TWI263432B - Data security method for storage apparatus and storage media and electronic device - Google Patents

Data security method for storage apparatus and storage media and electronic device Download PDF

Info

Publication number
TWI263432B
TWI263432B TW94121190A TW94121190A TWI263432B TW I263432 B TWI263432 B TW I263432B TW 94121190 A TW94121190 A TW 94121190A TW 94121190 A TW94121190 A TW 94121190A TW I263432 B TWI263432 B TW I263432B
Authority
TW
Taiwan
Prior art keywords
instruction
data
password
electronic device
read
Prior art date
Application number
TW94121190A
Other languages
Chinese (zh)
Other versions
TW200701729A (en
Inventor
Yu-Wei Ho
Jia-Chang Wu
Original Assignee
Hitrust Com Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitrust Com Inc filed Critical Hitrust Com Inc
Priority to TW94121190A priority Critical patent/TWI263432B/en
Application granted granted Critical
Publication of TWI263432B publication Critical patent/TWI263432B/en
Publication of TW200701729A publication Critical patent/TW200701729A/en

Links

Abstract

A data security method for storage apparatus is disclosed. The storage apparatus is disposed in an electronic device and provided to the electronic device to store data. The data security method includes planning a portion of the storage apparatus as a security area and setting a system password corresponding to the security area; then, if an instruction belonged to a written instruction set of writing data into the security area is received, automatically performing operation based on the instruction; if an instruction belonged to a read instruction set of reading data from the security area is received, requiring input of a password firstly, and when the inputted password is matched with the system password, performing operation based on the instruction to achieve the effect of assuring the data security in the security area.

Description

1263432 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種資料保密方法及其電子設備, 別是指-種更加安全與方便使用之儲存裝置的資=保密: 法及其儲存媒體與電子設備。 【先前技術】 ,近年來電腦以其強大的計算能力與具使用者親和力的 作業系統設計,成為現代辦公室與家庭不可或缺的工具。 而且從電腦與網路連線後,資料的查詢、二: 新聞乳象 、杈遊,專題討論到傳送電子郵件,更無一不仰賴它。然 而,隨著人們對電腦的依賴日增,重要的資料標案存在= 腦上的安全性與隱密性,卻形成一個隱憂。 由於電腦通常被定位在供個人使用,作業系統的設計 便盡量要求簡易及方便,也同步犧牲許多安全方面的考量 因素。如此,坐在電腦前的人即被假定是整個系統的管: 者(Administrator)’可以輕易指令任何的工作,包括讀取、 儲存、新增、複製、搬移、刪除等。舉例來說,一般的辦 公室環境裡,由於業務上的需要,常有不同部門的人員借 用電腦或是拷貝檔案,若有個人或公司的機密存放在電^ 裡,便會擔心遭竊取或曝光。在學校辦公室或實驗室的環 境裡,共用或相互借用電腦的情形更普遍。另方面,娘常 使用電腦的用戶,-定常有許多屬於個人隱私的資料,如 書信、論文研究、個人通訊錄、電話薄、個人理財資訊、 程式等,存放在電腦裡,為防止被其他人看見或更改,便 1263432 而要有適當的方法來保護這些資料。 鑑於電腦可能儲存大量重要且需保密的資料的需求, 近年提出的-種虛擬硬碟技術係規劃電腦硬碟中的部分磁 =成一保㈣域(又稱虛擬硬碟),以供儲存需保密的槽案與 耘式。此保搶區域平時為隱藏格式,他人無法從電腦上直 • #發現這個保密區域的存在。欲使用時,則於另_保密區 士或專用介面啟動並輸入密碼,以於驗證無誤後,才讓保密 # 域内的槽案或程式顯示。如此,因為槽案與程式皆隱藏 儲存於保密區域中,任何使用者皆須輪入正確的密碼始能 讓保密區域顯示,以提高資料的安全性。 但是使用者無法於現有的諸如檔案總管類之檔案管理 %式的介面啟動保密區域,^冑至保密區域專用介面始能 開啟’造成使用上的不便;x,一旦保密區域開啟後,任 何人則可自由儲存或新增至保密區域及讀取或複製或搬移 或刪除保密區域内的資料,因而若使用者於保密區域開啟 • 後暫時離開電腦且未關閉保密區域時,此刻即成為安全的 . 漏洞。 【發明内容】 有鑑於以往使用不便與開啟後安全堪慮的問題,本案 發明人思及將保密區域未隱藏並整合於電腦之檔案管理介 面内,以方便使用,同時,於對保密區域内的資料執行諸 如讀取、複製、搬移與刪除之類的動作時,皆要求輸入密 碼確認’以達到提南安全性之功效。 因此’本發明之一目的,即在提供一種更方便使用之 1263432 儲存裝置的資料保密方法及其儲存㈣與電子設備。 本么月之另目的,即在提供一種更安全之儲存裝置 的資料保密方法及其儲存媒體與電子設備。於是,本發明 錯存裝置的貧料保密方法,該儲存裝置係設置於—電子設 備内並供該電子設備儲存資料,該資料保密方法包含: (A) 規劃該儲存裝置的部分為一保密區域並設定該保 密區域對應的一系統密碼; (B) 右收到_屬於—寫人資料至該保密區域的寫入指 令集合之指令時,自動依據該指令工作;及 八fc)右收到一屬於一讀取該保密區域内資料之讀取指 :集口之扣7日守,先要求輸入一密碼並於該輸入密碼與該 系統密碼相符時,始依據該指令工作。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 以下配合參考圖式之一個較佳實施例的詳細說明中,將可 清楚的呈現。 ^如圖1,本發明具資料保密功能之電子設備較佳實施例 係電腦1。如圖2,此電腦1具有一統籌電腦1運作之微 處理器11、一供使用者輸入控制指令至微處理器11而諸如 滑鼠或鍵盤之類的輸入單元12、一供顯示相關資訊之顯示 态13、一供微處理器n儲存運作資訊之記憶體14及一儲 存裝置15。當然,此電腦i具有其他的電腦基本構件,如 主機板、電源供應器、聲霸卡等等,由於這些構件廣為熟 習该項技藝者所熟知且非本案改良重點,故不在此贅述。 1263432 另外’雖本實施例以電腦丨為例來說明,熟習該項技藝者 當知,電子設備可為其他種類而具資料讀寫功能之電子設 備,如個人數位助理(PDA)、行動電話等等,並不受限於 實施例所揭露者。 ' 本實施例的儲存裝置15係—硬碟而儲存有電腦i運作 所需的作業系統⑸與諸如檔案管理程式152之類的相關 程式。本實施例之播㈣理程式152係㈣總管程式。本 實施例的儲存裝置15的資料保密方法係以軟體來執行,故 儲存裝置15内更儲存_資料保密程式153,而於安裳資料 保密程式153時,更會規劃儲存裝置15内的—部絲使用 的儲存工間為-㈣區域154 ’以供往後儲存需保密的資料 :而剩餘的區域敎義為-普通區域155,指儲存諸如作業 m案管理程式152及資料保密程式153的相關系 式及-般資料的儲存空間。另外,資料保密程式⑸1263432 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a data privacy method and an electronic device thereof, and to a storage device that is safer and more convenient to use. With electronic devices. [Prior Art] In recent years, computers have become an indispensable tool for modern offices and homes with their powerful computing power and user-friendly operating system design. Moreover, after connecting the computer to the Internet, the data query, the second: news, the video, the travel, the topic discussion to the transmission of e-mail, but also rely on it. However, as people's reliance on computers increases, important data standards exist = the security and privacy of the brain, but it creates a hidden worry. Since computers are often positioned for personal use, the design of the operating system is as simple and convenient as possible, and many safety considerations are simultaneously sacrificed. In this way, the person sitting in front of the computer is assumed to be the manager of the entire system: The administrator can easily instruct any work, including reading, storing, adding, copying, moving, deleting, and the like. For example, in a typical office environment, due to business needs, people in different departments often borrow computers or copy files. If individuals or companies are secretly stored in the electricity, they may be afraid of being stolen or exposed. In the context of a school office or laboratory, it is more common to share or borrow computers from each other. On the other hand, users who often use computers, often have a lot of personal privacy information, such as letters, paper studies, personal address books, phone books, personal financial information, programs, etc., stored in the computer, in order to prevent others from being To see or change, 1263432 and have the appropriate method to protect this information. In view of the fact that computers may store a large amount of important and confidential information, the virtual hard disk technology proposed in recent years is to plan part of the magnetic disk in the computer hard disk = one (four) domain (also known as virtual hard disk) for storage to be kept secret. The trough and the shackles. This sneak area is usually hidden format, others can't get straight from the computer. ## Discover the existence of this secret area. If you want to use it, start and enter the password in the other _ privacy zone or special interface, so that the verification is correct, then the slot or program in the privacy # domain is displayed. In this way, because both the slot and the program are hidden and stored in the secure area, any user must turn the correct password to display the secret area to improve the security of the data. However, the user cannot start the privacy zone in the existing file management type interface such as the file manager class, and the special interface of the security zone can be opened to cause inconvenience in use; x, once the privacy zone is opened, anyone It can be stored or added to the privacy zone freely and read or copied or moved or deleted in the confidential area. Therefore, if the user temporarily leaves the computer after opening the security zone and does not close the privacy zone, it will become safe at this moment. Vulnerabilities. [Invention] In view of the problems of inconvenient use and security after opening, the inventor of the present invention thought that the secret area is not hidden and integrated into the file management interface of the computer for convenient use, and at the same time, in the secret area. When data is executed, such as reading, copying, moving, and deleting, it is required to enter a password to confirm 'to achieve the security of the South. Accordingly, it is an object of the present invention to provide a data privacy method for a more convenient 1263432 storage device and its storage (IV) and electronic device. Another purpose of this month is to provide a data security method for a more secure storage device and its storage media and electronic devices. Therefore, the method for keeping the material in the memory of the present invention is provided in the electronic device and stored in the electronic device, and the data security method comprises: (A) planning the portion of the storage device as a secure area And setting a system password corresponding to the secret area; (B) when the right received_ belongs to the instruction to write the person data to the write instruction set of the secret area, automatically works according to the instruction; and eight fc) receives the right one The reading refers to reading the data in the secret area: the 7-day shack of the collection port first requires a password to be input, and when the input password matches the system password, it starts to work according to the instruction. The above and other technical contents, features, and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments. As shown in Fig. 1, a preferred embodiment of the electronic device with data security function of the present invention is a computer 1. As shown in FIG. 2, the computer 1 has a microprocessor 11 for coordinating the operation of the computer 1, an input unit 12 for the user to input control commands to the microprocessor 11, such as a mouse or a keyboard, and a display unit for displaying related information. The display state 13, a memory 14 for storing the operation information by the microprocessor n, and a storage device 15. Of course, this computer i has other basic computer components, such as a motherboard, a power supply, a sound card, etc., and these components are well known to those skilled in the art and are not the focus of the improvement of the case, so it will not be described here. 1263432 In addition, although this embodiment uses a computer as an example to illustrate, those skilled in the art know that electronic devices can be other types of electronic devices with data reading and writing functions, such as personal digital assistants (PDAs), mobile phones, etc. And the like, and are not limited by the embodiments disclosed. The storage device 15 of the present embodiment is a hard disk in which an operating system (5) required for the operation of the computer i and a related program such as the file management program 152 are stored. The broadcast (four) program 152 of the embodiment is a (four) general manager program. The data security method of the storage device 15 of the present embodiment is executed by software. Therefore, the storage device 15 further stores the data security program 153. When the data security program 153 is installed, the storage device 15 is further planned. The storage space used by the wire is - (four) area 154 ' for later storage of information that needs to be kept secret: and the remaining area is defined as - normal area 155, which refers to the storage of such things as the operation file management program 152 and the data security program 153. Storage space for system and general data. In addition, data security program (5)

女裝於電腦1時,更合亚七、你m I ^ 更9要求使用者設定一與保密區域154 另外1本實施例以資料保密程式153 仃貝料保狁方法,然而熟習該項技藝 1,1^ 可健存於諸^者。又’本實施例的資料保密程式153亦 ;=如光碟之類的儲存媒體 腦1,亦不庫待需使用時始載入電 應又限於本實施例所揭露者。 此外,儲存梦罢7 < 裝置,如快閃記;可為其他種類而可儲存資料之儲存 者。 體44,並不應受限於本實施例所揭露 1263432 。一種154的工作指令大多數分屬於兩種 種疋馬入貝枓至保 ,A ith u, . ^ M 154如錯存指令、新增指令 保密㈣m β 4合。另—種是讀取 貝枓,堵如讀取指令、刪除指令、複製指 令及搬移指令等等,尤 ^人 在此,將此類指令歸類為一讀取指令 集合。由於屬於窵人社人I人 ” 9 7集a之指令僅是將資料寫入保密 , 較不會讓保密區域154内的資料有玫密之虞,但 於令集合之指令則需將保密區4 154 β的資料讀 出或刪除’較可能造成需保《料㈣或遺失之危機。 因此’當電腦1載入資料保密程式153後,於保密區 域154資料存取時,微處理器η會逕自執行屬於寫入指令 集合的指令’但屬於讀取指令集合的指令微處理器U會先 作密碼確認後始能被執行,以達到兼具_性與安全性之 功效。 再者,為確保資料儲存於保密區域154内的安全性, 在資料寫人保密區$ 154前會先加密始寫人,當然保密區 域154内的資料被讀取時,需先解密始能正確顯示,以達 到提高安全性之功效。保密區域151㈣料加解密技術係 使用對稱式加解密技術,諸如DES、3DES或AES加解密演 异法’而本實施例使用AES加解密演算法。 為讓本實施例更容易被瞭解,在下文中配合圖3來說 明本實施的資料保密方法。在以下實施例說明設定電腦工 已開機且檔案管理程式152亦被載入執行。 首先’在步驟201先判斷是否已安裝資料保密程式153 1263432 ’指是否保密區域154已被規劃。若步驟2gi判斷為是時 執行步驟203。反之’若步驟2〇1判斷為否時,執行步驟 2〇2 〇 A〜Z、〇〜9 在步驟202中,安裝資料保密程式153,以規劃儲存裝 置15的-部份為保密區域154並要求使㈣設m先密 碼’以供後續密碼驗證用。保密區域154 ^間大小可依 使用者設定而調整,且若儲存裝置15具有多個磁碟時,可 選擇其中-磁碟來規劃’在此,設定保密區域154的磁碟 代號為保密磁碟。x,在設定系統密碼時,會要求使用者 輸入-密碼後,會先確認輸人的密碼是否符合密碼檢核規 則’若不㈣’則提示密碼檢核規則’要求使用者重新輸 入密碼’若相符則設枝用者輸人密碼為系統密碼。本實 施例的密碼檢核規則中設定密碼需為4〜16字元並可為如 【”、”】 ,,\,, 、/’’等預設符號的組合。再者,本實_於資料保密程式 153安裝後預設資料保密程式153隨電腦i開機自動會被載 入。步驟202完成後,繼續執行步驟2()4。當然,資料保密 程式153的載人亦可依使用者設定而適時被載人,並不受 限於本實施例所揭露者。 *貝料保搶程式153已安裝時,於步驟2〇3,電腦^會 載入資料保密程式153來執行U實施例中資料㈣ 程式153的操作係整合至檔案管理程式152,如圖心伊案 總管介面91會出現保密區域154的代號保密磁碟川田以、 方便使用者操作保密區域154,以紐至另—介面啟 10 1263432 動保密區域的不便。同時,由於本實施例的保密區域i54 利用伴隨資料的輸入指令來判斷是否進行密碼驗證,而非 像習知保密區域需再輸入密碼驗證始能開啟,本實施例的 保密區域無須輸入密碼始能開啟而是直接整合於檔案總管 介面91,以供使用者操作。類似檔案管理程式153的操作 L當使用者點選保密磁碟911日寺,如圖5,會出現儲存於保 密區域154的檔案夾與檔案名稱。 當資料保密程式153載入後,即開始等待與保密區域 W相關的指令輸人,若有指令輸入時,則在㈣中接 收此指令。由於指令可能是屬於寫入資料集合或讀取資料 集合或與管理設定相關指令。若屬於寫入資料集合或讀取 貧料集合的指令係對應一筆使用者指定資料,指於輸入此 =令前使用者利用游標所選定的資料,而此資料可能為播 '、或檔案夾或其組合。又,在此與管理設定相關指令以更 新糸統密碼指令為例來說明,當然,管理設定相關指令可 他設定指令,如設定加密金鑰的長度、設定保密區 域154的容量大小等等’並不受限於本實施例所揭露者。 =2〇5_此指令是否屬於寫入指令集合,指是否 驟2及增指令。若㈣2〇5判斷為是時,執行步 驟06。反之,若步驟挪判斷為否時,繼續步驟207。 在步驟206中,會先將與此μ __…的指定位置。詳細來說先:= =鑰力來力:密此資料後,再以系統密碼來加密此加密金 餘後成一加岔金鑰資剩_ :由 貝枓&鬼與加松資料整合在_起以寫入 1263432 至保密區域154。若此資料内有多筆松 ^ %案日守,則逐筆進行 :步驟2G6結束後’跳回步驟加4,以等待 區域154相關的指令。 保在 而在步驟207中,繼續判斷此於八曰 隹人 & θ 、 日7疋否屬於讀取指令 :二者曰疋::讀取指令、删除指令、複製指令與搬移指 ^ 。了卜驟207判斷為是,執行步驟細。反之,若 v驟207判斷為否時,執行步驟212。 =於讀取指令集合的指令會影響保密區 既貝料,因此於㈣208中,要求使用者輸入一密石弓 1實施例會產生—如圖6之視窗92,以要求使用 岔碼。在使用者輸入密碼後, m m…一 執仃步驟2〇9’以判斷輸入密 二:、?、,“碼相符。若步驟2〇”m相符時,執行步 驟若步驟謝判斷不符時,執行步驟2ιι,以顯示輸 入密碼錯誤訊息來告知使用者, 别 =:來工作而逕自結束,並跳回㈣綱來等待下-個 對庫=I21G時,因密瑪相符,電腦1先解密與此指令 料後再依指令來作對應工作。舉例來說,若為讀 後由曰;Λ ’先由資料保密料m將對應諸解密後 管理程式152執行讀取此筆資料的工作;若為: 理二:’亦先由資料保密程式153麵解密後檔案管 亦Π 行刪除作業;若為複製指令或搬移指令時, 複製::::仏式153將對應資料解密後檔案管理程式152 5至對應位置。在步驟210結束後,跳回步驟綱 1263432 以等待下一個指令。 在步驟212中 …^ 步驟212判斷為B日士’判斷此指令是否為更新密碼指令。若 斷為否時,則跳等T。反之,咖^ 在步驟213 t 4專待下一個指令。 ,考量安全性,步驟二要求使用者輪入新系統密碼。當然 統密碼,並於舊系統密碼確=:密:外T要 。 〜、、、决日守,始繼績執行步驟214 在步驟214中,爭薪έ ^ 統密碼。步驟214社束碼為㈣213輸入的新系 令。 、、。束後,亦跳回步驟綱,等待下一個指 此外’前述步驟2〇5、2〇7 設計需求而調整,亦可同時執行。 〃“順序可以 雷:二’/使用者輸入屬於寫入指令集合之指令時,則 電細、自動加密資料並逕自執行對應工作,但當使用者榦 入屬於⑼取&令集合之指令時,則需先作密碼確認= 功能始能執行對應工作,以達到兼顧便利性與安全性之功 據前所述,本發明整合於諸如電腦1之類的電子設備 中既有的構案管理程式152,讓使用者可於槽案管理:式 152的介面91直接以熟悉的檔案管理程< 152的操作指八 來使用保密區㉟154,以達到方便使用之功效。同時,^ 於讀取指^合之指令輸入時’於執行對應工作前二 先要求確邊後碼,如此,即便使用者離 1 J电細刚,他人欲 13 1263432 查看或竊取保密區域154内的資料皆須再輸入密碼確認, 以達到更安全之功效。此外,儲存於保密區域154内資料 係加密資料,即便保密區域154整個被竊取,若無正確的 系統密碼,他人亦無法得知保密區域154内的資料内容, 以達到更加安全之功效。 惟以上所述者,僅為本發明之較佳實施例而已,當不 能以此限定本發明實施之範圍,即大凡依本發明申請專利 範圍及發明說明内容所作之簡單的等效變化與修飾,皆仍 屬本發明專利涵蓋之範圍内。 【圖式簡單說明】 圖1是實施本發明儲存裝置的資料保密方法較佳實施 例的電子設備的一範例示意圖; 圖2是本實施例之電子設備的架構示意圖; 圖3是本實施例之流程圖; 圖4是本實施例的整合保密區域的檔案管理程式的一 範例的介面示意圖; 圖5是圖4中的介面保密磁碟被點選後的一範例的示 意圖;及 圖6是本實施例中要求使用者輸入密瑪之一視窗範例 的示意圖。 14 1263432 【主要元件符號說明】 1電腦 153資料保密程式 11微處理器 154保密區域 12輸入單元 155普通區域 13顯示器 91檔案總管介面 14記憶體 911保密磁碟 15儲存裝置 92視窗 15 1作業系統 152檔案管理程式 201〜214步驟 15When the women's clothing is on the computer 1, it is more suitable for the seventh, you m I ^ 9 requires the user to set a and the secret area 154. Another 1 embodiment uses the data security program 153, the method of protecting the shell material, but familiar with the skill 1 , 1^ can be stored in the ^ ^. Further, the data security program 153 of the present embodiment is also a storage medium 1 such as a compact disc, and is not limited to those disclosed in the present embodiment. In addition, the storage of the dream 7 < device, such as flash memory; can be stored for other types of data storage. Body 44 should not be limited to 1263432 as disclosed in this embodiment. A 154 work order is mostly divided into two kinds of 疋 入 枓 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , The other is to read the Bessie, such as reading instructions, deleting instructions, copying instructions and moving instructions, etc., especially here, classify such instructions as a set of read instructions. Because it belongs to the person of the deaf person, the instruction of the 9th episode a is only to write the information confidentially, and the information in the secret area 154 is less likely to be secreted, but the order of the collection is required to be kept in the secret zone. 4 154 β data read or delete 'more likely to cause the need to protect the material (four) or lost crisis. Therefore, when the computer 1 is loaded into the data security program 153, when the data is accessed in the secure area 154, the microprocessor η will The self-execution of the instruction belonging to the set of write instructions 'but the instruction microprocessor belonging to the set of read instructions will be executed after the password is confirmed, so as to achieve the effect of both _ sex and security. The security of the data stored in the secret area 154 will be encrypted before the data writer's secret area $ 154. Of course, when the data in the secret area 154 is read, it needs to be decrypted first to display correctly, so as to improve. The security effect. The secret area 151 (four) material encryption and decryption technology uses symmetric encryption and decryption technology, such as DES, 3DES or AES encryption and decryption algorithm "and this embodiment uses AES encryption and decryption algorithm. To make this embodiment easier Was The data privacy method of the present embodiment will be described below with reference to Fig. 3. In the following embodiment, the setting computer is turned on and the file management program 152 is also loaded and executed. First, 'in step 201, it is judged whether the data security program 153 has been installed. 1263432 'refers to whether the secret area 154 has been planned. If the step 2gi is judged as YES, step 203 is performed. Otherwise, if the step 2〇1 is judged to be no, the steps 2〇2 〇A~Z, 〇~9 are performed in step 202. In the installation data security program 153, the part of the storage device 15 is planned to be the security area 154 and the (4) m first password is required for subsequent password verification. The size of the security area 154 can be adjusted according to user settings. And if the storage device 15 has a plurality of disks, the disk may be selected to plan 'here, the disk code of the set secret area 154 is a secure disk. x, when the system password is set, the user is required After entering the password, it will first confirm whether the password of the input meets the password check rule. If not (4), the password check rule will be prompted to ask the user to re-enter the password. The user input password is the system password. In the password verification rule of this embodiment, the password is set to 4 to 16 characters and can be preset symbols such as [", "], \,,, /". In addition, after the data security program 153 is installed, the default data security program 153 is automatically loaded with the computer i. After the step 202 is completed, the step 2 () 4 is continued. Of course, the data security program 153 The manned person can also be manned at the appropriate time according to the user's setting, and is not limited to the one disclosed in the embodiment. * When the bedding protection program 153 is installed, in step 2〇3, the computer ^ will load the data. The security program 153 is used to execute the data in the U embodiment. (4) The operation of the program 153 is integrated into the file management program 152. As shown in the figure, the file interface 91 of the present case will appear in the secret area 154, and the user will operate the confidential area. 154, to the new to the other - interface to open 10 1263432 inconvenient to move the secret area. At the same time, since the secret area i54 of the embodiment uses the input command accompanying the data to determine whether to perform the password verification, instead of requiring the password authentication to be opened again, the secret area of the embodiment does not need to input the password. It is opened directly to the file manager interface 91 for user operation. Similar to the operation of the file management program 153. When the user clicks on the secure disk 911, as shown in Fig. 5, the folder and file name stored in the secure area 154 appear. When the data security program 153 is loaded, it waits for the command input associated with the secure area W to be received. If there is an instruction input, the command is received in (4). Since the instruction may be a collection of data or a collection of data or instructions related to management settings. If the instruction belonging to the data collection or the reading of the poor collection corresponds to a user-specified data, the data selected by the user before the input of the command is used, and the data may be a broadcast, or a folder or Its combination. Moreover, here, the management setting related instruction is described by taking an example of updating the system password command. Of course, the management setting related command may set an instruction, such as setting the length of the encryption key, setting the capacity of the secret area 154, etc. It is not limited to those disclosed in the embodiment. =2〇5_ Whether this instruction belongs to the set of write instructions, refers to whether it is a step 2 or an instruction. If (4) 2〇5 is judged as YES, go to step 06. On the other hand, if the step is negative, the process proceeds to step 207. In step 206, the specified position with this μ__... will be first. In detail, first: = = key force to force: after the data is encrypted, the system password is used to encrypt the encryption key and become a plus key. _ : The data is integrated by 枓 枓 & ghost and jiasong in _ Start by writing 1263432 to the privacy zone 154. If there are multiple copies of the data in this data, it will be done one by one: after the end of step 2G6, the step is jumped back to 4 to wait for the instructions related to area 154. In step 207, it is determined whether the 曰 & & & 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 In step 207, it is judged as YES, and the execution steps are fine. On the other hand, if the determination in step 207 is negative, step 212 is performed. = The instruction to read the instruction set affects the privacy zone. Therefore, in (4) 208, the user is required to enter a slash. The embodiment will be generated - as shown in window 92 of Figure 6, to request the weight. After the user enters the password, m m...1) Step 2〇9’ to determine the input secret 2:,? , "Code match. If step 2〇"m matches, if the step is not satisfied, go to step 2, and display the error message to inform the user, don't =: work and end, and jump Back to (four) program to wait for the next - a pair of libraries = I21G, because of the Mimar match, the computer 1 first decrypted with this command and then according to the instructions for the corresponding work. For example, if it is read, the data security material m will be processed by the decryption management program 152 to read the data; if: "2: 'First by the data security program 153 After the face decryption, the file manager also deletes the job; if it is a copy command or a move command, the copy :::: 153 153 decrypts the corresponding file and the file management program 152 5 to the corresponding position. After the end of step 210, jump back to step 1263432 to wait for the next instruction. In step 212, step 212 determines that B is a judge to determine whether the instruction is an update password command. If it is negative, skip it and wait for T. Otherwise, the coffee is dedicated to the next instruction in step 213 t 4 . To consider security, step 2 requires the user to enter the new system password. Of course, the password is correct, and the old system password is indeed =: secret: outside T is required. ~, ,, and ruling, the initial execution step 214 In step 214, the salary is έ. In step 214, the social code is a new command entered by (4) 213. ,,. After the bundle, it also jumps back to the step, waiting for the next finger. In addition, the previous steps 2〇5, 2〇7 design requirements are adjusted and can be performed simultaneously. 〃 “Sequence can be mine: two”/user inputting instructions belonging to the set of write instructions, then fine-tuning, automatically encrypting the data and performing the corresponding work, but when the user breaks into the instruction belonging to (9) fetching & , the password verification is required first = the function can perform the corresponding work to achieve the convenience and security. The present invention is integrated into the existing configuration management program in the electronic device such as the computer 1. 152, the user can use the security area 35154 directly in the interface 91 of the formula 152 by using the familiar file management process < 152 operation finger to achieve the convenience of use. Meanwhile, the reading finger ^ When the command is input, the first code is required before the execution of the corresponding work. Therefore, even if the user is away from the 1 J, the other person wants 13 1263432 to view or steal the data in the secret area 154. Confirmed to achieve a more secure effect. In addition, the data stored in the confidential area 154 is encrypted, even if the confidential area 154 is completely stolen, without the correct system password, others cannot get The content of the data in the security area 154 is used to achieve a more secure effect. However, the above description is only a preferred embodiment of the present invention, and the scope of the present invention cannot be limited thereto, that is, the patent application according to the present invention The simple equivalent changes and modifications made by the scope and the description of the invention are still within the scope of the present invention. [FIG. 1] FIG. 1 is an electronic embodiment of a preferred embodiment of a data security method for implementing a storage device of the present invention. FIG. 2 is a schematic diagram of the architecture of the electronic device of the present embodiment; FIG. 3 is a schematic diagram of an interface of the file management program for integrating the secure area according to the embodiment; 5 is a schematic diagram showing an example of the interface of the interface security disk in FIG. 4; and FIG. 6 is a schematic diagram of an example of a window requiring the user to input a milma in this embodiment. 14 1263432 [Description of main component symbols] 1 computer 153 data security program 11 microprocessor 154 security area 12 input unit 155 common area 13 display 91 file manager interface 14 memory Confidential disk storage device 911 15 92 151 OS Windows file manager 152 201~214 Step 15

Claims (1)

1263432 十、申請專利範圍: 該儲存裝置設置於一電子 料’該資料保密方法包含 -種儲存裝置的資料保密方法, 設備内並供該電子設備儲存資 (A)規劃該儲存货 子表置的部分為一保密區域並設定 該保密區域對應的一系統密碼; ' (B )若收到一屬一 一 . ;一寫入資料至該保密區域的寫 ▲ 入指令集合之指令時,白 _ 自動依據該指令工作;及 (C )右收到一屬於 ^ 蜀於一碩取該保密區域内資料之讀 取指令集合之指令時,春西七 无要求輸入一密碼並於該輸入密 碼與該系統密碼相符時,始依據該指令工作。 2. 依據申請專利範圍第i項所述之資料保密方法,其中, 該寫入指令集合具有一儲存指令與一新增指令。 3, 依據申清專利fe圍第1項所述之資料保護方法,其中, 該讀取指令集合具有一讀取指令、一刪除指令、一複製 0 指令及一搬移指令。 4·依據申請專利範圍第1項所述之資料保護方法,其中, 在該步驟(B )中,若收到屬於該寫入指令集合之該指令 時’更先將一與該指令對應的資料加密後始依據該指令 工作。 5 ·依據申請專利範圍第4項所述之資料保護方法,其中, 在該梦驟(C )中’若收到屬於該讀取指令集合之該指令 時,於該輸入密碼與該系統密碼相符時,先解密與該指 令對應之負料再依據該指令工作。 16 1263432 6·依據申明專利範圍第1項所述之資料保護方法,其中, 忒保狁區域係整合至該電子設備之一檔案管理程式。 7·種使電子设備執行資料保密步驟之儲存媒體,該電子 設備具有一儲存裝置而該儲存媒體適合載入該電子設備 内以執行該資料保密步驟,該資料保密步驟包含: (A) 規劃該儲存裝置的部分為一保密區域並設定 該保密區域對應的一系統密碼; (B) 若收到一屬於一寫入資料至該保密區域的寫 入指令集合之指令時,自動依據該指令工作;及 (C) 若收到一屬於一讀取該保密區域内資料之讀 取扣令集合之指令時,先要求輸入一密碼並於該輸入密 碼與該系統密碼相符時,始依據該指令工作。 8·依據中請專利範圍第7項所述之儲存媒體,纟中,該寫 入指令集合具有一儲存指令與一新增指令。 9·依據申請專利範圍第7項所述之儲存媒體,其中,該讀 取指令集合具有一讀取指令、一刪除指令、一複製指令 及一搬移指令。 10·依據申請專利範圍第7項所述之儲存媒體,其中,在讀 步驟(B )中’若收到屬於該寫入指令集合之該指令時, 更先將一與該指令對應的資料加密後始依據該指令工作 〇 11 ·依據申睛專利範圍第1 〇項所述之儲存媒體,其中,在鸪 步驟(C )中,若收到屬於該讀取指令集合之該指令時, 於該輸入密碼與該系統密碼相符時,先解密與該指令對 17 1263432 應之資料再依據該指令工作。 12·依據申請專利範圍第7項所述之儲存媒體,其中,該保 密區域係整合至該電子設備之一檔案管理程式。 1 3 · —種具有資料保密功能之電子設備,係包含· 一統籌該電子設備運作之微處理器; 一輸入單元,用以供使用者輸入指令至該微處理器 9 一顯示器,係受該微處理器控制以顯示相關資訊; 及 ' J 一儲存裝置,具有一儲存該電子設備運作所需作業 系統與相關程式之普通區域及一保密區域,而該保密區域 更有一對應的系統密碼; 其中,若該微處理器收到一與該保密區域相關的指 令且屬於一讀取該保密區域内資料之讀取指令集合時,先 要求輸入-密碼,並於該輸入密碼與該系統 依該指令執行對應工作。 付号始 •依據巾請專利範圍第13項所述之電子設備,其中,該儲 存裝置的相關程式具有一檔案管理程式及一與該保密區 域相關之資料保密程式。 15. 依據巾請專利範圍第13項所述之電子設備,其中,若該 微處理器收到的指令屬於一寫入資料至該保密區域的寫 入指令集合時,該微處理器執行與該指令對應的工作。 16. 依據中請專利範圍第15項所述之電子設備,其中,該寫 入扣令集合具有一儲存指令與一新增指令。 18 1263432 17.依據申請專利範圍第13項所述之電子設備,其中,該讀 取指令集合具有一讀取指令、一刪除指令、一複製指令 及一搬移指令。 1 8.依據申請專利範圍第1 5項所述之電子設備,其中,若該 微處理器收到屬於該寫入指令集合之該指令時,更先將 一與該指令對應的資料加密後始依據該指令工作。 1 9.依據申請專利範圍第1 8項所述之電子設備,其中,若該 微處理器收到屬於該讀取指令集合之該指令時,於該輸 入密碼與該系統密碼相符時,該微處理器先解密與該指 令對應之資料再依據該指令工作。 191263432 X. Patent application scope: The storage device is disposed in an electronic material. The data security method includes a data security method for the storage device, and the device is provided with the electronic device storage resource (A) to plan the storage goods table. The part is a secret area and sets a system password corresponding to the secret area; '(B) if a one-to-one is received. When a data is written to the instruction of the secret area to write the instruction set, white_automatic Working in accordance with the instruction; and (C) receiving an instruction to read a set of read instructions for the data in the secure area, Chunxi seven does not require a password and enters the password with the system. When the password matches, it works according to the instruction. 2. The method according to claim 1, wherein the set of write instructions has a store instruction and a new instruction. 3. The data protection method according to claim 1, wherein the read instruction set has a read command, a delete command, a copy 0 command, and a move command. 4. The data protection method according to claim 1, wherein in the step (B), if the instruction belonging to the set of write instructions is received, a data corresponding to the instruction is first used. After encryption, it works according to this instruction. 5. The data protection method according to claim 4, wherein in the dream (C), if the instruction belonging to the read instruction set is received, the input password is consistent with the system password. At the same time, the negative material corresponding to the instruction is decrypted and then operated according to the instruction. 16 1263432 6· According to the data protection method described in claim 1 of the patent scope, the 忒 狁 zone is integrated into one file management program of the electronic device. 7. A storage medium for causing an electronic device to perform a data privacy step, the electronic device having a storage device adapted to be loaded into the electronic device to perform the data privacy step, the data security step comprising: (A) planning The part of the storage device is a secret area and a system password corresponding to the secret area is set; (B) if an instruction belonging to a set of write commands belonging to the secret area is received, the instruction is automatically operated according to the instruction And (C) if an instruction is received that reads a set of read deductions for reading the data in the secure area, first requesting a password and operating according to the instruction when the input password matches the system password . 8. According to the storage medium of claim 7, wherein the set of write instructions has a store instruction and a new instruction. 9. The storage medium of claim 7, wherein the read instruction set has a read command, a delete command, a copy command, and a move command. 10. The storage medium according to claim 7, wherein in the reading step (B), when the instruction belonging to the set of writing instructions is received, the data corresponding to the instruction is encrypted first. Working according to the instruction 〇11. The storage medium according to the first aspect of the claim, wherein in the step (C), if the instruction belonging to the read instruction set is received, the input is When the password matches the system password, first decrypt the data corresponding to the instruction pair 17 1263432 and then work according to the instruction. 12. The storage medium of claim 7, wherein the secure area is integrated into a file management program of the electronic device. 1 3 - an electronic device having a data security function, comprising: a microprocessor for coordinating operation of the electronic device; an input unit for the user to input an instruction to the microprocessor 9 and a display The microprocessor controls to display related information; and the 'J storage device has a common area for storing an operating system and related programs required for operation of the electronic device and a secure area, and the secret area further has a corresponding system password; And if the microprocessor receives an instruction related to the secret area and belongs to a read instruction set for reading data in the secret area, first requesting an input-password, and inputting the password and the system according to the instruction Perform the corresponding work. The electronic device described in claim 13 of the patent application, wherein the associated program of the storage device has a file management program and a data security program associated with the secure area. 15. The electronic device of claim 13, wherein the microprocessor executes the instruction if the instruction received by the microprocessor belongs to a set of write instructions for writing data to the secure area. The corresponding work of the instruction. 16. The electronic device of claim 15, wherein the write deduction set has a store instruction and a new instruction. The electronic device of claim 13, wherein the read instruction set has a read command, a delete command, a copy command, and a move command. 1 . The electronic device according to claim 15 , wherein, if the microprocessor receives the instruction belonging to the set of write instructions, first encrypting a data corresponding to the instruction Work according to this directive. The electronic device according to claim 18, wherein, if the microprocessor receives the instruction belonging to the read instruction set, when the input password matches the system password, the micro The processor first decrypts the data corresponding to the instruction and then works according to the instruction. 19
TW94121190A 2005-06-24 2005-06-24 Data security method for storage apparatus and storage media and electronic device TWI263432B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94121190A TWI263432B (en) 2005-06-24 2005-06-24 Data security method for storage apparatus and storage media and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94121190A TWI263432B (en) 2005-06-24 2005-06-24 Data security method for storage apparatus and storage media and electronic device

Publications (2)

Publication Number Publication Date
TWI263432B true TWI263432B (en) 2006-10-01
TW200701729A TW200701729A (en) 2007-01-01

Family

ID=37966376

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94121190A TWI263432B (en) 2005-06-24 2005-06-24 Data security method for storage apparatus and storage media and electronic device

Country Status (1)

Country Link
TW (1) TWI263432B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI709099B (en) * 2018-09-21 2020-11-01 臺灣網路認證股份有限公司 System for encrypting and decrypting through operation system verifies code and method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI709099B (en) * 2018-09-21 2020-11-01 臺灣網路認證股份有限公司 System for encrypting and decrypting through operation system verifies code and method thereof

Also Published As

Publication number Publication date
TW200701729A (en) 2007-01-01

Similar Documents

Publication Publication Date Title
US9866374B2 (en) Computer programs, secret management methods and systems
US8423795B2 (en) Storage controller comprising encryption function, data encryption method, and storage system
US6249866B1 (en) Encrypting file system and method
CN103617399B (en) A kind of data file guard method and device
US11809584B2 (en) File system metadata protection
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
US8490204B2 (en) Selective protection of files on portable memory devices
US20090222500A1 (en) Information storage device and method capable of hiding confidential files
CN103488954A (en) File encryption system
JP4516598B2 (en) How to control document copying
CN103425938B (en) The folder encryption method of one kind Unix operating system and device
JP2007148466A (en) Portable storage device and os
TWI263432B (en) Data security method for storage apparatus and storage media and electronic device
JP2005165900A (en) Information leak prevention system
CN100447703C (en) Data secrecy method of storage apparatus and storage media and electronic apparatus thereof
TW200832178A (en) Memory card and security method therefor
JP2010186352A (en) Apparatus and program for processing information
JP2003242005A (en) Document management method, document management system, and document management device
Pang et al. A transparent encryption scheme of video data for android devices
TWI310902B (en) Method for protecting data of apparatus which use wince system
JP6544431B2 (en) INFORMATION PROCESSING APPARATUS, DATA DISPLAY METHOD, AND DATA DISPLAY PROGRAM
Hannay et al. Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment
JP2004053958A (en) Data decoding method and data encryption method
JP2002123427A (en) Access control system for computer
KR20030086747A (en) Storage Medium Having PC Management Programm Using Voice Verification