TWI582639B - Mobile device and information protection method thereof - Google Patents

Mobile device and information protection method thereof Download PDF

Info

Publication number
TWI582639B
TWI582639B TW102132090A TW102132090A TWI582639B TW I582639 B TWI582639 B TW I582639B TW 102132090 A TW102132090 A TW 102132090A TW 102132090 A TW102132090 A TW 102132090A TW I582639 B TWI582639 B TW I582639B
Authority
TW
Taiwan
Prior art keywords
information
processor
storage
electronic devices
sensor
Prior art date
Application number
TW102132090A
Other languages
Chinese (zh)
Other versions
TW201510765A (en
Inventor
楊惟中
林子圻
張瑞哲
Original Assignee
宏達國際電子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宏達國際電子股份有限公司 filed Critical 宏達國際電子股份有限公司
Priority to TW102132090A priority Critical patent/TWI582639B/en
Publication of TW201510765A publication Critical patent/TW201510765A/en
Application granted granted Critical
Publication of TWI582639B publication Critical patent/TWI582639B/en

Links

Landscapes

  • Telephone Function (AREA)

Description

行動裝置及其資訊保護方法 Mobile device and its information protection method

本發明關於一種行動裝置及其資訊保護方法;特別是關於一種藉由感測而自動保護資訊的行動裝置及其資訊保護方法。 The present invention relates to a mobile device and an information protection method thereof; and more particularly to a mobile device that automatically protects information by sensing and an information protection method thereof.

行動裝置已成為現代人日常生活中不可或缺之隨身物品。隨著現代人對於行動裝置的依賴,儲存於隨身攜帶的行動裝置內的資訊也越來越多,以便使用者可隨時隨地讀取該資訊。然而,倘若行動裝置對於資訊的保護機制不夠完善,一旦儲存於隨身攜帶的行動裝置內的資訊越多,則洩漏的資訊也就越多。 Mobile devices have become an indispensable item in the daily lives of modern people. With modern people's reliance on mobile devices, more and more information is stored in mobile devices that are carried around, so that users can read the information anytime, anywhere. However, if the mobile device's protection mechanism for information is not perfect, the more information stored in the mobile device that is carried around, the more information is leaked.

基於可移動性的本質,行動裝置的資訊安全很容易在無形中受到威脅。舉例而言,當使用者將其行動裝置借給其他人,則在租借期間該使用者的行動裝置內的資訊就有被竊取的可能;或者,當使用者遺失了其行動裝置,則在遺失期間該使用者的行動裝置內的資訊就有被竊取的可能;又或者,當使用者使用其行動裝置時,若周遭同時存在其他人或其他電子裝置,則該使用者的行動裝置內的資訊就有被竊取的可能。 Based on the nature of mobility, the information security of mobile devices can easily be threatened invisibly. For example, when a user lends his mobile device to another person, the information in the user's mobile device may be stolen during the rental period; or, when the user loses his mobile device, the user is lost. During the period, the information in the mobile device of the user may be stolen; or, when the user uses the mobile device, if there are other people or other electronic devices in the vicinity, the information in the mobile device of the user There is a possibility of being stolen.

對於傳統的行動裝置的使用者而言,為了避免資訊的洩露,除了預先針對不想被得知的各項資料進行保護,就只能在察覺資訊有可能被竊取時,儘速針對不想被得知的各項資料進 行保護。然而,前者在使用上欠缺彈性,無法適應地針對各種情況進行資料保護,而後者無法即時針對資料進行保護。換言之,傳統的行動裝置無法為其儲存的資訊提供有效且即時的保護。 For the users of traditional mobile devices, in order to avoid the leakage of information, in addition to pre-protecting the data that you do not want to be known, you can only know that you do not want to be aware when the information is likely to be stolen. Various information Line protection. However, the former lacks flexibility in use and cannot adapt to data protection in various situations, and the latter cannot immediately protect data. In other words, traditional mobile devices cannot provide effective and immediate protection for the information they store.

有鑑於此,如何改善傳統的行動裝置無法為其儲存的資訊提供有效且即時的保護的缺陷,確為本發明所屬技術領域亟需解決的問題。 In view of this, how to improve the defect that the conventional mobile device cannot provide effective and immediate protection for the information stored therein is an urgent problem to be solved in the technical field to which the present invention pertains.

本發明的主要目的是改善傳統的行動裝置無法為其儲存的資訊提供有效且即時的保護的缺陷。為達上述目的,本發明提供一種行動裝置,且該行動裝置包含一感測器、一儲存器及一電性連接到該感測器及該儲存器的該處理器。該感測器用以感測至少一電子裝置。該處理器用以判斷該至少一電子裝置的權限,以及根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態。 The main object of the present invention is to improve the drawbacks that conventional mobile devices cannot provide effective and immediate protection for the information they store. To achieve the above object, the present invention provides a mobile device, and the mobile device includes a sensor, a storage, and a processor electrically connected to the sensor and the storage. The sensor is configured to sense at least one electronic device. The processor is configured to determine the authority of the at least one electronic device, and define a protection status for the at least part of the information stored in the storage according to the permission.

為達上述目的,本發明更提供一種用於一行動裝置的資訊保護方法,其中該行動裝置包含一感測器、一儲存器及一電性連接至該感測器及該儲存器的處理器。該資訊保護方法包含下列步驟:(a)使該感測器感測至少一電子裝置;(b)使該處理器判斷該至少一電子裝置的權限;以及(c)使該處理器根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態。 To achieve the above objective, the present invention further provides an information protection method for a mobile device, wherein the mobile device includes a sensor, a storage, and a processor electrically connected to the sensor and the storage device. . The information protection method comprises the steps of: (a) causing the sensor to sense at least one electronic device; (b) causing the processor to determine the authority of the at least one electronic device; and (c) causing the processor to act according to the authority A protection status is defined for at least a portion of the information stored in the storage.

進一步言之,透過感測器感測週遭是否存在至少一電子裝置(一個或多個),可使本發明的行動裝置即時判斷是否需要對其儲存的資訊進行保護。透過處理器判斷該至少一電子裝置的權限,可使本發明的行動 裝置判斷該至少一電子裝置對其儲存的資訊是否有危害。根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態,可使本發明的行動裝置因應不同的情況,判斷是否對其儲存的資訊進行保護。透過上述運作,本發明之行動裝置及其資訊保護方法將可因應不同的情況,自動且即時地判斷是否需要進行資訊保護,故可改善傳統的行動裝置無法為其儲存的資訊提供有效且即時的保護的缺陷。 Further, detecting whether there is at least one electronic device(s) around the sensor enables the mobile device of the present invention to immediately determine whether it needs to protect the stored information. The action of the present invention can be determined by the processor determining the authority of the at least one electronic device The device determines whether the at least one electronic device is harmful to the information stored thereon. Defining a protection status for at least a part of the information stored in the storage according to the authority enables the mobile device of the present invention to determine whether to protect the stored information according to different situations. Through the above operations, the mobile device and the information protection method thereof of the present invention can automatically and instantly determine whether information protection is needed according to different situations, thereby improving the effective and instant information that the traditional mobile device cannot store for the information stored therein. Defects in protection.

於參閱圖式及隨後描述的實施方式後,本發明所屬技術領域中具有通常知識者便可瞭解本發明的其他目的,以及本發明的技術手段及實施態樣。 Other objects of the present invention, as well as the technical means and embodiments of the present invention, will be apparent to those of ordinary skill in the art.

1‧‧‧行動裝置 1‧‧‧ mobile device

11‧‧‧感測器 11‧‧‧ Sensor

13‧‧‧儲存器 13‧‧‧Storage

15‧‧‧處理器 15‧‧‧ processor

17‧‧‧顯示器 17‧‧‧Monitor

20‧‧‧資訊 20‧‧‧Information

9A、9B、9C‧‧‧電子裝置 9A, 9B, 9C‧‧‧ electronic devices

S201、S203、S205‧‧‧步驟 S201, S203, S205‧‧‧ steps

S301、S303、S305、S3207、S309、S311‧‧‧步驟 S301, S303, S305, S3207, S309, S311‧‧‧ steps

S401、S403、S405、S407、S409、S411‧‧‧步驟 Steps S401, S403, S405, S407, S409, S411‧‧

S501、S503、S505、S507、S509、S511‧‧‧步驟 S501, S503, S505, S507, S509, S511‧‧‧ steps

第1圖為本發明第一實施例中所述的行動裝置的結構示意圖;第2圖為本發明第二實施例中所述的資訊保護方法的流程圖;第3圖為本發明第三實施例中所述的資訊保護方法的流程圖;第4圖為本發明第四實施例中所述的資訊保護方法的流程圖;以及第5圖為本發明第五實施例中所述的資訊保護方法的流程圖。 1 is a schematic structural view of a mobile device according to a first embodiment of the present invention; FIG. 2 is a flowchart of an information protection method according to a second embodiment of the present invention; and FIG. 3 is a third embodiment of the present invention; A flowchart of the information protection method described in the example; FIG. 4 is a flowchart of the information protection method according to the fourth embodiment of the present invention; and FIG. 5 is the information protection according to the fifth embodiment of the present invention. Flow chart of the method.

以下將透過實施例來解釋本發明的內容,本發明的實施例並非用以限制本發明須在如實施例所述的任何特定的環境、應用或特殊方式方能實施。因此,關於下述實施例的說明僅為闡釋本發明的目的,而非用以限制本發明。下述實施例及圖式中,與本發明非直接相關的元件皆已省略而未繪示,且圖式中各元件間的尺寸關係僅為求容易瞭解,非用以限制本發明實際實施的比例。 The present invention is not limited by the embodiments, and the embodiments of the present invention are not intended to limit the invention to any specific environment, application or special mode as described in the embodiments. Therefore, the description of the embodiments below is merely illustrative of the invention and is not intended to limit the invention. In the following embodiments and drawings, elements that are not directly related to the present invention have been omitted and are not shown, and the dimensional relationships between the elements in the drawings are merely for ease of understanding and are not intended to limit the actual implementation of the present invention. proportion.

本發明的第一實施例用以闡述一種行動裝置,而第1圖為本實施例所述的行動裝置的結構示意圖。如第1圖所示,行動裝置1包含一感測器11、一儲存器13、一處理器15及一顯示器17,且處理器15與感測器11、儲存器13及顯示器17呈現電性連接。行動裝置1實質上可具有各種實施態樣,例如但不限於:傳統行動電話、智慧行動電話、平板電腦、筆記型電腦、個人數位助理(PDA)、電子書、數位相機、行動導航裝置、行動遊戲機、數位手錶、數位眼鏡等等。 The first embodiment of the present invention is used to describe a mobile device, and the first embodiment is a schematic structural view of the mobile device according to the embodiment. As shown in FIG. 1 , the mobile device 1 includes a sensor 11 , a storage 13 , a processor 15 , and a display 17 , and the processor 15 and the sensor 11 , the storage 13 , and the display 17 are electrically represented. connection. The mobile device 1 can have various implementations in nature, such as but not limited to: a traditional mobile phone, a smart mobile phone, a tablet computer, a notebook computer, a personal digital assistant (PDA), an e-book, a digital camera, a mobile navigation device, and an action. Game consoles, digital watches, digital glasses, etc.

儲存器13用以儲存各種資訊20,例如但不限於:訊息、郵件、錄音檔、照片、影片、通話紀錄、網路瀏覽記錄、消費記錄、個人基本資料、應用程式、通訊錄等等。為了防止避免這些資訊被竊取,感測器11可根據不同的需求持續或定時感測週遭是否存在至少一電子裝置(即一個或複數個),例如第1圖所示的電子裝置9A、電子裝置9B、電子裝置9C等等。透過感測器11的上述運作,行動裝置1可即時判斷是否需要對儲存器13儲存的資訊20進行保護。 The storage 13 is used to store various information 20 such as, but not limited to, messages, mails, audio files, photos, videos, call records, web browsing records, consumption records, personal basics, applications, contacts, and the like. In order to prevent the information from being stolen, the sensor 11 can continuously or periodically sense whether there are at least one electronic device (ie, one or plural), such as the electronic device 9A and the electronic device shown in FIG. 1 according to different needs. 9B, electronic device 9C, and the like. Through the above operation of the sensor 11, the mobile device 1 can immediately determine whether it is necessary to protect the information 20 stored in the storage unit 13.

感測器11可基於各種無線通訊網路協定,例如但不限於:藍芽通訊協定、無線保真通訊協定、超寬頻通訊協定、Zigbee通訊協定等無線通訊協定,感測週遭環境是否存在至少一電子裝置。此外,本實施例所述的電子裝置可具有不同的態樣,例如但不限於傳統行動電話、智慧行動電話、平板電腦、筆記型電腦、個人數位助理(PDA)、電子書、數位相機、行動導航裝置、行動遊戲機、數位手錶、數位眼鏡、桌上型電腦、數位電視、無線路由器、無線分享器等具有無線通訊功能的電子裝置。 The sensor 11 can sense at least one electronic environment in the surrounding environment based on various wireless communication network protocols, such as but not limited to: Bluetooth protocol, wireless fidelity protocol, ultra-wideband protocol, Zigbee protocol, and the like. Device. In addition, the electronic device described in this embodiment may have different aspects, such as but not limited to a traditional mobile phone, a smart mobile phone, a tablet computer, a notebook computer, a personal digital assistant (PDA), an e-book, a digital camera, and an action. Navigation devices, mobile game consoles, digital watches, digital glasses, desktop computers, digital TVs, wireless routers, wireless sharers and other electronic devices with wireless communication capabilities.

在感測器11感測到至少一電子裝置後,處理器15將進一步判斷該至少一電子裝置的權限,藉此判斷該至少一電子裝置對儲存於儲存器13的至少一部份資訊20(即資訊20中的部份資訊或全部資訊)是否有危害。然後,處理器15將根據該權限為儲存於該儲存器13中的該至少一部份資訊20界定一保護狀態。 After the sensor 11 senses the at least one electronic device, the processor 15 further determines the authority of the at least one electronic device, thereby determining that the at least one electronic device pairs at least a portion of the information 20 stored in the storage device 13 ( That is, some of the information or all the information in the information 20 is harmful. Then, the processor 15 defines a protection status for the at least one part of the information 20 stored in the storage 13 according to the authority.

於本實施例中,儲存器13儲存一預定名單,處理器15根據該預定名單判斷該至少一電子裝置的該權限。該預定名單可包含一白名單、一黑名單或其組合。假設該預定名單僅包含一白名單,當感測器11感測到的該至少一電子裝置已列於該白名單內時,例如該至少一電子裝置的實體層位址(MAC address)已列於該白名單內時,則處理器15判斷該至少一電子裝置的該權限為許可;反之,則處理器15判斷該至少一電子裝置的該權限為不許可。假設該預定名單僅包含一黑名單,當感測器11感測到的該至少一電子裝置已列於該黑名單內,則處理器15將判斷該至少一電子裝置的該權限為不許可;反之,則處理器15將判斷該至少一電子裝置的該權限為許可。 In this embodiment, the storage 13 stores a predetermined list, and the processor 15 determines the authority of the at least one electronic device according to the predetermined list. The predetermined list may include a white list, a black list, or a combination thereof. It is assumed that the predetermined list includes only one white list. When the at least one electronic device sensed by the sensor 11 is listed in the white list, for example, the physical address (MAC address) of the at least one electronic device is listed. When the whitelist is in the white list, the processor 15 determines that the permission of the at least one electronic device is a license; otherwise, the processor 15 determines that the permission of the at least one electronic device is not permitted. Assuming that the predetermined list includes only one blacklist, when the at least one electronic device sensed by the sensor 11 is listed in the blacklist, the processor 15 determines that the permission of the at least one electronic device is not permitted; Otherwise, the processor 15 determines that the authority of the at least one electronic device is a license.

假設該預定名單包含一白名單及一黑名單,當感測器11感測到的該至少一電子裝置已列於該白名單或該黑名單內時,處理器15將判斷該至少一電子裝置的該權限為許可或不許可。此外,倘若感測器11感測到的該至少一電子裝置並未列於該白名單或該黑名單內,則處理器15可根據預先設定的判斷機制,判斷該至少一電子裝置許可或不許可。 Assume that the predetermined list includes a white list and a black list. When the at least one electronic device sensed by the sensor 11 is listed in the white list or the black list, the processor 15 determines the at least one electronic device. This permission is either licensed or not. In addition, if the at least one electronic device sensed by the sensor 11 is not listed in the white list or the blacklist, the processor 15 may determine, according to a preset determination mechanism, whether the at least one electronic device is licensed or not. license.

於其他實施例,處理器15亦可透過其他方式判斷感測器11感測到的該至少一電子裝置的權限。例如但不限於:根據該至少一電子裝置與行動裝置1的通訊歷程來判斷;根據該至少一電子裝置與行動裝置1之間的距離來判斷;根據來自該至少一電子裝置的訊號強度來判斷等等。 In other embodiments, the processor 15 can also determine the authority of the at least one electronic device sensed by the sensor 11 by other means. For example, but not limited to: determining according to the communication history of the at least one electronic device and the mobile device 1; determining according to the distance between the at least one electronic device and the mobile device 1; determining according to the signal strength from the at least one electronic device and many more.

首先說明感測器11只感測到一個電子裝置(例如電子裝置9A)的情形。在感測器11感測到電子裝置9A後,處理器15將進一步判斷電子裝置9A的權限。若電子裝置9A的該權限被判斷為許可時,處理器15將根據該權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為公開;反之,若電子裝置9A的該權限被判斷為不許可時,處理器15將根據該權限界定儲存於該儲存器13中至少一部份資訊20的保護狀態為私密。 First, the case where the sensor 11 senses only one electronic device (for example, the electronic device 9A) will be described. After the sensor 11 senses the electronic device 9A, the processor 15 will further determine the authority of the electronic device 9A. If the authority of the electronic device 9A is determined to be permitted, the processor 15 defines, according to the authority, the protection status of the at least part of the information 20 stored in the storage 13 as public; otherwise, if the authority of the electronic device 9A is When it is determined that the license is not permitted, the processor 15 defines the protection status of the at least part of the information 20 stored in the storage 13 as private according to the authority.

接著說明感測器11同時感測到複數個電子裝置(例如電子裝置9A、電子裝置9B及電子裝置9C)的情形。在感測器11同時感測到電子裝置9A、電子裝置9B及電子裝置9C後,處理器15將進一步判斷電子裝置9A、電子裝置9B及電子裝置9C的權限。然後,處理器15可根據預先設定進行不同的後續運作。茲以下述三個例子說明處理器15的後續運作,惟該等例子並非用以限定本發明的實施態樣。 Next, the case where the sensor 11 simultaneously senses a plurality of electronic devices (for example, the electronic device 9A, the electronic device 9B, and the electronic device 9C) will be described. After the sensor 11 simultaneously senses the electronic device 9A, the electronic device 9B, and the electronic device 9C, the processor 15 further determines the rights of the electronic device 9A, the electronic device 9B, and the electronic device 9C. Then, the processor 15 can perform different subsequent operations according to presets. The subsequent operation of the processor 15 will be described in the following three examples, but the examples are not intended to limit the embodiments of the present invention.

第一種後續運作如下:只要電子裝置9A、電子裝置9B及電子裝置9C其中之一的權限被判斷為許可,處理器15將根據該權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為公開。否則,也就是若電子裝置9A、電子裝置9B及電子裝置9C的權限皆被判斷為不許可,處理器15將根據該權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為私密。 The first subsequent operation is as follows: as long as the authority of one of the electronic device 9A, the electronic device 9B and the electronic device 9C is determined to be permitted, the processor 15 will define at least a part of the information stored in the storage 13 according to the authority. The protection status of 20 is public. Otherwise, that is, if the rights of the electronic device 9A, the electronic device 9B, and the electronic device 9C are all judged as not permitted, the processor 15 defines the protection status of at least a portion of the information 20 stored in the storage 13 according to the authority. It is private.

第二種後續運作如下:只要電子裝置9A、電子裝置9B及電子裝置9C其中之一的權限被判斷為不許可,處理器15將根據該權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為私密。否則,也就是若電子裝置9A、電子裝置9B及電 子裝置9C的權限皆被判斷為許可,處理器15將根據該權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為公開。 The second subsequent operation is as follows: as long as the authority of one of the electronic device 9A, the electronic device 9B and the electronic device 9C is judged as not permitted, the processor 15 will define at least a part stored in the storage 13 according to the authority. The protection status of the information 20 is private. Otherwise, that is, if the electronic device 9A, the electronic device 9B, and the electricity The authority of the child device 9C is determined to be permitted, and the processor 15 defines the protection status of the at least part of the information 20 stored in the storage 13 as public according to the authority.

第三種後續運作如下:若電子裝置9A、電子裝置9B及電子裝置9C其中多數的權限被判斷為許可,處理器15將根據該等權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為公開;反之,若電子裝置9A、電子裝置9B及電子裝置9C其中多數的權限被判斷為不許可,處理器15將根據該等權限界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為私密。 The third subsequent operation is as follows: if most of the rights of the electronic device 9A, the electronic device 9B, and the electronic device 9C are determined to be permitted, the processor 15 will define at least a part of the information stored in the storage 13 according to the rights. The protection status of 20 is public; on the contrary, if the majority of the rights of the electronic device 9A, the electronic device 9B, and the electronic device 9C are judged as not permitted, the processor 15 defines at least one stored in the storage 13 according to the rights. The protection status of some information 20 is private.

若儲存於該儲存器13中至少一部份資訊20的保護狀態被界定為公開,則表示該至少一部份資訊20不受保護;反之,若儲存於該儲存器13中至少一部份資訊20的保護狀態被界定為私密,則表示該至少一部份資訊20受保護。受保護的該至少一部份資訊20可具有不同的保護態樣,例如但不限於:加密保護、隱藏保護、限制讀取範圍保護等等。加密保護表示受保護的該至少一部份資訊20將被加密;隱藏保護表示受保護的該至少一部份資訊20將被隱藏;而限制讀取範圍保護表示受保護的該至少一部份資訊20無法完整地被讀取。 If the protection status of at least a portion of the information 20 stored in the storage 13 is defined as public, it indicates that the at least part of the information 20 is not protected; otherwise, if at least part of the information is stored in the storage 13 The protection status of 20 is defined as private, indicating that at least a portion of the information 20 is protected. The protected at least part of the information 20 may have different protection aspects such as, but not limited to, encryption protection, hidden protection, limited read range protection, and the like. Encryption protection means that the protected at least part of the information 20 will be encrypted; the hidden protection means that the protected at least part of the information 20 will be hidden; and the restricted read range protection means that the protected at least part of the information 20 cannot be read completely.

因應上述隱藏保護,顯示器17於該至少一部份資訊20的保護狀態為公開時,顯示該至少一部份資訊20,且於該至少一部份資訊20的保護狀態為私密時,隱藏該至少一部份資訊20。應理解,在不需要隱藏保護之功能的情況,行動裝置1亦可不設置顯示器17。換言之,設置顯示器17為行動裝置1的一種較佳實施態樣,而非用以限定行動裝置1。 In response to the hidden protection, the display 17 displays the at least part of the information 20 when the protection status of the at least part of the information 20 is public, and hides the at least part of the information 20 when the protection status is private. A part of the information 20. It should be understood that the mobile device 1 may not be provided with the display 17 in the case where the function of concealing protection is not required. In other words, the display 17 is provided as a preferred embodiment of the mobile device 1, rather than to define the mobile device 1.

基於上述說明,行動裝置1可在不同的情況下,提 供有效且即時的資訊防護。舉例而言,行動裝置1可預先設定下述規則:只有在感測器11感測到一特定電子裝置(例如使用者攜帶的另一行動電話、平板電腦、筆記型電腦、數位相機、數位手錶等其他電子裝置),且處理器15判斷該特定電子裝置的的權限為許可,處理器15才會界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為公開,否則處理器15將持續界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為私密。如此,即使使用者將行動裝置1借給其他人,或者遺失了行動裝置1,將因周遭不存在被許可的該特定電子裝置,使得儲存於該儲存器13中的至少一部份資訊20的保護狀態持續被界定為私密而無法被竊取。 Based on the above description, the mobile device 1 can be raised in different situations. For effective and immediate information protection. For example, the mobile device 1 may preset a rule that only the specific electronic device is sensed by the sensor 11 (for example, another mobile phone, a tablet computer, a notebook computer, a digital camera, a digital watch carried by the user) The processor 15 determines that the protection status of the at least part of the information 20 stored in the storage 13 is public, otherwise the processor 15 determines that the authority of the specific electronic device is a license, otherwise the processor 15 will continue to define the protection status of at least a portion of the information 20 stored in the storage 13 as private. Thus, even if the user lends the mobile device 1 to another person or loses the mobile device 1, the at least part of the information 20 stored in the storage device 13 is caused by the absence of the licensed specific electronic device. The state of protection continues to be defined as private and cannot be stolen.

另舉例而言,行動裝置1可預先設定下述規則:只要在感測器11感測到任一電子裝置,且處理器15判斷該電子裝置的權限為不許可,處理器15將自動界定儲存於該儲存器13中的至少一部份資訊20的保護狀態為私密。如此,當使用者使用其行動裝置時,若周遭同時存在其他人或其他電子裝置,則因周遭存在不被許可的電子裝置,使得儲存於該儲存器13中的至少一部份資訊20的保護狀態持續被界定為私密而無法被竊取。 For another example, the mobile device 1 may preset a rule that the processor 15 will automatically define the storage as long as the sensor 11 senses any electronic device and the processor 15 determines that the authority of the electronic device is not permitted. The protection status of at least a portion of the information 20 in the storage 13 is private. Thus, when the user uses the mobile device, if there are other people or other electronic devices at the same time, the protection of at least a portion of the information 20 stored in the storage device 13 is caused by the presence of the unauthorized electronic device. The state continues to be defined as private and cannot be stolen.

本發明的第二實施例用以闡述一種用於一行動裝置的資訊保護方法,而第2圖為本實施例所述的資訊保護方法的流程圖。本實施例所述的行動裝置實質上可視為第一實施例所述的顯示裝置1或其等效裝置,因而實質上包含一感測器、一儲存器及一電性連接至該感測器及該儲存器的處理器。 The second embodiment of the present invention is for explaining an information protection method for a mobile device, and FIG. 2 is a flowchart of the information protection method according to the embodiment. The mobile device of the present embodiment can be substantially regarded as the display device 1 or the equivalent device thereof according to the first embodiment, and thus substantially includes a sensor, a storage device and an electrical connection to the sensor device. And the processor of the storage.

如第2圖所示,於步驟S201,使該感測器感測至少 一電子裝置(一個或多個)。於步驟S203,使該處理器判斷該至少一電子裝置的權限。較佳地,該儲存器更儲存一預定名單,且步驟S203為下列步驟:使該處理器根據該預定名單判斷該至少一電子裝置的該權限。於步驟S205,使該處理器根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態。 As shown in FIG. 2, in step S201, the sensor is sensed at least An electronic device (one or more). In step S203, the processor is caused to determine the authority of the at least one electronic device. Preferably, the storage further stores a predetermined list, and step S203 is the step of: causing the processor to determine the authority of the at least one electronic device according to the predetermined list. In step S205, the processor is configured to define a protection status for the at least part of the information stored in the storage according to the permission.

本實施例所述的資訊保護方法本質上已涵蓋以下第三實施例、第四實施例及第五實施例所述的資訊保護方法。另外,本實施例所述的資訊保護方法視為已包含對應至第一實施例所描述的行動裝置1的所有運作的步驟,且本發明所屬技術領域中具有通常知識者可根據第一實施例的揭露而直接瞭解本實施例所述的資訊保護方法如何執行相對應的步驟。 The information protection method described in this embodiment substantially covers the information protection methods described in the following third embodiment, fourth embodiment, and fifth embodiment. In addition, the information protection method described in this embodiment is considered to have included all the steps corresponding to the operation of the mobile device 1 described in the first embodiment, and those having ordinary knowledge in the technical field to which the present invention pertains may according to the first embodiment. The disclosure directly understands how the information protection method described in this embodiment performs the corresponding steps.

本發明的第三實施例同樣用以闡述一種用於一行動裝置的資訊保護方法,而第3圖為本實施例所述的資訊保護方法的流程圖。本實施例所述的行動裝置實質上可視為第一實施例所述的顯示裝置1或其等效裝置,因而實質上包含一感測器、一儲存器、一顯示器及一電性連接至該感測器、該儲存器及該顯示器的處理器,其中該顯示器為可選擇的設置。 The third embodiment of the present invention is also used to describe an information protection method for a mobile device, and FIG. 3 is a flow chart of the information protection method according to the embodiment. The mobile device of the present embodiment can be substantially regarded as the display device 1 of the first embodiment or an equivalent device thereof, and thus substantially includes a sensor, a storage device, a display, and an electrical connection thereto. A sensor, the storage, and a processor of the display, wherein the display is an optional setting.

如第3圖所示,於步驟S301,使該感測器感測一電子裝置。於步驟S303,使該處理器判斷該電子裝置的權限。較佳地,該儲存器更儲存一預定名單,且步驟S303為下列步驟:使該處理器根據該預定名單判斷該電子裝置的該權限。 As shown in FIG. 3, in step S301, the sensor is caused to sense an electronic device. In step S303, the processor is caused to determine the authority of the electronic device. Preferably, the storage further stores a predetermined list, and step S303 is a step of causing the processor to determine the authority of the electronic device according to the predetermined list.

於步驟S303之後,若該處理器判斷該電子裝置的權限為許可,則執行步驟S305:使該處理器根據該權限界定儲存於該儲存器中的該至少一部份資訊的該保護狀態為公開。可選擇 地,於步驟S305之後執行步驟S309,使該顯示器顯示該至少一部份資訊。 After the step S303, if the processor determines that the authority of the electronic device is a license, step S305 is executed to enable the processor to define the protection status of the at least one part of the information stored in the storage as public according to the authority. . Optional After step S305, step S309 is executed to enable the display to display the at least part of the information.

於步驟S303之後,若該處理器判斷該電子裝置的權限為不許可,則執行步驟S307:使該處理器根據該權限界定儲存於該儲存器中的該至少一部份資訊的該保護狀態為私密。可選擇地,於步驟S307之後執行步驟S311,使該顯示器隱藏該至少一部份資訊。 After the step S303, if the processor determines that the authority of the electronic device is not permitted, step S307 is executed to enable the processor to define the protection status of the at least one part of the information stored in the storage according to the authority. Private. Optionally, after step S307, step S311 is performed to cause the display to hide the at least part of the information.

本發明的第四實施例同樣用以闡述一種用於一行動裝置的資訊保護方法,而第4圖為本實施例所述的資訊保護方法的流程圖。本實施例所述的行動裝置實質上可視為第一實施例所述的顯示裝置1或其等效裝置,因而實質上包含一感測器、一儲存器、一顯示器及一電性連接至該感測器、該儲存器及該顯示器的處理器,其中該顯示器為可選擇的設置。 The fourth embodiment of the present invention is also used to describe an information protection method for a mobile device, and FIG. 4 is a flowchart of the information protection method according to the embodiment. The mobile device of the present embodiment can be substantially regarded as the display device 1 of the first embodiment or an equivalent device thereof, and thus substantially includes a sensor, a storage device, a display, and an electrical connection thereto. A sensor, the storage, and a processor of the display, wherein the display is an optional setting.

如第4圖所示,於步驟S401,使該感測器感測複數個電子裝置。於步驟S403,使該處理器判斷是否該等電子裝置其中之一的權限為許可。較佳地,該儲存器更儲存一預定名單,且步驟S403為下列步驟:使該處理器根據該預定名單判斷該等電子裝置的權限。於其他實施例,步驟S403、可為下列步驟:使該處理器判斷是否該等電子裝置其中多數的權限為許可。 As shown in FIG. 4, in step S401, the sensor is caused to sense a plurality of electronic devices. In step S403, the processor is caused to determine whether the authority of one of the electronic devices is a license. Preferably, the storage further stores a predetermined list, and step S403 is a step of causing the processor to determine the rights of the electronic devices according to the predetermined list. In other embodiments, step S403 may be the following steps: causing the processor to determine whether the majority of the rights of the electronic devices are permitted.

於步驟S403之後,若該處理器判斷該等電子裝置其中之一或多數的權限為許可,則執行步驟S405:使該處理器根據該權限界定儲存於該儲存器中的該至少一部份資訊的該保護狀態為公開。可選擇地,於步驟S405之後執行步驟S409,使該顯示器顯示該至少一部份資訊。 After the step S403, if the processor determines that one or more of the rights of the electronic devices are permitted, step S405 is executed to enable the processor to define the at least part of the information stored in the storage according to the authority. This protection status is public. Optionally, after step S405, step S409 is performed to enable the display to display the at least part of the information.

於步驟S403之後,若該處理器判斷該電子裝置其中之一或多數的權限為不許可,則執行步驟S407:使該處理器根據該權限界定儲存於該儲存器中的該至少一部份資訊的該保護狀態為私密。可選擇地,於步驟S407之後執行步驟S411,使該顯示器隱藏該至少一部份資訊。 After the step S403, if the processor determines that the permission of one or more of the electronic devices is not permitted, step S407 is executed to enable the processor to define the at least part of the information stored in the storage according to the authority. This protection status is private. Optionally, after step S407, step S411 is performed to cause the display to hide the at least part of the information.

本發明的第五實施例同樣用以闡述一種用於一行動裝置的資訊保護方法,而第5圖為本實施例所述的資訊保護方法的流程圖。本實施例所述的行動裝置實質上可視為第一實施例所述的顯示裝置1或其等效裝置,因而實質上包含一感測器、一儲存器、一顯示器及一電性連接至該感測器、該儲存器及該顯示器的處理器,其中該顯示器為可選擇的設置。 The fifth embodiment of the present invention is also used to describe an information protection method for a mobile device, and FIG. 5 is a flowchart of the information protection method according to the embodiment. The mobile device of the present embodiment can be substantially regarded as the display device 1 of the first embodiment or an equivalent device thereof, and thus substantially includes a sensor, a storage device, a display, and an electrical connection thereto. A sensor, the storage, and a processor of the display, wherein the display is an optional setting.

如第5圖所示,於步驟S501,使該感測器感測複數個電子裝置。於步驟S503,使該處理器判斷是否該等電子裝置其中之一的權限為不許可。較佳地,該儲存器更儲存一預定名單,且步驟S503為下列步驟:使該處理器根據該預定名單判斷該等電子裝置的權限。於其他實施例,步驟S503可為下列步驟:使該處理器判斷是否該等電子裝置其中多數的權限為不許可。 As shown in FIG. 5, in step S501, the sensor is caused to sense a plurality of electronic devices. In step S503, the processor is caused to determine whether the authority of one of the electronic devices is not permitted. Preferably, the storage further stores a predetermined list, and step S503 is a step of causing the processor to determine the rights of the electronic devices according to the predetermined list. In other embodiments, step S503 may be the step of causing the processor to determine whether the majority of the rights of the electronic devices are not permitted.

於步驟S503之後,若該處理器判斷該等電子裝置其中之一或多數的權限為不許可,則執行步驟S505:使該處理器根據該權限界定儲存於該儲存器中的該至少一部份資訊的該保護狀態為私密。可選擇地,於步驟S505之後執行步驟S509,使該顯示器隱藏該至少一部份資訊。 After the step S503, if the processor determines that the authority of one or more of the electronic devices is not permitted, step S505 is executed to enable the processor to define the at least one part stored in the storage according to the authority. The protection status of the information is private. Optionally, after step S505, step S509 is performed to cause the display to hide the at least part of the information.

於步驟S503之後,若該處理器判斷該電子裝置其中之一或多數的權限為許可,則執行步驟S507:使該處理器根據該 權限界定儲存於該儲存器中的該至少一部份資訊的該保護狀態為公開。可選擇地,於步驟S507之後執行步驟S511,使該顯示器顯示該至少一部份資訊。 After step S503, if the processor determines that the authority of one or more of the electronic devices is permitted, step S507 is performed: causing the processor to The authority defines that the protection status of the at least part of the information stored in the storage is public. Optionally, after step S507, step S511 is performed to enable the display to display the at least part of the information.

綜上所述,透過感測器感測週遭是否存在至少一電子裝置(一個或多個),可使本發明的行動裝置即時判斷是否需要對其儲存的資訊進行保護。透過處理器判斷該至少一電子裝置的權限,可使本發明的行動裝置判斷該至少一電子裝置對其儲存的資訊是否有危害。根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態,可使本發明的行動裝置因應不同的情況,判斷是否對其儲存的資訊進行保護。透過上述運作,本發明之行動裝置及其資訊保護方法將可因應不同的情況,自動且即時地判斷是否需要進行資訊保護,故可改善傳統的行動裝置無法為其儲存的資訊提供有效且即時的保護的缺陷。 In summary, detecting whether there is at least one electronic device(s) around the sensor enables the mobile device of the present invention to immediately determine whether it needs to protect the stored information. The determining, by the processor, the authority of the at least one electronic device, the mobile device of the present invention can determine whether the at least one electronic device is harmful to the stored information. Defining a protection status for at least a part of the information stored in the storage according to the authority enables the mobile device of the present invention to determine whether to protect the stored information according to different situations. Through the above operations, the mobile device and the information protection method thereof of the present invention can automatically and instantly determine whether information protection is needed according to different situations, thereby improving the effective and instant information that the traditional mobile device cannot store for the information stored therein. Defects in protection.

上述實施例僅用來例舉本發明的可實施態樣,以及闡釋本發明的技術特徵,但並非用來限制本發明的保護範疇。任何熟悉此技術者可輕易完成的改變或均等性的安排均屬於本發明所主張的範圍,而本發明的權利保護範圍以申請專利範圍為準。 The above embodiments are only intended to illustrate the embodiments of the present invention, and to explain the technical features of the present invention, but are not intended to limit the scope of protection of the present invention. Any change or equivalent arrangement that can be easily accomplished by those skilled in the art is within the scope of the invention, and the scope of the invention is subject to the scope of the patent application.

S201、S203、S205‧‧‧步驟 S201, S203, S205‧‧‧ steps

Claims (8)

一種行動裝置,包含:一感測器,用以感測複數個電子裝置;一儲存器;一處理器,電性連接至該感測器及該儲存器,並用以判斷該等電子裝置的權限;以及根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態,且於該等電子裝置其中之一的權限被判斷為許可時,該處理器根據該權限界定該至少一部份資訊的該保護狀態為公開;以及一顯示器,電性連接至該處理器,用以於該至少一部份資訊的該保護狀態為公開時,顯示該至少一部份資訊。 A mobile device includes: a sensor for sensing a plurality of electronic devices; a storage device; a processor electrically connected to the sensor and the storage device, and configured to determine the permissions of the electronic devices And defining, according to the permission, a protection status for at least a portion of the information stored in the storage, and when the authority of one of the electronic devices is determined to be permitted, the processor defines the at least one according to the authority The protection status of the partial information is public; and a display is electrically connected to the processor for displaying the at least part of the information when the protection status of the at least part of the information is public. 如請求項1所述的行動裝置,其中該儲存器更儲存一預定名單,該處理器更根據該預定名單判斷該等電子裝置的該等權限。 The mobile device of claim 1, wherein the storage further stores a predetermined list, and the processor further determines the rights of the electronic devices according to the predetermined list. 一種行動裝置,包含:一感測器,用以感測複數個電子裝置;一儲存器;一處理器,電性連接至該感測器及該儲存器,並用以判斷該等電子裝置的權限;以及根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態,且於該等電子裝置其中之一的權限被判斷為不許可時,該處理器根據該權限界定該至少一部份資訊的 該保護狀態為私密;以及一顯示器,電性連接至該處理器,用以於該至少一部份資訊的該保護狀態為私密時,隱藏該至少一部份資訊。 A mobile device includes: a sensor for sensing a plurality of electronic devices; a storage device; a processor electrically connected to the sensor and the storage device, and configured to determine the permissions of the electronic devices And defining, according to the permission, a protection status for at least a portion of the information stored in the storage, and when the authority of one of the electronic devices is determined to be unlicensed, the processor defines the at least according to the authority Part of the information The protection state is private; and a display is electrically connected to the processor to hide the at least part of the information when the protection status of the at least part of the information is private. 如請求項3所述的行動裝置,其中該儲存器更儲存一預定名單,該處理器更根據該預定名單判斷該等電子裝置的該等權限。 The mobile device of claim 3, wherein the storage further stores a predetermined list, and the processor further determines the rights of the electronic devices according to the predetermined list. 一種用於一行動裝置的資訊保護方法,該行動裝置包含一感測器、一儲存器、一電性連接至該感測器及該儲存器的處理器及一電性連接至該處理器的顯示器,該資訊保護方法包含下列步驟:使該感測器感測複數個電子裝置;使該處理器判斷該等電子裝置的權限;使該處理器根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態,且於該等電子裝置其中之一的權限被判斷為許可時,使該處理器根據該權限界定該至少一部份資訊的該保護狀態為公開;以及於該至少一部份資訊的該保護狀態為公開時,使該顯示器顯示該至少一部份資訊。 An information protection method for a mobile device, the mobile device comprising a sensor, a storage device, a processor electrically connected to the sensor and the storage device, and a battery electrically connected to the processor a display, the information protection method comprising the steps of: causing the sensor to sense a plurality of electronic devices; causing the processor to determine the rights of the electronic devices; and causing the processor to store at least the stored in the storage according to the permission A portion of the information defines a protection status, and when the authority of one of the electronic devices is determined to be permitted, causing the processor to define the protection status of the at least part of the information as public according to the authority; When the protection status of at least part of the information is public, the display displays the at least part of the information. 如請求項5所述的資訊保護方法,其中該儲存器更儲存一預定名單,該資訊保護方法更包含下列步驟:使該處理器根據該預定名單判斷該等電子裝置的該等權限。 The information protection method of claim 5, wherein the storage further stores a predetermined list, the information protection method further comprising the step of: causing the processor to determine the rights of the electronic devices according to the predetermined list. 一種用於一行動裝置的資訊保護方法,該行動裝置包含一感測器、一儲存器、一電性連接至該感測器及該儲存器的處理 器及一電性連接至該處理器的顯示器,該資訊保護方法包含下列步驟:使該感測器感測複數個電子裝置;使該處理器判斷該等電子裝置的權限;以及使該處理器根據該權限為儲存於該儲存器中的至少一部份資訊界定一保護狀態,且於該等電子裝置其中之一的權限被判斷為不許可時,使該處理器根據該權限界定該至少一部份資訊的該保護狀態為私密;以及於該至少一部份資訊的該保護狀態為私密時,使該顯示器隱藏該至少一部份資訊。 An information protection method for a mobile device, the mobile device comprising a sensor, a storage, a process electrically connected to the sensor and the storage And a display electrically coupled to the processor, the information protection method comprising the steps of: causing the sensor to sense a plurality of electronic devices; causing the processor to determine the rights of the electronic devices; and causing the processor Determining, according to the permission, a protection status for at least part of the information stored in the storage, and when the authority of one of the electronic devices is determined to be unlicensed, causing the processor to define the at least one according to the authority The protection status of the partial information is private; and when the protection status of the at least part of the information is private, the display hides the at least part of the information. 如請求項7所述的資訊保護方法,其中該儲存器更儲存一預定名單,該資訊保護方法更包含下列步驟:使該處理器根據該預定名單判斷該等電子裝置的該等權限。 The information protection method of claim 7, wherein the storage further stores a predetermined list, the information protection method further comprising the step of: causing the processor to determine the rights of the electronic devices according to the predetermined list.
TW102132090A 2013-09-06 2013-09-06 Mobile device and information protection method thereof TWI582639B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW102132090A TWI582639B (en) 2013-09-06 2013-09-06 Mobile device and information protection method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW102132090A TWI582639B (en) 2013-09-06 2013-09-06 Mobile device and information protection method thereof

Publications (2)

Publication Number Publication Date
TW201510765A TW201510765A (en) 2015-03-16
TWI582639B true TWI582639B (en) 2017-05-11

Family

ID=53186729

Family Applications (1)

Application Number Title Priority Date Filing Date
TW102132090A TWI582639B (en) 2013-09-06 2013-09-06 Mobile device and information protection method thereof

Country Status (1)

Country Link
TW (1) TWI582639B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201333746A (en) * 2011-12-22 2013-08-16 Intel Corp Always-available embedded theft reaction subsystem

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201333746A (en) * 2011-12-22 2013-08-16 Intel Corp Always-available embedded theft reaction subsystem

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
「Synology NAS DS2013air 開箱分享,2bay,內建 Wifi 可當作分享器」網路文章、公開日期:2012年10月13日、網址:http://scl13.com/synology-ds213air/ *
「輕鬆使用Synology FileStation-Part II」網路文章、公開日期:2012年10月29日、網址:http://www.mobile01.com/topicdetail.php?f=494&t=3019034 *

Also Published As

Publication number Publication date
TW201510765A (en) 2015-03-16

Similar Documents

Publication Publication Date Title
US8646032B2 (en) Method and apparatus providing privacy setting and monitoring user interface
KR102207206B1 (en) Electronic device for controlling display based on accessory device information, method thereof, and associated accessory device
KR102048727B1 (en) Multiple operation modes for a display of an electronic device
KR102265123B1 (en) System for context-based data protection
CN105519038B (en) User input data protection method and system
JP2014521269A (en) Method and apparatus for detecting and handling lost electronic devices
JP2017531266A (en) Data protection based on user and gesture recognition
CN105550591A (en) Security protection device and method for user data in mobile terminal
CN105117101B (en) The display methods and device of application program
WO2014046854A2 (en) Interactive overlay to prevent unintentional inputs
TW201339990A (en) Data protecting system and protecting method
KR20150005352A (en) Apparatas and method for unlocking using for object in an electronic device
US10070315B2 (en) Security management on a mobile device
US20210397751A1 (en) Software initiated camera and microphone indicator
TWI582639B (en) Mobile device and information protection method thereof
KR20130136188A (en) Apparatas and method of protecting pseudo touch in a electronic device
JP6619299B2 (en) Detection apparatus and detection method
CN104156670A (en) Data protection method and device
EP3208703B1 (en) Method and apparatus for processing screen sensitive information
JP2007316686A (en) Security state management server, security patch distribution server, file server, take-out detection device, and its system
EP3396582B1 (en) Personal information protection method and system based on mobile terminal, and mobile terminal
CN104424443B (en) Mobile device and its information protecting method
CN110287730B (en) Privacy file processing method and related equipment
US9450932B2 (en) Mobile device and information protection method thereof
CN112685733A (en) Security detection method, security detection device, and storage medium