TWI400616B - Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class - Google Patents

Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class Download PDF

Info

Publication number
TWI400616B
TWI400616B TW98128273A TW98128273A TWI400616B TW I400616 B TWI400616 B TW I400616B TW 98128273 A TW98128273 A TW 98128273A TW 98128273 A TW98128273 A TW 98128273A TW I400616 B TWI400616 B TW I400616B
Authority
TW
Taiwan
Prior art keywords
file
data
password
human
interface device
Prior art date
Application number
TW98128273A
Other languages
Chinese (zh)
Other versions
TW201107987A (en
Inventor
Ching Yang Wu
Chia Feng Lee
Sheng Chou Lin
Original Assignee
Delta Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Delta Electronics Inc filed Critical Delta Electronics Inc
Priority to TW98128273A priority Critical patent/TWI400616B/en
Publication of TW201107987A publication Critical patent/TW201107987A/en
Application granted granted Critical
Publication of TWI400616B publication Critical patent/TWI400616B/en

Links

Description

人機介面裝置以大量儲存等級協定實現之資料傳輸及防拷方法Data transmission and copy protection method implemented by human-machine interface device with a large number of storage level agreements

本發明係有關於人機介面裝置,尤其更有關於應用於人機介面裝置的資料防拷方法。The invention relates to a human-machine interface device, and more particularly to a data copy-proof method applied to a human-machine interface device.

人機介面(Human Machine Interface,HMI)裝置,或稱為HID(Human-machine Interface Device),是操作者和機器間進行訊息交換、溝通與互動之中間媒介。操作者係透過人機介面裝置上之控制按鍵或視窗面板上之觸控圖像,完成指令之輸入,使該些機器對操作者輸入之指令產生對應之動作,藉以提高操作者於機器操作上之便利性與實用性。故,人機介面裝置不但使得工業自動化控制在執行上更為方便,甚至已漸漸完全取代傳統需要大量配線的控制盤面。The Human Machine Interface (HMI) device, or HID (Human-machine Interface Device), is an intermediary between the operator and the machine for information exchange, communication and interaction. The operator completes the input of the commands through the control buttons on the human interface device or the touch images on the window panel, so that the machines generate corresponding actions for the commands input by the operator, thereby improving the operator's operation on the machine. Convenience and practicality. Therefore, the human-machine interface device not only makes industrial automation control more convenient to implement, but has even completely replaced the traditional control panel that requires a lot of wiring.

如第一圖所示,一人機介面裝置1主要係連接至一可程式化邏輯控制器2(Programmable Logic Controller,PLC),透過該可程式化邏輯控制器2對複數之外部機器3發出控制命令,並且接收該些機器3所回報之工作資料。目前市面上常見之該人機介面裝置1,主要係透過其內部所附屬之控制軟體,顯示在外部之觸控式液晶顯示器(Liquid Crystal Display,LCD)上,使操作者得以用簡單之觸控動作,即對該些機器3發出操作指令,並依該些機器3所進行之工作,取得相對應之工作資料。而為因應工業技術之發展速度,該些軟體係需定期下載更新版本,以便保持該人機介面裝置1的最佳狀態。再者,該些由人機介面裝置1所取得之工作資料,亦需定期上傳,以利操作者作進一步的記錄與保存。As shown in the first figure, a human interface device 1 is mainly connected to a Programmable Logic Controller (PLC) through which a control command is issued to a plurality of external machines 3. And receiving the work materials reported by the machines 3. The human-machine interface device 1 commonly used in the market is mainly displayed on an external touch-type liquid crystal display (LCD) through its internal control software, so that the operator can use simple touch. The action is to issue an operation command to the machines 3, and according to the work performed by the machines 3, the corresponding work data is obtained. In order to cope with the development speed of industrial technology, the soft systems need to periodically download updated versions in order to maintain the optimal state of the human interface device 1. Furthermore, the work materials obtained by the human-machine interface device 1 need to be uploaded regularly for further recording and storage by the operator.

唯,如第一圖所示,該人機介面裝置1係需透過與一外部電腦4之連接,進行資料之下載或上傳,且所連接之該電腦4,係需要安裝由該人機介面裝置1所屬廠商所製造之驅動程式。然而,在資訊發展迅速之際,電腦作業系統(Operating System,OS)之更新速度飛快,種類亦相當多元。因此,在與該電腦4連接時,常常發生該人機介面裝置1與所連接該電腦4之作業系統不相容,導致驅動程式不支援之窘境,致使該人機介面裝置1無法順利與該電腦4互相連接,進而無法傳輸資料。如此一來,該人機介面裝置1所屬之廠商即需針對各種不同之作業系統,開發相對應之驅動程式,實需耗費相當程度之成本及時間。For example, as shown in the first figure, the human interface device 1 needs to be connected to an external computer 4 to download or upload data, and the connected computer 4 needs to be installed by the human interface device. 1 Drivers manufactured by the manufacturer. However, as information is rapidly evolving, the operating system (OS) is rapidly updated and the variety is quite diverse. Therefore, when the computer 4 is connected to the computer 4, the operating system of the human-machine interface device 1 is incompatible with the operating system connected to the computer 4, which causes the driver to be unsupported, so that the human-machine interface device 1 cannot be smoothly The computers 4 are connected to each other, and thus the data cannot be transmitted. In this way, the manufacturer of the human interface device 1 needs to develop a corresponding driver for various operating systems, which requires a considerable amount of cost and time.

而除了上述直接連接之方式外,目前市面上有部份人機介面裝置可支援使用外接之隨身碟(USB Flash Disk,UFD)來做為資料之傳輸媒介,藉以交換人機介面裝置與電腦間之資料。唯,現今病毒當道,難保重要資料在傳輸過程遭到病毒的感染,甚至可能因而受到駭客之攻擊,致使資料遭到盜用,造成之缺憾實為業者所無法漠視。In addition to the above-mentioned direct connection method, some human-machine interface devices on the market can support the use of an external USB flash disk (UFD) as a transmission medium for data exchange between the human-machine interface device and the computer. Information. Only nowadays, when the virus is in the right way, it is difficult to ensure that important data is infected by viruses during the transmission process, and may even be attacked by hackers, resulting in the misappropriation of data, and the resulting defects are indivisible to the industry.

有鑑於上述缺失,市場上實需提供一種新穎之資料傳輸方式,令人機介面裝置在進行資料傳輸時,不但不需考慮系統相容性之問題,更重要的是不會受到有心人士的盜用,令開發廠商遭受莫大的損失。In view of the above-mentioned shortcomings, there is a need in the market to provide a novel means of data transmission. In the case of data transmission, the machine interface device does not need to consider the problem of system compatibility, and more importantly, it will not be stolen by interested people. , the developers suffered great losses.

本發明之主要目的,在於提供一種人機介面裝置以大量儲存等級協定實現之資料傳輸及防拷方法,係透過大量儲存等級協定來使人機介面裝置與外部電腦作連接,因而不需於外部電腦上安裝人機介面裝置之驅動程式,並透過大量儲存等級協定之規則來建構互相傳輸資料時之保護機制,令資料不致被第三人所窺見並加以竊取。The main purpose of the present invention is to provide a data transmission and copy-protection method for a human-machine interface device implemented by a large number of storage level agreements. The human-machine interface device is connected to an external computer through a large number of storage level agreements, and thus does not need to be external. The driver of the human-machine interface device is installed on the computer, and the protection mechanism for transmitting data to each other is constructed through a large number of rules for storing the level agreement, so that the data is not sneaked and stolen by the third party.

為達上述目的,本發明係將人機介面裝置透過大量儲存等級協定當作一外接式USB儲存裝置來與電腦作連接,令電腦不會因為所使用之作業系統與人機介面裝置不相支援而須重新安裝驅動程式,而於資料傳輸時,則係透過動態密碼對所傳輸之資料加密,並且不實際將資料寫入檔案配置表中。In order to achieve the above object, the present invention connects a human-machine interface device to a computer through a large-scale storage level agreement as an external USB storage device, so that the computer does not support the operating system and the human-machine interface device. The driver must be reinstalled, and when the data is transmitted, the transmitted data is encrypted by the dynamic password, and the data is not actually written into the file configuration table.

本發明對照先前技術所能產生之功效在於,人機介面裝置與外部電腦連接時,不需擔心電腦之作業系統不受人機介面裝置之驅動程式支援的問題,並且於進行資料傳輸時,亦沒有遭第三人窺見及竊取之風險。The effect of the present invention over the prior art is that when the human-machine interface device is connected to an external computer, there is no need to worry that the operating system of the computer is not supported by the driver of the human-machine interface device, and when data transmission is performed, There is no risk of being sneaked and stolen by a third person.

茲就本發明之一較佳實施例,配合圖式,詳細說明如後。DETAILED DESCRIPTION OF THE INVENTION A preferred embodiment of the present invention will be described in detail with reference to the drawings.

首請參閱第二圖,為本發明之一較佳具體實施例之傳輸連接示意圖。如圖所示,本發明之一人機介面裝置5(Human-machine Interface Device,HID),係透過一通用序列匯流排(Universal Serial Bus,USB)連接埠51或52,與一外部電腦4’互相連接。本發明主要係透過使用USB的大量儲存等級(Mass Storage Class,MSC)協定來定義該HID 5,藉以將該HID 5模擬成一外接式之USB儲存裝置5’(例如第三圖中之外接式磁碟機)。如此一來,透過USB的MSC協定,該HID 5即具備隨插即用之效果,故該電腦4’不需安裝該HID 5廠商所開發之驅動程式,即可隨時與該HID 5進行連接。Referring first to the second figure, a schematic diagram of a transmission connection according to a preferred embodiment of the present invention is shown. As shown in the figure, a human-machine interface device (HID) of the present invention is connected to an external computer 4' via a universal serial bus (USB) port 51 or 52. connection. The present invention mainly defines the HID 5 by using a USB Mass Storage Class (MSC) protocol, thereby emulating the HID 5 into an external USB storage device 5' (for example, external magnetic in the third figure). Dish machine). In this way, the HID 5 has the effect of plug and play through the USB MSC protocol, so the computer 4' can be connected to the HID 5 at any time without installing the driver developed by the HID 5 manufacturer.

當該HID 5與該電腦4’互相連接時,該電腦4’係會發出詢問命令,詢問所連接之裝置為何,該HID 5則以USB的MSC協定回應該電腦4’。本發明所屬技術領域中具有通常知識者皆知,該些回應中係包括一般使用MSC協定之磁碟機的檔案系統(File System,F/S)所應有的結構,例如主引導記錄(Master Boot Record,MBR)及檔案配置表(File Allocation Table,FAT)等資訊。而該電腦4’一旦收到該些回應,即認為與其相連接之該HID 5,係為一使用MSC協定之USB儲存裝置5’,並配置予該HID 5一個磁碟序號,例如「D:\」或「E:\」等。然而,本發明之該HID 5,係於原廠出產時即設定,在跟該電腦4’連接時,只有使用安裝於該電腦4’中之一資料傳輸軟體41(主要係為廠商所開發之資料傳輸軟體41),與該HID 5傳輸一HID相關檔案(例如HID之更新檔案,或HID之工作記錄檔案等)時,才能成功動作。因此,若不使用該軟體41與該HID 5進行資料傳輸,或者傳輸與該HID 5不相關之檔案時,皆無法對該HID 5進行存取之動作。When the HID 5 is connected to the computer 4', the computer 4' issues an inquiry command asking for the connected device, and the HID 5 is returned to the computer 4' by the USB MSC protocol. It is well known in the art to which the present invention pertains, including the structure of a file system (F/S) of a disk drive generally using an MSC protocol, such as a master boot record (Master). Boot Record, MBR) and File Allocation Table (FAT) and other information. When the computer 4' receives the response, the HID 5 connected to the computer is considered to be a USB storage device 5' using the MSC protocol, and is configured to give the HID 5 a disk serial number, for example, "D: \" or "E:\" and so on. However, the HID 5 of the present invention is set at the time of production of the original factory, and when connected to the computer 4', only one of the data transmission software 41 installed in the computer 4' is used (mainly developed by the manufacturer). The data transmission software 41) can successfully operate when the HID 5 transmits an HID-related file (for example, an HID update file or a HID work record file). Therefore, if the software 41 is not used for data transmission with the HID 5, or when a file not associated with the HID 5 is transmitted, the HID 5 cannot be accessed.

如第三圖所示,該電腦4’係將本發明之該HID 5當作該外接之儲存裝置5’來使用。該儲存裝置5’之主要動作,係透過一檔案系統53,將儲存於該儲存裝置5’內之檔案的檔名對應至一特定之FAT 54上。接著,再經由該FAT 54之內容,對應至該些檔案55儲存於該儲存裝置5’內之實體位址,進而令該電腦4’得以進行新增、修改、刪除等動作。因而,一般使用者在該電腦4’上,之所以能夠看到該儲存裝置5’之內容,係皆透過該FAT 54之對應。若該些檔案55確實儲存於該儲存裝置5’內,但該FAT 54中卻沒有被寫入相對應之資料的話,使用者即無法得知,也無法於該電腦4’上看到該些檔案55。而本發明即透過上述MSC協定所使用之特性,進行資料傳輸之保護,詳細說明如下。As shown in the third figure, the computer 4' uses the HID 5 of the present invention as the external storage device 5'. The main operation of the storage device 5' is to transmit the file name of the file stored in the storage device 5' to a specific FAT 54 via a file system 53. Then, the contents of the FAT 54 are used to correspond to the physical addresses stored in the storage device 5' by the files 55, thereby enabling the computer 4' to perform operations such as adding, modifying, and deleting. Therefore, the general user can see the contents of the storage device 5' on the computer 4' through the correspondence of the FAT 54. If the files 55 are actually stored in the storage device 5', but the FAT 54 is not written with the corresponding data, the user cannot know and cannot see the computer 4'. File 55. However, the present invention protects data transmission through the characteristics used in the MSC protocol described above, and is described in detail below.

參閱第四圖,為本發明之一較佳具體實施例之檔案傳輸流程圖。首先,係透過該電腦4’內所安裝之該資料傳輸軟體41,傳輸一內容包含一動態密碼之密碼檔案至該HID 5,並對該HID 5發出一個請求命令(步驟S40)。而該HID 5於接收到該密碼檔案後,雖然有順利接收該密碼檔案,但並不將該密碼檔案之對應資料寫入該FAT 54中,因此,該電腦4’係無法從該儲存裝置5’內容中看到該密碼檔案。藉此,第三人即無法透過該電腦4’得知、查看或竊取該密碼檔案,因而無法得到該動態密碼。其中,該動態密碼係可藉由該電腦4’與該HID 5之搭配而產生,例如,該電腦4’係可取得該HID 5之序號,藉由一運算式(例如一雜湊函數)產生一動態密碼;而該HID 5本身亦知自身之序號,因而可以使用同一該運算式,產生同一該動態密碼來對所上傳/下載之檔案進行加/解密。唯此僅為一較佳實例,不應以此為限。接著,該HID 5判斷該電腦4’所發出之該請求命令為何(步驟S42),即,判斷將進行檔案之下載或檔案之上傳。Referring to the fourth figure, a flow chart of file transmission according to a preferred embodiment of the present invention is shown. First, a data file containing a dynamic password is transmitted to the HID 5 through the data transfer software 41 installed in the computer 4', and a request command is issued to the HID 5 (step S40). After the HID 5 receives the password file, although the password file is successfully received, the corresponding data of the password file is not written into the FAT 54. Therefore, the computer 4' cannot be accessed from the storage device 5. 'The password file is seen in the content. Thereby, the third person cannot know, view or steal the password file through the computer 4', and thus the dynamic password cannot be obtained. The dynamic password can be generated by the combination of the computer 4' and the HID 5. For example, the computer 4' can obtain the serial number of the HID 5, and generate an expression by an arithmetic expression (for example, a hash function). The dynamic password; and the HID 5 itself also knows its own serial number, so the same arithmetic expression can be used to generate the same dynamic password to encrypt/decrypt the uploaded/downloaded file. This is only a preferred example and should not be limited to this. Next, the HID 5 judges the request command issued by the computer 4' (step S42), i.e., determines that the file download or file upload will be performed.

而步驟S42之後,該電腦4’即透過該軟體41,與該HID 5進行檔案傳輸(步驟S44)。若於該步驟S42中,該請求命令係為一檔案下載請求,則此時該HID 5會接收到由該電腦4’所傳來之一資料下載檔案,且該資料下載檔案係由該動態密碼所加密。而該HID 5於實際接收到該資料下載檔案之後,並不寫入該FAT 54中。因此,該電腦4’無法從該儲存裝置5’內容中,看到該資料下載檔案;而若於該步驟S42中,該請求命令為一檔案上傳請求時,該HID 5即將原本已存在該HID 5中之一資料上傳檔案之對應資料寫入該FAT 54中,令該電腦4’可於該儲存裝置5’內容中看到該資料上傳檔案,進而能夠藉由該軟體41,將該資料上傳檔案複製至該電腦4’中,完成上傳動作。其中,該資料上傳檔案係以該動態密碼加密。而該HID 5並於上傳動作完成後,立刻將該資料上傳檔案從該FAT 54中刪除,令第三人無法另外複製該上傳檔案。最後,於檔案傳輸完成之後,該HID 5或該電腦4’,即可使用所產生之該動態密碼,透過該運算式,為所下載或上傳之該檔案解密(步驟S46),進而得到所需之資料,並進行後續之運用。After the step S42, the computer 4' transmits the file to the HID 5 via the software 41 (step S44). If the request command is a file download request in the step S42, the HID 5 will receive a data download file sent by the computer 4', and the data download file is the dynamic password. Encrypted. The HID 5 is not written into the FAT 54 after actually receiving the data download file. Therefore, the computer 4' cannot see the data download file from the content of the storage device 5'; and if the request command is a file upload request in the step S42, the HID 5 will already have the HID already existed. The corresponding data of one of the data uploading files is written in the FAT 54, so that the computer 4' can see the data uploading file in the content of the storage device 5', and the software can be uploaded by the software 41. The file is copied to the computer 4' to complete the uploading action. The data upload file is encrypted by the dynamic password. The HID 5 deletes the data upload file from the FAT 54 immediately after the uploading operation is completed, so that the third person cannot copy the uploaded file separately. Finally, after the file transfer is completed, the HID 5 or the computer 4' can use the generated dynamic password to decrypt the downloaded or uploaded file through the calculation formula (step S46), thereby obtaining the required The information and subsequent use.

而在上述判斷請求命令之步驟S42中,係可使用該密碼檔案之檔名來確認請求之命令為何,例如於步驟S40中,係可將該密碼檔案之檔名命名為「Download.dat」,則該HID 5即可於接收後,立刻得知該電腦4’欲透過該軟體41所進行之動作為檔案之下載;而若將該密碼檔案之檔名命名為「Upload.dat」,即可得知該電腦4’欲進行之動作為檔案之上傳。但此僅為一較佳具體實例,本發明所屬技術領域中具有通常知識者皆知,檔案檔名之制定,係可視程式設計者而定,除了不可使用某些特殊符號以外,並沒有固定之制定規則,不該因而限制本發明之專利範圍。In the step S42 of determining the request command, the file name of the password file can be used to confirm the command of the request. For example, in step S40, the file name of the password file can be named "Download.dat". After receiving the HID 5, the HID 5 can immediately know that the action that the computer 4' wants to perform through the software 41 is the download of the file; and if the file name of the password file is named "Upload.dat", It is known that the action that the computer 4' wants to perform is the upload of the file. However, this is only a preferred embodiment. It is well known in the art to which the present invention pertains. The definition of an archive file name is determined by the visual programmer, and is not fixed except that certain special symbols cannot be used. The rules are set forth and should not limit the scope of the invention.

第四圖中之檔案流程,係可更進一步地分為檔案下載與檔案上傳之流程圖,加以做更詳盡的說明。如第五圖所示,即為本發明之一較佳具體實施例之檔案下載流程圖。首先,該電腦4,透過所安裝之該軟體41,傳輸一內容包含該動態密碼之下載密碼檔案至該HID 5(步驟S50)。該HID 5接收到該下載密碼檔案後,不寫入該FAT 54中,該電腦4’無法從該儲存裝置5’內容中得知該下載密碼檔案是否傳輸成功,第三人亦無從取得該下載密碼檔案。而接著,若確定該下載密碼檔案中之該動態密碼正確,則該HID 5係需回覆該電腦4’已收到下載密碼檔案,並在等待檔案下載動作之訊息。即,於該FAT 54中寫入一密碼確認檔案(步驟S52),且令該密碼確認檔案之檔名具有回覆提示效果,例如可為「get.dat」或「wait.dat」等。使該密碼確認檔案出現在該電腦4’上之該儲存裝置5’內容中,而該電腦4’透過該軟體41看到該密碼確認檔案後,即可認定該下載密碼檔案已傳輸成功,故可進行下一步驟之資料傳輸。The file flow in the fourth picture can be further divided into a flow chart of file downloading and file uploading, which will be explained in more detail. As shown in the fifth figure, it is a file downloading flowchart of a preferred embodiment of the present invention. First, the computer 4 transmits a download password file containing the dynamic password to the HID 5 through the installed software 41 (step S50). After receiving the downloaded password file, the HID 5 does not write to the FAT 54. The computer 4' cannot know from the content of the storage device 5' whether the download password file is successfully transmitted, and the third party cannot obtain the download. Password file. Then, if it is determined that the dynamic password in the downloaded password file is correct, the HID 5 system needs to reply to the message that the computer 4' has received the download password file and is waiting for the file download action. That is, a password confirmation file is written in the FAT 54 (step S52), and the file name of the password confirmation file has a reply prompt effect, for example, "get.dat" or "wait.dat". The password confirmation file is displayed in the storage device 5' content on the computer 4', and the computer 4' sees the password confirmation file through the software 41, and then the download password file is successfully transmitted, so Data transfer in the next step can be performed.

步驟S52之後,該電腦4’即透過該軟體41傳輸一資料下載檔案至該HID 5(步驟S54),該HID 5於接收後,為防止被第三人所竊取,因此仍然不於該FAT 54中寫入。其中該資料下載檔案,係經該電腦4’以該動態密碼加密。而係如同該步驟S52一般,於確實接收該資料下載檔案之後,在該FAT 54中寫入一資料確認檔案(步驟S56),且令該資料確認檔案之檔名具有回覆提示效果,例如可為「down.dat」或「ok.dat」等。該電腦4’於該儲存裝置5’內容中查得該資料確認檔案後,即可認定該資料下載檔案已傳輸完成。最後,該HID 5即可使用該下載密碼檔案中之該動態密碼,透過該運算式,解密該資料下載檔案(步驟S58)並加以應用。其中,該密碼確認檔案及該資料確認檔案,目的僅在於回覆該電腦4’,該HID 5已確實收到檔案之訊息,故該二檔案本身不需具備任何實質意義或內容,因此將該二檔案寫入FAT 54中,即使被第三人所竊取,對資料之傳輸亦不會造成任何的傷害。After the step S52, the computer 4' transmits a data download file to the HID 5 through the software 41 (step S54). After receiving the HID 5, the HID 5 is still not in the FAT 54 to prevent the third person from stealing. Written in. The data download file is encrypted by the computer 4' with the dynamic password. As in the step S52, after the data download file is actually received, a data confirmation file is written in the FAT 54 (step S56), and the file name of the data confirmation file has a reply prompt effect, for example, "down.dat" or "ok.dat". After the computer 4' finds the data confirmation file in the content of the storage device 5', it can be determined that the data download file has been transferred. Finally, the HID 5 can use the dynamic password in the download password file, and decrypt the data download file (step S58) through the operation formula and apply it. The password confirmation file and the data confirmation file are only for replying to the computer 4', and the HID 5 has indeed received the message of the file, so the second file itself does not need to have any substantial meaning or content, so the second The file is written in FAT 54, even if it is stolen by a third person, it will not cause any harm to the transmission of the data.

接續請參閱第六圖,為本發明之一較佳具體實施例之檔案上傳流程圖。首先如同第五圖中之該步驟S50,該電腦4’透過所安裝之該軟體41,傳輸一內容包括該動態密碼之上傳密碼檔案至該HID 5(步驟S60)。接著,當該HID 5接收到該上傳密碼檔案時,即可確認該電腦4’欲透過該軟體41進行檔案上傳之動作。故於確認該上傳密碼檔案中之該動態密碼正確後,該HID 5即將該電腦4’欲取得之一資料上傳檔案寫入該FAT 54中(步驟S62)。其中該資料上傳檔案係經該HID 5以該動態密碼加密,且早已存在於該HID 5中,但並沒有於該FAT 54中寫入。故該電腦4’於該步驟S62前,並無法從該儲存裝置5’內容看到該資料上傳檔案。而當步驟S62結束後,該電腦4’即可於該儲存裝置5’內容中看到該資料上傳檔案,進而得以透過該軟體41,將該資料上傳檔案複製至該電腦4’中。Please refer to the sixth figure for a file uploading flowchart according to a preferred embodiment of the present invention. First, as in step S50 of the fifth figure, the computer 4' transmits, via the installed software 41, a content including the dynamic password upload password file to the HID 5 (step S60). Then, when the HID 5 receives the upload password file, it can confirm that the computer 4' wants to upload the file through the software 41. Therefore, after confirming that the dynamic password in the uploaded password file is correct, the HID 5 writes a file upload file of the computer 4' to be written into the FAT 54 (step S62). The data upload file is encrypted by the HID 5 with the dynamic password, and already exists in the HID 5, but is not written in the FAT 54. Therefore, the computer 4' cannot see the data upload file from the content of the storage device 5' before the step S62. When the step S62 is finished, the computer 4' can see the data upload file in the content of the storage device 5', and then copy the data upload file to the computer 4' through the software 41.

值得一提的是,於複製該資料上傳檔案時,該HID 5係可配合該軟體41啟動一防拷機制,藉以判斷該電腦4’之複製動作是否正確(步驟S64)。若判斷該電腦4’之複製動作正確,則該HID 5允許該電腦4’透過該軟體41複製該資料上傳檔案(步驟S66)。並於複製完成後,將該資料上傳檔案從該FAT 54中刪除(步驟S68)。而若於該步驟S64中,判斷複製之動作不正確,或非經該軟體41所進行之,則不允許該資料上傳檔案被複製。係直接進行該步驟S68,立刻於該FAT 54中刪除該資料上傳檔案。最後,該HID 5即可使用該上傳密碼檔案中之該動態密碼,透過該運算式,解密該資料上傳檔案(步驟S70)並加以應用。It is worth mentioning that, when copying the data upload file, the HID 5 can cooperate with the software 41 to initiate a copy protection mechanism to determine whether the copying operation of the computer 4' is correct (step S64). If it is judged that the copying operation of the computer 4' is correct, the HID 5 allows the computer 4' to copy the material upload file via the software 41 (step S66). And after the copying is completed, the material upload file is deleted from the FAT 54 (step S68). If it is determined in the step S64 that the copying operation is incorrect or not performed by the software 41, the data upload file is not allowed to be copied. The step S68 is directly performed, and the data upload file is deleted in the FAT 54 immediately. Finally, the HID 5 can use the dynamic password in the uploaded password file, and decrypt the data upload file through the operation formula (step S70) and apply it.

上述之防拷機制,即如第七圖中所示者,係為本發明之一較佳具體實施例之防拷機制示意圖。當該HID 5將該資料上傳檔案寫入該FAT 54中,令該資料上傳檔案於該儲存裝置5’內容顯示時,係透過該動態密碼及該運算式,以亂數產生複數替代檔案,並將該複數替代檔案及該資料上傳檔案皆修改為具有如第七圖中所示之「AEJAE4GHA.dat」或「1R5JGH6FB.dat」等無意義之亂數檔名。而該電腦4’於該儲存裝置5’內容看到該些檔案後,係可透過相同之該動態密碼及該運算式,計算出該資料上傳檔案之正確檔名為何,並加以進行正確之複製動作。因此,當檔名錯誤之該替代檔案被要求複製時,該HID 5即認定為有第三人在嘗試抓取檔案,因此立即將所有檔案從該FAT 54中刪除。如此一來,即可杜絕第三人竊取資料。而即使恰巧被第三人猜中正確之檔案為何並被成功複製,但仍需要透過該動態密碼及該運算式之計算,才可正確對偽裝成無意義檔名之該資料上傳檔案進行解密動作,因此仍然具有高度之防拷效果。The above-mentioned copy protection mechanism, as shown in the seventh figure, is a schematic diagram of the copy protection mechanism of a preferred embodiment of the present invention. When the HID 5 writes the data upload file into the FAT 54 and causes the data upload file to be displayed on the storage device 5', the dynamic password and the calculation formula are used to generate a plurality of substitute files in random numbers, and The plural substitute file and the data upload file are all modified to have meaningless random file names such as "AEJAE4GHA.dat" or "1R5JGH6FB.dat" as shown in the seventh figure. After the computer 4' sees the files in the storage device 5', the same file name and the calculation formula are used to calculate the correct file name of the data upload file, and the correct file name is copied. action. Therefore, when the alternate file with the wrong file name is required to be copied, the HID 5 is deemed to have a third person attempting to capture the file, so all files are immediately deleted from the FAT 54. In this way, the third person can be prevented from stealing information. Even if it happens that the third person guessed the correct file and successfully copied it, it still needs to use the dynamic password and the calculation of the calculation formula to correctly decrypt the data upload file disguised as a meaningless file name. Therefore, it still has a high degree of copy protection.

以上所述僅為本發明之較佳具體實例,非因此即侷限本發明之專利範圍,故舉凡運用本發明內容所為之等效變化,均同理皆包含於本發明之範圍內,合予陳明。The above is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Therefore, equivalent changes to the scope of the present invention are included in the scope of the present invention. Bright.

<習知><知知>

1...人機介面裝置1. . . Human-machine interface device

2...可程式化邏輯控制器2. . . Programmable logic controller

3...外部機器3. . . External machine

4...電腦4. . . computer

<本發明><present invention>

4’...外部電腦4’. . . External computer

41...資料傳輸軟體41. . . Data transmission software

5...人機介面裝置5. . . Human-machine interface device

5’...儲存裝置5’. . . Storage device

51、52...USB連接埠51, 52. . . USB port埠

53...檔案系統53. . . File system

54...檔案配置表54. . . File configuration table

55...檔案55. . . file

S40~S46、S50~S58、S60~S70...步驟S40~S46, S50~S58, S60~S70. . . step

第一圖 係人機介面裝置之使用連接示意圖。The first figure is a schematic diagram of the connection of the human-machine interface device.

第二圖 係人機介面裝置之傳輸連接示意圖。The second figure is a schematic diagram of the transmission connection of the human-machine interface device.

第三圖 係使用大量儲存等級協定之儲存裝置示意圖。The third diagram is a schematic diagram of a storage device using a large number of storage level agreements.

第四圖 係本發明之一較佳具體實施例之檔案傳輸流程圖。The fourth figure is a flow chart of file transmission according to a preferred embodiment of the present invention.

第五圖 係本發明之一較佳具體實施例之檔案下載流程圖。Figure 5 is a flow chart showing the download of a preferred embodiment of the present invention.

第六圖 係本發明之一較佳具體實施例之檔案上傳流程圖。Figure 6 is a flow chart showing the uploading of a preferred embodiment of the present invention.

第七圖 係本發明之一較佳具體實施例之防拷機制示意圖。Figure 7 is a schematic diagram of a copy protection mechanism of a preferred embodiment of the present invention.

S40~S46...步驟S40~S46. . . step

Claims (18)

一種人機介面裝置以大量儲存等級協定實現之資料傳輸及防拷方法,係以通用序列匯流排(Universal Serial Bus,USB)的大量儲存等級(Mass Storage Class,MSC)協定將該人機介面裝置模擬為一USB儲存裝置並與一外部電腦進行資料傳輸,該方法包括:a)該人機介面裝置接收傳輸過來之一密碼檔案,其中該密碼檔案具有一檔名,並且該密碼檔案的內容記錄有一動態密碼;b)該人機介面裝置通過該密碼檔案的該檔名,判斷該外部電腦的一請求命令為何;c)依該請求命令進行一資料檔案之傳輸;d)步驟c後,以該密碼檔案中記載之該動態密碼解密該資料檔案;其中,該人機介面裝置係不將所接收之該密碼檔案寫入一檔案配置表(File Allocation Table,FAT)中,藉以令該外部電腦無法得知該密碼檔案之存在。 A human-machine interface device implements data transmission and copy-protection methods by a large number of storage level agreements, and the human-machine interface device is implemented by a Mass Serial Class (MSC) protocol of a Universal Serial Bus (USB). Simulating a USB storage device and transmitting data with an external computer, the method comprising: a) the human interface device receiving a password file transmitted, wherein the password file has a file name, and the content record of the password file There is a dynamic password; b) the human interface device determines the request command of the external computer through the file name of the password file; c) transmits a data file according to the request command; d) after step c, The dynamic password recorded in the password file decrypts the data file; wherein the human interface device does not write the received password file into a File Allocation Table (FAT), so as to make the external computer Unable to know the existence of the password file. 如申請專利範圍第1項所述之資料傳輸及防拷方法,若該步驟b中判斷該請求命令係為一檔案下載請求,則該步驟c中,係由該人機介面裝置接收該外部電腦傳輸過來之一由該動態密碼加密之資料下載檔案。 For example, in the data transmission and copy protection method described in claim 1, if the request command in step b is a file download request, in step c, the external computer is received by the human interface device. One of the transmitted files is encrypted by the dynamic password. 如申請專利範圍第2項所述之資料傳輸及防拷方法,其中該人機介面裝置接收該資料下載檔案後,並不寫入該檔案配置表中,藉以令該外部電腦無法得知該資料下 載檔案之存在。 For example, in the data transmission and copy-protection method described in claim 2, the human-machine interface device does not write the file to the file configuration table after receiving the data download file, so that the external computer cannot know the data. under The existence of the file. 如申請專利範圍第1項所述之資料傳輸及防拷方法,若該步驟b中判斷該請求命令係為一檔案上傳請求,則該步驟c係包括:c1)該人機介面裝置將其內部所儲存之一由該動態密碼加密之資料上傳檔案,寫入該檔案配置表中,藉以令該外部電腦得知該資料上傳檔案之存在;c2)步驟c1後,當複製動作正確時,該人機介面裝置允許該資料上傳檔案被複製;c3)步驟c2後,該人機介面刪除該資料上傳檔案。 For example, in the data transmission and copy-protection method described in claim 1, if the request command in step b is a file upload request, the step c includes: c1) the human-machine interface device has its internal One of the stored data encrypted by the dynamic password is uploaded into the file configuration table, so that the external computer knows the existence of the data upload file; c2) after step c1, when the copying action is correct, the person The machine interface device allows the data upload file to be copied; c3) After step c2, the human machine interface deletes the data upload file. 如申請專利範圍第4項所述之資料傳輸及防拷方法,其中該步驟c1中,係透過一防拷機制處理後,再將該資料上傳檔案寫入該資料配置表中,包括:c11)依該密碼檔案中記載之該動態密碼,透過一運算式,產生該資料上傳檔案之亂數檔名;c12)依該密碼檔案中記載之該動態密碼,透過一運算式,產生複數替代檔案,其中該複數替代檔案具有亂數檔名;c13)將該資料上傳檔案及該複數替代檔案共同寫入該檔案配置表中。 For example, in the data transmission and copy-protection method described in claim 4, in the step c1, after processing through a copy-protection mechanism, the data upload file is written into the data configuration table, including: c11) According to the dynamic password recorded in the password file, a random file name of the data upload file is generated through an arithmetic formula; c12) according to the dynamic password recorded in the password file, a plurality of substitute files are generated through an operation formula. Wherein the plural substitute file has a random file name; c13) the data upload file and the plural substitute file are jointly written in the file configuration table. 如申請專利範圍第5項所述之資料傳輸及防拷方法,其中該步驟c2中,係於該複數替代檔案被要求複製時,視為複製動作不正確。 For example, in the data transmission and copy-protection method described in claim 5, in the step c2, when the plural substitute file is required to be copied, the copying operation is deemed to be incorrect. 如申請專利範圍第6項所述之資料傳輸及防拷方 法,其中該步驟c3中,係於該資料上傳檔案被複製一次後,或複製動作不正確時,將該資料上傳檔案從該檔案配置表中刪除。 Such as the data transmission and copy protection mentioned in the scope of patent application The method, wherein in the step c3, after the data upload file is copied once, or when the copying action is incorrect, the data upload file is deleted from the file configuration table. 如申請專利範圍第5項所述之資料傳輸及防拷方法,其中該運算式係為一雜湊運算式。 For example, the data transmission and copy protection method described in claim 5, wherein the calculation formula is a hash calculation. 如申請專利範圍第1項所述之資料傳輸及防拷方法,其中該模擬為USB儲存裝置之人機介面裝置,係於使用一人機介面裝置廠商開發之資料傳輸軟體,傳輸一人機介面裝置相關之資料檔案時,才能順利與該外部電腦做資料傳輸。 For example, the data transmission and copy-protection method described in claim 1 wherein the simulation is a human-machine interface device of a USB storage device, which is a data transmission software developed by a manufacturer of a human-machine interface device, and transmits a human-machine interface device. In the case of the data file, the data can be transmitted smoothly with the external computer. 一種人機介面裝置以大量儲存等級協定實現之資料傳輸及防拷方法,係以通用序列匯流排(Universal Serial Bus,USB)的大量儲存等級(Mass Storage Class,MSC)協定將該人機介面裝置模擬為一USB儲存裝置並與一外部電腦進行資料傳輸,該方法包括:a)該人機介面裝置接收傳輸過來之一密碼檔案,其中該密碼檔案具有一檔名,並且該密碼檔案的內容記錄有一動態密碼;b)依據該密碼檔案的該檔名,判斷該密碼檔案為一下載密碼檔案或一上傳密碼檔案;c)若該密碼檔案為一下載密碼檔案,則該人機介面裝置於確認該下載密碼檔案中之該動態密碼正確後,將一密碼確認檔案寫入一檔案配置表(File Allocation Table,FAT)中;d)步驟c後,該人機介面裝置接收傳輸過來之一由該 動態密碼加密之資料下載檔案;e)若該密碼檔案為一上傳密碼檔案,則該人機介面裝置於確認該上傳密碼檔案中之該動態密碼正確後,將一由該動態密碼加密之資料上傳檔案寫入該資料配置表中,藉以令該外部電腦得知該資料上傳檔案之存在;f)步驟e後,當複製動作正確時,該人機介面裝置係允許該資料上傳檔案被複製;g)步驟f後,該人機介面裝置刪除該資料上傳檔案;其中,該人機介面裝置係不將所接收之該密碼檔案及該資料下載檔案寫入該檔案配置表中,藉以令該外部電腦無法得知該密碼檔案及該資料下載檔案之存在。 A human-machine interface device implements data transmission and copy-protection methods by a large number of storage level agreements, and the human-machine interface device is implemented by a Mass Serial Class (MSC) protocol of a Universal Serial Bus (USB). Simulating a USB storage device and transmitting data with an external computer, the method comprising: a) the human interface device receiving a password file transmitted, wherein the password file has a file name, and the content record of the password file There is a dynamic password; b) determining the password file as a download password file or an upload password file according to the file name of the password file; c) if the password file is a download password file, the human-machine interface device confirms After the dynamic password in the downloaded password file is correct, a password confirmation file is written into a File Allocation Table (FAT); d) after the step c, the human interface device receives and transmits one of the passwords. The dynamic password encryption data download file; e) if the password file is an upload password file, the human interface device uploads a data encrypted by the dynamic password after confirming that the dynamic password in the uploaded password file is correct. The file is written in the data configuration table, so that the external computer knows the existence of the data upload file; f) after step e, when the copy operation is correct, the human interface device allows the data upload file to be copied; After the step f, the human interface device deletes the data upload file; wherein the human interface device does not write the received password file and the data download file into the file configuration table, so as to make the external computer The password file and the download file of the data cannot be known. 如申請專利範圍第10項所述之資料傳輸及防拷方法,其中更包括一步驟h)步驟d或步驟f後,以該密碼檔案中記載之該動態密碼,解密該資料下載檔案或該資料上傳檔案。 For example, in the data transmission and copy protection method described in claim 10, the method further includes a step h) step d or step f, and decrypting the data download file or the data by using the dynamic password recorded in the password file. Upload the file. 如申請專利範圍第10項所述之資料傳輸及防拷方法,其中該步驟d,該外部電腦係於該密碼確認檔案出現在該檔案配置表後,將該資料下載檔案傳輸至該人機介面裝置。 For example, in the data transmission and copy-protection method described in claim 10, the external computer sends the data download file to the human-machine interface after the password confirmation file appears in the file configuration table. Device. 如申請專利範圍第12項所述之資料傳輸及防拷方法,其中更包括一步驟i)步驟d後,該人機介面裝置將一資料確認檔案寫入該資料配置表中,藉以回覆該外部電腦已收到該資料下載檔案之訊息。 For example, in the data transmission and copy-protection method described in claim 12, the method further includes a step i), after the step d, the human-machine interface device writes a data confirmation file into the data configuration table, thereby replying to the external The computer has received the message to download the file. 如申請專利範圍第10項所述之資料傳輸及防拷方 法,其中該步驟e中,係透過一防拷機制處理後,再將該資料上傳檔案寫入該資料配置表中,包括:e1)依該密碼檔案中記載之該動態密碼,透過一運算式,產生該資料上傳檔案之亂數檔名;e2)依該密碼檔案中記載之該動態密碼,透過一運算式,產生複數替代檔案,其中該複數替代檔案具有亂數檔名;e3)將該資料上傳檔案及該複數替代檔案共同寫入該檔案配置表中。 Such as the data transmission and copy protection mentioned in the scope of patent application The method, in the step e, is processed by a copy protection mechanism, and then the data upload file is written into the data configuration table, including: e1) according to the dynamic password recorded in the password file, through an arithmetic expression Generating a random file name of the data upload file; e2) generating, by an arithmetic formula, a plurality of substitute files according to the dynamic password recorded in the password file, wherein the plural substitute file has a random file name; e3) The data upload file and the plural substitute file are jointly written in the file configuration table. 如申請專利範圍第14項所述之資料傳輸及防拷方法,其中該步驟f中,係於該複數替代檔案被要求複製時,視為複製動作不正確。 For example, in the data transmission and copy protection method described in claim 14, wherein the step f is regarded as the copying action is incorrect when the plural substitute file is required to be copied. 如申請專利範圍第15項所述之資料傳輸及防拷方法,其中該步驟g中,係於該資料上傳檔案被複製一次後,或複製動作不正確時,將該資料上傳檔案從該檔案配置表中刪除。 For example, in the data transmission and copy-protection method described in claim 15, wherein the step g is performed after the data upload file is copied once, or when the copying operation is incorrect, the data upload file is configured from the file. Deleted in the table. 如申請專利範圍第14項所述之資料傳輸及防拷方法,其中該運算式係為一雜湊運算式。 For example, the data transmission and copy protection method described in claim 14 is wherein the calculation formula is a hash calculation. 如申請專利範圍第10項所述之資料傳輸及防拷方法,其中該模擬為USB儲存裝置之人機介面裝置,係於使用一人機介面裝置廠商開發之資料傳輸軟體,傳輸一人機介面裝置相關之資料檔案時,才能順利與該外部電腦做資料傳輸。For example, the data transmission and copy protection method described in claim 10, wherein the simulation is a human-machine interface device of a USB storage device, which is a data transmission software developed by a manufacturer of a human-machine interface device, and transmits a human-machine interface device. In the case of the data file, the data can be transmitted smoothly with the external computer.
TW98128273A 2009-08-21 2009-08-21 Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class TWI400616B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98128273A TWI400616B (en) 2009-08-21 2009-08-21 Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98128273A TWI400616B (en) 2009-08-21 2009-08-21 Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class

Publications (2)

Publication Number Publication Date
TW201107987A TW201107987A (en) 2011-03-01
TWI400616B true TWI400616B (en) 2013-07-01

Family

ID=44835471

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98128273A TWI400616B (en) 2009-08-21 2009-08-21 Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class

Country Status (1)

Country Link
TW (1) TWI400616B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102759898B (en) * 2011-04-29 2014-07-02 台达电子工业股份有限公司 Man-machine interface device and interface integration method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715455A (en) * 1995-05-18 1998-02-03 International Business Machines Corporation Apparatus and method for storing file allocation table efficiently in memory
US6782402B1 (en) * 1999-05-06 2004-08-24 Seiko Epson Corporation Network management system, computer system, copy server, file server, network copy file management method, and computer readable medium
TW200741500A (en) * 2005-09-08 2007-11-01 Sandisk Corp Mobile memory system for secure storage and delivery of media content
US7526785B1 (en) * 1999-09-25 2009-04-28 Hewlett-Packard Development Company, L.P. Trusted computing platform for restricting use of data
US20090113076A1 (en) * 2007-10-31 2009-04-30 Byron Long Hierarchical file synchronization method, software and devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715455A (en) * 1995-05-18 1998-02-03 International Business Machines Corporation Apparatus and method for storing file allocation table efficiently in memory
US6782402B1 (en) * 1999-05-06 2004-08-24 Seiko Epson Corporation Network management system, computer system, copy server, file server, network copy file management method, and computer readable medium
US7526785B1 (en) * 1999-09-25 2009-04-28 Hewlett-Packard Development Company, L.P. Trusted computing platform for restricting use of data
TW200741500A (en) * 2005-09-08 2007-11-01 Sandisk Corp Mobile memory system for secure storage and delivery of media content
US20090113076A1 (en) * 2007-10-31 2009-04-30 Byron Long Hierarchical file synchronization method, software and devices

Also Published As

Publication number Publication date
TW201107987A (en) 2011-03-01

Similar Documents

Publication Publication Date Title
JP4616956B2 (en) System and method for operating computer files and / or programs
US20060253620A1 (en) Data structure of flash memory having system area with variable size in which data can be updated, USB memory device having the flash memory, and method of controlling the system area
BRPI0615099A2 (en) digital platform migration from first platform to second platform
JP2001256113A (en) Contents processing system and contents protection method
CN113434853B (en) Method for burning firmware to storage device and controller
JP6610639B2 (en) Software management system, software update apparatus, software update method, and software update program
WO2019114451A1 (en) Key writing system and method employing trusted execution environment
WO2006004130B1 (en) Data management method, program thereof, and program recording medium
WO2015131446A1 (en) Method and device for secure access control based on on-chip bus protocol
JP4717398B2 (en) Method for controlling data processing apparatus
WO2017044688A1 (en) Method and apparatus for preventing and investigating software piracy
US9355259B1 (en) Method and apparatus for accessing sensitive information on-demand
JP6751856B2 (en) Information processing equipment and information processing system
JP2008033935A (en) Access control for secure portable storage device
TWI400616B (en) Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class
JP5257899B2 (en) Data transmission and copy guard method realized by mass storage class standard by human-machine interface device
JP2008084081A (en) Leakage prevention system for secret information, leakage prevention method for secret information, recording medium and program
JP4538838B1 (en) Virtual thin client device, virtual thin client system, virtual thin client program, and virtual thin client method
JP6390696B2 (en) License information management apparatus, license information management method, and program
US8479300B2 (en) Method for transmitting data and preventing unauthorized data duplication for human-machine interface device using mass storage class operating on universal serial bus
JP2013105485A (en) Method of accessing computer hardware device in metro user interface mode application
CN102004864B (en) Data transmission and anti-copying method for human-computer interface device by using mass storage levels
JP6203532B2 (en) Semiconductor memory device and data processing system
JP2010191531A (en) Network attached storage apparatus, setting method therefor, and network attached storage setting system
JP7417188B2 (en) Image forming system, image forming device and application control program

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees