TWI607338B - Storage device, data protection method therefor, and data protection system - Google Patents

Storage device, data protection method therefor, and data protection system Download PDF

Info

Publication number
TWI607338B
TWI607338B TW105122800A TW105122800A TWI607338B TW I607338 B TWI607338 B TW I607338B TW 105122800 A TW105122800 A TW 105122800A TW 105122800 A TW105122800 A TW 105122800A TW I607338 B TWI607338 B TW I607338B
Authority
TW
Taiwan
Prior art keywords
storage device
file
data protection
electronic computing
computing device
Prior art date
Application number
TW105122800A
Other languages
Chinese (zh)
Other versions
TW201804354A (en
Inventor
趙士賓
黃建邦
柯銘錡
趙士銘
Original Assignee
資富電子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 資富電子股份有限公司 filed Critical 資富電子股份有限公司
Priority to TW105122800A priority Critical patent/TWI607338B/en
Application granted granted Critical
Publication of TWI607338B publication Critical patent/TWI607338B/en
Publication of TW201804354A publication Critical patent/TW201804354A/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

儲存裝置及其資料保護方法與資料保護系統 Storage device and its data protection method and data protection system

本發明關於電腦之資料保護技術,尤其是關於儲存裝置及其資料保護方法與資料保護系統。 The invention relates to a data protection technology for a computer, in particular to a storage device and a data protection method thereof and a data protection system.

隨著資訊科技發達,資訊處理及交流的迅速,帶來人們在工作、生活、學術上莫大的便利或改善。然而,電腦病毒或惡意程式在網路上或資料交流中不斷的散播及其造成惡意的資訊損失成為現代人的夢魘。 With the development of information technology, the rapid processing of information and communication has brought about great convenience or improvement in people's work, life and academics. However, the continuous spread of computer viruses or malicious programs on the Internet or in the exchange of information and the loss of malicious information has become a nightmare for modern people.

此外,電腦病毒亦會主動感染USB隨身碟、記憶卡、隨身硬體等外接型儲存裝置,只要電腦插上受病毒感染的儲存裝置後,主機本身也會跟著中毒,造成嚴重的災害。由於人們在工作、個人、或課業需求經常要在不同的電腦使用該儲存裝置,電腦病毒亦可藉此而快速傳播,造成連鎖的感染。 In addition, computer viruses will also actively infect USB flash drives, memory cards, portable hardware and other external storage devices. As long as the computer is plugged into a virus-infected storage device, the host itself will be poisoned, causing serious disasters. Because people often use the storage device on different computers at work, personal, or academic needs, computer viruses can also spread quickly, causing chain infections.

為此,遂有業界開發一種具有獨立防毒能力的可攜式儲存裝置,如美國專利編號US7,975,304所揭示者。該可攜式便攜式儲存裝置包括可移除的設備介面和具有唯讀分區和常規存儲分區的非動態記憶體。唯讀分區可以包含保護程式用於常規存儲分區中資料的病毒掃描。一旦可攜式便攜式儲存裝置連接到電腦,如果電腦允許其自動運行之功能(即電腦允許執行該儲存裝置上autorun.inf檔案所記載的路徑之程式),那麼作業系統自動運行唯讀分區以啟動該保護程式。如果電腦禁用自動運行,使用 者可以手動地啟動該保護程式。該保護程式只掃描可攜式USB儲存裝置中的資料;這有利地允許獨立的、成本有效的、並且侵入最小化的可攜式便攜式儲存裝置。 To this end, the industry has developed a portable storage device with independent anti-virus capabilities, such as disclosed in U.S. Patent No. 7,975,304. The portable portable storage device includes a removable device interface and non-dynamic memory with a read-only partition and a conventional storage partition. Read-only partitions can contain virus scans that protect programs for data in regular storage partitions. Once the portable portable storage device is connected to the computer, if the computer allows its automatic operation function (that is, the computer allows the execution of the path recorded in the autorun.inf file on the storage device), the operating system automatically runs the read-only partition to start. The protection program. If the computer is disabled automatically, use The protection program can be started manually. The protection program only scans the data in the portable USB storage device; this advantageously allows for an independent, cost effective, and minimally invasive portable portable storage device.

然而,上述習知之具有獨立防毒能力的可攜式儲存裝置,由於需要自動運行之功能被允許才能自動執行該保護程式(即藉由autorun.inf檔案),在目前尚在運作的作業系統如微軟視窗(Microsoft Windows)系統,如Windows Vista、Windows 7、Windows Server 2008以後的平台上的自動執行功能僅支援CD和DVD媒體。當使用者使用包含autorun.inf檔案的USB裝置、網路共享或其它非CD/DVD媒體時,系統不會執行自動執行該保護程式。即,該習知的儲存裝置在目前的作業系統下,僅能由使用者手動啟動該保護程式。而且不管該保護程式是手動或主動啟動,已常駐在電腦的病毒將即可趁機在該保護程式未被執行之前使該可攜式儲存裝置受到感染。 However, the above-mentioned portable storage device with independent anti-virus capability can automatically execute the protection program (ie, by autorun.inf file) because the function of automatic operation is allowed, and the operating system currently in operation such as Microsoft. Windows (Microsoft Windows) systems, such as Windows Vista, Windows 7, Windows Server 2008 and later, auto-execute functions only support CD and DVD media. When a user uses a USB device, network share, or other non-CD/DVD media containing the autorun.inf file, the system does not perform the automatic execution of the protection program. That is, the conventional storage device can only be manually activated by the user under the current operating system. Moreover, regardless of whether the protection program is manually or actively activated, the virus that has been resident on the computer will be able to take the opportunity to infect the portable storage device before the protection program is executed.

此外,該保護程式只掃描可攜式USB儲存裝置中的資料,當電腦受到來自網路的電腦病毒或惡意程式破壞時,亦無法及時對整個電腦系統做到保護的作用,更可能使可攜式USB儲存裝置受到感染。因此,該習知的USB儲存裝置仍具有資訊安全的漏洞,並不足以安全地保護於USB儲存裝置內的資料的安全。 In addition, the protection program only scans the data in the portable USB storage device. When the computer is damaged by a computer virus or malicious program from the network, it cannot protect the entire computer system in time, and is more likely to be portable. The USB storage device is infected. Therefore, the conventional USB storage device still has information security vulnerabilities and is not sufficient to securely protect the data in the USB storage device.

此外,目前出現所謂「勒索病毒」,「勒索病毒」(Cryptolocker、CryptoWall等)又可以稱為,「綁架病毒」或「流氓病毒」,主要入侵方式像是,用聳動或吸引人的郵件標題,發送內含惡意程式碼的電子郵件,吸引大家打開,並在開啟與點擊後,自動下載並執行惡意程式。例如,惡意程式將電腦系統中的儲存裝置內的jpg、pdf、mp3、doc、txt等非系統檔案加密成.crypl檔,即便該電腦的防毒軟體也不能解決此問題。再者,勒索病毒會顯示要求付贖金的勒索訊息,並威脅使用者必 須在短時間內(像是3天)就要給付,否則銷毀金鑰,讓使用者再也無法解開檔案。此外,亦有ZCRYPT勒索病毒家族會試圖經由USB隨身碟傳染。 In addition, there are so-called "blackmail viruses", "Cryptolocker" (Cryptolocker, CryptoWall, etc.) can also be called "kidnapping virus" or "rogue virus". The main intrusion method is like using a sensational or attractive mail headline. Send an email with malicious code to attract everyone to open, and automatically download and execute malicious programs after opening and clicking. For example, a malicious program encrypts a non-system file such as jpg, pdf, mp3, doc, txt, etc. in a storage device in a computer system into a .crypl file, even if the antivirus software of the computer cannot solve the problem. In addition, the ransomware will display a blackmail message requesting a ransom and threaten the user. It must be paid in a short period of time (such as 3 days), otherwise the key will be destroyed, so that the user can no longer unlock the file. In addition, there are also ZCRYPT ransomware families that attempt to spread via USB flash drives.

因此,亟需一種外接型儲存裝置之資料安全技術,從而讓使用者安全地儲存資料以免受到電腦病毒的感染及傳播病毒。 Therefore, there is a need for an information security technology for an external storage device, so that users can safely store data to avoid infection by computer viruses and spread viruses.

有鑑於此,本案發明之儲存裝置及其資料保護方法與資料保護系統,能有效地防止儲存裝置內的加密資料被綁架與被惡意軟體感染入侵中毒,亦能預防惡意軟體病毒散播到其它非加密的儲存裝置,也能夠對該儲存裝置和該儲存裝置連接之電子運算裝置的所有的記憶裝置(如系統記憶體等)進行例如主動/被動式監測、掃毒、解毒、以及相關之消毒動作中之至少一種。舉例而言,儲存裝置內建主動啟動之防毒與加解密引擎和動態空間分割之資料加密空間。 In view of this, the storage device of the invention and the data protection method and the data protection system thereof can effectively prevent the encrypted data in the storage device from being abducted and infected by the malicious software, and can also prevent the malicious software virus from being scattered to other non-encrypted. The storage device can also perform, for example, active/passive monitoring, anti-virus, detoxification, and related disinfection actions on all storage devices (such as system memory, etc.) of the storage device and the electronic computing device to which the storage device is connected. At least one. For example, the storage device has an active boot antivirus and encryption and decryption engine and a dynamic spatial partitioning data encryption space.

依據本發明之一方面,提出一種儲存裝置之資料保護方法,其包括:啟動步驟、監測步驟、檔案存取步驟。啟動步驟,其包括:當一儲存裝置連接至一電子運算裝置的資料介面時,載入該電子運算裝置的作業系統之至少一核心模組並據以啟動儲存於該儲存裝置之資料保護程式。 監測步驟,其藉由該至少一核心模組及該資料保護程式執行並包括:(a1)針對該電子運算裝置中任何被存取之檔案,監測該被存取之檔案、對應於該被存取之檔案的存取來源程序及該存取來源程序之相關程序模組/子程式以判斷是否有異常;(b1)若步驟(a1)判斷該被存取之檔案、該存取來源程序、該存取來源程序之相關程序模組/子程式中之至少一者有異常時,則禁用該有異常者;若無異常時,則放行。檔案存取步驟,其藉由該至少一核心模組及該資料保護程式執行並包括:(a2)進行身分驗證並據以判斷是否允許於該儲存裝置中存取加密檔案;(b2)當該電子運算裝置存取該加密檔 案時,藉由該監測步驟針對該加密檔案進行監測。其中該資料保護方法係基於上述步驟而對該儲存裝置和該電子運算裝置的所有記憶裝置進行:監測、掃毒、解毒之至少任一種動作。 According to an aspect of the present invention, a data protection method for a storage device is provided, which includes: a startup step, a monitoring step, and a file access step. The initiating step includes: when a storage device is connected to the data interface of the electronic computing device, loading at least one core module of the operating system of the electronic computing device and initiating the data protection program stored in the storage device. a monitoring step performed by the at least one core module and the data protection program and comprising: (a1) monitoring the accessed file for any accessed file in the electronic computing device, corresponding to the stored file Obtaining the access source program of the file and the related program module/subprogram of the access source program to determine whether there is an abnormality; (b1) if the step (a1) determines the accessed file, the access source program, If at least one of the relevant program modules/subprograms of the access source program has an abnormality, the abnormality is disabled; if there is no abnormality, the release is performed. a file accessing step performed by the at least one core module and the data protection program and comprising: (a2) performing identity verification and determining whether access to the encrypted file is permitted in the storage device; (b2) when The electronic computing device accesses the encrypted file At the time of the case, the encrypted file is monitored by the monitoring step. The data protection method performs at least one of monitoring, virusing, and detoxification on the storage device and all the memory devices of the electronic computing device based on the above steps.

在一實施例中,若身分驗證通過,則允許於該儲存裝置中存取加密檔案;若身分驗證沒有通過,則該作業系統將無法存取加密檔案。 In an embodiment, if the identity verification is passed, the encrypted file is allowed to be accessed in the storage device; if the identity verification fails, the operating system cannot access the encrypted file.

在一實施例中,該資料保護方法更包括:依據該資料保護方法基於上述步驟而對該儲存裝置和該電子運算裝置的所有記憶裝置進行之:監測、掃毒、解毒之至少任一種動作以產生偵測處理結果。舉例而言,在一些實施例中,亦可對該儲存裝置(如加密檔案)及該電子運算裝置中所有的記憶裝置(如系統記憶體等內建或外接記憶裝置)進行主動或被動式監測、掃毒、解毒、以及相關之消毒動作之至少一種處理動作並產生偵測處理結果;該等結果亦可統稱為「偵防解」結果。 In an embodiment, the data protection method further comprises: performing, according to the data protection method, the storage device and all the memory devices of the electronic computing device based on the foregoing steps: at least one of monitoring, scanning, and detoxification Generate detection processing results. For example, in some embodiments, the storage device (such as an encrypted file) and all the memory devices in the electronic computing device (such as built-in or external memory devices such as system memory) may be actively or passively monitored, At least one of the processing actions of the anti-virus, detoxification, and related disinfection actions and the detection processing results; the results may also be collectively referred to as the "detection and prevention" results.

在一實施例中,該資料保護方法更包括:基於該偵測處理結果產生偵防解結果的記錄資料並儲存於該儲存裝置中。 In an embodiment, the data protection method further comprises: generating, according to the detection processing result, the record data of the detection and resolution result and storing in the storage device.

在一實施例中,該資料保護方法更包括:判斷該電子運算裝置是否能夠與遠端之伺服器建立通訊連結,若是則將該偵防解結果的記錄資料傳送至該伺服器。 In an embodiment, the data protection method further comprises: determining whether the electronic computing device can establish a communication connection with the remote server, and if so, transmitting the recorded data of the detection and resolution result to the server.

依據本發明之另一方面,提供一種儲存裝置,其為電腦可讀寫記錄媒體,該儲存裝置至少儲存資料保護程式,當一電子運算裝置載入該資料保護程式後,可執行如前述任一實施例所述之資料保護方法。該儲存裝置如USB隨身碟、SD記憶卡、隨身硬碟、固態硬碟、或可讀寫DVD光碟等各種可讀寫之記錄媒體。 According to another aspect of the present invention, a storage device is provided, which is a computer readable and writable recording medium, and the storage device stores at least a data protection program. When an electronic computing device loads the data protection program, the executable device can perform any of the foregoing The data protection method described in the examples. The storage device is a variety of readable and writable recording media such as a USB flash drive, an SD memory card, a portable hard disk, a solid state hard disk, or a readable and writable DVD.

在該儲存裝置之一實施例中,該儲存裝置包括:資料介面,其用以與電子運算裝置電性耦接;及記憶單元,其耦接於該資料介面並用以至少儲存該資料保護程式。 In one embodiment of the storage device, the storage device includes: a data interface electrically coupled to the electronic computing device; and a memory unit coupled to the data interface and configured to store at least the data protection program.

依據本發明之另一方面,提供一種資料保護系統,其包括:前述之任一實施例中之電子運算裝置及儲存裝置。 According to another aspect of the present invention, a data protection system is provided, comprising: the electronic computing device and the storage device in any of the foregoing embodiments.

在該資料保護系統之一實施例中,該資料保護系統更包括:伺服器,其中該電子運算裝置用以判斷該電子運算裝置是否能夠與遠端之伺服器建立通訊連結,若是則將主動/被動式監測、掃毒、解毒、以及相關之消毒動作等偵防解結果的記錄資料傳送至該伺服器;若否,則將該主動/被動式監測、掃毒、解毒、以及相關之消毒動作等偵防解結果的記錄資料儲存於該儲存裝置。 In an embodiment of the data protection system, the data protection system further includes: a server, wherein the electronic computing device is configured to determine whether the electronic computing device can establish a communication connection with a remote server, and if yes, actively/ Record data of passive detection, anti-virus, detoxification, and related disinfection actions are transmitted to the server; if not, the active/passive monitoring, anti-virus, detoxification, and related disinfection actions are detected The recorded data of the resolution result is stored in the storage device.

10‧‧‧電子運算裝置 10‧‧‧Electronic computing device

20‧‧‧儲存裝置 20‧‧‧Storage device

30‧‧‧網路 30‧‧‧Network

40‧‧‧伺服器 40‧‧‧Server

110‧‧‧處理單元 110‧‧‧Processing unit

120‧‧‧輸入裝置 120‧‧‧Input device

130‧‧‧顯示單元 130‧‧‧Display unit

140‧‧‧本機記憶裝置 140‧‧‧Local memory device

150‧‧‧記憶單元 150‧‧‧ memory unit

151‧‧‧作業系統 151‧‧‧ operating system

153‧‧‧核心模組 153‧‧‧core module

160‧‧‧資料介面 160‧‧‧Information interface

170‧‧‧通訊介面 170‧‧‧Communication interface

210‧‧‧記憶單元 210‧‧‧ memory unit

220‧‧‧控制單元 220‧‧‧Control unit

230‧‧‧資料介面 230‧‧‧Information interface

240‧‧‧資料保護程式 240‧‧‧Data Protection Program

241‧‧‧防毒引擎模組 241‧‧‧Antivirus engine module

242‧‧‧輔助防毒引擎模組 242‧‧‧Auxiliary Antivirus Engine Module

243‧‧‧加解密模組 243‧‧‧Addition and decryption module

245‧‧‧檔案同步模組 245‧‧‧File Synchronization Module

247‧‧‧記錄模組 247‧‧‧recording module

249‧‧‧資料更新模組 249‧‧‧Information update module

圖1顯示儲存裝置與電子運算裝置連接之資料保護系統之一實施例的示意方塊圖。 1 shows a schematic block diagram of one embodiment of a data protection system in which a storage device is coupled to an electronic computing device.

圖2顯示儲存裝置之一實施例的示意方塊圖。 Figure 2 shows a schematic block diagram of one embodiment of a storage device.

圖3顯示資料保護方法之一實施例的示意方塊圖。 Figure 3 shows a schematic block diagram of one embodiment of a data protection method.

圖4顯示資料保護系統之另一實施例的示意方塊圖。 Figure 4 shows a schematic block diagram of another embodiment of a data protection system.

圖5顯示用於實現資料保護方法之軟體架構之一實施例的示意方塊圖。 Figure 5 shows a schematic block diagram of one embodiment of a software architecture for implementing a data protection method.

圖6顯示用於實現資料保護方法之軟體架構之一實施例的示意方塊圖。 6 shows a schematic block diagram of one embodiment of a software architecture for implementing a data protection method.

以下試舉儲存裝置及其資料保護方法與資料保護系統的多個實施例,從而說明本發明之不同方面的實施方式。 Embodiments of the test storage device and its data protection method and data protection system are described below to illustrate embodiments of different aspects of the present invention.

以下實施例所揭示之儲存裝置及其資料保護方法與資料保護系統。舉例而言,能有效地防止該儲存裝置內的加密資料被綁架與被惡意軟體感染入侵中毒,亦能預防惡意軟體病毒散播到其它非加密的記憶裝置,也能夠對該儲存裝置連接之電子運算裝置(如筆電、桌電、或智慧型裝置)的所有的記憶裝置(如系統記憶體、硬碟等)進行主動/被動式監測、掃毒、解毒、以及相關之消毒動作中任一種動作。舉例而言,儲存裝置內建主動啟動之資料保護程式(譬如防毒與加解密引擎)和動態空間分割之資料加密空間。 The storage device and the data protection method and the data protection system disclosed in the following embodiments. For example, the encrypted data in the storage device can be effectively prevented from being abducted and infected by malicious software, and the malicious software can be prevented from being transmitted to other non-encrypted memory devices, and the electronic connection of the storage device can also be connected. All memory devices (such as system memory, hard disk, etc.) of devices (such as notebooks, desks, or smart devices) perform any of active/passive monitoring, anti-virus, detoxification, and related disinfection actions. For example, the storage device has a built-in data protection program (such as an antivirus and encryption/decryption engine) and a dynamic space segmentation data encryption space.

在一些實施例中,該儲存裝置之資料保護程式更可以與電腦所儲存的檔案進行同步,以對電腦中的資料進行安全的備份。 In some embodiments, the data protection program of the storage device can be synchronized with the file stored by the computer to securely back up the data in the computer.

此外,在一些實施例中,該儲存裝置之資料保護程式更可以將檔案被存取的記錄儲存至該儲存裝置中及/或藉由該儲存裝置所連接的電腦的通訊介面而將該等記錄傳送到遠端的伺服器40,例如進一步進行資料安全的記錄及監測。 In addition, in some embodiments, the data protection program of the storage device can store the records accessed by the file into the storage device and/or record the records through the communication interface of the computer connected to the storage device. The server 40 is transmitted to the remote end, for example, to further record and monitor data security.

圖1顯示儲存裝置與電子運算裝置連接之資料保護系統之一實施例的示意方塊圖。如圖1所示,電子運算裝置10是指具有運算能力的電子裝置,譬如電腦,如伺服器40、刀鋒伺服器40、工業型電腦、個人電腦、筆記型電腦、平板電腦、或行動裝置如手機等,或泛指任何可執行程式之電子裝置或設備,如任何含有嵌入式系統(embedded system)的電子裝置或設備,譬如工業製造或控制用之機台。故此,舉例而言,如圖1所示,電子運算裝置10可包括:處理單元110、輸入裝置120、顯示單元130、本機記憶裝置140、記憶單元150、資料介面160。資料介面160例如是能夠連接(或存取)USB隨身碟、SD記憶卡、隨身硬碟、固態硬碟、可讀寫DVD光碟等各種可讀寫之記錄媒體之任一種的連接端。然而,本發明對於電子運算裝置的架構及元件並不作限制。 1 shows a schematic block diagram of one embodiment of a data protection system in which a storage device is coupled to an electronic computing device. As shown in FIG. 1, the electronic computing device 10 refers to an electronic device having computing power, such as a computer, such as a server 40, a blade server 40, an industrial computer, a personal computer, a notebook computer, a tablet computer, or a mobile device. A mobile phone or the like, or an electronic device or device of any executable program, such as any electronic device or device containing an embedded system, such as a machine for industrial manufacturing or control. Therefore, for example, as shown in FIG. 1 , the electronic computing device 10 can include a processing unit 110 , an input device 120 , a display unit 130 , a local memory device 140 , a memory unit 150 , and a data interface 160 . The data interface 160 is, for example, a connection terminal capable of connecting (or accessing) any of various readable and writable recording media such as a USB flash drive, an SD memory card, a portable hard disk, a solid state hard disk, and a readable and writable DVD. However, the present invention is not limited to the architecture and components of the electronic computing device.

此外,儲存裝置20可以是任何可讀寫之記錄媒體,如USB隨身碟、SD記憶卡、隨身硬碟、固態硬碟、可讀寫DVD光碟等各種可讀寫之記錄媒體。舉例而言,圖2顯示儲存裝置20之一實施例的示意方塊圖。 如圖2所示,儲存裝置20包括記憶單元210、控制單元220、資料介面230,其中記憶單元210、資料介面230電性耦接於控制單元220。舉例而言,記憶單元210是非揮發性記憶體,如快閃記憶體;資料介面230是USB或記憶卡的資料介面,電性耦接於控制單元220;控制單元220用以處理從資料介面230接收的存取要求,從而對記憶單元210進行資料存取。如本實施例所示,該儲存裝置可指各種對電子運算裝置而言外接的儲存裝置,然而本發明對儲存裝置是否外接式並沒有限制,故亦可將本發明應用於內接式儲存裝置。 In addition, the storage device 20 can be any readable and writable recording medium, such as a USB flash drive, an SD memory card, a portable hard disk, a solid state hard disk, a readable and writable DVD, and the like. For example, FIG. 2 shows a schematic block diagram of one embodiment of a storage device 20. As shown in FIG. 2, the storage device 20 includes a memory unit 210, a control unit 220, and a data interface 230. The memory unit 210 and the data interface 230 are electrically coupled to the control unit 220. For example, the memory unit 210 is a non-volatile memory, such as a flash memory. The data interface 230 is a data interface of a USB or a memory card, and is electrically coupled to the control unit 220. The control unit 220 is configured to process the data interface 230. The access request is received, thereby performing data access to the memory unit 210. As shown in this embodiment, the storage device may refer to various storage devices external to the electronic computing device. However, the present invention is not limited to whether the storage device is externally connected, and thus the present invention can also be applied to an internal storage device. .

另外,如圖2所示,儲存裝置20的記憶單元210至少儲存了資料保護程式240。當儲存裝置20連接至電子運算裝置10的資料介面160時,電子運算裝置10之核心模組153及儲存裝置20之該資料保護程式240係被作業系統151載入,從而用以對儲存裝置20以及電子運算裝置10的所有記憶裝置(如記憶單元150、本機記憶裝置140)進行檔案存取監測或防毒掃瞄等動作。舉例而言,可實現資料保護程式240用於即時監測系統關鍵區域,如系統記憶體、啟動物件、開機磁區;此外,使用者亦可以利用資料保護程式240來手動掃瞄指定檔案或目錄等。 In addition, as shown in FIG. 2, the memory unit 210 of the storage device 20 stores at least the data protection program 240. When the storage device 20 is connected to the data interface 160 of the electronic computing device 10, the core module 153 of the electronic computing device 10 and the data protection program 240 of the storage device 20 are loaded by the operating system 151 for use in the storage device 20 And all the memory devices (such as the memory unit 150 and the local memory device 140) of the electronic computing device 10 perform operations such as file access monitoring or anti-virus scanning. For example, the data protection program 240 can be used to instantly monitor key areas of the system, such as system memory, boot objects, and boot magnetic areas. In addition, the user can also use the data protection program 240 to manually scan specified files or directories. .

此外,儲存裝置20的記憶單元210更用於提供資料加密空間250,且藉由進行身分驗證(如以密碼)來保護使用者的資料,故可稱之為「加密碟」。換言之,電子運算裝置10欲寫入檔案至儲存裝置20時必須經過核心模組153及/或資料保護程式240加密;當電子運算裝置10欲讀取儲存裝置20中的加密檔案時必須經過核心模組153及/或資料保護程式240解密。加解密的方式例如是基於身分驗證的條件(如密碼、其他 驗證條件、其他憑證條件、或上述任何之組合)以RSA-2048、RSA-4096、或AES-128、AES-256等方式中之至少一種來進行加密或解密,然而,本發明實現時採用的加解密的方式並不受上述例子限制。 In addition, the memory unit 210 of the storage device 20 is further configured to provide the data encryption space 250, and protects the user's data by performing identity verification (eg, using a password), so it may be referred to as an "encrypted disc." In other words, the electronic computing device 10 must be encrypted by the core module 153 and/or the data protection program 240 when writing the file to the storage device 20; when the electronic computing device 10 wants to read the encrypted file in the storage device 20, it must pass through the core module. Group 153 and/or data protection program 240 decrypt. The method of encryption and decryption is based on the conditions of identity verification (such as password, other The verification condition, other credential conditions, or any combination thereof is encrypted or decrypted in at least one of RSA-2048, RSA-4096, or AES-128, AES-256, etc., however, the present invention is implemented The way of encryption and decryption is not limited by the above examples.

再者,當儲存裝置20在未登入至電子運算裝置10之作業系統151之前,對電子運算裝置10之作業系統151而言,儲存裝置20的加密空間250是隱藏式的,電腦病毒會找不到隱藏之「加密碟」,所以無法感染或綁架儲存裝置20。當儲存裝置20在登入至電子運算裝置10之作業系統151之後,核心模組153及資料保護程式240進行檔案存取監測以保護「加密碟」和電子運算裝置10。由此,通過上述核心模組153及資料保護程式240的防毒監測及「加密碟」的雙重保護功能可有效防止電腦病毒感染到「加密碟」,更可防止綁架勒贖病毒。 Moreover, when the storage device 20 is not logged into the operating system 151 of the electronic computing device 10, the operating space 151 of the electronic computing device 10, the encrypted space 250 of the storage device 20 is hidden, and the computer virus will not find It is impossible to infect or abduct the storage device 20 to the hidden "encrypted disc". After the storage device 20 is logged into the operating system 151 of the electronic computing device 10, the core module 153 and the data protection program 240 perform file access monitoring to protect the "encrypted disk" and the electronic computing device 10. Therefore, the anti-virus monitoring of the core module 153 and the data protection program 240 and the dual protection function of the "encrypted disc" can effectively prevent the computer virus from being infected with the "encrypted disc" and prevent the kidnapping virus.

以下進一步揭示資料保護方法之實施例。圖3顯示資料保護方法之一實施例的示意方塊圖。如圖3所示之實施例,儲存裝置20之資料保護方法至少包括步驟S10、S20、及S30。由此在實作時,可基於該資料保護方法來實現前述核心模組153及資料保護程式240,以達成前述防毒監測及「加密碟」的雙重保護功能。 Embodiments of the data protection method are further disclosed below. Figure 3 shows a schematic block diagram of one embodiment of a data protection method. As shown in the embodiment of FIG. 3, the data protection method of the storage device 20 includes at least steps S10, S20, and S30. Therefore, in the implementation, the core module 153 and the data protection program 240 can be implemented based on the data protection method to achieve the dual protection function of the antivirus monitoring and the "encrypted disc".

在圖3中,如步驟S10所示之啟動步驟,當儲存裝置20連接至電子運算裝置10的資料介面時,載入該電子運算裝置10的作業系統151之核心模組153並據以啟動儲存於該儲存裝置20之資料保護程式240。 在此,核心模組153譬如驅動程式、動態連結庫(DLL)、共享程式庫、以至任何關於作業系統或核心使用的程式模組。此外,對於在本文中所述的核心模組153,本領域中具有通常知識者亦可瞭解其可按照實作時的需要而實現為一個或多個核心模組;又對於本文中所述的資料保護程式240,亦是如此。 In FIG. 3, in the startup step shown in step S10, when the storage device 20 is connected to the data interface of the electronic computing device 10, the core module 153 of the operating system 151 of the electronic computing device 10 is loaded and started to be stored. The data protection program 240 of the storage device 20. Here, the core module 153 is, for example, a driver, a dynamic link library (DLL), a shared library, or any program module used for the operating system or the core. In addition, for the core module 153 described herein, those of ordinary skill in the art can also understand that it can be implemented as one or more core modules according to the needs of the implementation; The same is true for the data protection program 240.

如步驟S20所示之監測步驟,其藉由至少該核心模組153及該資料保護程式240執行以對電子運算裝置10中任何被存取之檔案進行監測,對於有異常之檔案進行防毒之進一步處理。 The monitoring step shown in step S20 is performed by at least the core module 153 and the data protection program 240 to monitor any accessed file in the electronic computing device 10, and further antivirus for the abnormal file. deal with.

舉例而言,步驟S20可以包括以下步驟。如圖3所示之步驟S210,針對該電子運算裝置10中任何被存取之檔案,監測該被存取之檔案、對應於該被存取之檔案的存取來源程序及該存取來源程序之相關程序模組/子程式以判斷是否有異常。如圖3所示之步驟S220,若步驟S210判斷該被存取之檔案、該存取來源程序、該存取來源程序之相關程序模組/子程式中之至少一者有異常時,則禁用該有異常者。若無異常時,則放行,如步驟S230所示,其中放行是指允許該程序或模組之執行,或其任何動作、請求、或存取等操作。舉例而言,在上述步驟中,該電子運算裝置10中任何被存取之檔案可以至少包括:程式或作業系統將要存取的檔案(或稱欲被存取的檔案)、正在被存取的檔案。 For example, step S20 may include the following steps. As shown in step S210 of FIG. 3, the accessed file, the access source program corresponding to the accessed file, and the access source program are monitored for any accessed file in the electronic computing device 10. The relevant program module/subprogram to determine if there is an exception. Step S220, as shown in FIG. 3, if it is determined in step S210 that at least one of the accessed file, the access source program, and the related program module/subprogram of the access source program is abnormal, then the process is disabled. There are abnormalities. If there is no abnormality, the release is performed, as shown in step S230, wherein the release refers to the execution of the program or module, or any action, request, or access thereof. For example, in the above steps, any accessed file in the electronic computing device 10 may include at least: a file to be accessed by the program or the operating system (or a file to be accessed), being accessed. file.

如步驟S30所示之檔案存取步驟,其藉由至少該核心模組153及該資料保護程式240執行以判斷是否允許電子運算裝置10對儲存裝置20中加密空間250的存取要求,其中會利用步驟S20來對儲存裝置20中加密空間250中被存取之的檔案進行監測。此外,存加密檔案是指將檔案加密後儲存;取加密文件即將文件解密後讀出。 The file accessing step, as shown in step S30, is performed by at least the core module 153 and the data protection program 240 to determine whether to allow the electronic computing device 10 to access the encrypted space 250 in the storage device 20, wherein The file accessed in the encrypted space 250 in the storage device 20 is monitored by step S20. In addition, storing the encrypted file means that the file is encrypted and stored; and the encrypted file is read after decrypting the file.

舉例而言,步驟S30可以包括以下步驟。如圖3所示之步驟S310,進行身分驗證並據以判斷是否允許於該儲存裝置20中存取加密檔案。如圖3所示之步驟S320,若身分驗證通過(如使用者輸入的密碼正確而與系統中已存在者符合),則允許於該儲存裝置20中存取加密檔案,其中當該電子運算裝置10存取該加密檔案時,藉由該步驟S20所示之監測步驟針對該加密檔案進行監測。如圖3所示之步驟S330,若身分驗證沒有通過(如該密碼不正確),則不允許該電子運算裝置10存取該加密檔案。 For example, step S30 may include the following steps. In step S310 shown in FIG. 3, identity verification is performed and it is determined whether access to the encrypted file is permitted in the storage device 20. In step S320, as shown in FIG. 3, if the identity verification is passed (if the password entered by the user is correct and matches the existing one in the system), the encrypted file is allowed to be accessed in the storage device 20, wherein the electronic computing device When the encrypted file is accessed by 10, the encrypted file is monitored by the monitoring step shown in step S20. In step S330 shown in FIG. 3, if the identity verification fails (if the password is incorrect), the electronic computing device 10 is not allowed to access the encrypted file.

舉例而言,對於作業系統151來說,該儲存裝置20中所存取的加密檔案(或加密空間250)的格式或其檔案系統係實現為不同於作業系統151(諸如Windows、Mac、或Linux)所使用的檔案系統(諸如FAT、exFAT、NTFS、HFS、HFS+、ext2、ext3、ext4、ISO9660、ODS-5、或UDF),故作業系統151是無法得知該儲存裝置20中有加密檔案(或加密空間250)。換句話說,該儲存裝置20中的加密檔案(或加密空間250)對作業系統151而言是「隱藏」起來的。故此,藉由執行步驟S320,若身分驗證通過,則允許於該儲存裝置20中存取加密檔案(或加密空間250),其中當該電子運算裝置10存取該加密檔案時,藉由該步驟S20所示之監測步驟針對該加密檔案進行監測。於此,在實作時可於核心模組153及/或資料保護程式240中以加解密模組來讀取該加密檔案或寫入加密檔案。在如步驟S330所示之身分驗證沒有通過的情況下,作業系統151是無法得知該儲存裝置20中有加密檔案(或加密空間250)。故此,不論身分驗證通過與否,或即便電腦毒病已入侵到電子運算裝置10中,電腦毒病亦無法進一步感染、破壞、或綁架該儲存裝置20中的加密檔案(或加密空間250)。此外,該儲存裝置20中加密檔案(或加密空間250)的格式或其檔案系統,例如是以將前述之任一種檔案系統或檔案格式(諸如FAT、exFAT、NTFS、HFS、HFS+、ext2、ext3、ext4、ISO9660、ODS-5、或UDF等)中的一項或多項的參數改變而產生的新檔案系統或檔案格式。如此,新檔案系統或檔案格式即與習知檔案系統或檔案格式不能相容,藉由使用該新檔案系統或檔案格式於加密檔案,將使作業系統151無法得知該儲存裝置20中有加密檔案。然而,本發明之加密檔案(或加密空間250)的格式或其檔案系統的實現方式,並不受此例子限制,當可作其他方式實現。此外,相對於此加密空間250,資料保護程式240所在的儲存空間係 有別於加密空間250,並且該儲存空間的檔案格式或檔案系統可被實現為電子運算裝置10可讀取或可讀寫。 For example, for the operating system 151, the format of the encrypted file (or encrypted space 250) accessed in the storage device 20 or its file system is implemented differently from the operating system 151 (such as Windows, Mac, or Linux). The file system used (such as FAT, exFAT, NTFS, HFS, HFS+, ext2, ext3, ext4, ISO9660, ODS-5, or UDF), so the operating system 151 cannot know that there is an encrypted file in the storage device 20. (or encryption space 250). In other words, the encrypted file (or encrypted space 250) in the storage device 20 is "hidden" to the operating system 151. Therefore, by performing step S320, if the identity verification is passed, the encrypted file (or the encrypted space 250) is allowed to be accessed in the storage device 20, wherein the electronic computing device 10 accesses the encrypted file by using the step. The monitoring step shown in S20 monitors the encrypted file. In this case, the encrypted file or the encrypted file can be read by the encryption and decryption module in the core module 153 and/or the data protection program 240 during the implementation. In the case where the identity verification as shown in step S330 does not pass, the operating system 151 cannot know that there is an encrypted file (or the encrypted space 250) in the storage device 20. Therefore, whether the identity verification passes or not, or even if the computer poison has invaded the electronic computing device 10, the computer poison cannot further infect, destroy, or abduct the encrypted file (or the encrypted space 250) in the storage device 20. In addition, the format of the encrypted file (or the encrypted space 250) in the storage device 20 or its file system is, for example, in any of the foregoing file systems or file formats (such as FAT, exFAT, NTFS, HFS, HFS+, ext2, ext3). A new file system or file format resulting from a change in one or more of the parameters, ext4, ISO9660, ODS-5, or UDF, etc.). Thus, the new file system or file format is incompatible with the conventional file system or file format. By using the new file system or file format for encrypting the file, the operating system 151 will not be able to know that the storage device 20 has encryption. file. However, the format of the encrypted file (or encrypted space 250) of the present invention or the implementation of its file system is not limited by this example, and may be implemented in other ways. In addition, the storage space in which the data protection program 240 is located is relative to the encryption space 250. Different from the encryption space 250, the file format or file system of the storage space can be implemented as readable or readable and writable by the electronic computing device 10.

另外,舉例而言,在本發明的另一些實施例中,可利用其他身分驗證方式如生物辨識(如指紋、人臉、虹膜、或指紋靜脈)來實現步驟S30中的驗證動作,或是將密碼驗證及其他驗證方式結合從而判斷是否允許存取。在一些實施例中,亦可利用憑證卡來進行身分驗證。在實現生物辨識與密碼驗證時,在一些實施例中,可利用該電子運算裝置10中的處理單元110以及其他如該電子運算裝置10的內建或外接之攝影機、及/或指紋辨識裝置、及/或其他生物辨識裝置來達成。故此,本發明對於上述步驟S30的驗證方式並不僅限於密碼驗證;譬如,使用者亦可利用憑證卡、憑證物件(手環或任何物件),透過電子運算裝置10內建或外接之憑證讀卡機、及/或憑證讀取器來達成。再者,加解密的方式例如是基於身分驗證的條件(如密碼、其他驗證條件、其他憑證條件、或上述任何之組合)以RSA-2048、RSA-4096、或AES-128、AES-256等方式中之至少一種來進行加密或解密;然而,本發明實現時採用的加解密的方式並不受上述例子限制。 In addition, for example, in other embodiments of the present invention, other authentication methods such as biometrics (such as fingerprints, faces, irises, or fingerprint veins) may be utilized to implement the verification action in step S30, or Password verification and other verification methods are combined to determine whether access is allowed. In some embodiments, the credential card can also be utilized for identity verification. In the implementation of biometric identification and password verification, in some embodiments, the processing unit 110 in the electronic computing device 10 and other built-in or external cameras such as the electronic computing device 10, and/or fingerprint identification devices, And / or other biometric devices to achieve. Therefore, the verification method of the above step S30 is not limited to password verification; for example, the user can use the voucher card, the voucher object (bracelet or any object) to read the card through the built-in or external certificate of the electronic computing device 10. Machine, and / or credential reader to achieve. Furthermore, the encryption and decryption method is based on conditions of identity verification (such as passwords, other verification conditions, other voucher conditions, or any combination of the above), such as RSA-2048, RSA-4096, or AES-128, AES-256, etc. At least one of the modes is used for encryption or decryption; however, the manner of encryption and decryption employed in the implementation of the present invention is not limited by the above examples.

在一實施例中,在電子運算裝置10的作業系統151中,可分別建立至少兩個或多個執行緒來實現步驟S20及步驟S30,使其同時執行;藉此,前述防毒監測及「加密碟」的雙重保護功能得以實現並同步進行。 In an embodiment, in the operating system 151 of the electronic computing device 10, at least two or more threads may be respectively established to implement steps S20 and S30 to be simultaneously executed; thereby, the foregoing antivirus monitoring and "encryption" The dual protection function of the disc is realized and synchronized.

此外,在一些實施例中,步驟S20更可包括:截斷儲存裝置20內自動執行之程式及/或描述式語言文件,以防止惡意軟體病毒散播。 In addition, in some embodiments, step S20 may further include: cutting off automatically executed programs and/or descriptive language files in the storage device 20 to prevent malicious software viruses from being distributed.

在一實施例中,在上述步驟S220後,更可包括對有異常者(或稱為有異常物件),進行額外的處理。例如,對有異常的物件進行消毒或隔離,或在使用者確認下刪除之處理。 In an embodiment, after the step S220, the method further includes performing additional processing on the abnormal person (or called an abnormal object). For example, disinfecting or isolating an object with an abnormality, or deleting it under user confirmation.

在一實施例中,在步驟S320之後,該資料保護方法更可包括:檔案同步步驟。該檔案同步驟包括:在接收檔案同步指示,並將該電子運算裝置10中被選擇之檔案及其路徑經加密後儲存於該儲存裝置20中。 此外,在實現時,當可設計令資料保護程式240提供圖型使用者介面或指令介面,從而設相關之檔案同步的條件,例如同步的時間、同步的方向(電子運算裝置10或儲存裝置20之一者為來源)等設定。由此,使用者可以獲得安全備份的效果。譬如,當該電子運算裝置10中被選擇之檔案受損或不小心刪除時,可以藉由該儲存裝置20之同步功能而還原至該電子運算裝置10中。又例如當該電子運算裝置10在沒有使用該儲存裝置20的狀況下被電腦病毒綁架時,即可利用「加密碟」備份資料同步回該電子運算裝置10即可還原被綁架的檔案。 In an embodiment, after step S320, the data protection method may further include: a file synchronization step. The same step of the file includes: receiving the file synchronization indication, and encrypting the selected file and its path in the electronic computing device 10 and storing the file in the storage device 20. In addition, when implemented, the data protection program 240 can be designed to provide a graphical user interface or an instruction interface, thereby setting conditions for the associated file synchronization, such as synchronization time, synchronization direction (electronic computing device 10 or storage device 20). One is set for the source). Thus, the user can obtain the effect of a secure backup. For example, when the selected file in the electronic computing device 10 is damaged or accidentally deleted, it can be restored to the electronic computing device 10 by the synchronization function of the storage device 20. For example, when the electronic computing device 10 is kidnapped by a computer virus without using the storage device 20, the "encrypted disc" backup data can be synchronized back to the electronic computing device 10 to restore the abducted file.

此外,在一些實施例中,更可將偵測、防毒、或解毒(以下簡稱為「偵防毒」)之結果記錄及/或傳送至伺服器40以便做儲存裝置20之資料安全管理。在該等實施例之一者中,可基於圖3之任一實施例並且實現步驟S210使之包括:監測該電子運算裝置10中任何被存取的檔案,以產生第一監測結果;監測對應於該被存取的檔案的存取來源程序及該存取來源程序之相關程序模組及/或子程序,以產生第二監測結果。此外,在該等實施例之另一者中,亦可對儲存裝置20以及儲存裝置20連接之電子運算裝置10之所有的記憶裝置(如系統記憶體等)之至少一者進行主動或被動式監測、掃毒、解毒、以及相關之消毒動作中之至少一種處理動作並產生偵測處理結果,該等結果可統稱為「偵防解」結果。舉例而言,偵防解結果可以是關於該檔案或程序等(或可稱為物件)的名稱、識別碼、路徑、操作行為、是否有異常等之至少一者。在該等實施例之一者中,可基於圖3之任一實施例並且包括:基於該偵測處理結果產生偵防解結果的記 錄資料並儲存於該儲存裝置20中。此外,該記錄資料亦不限於偵防解結果,亦更可包括其他資訊。 In addition, in some embodiments, the results of detection, anti-virus, or detoxification (hereinafter referred to as "detection") may be recorded and/or transmitted to the server 40 for data security management of the storage device 20. In one of the embodiments, based on any of the embodiments of FIG. 3 and implementing step S210, the method includes: monitoring any accessed file in the electronic computing device 10 to generate a first monitoring result; monitoring the corresponding An access source program of the accessed file and a related program module and/or subroutine of the access source program to generate a second monitoring result. In addition, in the other of the embodiments, at least one of all the memory devices (such as system memory, etc.) of the electronic computing device 10 to which the storage device 20 and the storage device 20 are connected may be actively or passively monitored. At least one of the anti-virus, detoxification, and related disinfection actions and the detection processing result, which may be collectively referred to as the "detection and defense solution" result. For example, the defensive solution result may be at least one of a name, an identification code, a path, an operational behavior, an abnormality, and the like of the file or program or the like (or may be referred to as an object). In one of the embodiments, it may be based on any of the embodiments of FIG. 3 and includes: generating a record of the detection result based on the detection processing result The data is recorded and stored in the storage device 20. In addition, the record information is not limited to the results of the investigation and prevention, and may include other information.

在一些實施例中,更可進一步將該偵防解結果的記錄資料傳送至伺服器40,以便對儲存裝置20做資料安全管理。舉例而言,圖4顯示資料安全系統之另一實施例,其包括儲存裝置20、電子運算裝置10、伺服器40。該儲存裝置20是透過該電子運算裝置10及網路而與該伺服器40建立通訊連結,其中該伺服器40可視為另一電子運算裝置10。該等實施例之一者中,可基於圖3所示之資料保護方法,並進一步包括:判斷該儲存裝置20所連接之該電子運算裝置10是否能夠與該伺服器40建立通訊連結,若是則將該偵防解結果的記錄資料傳送至該伺服器40,以便做儲存裝置20之資料安全管理;若否,則將該偵防解結果的記錄資料儲存於該儲存裝置20。例如,該偵防解結果的記錄資料可儲存於該儲存裝置20中資料保護程式240所在的儲存空間或加密空間中。在該等實施例之另一者中,該資料保護方法更可包括:例如由該資料保護程式240及/或核心模組153於一定之時間間隔(如每3、5、10、或15分鐘或1小時)內或某些時間(如9:00、12:00、20:00)內,將上述偵防解結果(例如即時產生或已儲存於該儲存裝置20的偵防解結果)回傳給該伺服器40。此外,該等實施例亦可便於對複數個儲存裝置20做資料安全管理,如圖4所示,複數個內建有資料保護程式240的儲存裝置20、21,皆可依據上述實施例之任一者而記錄偵防解結果於儲存裝置20、21中,或者於可該電子運算裝置10能夠建立與該伺服器40之通訊連結之時,將偵防解結果傳送至該伺服器40。 藉此,管理者可以利用伺服器40所收到的偵防解結果進行分析與判斷,例如對有資訊安全之虞的儲存裝置21的使用者提出警告或記錄,或藉由資料保護程式240及/或核心模組153提出警告或阻止進一步存取該儲存裝置21中的檔案。此外,縱使有資料外漏的情況,亦可由偵防解結果中得知發 生問題的儲存裝置20、所連接之電腦、甚至相關的資料,可作進一步的追蹤。然而,本發明之實現方式並不受上述例子所限制。譬如,利用資料保護程式240及/或核心模組153來實現將監測記錄資料傳送至伺服器40之任一實施例。 In some embodiments, the record data of the defensive solution result may be further transmitted to the server 40 for data security management of the storage device 20. For example, FIG. 4 shows another embodiment of a data security system that includes a storage device 20, an electronic computing device 10, and a server 40. The storage device 20 establishes a communication link with the server 40 through the electronic computing device 10 and the network. The server 40 can be regarded as another electronic computing device 10. One of the embodiments may be based on the data protection method shown in FIG. 3, and further includes: determining whether the electronic computing device 10 to which the storage device 20 is connected can establish a communication connection with the server 40, and if so, The record data of the defensive solution result is transmitted to the server 40 for data security management of the storage device 20; if not, the record data of the defensive solution result is stored in the storage device 20. For example, the record data of the defensive solution result may be stored in the storage space or the encrypted space where the data protection program 240 is located in the storage device 20. In another of the embodiments, the data protection method may further include, for example, the data protection program 240 and/or the core module 153 at a certain time interval (eg, every 3, 5, 10, or 15 minutes). Or within 1 hour) or at certain times (such as 9:00, 12:00, 20:00), the above-mentioned detection and resolution results (for example, the results of the detection or prevention that are immediately generated or stored in the storage device 20) are returned. It is passed to the server 40. In addition, the embodiments can also facilitate data security management for a plurality of storage devices 20. As shown in FIG. 4, a plurality of storage devices 20 and 21 having a data protection program 240 can be used according to the above embodiments. The detection and resolution results are recorded in the storage devices 20, 21, or when the electronic computing device 10 can establish a communication connection with the server 40, the detection and resolution results are transmitted to the server 40. In this way, the administrator can use the detection and resolution results received by the server 40 to perform analysis and judgment, for example, to warn or record the user of the information security device 21, or by the data protection program 240 and / or the core module 153 issues a warning or prevents further access to the file in the storage device 21. In addition, even if there is data leakage, it can be known from the results of the investigation and prevention. The problematic storage device 20, the connected computer, and even related information can be further tracked. However, implementations of the invention are not limited by the examples described above. For example, the data protection program 240 and/or the core module 153 can be utilized to implement any of the embodiments for transmitting monitoring record data to the server 40.

以下進一步舉例說明該資料保護方法的各種實施方式,然而本發明的實現並不受其限制。 Various embodiments of the data protection method are further exemplified below, but the implementation of the present invention is not limited thereto.

以下討論關於核心模組153之實現方式。 The implementation of the core module 153 is discussed below.

在如圖3所示之實施例中,在該儲存裝置20連接至該電子運算裝置10之前,核心模組153已存在於或安裝於該電子運算裝置10的作業系統151中。在不同的作業系統151中,如以微軟視窗作業系統而言,核心模組153譬如是安裝於Windows\System32\drivers目錄下以.sys為副檔名的驅動程式,例如以「視窗驅動程式模型」(WDM)或「視窗驅動程式基礎」(WDF)或作業系統的應用程式介面(API)來實作。又例如以蘋果公司的Mac OS X作業系統而言,可利用「輸入/輸出套組」(I/O Kit)架構的應用程式介面(API)來實現該核心模組153。如例如,在谷歌的安卓作業系統(Google Android)而言,可利用「硬體抽象層」(HAL)及用戶層(User Space)的應用程式介面(API)來實現該核心模組153。然而,本發明之核心模組153的實現方式並不受上述例子限制,例如核心模組153更可以在其他作業系統(如Unix、Linux的各種版本、或其他實時作業系統、嵌入式系統的作業系統)上及/或利用其他應用程式介面(API)來實現。然而,本發明的核心模組153之實現方式並不受上述例子所限制。 In the embodiment shown in FIG. 3, the core module 153 is already present in or installed in the operating system 151 of the electronic computing device 10 before the storage device 20 is coupled to the electronic computing device 10. In different operating systems 151, for example, in the Microsoft Windows operating system, the core module 153 is, for example, a driver installed under the Windows\System32\drivers directory with a .sys file name, for example, a "window driver model". (WDM) or "Windows Driver Foundation" (WDF) or the application interface (API) of the operating system to implement. For example, in the case of Apple's Mac OS X operating system, the core module 153 can be implemented using an application interface (API) of an "I/O Kit" architecture. For example, in Google's Android operating system (Google Android), the core module 153 can be implemented using an application interface (API) of a "Hardware Abstraction Layer" (HAL) and a User Space. However, the implementation of the core module 153 of the present invention is not limited by the above examples. For example, the core module 153 can be used in other operating systems (such as various versions of Unix, Linux, or other real-time operating systems, embedded systems). System(s) can be implemented on and/or using other application interfaces (APIs). However, the implementation of the core module 153 of the present invention is not limited by the above examples.

此外,核心模組153是用以監測作業系統151中任何檔案之寫入或讀取動作、及該檔案之相關程式、程式模組;舉例而言,該核心模組153用以監測被存取之檔案、對應於該被存取之檔案的存取來源程序及該存取來源程序之相關程序模組/子程式。換句話說,該核心模組153要 監測的對象包括對於以下硬體的檔案存取:該電子運算裝置10所連接的所有記憶裝置:諸如主記憶單元(如主記憶體等)、本機記憶裝置(如硬碟、光碟機等)、週邊記憶裝置(如隨身碟、或外接硬碟等)等。故此,該核心模組153亦可稱之為「檔案監測驅動程式」。舉例而言,核心模組153係針對該電子運算裝置10中任何程式的檔案或檔案夾的操作(如視窗作業系統中的檔案管理函式(File Management Functions)諸如ReadFile( )、WriteFile( )、CreateFile( )、OpenFile( )、Close( )等)進行監測,並進一步利用作業系統151的API進行回溯或反查的操作,從而將對應於該被存取之檔案的存取來源程序及該存取來源程序之相關程序模組/子程式做進一步的監測。然而,本發明之核心模組153的實現方式並不受上述例子限制,即核心模組153更可額外實現其他功能,並可按照需要而變更;例如,控制該儲存裝置20之檔案存取或判斷該檔案或程序模組是否有異常或其他功能。 In addition, the core module 153 is configured to monitor the writing or reading operation of any file in the operating system 151, and the related program and program module of the file; for example, the core module 153 is configured to monitor the accessed The file, the access source program corresponding to the accessed file, and the related program module/subprogram of the access source program. In other words, the core module 153 is The object of monitoring includes file access to the following hardware: all the memory devices connected to the electronic computing device 10: such as a main memory unit (such as main memory, etc.), a local memory device (such as a hard disk, a CD player, etc.) , peripheral memory devices (such as flash drives, or external hard drives, etc.). Therefore, the core module 153 can also be referred to as a "file monitoring driver." For example, the core module 153 is for the operation of files or folders of any program in the electronic computing device 10 (such as File Management Functions in the Windows operating system such as ReadFile( ), WriteFile( ), CreateFile( ), OpenFile( ), Close( ), etc. are monitored, and further use the API of the operating system 151 to perform a backtracking or reverse checking operation, thereby accessing the access source program corresponding to the accessed file and the The relevant program modules/subprograms of the source program are taken for further monitoring. However, the implementation of the core module 153 of the present invention is not limited by the above examples, that is, the core module 153 can additionally implement other functions, and can be changed as needed; for example, controlling file access of the storage device 20 or Determine if the file or program module has an exception or other function.

以下討論關於核心模組153、資料保護程式240主動被啟動之實現方式,以及快速啟動防毒監測及「加密碟」的雙重保護功能之作用。 The following discussion discusses the implementation of the core module 153, the data protection program 240 being actively activated, and the dual protection function of quickly launching antivirus monitoring and "encrypted disc".

在該作業系統151中,該核心模組153已建立起與該儲存裝置20、以及該儲存裝置20之資料保護程式240之間的關聯關係(association)的資訊,如核心模組153、資料保護程式240之路徑、檔案名稱及該儲存裝置20的識別碼等之集合,且記錄於作業系統151中;故此,在步驟S10所示之啟動步驟中,該電子運算裝置10的作業系統151載入該核心模組153並據以啟動該資料保護程式240。 In the operating system 151, the core module 153 has established information about the association between the storage device 20 and the data protection program 240 of the storage device 20, such as the core module 153 and data protection. The set of the path of the program 240, the file name, the identification code of the storage device 20, and the like are recorded in the operating system 151; therefore, in the startup step shown in step S10, the operating system 151 of the electronic computing device 10 is loaded. The core module 153 also activates the data protection program 240 accordingly.

此外,如前所述,當儲存裝置20在登入至電子運算裝置10之作業系統151之後,資料保護程式240進行檔案存取監測以保護「加密碟」和電子運算裝置10。也就是說,當作業系統151偵測到該儲存裝置20插入或連接於電子運算裝置10之時,隨即主動依據該儲存裝置20與該核心模組 153、以及該儲存裝置20之資料保護程式240之間的關聯關係的資訊而啟動該核心模組153及資料保護程式240,從而使前述防毒監測及「加密碟」的雙重保護功能得以實現並同步進行。 Moreover, as described above, after the storage device 20 is logged into the operating system 151 of the electronic computing device 10, the data protection program 240 performs file access monitoring to protect the "encrypted disk" and the electronic computing device 10. That is, when the operating system 151 detects that the storage device 20 is inserted or connected to the electronic computing device 10, the operating device 20 and the core module are actively activated. The core module 153 and the data protection program 240 are activated by the information of the association between the data protection program 240 of the storage device 20, so that the dual protection functions of the antivirus monitoring and the "encrypted disc" are realized and synchronized. get on.

故此,該資料保護方法的實現可以於該儲存裝置20連接至電子運算裝置10時,快速主動地啟動防毒監測及「加密碟」的雙重保護功能,如此使已常駐在電腦的病毒無法在該保護程式未被執行之前趁機感染該儲存裝置20。相較之下,習知技術之利用autorun.inf之具有獨立防毒能力的可攜式儲存裝置20插入電腦時,可攜式儲存裝置20的保護程式是被動的等待作業系統151的允許下而被啟動或等待使用者點擊而被啟動,故此會產生已常駐在電腦的病毒趁機在該可攜式儲存裝置20的保護程式未被執行之前感染該可攜式儲存裝置20的狀況。 Therefore, the data protection method can realize the dual protection function of the anti-virus monitoring and the "encrypted disc" quickly and actively when the storage device 20 is connected to the electronic computing device 10, so that the virus that has been resident in the computer cannot be protected. The storage device 20 is infected before the program is executed. In contrast, when the portable storage device 20 with independent antivirus capability of autorun.inf is inserted into the computer, the protection program of the portable storage device 20 is passively waiting for the permission of the operating system 151. The booting or waiting for the user to click is initiated, thus generating a situation in which the virus trap resident in the computer infects the portable storage device 20 before the protection program of the portable storage device 20 is executed.

以下討論關於核心模組153之安裝的實施例。 Embodiments regarding the installation of the core module 153 are discussed below.

本發明之資料保護方法的另一些實施例是關於:將該儲存裝置20連接至一台還未有安裝核心模組153的電子運算裝置的情形。舉例而言,該等實施例可視為基於圖3之任一實施例,並且在該啟動步驟S10以前,更包括:安裝步驟,其包含:安裝該核心模組153至該電子運算裝置10的作業系統151中。舉例而言,安裝該核心模組153的方式有:當該儲存裝置20連接至一台電子運算裝置10後,用手動方式啟動該儲存裝置20中關於資料保護且包含該核心模組153的安裝程式,從而安裝該核心模組153。再者,在該安裝步驟後更可進一步實現步驟S10所示之啟動步驟,以載入該核心模組153並據以啟動該資料保護程式240。 Still other embodiments of the data protection method of the present invention relate to the case where the storage device 20 is connected to an electronic computing device that does not have the core module 153 installed. For example, the embodiments may be considered to be based on any of the embodiments of FIG. 3, and before the starting step S10, further comprising: an installation step comprising: installing the core module 153 to the electronic computing device 10 In system 151. For example, the core module 153 is installed by manually starting the data protection in the storage device 20 and including the installation of the core module 153 after the storage device 20 is connected to an electronic computing device 10. The program thus installs the core module 153. Furthermore, after the installation step, the startup step shown in step S10 can be further implemented to load the core module 153 and activate the data protection program 240 accordingly.

然而,本發明並不受此例子之安裝方式限制,更可以其他方式來實現。例如,使用者可以自網路下載或經由其他方式取得關於資料保護且包含該核心模組153的安裝程式並安裝,以待儲存有資料保護程式240之該儲存裝置20連接時使用。另外,亦可實現作業系統151或客製化作業 系統151,使該核心模組153常駐於作業系統151中,或已存在於作業系統151中而有待需要時而被載入。總言之,可以利用任何方式將該核心模組153安裝於該電子運算裝置10的作業系統151中,藉此可以進一步執行基於圖3之任一實施例,從而於該儲存裝置20連接至該電子運算裝置10時,快速啟動防毒監測及「加密碟」的雙重保護功能。 However, the present invention is not limited by the manner in which this example is installed, and can be implemented in other ways. For example, the user can download and install the installation program including the core module 153 from the network or other means to be used when the storage device 20 storing the data protection program 240 is connected. In addition, the operating system 151 or the customized operation can also be realized. The system 151 causes the core module 153 to be resident in the operating system 151 or already present in the operating system 151 and loaded as needed. In summary, the core module 153 can be installed in the operating system 151 of the electronic computing device 10 by any means, whereby any embodiment based on FIG. 3 can be further executed, so that the storage device 20 is connected to the When the electronic computing device 10 is used, the dual protection function of the antivirus monitoring and the "encrypted disc" is quickly activated.

以下討論關於資料保護程式240使用核心模組153的實現方式。 The following discussion discusses the implementation of the data protection program 240 using the core module 153.

就如圖3所示之步驟S20而言,在一實施例中,可以利用該核心模組153來實現:針對該電子運算裝置10中任何被存取之檔案,監測該被存取之檔案、對應於該被存取之檔案的存取來源程序及該存取來源程序之相關程序模組/子程式。再者,可以利用該資料保護程式240來判斷該等檔案、程式等判斷是否有異常。在實作中,可設計該核心模組153將偵防解結果直接回傳給該資料保護程式240,或是在該資料保護程式240中呼叫該核心模組153的API;譬如,以下表1的虛擬程式碼(pseudo code)示意如下: For example, in step S20, as shown in FIG. 3, in an embodiment, the core module 153 can be used to monitor the accessed file for any accessed file in the electronic computing device 10, Corresponding to the access source program of the accessed file and the related program module/subprogram of the access source program. Furthermore, the data protection program 240 can be used to determine whether the files, programs, etc. are abnormal. In an implementation, the core module 153 can be designed to directly return the detection result to the data protection program 240, or call the API of the core module 153 in the data protection program 240; for example, Table 1 below The pseudo code is as follows:

然而,本發明之實現方式並不受此例子限制,當可以其他方式實現。 However, implementations of the invention are not limited by this example, and may be implemented in other ways.

以下討論關於防毒引擎之實現方式。 The following discussion discusses how the antivirus engine is implemented.

為了使資料保護程式240能有效進行電腦病毒的偵測及防治,要判斷被監測中的物件(以下簡稱待測物件)是否有異常。在一些實施例中,資料保護程式240係使用了至少兩個防毒引擎來進行防毒。為此,使用病毒碼(virus pattern)資料庫來與待測物件進行對比,及/或以待測物件的行為(behavior)或操作(operation)來進行分析,從而判斷待測物件是否異常。 In order to enable the data protection program 240 to effectively detect and prevent computer viruses, it is necessary to determine whether the object being monitored (hereinafter referred to as the object to be tested) is abnormal. In some embodiments, the data protection program 240 uses at least two antivirus engines for antivirus. To this end, a virus pattern database is used to compare with the object to be tested, and/or the behavior or behavior of the object to be tested is analyzed to determine whether the object to be tested is abnormal.

在一實施例中,該病毒碼資料庫係儲存於該儲存裝置20中,當該資料保護程式240執行於電子運算裝置10後,若判斷出其能夠與遠端的病毒碼提供來源(如防毒引擎公司的伺服器40)連接的話,則可進行更新病毒碼資料庫或定期更新,並可儲存於該儲存裝置20。該資料保護程式240的防毒引擎利用病毒碼資料庫(可比喻為多種電腦病毒的指紋)與待測物件做比對,從而判斷該待物件是否含有電腦病毒的程式碼而判斷其為有異常者。 In an embodiment, the virus code database is stored in the storage device 20. When the data protection program 240 is executed in the electronic computing device 10, if it is determined that it can provide a source code with the remote virus code (such as antivirus) If the engine company's server 40) is connected, the virus code database may be updated or periodically updated and stored in the storage device 20. The antivirus engine of the data protection program 240 uses a virus code database (which can be compared to a fingerprint of a plurality of computer viruses) to compare with the object to be tested, thereby judging whether the object to be contained contains a computer virus code and determining that it is abnormal. .

此外,該資料保護程式240的防毒引擎利可用以對待測物件的行為(behavior)或操作(operation)來進行分析,從而判斷待測物件是否異常。為此,該等行為或操作的型態(patterns)亦可以資料庫的方式提供進行分析的依據,或是於防毒引擎中以程式碼或模組來實現,從而判 斷該待物件是否為有異常者。例如,防毒引擎可以判斷待測物件是否有寫入某種關鍵區域(如系統關鍵區域:系統記憶體/啟動物件/開機磁區)的行為或操作;而待測物件的行為或操作可利用前述核心模組153來加以追蹤或監測,並回饋給防毒引擎,譬如前述表1的虛擬程式碼所示意者。舉例而言,待測物件所呼叫的函式、API名稱或識別碼,所要存取的來源、目的位置等,皆可由前述核心模組153掌握,並以編碼示之。譬如以集合[1024,1000,2000,10000]代表待測物件之行為或操作,其可解讀為呼叫識別碼為1024的函式(如為複製檔案之函式),將作業系統151之邏輯記憶空間之位置1000之2000區塊複製至位置10000為首的記憶空間中。若位置10000係代表位於某種關鍵區域內,則表示該待測物件的行為或操作有異常。藉此,將待測物件的行為或操作經編碼後,即可以利用邏輯運算方式比對及分析。而該等異常行為或操作的型態(patterns)亦可以利用表(table)來記載,以便利用,如表2所示。如此,對於待測物件的多次或多重之行為或操作,亦可如此類推的加以編碼分析及判斷。 In addition, the antivirus engine of the data protection program 240 can be analyzed by the behavior or operation of the object to be tested to determine whether the object to be tested is abnormal. To this end, the patterns of such actions or operations can also be provided in the form of a database for analysis, or implemented in a code or module in the antivirus engine. Whether the object to be treated is abnormal. For example, the antivirus engine can determine whether the object to be tested has a behavior or operation written in a certain critical area (such as a critical area of the system: system memory/starting object/booting magnetic area); and the behavior or operation of the object to be tested can utilize the foregoing The core module 153 is tracked or monitored and fed back to the antivirus engine, such as the virtual code shown in Table 1 above. For example, the function, the API name or the identification code to be accessed by the object to be tested, the source to be accessed, the destination location, and the like can be grasped by the core module 153 and illustrated by the code. For example, the set [1024, 1000, 2000, 10000] represents the behavior or operation of the object to be tested, which can be interpreted as a function with a call identification code of 1024 (such as a function for copying files), and the logical memory of the operating system 151 The 2000 block of position 1000 of the space is copied into the memory space headed by position 10000. If the location 10000 is represented by a certain critical area, it indicates that the behavior or operation of the object to be tested is abnormal. Thereby, after the behavior or operation of the object to be tested is encoded, the logical operation method can be used for comparison and analysis. The patterns of such abnormal behaviors or operations can also be recorded using a table for use, as shown in Table 2. Thus, for the multiple or multiple actions or operations of the object to be tested, it can be coded, analyzed and judged in this way.

圖5顯示用於實現資料保護方法之軟體架構之一實施例的示意方塊圖。此軟體架構包括:核心模組153以及資料保護程式240。如圖5所示,資料保護程式240可包括:防毒引擎模組241、加解密模組243、檔案同步模組245、記錄模組247。如圖5所示意,核心模組153對於來自作業系統151的檔案管理請求,亦即各種與檔案處理有關之複製、讀取、寫入、刪除等請求(亦可視為API或函式之呼叫),將會進行監測,並配合防毒引擎模組241共同進行判斷是否有異常。 Figure 5 shows a schematic block diagram of one embodiment of a software architecture for implementing a data protection method. The software architecture includes a core module 153 and a data protection program 240. As shown in FIG. 5, the data protection program 240 may include an antivirus engine module 241, an encryption and decryption module 243, a file synchronization module 245, and a recording module 247. As shown in FIG. 5, the core module 153 requests for file management from the operating system 151, that is, various requests for copying, reading, writing, deleting, etc. related to file processing (also referred to as an API or a function call). It will be monitored and combined with the anti-virus engine module 241 to determine whether there is an abnormality.

圖6顯示用於實現資料保護方法之軟體架構之一實施例的示意方塊圖。此軟體架構包括:核心模組153以及資料保護程式240。如圖6所示,資料保護程式240可包括:防毒引擎模組241、輔助防毒引擎模組242、加解密模組243、檔案同步模組245、記錄模組247、資料更新模組249。如圖5所示意,核心模組153對於來自作業系統151的檔案管理請求,亦即各種與檔案處理有關之複製、讀取、寫入、刪除等請求(亦可視為API或函式之呼叫),將會進行監測,並配合防毒引擎模組241、輔助防毒引擎模組242共同進行判斷是否有異常。在一實施例中,例如可應用市售或可提供API以進行客製化的防毒引擎,做為防毒引擎模組241,例如主要以病毒碼資料庫來做為其掃瞄病毒的功能;此外,額外製作輔助防毒引擎模組242以判斷檔案之行動或操作,例如依照前述表2及相關之例子所述的方式來進行異常行為或操作的掃瞄病毒。如此,使用雙防毒引擎模組、或甚至複數個防毒引擎模組的做法,將可發揮各個防毒引擎的優點,從而大大加強資料保護程式240的防毒的功效。再者,資料更新模組249可用以更新病毒碼資料庫及/或將偵防解結果傳送到伺服器40。 6 shows a schematic block diagram of one embodiment of a software architecture for implementing a data protection method. The software architecture includes a core module 153 and a data protection program 240. As shown in FIG. 6, the data protection program 240 may include: an antivirus engine module 241, an auxiliary antivirus engine module 242, an encryption and decryption module 243, a file synchronization module 245, a recording module 247, and a data update module 249. As shown in FIG. 5, the core module 153 requests for file management from the operating system 151, that is, various requests for copying, reading, writing, deleting, etc. related to file processing (also referred to as an API or a function call). The monitoring will be performed together with the anti-virus engine module 241 and the auxiliary anti-virus engine module 242 to determine whether there is an abnormality. In an embodiment, for example, an anti-virus engine that is commercially available or can provide an API for customization can be applied as the anti-virus engine module 241, for example, mainly using a virus code database as a function of scanning for viruses; An auxiliary anti-virus engine module 242 is additionally created to determine the actions or operations of the file, such as scanning viruses for abnormal behavior or operation in accordance with the manner described in Table 2 above and related examples. In this way, the use of dual anti-virus engine modules, or even multiple anti-virus engine modules, will take advantage of the various anti-virus engines, thereby greatly enhancing the anti-virus effect of the data protection program 240. Moreover, the data update module 249 can be used to update the virus code database and/or to transmit the detection solution result to the server 40.

再者,本發明之資料保護方法之軟體架構的實現方式,除了上述圖4、或圖5的實施例以外,在一些實施例中,可以實現的核心模組有複數個,如基於圖4或圖5中的核心模組153,以及可將圖4或圖5中的原屬於資料保護程式240的模組如:加解密模組243、檔案同步模組245、記錄模組247、資料更新模組249中的至少一者改以一個或多個核心模組來實現。如此,可產生其他不同的軟體架構,如在一些實施例中,資料保護方法之軟體架構包括:資料保護程式240及複數個核心模組,資料保護程式240至少包括:防毒引擎模組241及/或輔助防毒引擎模組242,該等核心模組至少有:核心模組153、加解密模組243。如在另一些實施例中,資料保護方法之軟體架構包括:資料保護程式240及複數個核心模組,資料保護程式240至少包括:防毒引擎模組241及輔助防毒引擎模組242,該等核心模組至少有:核心模組153、加解密模組243、檔案同步模組245、記錄模組247、資料更新模組249中的至少兩者。然而,本發明之資料保護方法之軟體架構的實現方式,並不受上述實施例的限制,只要能實現資料保護方法之任一實施例,當可利用各種程式、核心模組做任何排列或組合而產生具體的軟體架構。 Furthermore, in addition to the foregoing embodiment of FIG. 4 or FIG. 5, in some embodiments, a plurality of core modules can be implemented, such as based on FIG. 4 or The core module 153 in FIG. 5, and the modules originally belonging to the data protection program 240 in FIG. 4 or FIG. 5, such as the encryption and decryption module 243, the file synchronization module 245, the recording module 247, and the data update module. At least one of the groups 249 is implemented in one or more core modules. As such, the software architecture of the data protection method includes: a data protection program 240 and a plurality of core modules. The data protection program 240 includes at least: an antivirus engine module 241 and/or Or the auxiliary anti-virus engine module 242, the core modules include at least: a core module 153 and an encryption and decryption module 243. In other embodiments, the software architecture of the data protection method includes: a data protection program 240 and a plurality of core modules. The data protection program 240 includes at least: an antivirus engine module 241 and an auxiliary antivirus engine module 242. The module has at least two of the core module 153, the encryption and decryption module 243, the file synchronization module 245, the recording module 247, and the data update module 249. However, the implementation of the software architecture of the data protection method of the present invention is not limited by the above embodiments. As long as any embodiment of the data protection method can be implemented, any arrangement or combination of various programs and core modules can be used. And generate a specific software architecture.

此外,對於上述加解密模組243來說,其除了提供加密、解密的處理外,在一實施例中,更可以利用虛擬磁碟機驅動程式(Virtual disk driver)來呈現該儲存裝置20中的加密空間250的內容。虛擬磁碟機是將隨機存取記憶體模擬成磁碟機。因此系統內會有一個虛擬磁碟機的驅動程式,就如同其他驅動程式一樣,接受輸出輸入的要求,任何命令的處理是直接發生在配置為虛擬磁碟機的記憶體上。至於被配置的記憶體除了是系統上的主記憶體,也可能是附加介面卡上的隨機存取記憶體。 In addition, for the above-mentioned encryption and decryption module 243, in addition to providing encryption and decryption processing, in an embodiment, a virtual disk driver can be used to present the storage device 20. Encrypt the contents of space 250. A virtual disk drive simulates random access memory into a disk drive. Therefore, there will be a virtual disk drive in the system. Just like other drivers, it accepts the input and output requirements. The processing of any command occurs directly on the memory configured as a virtual disk drive. As for the memory being configured, in addition to the main memory on the system, it may also be a random access memory on the additional interface card.

如上述不同實施例所揭示之儲存裝置及其資料保護方法與資料保護系統。舉例而言,當該儲存裝置連接至電子運算裝置後,即能有 效地防止該儲存裝置內的加密資料被綁架與被惡意軟體感染入侵中毒,亦能預防惡意軟體病毒散播到其它非加密的其他記憶裝置,也能夠對該儲存裝置及該電子運算裝置所有的儲存裝置(如系統記憶體等)進行主動或被動式監測、掃毒、解毒、以及相關之消毒動作中之任一種處理動作。此外,如上述之一實施例所述,該儲存裝置中的加密檔案(或加密空間)對作業系統而言是「隱藏」起來的,故此,不論使用者身分驗證通過與否,或即便電腦毒病已入侵到電子運算裝置中,電腦毒病亦無法進一步感染、破壞、或綁架該儲存裝置中的加密檔案(或加密空間),故該儲存裝置能有助於以對電腦中的資料進行安全的備份。在一些實施例中,更可進一步將記錄資料儲存於儲存裝置中或回傳至伺服器,從而作為儲存裝置之資料安全管理之用。 A storage device, a data protection method thereof and a data protection system as disclosed in the different embodiments described above. For example, when the storage device is connected to the electronic computing device, Effectively prevent the encrypted data in the storage device from being kidnapped and infected by malicious software, and can prevent the malware virus from being spread to other non-encrypted other memory devices, and can also store all the storage devices and the electronic computing device. The device (such as system memory) performs any one of active or passive monitoring, anti-virus, detoxification, and related disinfection actions. In addition, as described in one embodiment above, the encrypted file (or encrypted space) in the storage device is "hidden" to the operating system, so whether the user identity verification passes or not, or even the computer poison The disease has invaded into the electronic computing device, and the computer poison can not further infect, destroy, or abduct the encrypted file (or encrypted space) in the storage device, so the storage device can help to secure the data in the computer. Backup. In some embodiments, the recorded data may be further stored in the storage device or returned to the server for use as a data security management device for the storage device.

綜上所述,本發明之內容已以如上之實施例舉例說明了,然而本發明並非僅限定於此等實施方式而已。本發明所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可再進行各種之更動與修飾;例如,將前述實施例中所例示之各技術內容加以組合或變更而成為新的實施方式,此等實施方式亦當然視為本發明所屬內容之一。因此,本案所欲保護之範圍亦包括後述之申請專利範圍及其所界定之範圍。 In summary, the content of the present invention has been exemplified by the above embodiments, but the present invention is not limited to the embodiments. It will be apparent to those skilled in the art that various modifications and changes can be made without departing from the spirit and scope of the invention. For example, the technical contents illustrated in the foregoing embodiments may be combined or changed. As a new embodiment, these embodiments are of course considered as one of the contents of the present invention. Therefore, the scope of the patent to be protected in this case also includes the scope of the patent application and the scope defined by it.

S10、S20、S30‧‧‧步驟 S10, S20, S30‧‧‧ steps

S210-S230‧‧‧步驟 S210-S230‧‧‧Steps

S310-S330‧‧‧步驟 S310-S330‧‧‧Steps

Claims (8)

一種儲存裝置之資料保護方法,其包括:啟動步驟,其包括當一儲存裝置連接至一電子運算裝置的資料介面時,載入該電子運算裝置的作業系統之至少一核心模組並據以啟動該儲存裝置中之資料保護程式;監測步驟,其藉由至少該至少一核心模組及該資料保護程式執行並包括:(a1)監測該電子運算裝置中任何被存取之檔案、對應於該被存取之檔案的存取來源程序、及該存取來源程序之相關程序模組/子程式從而判斷是否有異常;和(b1)若步驟(a1)判斷該被存取之檔案、該存取來源程序、該存取來源程序之相關程序模組/子程式中之至少一者有異常時,則禁用該有異常者;若無異常時,則放行;檔案存取步驟,其藉由該至少一核心模組及該資料保護程式執行並包括:(a2)進行身分驗證並據以判斷是否允許於該儲存裝置中存取位於加密空間之加密檔案;若身分驗證通過,則允許於該儲存裝置中存取加密檔案;若身分驗證沒有通過,則該作業系統將無法存取加密檔案;其中該加密檔案的格式或其檔案系統係實現為不同於該作業系統所使用的檔案系統,故該作業系統無法得知該儲存裝置中有加密檔案;及(b2)當該電子運算裝置存取該加密檔案時,藉由該監測步驟針對該加密檔案進行監測;以及 檔案同步步驟:當身分驗證通過時,接收檔案同步指示,並將該電子運算裝置中被選擇之檔案及其路徑經加密後儲存於該儲存裝置中;其中該資料保護方法係基於上述步驟而對該儲存裝置和該電子運算裝置的所有記憶裝置進行:監測、掃毒、解毒之至少任一種動作。 A data protection method for a storage device, comprising: a startup step, comprising: loading a storage device into a data interface of an electronic computing device, loading at least one core module of the operating system of the electronic computing device, and starting up a data protection program in the storage device; the monitoring step is performed by at least the at least one core module and the data protection program and includes: (a1) monitoring any accessed file in the electronic computing device, corresponding to the An access source program of the accessed file, and a related program module/subprogram of the access source program to determine whether there is an abnormality; and (b1) if the step (a1) determines the accessed file, the deposit If at least one of the source program and the related program module/subprogram of the access source program is abnormal, the abnormality is disabled; if there is no abnormality, the release is performed; and the file access step is performed by the file access step Executing at least one core module and the data protection program and including: (a2) performing identity verification and determining whether access to the encrypted file located in the encrypted space is permitted in the storage device; Passing the license allows access to the encrypted file in the storage device; if the identity verification fails, the operating system will not be able to access the encrypted file; wherein the format of the encrypted file or its file system is implemented differently from the operating system The file system used, so the operating system cannot know that the storage device has an encrypted file; and (b2) when the electronic computing device accesses the encrypted file, the monitoring step is used to monitor the encrypted file; The file synchronization step: receiving the file synchronization indication when the identity verification is passed, and storing the selected file and its path in the electronic computing device in the storage device; wherein the data protection method is based on the foregoing steps The storage device and all of the memory devices of the electronic computing device perform at least one of monitoring, disinfecting, and detoxification. 如請求項1所述之資料保護方法,其中該資料保護方法更包括:依據該資料保護方法基於上述步驟而對該儲存裝置和該電子運算裝置的所有記憶裝置進行之:監測、掃毒、解毒之至少任一種動作以產生偵測處理結果。 The data protection method according to claim 1, wherein the data protection method further comprises: performing, according to the data protection method, the storage device and all the memory devices of the electronic operation device based on the foregoing steps: monitoring, scanning, detoxification At least one of the actions to generate a detection process result. 如請求項2所述之資料保護方法,其中該資料保護方法更包括:基於該偵測處理結果產生記錄資料並儲存於該儲存裝置中。 The data protection method of claim 2, wherein the data protection method further comprises: generating the record data based on the detection process result and storing the record data in the storage device. 如請求項3所述之資料保護方法,其中該資料保護方法更包括:判斷該電子運算裝置是否能夠與遠端之伺服器建立通訊連結,若是則將該記錄資料傳送至該伺服器。 The data protection method of claim 3, wherein the data protection method further comprises: determining whether the electronic computing device is capable of establishing a communication link with a remote server, and if so, transmitting the recorded data to the server. 一種儲存裝置,其為電腦可讀寫記錄媒體,該儲存裝置至少儲存資料保護程式,當一電子運算裝置載入該資料保護程式後,可執行如請求項1至4中任一項所述之資料保護方法。 A storage device is a computer readable and writable recording medium, and the storage device stores at least a data protection program. When an electronic computing device is loaded into the data protection program, the storage device can perform the method according to any one of claims 1 to 4. Data protection method. 如請求項5所述之儲存裝置,其中該儲存裝置包括:資料介面,其用以與該電子運算裝置電性耦接;及記憶單元,其耦接於該資料介面並用以至少儲存該資料保護程式。 The storage device of claim 5, wherein the storage device comprises: a data interface electrically coupled to the electronic computing device; and a memory unit coupled to the data interface and configured to store at least the data protection Program. 一種資料保護系統,其包括:電子運算裝置;以及儲存裝置,其包括: 資料介面,其用以與該電子運算裝置電性耦接;及記憶單元,其耦接於該資料介面,該記憶單元至少儲存資料保護程式;其中:當該儲存裝置之該資料介面連接至該電子運算裝置時,該電子運算裝置載入該電子運算裝置之作業系統中至少一核心模組並據以啟動該資料保護程式;該至少一核心模組及該資料保護程式用以監測該電子運算裝置中任何被存取之檔案、該被存取之檔案、對應於該被存取之檔案的存取來源程序、及該存取來源程序之相關程序模組/子程式從而判斷是否有異常,若有異常時,則禁用彼等中有異常者;若無異常時,則放行;該至少一核心模組及該資料保護程式用以:進行身分驗證並據以判斷是否允許於該儲存裝置中存取位於加密空間之加密檔案;若身分驗證通過,則該電子運算裝置允許於該儲存裝置中存取加密檔案;若身分驗證沒有通過,則該電子運算裝置將無法存取加密檔案;當該電子運算裝置存取該加密檔案時,該核心模組及該資料保護程式亦針對該加密檔案進行監測;以及身分驗證通過時,接收檔案同步指示,並將該電子運算裝置中被選擇之檔案及其路徑經加密後儲存於該儲存裝置中;其中該加密檔案的格式或其檔案系統係實現為不同於該作業系統所使用的檔案系統,故該作業系統無法得知該儲存裝置中有加密檔案。 A data protection system includes: an electronic computing device; and a storage device, including: The data interface is electrically coupled to the electronic computing device; and the memory unit is coupled to the data interface, wherein the memory unit stores at least a data protection program; wherein: when the data interface of the storage device is connected to the data interface The electronic computing device is configured to load at least one core module in the operating system of the electronic computing device and activate the data protection program; the at least one core module and the data protection program are used to monitor the electronic operation Determining whether there is any abnormality in any accessed file in the device, the accessed file, the access source program corresponding to the accessed file, and the related program module/subprogram of the access source program. If there is an abnormality, disable those who are abnormal; if there is no abnormality, release; the at least one core module and the data protection program are used to: perform identity verification and determine whether it is allowed in the storage device Accessing an encrypted file located in the encrypted space; if the identity verification is passed, the electronic computing device allows access to the encrypted file in the storage device; if the identity verification is not If there is a pass, the electronic computing device will not be able to access the encrypted file; when the electronic computing device accesses the encrypted file, the core module and the data protection program also monitor the encrypted file; and when the identity verification is passed, Receiving a file synchronization indication, and encrypting the selected file and its path in the electronic computing device and storing the file in the storage device; wherein the format of the encrypted file or its file system is implemented differently from the operating system The file system, so the operating system cannot know that there is an encrypted file in the storage device. 如請求項7所述之資料保護系統,其中該電子運算裝置係用以藉由該至少一核心模組及該資料保護程式而對該儲存裝置和該電子運算裝置的所有記憶裝置進行:監測、掃毒、解毒之至少任一種動作,並且產生偵測處理結果;該資料保護系統更包括:伺服器,其中該電子運算裝置用以判斷該電子運算裝置是否能夠與該伺服器建立通訊連結,若是則將基 於偵測處理結果而產生的記錄資料傳送至該伺服器;若否,則將該記錄資料儲存於該儲存裝置。 The data protection system of claim 7, wherein the electronic computing device is configured to monitor, by the at least one core module and the data protection program, the storage device and all the memory devices of the electronic computing device: At least one of the actions of the anti-virus and the detoxification, and the detection processing result is generated; the data protection system further includes: a server, wherein the electronic computing device is configured to determine whether the electronic computing device can establish a communication connection with the server, if Base The recorded data generated by detecting the processing result is transmitted to the server; if not, the recorded data is stored in the storage device.
TW105122800A 2016-07-19 2016-07-19 Storage device, data protection method therefor, and data protection system TWI607338B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105122800A TWI607338B (en) 2016-07-19 2016-07-19 Storage device, data protection method therefor, and data protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105122800A TWI607338B (en) 2016-07-19 2016-07-19 Storage device, data protection method therefor, and data protection system

Publications (2)

Publication Number Publication Date
TWI607338B true TWI607338B (en) 2017-12-01
TW201804354A TW201804354A (en) 2018-02-01

Family

ID=61230699

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105122800A TWI607338B (en) 2016-07-19 2016-07-19 Storage device, data protection method therefor, and data protection system

Country Status (1)

Country Link
TW (1) TWI607338B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI734038B (en) * 2017-12-05 2021-07-21 開曼群島商創新先進技術有限公司 Method and device for identifying abnormal data access
TWI769038B (en) * 2021-08-04 2022-06-21 林長毅 Method for preventing data kidnapping and related computer program

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832085A (en) 2019-04-17 2020-10-27 鸿富锦精密电子(天津)有限公司 Data protection device and method
TWI715011B (en) * 2019-04-17 2021-01-01 鴻齡科技股份有限公司 Data protection device and method
US11755423B2 (en) * 2022-02-10 2023-09-12 Vinpower Inc. Mobile device for protecting data stored in data backup device and data protection method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201209622A (en) * 2010-08-20 2012-03-01 Digi Link Electronics Corp Application method of movable memory device
TW201305842A (en) * 2011-07-29 2013-02-01 Lionic Corp Method and apparatus for securing storage devices by real-time monitoring file system
CN102930892A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Multifunctional safe U disk
US20150244798A1 (en) * 2014-02-27 2015-08-27 Clevx, Llc Data storage system with removable device and method of operation thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201209622A (en) * 2010-08-20 2012-03-01 Digi Link Electronics Corp Application method of movable memory device
TW201305842A (en) * 2011-07-29 2013-02-01 Lionic Corp Method and apparatus for securing storage devices by real-time monitoring file system
CN102930892A (en) * 2012-09-19 2013-02-13 无锡华御信息技术有限公司 Multifunctional safe U disk
US20150244798A1 (en) * 2014-02-27 2015-08-27 Clevx, Llc Data storage system with removable device and method of operation thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI734038B (en) * 2017-12-05 2021-07-21 開曼群島商創新先進技術有限公司 Method and device for identifying abnormal data access
TWI769038B (en) * 2021-08-04 2022-06-21 林長毅 Method for preventing data kidnapping and related computer program

Also Published As

Publication number Publication date
TW201804354A (en) 2018-02-01

Similar Documents

Publication Publication Date Title
US9852289B1 (en) Systems and methods for protecting files from malicious encryption attempts
US10169586B2 (en) Ransomware detection and damage mitigation
EP3374922B1 (en) Systems and methods for protecting backed-up data from ransomware attacks
TWI607338B (en) Storage device, data protection method therefor, and data protection system
US8474032B2 (en) Firewall+ storage apparatus, method and system
US8887295B2 (en) Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way
US9432397B2 (en) Preboot environment with system security check
KR20010109271A (en) System And Method For Providing Data Security
US11403180B2 (en) Auxiliary storage device having independent recovery area, and device applied with same
CN112269547B (en) Active and controllable hard disk data deleting method and device without operating system
CN110647744A (en) Identifying and extracting key hazard forensic indicators using object-specific file system views
JP4023654B2 (en) Application monitoring method and program
US11520886B2 (en) Advanced ransomware detection
US20170011218A1 (en) Computer security system and method
US8429429B1 (en) Computer security system and method
CN104361298B (en) The method and apparatus of Information Security
CN111711656A (en) Network edge storage device with safety function
KR101290852B1 (en) Apparatus and Method for Preventing Data Loss Using Virtual Machine
RU119910U1 (en) BUILT-IN TSM SECURITY MODULE
US20220374534A1 (en) File system protection apparatus and method in auxiliary storage device
CN117763585A (en) Encryption method, system, terminal and storage medium of secret-related special equipment
US20180217943A1 (en) Automatic Encryption of Failing Drives
KR101415403B1 (en) System and method for providign secure space being shared