TWI331722B - Coding method of information, decoding method of information, and computer readable recording media containing the same - Google Patents

Coding method of information, decoding method of information, and computer readable recording media containing the same Download PDF

Info

Publication number
TWI331722B
TWI331722B TW094130767A TW94130767A TWI331722B TW I331722 B TWI331722 B TW I331722B TW 094130767 A TW094130767 A TW 094130767A TW 94130767 A TW94130767 A TW 94130767A TW I331722 B TWI331722 B TW I331722B
Authority
TW
Taiwan
Prior art keywords
file
encryption
encrypted
information security
item
Prior art date
Application number
TW094130767A
Other languages
Chinese (zh)
Other versions
TW200712974A (en
Inventor
Lung Yuan Wu
Original Assignee
Fineart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fineart Technology Co Ltd filed Critical Fineart Technology Co Ltd
Priority to TW094130767A priority Critical patent/TWI331722B/en
Priority to JP2006207945A priority patent/JP2007074701A/en
Publication of TW200712974A publication Critical patent/TW200712974A/en
Application granted granted Critical
Publication of TWI331722B publication Critical patent/TWI331722B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

1331722 九、發明說明: 【發明所屬之技術領域】 本發明係有關於一種保密方法,特別是運用一保密 策略對特定操作過程之任意類型檔案進行加密保護及利 用一權限讀取以對加密檔案進行保密方式之操作。 【先前技術】 在現今資訊數位化的時代,許多的個人私密訊息與 重要的組織訊息大多藉由電腦加以處理與儲存,因此電腦 資訊安全的重要性日趨增加。習知技術中關於電腦資訊系 統安全性的方法包括訪問控制表、群組控制、用戶身份認 證等,各有其特點,如美國專利公告第5991751號專利「多 層安全性評估系統及方法」(Method and apparatus for multi-level security evaluation),揭露一種結合各種單一方 法,如訪問控制表、群組控制等,利用各方法在系統處理 速率上之優點提供一種提昇安全處理速度的系統及方 法,該系統將用戶分為各種擁有不同權限之等級;同時將 系統資源對應用戶類別也分為多類,然後依據一定規則來 選擇一適當的方法判斷系統訪問請求是否允許。此外,中 華民國專利公告第486629、494344及583559號,皆揭露 數種權限安全管理系統與方法,請參閱第丨圖,第1圖係 為習知技術流程圖,習知技術之架構可略述如下:首先設 定權限規則(S10),其中,該權限規則係限定使用者之操 作動作,隨後讀取使用者權限與權限規則(S11),當使用 者開始進行一操作動作時(S12),先由電腦判別使用者之 權限是否足以進行該操作動作(S13),若使用者之權限充1331722 IX. Description of the invention: [Technical field of the invention] The present invention relates to a security method, in particular, using a privacy policy to encrypt and protect any type of file in a specific operation process and using a permission read to perform an encrypted file. Operation of confidentiality methods. [Prior Art] In the era of digital information, many personal and important organizational messages are processed and stored by computers. Therefore, the importance of computer information security is increasing. The methods for the security of computer information systems in the prior art include access control lists, group control, user identity authentication, etc., each having its own characteristics, such as the "Multilayer Security Evaluation System and Method" of the US Patent Publication No. 5991751 (Method) And apparatus for multi-level security evaluation), discloses a system and method for improving security processing speed by combining various single methods, such as access control list, group control, etc., by utilizing the advantages of each method in system processing rate. The user is divided into various levels with different rights; at the same time, the system resources are divided into multiple categories, and then an appropriate method is selected according to certain rules to determine whether the system access request is allowed. In addition, the Republic of China Patent Publication Nos. 486629, 494344, and 583559 disclose several types of rights security management systems and methods. Please refer to the drawings. Figure 1 is a flow chart of a prior art, and the architecture of the prior art can be outlined. As follows: First, a permission rule (S10) is set, wherein the permission rule defines an operation action of the user, and then the user authority and the permission rule are read (S11), when the user starts an operation action (S12), first It is determined by the computer whether the authority of the user is sufficient for the operation (S13), and if the user's authority is charged

5 程e ,並告知使用者權限不足,結束流 ‘、、、而右是當權限足夠之使用者將應保密資訊外流 * 1無法對所有的外流資訊進行保護,因此許多高保密 =公司團體及組織皆禁止連接外接儲存裝置,以避免資 1步机次但此方式會訝使用者造成資訊傳輸上的不便,若 =兩^訊下載或外傳料料,則需運用特定方式在特 2腦上進行資訊下栽與外傳,且若是在大量使用者需經 方式進行m與外傳時,㈣影響工作效率,並增 加公司團體及組織整體在資訊操作之負擔。 9 習知技術中相關於資訊安全管理方法係採用權限控 =之方式,於資訊下載與外傳之f求卻可能無法提供全 面而完整解決方案。因此,提供—種完善的資訊安全管理 方法已有極為迫切之需求。 【發明内容】 本發明之主要目的係在於提供一種資訊安全 法,係運用保密策略以對特定操作過程之檔 護’並可運用隱藏模式讓加密保護之過程不顯示於使= 之操作畫面’減少錢者操作上之錢,並能有效 心人士對加密保護過程之破壞。 句 本發明之另一目的係在於提供一種資訊安 法,係讀取使用者權限以保護加密檔案,當 ^方 以對加密檔案進行解密操作時,對已完 ^權限足 稽案再次進行加密,使檔案得到完整保i,/作之加密 並可運用隱藏 1331722 模式讓解密操作與再次加密之過程不顯示於使用者之操 作晝面,減少使用者操作上之不便,並能有效防止有心人 士對加密保護過程之破壞。 本發明提供一種資訊安全加密方法,首先由系統管 理者預先設定一保密策略,該保密策略内具有複數個加密 規則,該加密規則用以對一檔案操作過程進行控制,隨後 藉由連線方式使一保密系統内的電腦擁有該保密策略,當 使用者開始對一未加密檔案執行一項操作時,則判別該項 操作是否合乎該保密策略内之該加密規則,若該項操作並 不合乎該加密規則,則結束加密流程,讓使用者自由進行 該項操作;若該項操作合乎該加密規則,則在使用者完成 該項操作後,對該未加密檔案進行加密保護,使該未加密 檔案轉換為一加密檔案,最後將該加密檔案進行存檔動 作。 本發明亦提供一種資訊安全解密方法,首先使用者 經由一認證程序以登入該保密系統内的電腦,並藉由該認 證程序以讀取使用者之權限,當使用者開始對該加密檔案 進行操作時,則判別使用者之權限是否足以對該加密檔案 進行解密;若使用者之權限不足以對該加密檔案進行解 密,則告知使用者權限不足以讀取該加密檔案,並結束解 密流程;若使用者之權限足以對該加密檔案進行解密,則 對該加密檔案進行解密動作,使該加密檔案轉換為一解密 檔案,接著讓使用者自由對該解密檔案執行-檔案搡作, 待使用者完成該檔案操作後,則對該解密檔案進行加密保 護,使該解密檔案轉換為一新加密檔案,最後將該新加密 檔案進行存檔動作。5 process e, and inform the user that the authority is insufficient, the end of the flow ',, and right is when the user with sufficient authority will be out of confidential information * 1 can not protect all outflow information, so many high security = company groups and Organizations are forbidden to connect external storage devices to avoid the 1st step, but this method will surprise users of the inconvenience of information transmission. If the two downloads or the external materials are used, the specific method should be used on the special brain. Information is downloaded and circulated, and if a large number of users need to conduct m and rumor, (4) affect work efficiency and increase the burden of information operations of the company group and the organization as a whole. 9 In the prior art, the information security management method is based on the method of privilege control = the information download and the rumor may not provide a comprehensive and complete solution. Therefore, there is an urgent need to provide a comprehensive approach to information security management. SUMMARY OF THE INVENTION The main object of the present invention is to provide an information security method, which uses a privacy policy to protect a specific operation process and can use the hidden mode to reduce the process of encryption protection from being displayed on the operation screen of =. The money is operated by the money, and the effective person can destroy the encryption protection process. Another object of the present invention is to provide an information security method for reading user rights to protect encrypted files. When the party decrypts the encrypted file, the encrypted file is encrypted again. The file is completely protected, encrypted, and the hidden 1331722 mode can be used to prevent the decryption operation and the re-encryption process from being displayed on the user's operation, thereby reducing the inconvenience of the user's operation and effectively preventing the interested person from The destruction of the encryption protection process. The present invention provides an information security encryption method. First, a security policy is preset by a system administrator. The security policy has a plurality of encryption rules for controlling a file operation process, and then is connected by a connection method. A computer in a secure system has the privacy policy. When the user starts an operation on an unencrypted file, it determines whether the operation conforms to the encryption rule in the privacy policy, and if the operation does not meet the Encryption rule, the encryption process is ended, and the user is free to perform the operation; if the operation conforms to the encryption rule, after the user completes the operation, the unencrypted file is encrypted and protected, so that the unencrypted file is encrypted. Convert to an encrypted file, and finally archive the encrypted file. The present invention also provides an information security decryption method. First, a user logs in to a computer in the security system via an authentication program, and the user searches for the encrypted file by the authentication program. When it is determined whether the user's authority is sufficient to decrypt the encrypted file; if the user's authority is insufficient to decrypt the encrypted file, the user is notified that the authority is insufficient to read the encrypted file, and the decryption process is ended; If the user's authority is sufficient to decrypt the encrypted file, the encrypted file is decrypted, the encrypted file is converted into a decrypted file, and then the user is allowed to perform the file-free operation on the decrypted file, and the user completes the file. After the file is operated, the decrypted file is encrypted and protected, the decrypted file is converted into a new encrypted file, and finally the new encrypted file is archived.

7 1331722 爲使熟悉該項技藝人士瞭解本發明之目的、特徵及 功效,茲藉由下述具體實施例,並配合所附之圖式,對本 發明詳加說明如後: 【實施方式】 請參閱第2圖,第2圖係為本發明一較佳實施例之 流程圖一。本發明提供一種資訊安全加密方法,首先由系 統管理者預先設定一保密策略(S20),該保密策略内具有 ^ 複數個加密規則,該加密規則可對特定類型檔案進行加 密、對所有傳輸至外接式儲存裝置之檔案進行加密或對特 定名稱檔案進行加密等等,隨後藉由連線方式使一保密系 統内的電腦擁有該保密策略(S21),當使用者開始對一未 加密檔案執行一項操作時(S22),其中,該項操作包含讀 取、編輯、修改等動作,則判別該項操作是否合乎該保密 策略内之該加密規則(S23),若該項操作並不合乎該加密 規則,則結束本發明資訊安全加密方法之流程,讓使用者 自由進行該項操作;若該項操作合乎該加密規則,則在使 • 用者完成該項操作後,對該未加密檔案進行加密保護 (S24),使該未加密檔案轉換為一加密檔案,最後將該加 密檔案進行存檔動作(S25)。 此外,本發明另提供一種電腦可讀取之記錄媒體, 其記錄一種資訊安全加密方法,首先由系統管理者預先設 定一保密策略,該保密策略内具有複數個加密規則,該加 密規則用以對一檔案操作過程進行控制,隨後藉由連線方 式使一保密系統内的電腦擁有該保密策略,當使用者開始 對一未加密檔案執行一項操作時,其中,該項操作包含讀 8 1331722 ΐ略Γ、修改等動作’㈣別該項操作是否合乎該保密 策略内之該加密規則,若該項操作 β ^ m έ, 口乎該加密規則, 2加“程,讓使用者自由進行朗 作合乎該加密規則,則在使用者U 孭徕 加密梓宏m吃者7°成該項操作後’對該未 :讀案進订加进保護,使該未加密檔案轉換為一加密檔 案,最後將該加密檔案進行存檔動作。 〜 田 P圖J參^f 3圖’第3圖為本發明-較佳實施例之流 L ΐ。亦提供—料訊安讀密方法,首先使用 者,及由-認證程序以登人該保㈣統⑽電腦並藉由該 祕程序以讀取使用者之權限_),#使用者開始對該 加密標案進行操作時(S31) ’其中,所進行之操作包含讀 取、編輯、修改等動作’則判別使用者之權限是否足以對 該加密檔案進行解密(S32) ; ^使用者之權限不足以對該 加密槽案進行解密,㈣知使用者權限不足以讀取該加密 槽案,並結束解密流程;若使用者之權限足以對該加密檐 案進行解密,則對該加密檔案進行解密動作(S33),使該 加密檔案轉換為一解密檔案,接著讓使用者自由對該解密 檔案執行一檔案操作(S34),待使用者完成該檔案操作 後,則對該解密檔案進行加密保護(S35),若該解密檔案 執行槽案操作時並無改變或進行寫入之動作,則結束解密 流程;若該解密檔案執行標案操作時改變内容或進行寫入 動作,則使該解密槽案轉換為一新加密檔案,最後將該新 加密檔案進行存檔動作(S36)。 另外,本發明又提供一種電腦可讀取之記錄媒體, 其記錄一種資訊安全解密方法,首先使用者經由一認證程 序以登入該保密系統内的電腦,並藉由該認證程序以讀取 ⑧ 9 1331722 使用者之權限,當使用者開始對該加密檔案進行操作時, 其中,所進行之操作包含讀取、編輯、修改等動作,則判 別使用者之權限是否足以對該加密檔案進行解密;若使用 者之權限不足以對該加密檔案進行解密,則告知使用者權 限不足以讀取該加密檔案,並結束解密流程;若使用者之 權限足以對該加密檔案進行解密,則對該加密檔案進行解 密動作,使該加密檔案轉換為一解密檔案,接著讓使用者 自由對該解密檔案執行-檔案操作,待使用者完成該檔案 操作後,則對該解密檔案進行加密保護,若該解密檔案執 行檔案操作時並無改變或進行寫入之動作,則結束解密流 程;若該解密檔案執行檔案操作時改變内容或進行寫入動 作,則使該解密檔案轉換為一新加密檔案,最後將該新加 密檔案進行存檔動作。 需注意者,上述資訊安全加密方法及資訊安全解密 方法之流程可設定為隱藏模式,讓使用者不會因檔案進行 加密保護而造成操作上的困擾,更能有效防止有心人士對 加密保護之破壞。 由於本發明之資訊安全加密方法係運用保密策略以 對特定操作過程之檔案進行加密保護,故於特定操作過 程,如資訊外流、敏感性類型檔案執行或機密檔案複製等 操作過程,皆可進行保護。且無論檔案類型為何,皆可進 行加密保護。而相較於權限控制之方式,本發明之資訊安 全加密方法能對於外流資訊進行保護,而不致於運用禁止 連接外接儲存裝置之消極方式阻礙使用者進行資訊下載 與傳輸,且本發明之資訊安全加密方法所運用之加密方式 係為自動式加密,不僅可減少使用者對檔案進行加密之不 10 1331722 便,且可防止有心人士進行檔案外流,並可搭配隱藏模式 避免對加密過程進行破壞。另外,本發明之資訊安全解密 方法係對加密檔案進行操作,且在操作完成後再次進行加 密,能防止槽案在解密操作後受到破解,而造成資訊外流 之情況,進而對檔案形成完整保護,因此本發明極具進梦 性及符合申請發明專利之要件,爰依法提出申請,析鈎 局早日賜准專利,實感德便》 以上已將本發明做一詳細說明,惟以上所述者,僅 Φ 爲本發明之一較佳實施例而已,當不能限定本發明實施之 範圍。即凡依本發明申請範圍所作之均等變化與修飾等’ 皆應仍屬本發明之專利涵蓋範圍内。 【圖式簡單說明】 • 第1圖係習知技術流程圖; 第2圖係本發明一較佳實施例流程圖一; 第3圖係本發明一較佳實施例流程圖二。 φ 【主要元件符號說明】 S10設定權限規則 S11讀取使用者權限與權限規則 S12開始動作 S13判別動作 S14執行動作 S15終止動作 S20設定加密策略 S21讀取加密策略 S22開始操作 11 1331722 S23是否合乎加密規則 S24加密 S25存檔 S30讀取使用者權限 S31命令開啟加密檔案 S32判別權限是否足以解密 S33解密7 13 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 2 is a flow chart 1 of a preferred embodiment of the present invention. The invention provides an information security encryption method. First, a security policy is preset by a system administrator (S20). The security policy has a plurality of encryption rules, and the encryption rule can encrypt a specific type of file and transmit all to an external connection. The file of the storage device is encrypted or encrypted for a specific name file, etc., and then the computer in a security system has the privacy policy by connecting (S21), when the user starts executing an unencrypted file. In operation (S22), wherein the operation includes reading, editing, modifying, etc., determining whether the operation conforms to the encryption rule in the privacy policy (S23), if the operation does not comply with the encryption rule Ending the process of the information security encryption method of the present invention, allowing the user to perform the operation freely; if the operation conforms to the encryption rule, encrypting the unencrypted file after the user completes the operation (S24), the unencrypted file is converted into an encrypted file, and finally the encrypted file is archived (S25). In addition, the present invention further provides a computer readable recording medium for recording an information security encryption method. First, a security policy is preset by a system administrator, and the security policy has a plurality of encryption rules, and the encryption rule is used to A file operation process is controlled, and then the computer in a security system has the privacy policy by connecting, and when the user starts an operation on an unencrypted file, the operation includes reading 8 1331722 ΐ Skip, modify, etc. '(4) Whether the operation conforms to the encryption rule in the privacy policy, if the operation β ^ m έ, the encryption rule, 2 plus "process, let the user freely perform the operation In accordance with the encryption rule, after the user U 孭徕 encrypts the macro, the eater 7° becomes the operation, 'adds protection to the unreading, and converts the unencrypted file into an encrypted file, and finally The encrypted file is archived. ~ Field P Figure J Figure 3 Figure 3 Figure 3 is a flow chart of the preferred embodiment of the present invention. And by the -authentication procedure to board the person (4) system (10) computer and use the secret program to read the user's authority _), # user begins to operate the encrypted standard (S31) 'where The operation includes reading, editing, modifying, etc. 'determining whether the user's authority is sufficient to decrypt the encrypted file (S32); ^ the user's authority is insufficient to decrypt the encrypted slot case, and (4) knowing the user The permission is insufficient to read the encrypted slot file, and the decryption process is ended; if the user's authority is sufficient to decrypt the encrypted file, the encrypted file is decrypted (S33), and the encrypted file is converted into a decrypted file. Then, the user is free to perform a file operation on the decrypted file (S34), and after the user completes the file operation, the decrypted file is encrypted and protected (S35), and if the decrypted file performs the slot operation, there is no The action of changing or performing the writing ends the decryption process; if the decrypted file changes the content or performs the writing operation when performing the marking operation, the decrypted slot is converted into a new encrypted file. Finally, the new encrypted file is archived (S36). In addition, the present invention further provides a computer readable recording medium for recording an information security decryption method, firstly, the user logs in to the security system via an authentication program. Inside the computer, and by the authentication program to read the rights of the user of 8 9 1331722, when the user starts to operate the encrypted file, wherein the operation includes reading, editing, modifying, etc., Determining whether the user's authority is sufficient to decrypt the encrypted file; if the user's authority is insufficient to decrypt the encrypted file, the user is notified that the authority is insufficient to read the encrypted file, and the decryption process is ended; If the authority is sufficient to decrypt the encrypted file, the encrypted file is decrypted, the encrypted file is converted into a decrypted file, and then the user is free to perform the file operation on the decrypted file, after the user completes the file operation. , the decrypted file is encrypted and protected, and if the decrypted file is executed, If the action of changing or writing is performed, the decryption process is ended; if the decrypted file changes the content or performs a write operation when performing the file operation, the decrypted file is converted into a new encrypted file, and finally the new encrypted file is archived. . It should be noted that the above information security encryption method and the information security decryption method can be set to a hidden mode, so that the user does not suffer from the operation of the file encryption protection, and can effectively prevent the damage of the encryption protection. . Since the information security encryption method of the present invention uses a privacy policy to encrypt and protect a file of a specific operation process, it can be protected in a specific operation process such as information outflow, sensitive type file execution or confidential file copying. . And regardless of the file type, it can be encrypted. Compared with the method of authority control, the information security encryption method of the present invention can protect the outflow information without using the negative manner of prohibiting the connection of the external storage device to hinder the user from downloading and transmitting information, and the information security of the present invention. The encryption method used by the encryption method is automatic encryption, which not only reduces the user's encryption of the file, but also prevents the intentional person from performing file outflow, and can be used with the hidden mode to avoid damage to the encryption process. In addition, the information security decryption method of the present invention operates on the encrypted file, and performs encryption again after the operation is completed, which can prevent the slot case from being cracked after the decryption operation, thereby causing the situation of information outflow, thereby forming complete protection for the file. Therefore, the present invention is extremely dreamy and conforms to the requirements of applying for an invention patent, and the application is filed according to law, and the analysis of the patent is granted by the hook office as soon as possible. The above description has been made in detail, but the above is only Φ is a preferred embodiment of the invention and is not intended to limit the scope of the invention. That is, the equivalent changes and modifications made by the scope of the present application should remain within the scope of the patent of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS: Fig. 1 is a flow chart of a prior art; Fig. 2 is a flow chart 1 of a preferred embodiment of the present invention; and Fig. 3 is a flow chart 2 of a preferred embodiment of the present invention. φ [Description of main component symbols] S10 setting authority rule S11 reading user authority and authority rule S12 starting operation S13 determining action S14 performing action S15 terminating action S20 setting encryption policy S21 reading encryption policy S22 starting operation 11 1331722 S23 is encrypted Rule S24 Encryption S25 Archive S30 Read User Privilege S31 Command Open Encryption File S32 Determine whether the privilege is sufficient to decrypt S33 decryption

S34執行檔案操作 S35加密 S36存檔S34 performs file operations S35 encryption S36 archive

1212

Claims (1)

/ 、申請專利範固·· 資訊安全加密方法,包含 -加3保密策略’其中’該保密策略包括至少 ;:執行步驟,係對—檔案執行-操作:作^進行控制; 取、編輯、修改等播案執行動作:及過程係 行加:步驟,係對合乎該加密規則所執行該操作過程之檔案進 2 一:π專利範圍第!項所述之資訊安全加 二:則包含對特定類型檔 二其t ’該加 存,案進行加密或對特定名稱樓==至外蝴 ’如申請專利範圍第!項所述之資訊安 步驟,係設“ _ 申。月專利範圍第1項所述之資訊〜 取步驟包含運用一隱藏模式。 ' 王口岔方法’其中,該讀 5.如申請專利範圍第1項所述之資訊安入卜 密步驟包含運用一隱藏模式。 王1、方法,其中,該加 6·如申請專利範圍第j 密步驟包含1別步驟,係判二^加密方法,其中,該加 略内之該加密規則。 ’、 A呆過裎是否合乎該保密策 7如申請專利範圍第6項所述之資 判別步驟中判別該操作過程合乎該:二方法’其中,當該 則,則對該檔案進行加密。 X'、朿略内之該加密規 &如申請專利範圍第6項 貝Λ文王加密方法,其中,當該 13 1331722 ”年,月乂日修正/更 判別步驟中判別該操作過程不合 9. 則,則結束流程,讓使用者可對兮择^保密策略内之該加密規 —你 X搐案自由進行該操作過程。 —種電腦可讀取之記錄媒體,其 包含: ' ^ 種資机安全加密方法, 一讀取步驟,係讀取一保密策略,其 > —加密規則,該加密規則用以對―二,。該保密策略包括至少 —執行步驟,剌-職執行—操過料行控制; 指包含讀取、編輯、修改等樓案執行動^ ’其中該操作過程係 —加密步驟,係對合乎該加密^ 行加密。 "矾订5亥刼作過程之擋案進 10.如申請專利範圍第9項所述之資 密規則包含對特定類型檔案進行加密?對:、:法’其中’該加 存褒置之檔案進行加密或對 宰有傳輸至外接式儲 11 , . , W韬茱進行加密》 .專利顧第9項所述之資訊安全加 v驟前包含一設定步驟,係設定該保密策略其中,該讀 12如申請專利範圍第9項所述之資訊安全 取步驟包含運用一隱藏模式。 在方法,其中,該讀 專利*圍第9項所述之資訊安全加 笛步驟包含運用一隱藏模式。 在方法,其中,該加 14 =請專利範圍第9項所述之資訊安全加 利範圍第“項所述之資訊安全加密方去 _別步驟中判別該操作過程合乎 ^ ’其中,當 在朿疼内之該加密規 I33p22 卜〆月'^修正 則’則對該檔案進行加密。 16.如申請專利範圍第14項所述之資 該判別步驟中判別該操作過程不合乎該王:法’其中,當 規則,則結束流程,讓使用者可對,二、4朿略内之該加密 -種資^人一 案自由進行該操作過程。 種貝矾安全解密方法,包含: 權限讀取步驟,係讀取使用者權限; —準備步驟,係命令-加密槽案執行—操作過程; 判別步驟,依據該操作過程,判別 加密檔案進行解密; 者權限疋否足以對該 3密步驟’係當使用者權限足以賴加 该加密槽案進行解密,使該加密槽案轉換為—解 -執行步驟’係對該解密檔案執行該操作過程。 ::广專利範圍第π項所述之資訊安全解密方法, J別步驟中判別使用者權限不足以對該加 隹、中’該 時,則結束所有流程。 田案進行解密 .•申叫專利範圍第17項所述之資訊安全解密 列別步驟包含運用-隱藏模式。 ’ ’、中’該 申巧專利範圍第17項所述之資訊安全解密方 解密步驟包含運用一隱藏模式。 其中’該 21’ =請專利範圍第17項所述之資訊安全解密方法 :丁步驟m保密步驟,係當該解錢案 二= 成執行該操作過程之該解密檀案轉換為一新加使完 15 I年y月ψ日修正/矣止 这範圍第21項所述之資訊安全解密方法,其中,該 保ά步驟包含運用一隱藏模式。 a 2電腦可讀取之記錄媒體,其記錄一種資訊安全解密方法, 一權限讀取㈣’係讀取制者權限; 準備步驟’係命令―加密檔案執行-操作過程; 行::該操作過程’判別使用者權限是否足以對該 該加密;^進者權限足以對該加密槽案解密時,則對 一 田案進饤解欲’使該加密檀案轉換為-解密檔案;及 24 —執行步驟’係對該解密《執行該操作過程。、 申μ專利範圍第23項所述電腦可續取 該判別步驟中判別使用㈣w ^取之5己錄媒體’其中, 時,則結束所有^ 不足以對該加密樓案進行解密 該判別第23項所述電腦可讀取之記錄媒體,其中, ⑺步驟包含運用-隱藏模式。 、中 瓦’如申請專利範圍第Μ涵 該解密牛驟^ 这電腦可讀取之記錄媒體,复中, 解在步驟包含運用-隱藏模式。 ,、中 該執二電腦可讀取之記錄媒體’其中, 作過程後,對“ = 行該操 完成執行該操作過程之 箱雄棺案進行加密,使 及如申請專利範圍第 保案。 27項所权資訊安全解密方法,其 ' 5亥 1331722 保密步驟包含運用一隱藏模式。/, application for patents Fan · · information security encryption method, including - plus 3 privacy policy 'where' the privacy policy includes at least;: execution steps, system-to-file execution-operation: control ^; take, edit, modify Waiting for the execution of the broadcast case: and the process line plus: the step is to enter the file that corresponds to the operation process of the encryption rule. 2: π patent scope! The information security mentioned in the item adds two: it includes the addition of a specific type of file, and the case is encrypted or the specific name of the building == to the outer butterfly. The information security procedure described in the item is as follows: _ Shen. The information described in item 1 of the patent scope of the month~ The step of taking includes the use of a hidden mode. 'Wangkou 岔 method' where the reading 5. The information insertion step of the item 1 includes the use of a hidden mode. Wang 1, the method, wherein the addition 6 · the patent application scope j j secret step comprises 1 step, and the method 2 is encrypted, wherein The encryption rule in the approximation. ', A stays 裎 合 该 该 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 , the file is encrypted. X', the encryption code in the strategy & such as the patent scope of the sixth item Bellow Wenwang encryption method, wherein, when the 13 1331722 "year, the next day of the correction / more discriminating steps In the process of discriminating the operation is not in accordance with 9. Then, the process is terminated, so that the user can freely perform the operation process on the encryption rule in the security policy. A computer readable recording medium comprising: ' ^ a security machine security encryption method, a reading step, reading a privacy policy, and > an encryption rule, the encryption rule is used to pair two . The confidentiality policy includes at least—execution steps, 剌- job execution—operational control; refers to the execution of the file including reading, editing, and modification, wherein the operation process is an encryption step, and the encryption is performed. encryption. " 矾 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 For::: The law 'where' the file of the added file is encrypted or the transmission is sent to the external storage 11, . , W韬茱 is encrypted." The information security mentioned in item 9 The foregoing includes a setting step of setting the privacy policy, wherein the reading 12 is as described in claim 9 of the patent application scope, and includes a hidden mode. In the method, wherein the information security whistling step described in item 9 of the reading patent includes the use of a hidden mode. In the method, wherein the addition of 14 = please refer to the information security encryption section described in item 9 of the patent scope, the information security encryption method to determine the operation process is appropriate ^ The cryptographic rule I33p22 in the pain, the ^ ' '^ 修正 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' Wherein, when the rule is followed, the process is terminated, so that the user can freely perform the operation process in the case of the encryption-species-------------------------------------------------------- , read user rights; - preparation steps, command - encryption slot execution - operation process; discriminating steps, according to the operation process, discriminate the encrypted file for decryption; whether the authority is sufficient for the 3 secret step The user authority is sufficient to decrypt the encrypted slot case, and the encrypted slot is converted into a solution-execution step to perform the operation process on the decrypted file. The information security decryption method, in the J step, the user authority is not sufficient to end the process, and the process is terminated. The data is decrypted. The step of listing includes the use-hidden mode. The 'secure step of decrypting the information security decryption described in item 17 of the patent scope includes 'using a hidden mode.' 'The 21' = the 17th item of the patent scope The information security decryption method described in the following steps: D. Step m confidentiality step, when the money settlement case 2 = the execution of the operation process, the decryption of the Tan case is converted into a new addition, the 15th year, the next day, the correction/defect The information security decryption method according to Item 21, wherein the protection step comprises using a hidden mode. a 2 computer readable recording medium, which records an information security decryption method, a permission read (four) 'read Taker authority; preparation step 'system command--encrypted file execution-operation process; line:: the operation process 'determines whether the user authority is sufficient for the encryption; ^ entry authority is sufficient When the encrypted slot case is decrypted, the solution to the Yanda case is to 'translate the encrypted Tan case into a - decrypted file; and 24 - the execution step is to perform the operation on the decryption. The 23 computers can continue to use the discriminating step to discriminate the use of (4) w ^ to take 5 recorded media 'where, when, then all ^ is insufficient to decrypt the encrypted building. Take the recording medium, in which, (7) the step includes the application-hidden mode. In the case of the patent application, the documentary scope is the same as the decryption cow. This computer-readable recording medium, the complex, the solution includes the use-hidden Mode, , the computer can read the recordable media 'in which, after the process, the "= the operation of the box to complete the operation of the box to encrypt the case, such as the application for patent scope . The 27 items of information security decryption method, its '5 Hai 1331722 security steps include the use of a hidden mode. 1717
TW094130767A 2005-09-07 2005-09-07 Coding method of information, decoding method of information, and computer readable recording media containing the same TWI331722B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW094130767A TWI331722B (en) 2005-09-07 2005-09-07 Coding method of information, decoding method of information, and computer readable recording media containing the same
JP2006207945A JP2007074701A (en) 2005-09-07 2006-07-31 Method for encrypting and decrypting information security and recording media readable by personal computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW094130767A TWI331722B (en) 2005-09-07 2005-09-07 Coding method of information, decoding method of information, and computer readable recording media containing the same

Publications (2)

Publication Number Publication Date
TW200712974A TW200712974A (en) 2007-04-01
TWI331722B true TWI331722B (en) 2010-10-11

Family

ID=37935704

Family Applications (1)

Application Number Title Priority Date Filing Date
TW094130767A TWI331722B (en) 2005-09-07 2005-09-07 Coding method of information, decoding method of information, and computer readable recording media containing the same

Country Status (2)

Country Link
JP (1) JP2007074701A (en)
TW (1) TWI331722B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI412950B (en) * 2009-06-29 2013-10-21 Hon Hai Prec Ind Co Ltd Document protection system and method thereof
JP2011223603A (en) * 2011-06-02 2011-11-04 Toshiba Corp Signal processing apparatus and signal processing method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3453842B2 (en) * 1994-04-26 2003-10-06 三菱電機株式会社 Secure system
JP3761648B2 (en) * 1996-09-30 2006-03-29 アイ・ティー・エックス翼ネット株式会社 Computer system
JP2002141897A (en) * 2000-10-31 2002-05-17 Advanced Mobile Telecommunications Security Technology Research Lab Co Ltd Enciphering circuit provided with tamper resistance function
JP2002342518A (en) * 2001-02-02 2002-11-29 Matsushita Electric Ind Co Ltd System and method for contents use management
JP2004282494A (en) * 2003-03-17 2004-10-07 Kyocera Corp Communication method of portable radio communication equipment and portable radio communication system

Also Published As

Publication number Publication date
JP2007074701A (en) 2007-03-22
TW200712974A (en) 2007-04-01

Similar Documents

Publication Publication Date Title
KR100423797B1 (en) Method of protecting digital information and system thereof
JP5033916B2 (en) Digital copyright management method for compressed files
KR101522445B1 (en) Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
CN100568251C (en) The guard method of security files under cooperative working environment
JP4662138B2 (en) Information leakage prevention method and system
TW200949543A (en) Secure disposal of storage data
JP4593549B2 (en) File automatic decryption encryption system and program
JPH07295892A (en) Secure system
WO2006004130A1 (en) Data management method, program thereof, and program recording medium
KR20220039779A (en) Enhanced security encryption and decryption system
JP2008537191A (en) Digital information storage system, digital information security system, digital information storage and provision method
TWI499931B (en) File management system and method
JP4471129B2 (en) Document management system, document management method, document management server, work terminal, and program
JPWO2007142072A1 (en) Terminal apparatus and data management system provided with the same
TWI573079B (en) Information security management system and method for electronic document
US10726104B2 (en) Secure document management
TWI331722B (en) Coding method of information, decoding method of information, and computer readable recording media containing the same
JP2008129803A (en) File server, program, recording medium, and management server
JP5631251B2 (en) Information leakage prevention method
TWI381285B (en) Rights management system for electronic files
CN101932995A (en) Method for encrypting digital file, method for decrypting digital file, apparatus for processing digital file and apparatus for converting encryption format
TWI289841B (en) Method for controlling data-burning and computer readable recording media containing the same
Hughes IEEE standards for encrypted storage
JPH05233460A (en) File protection system
JP6778033B2 (en) Take-out file simple encryption system and take-out file simple encryption program