TW561408B - Authorization method for reading electronic file - Google Patents
Authorization method for reading electronic file Download PDFInfo
- Publication number
- TW561408B TW561408B TW90133435A TW90133435A TW561408B TW 561408 B TW561408 B TW 561408B TW 90133435 A TW90133435 A TW 90133435A TW 90133435 A TW90133435 A TW 90133435A TW 561408 B TW561408 B TW 561408B
- Authority
- TW
- Taiwan
- Prior art keywords
- file
- reading
- read
- code
- electronic file
- Prior art date
Links
Abstract
Description
561408 五、發明說明〇) 本^明係有關於一種電子 w 有關於利用電腦的唯一 ,案杈榷碩取方法,特別是 更好的保護。 祜案的時間和次數,可提供 &著資訊及網路技術發展並 夕 路,利用電子郵件之功能傳遞;“數:公室均利用網 取電子檔案的電腦主機,以及十::2而不涉及讀 讀取ΐ = 了全,一旦樓案持有者離職,仍然可心 第1圖表示習知電子檔案密碼保護系统 電腦主機11、電腦主機14,電腦主 ,〃冓圖,包括 :,密碼器根據密碼13的加密運算處理的資 案A2,儲存於電腦主機uu ^為電子檔 ⑷使用端電腦),電腦主機14輸人\^ =電,機 相同,密碼器15才能夠解密,將電子索f須和密碼13 就是可閱讀的資料。電子檔案持有者“職:f成A1,也 或者是其他得知密碼13的使用者,只要使^ 開公司, 透過區域網路或是網際網路連線到電腦主機11恥主機1 7, 主機14,輸入電腦主機17的密碼19是和密’或是電腦 可以輕易將電子檔案A2回復成電子檔案人丨。、相同,即 習知密碼保護並不完善,一旦檔案持有者 位,或是離開公司,依然可以自由讀取式表開原有職 或者是檔案密碼 0506-6773TWF;MRS90-〇13;R1iu.ptd 第4頁 561408 五、發明說明(2) 外茂,即可開啟, 〜 到 更 •安 全 的 取 授 權 方 括 :提供- — 腦 9 具 有 要 求 讀 取 電 電 腦 讀 取 開 和 開 啟 檔 案 加 密 J 產 生 上 述 加 密 檔 時 限 碼 到 使 電 腦 J 其 根 二 讀 取 授 權 產 生 讀 取 碼 , 並 且 讀 5 否 則 禁 止 為限制電子檔^的择取文件保護並不是安全的方法。 主機是否經過授權:、並:制f =認欲讀取檔案的電腦 數#以防止無限制讀取解; 保護。 的電子檔案,可得到更安全的 有鐘於此,本發明則接 _ 孚抒安# 琢j例服端電腦,要灰婧I 由外界輸入開啟播案密碼,飼服端電ίΐ:電 :檔案畨碼和辨識碼;伺服端電腦根據辨識碼:取開 畨碼產生一第一讀取授權密碼用以對電子檔案二檔案 加役擋案,並且產生一讀取時限碼用以限 =產生 案讀取期限;伺服端電腦傳送加密檔案和讀取:加密檔 用端電腦;由外部輸入開啟檔案密碼於使用端^碼到使 據辨識碼和開啟檔案密碼進行運算,產生一第二S ’其根 密碼用以對加密檔案解密,並且由讀取時限碼L =授權 時限旗標;以及 1、、生一讀取 法,上述電子檔案具有:二檔I:取授權方 子標案時,由外界輪要欠讀取電 當第二讀取授權密碼等於第一讀取授權密碼,、 ^ 取時限旗標致能,則加密檔案能夠被解密讀取,並且讀 讀取。 古則禁止 以下,就圖式說明本發明之 圖式簡單說明561408 V. Description of the invention 0) This is about the only way to use an electronic w to use a computer, and to discuss the methods, especially better protection. The time and frequency of the case can be provided with the development of information and network technology, and the use of e-mail function to deliver; "Number: the main office uses the computer host to obtain electronic files from the Internet, and ten: 2 and It does not involve reading and reading ΐ = full, once the owner of the building case leaves office, still feel comfortable Figure 1 shows the conventional electronic file password protection system computer host 11, computer host 14, computer host, map, including: ,, The cipher device handles the project A2 based on the encryption operation of the password 13 and is stored in the computer host uu ^ is an electronic file (using the end computer). The computer host 14 inputs \ ^ = electricity, the same machine, the cipher device 15 can decrypt, The electronic cable f and password 13 are readable data. The electronic file holder "job: f into A1, or other users who know the password 13, as long as you open a company, through the LAN or the Internet Connect to the host computer 11 host computer 1, host computer 14, host computer 14, enter the password 19 of the computer host computer 17 is confidential, or the computer can easily restore the electronic file A2 into an electronic filer. The same, that is, the conventional password protection is not perfect. Once the file holder is in place or leaves the company, it can still be freely read to open the original post or file password 0506-6773TWF; MRS90-〇13; R1iu.ptd Page 561408 V. Description of the invention (2) Waimao, you can open, ~ to more • secure access to authorized parties include: provide--brain 9 has the requirement to read the computer to read open and open the file encryption J to generate the above encryption The file time limit code is such that computer J has the second read authorization to generate a read code, and read 5 otherwise it is prohibited to restrict the selection of file protection for electronic files ^ It is not a safe method. Whether the host is authorized: and: f = the number of computers that want to read the file # to prevent unlimited reading solutions; protection. The electronic file can be obtained more securely. Here, the present invention is connected to the server computer. It is necessary to set the password for opening the broadcast by the external input. File code and identification code; the server-side computer generates a first read authorization password to file the second file of the electronic file based on the identification code: open the code, and generates a read time limit code to limit = generation File read deadline; server computer sends encrypted file and read: encrypted file used computer; external input password to open file at user ^ code to make data identification code and open file password for calculation, generating a second S ' The root password is used to decrypt the encrypted file, and the read time limit code L = authorization time limit flag; and 1, the read method, the above electronic file has: second file I: when the authorized party's sub-label is taken, the outside If the second read authorization password is equal to the first read authorization password, and the time limit flag is enabled, the encrypted file can be decrypted and read, and read. Ancient rules are forbidden
〇506-6773TW;MRS90-013;Rliu.ptd 561408 五、發明說明(3) 第1圖表示習知電子檔案密碼保護系統架構圖。 圖第2圖表示本發明實施例電子檔案密碼保護系統架構 【3圖表示本發明實施例電子檔案加密流程圖。 第4圖表示本發明實施例讀取授權電 /第5圖表示本發明實施例中讀取=检案流程圖。 糸統的架構圖。 、々内°己憶區塊處理 第6圖表示本發明實施例電 的流程圖。 镉案讀取期限處理方法 第7圖表示時間 關係。 讀取時限内時間區間的對應 第8_1〇圖矣- [符號說明] 下私資料和時間區門踩 ^cpu . 間碼的對應關聯。〇506-6773TW; MRS90-013; Rliu.ptd 561408 V. Description of the invention (3) Figure 1 shows the structure of a conventional electronic file password protection system. Figure 2 shows the architecture of the electronic file password protection system according to the embodiment of the present invention. [3] Figure 3 shows the flowchart of the electronic file encryption according to the embodiment of the present invention. FIG. 4 shows a read authorization circuit in the embodiment of the present invention. FIG. 5 shows a read = check case flow chart in the embodiment of the present invention. Traditional architecture diagram. Figure 6 shows the flow chart of electricity in the embodiment of the present invention. How to deal with the reading deadline of the cadmium case Figure 7 shows the time relationship. Correspondence of time interval within reading time limit Figure 8_1〇 [Symbol Description] Correspondence between private data and time zone door step ^ cpu.
3 〜RAM 5 〜ROM 7〜I/O界面; 8〜讀取時限馬; 9〜電子構案; 11 12 10貝料/位±止匯流排; 、17〜電腦主機; 密碼 1 q j 、1 8〜密碼器; 1 3、1 6、1 9 2 〇〜系統;3 ~ RAM 5 ~ ROM 7 ~ I / O interface; 8 ~ reading time limit horse; 9 ~ electronic construction; 11 12 10 shells / bit ± bus stop; 17 ~ computer host; password 1 qj, 1 8 ~ Password; 1 3, 1 6, 1 9 2 0 ~ system;
0506-6773TWF;MRS90-013;Rliu.ptd 561408 五、發明說明(4) 22〜外部匯流排; 3 0〜外部記憶體IC ; TD1-TDN〜時間區間碼; ADI-ADN〜記憶區塊位址; SEIM〜伺服端電腦; iism〜使用端電腦; NTX〜傳輸界面。 實施例 為限制讀取電子檔案的使用端電腦,本發明 :電腦的特徵’用以識別電腦,產生電子播案 二: 密碼,例如LAN以及IEEE 1 3 94傳輸界面具有 杈權 GUID(gl〇bally unique identifier),即全域唯_ 碼,其和電腦有唯一對應,即使電腦更換 ° , M(distinguished name),或是移動位置,此號 改變,因此可以作為讀取授權的依據,以⑽中⑽】 會 funct i⑽可以知道連線欲讀取電子檔案的使用端電腦 (senal number),利用此序號辨識, < 讀電子擋案。 制災用%電恥閱 為達成此方法,至少需要兩台電月I,如第2圖所干, 一台為飼服端電腦SER1,其儲存所有電子檔案 」、 使用端電腦隱,其利用傳輸界面N 口為 SER1要求授權讀取電子檔宰,A j電恥 方Φ如笛q ISI翩-兩 其限制授權讀取電子檔案的 方/第3 I、、頁不電子檔案授權流程圖。首先,在步驟 S1 ’使用端電腦_1藉由傳輸界面Ντχ連線到伺服端電腦 0506-6773TWF;MRS90-013;Rliu.ptd M1408 五、發明說明(5) ______ USRi ^求靖取電子檔案,伺服端電腦SER1要t #田 T輸入使用者辨識碼。在步驟 上使用端電腦 傳輪界面NTX,讀取使用端電腦us ]服鸲電腦SEm藉由 域辨識碼(GU ID),用u pp Μ # Λ 、辨硪碼,例如全區 :。在步驟S3,伺服端電腦 用m播案的權 腦連線的時間,;=端=R=R1根據使用端電 :碼’其用以限制使用端電腦USR1 =取時 1 ==,知電腦USR1只能夠在取得授權讀取 ^能在-段時間内讀取電子播帛 =之 端電腦USR1的系統時間,也盔法重 ^ <主則調整使用 :2取時限碼能夠提供更完備的保護,防止電: 有者離開原有職務後繼續讀取電子擋案。 田”、 =削根據使用端電腦的辨識碼:以及電子構案= 啟檔案密碼’經過運算產生一讀取授權碼。在步驟%」 服端電腦SERI利用讀取授權碼對電子檔案加密,肖 Z 界面NTX送出加密電子檔案到使用端電腦usri。 雨 使用端電腦USR1藉由傳輸界面ΝΤχ接收加密電子樓 案,其讀取電子檔案的方法流程圖如第4圖所示。在^ S11 ’使用端電腦USR1要求使用者輸入開啟檔案密碼1在 步驟S12 ’使用端電腦USR1讀取使用端電腦“以的辨識 碼。在步驟S13 ’使用端電腦USR1根據開啟檔案密碼和 識碼,經過解碼運算產生一讀取授權碼,當開啟檔案密 正碟並且辨識碼正確,讀取授權碼才能夠對電子構案内二0506-6773TWF; MRS90-013; Rliu.ptd 561408 5. Description of the invention (4) 22 ~ external bus; 3 0 ~ external memory IC; TD1-TDN ~ time interval code; ADI-ADN ~ memory block address ; SEIM ~ server computer; iism ~ using computer; NTX ~ transmission interface. The embodiment is a user-end computer that restricts reading of electronic files. The present invention: The characteristics of the computer are used to identify the computer and generate an electronic broadcast case 2: The password, such as LAN and IEEE 1 3 94 transmission interface, has a GUID (glObally unique identifier), which is the unique identifier of the domain. It has a unique correspondence with the computer. Even if the computer changes °, M (distinguished name), or moves the location, this number changes, so it can be used as a basis for reading authorization. [Funct i⑽ can know the end-user computer (senal number) to read the electronic file, use this serial number identification, < read the electronic file. In order to achieve this method, at least two electricity months are needed to achieve this method. As shown in Figure 2, one is a feeding computer SER1, which stores all electronic files. The interface N interface for SER1 requires authorization to read the electronic file, A j electronic shame 如 such as the flute q ISI Ping-both parties restrict the authorization to read the electronic file / the third page, the electronic file authorization flowchart. First, in step S1 ', the end-use computer_1 is connected to the server-side computer 0506-6773TWF; MRS90-013; Rliu.ptd M1408 through the transmission interface Nτχ. 5. Description of the invention (5) ______ USRi ^ ask for an electronic file, The server computer SER1 must input the user identification code. On the step, use the end-user computer to transfer the interface NTX, read the end-user computer us] to serve the computer SEm with the domain identification code (GU ID), and use u pp Μ # Λ, such as the whole area:. In step S3, the time for the server-side computer to connect with the right brain of the m broadcast; = terminal = R = R1 according to the use of the terminal: code 'It is used to limit the use of the computer USR1 = time 1 = =, know the computer USR1 can only be read with authorization ^ Can read the system time of the electronic computer USR1 in the-period of time, and the helmet method is heavy ^ < Mainly adjusted for use: 2 The time limit code can provide a more complete Protection from electricity: Someone continues to read the electronic case after leaving their original duties. "Tian", = cut according to the identification code of the end-use computer: and electronic construction = open the file password 'after operation to generate a read authorization code. In step% "the server-side computer SERI uses the read authorization code to encrypt the electronic file, Xiao Z interface NTX sends the encrypted electronic file to the user computer usri. The user computer USR1 receives the encrypted electronic building through the transmission interface NTX. The flow chart of the method for reading the electronic file is shown in Figure 4. At ^ S11 'The user computer USR1 asks the user to enter the password for opening the file 1 At step S12' The user computer USR1 reads the identification code of the user computer. At step S13 'the user computer USR1 according to the password and identification code of the open file After the decoding operation, a read authorization code is generated. When the file encryption disc is opened and the identification code is correct, the read authorization code can be used for electronic construction.
0506-6773TWF;MRS90-013;Rliu.ptd 第8頁 561408 五、發明說明(6) 碼’產生可讀取的電子檔案。在步驟S14,使用她 否二、\丨根據讀取時限碼,用以偵測讀取電子檔案時間β 林取時限,如果超過讀取時限’則進行步驟S1二疋 ‘:權如案果^ f步驟S14,使用端電腦USR1根據讀取時限碼, 併t靖取電子檔案時間是否超過讀取時限的方法,如以下 理Ϊ二f 5力圖表示本發明實施例中讀取時限内記憶區塊處 :二=構圖。在第5圖所示之架構中,電子標案儲存 ^SRl的系統2〇中,其包括㈣1、Ram 3、議5、ι/〇界 :?、讀取時限碼8以及電子檔案9。在本實施射,讀取 、,碼8和電子檔案9儲存於系統2〇,根據載入電子檔案9 的系統時間和讀取時限碼8,將電子檔案的讀取時限分割 成複數段時間區間碼TM—TDN,根據外部記憶體1(:3〇的記 隐區塊,編譯出對應於每一段時間區間碼TIH-TDN記憶區 鬼位址AD 1 ADN,CPU1透過資料/位址匯流排丨〇將記憶區塊 巧址AD1-ADN載入到RAM3中。此一外部記憶體IC 3〇可以是 單純的記憶體ic,例如快閃式記憶體(f lash memory)或是 電子 了抹式PR〇M(electrically erasable programmable read-only memory),也可以是單晶片電腦(system 〇n ch l p ’ SOC)或微控制器内部的記憶體。外部記憶體丨c 3 〇 係利用電子檔案9的讀取時限碼8進行偵測,讀取電子檔案 9之刚’ CPU1根據系統時間,由RAM3取得讀取電子檔案9的 時間區間碼tdx和對應的記憶區塊位aADX,cpul透過資料0506-6773TWF; MRS90-013; Rliu.ptd Page 8 561408 V. Description of the invention (6) The code 'generates a readable electronic file. In step S14, use No. 2. According to the reading time limit code, it is used to detect the reading time of the electronic file β. The time limit for forest access, if the reading time limit is exceeded, then step S1 is performed. Step S14: The method of using the terminal USR1 according to the reading time limit code and determining whether the time of the electronic file exceeds the reading time limit, as shown in the following principle 2 f 5 tries to represent the memory block within the reading time limit in the embodiment of the present invention. Office: two = composition. In the architecture shown in FIG. 5, the electronic document storage system ^ SR1 20 includes: ㈣1, Ram3, 55, ι / 〇sphere:?, Reading time code 8 and electronic file 9. In this implementation, the code 8 and the electronic file 9 are stored in the system 20, and the reading time limit of the electronic file is divided into a plurality of time intervals according to the system time and the reading time code 8 of the loaded electronic file 9. The code TM-TDN compiles the ghost address AD 1 ADN corresponding to the interval code TIH-TDN memory area according to the hidden block of external memory 1 (: 30), and CPU1 passes the data / address bus 丨〇 Load the memory block address AD1-ADN into RAM3. This external memory IC 3〇 can be a simple memory ic, such as flash memory (flash memory) or electronic wipe PR 〇M (electrically erasable programmable read-only memory), can also be a single-chip computer (system 〇 n ch lp SOC) or the internal memory of the microcontroller. The external memory 丨 c 3 〇 uses the electronic file 9 to read Take the time limit code 8 for detection and read the electronic file 9. The CPU1 obtains the time interval code tdx for reading the electronic file 9 and the corresponding memory block aADX, cpul through the data from the RAM3 according to the system time.
0506-6773TWF;MRS90-013;Rliu.ptd 第9頁 5614080506-6773TWF; MRS90-013; Rliu.ptd Page 9 561408
/位址匯流排10以及I/O介面7,讀取外部記憶體1(:3〇中記 憶區塊位址ADX的記憶區塊是否已經寫入標記,如果已^ 寫入標記,則停止開啟電子檔案9,如果記憶區塊位址AM 的記憶區塊尚未寫入標記,則寫入標記於此記憶區塊, 開始讀取電子檔案9。/ Address bus 10 and I / O interface 7, read whether the memory block of the memory block address ADX in the external memory 1 (: 30 has been written with a mark, and if the mark has been written, it will stop opening For the electronic file 9, if the memory block at the memory block address AM has not been written with a mark, write a mark in this memory block and start reading the electronic file 9.
第6圖表示本發明實施例電子檔案讀取期限處理方法 的流程圖。首先,在步驟S21,判斷是否第一次開啟電子 檔案9 ,如果是則進行步驟S22,根據載入電子檔案9的系 統時間TO和軟體使用期限LD編譯複數時間區間碼 TD1-TDN,如第7圖所示,時間區間碼TD1對應到系統時間 T0〜T0 + LD/N ’時間區間碼TD2對應到系統時間 T0 + LD/N〜T0 + 2*LD/N,依此類推,時間區間碼TDN對應到系 統時間T0 + (N-1)*LD/N〜T0+LD。 ' 在步驟S23,CPU1透過資料/位址匯流排1〇以及1/〇介 面7,偵測外部記憶體IC30中記憶區塊,決定紀錄電子檔 案9讀取時限所需要的記憶區塊。 在步驟S24,編譯對應到時間區間碼TD1-TDN,外部記 隐體IC 3 0中ό己憶區塊的纪憶區塊位址a j) 1 — a j) n,如第8圖所 不,並且將時間區間碼TD卜TDN和記憶區塊位址AIH—AND的 對應關聯已經寫入RAM3,也就是標籤記憶體。 如果不是第一次開啟,或是已經完成步驟s24,則進 行步驟S25 ’根據開啟電子檔案9的系統時間m,cpu 1由 RAM3中時間區間碼TD1 - TDN得出時間區間碼TDXi。在步驟 S26,CPU1根據TDX1,由RAM3中時間區間碼TD1 一TDN和記憶Fig. 6 is a flowchart showing a method for processing an electronic file reading deadline according to an embodiment of the present invention. First, in step S21, it is judged whether the electronic file 9 is opened for the first time. If so, step S22 is performed, and the plural time interval codes TD1-TDN are compiled according to the system time TO and the software use period LD loaded in the electronic file 9, as shown in section 7. As shown in the figure, the time interval code TD1 corresponds to the system time T0 ~ T0 + LD / N 'The time interval code TD2 corresponds to the system time T0 + LD / N ~ T0 + 2 * LD / N, and so on, the time interval code TDN Corresponds to the system time T0 + (N-1) * LD / N ~ T0 + LD. 'In step S23, the CPU 1 detects the memory blocks in the external memory IC 30 through the data / address bus 10 and the 1/0 interface 7 to determine the memory blocks required to record the reading time limit of the electronic file 9. In step S24, compile the Jiji block address aj) 1 — aj) n corresponding to the time interval code TD1-TDN, the external memory crypto IC 3 0, as shown in FIG. 8, and The corresponding relationship between the time interval code TD and TDN and the memory block address AIH-AND has been written into RAM3, that is, the tag memory. If it is not turned on for the first time, or step s24 has been completed, step S25 'is performed. According to the system time m of opening the electronic file 9, cpu 1 obtains the time interval code TDXi from the time interval codes TD1-TDN in RAM3. In step S26, the CPU 1 uses the time interval code TD1_TDN and the memory in the RAM 3 according to the TDX1.
0506-6773TW;MRS9〇.〇13;Rliu.ptd 第10頁 561408 五、發明說明(8) 區塊位址AD卜ADN的對應關聯,如第8圖所示,讀出記憶區 塊位址ADX1的旗標資料為非致能(di sabl e)狀態,停止開 啟電子檔案9。根據開啟電子檔案9的系統時間TX2,CPU 1 由RAM3中時間區間碼TD1-TDN得出時間區間碼TDX2。在步 驟S2 6,CPU1根據TDX2,由RAM3中時間區間碼TD1-TDN和記 憶區塊位址AD卜ADN的對應關聯,如第8圖所示,讀出記憶 區塊位址ADX 2,並且旗標資料未設定為非致能狀態,進行 步驟S27,設定TDX2旗標資料為非致能狀態於RAM3中以及 ,部記憶體I C ,也就是旗標記憶體,如第9圖所示,並且 設定RAM3之中TDX2之前所有關聯資料,外部記憶體1(:3〇 纪憶區塊旗標資料為非致能狀態,如第丨〇圖所示。 ADX2之前(包含ADX2)m有記憶區塊’ 間TDX2之後,時間區mnY9夕此痛女认±疋便用過時間區 用vh«拉:Γ 間 刖所有的時間區間就當作使 用匕。接者,進行步驟S28,讀取電子檔案。者 ::都寫入標記時’無法再讀取電 9,;:時 也就到期。 八靖取時限 雖然本發明已以一較佳實施例揭露如上,妙 以限定本發明,任何熟習此技藝纟 :其並1丨0506-6773TW; MRS9〇.〇13; Rliu.ptd Page 10 561408 V. Description of the invention (8) Correspondence between block address AD and ADN, as shown in Figure 8, read out memory block address ADX1 The flag data is in the di sabl e state. Stop opening the electronic file9. According to the system time TX2 of opening the electronic file 9, the CPU 1 obtains the time interval code TDX2 from the time interval codes TD1-TDN in the RAM 3. In step S26, according to TDX2, CPU1 associates the time interval code TD1-TDN in RAM3 with the corresponding correspondence between the memory block address AD and ADN. As shown in FIG. 8, the memory block address ADX 2 is read, and the flag is read. The target data is not set to the non-enabled state, and step S27 is performed to set the TDX2 flag data to the non-enabled state in RAM3 and the internal memory IC, that is, the flag memory, as shown in FIG. 9, and set All related data before TDX2 in RAM3, the external memory 1 (: 30th memory block flag data is non-enabled, as shown in Figure 丨 0. There are memory blocks before ADX2 (including ADX2) m After time TDX2, the time zone mnY9 is so painful to recognize ± 疋 and then used the time zone with vh «pull: Γ time zone all time intervals are used as a dagger. Then, proceed to step S28 to read the electronic file. :: When the mark is written, 'Can't read the electricity 9 anymore ;: The time will expire. Although the time limit of the present invention has been disclosed as above with a preferred embodiment, it is wonderful to limit the invention, anyone who is familiar with this technique纟 : 同 合 1 丨
神和範圍β,當可作些許 本發明^ 護範圍當視後附之申_ 4 飾,因此本發明4 甲明專利範圍所界定者為準。God and the range β, can be made a little. The scope of protection of the present invention should be treated as the attached application _ 4 decoration, so the scope of the present invention 4 Jia Ming patent scope shall prevail.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW90133435A TW561408B (en) | 2001-12-31 | 2001-12-31 | Authorization method for reading electronic file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW90133435A TW561408B (en) | 2001-12-31 | 2001-12-31 | Authorization method for reading electronic file |
Publications (1)
Publication Number | Publication Date |
---|---|
TW561408B true TW561408B (en) | 2003-11-11 |
Family
ID=32391211
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW90133435A TW561408B (en) | 2001-12-31 | 2001-12-31 | Authorization method for reading electronic file |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW561408B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI423066B (en) * | 2008-02-04 | 2014-01-11 | li lan Lin | A method for control display data of storage file |
CN110135174A (en) * | 2019-04-22 | 2019-08-16 | 佛山职业技术学院 | A kind of file encrypting method, electronic equipment and external equipment |
-
2001
- 2001-12-31 TW TW90133435A patent/TW561408B/en active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI423066B (en) * | 2008-02-04 | 2014-01-11 | li lan Lin | A method for control display data of storage file |
CN110135174A (en) * | 2019-04-22 | 2019-08-16 | 佛山职业技术学院 | A kind of file encrypting method, electronic equipment and external equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104662870B (en) | Data safety management system | |
US7100048B1 (en) | Encrypted internet and intranet communication device | |
TWI463349B (en) | Method and system for secure data access among two devices | |
US6460138B1 (en) | User authentication for portable electronic devices using asymmetrical cryptography | |
JP5852265B2 (en) | COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method | |
JP6275653B2 (en) | Data protection method and system | |
WO2005031580A1 (en) | Information processing apparatus, information processing system and program | |
KR20100133953A (en) | System and method for securing data | |
US20210374445A1 (en) | Systems and methods for liveness-verified, biometric-based encryption | |
EP3516575B1 (en) | Technologies for user-mode persistence of certificates and keys in resource-constrained devices | |
JP2010509696A (en) | Method and apparatus for coupling content to another memory device | |
JP4734512B2 (en) | Secure and recoverable password | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
JP2006215795A (en) | Server device, control method, and program | |
TW561408B (en) | Authorization method for reading electronic file | |
JPWO2006118101A1 (en) | CONFIDENTIAL INFORMATION PROCESSING HOST DEVICE AND CONFIDENTIAL INFORMATION PROCESSING METHOD | |
CN102222195A (en) | E-book reading method and system | |
WO2017137481A1 (en) | A removable security device and a method to prevent unauthorized exploitation and control access to files | |
JPH10228374A (en) | Computer card prevented from being duplicated | |
CN113343215A (en) | Embedded software authorization and authentication method and electronic equipment | |
KR101443309B1 (en) | Apparatus and method for protecting access certification data | |
ES2782329T3 (en) | Process to ensure the communication of a digital file through a communication network | |
US10970407B2 (en) | Processes and related apparatus for secure access control | |
Vivek Raj et al. | RFID-Based Secure Multipurpose Smart Card Using Arduino Module | |
JP2011053909A (en) | Information processor incorporating control function for security management of password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent |