TWI310902B - Method for protecting data of apparatus which use wince system - Google Patents

Method for protecting data of apparatus which use wince system Download PDF

Info

Publication number
TWI310902B
TWI310902B TW94104590A TW94104590A TWI310902B TW I310902 B TWI310902 B TW I310902B TW 94104590 A TW94104590 A TW 94104590A TW 94104590 A TW94104590 A TW 94104590A TW I310902 B TWI310902 B TW I310902B
Authority
TW
Taiwan
Prior art keywords
action
user
data
specific
decryption
Prior art date
Application number
TW94104590A
Other languages
Chinese (zh)
Other versions
TW200630800A (en
Inventor
Hsing Ping Kuo
Original Assignee
Mitac Int Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitac Int Corp filed Critical Mitac Int Corp
Priority to TW94104590A priority Critical patent/TWI310902B/en
Publication of TW200630800A publication Critical patent/TW200630800A/en
Application granted granted Critical
Publication of TWI310902B publication Critical patent/TWI310902B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

13109 縣 7twfl.doc/〇〇6 96-8-1 九、發明說明: 【發明所屬之技術領域】 本發明是有關於-種使用WinCE系統之 法’且特別是有關於當使用者無法執行正確的二 動作時,即對重要的資料執行保護措施的 ^13109 County 7twfl.doc/〇〇6 96-8-1 IX. Description of the Invention: [Technical Field of the Invention] The present invention relates to the method of using the WinCE system and particularly relates to when the user cannot perform correctly The second action, that is, the implementation of protective measures on important data ^

系統之裝置的保護資料之方法。 禋使用WmCE 【先前技術】A method of protecting data from a system device.禋Use WmCE [Prior Art]

在個人電腦應用如此廣泛的年代中,人們早就已經設 想要創造-種可赠身攜帶的資訊設備,而這種設備= 先產品形態之-即是掌上型電腦。掌上型_的出現,極 大地改變了人們的生活、:^作f慣,很多人徹底拋棄了傳 統的計算機、記事本、電話薄,在一些地方(比如美國的 矽谷)’掌上型電腦的普及率甚至超過了行動電話,成為人 們工作生活中的必備物品。In the era of such a wide range of personal computer applications, people have long wanted to create a kind of information device that can be carried and carried, and this device = the first product form - that is, the palm-sized computer. The emergence of the palm-type _ has greatly changed people's lives, and many people have completely abandoned the traditional computers, notebooks, and phone books. In some places (such as the Silicon Valley in the United States), the popularity of palm-sized computers. The rate even exceeds the mobile phone and becomes a must-have item in people's work and life.

而隨著掌上型電腦的巨大成功,更多類型的可攜式行 動裝置也開始引起了產業界的注意並進行研究發展,如個 人數位助理(Personal Digital Assistant,PDA)、智慧型手機 (Smart Phone)等,而為了要讓這些使用者能方便的使用這 類型的行動裝置’因此也發展出一套適用此類型產品的作 業軟體-WinCE介面。With the great success of handheld computers, more types of portable mobile devices have begun to attract industry attention and research and development, such as Personal Digital Assistant (PDA), smart phones (Smart Phone) ), etc., in order to make it easy for these users to use this type of mobile device', so a set of operating software for this type of product - WinCE interface has also been developed.

WinCE介面的外觀很像windows 95,這樣做的最大益 處是’使用者看到的是一個熟悉的介面,很容易接受它。 WinCE是一個全新開發的作業系統,目前最新版的WinCE 只需200 K的運行空間。而WinCE介面是模組化的,OEM 4 1310902 15397twfl.doc/006 96-8-1 磨豕可以力π入自己所需要的任何模組,除去不需要的。比 如’手機廠就可以把觸控板模組去掉,以節省空間。 種角度上,WinCE更像Wind〇ws Ντ,因為winCE程式可 以在保護模式甲運行在32 MB空間,最大可達2G位元組 工間。而且-個應用程式的故障不會引祕個系統失敗。The WinCE interface looks a lot like Windows 95, and the biggest benefit of this is that the user sees a familiar interface that is easy to accept. WinCE is a newly developed operating system, and the latest version of WinCE requires only 200 K of running space. The WinCE interface is modular, OEM 4 1310902 15397twfl.doc/006 96-8-1 豕 豕 can force π into any module you need, remove unwanted. For example, the mobile phone factory can remove the touch panel module to save space. From a variety of perspectives, WinCE is more like Wind〇ws Ντ, because the winCE program can run in 32 MB space in protected mode A, up to 2G byte. And - an application failure will not lead to a system failure.

WmCE的設計目標是:模組化及可延展性、即時性能 通信能力強大’支援多種CPU。從作錢統内核的角 二看’ WmCE具有靈活的電㈣理功能,包括睡眠/喚醒 模式。在WinCE中,還使用了物件儲存(〇bject別㈣技術, 包括構案系統、註冊表及資料庫。它還具有很多高性能、 献率的作業系統特性,包括視需要分頁、共用儲存 又處理同步等。 夕此外’ WinCE是-個多工的作業系統,可以同時執行 W固任務,並在他們之間來回切換,這其實就是亀如戰 的簡化版本,我們可以透過我們所熟悉的Wind〇ws的操作 方式來控制WinCE,它也帶有“我的文件,,,也有很多軟體 如 Pocket Word、P〇cket Excel 等等。 也由於目前安裝WinCE系統的行動襄置功能愈來愈 強大,甚至可以當作是一部小型的電腦來使用,因此為^ 方便起見,許多使用者亦會將重要的資料存放在行動裝置 内’不過因為這種行動裝置的體積通常不大,所以很容易 遺失,因而造成育料外流。又或者是當此行動裝置放置於 公共場合時’也很容易被旁人所偷窺,導致行動裝置内的 重要資料洩露,因此若將重要資料存放於行動農置内,似 ,9〇2 l5397twfi.d〇c/〇〇6 96-8-1 保1然而’雖然已經知道有這種現象會發 ㈣置的設計者卻未想出如何有效地保護行 【發明内容】 置的就是在提供系統之裝 未当^ …蒦方法,此方法是當使用者在啟用裝置前,若 ιϊίΐ轉絲作時’則會職置_重要資料執行 木邊措轭,以避免重要資料會有外流的情況發生。 方法,提出一種使用wmcE系統之裝置的資料保護 用者^A ·偵測裝置是否啟用;當裝置啟料,價測使 完成解密動作’其中解㈣作係限定在—特定時 時,及當使用者在特定時間内未完成解密動作 ί7對特疋貧料執行保護措施。WmCE's design goals are: modular and extensible, real-time performance, powerful communication capabilities, and support for multiple CPUs. From the perspective of the core of the money system, the WmCE has flexible electrical (four) functions, including sleep/wake mode. In WinCE, object storage is also used (including the structure, registry and database). It also has many high-performance, high-performance operating system features, including paging as needed, shared storage and processing. Synchronization, etc. In addition, 'WinCE is a multiplexed operating system that can perform W-solid tasks at the same time and switch back and forth between them. This is actually a simplified version of the battle, we can use our familiar WindWin Ws operates in a way that controls WinCE. It also comes with "My files, and there are also a lot of software such as Pocket Word, P〇cket Excel, etc. Also because the current installation of WinCE system is becoming more powerful, even Can be used as a small computer, so for the convenience of convenience, many users will also store important information in the mobile device's. However, because the mobile device is usually small, it is easy to lose. , thus causing outflow of the feed. Or when the mobile device is placed in a public place, it is also easy to be peeked by others, resulting in the mobile device. Important information is leaked, so if important information is stored in the action farm, it seems that 9〇2 l5397twfi.d〇c/〇〇6 96-8-1 guarantee 1 however 'although it is known that this phenomenon will occur (four) The designer has not figured out how to effectively protect the line. [Inventive content] The method is to provide the system improperly installed method, this method is when the user turns the wire before the device is enabled. The position of the meeting _ important information to implement the edging of the wood edge to avoid the occurrence of outflow of important information. Method, propose a data protection user using the device of the wmcE system ^ A · Whether the detection device is enabled; when the device starts The price measurement enables the completion of the decryption action 'where the solution (4) is limited to the specific time, and when the user does not complete the decryption action within a certain time, the protection measures are implemented for the special poor material.

依,、、'本發_較佳實施例所述之使用驗C ^㈣料保護方法中,上述之解密動作求使 依4寸定轉輸人裝置上讀鍵。 裝苗依:!本發日㈣較佳實齡㈣述之使用WinCE系統之 祕保護方法中,#上述之裝置的螢幕為可觸控式 之牲:解岔動作可以設定為使用觸控筆在可觸控式螢幕 答=位置上停留—預料間。或者可以同時包括使用觸 =二可觸}工式榮幕之特定位置上停留預^時間以及依一 特疋川員序輸人裝置上之按鍵兩項動作。 依&、本發明的較佳實施觸狀使肖偷CE系統之 裳置的純賴方料,上叙傾措祕可以是隱藏特 1310902 15397twfl.d〇c/〇〇6 96-8-1 ’或對蚊資料進行加密 或置換特定資料之儲存内容。 J于、特疋貝枓, =切述,依據本㈣所提出之❹% 袭置的賢料保護方法 糸統之 若未執行特定的解密動作=疋虽使用者在啟用裝置時, 資料執行-保護^ 裳置内的系統會對重要的 生。 ” 9 & ’以避免重要資料會有外流的情況發 為讓本土明之上述和其他目的、特徵和優 明如下。* ,並配合所附圖i,作二 【實施方式】 置;發明所提出-使用 示,在步驟_中貝/it 程圖。如圖中所 會使用WinCE “ m先侦測裝置是否被啟用’寸 的電H 並可隨身攜ί W〜等 ==裝置例如是掌上電腦、〜、 者是要解除行動要猎由打開行動裝置的蓋子,或 行動裝置__心^鍵鎖才可以開始啟用,因此, 置是否被啟用。、,工由上賴适些動作來確認行動裝 在步驟Sl〇3中,去w. 么 啟用後,會_使用認行域置已羥被 作可以由行論f者疋否執行一解费動作,這個解密動 自己的習慣進二擁在最初操作此行動裝置時,依 仃0又疋其中,此解密動作可以是設定〜么 組 7 1310902 96-8-1 15397twfl.doc/0〇6 密碼’使用者在啟用此行動裝置之後,必需要輸入此組密 碼’才能正確地進行資料的讀取。或者,擁有者可以設定 使用者必需在啟用裝置後,依照事先所設定的順序輸入鍵 盤上的某些鍵’依此來判斷目前的使用者是否完成了解密 動作。 另外,若此行動裝置的螢幕為可觸控式螢幕時,擁有 者更可以利用此觸控式螢幕當作輸入解密動作的媒介,擁 有者在最初操作設定此行動裝置時,可以將解密動作設定 為使用者必需使用觸控筆在可觸控式螢幕上的某一特定位 置上停留固定的時間,如此才視同完成解密動作。或者, 行動裝置的擁有者亦可以設定使用者必需要使用觸控筆碰 觸此觸控式瑩幕上的多個座標位置,以確定使用者是否完 成解密動作。 另外,此裝置亦可以設定一特定時間,例如當行動裝 置的擁有者將此特定時間設為30秒時,當使用者一但開啟 此行動裝置之後,此行動裝置亦會同時開始計時,當使用 者在30秒之内未完成行動裝置原先所預設的解密動作 時,WinCE系統仍會認定使用者未完成解密動作。山 當然,若熟悉此一技藝者,除了可以利用鍵盤和可 控式螢幕當作輸入解密動作的媒介外,更可以依據其它 式的行動裝置的特性,設計出不同的解密動作,以達b 高的保密效果。 最後’在步驟Sl〇5中,若使用者未輸入正確的 動作,WinCE系統則會對一些特定資料夾進行—保★蔓= 8 1310902 twfl doc/006 96-8-1 、^在延些特定資料夾中的資料不會被不明的人士 竊取。其中,卜、+、 —, 逯之保護措施,可以是隱藏特定的檔案内 對特定的檔案加密,以使其它的軟體無法讀取 中的資料’亦可以是置換特定職夾_資料, 以使其匕的軟體會讀取到錯誤的資料。 者甚卜,如果是極為重要的檔案資料,行動裝置的擁有 Υ以在使用者無法執行正確的解密動作時,將重要 =、Ϊ貧料刪除或摧毁’使其永遠消失,以避免重要的資 用W.月4二圖2,其繪示係依照本發明所提出之另一種使 八,1ncE、系統之裝置的資料保護方法之示意圖。如圖中所 Γ駐t法是利用Applet軟體201來當作設定軟體,以讓 保^_擁有者可以設定或解除賴密碼之動作、選取要 宰^: ίί#夾’以及啟動保護措施時要對受保護之檔 茶貝枓夹執行何種保護措施。 當行動裝置的擁有者完朗有的設 結果記錄於設定程式加中,並讓此行動裝3 =執行上述的相關保護㈣的奴。雜,若行 樣恭j者要重新更改設定程式203中的相關設定時,丨^ 而要輪入正確的密碼才可以進行更改。 ^此®示巾,此行練置具有鍵似及制觸控 ,並由鍵盤驅動程式2〇9以及觸控螢 •、喚醒待機中的行動裝置、解除行動裝置之按鍵鎖= 9 1310902 15397twfl.doc/006 96-8-1 ί =開=置3子時,這即代表了使用者要開始 動程式209以及觸料幕^211 __驅 的鍵盤以及觸控螢幕可以開始二;。5 ’以使订動裝置上 綠述的内D容-樣,此時鍵盤或者觸控 榮幕會開始比對使用者的操作行為 了指定的解魏作,若是⑽般心—使用者疋否進4丁 先所設定的順序輪入键為例’使用者必需依照事 密二二=敌些鍵或者是需要輪入特定 而若是以觸控式螢幕為例 定的動作進行解密動作,如和前述的動;:據 需使用觸控筆碰觸螢幕上的某一 ‘使用者必 時間,才視同完成解密動作;;此外疋^並停留固定的 此行動裝置同時具魏如及觸 i本實施例中, 因此在設定解密動作時,可==輸入媒介, ,裝則的存取二;:内操: 疋,右使用者热法執行正確地解密動 、"、但 内的上鎖程式207,則會對儲存重要 ^時’行動裝置 執行保護措施,_免重要資㈣2 另外,在狀程式加中亦可以設定 ^科會外沒。 用者未在此特定_内正確地執行動假若使 2〇7同樣會視使用者未完成解密動=,則上鎖程式 資料夾213執行保護措施。 因此同樣會對重要 I31〇9〇27^,oc/006 96-8-1 前面所提及的保罐 同的,當上鎖程式207 ^行保^圖1中的保護措施是相 可能會被隱藏,或者是對重要資時’重要資料夾213 無法正常讀取重要資料夾213内斜夾213加密,讓使用者 亦可以是將重要資料爽213 。另外,保護措施 互相置換,讓使用者會讀到其他的貢料夾内容 資料夾213内的資料十分重^\、貝料。當然’假若重要 完成解密動作時,行動穿置在使用者無法正確地 册,將峨料====設定上鎖程式 其永遠消失。 斤有貝料進行刪除或摧毀,使 裝置^依據本發明所提出之使用WinCE系統之 置時’以㈣設定當使用者在啟用襄 ==措施,叫免重㈣料會有外流的情況發生。 限定本蘇日日毛明已以較佳實施例揭露如上,然其並非用以 和範η:任㈣習此技藝者’在不脫離本發明之精神 範圍^、田可作些許之更動與潤飾,因此本發明之保護 視後社申請專職圍所界定者為準。 i圖式簡單說明】 置的^繪示係依照本發明所提出之使用wincE系統之裝 的貧料保護方法之流程圖。 圖2纷示係依照本發明所提出之另一種使用WinC]E ^统之褒置的資料保護方法之示意圖。 1主要元件符號說明】 1310902 15397twfl.doc/006 96-8-1 201 : Applet 軟體 203 :設定程式 205 :觸控螢幕驅動程式 207 :上鎖程式 209 :鍵盤驅動程式 211 :電源管理程式 213 :重要資料夾 S101 :偵測裝置是否啟用 S103 :當裝置啟用時,偵測使用者是否完成解密動作 S105 :當使用者未完成解密動作時,對一特定資料執 行保護措施According to the method of using the test C ^ (four) material protection described in the preferred embodiment of the present invention, the above decryption operation seeks to perform a read key on the device according to the 4-inch transfer. Installed Miaoyi:! This is the day (four) better age (four) described in the use of WinCE system secret protection method, #The above device screen is a touchable animal: the untwisting action can be set to use the stylus Touchable screen answer = stop on position - expected room. Or it can also include the use of the touch = two touchable } work in the specific position of the stop pre-time and the button on the input device of the special channel. According to the preferred embodiment of the present invention, the stereotype of the sneak peek CE system can be hidden. 1310902 15397twfl.d〇c/〇〇6 96-8-1 'Or encrypt the mosquito data or replace the storage of specific data. J Yu, 疋 疋 枓 = = = = = = = = = = = = = = = = = = = = = = 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据 依据Protecting the system inside the store will be important. 9 & 'to avoid the outflow of important information, so that the above and other purposes, features and advantages of the local Ming are as follows. * , and with the drawing i, the second [implementation] set; - Use the indication, in the step _ in the shell / it diagram. As shown in the figure, use WinCE "m first detect whether the device is enabled 'inch' electric H and can carry ί W~ etc. == device such as a handheld computer , ~, is to cancel the action to hunt by opening the cover of the mobile device, or the mobile device __ heart ^ key lock can be started to enable, therefore, whether the setting is enabled. The work is confirmed by the appropriate action to install the action in step S3, to go to w. When it is enabled, it will use the recognition domain to set the hydroxy group to be executed by the line theory. Action, this decryption moves its own habits into the second operation. When the mobile device is initially operated, it depends on 0 and 疋, and the decryption action can be set to ~7 group 10 1310902 96-8-1 15397twfl.doc/0〇6 password 'The user must enter this group password after enabling this mobile device' to read the data correctly. Alternatively, the owner can set whether the user must input certain keys on the keyboard in the order set in advance after enabling the device to determine whether the current user has completed the decryption action. In addition, if the screen of the mobile device is a touchable screen, the owner can use the touch screen as a medium for inputting the decryption action, and the owner can set the decryption action when initially setting the mobile device. It is necessary for the user to use the stylus to stay at a specific position on the touch screen for a fixed time, so that the decryption action is completed. Alternatively, the owner of the mobile device can also set the user to use the stylus to touch multiple coordinate positions on the touch screen to determine whether the user has completed the decryption action. In addition, the device can also be set for a specific time. For example, when the owner of the mobile device sets the specific time to 30 seconds, when the user turns on the mobile device, the mobile device also starts timing at the same time. When the decryption action originally scheduled by the mobile device is not completed within 30 seconds, the WinCE system still determines that the user has not completed the decryption action. Of course, if you are familiar with this technology, you can use the keyboard and controllable screen as the medium to input the decryption action, and you can design different decryption actions according to the characteristics of other mobile devices. Confidentiality effect. Finally, in step S1〇5, if the user does not input the correct action, the WinCE system will perform some specific folders—protection ★ vine = 8 1310902 twfl doc/006 96-8-1 , ^ in the specific The information in the folder will not be stolen by unknown people. Among them, the protection measures of Bu, +, —, 逯 can be to hide the specific files in a specific file to make the other software unable to read the data' can also be replaced with specific job folders _ data, so that The rest of the software will read the wrong data. However, if it is an extremely important archive, the possession of the mobile device is such that when the user is unable to perform the correct decryption action, the important =, the poor material is deleted or destroyed 'to make it disappear forever, to avoid important resources. Referring to Figure 4 of Figure 4, there is shown a schematic diagram of another data protection method for an apparatus for making eight, 1 ncE, systems in accordance with the present invention. As shown in the figure, the method of using the Applet software 201 is used as the setting software, so that the owner can set or release the action of the password, select the : ίί# folder, and start the protection measures. What protective measures are in place for the protected tea bag. When the owner of the mobile device has a complete set of results recorded in the setting program plus, and let this action install 3 = perform the above-mentioned related protection (four) slave. Miscellaneous, if you want to change the relevant settings in the setting program 203 again, you must change the correct password to change. ^This® towel, this line is equipped with a key-like and touch-sensitive touch, and is driven by the keyboard driver 2〇9 and the touch firefly, the mobile device in the wake-up standby, and the button lock of the release device = 9 1310902 15397twfl. Doc/006 96-8-1 ί = On = When setting 3, this means that the user wants to start the program 209 and the keyboard of the touch screen ^211 __ and the touch screen can start two; 5 'In order to make the inner D of the greening device on the binding device, the keyboard or the touch screen will start to match the user's operation behavior, and if it is (10), the user is not satisfied. For example, the order of the round key is set in the first step. The user must follow the secret 22 or the enemy key or need to turn in the specific. If the touch screen is used as an example, the decryption action is performed. The aforementioned movement;: according to the need to use the stylus to touch a certain 'user' time on the screen, it is regarded as the completion of the decryption action;; in addition, the mobile device that stays fixed and has the same Wei and touch In the embodiment, therefore, when setting the decryption action, the input medium can be == input, and the access of the device is two;: internal operation: 疋, the right user thermal method performs correct decryption, ", but the internal lock Program 207 will perform protection measures for the storage of important mobile devices. _ Free important assets (4) 2 In addition, in the program plus, you can also set the ^ outside the conference. If the user does not perform the correct action within this specific _, if the user 2 does not complete the decryption action, the lock program folder 213 performs the protection measure. Therefore, it will also be important to the important I31〇9〇27^, oc/006 96-8-1 mentioned above. When the locking program is 207, the protection measures in Figure 1 may be Hidden, or the important time of the 'important folder 213 can not read the important folder 213 inside the diagonal clip 213 encryption, so that the user can also be important information 213. In addition, the protection measures are replaced with each other, so that the user can read other contents of the tributary folder. The information in the folder 213 is very heavy. Of course, if it is important to complete the decryption action, the action will be placed in the user's inability to properly register, and the data will be set to ==== to set the lock program to disappear forever. The jin has the material to be deleted or destroyed, so that the device ^ is used according to the present invention when using the WinCE system, and (4) is set when the user activates the 襄 == measure, and the weight-free (four) material will have an outflow. The present invention has been described above with reference to the preferred embodiments, but it is not intended to be used in conjunction with the teachings of the present invention, without departing from the spirit of the invention, and to make some changes and refinements. Therefore, the protection of the present invention is subject to the definition of the full-time enclosure. BRIEF DESCRIPTION OF THE DRAWINGS A schematic diagram of a poor material protection method using the wincE system proposed in accordance with the present invention is shown. 2 is a schematic diagram of another data protection method using the WinC system according to the present invention. 1 main component symbol description] 1310902 15397twfl.doc/006 96-8-1 201 : Applet software 203 : setting program 205 : touch screen driver 207 : locking program 209 : keyboard driver 211 : power management program 213 : important Folder S101: Whether the detecting device is enabled or not S103: when the device is enabled, detecting whether the user completes the decrypting action S105: when the user does not complete the decrypting action, performing protection measures on a specific data

1212

Claims (1)

1310902 15397twf.doc/m 括 申請專利範圍: 1·-種使用WmCE系統之裝置的資料保護方法,包 —3¾¾ 偵測該裝置是否啟用,· 1中啟用時,偵測使用者是否完成一解密動作, "中^解街動作係限定在—特定時間内完成;以及 特定;在該锊疋時間内未完成該解密動作時,對- ί贿魏’其找倾魏為隱藏該特定資 刪除該特定倾以及置換該特定 貝科之儲麵容其中之—或其組合者。 置的項所述之使賴孤系、统之裝 定順序輸人該裝置解密動作係要綠时依, 置的概目第1項所述之使賴ncE系統之裝 幕時:該解;動;以中當該裝置之榮幕為一可觸控式榮 營幕之特定位¥ ^可料&為使賴控筆在該可觸控式 4如置上停留一預定時間。 置的資料®第3項所述之使用wincE系統之裝 筆在該可觸μ^其中該解密動作可同時包括使用觸控 -特定順序輪停留-預定時間以及依 13 1310902 96-8-1 15397twfl.doc/006 五、 中文發明摘要: 一種使用WinCE系統之裝置的資料保護方法,此方 法包括當使用者在啟用裝置時’若未執行正確的解密動 作,則此裝置内的系統會對重要的資料執行保護措施,以 避免重要資料會有外流的情況發生。 六、 英文發明摘要: A method for protecting data in apparatus which use WinCE system is provided. In the method, the system of apparatus will execute the protection measure for important data if a user fails to conduct the correct decoding action while starting the apparatus. By doing so, the possibility of letting important data in the apparatus out can be avoided. 七、 指定代表圖: (一) 本案指定代表圖為:圖(1 )。 (二) 本代表圖之元件符號簡單說明: S101 :债測裝置是否啟用 S103 .當裝置啟用時,偵測使用者是否完成解密動作 S105 :當使用者未完成解密動作時,對一特定資料執 行保護措施 八、 本案若有化學式時,請揭示最能顯示發明特徵 的化學式: 矣 31310902 15397twf.doc/m Included in the scope of patent application: 1) - Data protection method for devices using WmCE system, package - 33⁄43⁄4 to detect whether the device is enabled, · When enabled in 1 , detect whether the user completes a decryption action , "中^ Jiejie action system is limited to - complete within a certain time; and specific; when the decryption action is not completed within the time, the - 贿 brietry Wei's search for the Wei to hide the specific capital to delete the Specific dumping and replacement of the particular Faco's storage surface - or a combination thereof. The set item is used to make the order of the system, and the order of the device is to be deleted. The decryption action of the device is to be green, according to the item 1 of the overview of the lai ncE system: the solution; In the middle of the device, the glory of the device is a specific position of the touch-sensitive glory screen, and the stylus is allowed to stay on the touchable stylus for a predetermined time. Set the data® as described in item 3 using the wincE system in which the pen can be touched. The decryption action can include both touch-specific sequence wheel stop-scheduled time and 13 1310902 96-8-1 15397 twfl .doc/006 V. Abstract of the invention: A data protection method for a device using the WinCE system, the method includes: when the user activates the device, the system in the device will be important if the correct decryption action is not performed. The data is implemented with protective measures to avoid the outflow of important information. In English, the system of apparatus will use the protection measure for important data if a user fails to conduct the correct decoding action while starting the apparatus By doing so, the possibility of letting important data in the apparatus out can be avoided. VII. Designation of representative drawings: (1) The representative representative of the case is: Figure (1). (2) A brief description of the component symbol of the representative figure: S101: Whether the debt testing device enables S103. When the device is enabled, it detects whether the user completes the decrypting action S105: when the user does not complete the decrypting action, performs a specific data Protective measures 8. If there is a chemical formula in this case, please disclose the chemical formula that best shows the characteristics of the invention: 矣 3
TW94104590A 2005-02-17 2005-02-17 Method for protecting data of apparatus which use wince system TWI310902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94104590A TWI310902B (en) 2005-02-17 2005-02-17 Method for protecting data of apparatus which use wince system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94104590A TWI310902B (en) 2005-02-17 2005-02-17 Method for protecting data of apparatus which use wince system

Publications (2)

Publication Number Publication Date
TW200630800A TW200630800A (en) 2006-09-01
TWI310902B true TWI310902B (en) 2009-06-11

Family

ID=45072331

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94104590A TWI310902B (en) 2005-02-17 2005-02-17 Method for protecting data of apparatus which use wince system

Country Status (1)

Country Link
TW (1) TWI310902B (en)

Also Published As

Publication number Publication date
TW200630800A (en) 2006-09-01

Similar Documents

Publication Publication Date Title
US9866374B2 (en) Computer programs, secret management methods and systems
EP3161645B1 (en) Fast data protection using dual file systems
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
CN105574418A (en) Data encryption method and apparatus
WO2006051543A2 (en) Selective protection of files on portable memory devices
CN105487636A (en) Portable electronic apparatus and operation method thereof
JP2019504566A (en) Information image display method and apparatus
EP3812932B1 (en) Method and portable storage device with internal controller that can self-verify the device and self-convert the device from current mode to renewed mode without communicating with host
CN105809000A (en) Information processing method and electronic device
CN102118503B (en) Data protection method, device and terminal
CN103034819A (en) SD (Secure Digital) card capable of switching storage partitions and control method of SD card
EP2483800B1 (en) Method and system for supporting portable desktop with enhanced functionality
JP2013506207A (en) Method and system for supporting portable desktops
CN102592099A (en) Security identification method and electronic device thereof
TWI310902B (en) Method for protecting data of apparatus which use wince system
TW201516743A (en) Electronic apparatus and operation method
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
JP2008152593A (en) Information terminal equipment
JP6045104B2 (en) Data erasing program, data erasing method, computer having data erasing function and data erasing management server
TWI263432B (en) Data security method for storage apparatus and storage media and electronic device
US20120047582A1 (en) Data deleting method for computer storage device
CN100447703C (en) Data secrecy method of storage apparatus and storage media and electronic apparatus thereof
CN103207959A (en) Encryption method and system based on data card of file system
Chu et al. Study of touch identify for mobile device security
JP2010211406A (en) Removable memory unit

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees