TW561408B - Authorization method for reading electronic file - Google Patents

Authorization method for reading electronic file Download PDF

Info

Publication number
TW561408B
TW561408B TW90133435A TW90133435A TW561408B TW 561408 B TW561408 B TW 561408B TW 90133435 A TW90133435 A TW 90133435A TW 90133435 A TW90133435 A TW 90133435A TW 561408 B TW561408 B TW 561408B
Authority
TW
Taiwan
Prior art keywords
file
reading
read
code
electronic file
Prior art date
Application number
TW90133435A
Other languages
Chinese (zh)
Inventor
Chung-Chih Tung
Original Assignee
Mitac Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitac Technology Corp filed Critical Mitac Technology Corp
Priority to TW90133435A priority Critical patent/TW561408B/en
Application granted granted Critical
Publication of TW561408B publication Critical patent/TW561408B/en

Links

Abstract

An authorization method for reading electronic file utilizes the exclusive serial number of computer as identification code for restraining the connected computer to read electronic file, and generates read authorization code, encrypts electronic file and creates encrypted file along with the password of electronic file. Meanwhile, based on the system time in opening electronic file, coding and generating a read time limit code for restraining read time and count in reading electronic file. The connected client computer must follow personal identification code and externally inputted file open password to generate read authorization code and decrypt the encrypted file. Client end computer must correctly decrypt code within read time limit to be able to read electronic file.

Description

561408 五、發明說明〇) 本^明係有關於一種電子 w 有關於利用電腦的唯一 ,案杈榷碩取方法,特別是 更好的保護。 祜案的時間和次數,可提供 &著資訊及網路技術發展並 夕 路,利用電子郵件之功能傳遞;“數:公室均利用網 取電子檔案的電腦主機,以及十::2而不涉及讀 讀取ΐ = 了全,一旦樓案持有者離職,仍然可心 第1圖表示習知電子檔案密碼保護系统 電腦主機11、電腦主機14,電腦主 ,〃冓圖,包括 :,密碼器根據密碼13的加密運算處理的資 案A2,儲存於電腦主機uu ^為電子檔 ⑷使用端電腦),電腦主機14輸人\^ =電,機 相同,密碼器15才能夠解密,將電子索f須和密碼13 就是可閱讀的資料。電子檔案持有者“職:f成A1,也 或者是其他得知密碼13的使用者,只要使^ 開公司, 透過區域網路或是網際網路連線到電腦主機11恥主機1 7, 主機14,輸入電腦主機17的密碼19是和密’或是電腦 可以輕易將電子檔案A2回復成電子檔案人丨。、相同,即 習知密碼保護並不完善,一旦檔案持有者 位,或是離開公司,依然可以自由讀取式表開原有職 或者是檔案密碼 0506-6773TWF;MRS90-〇13;R1iu.ptd 第4頁 561408 五、發明說明(2) 外茂,即可開啟, 〜 到 更 •安 全 的 取 授 權 方 括 :提供- — 腦 9 具 有 要 求 讀 取 電 電 腦 讀 取 開 和 開 啟 檔 案 加 密 J 產 生 上 述 加 密 檔 時 限 碼 到 使 電 腦 J 其 根 二 讀 取 授 權 產 生 讀 取 碼 , 並 且 讀 5 否 則 禁 止 為限制電子檔^的择取文件保護並不是安全的方法。 主機是否經過授權:、並:制f =認欲讀取檔案的電腦 數#以防止無限制讀取解; 保護。 的電子檔案,可得到更安全的 有鐘於此,本發明則接 _ 孚抒安# 琢j例服端電腦,要灰婧I 由外界輸入開啟播案密碼,飼服端電ίΐ:電 :檔案畨碼和辨識碼;伺服端電腦根據辨識碼:取開 畨碼產生一第一讀取授權密碼用以對電子檔案二檔案 加役擋案,並且產生一讀取時限碼用以限 =產生 案讀取期限;伺服端電腦傳送加密檔案和讀取:加密檔 用端電腦;由外部輸入開啟檔案密碼於使用端^碼到使 據辨識碼和開啟檔案密碼進行運算,產生一第二S ’其根 密碼用以對加密檔案解密,並且由讀取時限碼L =授權 時限旗標;以及 1、、生一讀取 法,上述電子檔案具有:二檔I:取授權方 子標案時,由外界輪要欠讀取電 當第二讀取授權密碼等於第一讀取授權密碼,、 ^ 取時限旗標致能,則加密檔案能夠被解密讀取,並且讀 讀取。 古則禁止 以下,就圖式說明本發明之 圖式簡單說明561408 V. Description of the invention 0) This is about the only way to use an electronic w to use a computer, and to discuss the methods, especially better protection. The time and frequency of the case can be provided with the development of information and network technology, and the use of e-mail function to deliver; "Number: the main office uses the computer host to obtain electronic files from the Internet, and ten: 2 and It does not involve reading and reading ΐ = full, once the owner of the building case leaves office, still feel comfortable Figure 1 shows the conventional electronic file password protection system computer host 11, computer host 14, computer host, map, including: ,, The cipher device handles the project A2 based on the encryption operation of the password 13 and is stored in the computer host uu ^ is an electronic file (using the end computer). The computer host 14 inputs \ ^ = electricity, the same machine, the cipher device 15 can decrypt, The electronic cable f and password 13 are readable data. The electronic file holder "job: f into A1, or other users who know the password 13, as long as you open a company, through the LAN or the Internet Connect to the host computer 11 host computer 1, host computer 14, host computer 14, enter the password 19 of the computer host computer 17 is confidential, or the computer can easily restore the electronic file A2 into an electronic filer. The same, that is, the conventional password protection is not perfect. Once the file holder is in place or leaves the company, it can still be freely read to open the original post or file password 0506-6773TWF; MRS90-〇13; R1iu.ptd Page 561408 V. Description of the invention (2) Waimao, you can open, ~ to more • secure access to authorized parties include: provide--brain 9 has the requirement to read the computer to read open and open the file encryption J to generate the above encryption The file time limit code is such that computer J has the second read authorization to generate a read code, and read 5 otherwise it is prohibited to restrict the selection of file protection for electronic files ^ It is not a safe method. Whether the host is authorized: and: f = the number of computers that want to read the file # to prevent unlimited reading solutions; protection. The electronic file can be obtained more securely. Here, the present invention is connected to the server computer. It is necessary to set the password for opening the broadcast by the external input. File code and identification code; the server-side computer generates a first read authorization password to file the second file of the electronic file based on the identification code: open the code, and generates a read time limit code to limit = generation File read deadline; server computer sends encrypted file and read: encrypted file used computer; external input password to open file at user ^ code to make data identification code and open file password for calculation, generating a second S ' The root password is used to decrypt the encrypted file, and the read time limit code L = authorization time limit flag; and 1, the read method, the above electronic file has: second file I: when the authorized party's sub-label is taken, the outside If the second read authorization password is equal to the first read authorization password, and the time limit flag is enabled, the encrypted file can be decrypted and read, and read. Ancient rules are forbidden

〇506-6773TW;MRS90-013;Rliu.ptd 561408 五、發明說明(3) 第1圖表示習知電子檔案密碼保護系統架構圖。 圖第2圖表示本發明實施例電子檔案密碼保護系統架構 【3圖表示本發明實施例電子檔案加密流程圖。 第4圖表示本發明實施例讀取授權電 /第5圖表示本發明實施例中讀取=检案流程圖。 糸統的架構圖。 、々内°己憶區塊處理 第6圖表示本發明實施例電 的流程圖。 镉案讀取期限處理方法 第7圖表示時間 關係。 讀取時限内時間區間的對應 第8_1〇圖矣- [符號說明] 下私資料和時間區門踩 ^cpu . 間碼的對應關聯。〇506-6773TW; MRS90-013; Rliu.ptd 561408 V. Description of the invention (3) Figure 1 shows the structure of a conventional electronic file password protection system. Figure 2 shows the architecture of the electronic file password protection system according to the embodiment of the present invention. [3] Figure 3 shows the flowchart of the electronic file encryption according to the embodiment of the present invention. FIG. 4 shows a read authorization circuit in the embodiment of the present invention. FIG. 5 shows a read = check case flow chart in the embodiment of the present invention. Traditional architecture diagram. Figure 6 shows the flow chart of electricity in the embodiment of the present invention. How to deal with the reading deadline of the cadmium case Figure 7 shows the time relationship. Correspondence of time interval within reading time limit Figure 8_1〇 [Symbol Description] Correspondence between private data and time zone door step ^ cpu.

3 〜RAM 5 〜ROM 7〜I/O界面; 8〜讀取時限馬; 9〜電子構案; 11 12 10貝料/位±止匯流排; 、17〜電腦主機; 密碼 1 q j 、1 8〜密碼器; 1 3、1 6、1 9 2 〇〜系統;3 ~ RAM 5 ~ ROM 7 ~ I / O interface; 8 ~ reading time limit horse; 9 ~ electronic construction; 11 12 10 shells / bit ± bus stop; 17 ~ computer host; password 1 qj, 1 8 ~ Password; 1 3, 1 6, 1 9 2 0 ~ system;

0506-6773TWF;MRS90-013;Rliu.ptd 561408 五、發明說明(4) 22〜外部匯流排; 3 0〜外部記憶體IC ; TD1-TDN〜時間區間碼; ADI-ADN〜記憶區塊位址; SEIM〜伺服端電腦; iism〜使用端電腦; NTX〜傳輸界面。 實施例 為限制讀取電子檔案的使用端電腦,本發明 :電腦的特徵’用以識別電腦,產生電子播案 二: 密碼,例如LAN以及IEEE 1 3 94傳輸界面具有 杈權 GUID(gl〇bally unique identifier),即全域唯_ 碼,其和電腦有唯一對應,即使電腦更換 ° , M(distinguished name),或是移動位置,此號 改變,因此可以作為讀取授權的依據,以⑽中⑽】 會 funct i⑽可以知道連線欲讀取電子檔案的使用端電腦 (senal number),利用此序號辨識, < 讀電子擋案。 制災用%電恥閱 為達成此方法,至少需要兩台電月I,如第2圖所干, 一台為飼服端電腦SER1,其儲存所有電子檔案 」、 使用端電腦隱,其利用傳輸界面N 口為 SER1要求授權讀取電子檔宰,A j電恥 方Φ如笛q ISI翩-兩 其限制授權讀取電子檔案的 方/第3 I、、頁不電子檔案授權流程圖。首先,在步驟 S1 ’使用端電腦_1藉由傳輸界面Ντχ連線到伺服端電腦 0506-6773TWF;MRS90-013;Rliu.ptd M1408 五、發明說明(5) ______ USRi ^求靖取電子檔案,伺服端電腦SER1要t #田 T輸入使用者辨識碼。在步驟 上使用端電腦 傳輪界面NTX,讀取使用端電腦us ]服鸲電腦SEm藉由 域辨識碼(GU ID),用u pp Μ # Λ 、辨硪碼,例如全區 :。在步驟S3,伺服端電腦 用m播案的權 腦連線的時間,;=端=R=R1根據使用端電 :碼’其用以限制使用端電腦USR1 =取時 1 ==,知電腦USR1只能夠在取得授權讀取 ^能在-段時間内讀取電子播帛 =之 端電腦USR1的系統時間,也盔法重 ^ <主則調整使用 :2取時限碼能夠提供更完備的保護,防止電: 有者離開原有職務後繼續讀取電子擋案。 田”、 =削根據使用端電腦的辨識碼:以及電子構案= 啟檔案密碼’經過運算產生一讀取授權碼。在步驟%」 服端電腦SERI利用讀取授權碼對電子檔案加密,肖 Z 界面NTX送出加密電子檔案到使用端電腦usri。 雨 使用端電腦USR1藉由傳輸界面ΝΤχ接收加密電子樓 案,其讀取電子檔案的方法流程圖如第4圖所示。在^ S11 ’使用端電腦USR1要求使用者輸入開啟檔案密碼1在 步驟S12 ’使用端電腦USR1讀取使用端電腦“以的辨識 碼。在步驟S13 ’使用端電腦USR1根據開啟檔案密碼和 識碼,經過解碼運算產生一讀取授權碼,當開啟檔案密 正碟並且辨識碼正確,讀取授權碼才能夠對電子構案内二0506-6773TWF; MRS90-013; Rliu.ptd 561408 5. Description of the invention (4) 22 ~ external bus; 3 0 ~ external memory IC; TD1-TDN ~ time interval code; ADI-ADN ~ memory block address ; SEIM ~ server computer; iism ~ using computer; NTX ~ transmission interface. The embodiment is a user-end computer that restricts reading of electronic files. The present invention: The characteristics of the computer are used to identify the computer and generate an electronic broadcast case 2: The password, such as LAN and IEEE 1 3 94 transmission interface, has a GUID (glObally unique identifier), which is the unique identifier of the domain. It has a unique correspondence with the computer. Even if the computer changes °, M (distinguished name), or moves the location, this number changes, so it can be used as a basis for reading authorization. [Funct i⑽ can know the end-user computer (senal number) to read the electronic file, use this serial number identification, < read the electronic file. In order to achieve this method, at least two electricity months are needed to achieve this method. As shown in Figure 2, one is a feeding computer SER1, which stores all electronic files. The interface N interface for SER1 requires authorization to read the electronic file, A j electronic shame 如 such as the flute q ISI Ping-both parties restrict the authorization to read the electronic file / the third page, the electronic file authorization flowchart. First, in step S1 ', the end-use computer_1 is connected to the server-side computer 0506-6773TWF; MRS90-013; Rliu.ptd M1408 through the transmission interface Nτχ. 5. Description of the invention (5) ______ USRi ^ ask for an electronic file, The server computer SER1 must input the user identification code. On the step, use the end-user computer to transfer the interface NTX, read the end-user computer us] to serve the computer SEm with the domain identification code (GU ID), and use u pp Μ # Λ, such as the whole area:. In step S3, the time for the server-side computer to connect with the right brain of the m broadcast; = terminal = R = R1 according to the use of the terminal: code 'It is used to limit the use of the computer USR1 = time 1 = =, know the computer USR1 can only be read with authorization ^ Can read the system time of the electronic computer USR1 in the-period of time, and the helmet method is heavy ^ < Mainly adjusted for use: 2 The time limit code can provide a more complete Protection from electricity: Someone continues to read the electronic case after leaving their original duties. "Tian", = cut according to the identification code of the end-use computer: and electronic construction = open the file password 'after operation to generate a read authorization code. In step% "the server-side computer SERI uses the read authorization code to encrypt the electronic file, Xiao Z interface NTX sends the encrypted electronic file to the user computer usri. The user computer USR1 receives the encrypted electronic building through the transmission interface NTX. The flow chart of the method for reading the electronic file is shown in Figure 4. At ^ S11 'The user computer USR1 asks the user to enter the password for opening the file 1 At step S12' The user computer USR1 reads the identification code of the user computer. At step S13 'the user computer USR1 according to the password and identification code of the open file After the decoding operation, a read authorization code is generated. When the file encryption disc is opened and the identification code is correct, the read authorization code can be used for electronic construction.

0506-6773TWF;MRS90-013;Rliu.ptd 第8頁 561408 五、發明說明(6) 碼’產生可讀取的電子檔案。在步驟S14,使用她 否二、\丨根據讀取時限碼,用以偵測讀取電子檔案時間β 林取時限,如果超過讀取時限’則進行步驟S1二疋 ‘:權如案果^ f步驟S14,使用端電腦USR1根據讀取時限碼, 併t靖取電子檔案時間是否超過讀取時限的方法,如以下 理Ϊ二f 5力圖表示本發明實施例中讀取時限内記憶區塊處 :二=構圖。在第5圖所示之架構中,電子標案儲存 ^SRl的系統2〇中,其包括㈣1、Ram 3、議5、ι/〇界 :?、讀取時限碼8以及電子檔案9。在本實施射,讀取 、,碼8和電子檔案9儲存於系統2〇,根據載入電子檔案9 的系統時間和讀取時限碼8,將電子檔案的讀取時限分割 成複數段時間區間碼TM—TDN,根據外部記憶體1(:3〇的記 隐區塊,編譯出對應於每一段時間區間碼TIH-TDN記憶區 鬼位址AD 1 ADN,CPU1透過資料/位址匯流排丨〇將記憶區塊 巧址AD1-ADN載入到RAM3中。此一外部記憶體IC 3〇可以是 單純的記憶體ic,例如快閃式記憶體(f lash memory)或是 電子 了抹式PR〇M(electrically erasable programmable read-only memory),也可以是單晶片電腦(system 〇n ch l p ’ SOC)或微控制器内部的記憶體。外部記憶體丨c 3 〇 係利用電子檔案9的讀取時限碼8進行偵測,讀取電子檔案 9之刚’ CPU1根據系統時間,由RAM3取得讀取電子檔案9的 時間區間碼tdx和對應的記憶區塊位aADX,cpul透過資料0506-6773TWF; MRS90-013; Rliu.ptd Page 8 561408 V. Description of the invention (6) The code 'generates a readable electronic file. In step S14, use No. 2. According to the reading time limit code, it is used to detect the reading time of the electronic file β. The time limit for forest access, if the reading time limit is exceeded, then step S1 is performed. Step S14: The method of using the terminal USR1 according to the reading time limit code and determining whether the time of the electronic file exceeds the reading time limit, as shown in the following principle 2 f 5 tries to represent the memory block within the reading time limit in the embodiment of the present invention. Office: two = composition. In the architecture shown in FIG. 5, the electronic document storage system ^ SR1 20 includes: ㈣1, Ram3, 55, ι / 〇sphere:?, Reading time code 8 and electronic file 9. In this implementation, the code 8 and the electronic file 9 are stored in the system 20, and the reading time limit of the electronic file is divided into a plurality of time intervals according to the system time and the reading time code 8 of the loaded electronic file 9. The code TM-TDN compiles the ghost address AD 1 ADN corresponding to the interval code TIH-TDN memory area according to the hidden block of external memory 1 (: 30), and CPU1 passes the data / address bus 丨〇 Load the memory block address AD1-ADN into RAM3. This external memory IC 3〇 can be a simple memory ic, such as flash memory (flash memory) or electronic wipe PR 〇M (electrically erasable programmable read-only memory), can also be a single-chip computer (system 〇 n ch lp SOC) or the internal memory of the microcontroller. The external memory 丨 c 3 〇 uses the electronic file 9 to read Take the time limit code 8 for detection and read the electronic file 9. The CPU1 obtains the time interval code tdx for reading the electronic file 9 and the corresponding memory block aADX, cpul through the data from the RAM3 according to the system time.

0506-6773TWF;MRS90-013;Rliu.ptd 第9頁 5614080506-6773TWF; MRS90-013; Rliu.ptd Page 9 561408

/位址匯流排10以及I/O介面7,讀取外部記憶體1(:3〇中記 憶區塊位址ADX的記憶區塊是否已經寫入標記,如果已^ 寫入標記,則停止開啟電子檔案9,如果記憶區塊位址AM 的記憶區塊尚未寫入標記,則寫入標記於此記憶區塊, 開始讀取電子檔案9。/ Address bus 10 and I / O interface 7, read whether the memory block of the memory block address ADX in the external memory 1 (: 30 has been written with a mark, and if the mark has been written, it will stop opening For the electronic file 9, if the memory block at the memory block address AM has not been written with a mark, write a mark in this memory block and start reading the electronic file 9.

第6圖表示本發明實施例電子檔案讀取期限處理方法 的流程圖。首先,在步驟S21,判斷是否第一次開啟電子 檔案9 ,如果是則進行步驟S22,根據載入電子檔案9的系 統時間TO和軟體使用期限LD編譯複數時間區間碼 TD1-TDN,如第7圖所示,時間區間碼TD1對應到系統時間 T0〜T0 + LD/N ’時間區間碼TD2對應到系統時間 T0 + LD/N〜T0 + 2*LD/N,依此類推,時間區間碼TDN對應到系 統時間T0 + (N-1)*LD/N〜T0+LD。 ' 在步驟S23,CPU1透過資料/位址匯流排1〇以及1/〇介 面7,偵測外部記憶體IC30中記憶區塊,決定紀錄電子檔 案9讀取時限所需要的記憶區塊。 在步驟S24,編譯對應到時間區間碼TD1-TDN,外部記 隐體IC 3 0中ό己憶區塊的纪憶區塊位址a j) 1 — a j) n,如第8圖所 不,並且將時間區間碼TD卜TDN和記憶區塊位址AIH—AND的 對應關聯已經寫入RAM3,也就是標籤記憶體。 如果不是第一次開啟,或是已經完成步驟s24,則進 行步驟S25 ’根據開啟電子檔案9的系統時間m,cpu 1由 RAM3中時間區間碼TD1 - TDN得出時間區間碼TDXi。在步驟 S26,CPU1根據TDX1,由RAM3中時間區間碼TD1 一TDN和記憶Fig. 6 is a flowchart showing a method for processing an electronic file reading deadline according to an embodiment of the present invention. First, in step S21, it is judged whether the electronic file 9 is opened for the first time. If so, step S22 is performed, and the plural time interval codes TD1-TDN are compiled according to the system time TO and the software use period LD loaded in the electronic file 9, as shown in section 7. As shown in the figure, the time interval code TD1 corresponds to the system time T0 ~ T0 + LD / N 'The time interval code TD2 corresponds to the system time T0 + LD / N ~ T0 + 2 * LD / N, and so on, the time interval code TDN Corresponds to the system time T0 + (N-1) * LD / N ~ T0 + LD. 'In step S23, the CPU 1 detects the memory blocks in the external memory IC 30 through the data / address bus 10 and the 1/0 interface 7 to determine the memory blocks required to record the reading time limit of the electronic file 9. In step S24, compile the Jiji block address aj) 1 — aj) n corresponding to the time interval code TD1-TDN, the external memory crypto IC 3 0, as shown in FIG. 8, and The corresponding relationship between the time interval code TD and TDN and the memory block address AIH-AND has been written into RAM3, that is, the tag memory. If it is not turned on for the first time, or step s24 has been completed, step S25 'is performed. According to the system time m of opening the electronic file 9, cpu 1 obtains the time interval code TDXi from the time interval codes TD1-TDN in RAM3. In step S26, the CPU 1 uses the time interval code TD1_TDN and the memory in the RAM 3 according to the TDX1.

0506-6773TW;MRS9〇.〇13;Rliu.ptd 第10頁 561408 五、發明說明(8) 區塊位址AD卜ADN的對應關聯,如第8圖所示,讀出記憶區 塊位址ADX1的旗標資料為非致能(di sabl e)狀態,停止開 啟電子檔案9。根據開啟電子檔案9的系統時間TX2,CPU 1 由RAM3中時間區間碼TD1-TDN得出時間區間碼TDX2。在步 驟S2 6,CPU1根據TDX2,由RAM3中時間區間碼TD1-TDN和記 憶區塊位址AD卜ADN的對應關聯,如第8圖所示,讀出記憶 區塊位址ADX 2,並且旗標資料未設定為非致能狀態,進行 步驟S27,設定TDX2旗標資料為非致能狀態於RAM3中以及 ,部記憶體I C ,也就是旗標記憶體,如第9圖所示,並且 設定RAM3之中TDX2之前所有關聯資料,外部記憶體1(:3〇 纪憶區塊旗標資料為非致能狀態,如第丨〇圖所示。 ADX2之前(包含ADX2)m有記憶區塊’ 間TDX2之後,時間區mnY9夕此痛女认±疋便用過時間區 用vh«拉:Γ 間 刖所有的時間區間就當作使 用匕。接者,進行步驟S28,讀取電子檔案。者 ::都寫入標記時’無法再讀取電 9,;:時 也就到期。 八靖取時限 雖然本發明已以一較佳實施例揭露如上,妙 以限定本發明,任何熟習此技藝纟 :其並1丨0506-6773TW; MRS9〇.〇13; Rliu.ptd Page 10 561408 V. Description of the invention (8) Correspondence between block address AD and ADN, as shown in Figure 8, read out memory block address ADX1 The flag data is in the di sabl e state. Stop opening the electronic file9. According to the system time TX2 of opening the electronic file 9, the CPU 1 obtains the time interval code TDX2 from the time interval codes TD1-TDN in the RAM 3. In step S26, according to TDX2, CPU1 associates the time interval code TD1-TDN in RAM3 with the corresponding correspondence between the memory block address AD and ADN. As shown in FIG. 8, the memory block address ADX 2 is read, and the flag is read. The target data is not set to the non-enabled state, and step S27 is performed to set the TDX2 flag data to the non-enabled state in RAM3 and the internal memory IC, that is, the flag memory, as shown in FIG. 9, and set All related data before TDX2 in RAM3, the external memory 1 (: 30th memory block flag data is non-enabled, as shown in Figure 丨 0. There are memory blocks before ADX2 (including ADX2) m After time TDX2, the time zone mnY9 is so painful to recognize ± 疋 and then used the time zone with vh «pull: Γ time zone all time intervals are used as a dagger. Then, proceed to step S28 to read the electronic file. :: When the mark is written, 'Can't read the electricity 9 anymore ;: The time will expire. Although the time limit of the present invention has been disclosed as above with a preferred embodiment, it is wonderful to limit the invention, anyone who is familiar with this technique纟 : 同 合 1 丨

神和範圍β,當可作些許 本發明^ 護範圍當視後附之申_ 4 飾,因此本發明4 甲明專利範圍所界定者為準。God and the range β, can be made a little. The scope of protection of the present invention should be treated as the attached application _ 4 decoration, so the scope of the present invention 4 Jia Ming patent scope shall prevail.

Claims (1)

JUIH-UO 申請專利範圍 ΐ· 一種電子檔案讀取授權 開啟檔案密碼,其包括: 次’上述電子檔案具有一 提供一伺服端電腦,儲存上 提供一使用端電腦,具有一子檔案, 連線到上述伺服端電腦,要求誃f碼,藉由一傳輸界面 :輸入上述開啟檔案密,,上::::檔案時,由外 檔案密碼和上述辨識碼; 服Μ電腦碩取上述開啟 上述伺服端電腦根據上述 一第一讀取授權密·,、、和開啟檔案密碼產生 密播案,並且述電子樓案加密,產生-加 取期限; 5 t碼用以限制上述電子檔案讀 上述伺服端電腦傳送上述加 到上述使用端電腦; 在棕案和上述讀取時限碼 由外部輸入上述開啟檔案密 根據上述辨識碼和上沭使用鳊電細,其 二讀取iA μ 述開檔案捃碼進行運算,產生一第 Ff二產:=碼用以對上述加密檔案解密,並且由讀取時 限碼,生一,取時限旗標;以及 g取時 ,,十c續二S二Ϊ取授權密碼等於第一讀取授權密碼,並且上 ‘ °目丨栘ί T旗標致能’則上述加密檔案能夠被解密讀取, 否則禁止讀取。 2使如申凊專利範圍第i項所述之電子檔案授權讀取方 、' ’、中上述辨識碼是上述使用端電腦的序號。 、3 ·如申睛專利範圍第1項所述之電子檔案授權讀取方 法’其中上述傳輪介面是IEEE 1394。JUIH-UO patent application scope ΐ · An electronic file reading authorization to open the file password, which includes: 'The above electronic file has a server computer provided, a user computer provided on the storage, a sub file, connected to The above server-side computer requires the 誃 f code, through a transmission interface: enter the above-mentioned open file password, and upload :::: the file password from the external file and the above-mentioned identification code; the server must obtain the above to open the above-mentioned server. The computer generates a secret broadcast case according to the above-mentioned first read authorization password, and the file password is opened, and the electronic building case is encrypted, and the generation-addition period is limited; the 5 t code is used to restrict the electronic file from reading the server computer. Send the above and add it to the above-mentioned end-use computer; enter the open file password in the brown case and the above reading time limit code from the outside; use the electronic code according to the above identification code and upload; the second read the iA μ said open file code for calculation , Produces a second Ff second product: = code is used to decrypt the above encrypted file, and by reading the time limit code, generating one, taking the time limit flag; and g When ten c ,, S diglycidyl continuation Ϊ take the license key is equal to the first read license key, and the '[deg.] Shu mesh can be moved southward ί T flag Peugeot' then decrypt the encrypted file can be read, reading is prohibited. 2 Make the above-mentioned identification code of the authorized reader of the electronic file as described in item i of the patent application scope "'" the serial number of the above-mentioned end-use computer. 3) The electronic file authorization reading method described in item 1 of Shenjing's patent scope, wherein the above-mentioned transfer interface is IEEE 1394. 六、申請專利範圍 法,其中上述傳輸::二,所述之電子檔案授權讀取方 法,5其二::二:::/:/二電子槽案授權讀取方 用端電腦的辨識碼。匈日 兩;丨面的MID得出上述使 法,t ί : : ί : f圍第1項所述之電子檔案授權讀取方 *供-方法,包括·· 間的讀取時限旗標;、- 述項取時限碼内複數時間區 =啟上述電子槽案於一上述時間區間; 區間對應的讀取時限旗標; 電子檔案:L:及日⑯旗標是非致能狀態,則禁止讀取上述 限旗旗軟:設定上述讀取時 法,7其項所述之電子播案授權讀取方 旗標己憶體’其健存上述複數時間區間的讀取時限 時限聯Ϊ:存上述複數時間區間和上述讀取 8甘=申請專利範圍第6項所述之電子檔案授權讀取 It偵測開啟上述電子㈣時間區間的讀取時限旗 第13頁 _ 0506-6773TWF;MRS90-013;Rliu.ptd 561408 六、申請專利範圍 偵測上述標籤記憶體,根據開啟上述電子檔案時間區 間的上述關聯資料,得出開啟上述電子檔案時間區間的讀 取時限旗標。 9.如申請專利範圍第6項所述之電子檔案授權讀取方 法,其中設定上述讀取時限旗標為非致能狀態,包括: 設定上述標籤記憶體的上述關聯資料為非致能狀態; 以及 設定上述旗標記憶體的上述讀取時限旗標為非致能狀 態。6. Law on the scope of applying for patents, in which the above transmission :: 2. The electronic file authorized reading method described in 5: 2: the second ::::: /: / the identification code of the end-user computer authorized by the electronic slot . Hungary and Japan; The above MIDs yielded the above-mentioned enactments, t ί:: ί: f The electronic file authorized readers * supply-method described in item 1 above, including the time limit flag for reading; 、-The plural time zone in the time limit code of the item is equal to the time slot of the above electronic slot; the time limit flag corresponding to the interval is read; Electronic file: L: and the sundial flag are not enabled, reading is prohibited Take the above limit flag soft: Set the above reading time method, the electronic broadcast authorization described in item 7 above is authorized to read the flag of the party's memory, and it saves the reading time limit of the above multiple time intervals. The plural time interval and the above-mentioned reading 8 Gan = the electronic file authorization reading described in item 6 of the patent application scope It detects the reading time limit flag of turning on the above electronic time interval page 13_ 0506-6773TWF; MRS90-013; Rliu.ptd 561408 6. The patent application scope detects the tag memory, and obtains the reading time limit flag for opening the electronic file time interval according to the related data of the electronic file time interval. 9. The electronic file authorized reading method according to item 6 of the scope of patent application, wherein setting the read time limit flag to a non-enabled state includes: setting the above-mentioned associated data of the tag memory to a non-enabled state; And the read time limit flag of the flag memory is set to a non-enabled state. 0506-6773TWF;MRS90-013;Rliu.ptd 第14頁0506-6773TWF; MRS90-013; Rliu.ptd Page 14
TW90133435A 2001-12-31 2001-12-31 Authorization method for reading electronic file TW561408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW90133435A TW561408B (en) 2001-12-31 2001-12-31 Authorization method for reading electronic file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW90133435A TW561408B (en) 2001-12-31 2001-12-31 Authorization method for reading electronic file

Publications (1)

Publication Number Publication Date
TW561408B true TW561408B (en) 2003-11-11

Family

ID=32391211

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90133435A TW561408B (en) 2001-12-31 2001-12-31 Authorization method for reading electronic file

Country Status (1)

Country Link
TW (1) TW561408B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI423066B (en) * 2008-02-04 2014-01-11 li lan Lin A method for control display data of storage file
CN110135174A (en) * 2019-04-22 2019-08-16 佛山职业技术学院 A kind of file encrypting method, electronic equipment and external equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI423066B (en) * 2008-02-04 2014-01-11 li lan Lin A method for control display data of storage file
CN110135174A (en) * 2019-04-22 2019-08-16 佛山职业技术学院 A kind of file encrypting method, electronic equipment and external equipment

Similar Documents

Publication Publication Date Title
CN104662870B (en) Data safety management system
US7100048B1 (en) Encrypted internet and intranet communication device
TWI463349B (en) Method and system for secure data access among two devices
US6460138B1 (en) User authentication for portable electronic devices using asymmetrical cryptography
JP5852265B2 (en) COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method
JP6275653B2 (en) Data protection method and system
WO2005031580A1 (en) Information processing apparatus, information processing system and program
KR20100133953A (en) System and method for securing data
US20210374445A1 (en) Systems and methods for liveness-verified, biometric-based encryption
EP3516575B1 (en) Technologies for user-mode persistence of certificates and keys in resource-constrained devices
JP2010509696A (en) Method and apparatus for coupling content to another memory device
JP4734512B2 (en) Secure and recoverable password
WO2015196642A1 (en) Data encryption method, decryption method and device
JP2006215795A (en) Server device, control method, and program
TW561408B (en) Authorization method for reading electronic file
JPWO2006118101A1 (en) CONFIDENTIAL INFORMATION PROCESSING HOST DEVICE AND CONFIDENTIAL INFORMATION PROCESSING METHOD
CN102222195A (en) E-book reading method and system
WO2017137481A1 (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
JPH10228374A (en) Computer card prevented from being duplicated
CN113343215A (en) Embedded software authorization and authentication method and electronic equipment
KR101443309B1 (en) Apparatus and method for protecting access certification data
ES2782329T3 (en) Process to ensure the communication of a digital file through a communication network
US10970407B2 (en) Processes and related apparatus for secure access control
Vivek Raj et al. RFID-Based Secure Multipurpose Smart Card Using Arduino Module
JP2011053909A (en) Information processor incorporating control function for security management of password

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent