TW202145032A - Method and system for automatically deleting data including a host apparatus and an external apparatus - Google Patents

Method and system for automatically deleting data including a host apparatus and an external apparatus Download PDF

Info

Publication number
TW202145032A
TW202145032A TW109116649A TW109116649A TW202145032A TW 202145032 A TW202145032 A TW 202145032A TW 109116649 A TW109116649 A TW 109116649A TW 109116649 A TW109116649 A TW 109116649A TW 202145032 A TW202145032 A TW 202145032A
Authority
TW
Taiwan
Prior art keywords
data
host device
external device
identification
host
Prior art date
Application number
TW109116649A
Other languages
Chinese (zh)
Other versions
TWI791151B (en
Inventor
楊建綱
Original Assignee
楊建綱
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 楊建綱 filed Critical 楊建綱
Priority to TW109116649A priority Critical patent/TWI791151B/en
Publication of TW202145032A publication Critical patent/TW202145032A/en
Application granted granted Critical
Publication of TWI791151B publication Critical patent/TWI791151B/en

Links

Images

Abstract

This invention relates to a method and a system for automatically deleting data, which include a host apparatus and an external apparatus, wherein the host apparatus executes an application to establish a state of connection with the external apparatus, and when the host apparatus uses a first data in the external apparatus, the host apparatus generates a second data associated with the first data in the host apparatus according to the first data; and when the host apparatus determines that the state of connection with the external apparatus is interrupted, the host apparatus deletes the second data in the host apparatus. Thus, not only is the risk of data leakage reduced, but also it is convenient to store and manage the data, thereby achieving the purpose of improving the data storage safety and the convenience in use.

Description

資料自動刪除方法及其系統Data automatic deletion method and system

本發明係關於一種資料自動刪除方法及其系統,尤指一種於裝置之間中斷連接時即自動刪除資料的資料自動刪除方法及其系統。The present invention relates to an automatic data deletion method and system, in particular to an automatic data deletion method and system for automatically deleting data when the connection between devices is interrupted.

現今,人們習慣將資料儲存在一可攜式之外接裝置內,例如USB隨身碟、SD記憶卡、隨身硬碟或者可作為隨身碟使用的行動裝置,讓資料可以方便攜帶並可隨處使用。Nowadays, people are accustomed to storing data in a portable external device, such as a USB flash drive, SD memory card, flash drive or a mobile device that can be used as a flash drive, so that the data can be easily carried and used anywhere.

當使用者需要使用存放於該外接裝置內的資料時,會將該外接裝置與一電腦主機相連接,通過該電腦主機讀取該外接裝置內的資料。而當使用者通過該電腦主機讀取外接裝置內的資料時,該電腦主機中會存有與該資料相關的暫存檔或紀錄檔案。此外,使用者為了使該外接裝置內的資料可有效率地在該電腦裝置中執行,往往會將資料從該外接裝置中複製或轉移到該電腦主機內。When the user needs to use the data stored in the external device, the external device is connected to a computer host, and the data in the external device is read through the computer host. And when the user reads the data in the external device through the computer host, the computer host will store a temporary file or record file related to the data. In addition, in order to efficiently execute the data in the external device in the computer device, the user often copies or transfers the data from the external device to the computer host.

然而,當該資料被使用完畢後,使用者容易忘記刪除儲存在該電腦主機內與該外接裝置相關的資料,導致資料容易被不肖人士所利用。However, when the data is used up, the user easily forgets to delete the data stored in the main body of the computer and related to the external device, so that the data is easily used by unscrupulous persons.

且由於國人的個資保護意識逐漸提高,如何確保外接裝置中的資料不遺留於公用電腦中,降低外接裝置中資料不被洩露的風險,勢必將成為重要的研發方向。In addition, due to the increasing awareness of personal data protection among Chinese people, how to ensure that the data in the external device is not left in the public computer and reduce the risk of the data in the external device not being leaked is bound to become an important research and development direction.

有鑑於上述現有技術存在有當將外接裝置自電腦主機上取下時,使用者容易忘記刪除在該電腦主機裝置內與該外接裝置相關的資料,導致資料被不肖人士惡意使用的問題,本發明的主要目的係提供一種資料自動刪除方法及其系統,當一主機裝置偵測到與一外接裝置之間的連接狀態中斷時,該主機裝置自動刪除與該外接裝置相關的資料,藉此保護資料不外洩。In view of the above-mentioned problem in the prior art that when the external device is removed from the computer host, the user easily forgets to delete the data related to the external device in the computer host device, resulting in the malicious use of the data by unscrupulous persons, the present invention The main purpose of the invention is to provide an automatic data deletion method and system. When a host device detects that the connection state with an external device is interrupted, the host device automatically deletes the data related to the external device, thereby protecting the data. Do not leak.

為了達成上述目的所採取的一技術手段,係令前述資料自動刪除方法,係包括以下步驟: 該主機裝置執行一應用程式與該外接裝置建立一連接狀態; 當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關之一第二資料; 當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置刪除該主機裝置中的該第二資料。A technical means adopted in order to achieve the above-mentioned purpose is to automatically delete the aforementioned data, which includes the following steps: The host device executes an application to establish a connection state with the external device; When the host device uses a first data in the external device, the host device generates a second data related to the first data in the host device according to the first data; When the host device determines that the connection state with the external device is interrupted, the host device deletes the second data in the host device.

此外,為了達成上述目的所採取的另一技術手段,係令前述資料自動刪除系統,包括: 一主機裝置;及 一外接裝置,連接該主機裝置; 其中,該主機裝置執行一應用程式與該外接裝置建立一連接狀態;當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關之一第二資料;當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置刪除該主機裝置中的該第二資料。In addition, another technical means adopted in order to achieve the above-mentioned purpose is to automatically delete the aforementioned data, including: a host device; and an external device connected to the host device; Wherein, the host device executes an application program to establish a connection state with the external device; when the host device uses a first data in the external device, the host device generates and communicates with the external device in the host device according to the first data The first data is related to a second data; when the host device determines that the connection state with the external device is interrupted, the host device deletes the second data in the host device.

本發明藉由該主機裝置判斷與該外接裝置之間的連接狀態中斷時,該主機裝置將儲存在該主機裝置中對應該第一資料的第二資料刪除,以避免因為使用者因為忘記刪除資料,造成資料被有心人士利用、盜竊等問題,藉此可提升保管資料的安全性,以及對於資料使用的便利性。In the present invention, when the host device determines that the connection state with the external device is interrupted, the host device deletes the second data corresponding to the first data stored in the host device, so as to avoid the user forgetting to delete the data , causing problems such as data being used and stolen by intentional people, which can improve the security of data storage and the convenience of data use.

關於本發明資料自動刪除系統的較佳實施例,請參考圖1所示,其包括一外接裝置10及一主機裝置20,該外接裝置10以熱插拔或無線通訊例如:Wi-Fi、藍芽(Bluetooth)等,的方式與該主機裝置20連接,其中,該外接裝置10與該主機裝置20連接時,該主機裝置20執行一應用程式與該外接裝置10建立一連接狀態,當該外接裝置10從該主機裝置20上被移除(拔下)時,則該連接狀態中斷。在本實施例中,該外接裝置10可以是一USB隨身碟、一記憶卡、一OTG隨身碟、一作為OTG隨身碟使用的行動裝置、一無線隨身碟等具有儲存資料功能的外接裝置;該主機裝置20可以是一電腦裝置。For the preferred embodiment of the data automatic deletion system of the present invention, please refer to FIG. 1, which includes an external device 10 and a host device 20. The external device 10 is hot-plugged or wireless communication such as Wi-Fi, Bluetooth The host device 20 is connected to the host device 20 by means of Bluetooth, etc., wherein, when the external device 10 is connected to the host device 20, the host device 20 executes an application program to establish a connection state with the external device 10. When the external device 10 is connected to the host device 20 When the device 10 is removed (unplugged) from the host device 20, the connection state is interrupted. In this embodiment, the external device 10 may be an external device with a function of storing data, such as a USB flash drive, a memory card, an OTG flash drive, a mobile device used as an OTG flash drive, a wireless flash drive, or the like; The host device 20 may be a computer device.

該外接裝置10包括一第一通訊單元11、一控制單元12及一第一儲存單元13,該控制單元12連接該第一通訊單元11及該第一儲存單元13,該第一通訊單元11與該主機裝置20通訊連接,該控制單元12用以處理資訊,該第一儲存單元13儲存一筆以上第一資料,該第一通訊單元11可以是一通用序列匯流排(Universal Serial Bus, USB)或支持Wi-Fi、Bluetooth等無線通訊介面,該控制單元12可以是一智慧晶片。The external device 10 includes a first communication unit 11 , a control unit 12 and a first storage unit 13 , the control unit 12 is connected to the first communication unit 11 and the first storage unit 13 , the first communication unit 11 and the The host device 20 is connected for communication, the control unit 12 is used for processing information, the first storage unit 13 stores more than one piece of first data, the first communication unit 11 can be a Universal Serial Bus (USB) or Supporting wireless communication interfaces such as Wi-Fi and Bluetooth, the control unit 12 can be a smart chip.

該主機裝置20包括一第二通訊單元21、一處理單元22及一第二儲存單元23,該處理單元22連接該第二通訊單元21及該第二儲存單元23,該第二通訊單元21與該第一通訊單元11通訊連接,該處理單元22處理接收到的資訊並執行相關的應用程式,該第二儲存單元23儲存資料,該第二通訊單元21可以是一通用序列匯流排(Universal Serial Bus, USB)或支持Wi-Fi、Bluetooth等無線通訊介面,具體而言,該第二通訊單元12可與該第一通訊單元11以熱插拔或Wi-Fi、Bluetooth等無線通訊的方式連接。The host device 20 includes a second communication unit 21, a processing unit 22 and a second storage unit 23. The processing unit 22 is connected to the second communication unit 21 and the second storage unit 23. The second communication unit 21 is connected to the second communication unit 21 and the second storage unit 23. The first communication unit 11 is connected for communication, the processing unit 22 processes the received information and executes related application programs, the second storage unit 23 stores data, and the second communication unit 21 may be a universal serial bus (Universal Serial Bus). Bus, USB) or support wireless communication interfaces such as Wi-Fi, Bluetooth, etc. Specifically, the second communication unit 12 can be connected to the first communication unit 11 by hot-plug or wireless communication such as Wi-Fi, Bluetooth, etc. .

使用上,由該資料自動刪除系統執行本發明資料自動刪除方法,請一併參閱圖2所示,該資料自動刪除方法的較佳實施例包括有以下步驟: 由該主機裝置20執行該應用程式與該外接裝置10建立連接狀態(S201); 當該主機裝置20使用該外接裝置10中的第一資料時,該主機裝置20根據該第一資料於該主機裝置20中產生與該第一資料相關之一第二資料(S202); 由該主機裝置20判斷與該外接裝置10的連接狀態是否中斷(S203),且當該主機裝置20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20刪除該主機裝置20中的該第二資料(S204)。In use, the automatic data deletion method of the present invention is executed by the automatic data deletion system. Please refer to FIG. 2 together. A preferred embodiment of the automatic data deletion method includes the following steps: The host device 20 executes the application and establishes a connection state with the external device 10 (S201); When the host device 20 uses the first data in the external device 10, the host device 20 generates a second data related to the first data in the host device 20 according to the first data (S202); The host device 20 determines whether the connection state with the external device 10 is interrupted ( S203 ), and when the host device 20 determines that the connection state with the external device 10 is interrupted, the host device 20 deletes the Second data (S204).

在本實施例中,該主機裝置20使用該外接裝置10中的該第一資料的步驟包括,該主機裝置20讀取、複製或另存該外接裝置10中的該第一資料。In this embodiment, the step of using the first data in the external device 10 by the host device 20 includes reading, copying or saving the first data in the external device 10 by the host device 20 .

如此一來,當該主機裝置20判斷與該外接裝置10之間的連接狀態中斷時,該主機裝置20便會將儲存在該主機裝置20中對應該第一資料的第二資料刪除,以避免因為使用者忘記刪除資料,造成資料被有心人士利用、盜竊等問題,藉此可提升保管資料的安全性,以及對於資料使用的便利性。In this way, when the host device 20 determines that the connection state with the external device 10 is interrupted, the host device 20 will delete the second data corresponding to the first data stored in the host device 20 to avoid Because the user forgets to delete the data, the data is used or stolen by the intentional person, which can improve the security of the data storage and the convenience of the data use.

進一步的,請參閱圖3所示,該外接裝置10預存有一識別表,且該識別表記錄至少一識別比對資訊。當使用者將該外接裝置10以熱插拔方式插接在該主機裝置20上,使該第一通訊單元11與該第二通訊單元21連接,使用者透過操作使該主機裝置20執行該應用程式。當該主機裝置20的該處理單元22執行該應用程式時,該主機裝置20的該處理單元22透過該第二通訊單元21發送一識別資訊至該外接裝置10的該第一通訊單元11(S301),且該外接裝置10的控制單元12根據該識別資訊判斷接收到的識別資訊與識別表中的識別比對資訊是否相同(S302)。當該外接裝置10的控制單元12判斷該識別比對資訊與該識別資訊相同時,該外接裝置10建立與該主機裝置20的連接狀態(S303)。如圖4A所示,當使用者需要使用該第一儲存單元13內的第一資料時,該主機裝置20的該處理單元22根據該第一資料於該主機裝置20中產生與該第一資料相關的一第二資料(S304),並且儲存在該第二儲存單元23中,且該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態是否中斷(S305)。如圖4B所示,當該主機裝置20的該處理單元20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20的該處理單元20即刪除該主機裝置20中的該第二資料(S306)。在本實施例中,該應用程式可以是預先安裝於該主機裝置20內,或者該應用程式可以是儲存在該外接裝置10內,當該外接裝置10與該主機裝置20連接時,該外接裝置10會將該應用程式傳送給該主機裝置20進行安裝。Further, please refer to FIG. 3 , the external device 10 prestores an identification table, and the identification table records at least one identification comparison information. When the user plugs the external device 10 into the host device 20 in a hot-plug manner to connect the first communication unit 11 and the second communication unit 21, the user makes the host device 20 execute the application through operation program. When the processing unit 22 of the host device 20 executes the application program, the processing unit 22 of the host device 20 sends an identification information to the first communication unit 11 of the external device 10 through the second communication unit 21 ( S301 ) ), and the control unit 12 of the external device 10 determines whether the received identification information is the same as the identification comparison information in the identification table according to the identification information (S302). When the control unit 12 of the external device 10 determines that the identification comparison information is the same as the identification information, the external device 10 establishes a connection state with the host device 20 (S303). As shown in FIG. 4A, when the user needs to use the first data in the first storage unit 13, the processing unit 22 of the host device 20 generates and matches the first data in the host device 20 according to the first data A related second data (S304) is stored in the second storage unit 23, and the processing unit 22 of the host device 20 determines whether the connection state with the external device 10 is interrupted (S305). As shown in FIG. 4B , when the processing unit 20 of the host device 20 determines that the connection state with the external device 10 is interrupted, the processing unit 20 of the host device 20 deletes the second data in the host device 20 ( S306). In this embodiment, the application program may be pre-installed in the host device 20 , or the application program may be stored in the external device 10 . When the external device 10 is connected to the host device 20 , the external device 10 will transmit the application to the host device 20 for installation.

在本實施例中,該第二資料包括該第一資料的暫存檔、該第一資料的複製檔或該第一資料編輯後之檔案至少一者。In this embodiment, the second data includes at least one of a temporary file of the first data, a copied file of the first data, or an edited file of the first data.

進一步的,該主機裝置20的該第二儲存單元23還儲存有一資料紀錄表,且該主機裝置20產生該第二資料時,該主機裝置20的該應用程式紀錄該第二資料的一位址資訊至該資料紀錄表中。而當該主機裝置20判斷該外接裝置的連接狀態中斷時,該主機裝置20的該應用程式依據該資料紀錄表中的該位址資訊刪除該第二資料。在本實施例中,該資料紀錄表記錄該第二資料的名稱、位址、建立時間等資訊。Further, the second storage unit 23 of the host device 20 also stores a data record table, and when the host device 20 generates the second data, the application program of the host device 20 records an address of the second data information into the data record table. When the host device 20 determines that the connection state of the external device is interrupted, the application program of the host device 20 deletes the second data according to the address information in the data record table. In this embodiment, the data record table records information such as the name, address, and creation time of the second data.

舉例來說,當使用者透過該主機裝置20使用該外接裝置10的該第一資料時,該主機裝置20的應用程式會紀錄該第二資料儲存在該第二儲存單元23中的路徑位址,即該位址資訊(如表2所示),故當該外接裝置10與該主機裝置20的連接狀態中斷後,該主機裝置20可根據該位址資訊刪除該第二資料。For example, when the user uses the first data of the external device 10 through the host device 20 , the application program of the host device 20 will record the path address of the second data stored in the second storage unit 23 , that is, the address information (as shown in Table 2), so when the connection between the external device 10 and the host device 20 is interrupted, the host device 20 can delete the second data according to the address information.

進一步的,當該主機裝置20產生該第二資料時,該主機裝置20的該應用程式給予該第二資料一標記。當該主機裝置20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20的該應用程式依據該標記搜尋該主機裝置20中的該第二資料並刪除該第二資料。Further, when the host device 20 generates the second data, the application program of the host device 20 assigns a flag to the second data. When the host device 20 determines that the connection state with the external device 10 is interrupted, the application program of the host device 20 searches for the second data in the host device 20 according to the flag and deletes the second data.

也就是說,該主機裝置20在產生該第二資料時,該主機裝置20的該應用程式可直接紀錄該第二資料的該位址資訊,或是給予該第二資料該標記,用於當該主機裝置20與該外接裝置10的連接狀態中斷時,該主機裝置20的該應用程式可根據該位址資訊或是該標記找到該主機裝置20中的該第二資料,並予以刪除。That is to say, when the host device 20 generates the second data, the application program of the host device 20 can directly record the address information of the second data, or give the second data the mark for use when When the connection between the host device 20 and the external device 10 is interrupted, the application program of the host device 20 can find the second data in the host device 20 according to the address information or the tag and delete it.

進一步的,請參閱圖5A及圖5B所示,由於該外接裝置10與該主機裝置20可能同時被不同的使用者使用,為了有效區別不同使用者透過該主機裝置20使用該外接裝置10內的第一資料的權限,該外接裝置10的該第一資料設有一第一機密級別,且該外接裝置10的該識別表更紀錄該識別比對資訊對應之一使用權限級別,如表1所示。在本實施例中,該外接裝置10的該識別比對資訊包括有一識別碼、一密碼或一電腦識別資料,且該主機裝置20發送的該識別資訊包括有一使用者帳號及一密碼,或是一電腦識別碼,如:電腦名稱、全域唯一識別碼(GUID)或通用唯一識別碼(UUID)。 識別碼 密碼 使用權限級別 User123 123 4 User456 456 3 User789 789 2 PC123 - 2 PC456 - 1 表1Further, please refer to FIG. 5A and FIG. 5B , since the external device 10 and the host device 20 may be used by different users at the same time, in order to effectively distinguish between different users using the external device 10 through the host device 20 The authority of the first data, the first data of the external device 10 is set with a first confidentiality level, and the identification table of the external device 10 further records a use authority level corresponding to the identification comparison information, as shown in Table 1 . In this embodiment, the identification comparison information of the external device 10 includes an identification code, a password or a computer identification data, and the identification information sent by the host device 20 includes a user account and a password, or A computer identification code, such as: computer name, globally unique identifier (GUID) or universally unique identifier (UUID). Identifier password Use permission level User123 123 4 User456 456 3 User789 789 2 PC123 - 2 PC456 - 1 Table 1

舉例來說,該外接裝置10可根據接收到的識別資訊中的使用者帳號及密碼,判斷是否與識別比對資訊中的識別碼及密碼相同,藉此確認該識別資訊與該識別比對資訊是否相同,而該識別資訊中的該使用者帳號及該密碼可以是由使用者透過操作該主機裝置20的該應用程式輸入的,且由該主機裝置20將使用者輸入的該識別資訊傳送到該外接裝置10。又或是該識別資訊中僅具有電腦識別碼,且該識別比對資訊的該識別碼是電腦識別資料,該外接裝置10可根據該識別資訊中的該電腦識別碼與該識別比對資訊中的該電腦識別資料判斷該識別資訊與該識別比對資訊是否相同。由於該電腦識別碼與該電腦識別資料可以是一長串亂碼構成的資料、GUID、或UUID,不易被他人盜錄,仍具有相當的機密性,故以電腦識別碼與電腦識別資料進行比對時,可無需另外設置密碼供比對驗證。For example, the external device 10 can determine whether the identification code and password in the identification information are the same according to the user account and password in the received identification information, thereby confirming the identification information and the identification and comparison information. are the same, and the user account number and the password in the identification information can be input by the user through the application program operating the host device 20, and the host device 20 transmits the identification information input by the user to The external device 10 . Or the identification information only has a computer identification code, and the identification code of the identification comparison information is computer identification data, the external device 10 can be based on the computer identification code in the identification information and the identification comparison information. The computer identification data of the computer determines whether the identification information is the same as the identification comparison information. Since the computer identification code and the computer identification data can be a long string of garbled data, GUID, or UUID, they are not easy to be stolen by others and still have considerable confidentiality. Therefore, the computer identification code is compared with the computer identification data. , you do not need to set additional passwords for comparison and verification.

當該主機裝置20執行該應用程式時,該主機裝置20傳送該識別資訊至該外接裝置10(S501),供該外接裝置10判斷該識別資訊是否與該識別比對資訊相同(S502)。當該外接裝置10判斷該識別比對資訊與該識別資訊相同時,該外接裝置10授予該主機裝置20與該識別資訊相同的該識別比對資訊對應的該使用權限級別(S503),且該主機裝置20建立與該外接裝置10的連接狀態(S504)。當使用者需要使用該第一儲存單元13內的第一資料時,該主機裝置20向該外接裝置10請求使用該第一資料(S505),且該外接裝置10判斷該第一資料的該第一機密級別是否低於該使用權限級別(S506)。當該外接裝置10判斷該第一機密級別比該使用權限級別低時,該外接裝置10允許該主機裝置20使用該第一資料(S507),且該主機裝置20根據允許使用的該第一資料於該主機裝置20中產生與該允許使用的第一資料相關的第二資料(S508),且該主機裝置20判斷與該外接裝置10的連接狀態是否中斷(S509)。當該主機裝置20的該處理單元20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20刪除該主機裝置20中的該第二資料(S510)。When the host device 20 executes the application program, the host device 20 transmits the identification information to the external device 10 ( S501 ) for the external device 10 to determine whether the identification information is the same as the identification comparison information ( S502 ). When the external device 10 determines that the identification comparison information is the same as the identification information, the external device 10 grants the host device 20 the use authority level corresponding to the identification comparison information that is the same as the identification information (S503), and the The host device 20 establishes a connection state with the external device 10 (S504). When the user needs to use the first data in the first storage unit 13, the host device 20 requests the external device 10 to use the first data (S505), and the external device 10 determines the first data of the first data Whether a secret level is lower than the usage authority level (S506). When the external device 10 determines that the first confidentiality level is lower than the use authority level, the external device 10 allows the host device 20 to use the first data ( S507 ), and the host device 20 uses the first data that is allowed to be used. Second data related to the allowed first data is generated in the host device 20 (S508), and the host device 20 determines whether the connection state with the external device 10 is interrupted (S509). When the processing unit 20 of the host device 20 determines that the connection state with the external device 10 is interrupted, the host device 20 deletes the second data in the host device 20 (S510).

舉例來說,如表1及圖6A所示,若該主機裝置20的識別資訊中的使用者帳號是User456,密碼是456,則該外接裝置10可根據識別表判斷與該識別資訊相同的識別比對資訊對應的使用權限級別是3,且該外接裝置10的第一儲存單元中存有複數第一資料,分別為:一第一資料a,設置的第一機密級別是LV1;一第一資料b,設置的第一機密級別是LV2;一第一資料c,設置的第一機密級別是LV3;一第一資料d,設置的第一機密級別是LV4;因此,該外接裝置10判斷該第一機密級別比該使用權限級別低的僅有該第一資料a及該第一資料b,該外接裝置10僅允許該主機裝置20使用該第一資料a及該第一資料b。故該主機裝置20僅可根據該第一資料a及該第一資料b,於該主機裝置20中產生對應的一第二資料a及一第二資料b。且如圖6B所示,當該主機裝置20的該處理單元20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20即刪除該主機裝置20中的該第二資料a及第二資料b。For example, as shown in Table 1 and FIG. 6A , if the user account in the identification information of the host device 20 is User456 and the password is 456, the external device 10 can determine the same identification as the identification information according to the identification table The use authority level corresponding to the comparison information is 3, and the first storage unit of the external device 10 stores a plurality of first data, respectively: a first data a, the set first confidentiality level is LV1; a first data For data b, the set first confidentiality level is LV2; for a first data c, the set first confidentiality level is LV3; for a first data d, the set first confidentiality level is LV4; therefore, the external device 10 judges the Only the first data a and the first data b have the first confidentiality level lower than the use authority level, and the external device 10 only allows the host device 20 to use the first data a and the first data b. Therefore, the host device 20 can only generate a corresponding second data a and a second data b in the host device 20 according to the first data a and the first data b. And as shown in FIG. 6B , when the processing unit 20 of the host device 20 determines that the connection state with the external device 10 is interrupted, the host device 20 deletes the second data a and the second data in the host device 20 b.

進一步的,請參閱圖7A及7B所示,該第一資料設有該第一機密級別,且該主機裝置20預設有一資料保留級別。當該主機裝置20產生該第二資料時,該主機裝置20的該應用程式給予該第二資料一第二機密級別,該第二機密級別與該第一資料的該第一機密級別相同,且該第二機密級別記錄在該資料紀錄表中,如表2所示。當主機裝置20判斷與該外接裝置10的連線中斷,且當該主機裝置20的該應用程式判斷該第二機密級別比該資料保留級別高時,該主機裝置20的該應用程式刪除該第二資料,反之,則不刪除該第二資料。 資料名稱 第二機密級別 位址資訊 第二資料a LV1 C:\record\data1 第二資料b LV2 C:\record\data2 第二資料c LV3 C:\record\data3 第二資料d LV4 C:\record\data4 表2Further, as shown in FIGS. 7A and 7B , the first data is provided with the first confidentiality level, and the host device 20 is preset with a data retention level. When the host device 20 generates the second data, the application program of the host device 20 gives the second data a second confidentiality level, the second confidentiality level is the same as the first confidentiality level of the first data, and The second secret level is recorded in the data record table, as shown in Table 2. When the host device 20 determines that the connection with the external device 10 is disconnected, and when the application of the host device 20 determines that the second confidentiality level is higher than the data retention level, the application of the host device 20 deletes the first Second data, otherwise, the second data will not be deleted. Data name Second Class Secret address information second information a LV1 C:\record\data1 second data b LV2 C:\record\data2 second data c LV3 C:\record\data3 second data d LV4 C:\record\data4 Table 2

也就是說,當該主機裝置20執行該應用程式時,該主機裝置20傳送該識別資訊至該外接裝置10(S701),供該外接裝置10判斷該識別資訊是否與該識別比對資訊相同(S702)。當該外接裝置10判斷該識別比對資訊與該識別資訊相同時,該外接裝置10授予該主機裝置20與該識別資訊相同的該識別比對資訊對應的該使用權限級別(S703),且該主機裝置20建立與該外接裝置10的連接狀態(S704)。當使用者需要使用該第一儲存單元13內的第一資料時,該主機裝置20向該外接裝置10請求使用該第一資料(S705),且該外接裝置10判斷該第一資料的該第一機密級別是否低於該使用權限級別(S706)。當該外接裝置10判斷該第一機密級別比該使用權限級別低時,該外接裝置10允許該主機裝置20使用該第一資料(S707),且該主機裝置20根據允許使用的第一資料於該主機裝置20中產生與該允許使用的第一資料相關的第二資料(S708),且該主機裝置20判斷與該外接裝置10的連接狀態是否中斷(S709)。That is, when the host device 20 executes the application program, the host device 20 transmits the identification information to the external device 10 (S701) for the external device 10 to determine whether the identification information is the same as the identification comparison information (S701). S702). When the external device 10 determines that the identification matching information is the same as the identification information, the external device 10 grants the host device 20 the use authority level corresponding to the identification matching information that is the same as the identification information (S703), and the The host device 20 establishes a connection state with the external device 10 (S704). When the user needs to use the first data in the first storage unit 13, the host device 20 requests the external device 10 to use the first data (S705), and the external device 10 determines the first data of the first data Whether a secret level is lower than the usage authority level (S706). When the external device 10 determines that the first confidentiality level is lower than the use authority level, the external device 10 allows the host device 20 to use the first data ( S707 ), and the host device 20 uses the allowed first data in the The host device 20 generates second data related to the allowed first data (S708), and the host device 20 determines whether the connection state with the external device 10 is interrupted (S709).

進一步的,當該主機裝置20的該處理單元20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20判斷該第二資料的該第二機密級別是否高於該資料保留級別(S710)。當該第二資料的該第二機密級別高於該資料保留級別時,該主機裝置20刪除該主機裝置20中的該第二資料(S711)。反之,當該第二資料的該第二機密級別不高於該資料保留級別時,則該主機裝置20不刪除該第二資料(S712)Further, when the processing unit 20 of the host device 20 determines that the connection state with the external device 10 is interrupted, the host device 20 determines whether the second confidentiality level of the second data is higher than the data retention level (S710) . When the second confidentiality level of the second data is higher than the data retention level, the host device 20 deletes the second data in the host device 20 (S711). Conversely, when the second confidentiality level of the second data is not higher than the data retention level, the host device 20 does not delete the second data (S712).

舉例來說,如表1、表2及圖8A所示,若該主機裝置20預設的資料保留級別是3,且該主機裝置20的識別資訊中的使用者帳號是User123,密碼是123,則該外接裝置10可根據識別表判斷與該識別資訊相同的識別比對資訊對應的使用權限級別是LV4,且該外接裝置10的第一儲存單元中存有該第一資料a、該第一資料b、該第一資料c及該第一資料d。因此,該外接裝置10判斷該第一機密級別比該使用權限級別低的有該第一資料a、該第一資料b、該第一資料c及該第一資料d,且該外接裝置10允許該主機裝置20使用該第一資料a、該第一資料b、該第一資料c及該第一資料d。故該主機裝置20可根據該第一資料a、該第一資料b、該第一資料c及該第一資料d,於該主機裝置20中產生對應的該第二資料a、該第二資料b、該第二資料c及該第二資料d,且該第二資料a、該第二資料b、該第二資料c及該第二資料d的第二資料機密級別分別與該第一資料a、該第一資料b、該第一資料c及該第一資料d的該第一機密級別相同,分別為LV1、LV2、LV3、LV4。For example, as shown in Table 1, Table 2 and FIG. 8A, if the preset data retention level of the host device 20 is 3, and the user account in the identification information of the host device 20 is User123 and the password is 123, Then the external device 10 can determine according to the identification table that the use authority level corresponding to the identification matching information that is the same as the identification information is LV4, and the first storage unit of the external device 10 stores the first data a, the first Data b, the first data c and the first data d. Therefore, the external device 10 determines that the first confidentiality level is lower than the use authority level including the first data a, the first data b, the first data c and the first data d, and the external device 10 allows The host device 20 uses the first data a, the first data b, the first data c and the first data d. Therefore, the host device 20 can generate the corresponding second data a and the second data in the host device 20 according to the first data a, the first data b, the first data c and the first data d b. The second data c and the second data d, and the second data confidentiality levels of the second data a, the second data b, the second data c and the second data d are respectively the same as the first data a. The first confidentiality levels of the first data b, the first data c, and the first data d are the same, which are LV1, LV2, LV3, and LV4, respectively.

且如圖8B所示,當該主機裝置20的該處理單元20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20判斷該第二資料的第二機密級別高於該資料保留級別的僅有該第二資料d,因此,該主機裝置20僅刪除該主機裝置20中的該第二資料d,且不刪除該第二資料的第二機密級別不高於該資料保留級別的該第二資料a、該第二資料b及該第二資料c。And as shown in FIG. 8B , when the processing unit 20 of the host device 20 determines that the connection state with the external device 10 is interrupted, the host device 20 determines that the second confidentiality level of the second data is higher than that of the data retention level. There is only the second data d. Therefore, the host device 20 only deletes the second data d in the host device 20, and does not delete the second data whose second confidentiality level is not higher than the data retention level. Two data a, the second data b and the second data c.

綜上所述,本發明提供的資料自動刪除方法及其系統,連接外接裝置於主機裝置以使用外接裝置的資料時,不需擔心外接裝置的重要資料遺留在主機裝置造成資料外流的問題,符合各國對於重要資料保管規範的趨勢,特別是,可實現歐盟一般資料保護規範(GDPR)的資料被遺忘權。於一實施例,更可藉由識別資訊授予使用權限級別及建立主機裝置與外接裝置的連線狀態,增加連線及資料使用的安全層級。於一實施例,可依據資料機密級別與主機裝置的資料保留級別判斷主機裝置中相關資料的去留,僅刪除機密層級較高的資料而保留機密性較低的資料,增加資料刪除與保留的彈性。To sum up, with the method and system for automatic data deletion provided by the present invention, when the external device is connected to the host device to use the data of the external device, there is no need to worry about the problem of data outflow caused by the important data of the external device being left on the host device. Trends in national regulations regarding the custody of important data, in particular, the right to be forgotten under the EU General Data Protection Regulation (GDPR). In one embodiment, the identification information can be used to grant a permission level and establish a connection state between the host device and the external device, thereby increasing the security level of connection and data usage. In one embodiment, the removal and retention of relevant data in the host device can be determined according to the data confidentiality level and the data retention level of the host device, only data with higher confidentiality levels are deleted and data with lower confidentiality levels are retained, and data deletion and retention are increased. elasticity.

惟以上所述者,僅為本發明之實施例,當不能以此限定本發明實施之範圍,凡依本發明申請專利範圍及專利說明書內容所作之簡單的等效變化與修飾,皆仍屬本發明專利涵蓋之範圍內However, the above descriptions are merely examples of the present invention, which should not limit the scope of the present invention. Any simple equivalent changes and modifications made according to the scope of the patent application of the present invention and the contents of the patent specification are still within the scope of the present invention. The scope of the invention patent

10:外接裝置 11:第一通訊單元 12:控制單元 13:第一儲存單元 20:主機裝置 21:第二通訊單元 22:處理單元 23:第二儲存單元 S201~S204,S301~S306,S501~S510,S701~S712:步驟10: External device 11: The first communication unit 12: Control unit 13: The first storage unit 20: Host device 21: The second communication unit 22: Processing unit 23: Second storage unit S201~S204, S301~S306, S501~S510, S701~S712: Steps

圖1係本發明較佳實施例的系統架構方塊圖。 圖2係本發明較佳實施例的方法流程圖。 圖3係本發明較佳實施例的方法流程圖。 圖4A及圖4B係本發明較佳實施例的方塊示意圖。 圖5A及圖5B係本發明較佳實施例的方法流程圖。 圖6A及圖6B係本發明較佳實施例的方塊示意圖。 圖7A及圖7B係本發明較佳實施例的方法流程圖。 圖8A及圖8B係本發明較佳實施例的方塊示意圖。FIG. 1 is a block diagram of a system architecture of a preferred embodiment of the present invention. FIG. 2 is a flow chart of a method according to a preferred embodiment of the present invention. FIG. 3 is a flow chart of a method according to a preferred embodiment of the present invention. 4A and 4B are schematic block diagrams of a preferred embodiment of the present invention. 5A and 5B are flowcharts of a method according to a preferred embodiment of the present invention. 6A and 6B are schematic block diagrams of a preferred embodiment of the present invention. 7A and 7B are flowcharts of a method according to a preferred embodiment of the present invention. 8A and 8B are schematic block diagrams of a preferred embodiment of the present invention.

10:外接裝置10: External device

11:第一通訊單元11: The first communication unit

12:控制單元12: Control unit

13:第一儲存單元13: The first storage unit

20:主機裝置20: Host device

21:第二通訊單元21: The second communication unit

22:處理單元22: Processing unit

23:第二儲存單元23: Second storage unit

Claims (10)

一種資料自動刪除方法,包括以下步驟: 一主機裝置執行一應用程式與一外接裝置建立一連接狀態; 當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關之一第二資料; 當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置刪除該主機裝置中的該第二資料。A method for automatically deleting data, comprising the following steps: A host device executes an application program to establish a connection state with an external device; When the host device uses a first data in the external device, the host device generates a second data related to the first data in the host device according to the first data; When the host device determines that the connection state with the external device is interrupted, the host device deletes the second data in the host device. 如請求項1所述之資料自動刪除方法,其中,該外接裝置預存一識別表,該識別表記錄至少一識別比對資訊; 其中,當該主機裝置執行該應用程式時,該主機裝置傳送一識別資訊至該外接裝置,且當該外接裝置判斷該識別比對資訊與該識別資訊相同時,該外接裝置建立與該主機裝置之連接狀態。The automatic data deletion method according to claim 1, wherein the external device prestores an identification table, and the identification table records at least one identification comparison information; Wherein, when the host device executes the application program, the host device transmits an identification information to the external device, and when the external device determines that the identification comparison information is the same as the identification information, the external device establishes a connection with the host device the connection status. 如請求項2所述之資料自動刪除方法,其中,該第一資料設有一第一機密級別,且該識別表更記錄該識別比對資訊對應之一使用權限級別; 其中,當該外接裝置判斷該識別比對資訊與該識別資訊相同時,該外接裝置授予該主機裝置與該識別資訊相同的該識別比對資訊對應的該使用權限級別; 其中,當該外接裝置判斷該第一機密級別比該使用權限級別低時,該外接裝置允許該主機裝置使用該第一資料。The automatic data deletion method according to claim 2, wherein the first data is provided with a first confidentiality level, and the identification table further records a use authority level corresponding to the identification comparison information; Wherein, when the external device determines that the identification comparison information is the same as the identification information, the external device grants the host device the use authority level corresponding to the identification comparison information that is the same as the identification information; Wherein, when the external device determines that the first confidentiality level is lower than the use authority level, the external device allows the host device to use the first data. 如請求項1所述之資料自動刪除方法,其中,該主機裝置存有一資料記錄表; 其中,當該主機裝置產生該第二資料時,該主機裝置的該應用程式記錄該第二資料的一位址資訊至該資料記錄表中; 其中,當主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置的該應用程式依據該資料記錄表中的該位址資訊刪除該第二資料。The automatic data deletion method according to claim 1, wherein the host device stores a data record table; Wherein, when the host device generates the second data, the application program of the host device records an address information of the second data in the data record table; Wherein, when the host device determines that the connection state with the external device is interrupted, the application program of the host device deletes the second data according to the address information in the data record table. 如請求項1所述之資料自動刪除方法,其中,當該主機裝置產生該第二資料時,該主機裝置的該應用程式給予該第二資料一標記; 其中,當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置的該應用程式依據該標記搜尋該主機裝置中的該第二資料並刪除該第二資料。The automatic data deletion method as described in claim 1, wherein when the host device generates the second data, the application program of the host device assigns a flag to the second data; Wherein, when the host device determines that the connection state with the external device is interrupted, the application program of the host device searches for the second data in the host device according to the flag and deletes the second data. 如請求項4或5所述之資料自動刪除方法,其中,該第一資料設有一第一機密級別,且該主機裝置預設有一資料保留級別; 其中,當該主機裝置產生該第二資料時,該主機裝置的該應用程式給予該第二資料一第二機密級別,該第二機密級別與該第一資料的該第一機密級別相同; 其中,當主機裝置判斷與該外接裝置的連線中斷,且當該主機裝置的該應用程式判斷該第二機密級別比該資料保留級別高時,該主機裝置的該應用程式刪除該第二資料。The data automatic deletion method according to claim 4 or 5, wherein the first data has a first confidentiality level, and the host device is preset with a data retention level; Wherein, when the host device generates the second data, the application program of the host device gives the second data a second confidentiality level, the second confidentiality level is the same as the first confidentiality level of the first data; Wherein, when the host device determines that the connection with the external device is disconnected, and when the application program of the host device determines that the second confidentiality level is higher than the data retention level, the application program of the host device deletes the second data . 如請求項1所述之資料自動刪除方法,其中,該主機裝置使用該外接裝置中的該第一資料的步驟包括,該主機裝置讀取、複製或另存該外接裝置中的該第一資料。The automatic data deletion method according to claim 1, wherein the step of using the first data in the external device by the host device includes reading, copying or saving the first data in the external device by the host device. 如請求項1至5及7中任一項所述之資料自動刪除方法,其中,該第二資料包括該第一資料的暫存檔、該第一資料的複製檔或該第一資料編輯後之檔案至少一者。The automatic data deletion method according to any one of claims 1 to 5 and 7, wherein the second data includes a temporary file of the first data, a copied file of the first data, or the edited first data file at least one. 如請求項6所述之資料自動刪除方法,其中,該第二資料包括該第一資料的暫存檔、該第一資料的複製檔或該第一資料編輯後之檔案至少一者。The automatic data deletion method according to claim 6, wherein the second data includes at least one of a temporary file of the first data, a duplicate file of the first data, or an edited file of the first data. 一種資料自動刪除系統,包括: 一主機裝置及一外接裝置; 其中,該主機裝置與該外接裝置執行如請求項1至9中任一項所述之資料自動刪除方法。An automatic data deletion system, comprising: a host device and an external device; Wherein, the host device and the external device execute the data automatic deletion method described in any one of claim 1 to 9.
TW109116649A 2020-05-20 2020-05-20 Data automatic deletion method and system thereof TWI791151B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW109116649A TWI791151B (en) 2020-05-20 2020-05-20 Data automatic deletion method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109116649A TWI791151B (en) 2020-05-20 2020-05-20 Data automatic deletion method and system thereof

Publications (2)

Publication Number Publication Date
TW202145032A true TW202145032A (en) 2021-12-01
TWI791151B TWI791151B (en) 2023-02-01

Family

ID=80783875

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109116649A TWI791151B (en) 2020-05-20 2020-05-20 Data automatic deletion method and system thereof

Country Status (1)

Country Link
TW (1) TWI791151B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI358642B (en) * 2007-12-31 2012-02-21 Fineart Technology Co Ltd Storage device and access authority management sys
TW201137659A (en) * 2010-04-28 2011-11-01 Nexcom Int Co Ltd Data deleting method for computer storage device
TWI612440B (en) * 2014-07-03 2018-01-21 宇瞻科技股份有限公司 Information storage system with information security protection

Also Published As

Publication number Publication date
TWI791151B (en) 2023-02-01

Similar Documents

Publication Publication Date Title
EP2377063B1 (en) Method and apparatus for providing access to files based on user identity
JP4787055B2 (en) Information processing apparatus with information division recording function
CN100580642C (en) Universal serial bus storage device and access control method thereof
US8302178B2 (en) System and method for a dynamic policies enforced file system for a data storage device
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
US10650158B2 (en) System and method for secure file access of derivative works
US9053333B2 (en) Managing confidential information
US11329815B2 (en) Key management device and processor chip for data encryption/decryption
JP2003108385A (en) Computer system utilizing detachable external storage device and method for utilizing computer thereof
CN110851795B (en) File management method, device, equipment and readable storage medium
TWI791151B (en) Data automatic deletion method and system thereof
US20140372653A1 (en) Storage Device with Multiple Interfaces and Multiple Levels of Data Protection and Related Method Thereof
JP5062687B2 (en) Information processing device
JP6949338B2 (en) Electronic data management equipment, electronic data management system, programs and recording media for that purpose
JP2003208234A (en) Software recording part separation type information processor and software managing method
TW201830284A (en) Data storage system, data storage method and data read method
JP2009169868A (en) Storage area access device and method for accessing storage area
JP5295156B2 (en) Information processing apparatus and software unauthorized use prevention method
KR101161686B1 (en) Memory device with security function and security method thereof
JP2011108151A (en) Security adaptor for external storage
TWI731407B (en) Key management device having bypass channels and processor chip
JP2005267163A (en) Memory card device
TWI472921B (en) Portable storage device and access control method thereof
KR101498193B1 (en) Method for managing data using memory card
WO2019119304A1 (en) Data file, and access method, device and equipment therefor