device 610 is connected to the data security system 620, the reset will not be performed next time.

雖然類似於第7-11圖,但在接收任何指令等待訊號1100之後,當有以管理者的密碼解鎖的指令時,該伺服器/控制台640執行解鎖1200。以管理者的密碼解鎖訊號1202是發送至該行動裝置610,該行動裝置610提供以管理者的密碼解鎖訊號1204至該資料保全系統620以開始該資料保全系統解鎖操作804。之後,該行動裝置610及該資料保全系統620便在完全可操作的通訊狀態下。 Although similar to Figures 7-11, after receiving any command wait signal 1100, the server/console 640 performs an unlock 1200 when there is an instruction to unlock with the administrator's password. The password unlocking signal 1202 is sent to the mobile device 610. The mobile device 610 provides the administrator's password unlocking signal 1204 to the data security system 620 to begin the data security system unlocking operation 804. Thereafter, the mobile device 610 and the data security system 620 are in a fully operational communication state.

現參考第13圖,其中顯示使用該伺服器/控制台640之變更使用者密碼的排序圖。此圖顯示經由該伺服器/控制台640遠端地變更用於資料保全系統620之使用者密碼的能力。即使資料保全系統620可以經由無線連 接僅從該行動裝置610接收指令,但藉由設定「變更使用者密碼」旗標於該伺服器/控制台640控制台上用於特定的資料保全系統(使用本身的序號(S/N)),在該行動裝置610上運行之該資料保全系統應用程式618將向該伺服器/控制台640查詢任何旗標/未決的請求。當使用者將連接他的資料保全系統620時,在行動裝置610上之資料保全系統應用程式618將執行等待「變更使用者密碼」指令。在成功的解鎖及變更密碼之後,該使用者的資料維持不變並且該資料保全系統620可以用新的使用者密碼解鎖。該伺服器/控制台640將移除用於該資料保全糸統620之「變更使用者密碼」旗標,因此當該行動裝置610是連接至該特定資料保全系統時,該變更使用者密碼旗標在下一次將不會執行。 Referring now to Figure 13, there is shown a ranking diagram of the changed user password using the server/console 640. This figure shows the ability to remotely change the user password for the data security system 620 via the server/console 640. Even the data security system 620 can be connected via wireless The command is only received from the mobile device 610, but is set on the server/console 640 console for a specific data security system by setting a "change user password" flag (using its own serial number (S/N). The data security system application 618 running on the mobile device 610 will query the server/console 640 for any flag/pending requests. When the user will connect his data security system 620, the data security system application 618 on the mobile device 610 will execute a "wait to change user password" command. After successful unlocking and changing the password, the user's profile remains unchanged and the data security system 620 can be unlocked with the new user password. The server/console 640 will remove the "change user password" flag for the data security system 620, so when the mobile device 610 is connected to the particular data security system, the user password flag is changed. The mark will not be executed next time.

雖然類似於第7-12圖,該伺服器/控制台640藉由做出變更密碼判定1300以回應於任何指令等待訊號1100。當在該伺服器/控制台640處已經有密碼變更時,變更使用者密碼訊號1302是發送至該行動裝置610,該行動裝置610發送變更使用者密碼訊號1304至該資料保全系統620。之後,該行動裝置610及該資料保全系統620是以新的密碼在完全可操作的通訊狀態下。 Although similar to Figures 7-12, the server/console 640 responds to any command pending signal 1100 by making a change password decision 1300. When a password change has been made at the server/console 640, the change user password signal 1302 is sent to the mobile device 610, and the mobile device 610 sends a change user password signal 1304 to the data security system 620. Thereafter, the mobile device 610 and the data security system 620 are in a fully operational communication state with a new password.

資料保全系統之操作之方法包括:提供具有用於與該資料保全系統連接之資料保全系統應用程式之行動裝置;開始該資料保全系統應用程式;以及維持該資料保全系統與該行動裝置之連接。 The method of operating the data security system includes: providing a mobile device having a data security system application for connecting to the data security system; starting the data security system application; and maintaining the connection of the data security system to the mobile device.

如同上文所描述之方法,其中,維持該連接是當該資料保全系統在該行動裝置之預定感應距離內時維持連接。 As with the method described above, maintaining the connection is to maintain the connection when the data security system is within a predetermined sensing distance of the mobile device.

如同上文所描述之方法,其中,維持該連接之是當該資料保全系統在該行動裝置之預定感應距離內持續預定的時間週期時維持連接。 As with the method described above, wherein the connection is maintained, the connection is maintained when the data security system continues for a predetermined period of time within the predetermined sensing distance of the mobile device.

如同上文所描述之方法,其中,建立該連接包含使用在該資料保全系統與該行動裝置之間之雙向通訊。 As in the method described above, establishing the connection includes using two-way communication between the data security system and the mobile device.

如同上文所描述之方法,其中,建立該連接包含使用在該資料保全系統與該行動裝置之間之單向通訊。 As with the method described above, establishing the connection includes using one-way communication between the data security system and the mobile device.

如同上文所描述之方法,更包括在具有該資料保全系統應用程式之該行動裝置與含有使用者管理資料庫之伺服器之間之通訊。 As described above, the method further includes communication between the mobile device having the data security system application and a server having a user management database.

如同上文所描述之方法,更包括提供在該資料保全系統中之保全控制器內之保全資訊。 As with the method described above, it further includes providing security information in the security controller in the data security system.

如同上文所描述之方法,更包括:提供具有特定資料保全系統之身份識別之伺服器;提供具有特定身份識別之該資料保全系統;以及當該特定資料保全系統之該身份識別是相同於該資料保全系統之該特定身份識別時,解鎖該資料保全系統。 And the method as described above, further comprising: providing a server having a specific data security system identification; providing the data security system with a specific identity; and when the identification of the specific data security system is the same as the The data security system is unlocked when the specific identity of the data security system is identified.

如同上文所描述之方法,其中,提供具有該資料保全系統應用程式之行動裝置提供資料保全系統管理 者的應用程式並且更包含:設定管理者的密碼於該行動裝置中;從該行動裝置傳輸該管理者的密碼至該資料保全系統;以及設定該管理者的密碼於該資料保全系統中並解鎖該資料保全系統。 As described above, wherein the mobile device having the data security system application is provided to provide data security system management The application of the user further includes: setting a password of the administrator in the mobile device; transmitting the password of the manager from the mobile device to the data security system; and setting the password of the administrator in the data security system and unlocking This data is secured by the system.

如同上文所描述之方法,更包括:提供結合來自該行動裝置之行動裝置身份識別之解鎖請求至該資料保全系統;以及接收該資料保全系統中之該解鎖請求並解鎖該資料保全系統。 As with the method described above, the method further includes: providing an unlock request in conjunction with the identification of the mobile device from the mobile device to the data security system; and receiving the unlock request in the data security system and unlocking the data security system.

如同上文所描述之方法,更包括:輸入使用者名稱或密碼於該行動裝置中;在由該行動裝置接收該使用者名稱或密碼之後,判定何時該使用者名稱或密碼於伺服器中是有效的;當該使用者名稱或密碼有效時,由該伺服器至該行動裝置產生通訊;以及當該使用者名稱或密碼有效而解鎖該資料保全系統時,由該行動裝置至該資料保全系統產生通訊。 The method as described above, further comprising: inputting a username or password in the mobile device; after receiving the username or password by the mobile device, determining when the username or password is in the server Valid; when the username or password is valid, the server generates communication to the mobile device; and when the username or password is valid to unlock the data security system, the mobile device to the data security system Generate communication.

如同上文所描述之方法,更包括:輸入使用者名稱或密碼於行動裝置中;在由該行動裝置接收該使用者名稱或密碼之後,判定何時該使用者名稱或密碼於伺服器中是有效的;當該使用者名稱或密碼有效時,由該伺服器與該行動裝置產生通訊;在接收來自該行動裝置之身份識別號碼之後,判定何時該身份識別號碼於該伺服器中是有效的;以及當該伺服器判定該身份識別號碼有效時,透過該行動裝置解鎖該資料保全系統。 The method as described above further includes: inputting a username or password in the mobile device; determining, when the username or password is received by the mobile device, when the username or password is valid in the server When the username or password is valid, the server generates communication with the mobile device; after receiving the identification number from the mobile device, determining when the identification number is valid in the server; And when the server determines that the identification number is valid, the data security system is unlocked by the mobile device.

如同上文所描述之方法,更包括:提供該行 動裝置之有效位置至伺服器;判定於該伺服器中何時該行動裝置是在該有效位置內;以及當該伺服器判定該行動裝置是在該有效位置內時,透過該行動裝置解鎖該資料保全系統。 As described above, it also includes: providing the line Determining an effective position of the mobile device to the server; determining when the mobile device is in the valid position in the server; and unlocking the data through the mobile device when the server determines that the mobile device is in the active position Security system.

如同上文所描述之方法,更包括:提供在該行動裝置處用於該資料保全系統之操作的目前時間給伺服器;判定於該伺服器中何時該行動裝置是在該目前時間內;以及當該伺服器判定該行動裝置具有該目前時間時,透過該行動裝置解鎖該資料保全系統。 And the method as described above, further comprising: providing a current time for the operation of the data security system at the mobile device to the server; determining when the mobile device is within the current time in the server; When the server determines that the mobile device has the current time, the data security system is unlocked by the mobile device.

如同上文所描述之方法,更包括:提供於伺服器中之指令;由該伺服器提供該指令至該行動裝置以回應來自該行動裝置之指令等待訊號;以及當該指令是由該伺服器所提供時,透過該行動裝置執行於該資料保全系統中之該指令。 And the method as described above, further comprising: providing an instruction in the server; providing the instruction to the mobile device by the server to respond to an instruction waiting signal from the mobile device; and when the command is by the server When provided, the instructions are executed by the mobile device in the data security system.

如同上文所描述之方法,更包括:提供於伺服器中之變更密碼指令;由該伺服器提供該變更密碼指令至該行動裝置以回應於來自該行動裝置的變更密碼訊號;以及使用在該資料保全系統中之該變更密碼解鎖該資料保全系統。 The method as described above, further comprising: a change password instruction provided in the server; the server provides the change password command to the mobile device in response to the change password signal from the mobile device; and is used in the The change password in the data security system unlocks the data security system.

如同上文所描述之方法,更包括連接該資料保全系統至主機電腦用於啟動並可由該主機電腦發現。 As with the method described above, the method further includes connecting the data security system to the host computer for booting and being discoverable by the host computer.

資料保全系統包括:資料保全收發器或接收器;可操作地連接至該資料保全收發器或接收器之認證次系統;以及連接至該認證次系統之儲存次系統。 The data security system includes: a data security transceiver or receiver; an authentication subsystem operatively coupled to the data security transceiver or receiver; and a storage subsystem coupled to the authentication subsystem.

如同上文所描述之該系統更包括連接至該資料保全收發器或該接收器及連接至該認證次系統之保全控制器。 The system, as described above, further includes a security controller coupled to the data security transceiver or the receiver and to the authentication subsystem.

如同上文所描述之系統更包括具有資料保全系統應用程式之行動裝置,當該資料保全系統是在該行動裝置的預定感應距離內時,與該保全控制器一起操作以用於維持連接。 The system as described above further includes a mobile device having a data security system application that operates with the security controller for maintaining a connection when the data security system is within a predetermined sensing distance of the mobile device.

如同上文所描述之該系統更包括具有資料保全系統應用程式之行動裝置,當該資料保全系統是在該行動裝置的預定感應距離內持續預定的時間週期時,與該保全控制器一起操作用於維持連接。 The system, as described above, further includes a mobile device having a data security system application for operating with the security controller when the data security system is within a predetermined sensing distance of the mobile device for a predetermined period of time To maintain the connection.

如同上文所描述之該系統更包括具有用於維持連接之行動收發器或接收器之行動裝置,包含在該資料保全系統與該行動裝置之間使用雙向通訊。 The system, as described above, further includes a mobile device having a mobile transceiver or receiver for maintaining connectivity, including the use of two-way communication between the data security system and the mobile device.

如同上文所描述之該系統更包括具有用於維持連接之行動收發器或接收器之行動裝置,包含在該資料保全系統與該行動裝置之間使用單向通訊。 The system, as described above, further includes a mobile device having a mobile transceiver or receiver for maintaining connectivity, including the use of one-way communication between the data security system and the mobile device.

如同上文所描述之該系統更包括在具有資料保全系統應用程式之行動裝置與含有使用者管理資料庫之伺服器之間之有線或無線連接通訊。 As described above, the system further includes wired or wireless connection communication between a mobile device having a data security system application and a server having a user management database.

如同上文所描述之該系統,其中,該資料保全系統包含用於連接至主機電腦之外部通訊通道。 As in the system described above, the data security system includes an external communication channel for connecting to a host computer.

雖然本發明已經結合特定最佳模式做描述,應該瞭解的是很多替代、修正及變化對於熟習該項技藝之 人士依據先前的描述將是顯而易見的。因此,本發明意在涵括落在該包含的申請專利範圍之範疇內之所有此類的替代、修正及變化。在此所提出或顯示於該附加的圖式中之所有的事項應當解讀為說明及限定的意義。 Although the invention has been described in connection with specific preferred modes, it should be understood that many alternatives, modifications, and variations are The person will be obvious based on the previous description. Accordingly, the present invention is intended to embrace all such alternatives, modifications, and variations in the scope of the invention. All matters raised or shown in this additional drawings are to be interpreted as illustrative and limiting.

100‧‧‧資料保全系統 100‧‧‧Data Security System

102‧‧‧外部通訊通道 102‧‧‧External communication channel

104‧‧‧認證次系統 104‧‧‧Certified sub-system

106‧‧‧儲存次系統 106‧‧‧Storage subsystem

108‧‧‧介面控制器 108‧‧‧Interface controller

110‧‧‧加密引擎 110‧‧‧Cryptographic engine

112‧‧‧儲存媒介 112‧‧‧Storage medium

114‧‧‧認證控制器 114‧‧‧Authentication Controller

116‧‧‧加密金鑰 116‧‧‧Encryption Key

118‧‧‧認證金鑰 118‧‧‧Certificate key

120‧‧‧主機電腦系統 120‧‧‧Host computer system

122‧‧‧使用者 122‧‧‧Users

Claims (25)

一種資料保全系統之操作之方法,包括:提供具有用於與該資料保全系統連接之資料保全系統應用程式之行動裝置;開始該資料保全系統應用程式;以及維持該資料保全系統與該行動裝置之連接。 A method of operating a data security system, comprising: providing a mobile device having a data security system application for connecting to the data security system; starting the data security system application; and maintaining the data security system and the mobile device connection. 如申請專利範圍第1項所述之方法,其中,維持該連接是維持當該資料保全系統在該行動裝置的預定感應距離內時之該連接。 The method of claim 1, wherein maintaining the connection is to maintain the connection when the data security system is within a predetermined sensing distance of the mobile device. 如申請專利範圍第1項所述之方法,其中,維持該連接是維持當該資料保全系統在該行動裝置的預定感應距離內持續預定時間週期時之該連接。 The method of claim 1, wherein maintaining the connection is to maintain the connection when the data security system continues within a predetermined sensing distance of the mobile device for a predetermined period of time. 如申請專利範圍第1項所述之方法,其中,建立該連接包含在該資料保全系統與該行動裝置之間使用雙向通訊。 The method of claim 1, wherein establishing the connection comprises using two-way communication between the data security system and the mobile device. 如申請專利範圍第1項所述之方法,其中,建立該連接包含在該資料保全系統與該行動裝置之間使用單向通訊。 The method of claim 1, wherein establishing the connection comprises using one-way communication between the data security system and the mobile device. 如申請專利範圍第1項所述之方法,更包括在具有該資料保全系統應用程式之該行動裝置與含有使用者管理資料庫之伺服器之間之通訊。 The method of claim 1, further comprising communicating between the mobile device having the data security system application and a server having a user management database. 如申請專利範圍第1項所述之方法,更包括提供保全資訊於該資料保全系統內之保全控制器中。 The method of claim 1, further comprising providing security information in a security controller in the data security system. 如申請專利範圍第1項所述之方法,更包括: 提供伺服器具有特定資料保全系統之身份識別;提供該資料保全系統具有特定身份識別;以及當該特定資料保全系統之該身份識別相同於該資料保全系統之該特定身份識別時,解鎖該資料保全系統。 For example, the method described in claim 1 of the patent scope further includes: Providing the server with the identification of the specific data security system; providing the data security system with a specific identity; and unlocking the data security when the identity of the specific data security system is the same as the specific identity of the data security system system. 如申請專利範圍第1項所述之方法,其中,提供具有該資料保全系統應用程式的行動裝置提供資料保全系統管理者的應用程式並且更包含:設定管理者的密碼於該行動裝置中;從該行動裝置傳輸該管理者的密碼至該資料保全系統;以及設定該管理者的密碼於該資料保全系統中及解鎖該資料保全系統。 The method of claim 1, wherein the mobile device having the data security system application is provided with an application for providing a data security system administrator, and further comprising: setting a password of the administrator in the mobile device; The mobile device transmits the administrator's password to the data security system; and sets the administrator's password in the data security system and unlocks the data security system. 如申請專利範圍第1項所述之方法,更包括:提供解鎖請求連同來自該行動裝置之行動裝置身份識別至該資料保全系統;以及於該資料保全系統中接收該解鎖請求並解鎖該資料保全系統。 The method of claim 1, further comprising: providing an unlock request and identifying the mobile device from the mobile device to the data security system; and receiving the unlock request and unlocking the data security in the data security system system. 如申請專利範圍第1項所述之方法,更包括:輸入使用者名稱或密碼於該行動裝置中;在接收來自該行動裝置之該使用者名稱或密碼之後,判定何時該使用者名稱或密碼於伺服器中是有效的;當該使用者名稱或密碼有效時,由該伺服器通訊至 該行動裝置;以及當該使用者名稱或密碼有效而解鎖該資料保全系統時,由該行動裝置通訊至該資料保全系統。 The method of claim 1, further comprising: inputting a user name or password in the mobile device; determining the user name or password after receiving the user name or password from the mobile device Valid in the server; when the username or password is valid, the server communicates to The mobile device; and when the user name or password is valid to unlock the data security system, the mobile device communicates to the data security system. 如申請專利範圍第1項所述之方法,更包括:輸入使用者名稱或密碼於該行動裝置中;在接收來自該行動裝置之該使用者名稱或密碼之後,判定何時該使用者名稱或密碼於伺服器中是有效的;當該使用者名稱或密碼有效時,由該伺服器通訊至該行動裝置;在接收來自該行動裝置之身份識別號碼之後,判定何時該身份識別號碼於該伺服器中是有效的;以及當該伺服器判定該身份識別號碼有效時,透過該行動裝置解鎖該資料保全系統。 The method of claim 1, further comprising: inputting a user name or password in the mobile device; determining the user name or password after receiving the user name or password from the mobile device Valid in the server; when the username or password is valid, the server communicates to the mobile device; after receiving the identification number from the mobile device, determining when the identification number is on the server Medium is valid; and when the server determines that the identification number is valid, the data security system is unlocked by the mobile device. 如申請專利範圍第1項所述之方法,更包括:提供該行動裝置之有效位置給伺服器;於該伺服器中判定何時該行動裝置是在該有效位置內;以及當該伺服器判定該行動裝置是在該有效位置內時,透過該行動裝置解鎖該資料保全系統。 The method of claim 1, further comprising: providing an effective location of the mobile device to the server; determining, in the server, when the mobile device is in the valid location; and when the server determines that When the mobile device is in the active position, the data security system is unlocked by the mobile device. 如申請專利範圍第1項所述之方法,更包括:提供在該行動裝置處用於該資料保全系統之操作的目前時間至伺服器;判定於該伺服器中何時該行動裝置是在該目前時 間內;以及當該伺服器判定該行動裝置具有該目前時間時,透過該行動裝置解鎖該資料保全系統。 The method of claim 1, further comprising: providing a current time for the operation of the data security system at the mobile device to the server; determining when the mobile device is at the current server Time And when the server determines that the mobile device has the current time, unlocking the data security system through the mobile device. 如申請專利範圍第1項所述之方法,更包括:提供於伺服器中之指令;由該伺服器提供該指令至該行動裝置以回應來自該行動裝置之指令等待訊號;以及當該指令是由該伺服器所提供時,透過該行動裝置執行於該資料保全系統中之該指令。 The method of claim 1, further comprising: providing an instruction in the server; the server provides the instruction to the mobile device to respond to an instruction waiting signal from the mobile device; and when the instruction is When the server is provided by the server, the instruction in the data security system is executed by the mobile device. 如申請專利範圍第1項所述之方法,更包括:提供於伺服器中之變更密碼指令;由該伺服器提供該變更密碼指令至該行動裝置以回應於來自該行動裝置的變更密碼訊號;以及使用在該資料保全系統中之該變更密碼解鎖該資料保全系統。 The method of claim 1, further comprising: a change password instruction provided in the server; the server provides the change password command to the mobile device in response to the change password signal from the mobile device; And unlocking the data security system using the change password in the data security system. 如申請專利範圍第1項所述之方法,更包括連接該資料保全系統至主機電腦用於啟動及可被該主機電腦發現。 The method of claim 1, further comprising connecting the data security system to the host computer for booting and being discoverable by the host computer. 一種資料保全系統,包括:資料保全收發器或接收器;認證次系統,可操作地連接至該資料保全收發器或接收器;以及儲存次系統,連接至該認證次系統。 A data security system comprising: a data security transceiver or receiver; an authentication subsystem operatively coupled to the data security transceiver or receiver; and a storage subsystem coupled to the authentication subsystem. 如申請專利範圍第18項所述之系統,更包括保全控制器,連接至該資料保全收發器或該接收器及連接至該認 證次系統。 The system of claim 18, further comprising a security controller connected to the data security transceiver or the receiver and connected to the identification Certificate system. 如申請專利範圍第18項所述之系統,更包括具有資料保全系統應用程式之行動裝置,當該資料保全系統在該行動裝置的預定感應距離內時,操作具有用於維持連接之該保全控制器。 The system of claim 18, further comprising a mobile device having a data security system application, the operation having the security control for maintaining the connection when the data security system is within a predetermined sensing distance of the mobile device Device. 如申請專利範圍第18項所述之系統,更包括具有資料保全系統應用程式之行動裝置,當該資料保全系統是在該行動裝置的預定感應距離內持續預定時間週期時,操作具有用於維持連接之該保全控制器。 The system of claim 18, further comprising a mobile device having a data security system application, wherein the data security system is maintained for a predetermined time period within a predetermined sensing distance of the mobile device Connect the security controller. 如申請專利範圍第18項所述之系統,更包括具有用於維持連接之行動收發器或接收器之行動裝置,包含在該資料保全系統與該行動裝置之間使用雙向通訊。 The system of claim 18, further comprising a mobile device having a mobile transceiver or receiver for maintaining connectivity, comprising using two-way communication between the data security system and the mobile device. 如申請專利範圍第18項所述之系統,更包括具有用於維持連接之行動收發器或接收器之行動裝置,包含在該資料保全系統及該行動裝置之間使用單向通訊。 The system of claim 18, further comprising a mobile device having a mobile transceiver or receiver for maintaining connectivity, comprising using one-way communication between the data security system and the mobile device. 如申請專利範圍第18項所述之系統,更包括在具有資料保全系統應用程式之行動裝置與含有使用者管理資料庫之伺服器之間的有線或無線連接通訊。 The system of claim 18, further comprising wired or wireless connection communication between the mobile device having the data security system application and the server containing the user management database. 如申請專利範圍第18項所述之系統,其中,該資料保全系統包含用於連接至主機電腦之外部通訊通道。 The system of claim 18, wherein the data security system includes an external communication channel for connecting to a host computer.
TW106100149A 2016-01-04 2017-01-04 Data security system and method of operating the same TWI692704B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/987,749 US10181055B2 (en) 2007-09-27 2016-01-04 Data security system with encryption
US14/987,749 2016-01-04

Publications (2)

Publication Number Publication Date
TW201737151A true TW201737151A (en) 2017-10-16
TWI692704B TWI692704B (en) 2020-05-01

Family

ID=59311569

Family Applications (2)

Application Number Title Priority Date Filing Date
TW106100149A TWI692704B (en) 2016-01-04 2017-01-04 Data security system and method of operating the same
TW109109809A TWI727717B (en) 2016-01-04 2017-01-04 Data security system with encryption and method for its operation

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW109109809A TWI727717B (en) 2016-01-04 2017-01-04 Data security system with encryption and method for its operation

Country Status (6)

Country Link
JP (3) JP6633228B2 (en)
KR (2) KR102054711B1 (en)
CN (2) CN108604982B (en)
GB (2) GB2562923B (en)
TW (2) TWI692704B (en)
WO (1) WO2017123433A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI651626B (en) * 2017-11-30 2019-02-21 大陸商北京集創北方科技股份有限公司 Biometric data encryption method and information processing device using same
US10754992B2 (en) 2007-09-27 2020-08-25 Clevx, Llc Self-encrypting drive
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
TWI708159B (en) * 2018-03-12 2020-10-21 美商惠普發展公司有限責任合夥企業 A device platform comprising a security processor, a security processor in a device, and related storage medium
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
TWI753286B (en) * 2018-08-16 2022-01-21 美商克萊夫公司 Self-encrypting device, management server, method for data security, and non-transitory machine-readable srotage medium thereof
US11971967B2 (en) 2021-08-20 2024-04-30 Clevx, Llc Secure access device with multiple authentication mechanisms

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2607846B (en) * 2018-06-06 2023-06-14 Istorage Ltd Dongle for ciphering data
CN110225515B (en) * 2019-06-24 2022-08-23 喀斯玛(北京)科技有限公司 Authentication management system, method and device
JP2022050899A (en) 2020-09-18 2022-03-31 キオクシア株式会社 Memory system
TWI788936B (en) * 2021-08-02 2023-01-01 民傑資科股份有限公司 Flash drive locked with wireless communication manner
KR102540669B1 (en) * 2021-12-17 2023-06-08 주식회사 그리다에너지 System for Job history authentication using encrypted and non-editable job data
CN114598461B (en) * 2022-02-24 2023-10-31 广东天波信息技术股份有限公司 Online unlocking method of terminal equipment, terminal equipment and readable storage medium

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10340231A (en) * 1997-06-05 1998-12-22 Kokusai Electric Co Ltd Ic card
US6529949B1 (en) * 2000-02-07 2003-03-04 Interactual Technologies, Inc. System, method and article of manufacture for remote unlocking of local content located on a client device
US6708272B1 (en) * 1999-05-20 2004-03-16 Storage Technology Corporation Information encryption system and method
WO2001020463A1 (en) * 1999-09-17 2001-03-22 Fingloq Ab Security arrangement
US8677505B2 (en) * 2000-11-13 2014-03-18 Digital Doors, Inc. Security system with extraction, reconstruction and secure recovery and storage of data
US7099663B2 (en) * 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
TW583568B (en) * 2001-08-27 2004-04-11 Dataplay Inc A secure access method and system
US20030109218A1 (en) * 2001-10-18 2003-06-12 Azalea Microelectronics Corporation Portable wireless storage unit
US7561691B2 (en) 2001-11-12 2009-07-14 Palm, Inc. System and method for providing secured access to mobile devices
US7198571B2 (en) * 2002-03-15 2007-04-03 Igt Room key based in-room player tracking
JP2004326763A (en) * 2003-04-10 2004-11-18 Matsushita Electric Ind Co Ltd Password change system
WO2004090738A1 (en) 2003-04-10 2004-10-21 Matsushita Electric Industrial Co., Ltd. Password change system
JP2006025249A (en) * 2004-07-08 2006-01-26 Fujitsu Ltd Terminal device, data backup system thereof, data backup method thereof, and data backup program thereof
CN101010677A (en) * 2004-09-06 2007-08-01 皇家飞利浦电子股份有限公司 Portable storage device and method for exchanging data
US20060075230A1 (en) * 2004-10-05 2006-04-06 Baird Leemon C Iii Apparatus and method for authenticating access to a network resource using multiple shared devices
JP2006139757A (en) * 2004-10-15 2006-06-01 Citizen Watch Co Ltd Locking system and locking method
US20060129829A1 (en) * 2004-12-13 2006-06-15 Aaron Jeffrey A Methods, systems, and computer program products for accessing data with a plurality of devices based on a security policy
US20060176146A1 (en) * 2005-02-09 2006-08-10 Baldev Krishan Wireless universal serial bus memory key with fingerprint authentication
JP4781692B2 (en) * 2005-03-08 2011-09-28 インターナショナル・ビジネス・マシーンズ・コーポレーション Method, program, and system for restricting client I / O access
US8335920B2 (en) * 2005-07-14 2012-12-18 Imation Corp. Recovery of data access for a locked secure storage device
TWI288553B (en) * 2005-10-04 2007-10-11 Carry Computer Eng Co Ltd Portable storage device having main identification information and method of setting main identification information thereof
JP2009524880A (en) * 2006-01-24 2009-07-02 クレブエックス・リミテッド・ライアビリティ・カンパニー Data security system
US20070248232A1 (en) * 2006-04-10 2007-10-25 Honeywell International Inc. Cryptographic key sharing method
WO2008147577A2 (en) * 2007-01-22 2008-12-04 Spyrus, Inc. Portable data encryption device with configurable security functionality and method for file encryption
US20080303631A1 (en) * 2007-06-05 2008-12-11 Beekley John S Mass Storage Device With Locking Mechanism
TWI537732B (en) * 2007-09-27 2016-06-11 克萊夫公司 Data security system with encryption
CN100533459C (en) * 2007-10-24 2009-08-26 北京飞天诚信科技有限公司 Data safety reading method and safety storage apparatus thereof
US20100293374A1 (en) * 2008-07-30 2010-11-18 Bushby Donald P Secure Portable Memory Storage Device
JP2010102617A (en) * 2008-10-27 2010-05-06 Dainippon Printing Co Ltd System, device, method and program of access management of external storage, apparatus and recording medium
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
US9286493B2 (en) * 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
US8112066B2 (en) * 2009-06-22 2012-02-07 Mourad Ben Ayed System for NFC authentication based on BLUETOOTH proximity
US20110154023A1 (en) * 2009-12-21 2011-06-23 Smith Ned M Protected device management
US9270663B2 (en) * 2010-04-30 2016-02-23 T-Central, Inc. System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
GB2508532B (en) * 2011-09-28 2020-05-06 Hewlett Packard Development Co Unlocking a storage device
WO2013073260A1 (en) * 2011-11-19 2013-05-23 インターナショナル・ビジネス・マシーンズ・コーポレーション Storage device
US8972728B2 (en) * 2012-10-15 2015-03-03 At&T Intellectual Property I, L.P. Method and apparatus for providing subscriber identity module-based data encryption and remote management of portable storage devices
US20140149742A1 (en) * 2012-11-28 2014-05-29 Arnold Yau Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
GB201221433D0 (en) * 2012-11-28 2013-01-09 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource on a mobile device
US9215250B2 (en) * 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices
US20150161587A1 (en) * 2013-12-06 2015-06-11 Apple Inc. Provisioning and authenticating credentials on an electronic device
CN105450400B (en) * 2014-06-03 2019-12-13 阿里巴巴集团控股有限公司 Identity verification method, client, server and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10754992B2 (en) 2007-09-27 2020-08-25 Clevx, Llc Self-encrypting drive
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US10985909B2 (en) 2007-09-27 2021-04-20 Clevx, Llc Door lock control with wireless user authentication
US11151231B2 (en) 2007-09-27 2021-10-19 Clevx, Llc Secure access device with dual authentication
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US11233630B2 (en) 2007-09-27 2022-01-25 Clevx, Llc Module with embedded wireless user authentication
TWI651626B (en) * 2017-11-30 2019-02-21 大陸商北京集創北方科技股份有限公司 Biometric data encryption method and information processing device using same
TWI708159B (en) * 2018-03-12 2020-10-21 美商惠普發展公司有限責任合夥企業 A device platform comprising a security processor, a security processor in a device, and related storage medium
US11475107B2 (en) 2018-03-12 2022-10-18 Hewlett-Packard Development Company, L.P. Hardware security
TWI753286B (en) * 2018-08-16 2022-01-21 美商克萊夫公司 Self-encrypting device, management server, method for data security, and non-transitory machine-readable srotage medium thereof
US11971967B2 (en) 2021-08-20 2024-04-30 Clevx, Llc Secure access device with multiple authentication mechanisms

Also Published As

Publication number Publication date
JP2019511791A (en) 2019-04-25
KR20180107775A (en) 2018-10-02
KR20190137960A (en) 2019-12-11
GB2562923B (en) 2020-02-12
GB201919421D0 (en) 2020-02-12
CN108604982A (en) 2018-09-28
GB2580549B (en) 2020-12-23
TWI727717B (en) 2021-05-11
TW202029042A (en) 2020-08-01
JP2021192265A (en) 2021-12-16
CN112054892A (en) 2020-12-08
JP7248754B2 (en) 2023-03-29
GB2580549A (en) 2020-07-22
GB201811137D0 (en) 2018-08-22
WO2017123433A1 (en) 2017-07-20
JP6633228B2 (en) 2020-01-22
JP2020057412A (en) 2020-04-09
CN108604982B (en) 2020-09-04
TWI692704B (en) 2020-05-01
JP6938602B2 (en) 2021-09-22
KR102201093B1 (en) 2021-01-08
GB2562923A (en) 2018-11-28
KR102054711B1 (en) 2019-12-11

Similar Documents

Publication Publication Date Title
US11151231B2 (en) Secure access device with dual authentication
US10985909B2 (en) Door lock control with wireless user authentication
JP7248754B2 (en) Data security system with cryptography
US10783232B2 (en) Management system for self-encrypting managed devices with embedded wireless user authentication
EP2798565B1 (en) Secure user authentication for bluetooth enabled computer storage devices
US11190936B2 (en) Wireless authentication system
US20140282992A1 (en) Systems and methods for securing the boot process of a device using credentials stored on an authentication token
EP4242902A2 (en) Self-encrypting module with embedded wireless user authentication
US20180053018A1 (en) Methods and systems for facilitating secured access to storage devices
US11971967B2 (en) Secure access device with multiple authentication mechanisms
US20090240937A1 (en) Separated storage of data and key necessary to access the data
KR20140007627A (en) Ic chip