TWI622886B - Regional data sharing system and method - Google Patents

Regional data sharing system and method Download PDF

Info

Publication number
TWI622886B
TWI622886B TW105120876A TW105120876A TWI622886B TW I622886 B TWI622886 B TW I622886B TW 105120876 A TW105120876 A TW 105120876A TW 105120876 A TW105120876 A TW 105120876A TW I622886 B TWI622886 B TW I622886B
Authority
TW
Taiwan
Prior art keywords
processing unit
key
identification information
electronic device
data
Prior art date
Application number
TW105120876A
Other languages
Chinese (zh)
Other versions
TW201802701A (en
Inventor
zheng-zhang Wu
Chih-Peng Hsu
Chieh-Huan Shih
Original Assignee
Softnext Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Softnext Tech Corp filed Critical Softnext Tech Corp
Priority to TW105120876A priority Critical patent/TWI622886B/en
Publication of TW201802701A publication Critical patent/TW201802701A/en
Application granted granted Critical
Publication of TWI622886B publication Critical patent/TWI622886B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

一種區域性資料分享系統,一電子裝置的處理模組產生一用於索取一加密資料且包含該電子裝置的用戶識別資訊的資料請求,並將該資料請求傳送至一伺服器單元。當該伺服器單元的該處理單元判斷該資料請求的該用戶識別資訊與一第一授權名單的該用戶識別資訊相同,則該處理單元將一加密資料傳送至該電子裝置。當該伺服器單元的處理單元接收到一來自該電子裝置的金鑰請求,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將一金鑰傳送至該電子裝置,供該電子裝置的處理模組將該加密資料解密。 A regional data sharing system, an electronic device processing module generates a data request for requesting an encrypted data and including user identification information of the electronic device, and transmits the data request to a server unit. When the processing unit of the server unit determines that the user identification information requested by the data is the same as the user identification information of a first authorization list, the processing unit transmits an encrypted data to the electronic device. When the processing unit of the server unit receives a key request from the electronic device, when the processing unit determines that the electronic device is located in the authorized area according to the key request and the identification data, the processing unit will receive a gold The key is transmitted to the electronic device, and the processing module of the electronic device decrypts the encrypted data.

Description

區域性資料分享系統及方法 Regional data sharing system and method

本發明是有關於一種資料分享系統及方法,特別是指一種區域性資料分享系統及方法。 The present invention relates to a data sharing system and method, and more particularly to a regional data sharing system and method.

現有的資料分享系統是將數位資料儲存於一伺服器中,以供擁有權限的使用者操作電子裝置連線至該伺服器,藉此存取數位資料。若擁有數位資料的任一使用者在網路上散布該數位資料,則所有沒有權限的使用者也能取得該數位資料,造成對使用者及數位資料提供者的困擾。 In the existing data sharing system, the digital data is stored in a server for the authorized user to operate the electronic device to connect to the server, thereby accessing the digital data. If any user who has digital data distributes the digital data on the Internet, all users who do not have permission can also obtain the digital data, causing confusion for users and digital data providers.

現有的控管數位資料的方法是將數位資料加密,並且在認證過內建於電子裝置的身分後,才提供該電子裝置解密的資料,藉此控管該數位資料。 The existing method for controlling digital data is to encrypt the digital data, and after authenticating the identity built into the electronic device, the data decrypted by the electronic device is provided, thereby controlling the digital data.

然而,對於希望在僅在特定地理場域公開該數位資訊的數位資訊提供者而言,上述的方法無法滿足其需求。 However, for digital information providers who wish to disclose the digital information only in a particular geographic field, the above methods do not meet their needs.

因此,本發明之其中一目的,即在提供一種區域性資料分享系統,可規範一電子裝置僅能在一被授權區域解開一由伺服 器單元提供的加密資料。 Therefore, one of the objects of the present invention is to provide a regional data sharing system capable of regulating an electronic device that can only be unlocked by a servo in an authorized area. Encrypted material provided by the unit.

於是,本發明一種區域性資料分享系統,包含一伺服器單元及至少一電子裝置。該伺服器單元包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一用戶識別資訊。該至少一電子裝置包括一處理模組。該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器裝置,該資料請求包含一用戶識別資訊。當該伺服器裝置的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置。當該伺服器裝置的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置。該電子裝置的處理模組使用該金鑰將該加密資料解密。 Thus, a regional data sharing system of the present invention includes a server unit and at least one electronic device. The server unit includes a storage unit and a processing unit electrically connected to the storage unit, the storage unit stores encrypted data, a key for decrypting the encrypted data, a first authorization list, and related to an authorized list. The identification data of the area, the first authorization list includes a user identification information. The at least one electronic device includes a processing module. The processing module of the electronic device generates a data request for requesting the encrypted data, and transmits the data request to the server device, where the data request includes a user identification information. When the processing unit of the server device receives the data request, the processing unit determines whether the user identification information requested by the data is the same as the user identification information of the first authorization list, and when the processing unit determines the data request The user identification information is the same as the user identification information of the first authorization list, and the processing unit transmits the encrypted data to the electronic device. When the processing unit of the server device receives a key request from the electronic device for requesting the key, the processing unit determines, according to the key request and the identification data, whether the electronic device is located in the authorized area. And when the processing unit determines that the electronic device is located in the authorized area according to the key request and the identification data, the processing unit transmits the key to the electronic device. The processing module of the electronic device decrypts the encrypted data using the key.

在一些實施態樣中,該第一授權名單包含多個用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置。當該伺服 器單元的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置。該金鑰請求包含一用戶識別資訊,當該伺服器單元的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該金鑰請求的該用戶識別資訊尚未被加入一出席清單,則該處理單元將該金鑰請求的該用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置,供該出席清單中的用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。 In some implementations, the first authorization list includes a plurality of user identification information, and the regional data sharing system includes a plurality of electronic devices. When the servo The processing unit of the unit receives the data request from one of the electronic devices, and the processing unit determines whether the user identification information requested by the data is identical to one of the user identification information of the first authorization list, when the processing unit determines The user identification information requested by the data is the same as one of the user identification information of the first authorization list, and the processing unit transmits the encrypted data to the one of the electronic devices. The key request includes a user identification information, when the processing unit of the server unit receives a key request from one of the electronic devices, and the processing unit determines the one of the electronic devices according to the key request and the identification data. Located in the authorized area, and the user identification information requested by the key has not been added to an attendance list, the processing unit adds the user identification information requested by the key to the attendance list, and determines the presence list. Whether the number of user identification information reaches a predetermined attendance threshold, and when the processing unit determines that the number of user identification information in the presence list reaches the predetermined attendance threshold, the processing unit transmits the key to the user identification information in the attendance list. Corresponding electronic device, the electronic device corresponding to the user identification information in the attendance list uses the key to decrypt the encrypted data.

在一些實施態樣中,該儲存單元還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置。當該伺服器單元的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授 權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置。該金鑰請求包含一用戶識別資訊,當該伺服器單元的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊相同,則該處理單元將該金鑰傳送至所述其中一電子裝置,供所述其中一電子裝置使用該金鑰將該加密資料解密。所述其中一電子裝置的處理模組將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密。 In some implementations, the storage unit further stores a second authorization list, the second authorization list includes user identification information different from the user identification information of the first authorization list, and the regional data sharing system Contains multiple electronic devices. When the processing unit of the server unit receives the data request from one of the electronic devices, the processing unit determines the user identification information requested by the data and the first grant Whether the user identification information of the rights list or the second authorization list is the same, and when the processing unit determines that the user identification information requested by the data is the same as the user identification information of the first authorization list or the second authorization list, the processing unit will The encrypted data is transmitted to one of the electronic devices. The key request includes a user identification information, when the processing unit of the server unit receives a key request from one of the electronic devices, and the processing unit determines the one of the electronic devices according to the key request and the identification data. Located in the authorized area, and the processing unit determines that the user identification information requested by the data is the same as the user identification information of the first authorization list, the processing unit transmits the key to the one electronic device for The one of the electronic devices decrypts the encrypted data using the key. The processing module of one of the electronic devices transmits the key to another electronic device corresponding to the user identification information of the second authorization list, and the another electronic device uses the key to decrypt the encrypted data.

在一些實施態樣中,該電子裝置還包括一電連接該處理模組的GPS模組,該GPS模組產生一該電子裝置所在位置的GPS座標,該金鑰請求還包含該GPS座標,該伺服器單元所儲存的該辨別資料包含該被授權區域的一GPS座標範圍。當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, the electronic device further includes a GPS module electrically connected to the processing module, the GPS module generates a GPS coordinate of a location of the electronic device, and the key request further includes the GPS coordinate. The identification data stored by the server unit includes a GPS coordinate range of the authorized area. When the processing unit determines that the GPS coordinate of the key request falls within the GPS coordinate range of the identification material, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,還包含一位於該被授權區域內的存取點,當該電子裝置經由該存取點連接一通訊網路,該電子裝置 由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者的該金鑰請求。該伺服器單元所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該位址其中至少該者。當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, an access point is located in the authorized area, and the electronic device is connected to a communication network via the access point, the electronic device Receiving, by the access point, at least one of a media access control address, a service setting identifier, and an IP address, and generating the media access control address, the service setting identifier, and the IP address At least the person's key request. The identification data stored by the server unit includes at least one of the media access control address, the service setting identifier, and the address. Determining, by the processing unit, the media access control address, the service setting identifier, and the IP address of the key request, at least the one of the media access control address and the service setting identifier of the identification material, the service setting identifier And at least the one of the IP addresses, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,還包含一位於該被授權區域內的通訊裝置,該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求。該伺服器單元所儲存的該辨別資料包含該識別碼。當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, the method further includes a communication device located in the authorized area, the communication device transmitting an identification code using a short-range communication technology, and the electronic device uses the electronic device when the electronic device is located in the authorized area The short-range communication technology receives the identification code and generates the key request containing the identification code. The identification data stored by the server unit includes the identification code. When the processing unit determines that the identification code of the key request is the same as the identification code of the identification material, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該電子裝置還包括一電連接該處理模組的影像拍攝模組,該影像拍攝模組用於拍攝該電子裝置所在環境以產生一影像,該金鑰請求還包含該影像。該伺服器單元所儲存的該辨別資料包含一相關於該被授權區域的參考影像。當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料 的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。 In some embodiments, the electronic device further includes an image capturing module electrically connected to the processing module, the image capturing module is configured to capture an environment of the electronic device to generate an image, and the key request further includes the image capturing module image. The identification data stored by the server unit includes a reference image associated with the authorized area. When the processing unit uses an image comparison technique to determine the image requested by the key and the identification data The reference image is similar, and the processing unit determines that the electronic device is located in the authorized area.

本發明之另一目的,在於提供一區域性資料分享方法,可規範一電子裝置僅能在一被授權區域解開一由伺服器單元提供的加密資料。 Another object of the present invention is to provide a regional data sharing method for regulating an electronic device that can only unlock an encrypted data provided by a server unit in an authorized area.

於是,本發明一種區域性資料分享方法,由一伺服器單元及至少一電子裝置共同執行,該伺服器單元包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一用戶識別資訊,且該電子裝置包括一處理模組,該方法包含以下步驟:(A)該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元,該資料請求包含一用戶識別資訊;(B)當該伺服器單元的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置;(C)當該伺服器單元的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元 根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置;及(D)該電子裝置的處理模組使用該金鑰將該加密資料解密。 Therefore, a regional data sharing method of the present invention is jointly performed by a server unit and at least one electronic device. The server unit includes a storage unit and a processing unit electrically connected to the storage unit, and the storage unit stores encrypted data. a key for decrypting the encrypted data, a first authorization list, and identification data related to an authorized area, the first authorization list includes a user identification information, and the electronic device includes a processing module. The method includes the following steps: (A) the processing module of the electronic device generates a data request for requesting the encrypted data, and transmits the data request to the server unit, where the data request includes a user identification information; B) when the processing unit of the server unit receives the data request, the processing unit determines whether the user identification information requested by the data is the same as the user identification information of the first authorization list, and when the processing unit determines the data request The user identification information is the same as the user identification information of the first authorization list, and the processing unit encrypts the information. Transferring to the electronic device; (C) when the processing unit of the server unit receives a key request from the electronic device for requesting the key, the processing unit determines according to the key request and the identification data Whether the electronic device is located in the authorized area when the processing unit Determining, according to the key request and the identification data, that the electronic device is located in the authorized area, the processing unit transmits the key to the electronic device; and (D) the processing module of the electronic device uses the key to Encrypted data decryption.

在一些實施態樣中,該方法是由該伺服器單元及多個電子裝置執行,該第一授權名單包含多個用戶識別資訊,其中,在該步驟(A)中,當該伺服器單元的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的其中一用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置;在該步驟(C)中,該金鑰請求包含一用戶識別資訊,當該伺服器單元的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該金鑰請求的該用戶識別資訊尚未被加入一出席清單,則該處理單元將該金鑰請求的該用戶識別資訊加入該出席清單,並判斷該出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的用戶識別資訊對應之電子裝置,供該出席清單中的用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。 In some implementations, the method is performed by the server unit and the plurality of electronic devices, the first authorization list includes a plurality of user identification information, wherein, in the step (A), when the server unit is The processing unit receives the data request from one of the electronic devices, and the processing unit determines whether the user identification information requested by the data is identical to one of the user identification information of the first authorization list, and when the processing unit determines the data request The user identification information is the same as one of the user identification information of the first authorization list, the processing unit transmits the encrypted data to the one of the electronic devices; in the step (C), the key request includes a user identification Information, when the processing unit of the server unit receives a key request from one of the electronic devices, and the processing unit determines, according to the key request and the identification data, that one of the electronic devices is located in the authorized area, and If the user identification information requested by the key has not been added to an attendance list, the processing unit identifies the user of the key request. The message joins the attendance list and determines whether the number of user identification information in the presence list reaches a predetermined attendance threshold. When the processing unit determines that the number of user identification information in the presence list reaches the predetermined attendance threshold, the processing unit will The key is transmitted to the electronic device corresponding to the user identification information in the attendance list, and the electronic device corresponding to the user identification information in the attendance list uses the key to decrypt the encrypted data.

在一些實施態樣中,該方法是由該伺服器單元及多個電子裝置執行,該儲存單元還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊,其中,在步驟(D)後,還包含:(E)所述其中一電子裝置的處理模組將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密;其中,在該步驟(A)中,當該伺服器單元的處理單元接收到來自其中一電子裝置的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,該處理單元將該加密資料傳送至所述其中一電子裝置;在該步驟(C)中,該金鑰請求包含一用戶識別資訊,當該伺服器單元的處理單元接收到來自其中一電子裝置的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述其中一電子裝置位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的用戶識別資訊相同,則該處理單元將該金鑰傳送至所述其中一電子裝置,供所述其中一電子裝置使用該金鑰將該加密資料解密。 In some implementations, the method is performed by the server unit and the plurality of electronic devices, the storage unit further storing a second authorization list, where the second authorization list includes a user different from the first authorization list. The user identification information of the identification information, wherein, after the step (D), the method further comprises: (E) processing module of one of the electronic devices transmitting the key to another user identification corresponding to the second authorization list An electronic device for decrypting the encrypted data by the another electronic device using the key; wherein, in the step (A), when the processing unit of the server unit receives the data from one of the electronic devices Requesting, the processing unit determines whether the user identification information requested by the data is the same as the user identification information of the first authorization list or the second authorization list, and when the processing unit determines the user identification information requested by the data and the first The authorization list or the user identification information of the second authorization list is the same, the processing unit transmits the encrypted data to the one of the electronic devices; in the step (C), the The key request includes a user identification information, when the processing unit of the server unit receives a key request from one of the electronic devices, and the processing unit determines, according to the key request and the identification data, that one of the electronic devices is located Within the authorized area, and the processing unit determines that the user identification information requested by the data is the same as the user identification information of the first authorization list, the processing unit transmits the key to the one of the electronic devices for the One of the electronic devices decrypts the encrypted data using the key.

在一些實施態樣中,該方法的該電子裝置還包括一電連接該處理模組的GPS模組,其中,在步驟(C)前,還包含:(F) 該GPS模組產生一該電子裝置所在位置的GPS座標,該金鑰請求還包含該GPS座標,該伺服器單元所儲存的該辨別資料包含該被授權區域的一GPS座標範圍;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, the electronic device of the method further includes a GPS module electrically connected to the processing module, wherein, before the step (C), the method further includes: (F) The GPS module generates a GPS coordinate of a location of the electronic device, the key request further includes the GPS coordinate, and the identification data stored by the server unit includes a GPS coordinate range of the authorized area; In step (C), when the processing unit determines that the GPS coordinate of the key request falls within the GPS coordinate range of the identification material, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該方法還由一位於該被授權區域內的存取點共同執行,該伺服器單元所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該位址其中至少一者,其中,在步驟(C)前,還包含:(G)當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少該者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者的該金鑰請求;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者相同,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, the method is further performed by an access point located in the authorized area, and the identification data stored by the server unit includes the media access control address, the service setting identifier, and At least one of the addresses, wherein, before the step (C), the method further comprises: (G) when the electronic device is connected to a communication network via the access point, the electronic device receives a media access by the access point Controlling at least one of the address, a service setting identifier, and an IP address, and generating the key request including the media access control address, the service setting identifier, and at least the one of the IP addresses; In the step (C), when the processing unit determines the media access control address requested by the key, the service setting identifier, and the IP address, at least the one and the media of the identification material are stored. The control address, the service setting identifier, and the IP address are at least the same, and the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該方法還由一位於該被授權區域內的通訊裝置共同執行,該伺服器單元所儲存的該辨別資料包含該識別碼,其中,在步驟(C)前,還包含:(H)該通訊裝置使用一短距 離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, the method is further performed by a communication device located in the authorized area, and the identification data stored by the server unit includes the identification code, wherein, before step (C), the method further includes :(H) The communication device uses a short distance Sending an identification code from the communication technology, when the electronic device is located in the authorized area, the electronic device receives the identification code by using the short-range communication technology, and generates the key request including the identification code; wherein, in the step In (C), when the processing unit determines that the identification code of the key request is the same as the identification code of the identification material, the processing unit determines that the electronic device is located in the authorized area.

在一些實施態樣中,該方法的該電子裝置還包括一電連接該處理模組的影像拍攝模組,該伺服器單元所儲存的該辨別資料包含一相關於該被授權區域的參考影像,其中,在步驟(C)前,還包含:(I)該影像拍攝模組拍攝該電子裝置所在環境以產生一影像;其中,在該步驟(C)中,該金鑰請求還包含該影像且當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。 In some implementations, the electronic device of the method further includes an image capturing module electrically connected to the processing module, and the identification data stored by the server unit includes a reference image related to the authorized area. Before the step (C), the method further includes: (I) the image capturing module capturing an environment of the electronic device to generate an image; wherein, in the step (C), the key request further includes the image and When the processing unit uses an image matching technique to determine that the image requested by the key is similar to the reference image of the identification material, the processing unit determines that the electronic device is located in the authorized area.

本發明至少具有以下功效:在本發明區域性資料分享系統及區域性資料分享方法中,該伺服器單元的處理單元判斷該電子裝置與該第一授權名單的用戶識別資訊相同後,將該加密資料傳送至屬於該第一授權名單內的該電子裝置,藉此確保加密資料是被預先被傳送至該第一授權名單內的電子裝置,然後,該伺服器單元的處理單元以不同的方式判斷該電子裝置之所在區域是位於該被授權區域內,才將該金鑰傳送至位於該被授權區域的該電子裝置, 以供該電子裝置的處理模組將該加密資料解密,藉此確保該加密資料僅於該被授權區域內被使用。 The present invention has at least the following effects: in the regional data sharing system and the regional data sharing method of the present invention, the processing unit of the server unit determines that the electronic device is identical to the user identification information of the first authorization list, and then encrypts the electronic device. Transmitting data to the electronic device belonging to the first authorization list, thereby ensuring that the encrypted data is previously transmitted to the electronic device in the first authorization list, and then the processing unit of the server unit judges in different manners The area where the electronic device is located is located in the authorized area, and the key is transmitted to the electronic device located in the authorized area. The encrypted data is decrypted by the processing module of the electronic device, thereby ensuring that the encrypted data is used only in the authorized area.

100‧‧‧區域性資料分享系統 100‧‧‧Regional Data Sharing System

1‧‧‧伺服器單元 1‧‧‧Server unit

11‧‧‧儲存單元 11‧‧‧ storage unit

12‧‧‧通訊單元 12‧‧‧Communication unit

13‧‧‧處理單元 13‧‧‧Processing unit

2‧‧‧電子裝置 2‧‧‧Electronic devices

21‧‧‧儲存模組 21‧‧‧ storage module

22‧‧‧通訊模組 22‧‧‧Communication Module

23‧‧‧短距通訊模組 23‧‧‧Short-range communication module

24‧‧‧GPS模組 24‧‧‧GPS module

25‧‧‧處理模組 25‧‧‧Processing module

26‧‧‧影像拍攝模組 26‧‧‧Image Capture Module

3‧‧‧存取點 3‧‧‧ access point

31‧‧‧通訊器 31‧‧‧Communicator

32‧‧‧短距通訊器 32‧‧‧Short-range communicator

33‧‧‧控制器 33‧‧‧ Controller

4‧‧‧通訊裝置 4‧‧‧Communication device

41‧‧‧短距通訊單元 41‧‧‧Short communication unit

42‧‧‧控制單元 42‧‧‧Control unit

201‧‧‧通訊網路 201‧‧‧Communication network

301‧‧‧被授權區域 301‧‧‧ Authorized area

S21~S29‧‧‧步驟 S21~S29‧‧‧Steps

S41~S49‧‧‧步驟 S41~S49‧‧‧Steps

S61~S69‧‧‧步驟 S61~S69‧‧‧Steps

S81~S89‧‧‧步驟 S81~S89‧‧‧Steps

S101~S110‧‧‧步驟 S101~S110‧‧‧Steps

S111~S120‧‧‧步驟 S111~S120‧‧‧Steps

本發明之其他的特徵及功效,將於參照圖式的實施方式中清楚地呈現,其中:圖1是本發明區域性資料分享系統的一第一實施例的一方塊圖;圖2是本發明區域性資料分享方法的一第一實施例的一流程圖;圖3是本發明區域性資料分享系統的一第二實施例的一方塊圖;圖4是本發明區域性資料分享方法的一第二實施例的一流程圖;圖5是本發明區域性資料分享系統的一第三實施例的一方塊圖;圖6是本發明區域性資料分享方法的一第三實施例的一流程圖;圖7是本發明區域性資料分享系統的一第四實施例的一方塊圖;圖8是本發明區域性資料分享方法的一第四實施例的一流程圖;圖9是本發明區域性資料分享系統的一第五實施例的一方塊圖;圖10是本發明區域性資料分享方法的一第五實施例的一流程圖;及圖11是本發明區域性資料分享方法的一第六實施例的一流程圖。 Other features and advantages of the present invention will be apparent from the embodiments of the present invention, wherein: Figure 1 is a block diagram of a first embodiment of the regional data sharing system of the present invention; A flowchart of a first embodiment of a regional data sharing method; FIG. 3 is a block diagram of a second embodiment of the regional data sharing system of the present invention; and FIG. 4 is a first embodiment of the regional data sharing method of the present invention. FIG. 5 is a block diagram of a third embodiment of the regional data sharing system of the present invention; FIG. 6 is a flowchart of a third embodiment of the regional data sharing method of the present invention; Figure 7 is a block diagram of a fourth embodiment of the regional data sharing system of the present invention; Figure 8 is a flow chart of a fourth embodiment of the regional data sharing method of the present invention; Figure 9 is a regional data of the present invention. A block diagram of a fifth embodiment of the sharing system; FIG. 10 is a flowchart of a fifth embodiment of the regional data sharing method of the present invention; and FIG. 11 is a sixth implementation of the regional data sharing method of the present invention. First class Cheng Tu.

在本發明被詳細描述之前,應當注意在以下的說明內 容中,類似的元件是以相同的編號來表示。 Before the present invention is described in detail, it should be noted that in the following description In the middle, similar components are denoted by the same reference numerals.

請參閱圖1,本發明一種區域性資料分享系統100的一第一實施例包含一伺服器單元1及一電子裝置2。 Referring to FIG. 1, a first embodiment of a regional data sharing system 100 of the present invention includes a server unit 1 and an electronic device 2.

該伺服器單元1包括一儲存單元11、一通訊單元12,及一電連接該儲存單元11與通訊單元12的處理單元13。該儲存單元11儲存有加密資料、一用於解密該加密資料的金鑰、一第一授權名單,及相關於一被授權區域301的辨別資料。在本實施例中,該第一授權名單包含至少一第一用戶識別資訊,該至少一第一用戶識別資訊為例如一對應於被授權的電子裝置的國際移動設備識別碼(International Mobile Equipment Identity,IMEI),但不以此為限,在其他的實施態樣中,每一第一用戶識別資訊也可以例如為一被授權的使用者帳號。 The server unit 1 includes a storage unit 11, a communication unit 12, and a processing unit 13 electrically connected to the storage unit 11 and the communication unit 12. The storage unit 11 stores encrypted data, a key for decrypting the encrypted data, a first authorization list, and identification data related to an authorized area 301. In this embodiment, the first authorization list includes at least one first user identification information, and the at least one first user identification information is, for example, an International Mobile Equipment Identity (International Mobile Equipment Identity) corresponding to the authorized electronic device. IMEI), but not limited to this, in other implementations, each first user identification information may also be, for example, an authorized user account.

在本實施例中,該被授權區域301是例如一GPS座標範圍,也可以是一特定地點譬如一會議室或教室,但不以此為限。 In this embodiment, the authorized area 301 is, for example, a GPS coordinate range, or may be a specific place, such as a conference room or a classroom, but is not limited thereto.

該伺服器單元1的處理單元13利用該通訊單元12以有線或無線的方式連接至一通訊網路201。 The processing unit 13 of the server unit 1 is connected to a communication network 201 by wire or wirelessly using the communication unit 12.

該電子裝置2包括一儲存模組21、一通訊模組22、一GPS模組24及一電連接該儲存模組21、該通訊模組22及該GPS模組24的處理模組25。在本實施例中,該電子裝置2的處理模組25可透過該通訊模組22連接至該通訊網路201而經由該伺服器單元1的 通訊單元12與該處理單元13進行有線或無線通訊。在本實施例中,該電子裝置2可以是一平板電腦、一智慧型手機或筆記型電腦等等。 The electronic device 2 includes a storage module 21, a communication module 22, a GPS module 24, and a processing module 25 electrically connected to the storage module 21, the communication module 22, and the GPS module 24. In this embodiment, the processing module 25 of the electronic device 2 can be connected to the communication network 201 via the communication module 22 via the server unit 1 The communication unit 12 performs wired or wireless communication with the processing unit 13. In this embodiment, the electronic device 2 can be a tablet computer, a smart phone or a notebook computer, and the like.

請參閱圖1及圖2,該區域性資料分享系統100的第一實施例例如用以執行本發明區域性資料分享方法的一第一實施例,該實施例包含以下步驟。 Referring to FIG. 1 and FIG. 2, the first embodiment of the regional data sharing system 100 is, for example, a first embodiment for performing the regional data sharing method of the present invention. The embodiment includes the following steps.

在步驟S21中,該電子裝置2的處理模組25產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元1的該處理單元13。該資料請求包含該電子裝置2的用戶識別資訊。該用戶識別資訊例如為該電子裝置2的國際移動設備識別碼(International Mobile Equipment Identity,IMEI),但不以此為限,在其他的實施態樣中,該用戶識別資訊也可以例如為操作該電子裝置2的使用者的使用者帳號。 In step S21, the processing module 25 of the electronic device 2 generates a data request for requesting the encrypted data, and transmits the data request to the processing unit 13 of the server unit 1. The data request includes user identification information of the electronic device 2. The user identification information is, for example, an International Mobile Equipment Identity (IMEI) of the electronic device 2, but not limited thereto. In other implementations, the user identification information may also be, for example, an operation. The user account of the user of the electronic device 2.

在步驟S22中,當該伺服器單元1的處理單元13接收到來自該電子裝置2的該資料請求,該處理單元13判斷該資料請求的該用戶識別資訊與該第一授權名單的第一用戶識別資訊是否相同,若結果為是,則進入步驟S23。在本實施例中,若結果為否,則進入步驟S29,結束本方法,但不以此為限。 In step S22, when the processing unit 13 of the server unit 1 receives the data request from the electronic device 2, the processing unit 13 determines the user identification information requested by the data and the first user of the first authorization list. Whether the identification information is the same or not, if the result is YES, the process proceeds to step S23. In the present embodiment, if the result is no, the process proceeds to step S29, and the method is terminated, but not limited thereto.

於步驟S23中,該伺服器單元1的處理單元13將該加密資料傳送至該電子裝置2。 In step S23, the processing unit 13 of the server unit 1 transmits the encrypted data to the electronic device 2.

由上述可知,藉由該區域性資料系統100的第一實施例執行步驟S21~S23能確保僅具有與該第一授權名單相同的第一用戶識別資訊的電子裝置2才能夠取得到該加密資料,換句話說,加密資料的提供者可藉由設定該第一授權名單以規範能取得該加密資料的使用者的之權限。 It can be seen from the above that by performing steps S21 to S23 in the first embodiment of the regional data system 100, it can be ensured that the electronic device 2 having only the first user identification information identical to the first authorization list can obtain the encrypted data. In other words, the provider of the encrypted data can specify the authority of the user who can obtain the encrypted data by setting the first authorization list.

在步驟S24中,該電子裝置2的GPS模組24產生一該電子裝置2所在位置的GPS座標。 In step S24, the GPS module 24 of the electronic device 2 generates a GPS coordinate of the location of the electronic device 2.

在步驟S25中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該電子裝置2之該GPS座標,該電子裝置2並將該金鑰請求傳送至該伺服器單元1。 In step S25, the processing module 25 of the electronic device 2 generates a key request for requesting the key, the key request includes the GPS coordinate of the electronic device 2, and the electronic device 2 and the key The request is transmitted to the server unit 1.

在步驟S26中,當該伺服器單元1的處理單元13接收到來自該電子裝置2的金鑰請求,該處理單元13根據該金鑰請求中的GPS座標及該辨別資料中GPS座標範圍判斷該電子裝置2是否位於該被授權區域301內,若結果為是,則進入步驟S27。 In step S26, when the processing unit 13 of the server unit 1 receives the key request from the electronic device 2, the processing unit 13 determines the GPS coordinate in the key request and the GPS coordinate range in the identification data. Whether the electronic device 2 is located in the authorized area 301, if the result is YES, the process proceeds to step S27.

在步驟S27中,該處理單元13將該金鑰傳送至該電子裝置2。 In step S27, the processing unit 13 transmits the key to the electronic device 2.

在步驟S28中,該電子裝置2使用該金鑰將該加密資料解密。 In step S28, the electronic device 2 decrypts the encrypted material using the key.

由上述可知,透過區域性資料系統100的第一實施例執行步驟S24~S28,能確保只有位於該GPS座標範圍內的電子裝置2 才能取得該金鑰,藉此規範取得該加密資料的使用者的僅於該GPS座標範圍內使用該資料,進而滿足該加密資料提供者希望該加密資料僅在該GPS座標範圍公開之需求。 It can be seen from the above that the first embodiment of the transmissive regional data system 100 performs steps S24 to S28 to ensure that only the electronic device 2 located within the GPS coordinate range can be ensured. The key can be obtained, thereby standardizing the use of the data by the user who obtained the encrypted data only within the GPS coordinate range, thereby satisfying the requirement that the encrypted data provider desires that the encrypted data is only disclosed in the GPS coordinate range.

補充說明的是,在本實施例的步驟S26中伺服器單元1僅判斷該電子裝置2是否位於該被授權區域301內,但不以此為限。在其他的實施例中,步驟S25中該電子裝置2的處理模組25所產生的金鑰請求還可包含該電子裝置2的用戶識別資料(後稱金鑰用戶識別資訊),並且在該步驟S26中該伺服器單元1的處理單元13還判斷該金鑰用戶識別資料及該第一授權名單的第一用戶識別資料是否相同,若結果也為是,才進入步驟S27。如此以來,即可確保接收該金鑰請求的電子裝置2位於該授權區域內且屬於該第一授權名單。再者,在本實施例中是以一電子裝置2舉例說明,但不以此為限,在其他實施態樣中,也可藉多個電子裝置2實施本實施例,只要建立多個電子裝置2的多個第一用戶識別資訊於該第一授權名單即可。 It is to be noted that, in the step S26 of the embodiment, the server unit 1 only determines whether the electronic device 2 is located in the authorized area 301, but is not limited thereto. In other embodiments, the key request generated by the processing module 25 of the electronic device 2 in step S25 may further include user identification data (hereinafter referred to as key user identification information) of the electronic device 2, and in this step. The processing unit 13 of the server unit 1 in S26 further determines whether the key user identification data and the first user identification data of the first authorization list are the same. If the result is also yes, the process proceeds to step S27. In this way, it can be ensured that the electronic device 2 receiving the key request is located in the authorized area and belongs to the first authorization list. Furthermore, in the embodiment, an electronic device 2 is exemplified, but not limited thereto. In other embodiments, the embodiment may be implemented by using multiple electronic devices 2, as long as a plurality of electronic devices are established. A plurality of first user identification information of 2 may be in the first authorization list.

此外,在本實施例步驟S24~S26中,該處理單元13是透過比對該金鑰請求的GPS座標是否落在該辨別資料的GPS座標範圍內,而判斷該電子裝置2是否位於該被授權區域301內,但其判斷方式不以此為限。在本發明區域性資料分享方法的第二至第四實施例中將分別說明其他三個判斷該電子裝置2是否位於該被授權 區域301內的實施態樣。 In addition, in steps S24-S26 of the embodiment, the processing unit 13 determines whether the electronic device 2 is located in the GPS coordinate range of the identification data or not. In the area 301, the manner of judgment is not limited thereto. In the second to fourth embodiments of the regional data sharing method of the present invention, the other three will be separately determined whether the electronic device 2 is located at the authorized The implementation in area 301.

請參閱圖3,本發明區域性資料分享系統100一第二實施例包含一伺服器單元1、一電子裝置2及一位於該被授權區域31內的存取點3。在本實施例中,該伺服器單元1與該第一實施例大致相同,差別在於本實施例的辨別資料是例如包括一該存取點3的媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,但不以此為限。在本實施例中,該電子裝置2與該第一實施例大致相同,差別在於本實施例的電子裝置2還包括一短距通訊模組23。在本實施例中,該短訊通訊模組23譬如支援WiFi技術、藍芽(Blue tooth)技術及NFC(Near Field Communication)技術其中至少一者。 Referring to FIG. 3, a second embodiment of the regional data sharing system 100 of the present invention includes a server unit 1, an electronic device 2, and an access point 3 located in the authorized area 31. In this embodiment, the server unit 1 is substantially the same as the first embodiment, except that the identification data of the embodiment is, for example, a media access control address including a access point 3, and a service setting identifier. And at least one of the IP addresses, but not limited to this. In this embodiment, the electronic device 2 is substantially the same as the first embodiment. The difference is that the electronic device 2 of the embodiment further includes a short-range communication module 23. In this embodiment, the short message communication module 23 supports at least one of a WiFi technology, a Bluetooth technology, and a NFC (Near Field Communication) technology.

該存取點3具有一通訊器31、一短距通訊器32及一電連接該通訊器31及該短距通訊器32的控制器33。在本實施例中,該存取點3具有媒體存取控制位址、一服務設定識別符及一IP位址其中該至少一者。在本實施例中,該存取點3的控制器33利用該通訊器31連接至該通訊網路201並經由該伺服器單元1的通訊單元12與該處理單元13進行有線或無線通訊。在本實施例中,該短距通訊器32支援例如WiFi技術、藍芽(Blue tooth)技術及NFC(Near Field Communication)技術其中至少該者,該存取點3的控制器33利用該短距通訊器32經由該電子裝置2的短距通訊模組23與該處理模 組25進行短距無線通訊。如此一來,該電子裝置2即可經由該存取點3與該伺服器單元1進行資料的雙向傳輸。 The access point 3 has a communicator 31, a short-range communicator 32, and a controller 33 electrically connected to the communicator 31 and the short-range communicator 32. In this embodiment, the access point 3 has at least one of a media access control address, a service setting identifier, and an IP address. In the present embodiment, the controller 33 of the access point 3 is connected to the communication network 201 by the communication device 31 and performs wired or wireless communication with the processing unit 13 via the communication unit 12 of the server unit 1. In this embodiment, the short-range communicator 32 supports at least one of a WiFi technology, a Bluetooth technology, and a NFC (Near Field Communication) technology, and the controller 33 of the access point 3 utilizes the short distance. The communicator 32 communicates with the processing module via the short-range communication module 23 of the electronic device 2 Group 25 performs short-range wireless communication. In this way, the electronic device 2 can perform bidirectional transmission of data with the server unit 1 via the access point 3.

請參閱圖3及圖4,該區域性資料分享系統100的第二實施例例如用以執行本發明區域性資料分享方法的一第二實施例,在本實施例中,步驟S41~S43與第一實施例的步驟S21~S23相同,且步驟S47~S49與第一實施例的步驟S27~S29相同。主要差異在於用以判斷該電子裝置2是否位於該被授權區域301內的步驟S44~S46,說明如下。 Referring to FIG. 3 and FIG. 4, a second embodiment of the regional data sharing system 100 is used to perform a second embodiment of the regional data sharing method of the present invention. In this embodiment, steps S41 to S43 and Steps S21 to S23 of an embodiment are the same, and steps S47 to S49 are the same as steps S27 to S29 of the first embodiment. The main difference is the steps S44 to S46 for determining whether the electronic device 2 is located in the authorized area 301, as explained below.

在步驟S44中,該電子裝置2由該存取點3接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者。 In step S44, the electronic device 2 receives at least one of a media access control address, a service setting identifier, and an IP address from the access point 3.

在步驟S45中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該媒體存取控制位址、該服務設定識別符及該IP位址其中至少該者,並將該金鑰請求傳送至該伺服器單元1。 In step S45, the processing module 25 of the electronic device 2 generates a key request for requesting the key, the key request including the media access control address, the service setting identifier, and the IP address. At least the one of them transmits the key request to the server unit 1.

在步驟S46中,該伺服器單元1的處理單元13是判斷該金鑰請求的媒體存取控制位址、該服務設定識別符及該IP位址其中該至少一者與該辨別資料的媒體存取控制位址、該服務設定識別符及該IP位址該至少一者相同,則該處理單元13判斷該電子裝置2位於該被授權區域301內,並進入步驟S47。若結果為否,則進入步驟S49,結束本實施例,但不以此為限。 In step S46, the processing unit 13 of the server unit 1 is configured to determine the media access control address of the key request, the service setting identifier, and the IP address of the at least one of the media stored in the identification data. If the control address, the service setting identifier, and the IP address are the same, the processing unit 13 determines that the electronic device 2 is located in the authorized area 301, and proceeds to step S47. If the result is no, the process proceeds to step S49, and the embodiment is ended, but not limited thereto.

藉由該區域性資料系統100的第二實施例執行步驟S44~S48能確保使用該金鑰開啟該加密資料的電子裝置2是位於存取點3的有效通訊範圍內,藉此規範取得該加密資料的使用者的僅於該存取點3的有效通訊範圍內使用該加密資料,進而滿足該加密資料提供者希望該加密資料僅在該存取點3的有效通訊範圍內公開之需求。在本實施例中,存取點3的有效通訊範圍即定義出該被授權區域301,因此,透過將該存取點3設置在一特定地點例如會議室或教室,即可規範使用者在該特定地點才能使用該加密資料。 By performing steps S44-S48 in the second embodiment of the regional data system 100, it can be ensured that the electronic device 2 that uses the key to open the encrypted data is located within the effective communication range of the access point 3, thereby obtaining the encryption by the specification. The user of the data uses the encrypted data only within the effective communication range of the access point 3, thereby satisfying the requirement that the encrypted data provider desires that the encrypted data is only disclosed within the effective communication range of the access point 3. In this embodiment, the effective communication range of the access point 3 defines the authorized area 301. Therefore, by setting the access point 3 in a specific place such as a conference room or a classroom, the user can be regulated. This encrypted material is only available in certain locations.

請參閱圖5,本發明區域性資料分享系統100一第三實施例包含一伺服器單元1、一電子裝置2及一位於該被授權區域31內的通訊裝置4。在本實施例中,該伺服器單元1及該電子裝置2與本系統的第二實施例大致相同,主要差別在於該辨別資料包括該通訊裝置4的識別碼。 Referring to FIG. 5, a third embodiment of the regional data sharing system 100 of the present invention includes a server unit 1, an electronic device 2, and a communication device 4 located in the authorized area 31. In the present embodiment, the server unit 1 and the electronic device 2 are substantially the same as the second embodiment of the system. The main difference is that the identification data includes the identification code of the communication device 4.

在本實施例中,該通訊裝置4包含一短距通訊單元41及一電連接該短距通訊單元41的控制單元42。在本實施例中,該通訊裝置4利用該短距通訊單元42以一短距離通訊技術發送一識別碼至該電子裝置2的短距通訊模組23,具體而言,該短距離通訊技術例如支援WiFi技術、藍芽(Blue tooth)技術及NFC(Near Field Communication)技術其中至少該者。在本實施例中,該通訊裝置4例如為一信標裝置(Beacon Device),以單向廣播 (Unidirectional Broadcasr)的方式向外發送一包含該識別碼的藍芽信號,但不以此為限。 In this embodiment, the communication device 4 includes a short-range communication unit 41 and a control unit 42 electrically connected to the short-range communication unit 41. In this embodiment, the communication device 4 uses the short-range communication unit 42 to transmit an identification code to the short-range communication module 23 of the electronic device 2 by a short-distance communication technology. Specifically, the short-range communication technology includes, for example, the short-range communication technology. Support at least one of WiFi technology, Blue tooth technology and NFC (Near Field Communication) technology. In this embodiment, the communication device 4 is, for example, a beacon device, which is broadcast in one direction. (Unidirectional Broadcasr) sends out a Bluetooth signal containing the identification code, but not limited to this.

請參閱圖5及圖6,該區域性資料分享系統100的第三實施例例如用以執行本發明區域性資料分享方法的一第三實施例,在本實施例中,步驟S61~S63與第一實施例的步驟S21~S23相同,且步驟S67~S69與第一實施例的步驟S27~S29相同。主要差異在於判斷該電子裝置2是否位於該被授權區域301內的步驟S64~S66,說明如下。 Referring to FIG. 5 and FIG. 6, a third embodiment of the regional data sharing system 100 is used to perform a third embodiment of the regional data sharing method of the present invention. In this embodiment, steps S61-S63 and Steps S21 to S23 of an embodiment are the same, and steps S67 to S69 are the same as steps S27 to S29 of the first embodiment. The main difference is in steps S64 to S66 for judging whether or not the electronic device 2 is located in the authorized area 301, as explained below.

在步驟S64中,該電子裝置2由該通訊裝置4接收該識別碼。 In step S64, the electronic device 2 receives the identification code from the communication device 4.

在步驟S65中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該識別碼,並將該金鑰請求傳送至該伺服器單元1。 In step S65, the processing module 25 of the electronic device 2 generates a key request for requesting the key, the key request includes the identification code, and transmits the key request to the server unit 1.

在步驟S66中,該伺服器單元1的處理單元13是判斷該金鑰請求的識別碼與該辨別資料的識別碼是否相同,若結果為是,則該處理單元13判斷該電子裝置2位於該被授權區域301內,並進入步驟S67。若結果為否,則進入步驟S69,結束本實施例,但不以此為限。 In step S66, the processing unit 13 of the server unit 1 determines whether the identification code of the key request and the identification code of the identification data are the same. If the result is yes, the processing unit 13 determines that the electronic device 2 is located in the Within the authorized area 301, the process proceeds to step S67. If the result is no, the process proceeds to step S69, and the embodiment is terminated, but not limited thereto.

該區域性資料系統100透過執行本實施例的步驟S64~S68,確保能使用該金鑰開啟該加密資料的電子裝置2是位於 通訊裝置4的有效通訊範圍內,藉此規範取得該加密資料的使用者的僅於該通訊裝置4的有效通訊範圍內使用該資料,進而滿足該加密資料提供者希望該加密資料僅在該通訊裝置4的有效通訊範圍內公開之需求。在本實施例中,通訊裝置4的有效通訊範圍即定義出該被授權區域301,因此,透過將該通訊裝置4設置在一特定地點例如會議室或教室,即可規範使用者在該特定地點才能使用該加密資料。 The regional data system 100 ensures that the electronic device 2 capable of using the key to open the encrypted data is located by performing steps S64-S68 of the embodiment. Within the effective communication range of the communication device 4, the user who obtains the encrypted data is used to use the data only within the effective communication range of the communication device 4, thereby satisfying that the encrypted data provider desires the encrypted data only in the communication. The need for disclosure within the effective communication range of device 4. In this embodiment, the effective communication range of the communication device 4 defines the authorized area 301. Therefore, by setting the communication device 4 in a specific place such as a conference room or a classroom, the user can be regulated at the specific place. This encrypted material can be used.

請參閱圖7,本發明區域性資料分享系統100一第四實施例包含一伺服器單元1及一電子裝置2。在本實施例中,該伺服器單元1與該第一實施例大致相同,差別在於本實施例的辨別資料例如包括一相關於該被授權區域301的參考影像。在本實施例中,該電子裝置2與該第一實施例大致相同,差別在於本實施例的電子裝置2還包括一電連接該處理模組的影像拍攝模組26,該影像拍攝模組26用於拍攝該電子裝置2所在環境以產生一影像。 Referring to FIG. 7, a fourth embodiment of the regional data sharing system 100 of the present invention includes a server unit 1 and an electronic device 2. In the present embodiment, the server unit 1 is substantially the same as the first embodiment, except that the discrimination material of the embodiment includes, for example, a reference image associated with the authorized area 301. In this embodiment, the electronic device 2 is substantially the same as the first embodiment. The difference is that the electronic device 2 of the embodiment further includes an image capturing module 26 electrically connected to the processing module. The image capturing module 26 It is used to capture the environment of the electronic device 2 to generate an image.

請參閱圖7及圖8,該區域性資料分享系統100的第四實施例例如用以執行本發明區域性資料分享方法的一第四實施例,在本實施例中,步驟S81~S83與第一實施例的步驟S21~S23相同,且步驟S87~S89與第一實施例的步驟S27~S29相同。主要差異在於判斷該電子裝置2是否位於該被授權區域301內的步驟S84~S86,說明如下。 Referring to FIG. 7 and FIG. 8, a fourth embodiment of the regional data sharing system 100 is, for example, a fourth embodiment for performing the regional data sharing method of the present invention. In this embodiment, steps S81-S83 and Steps S21 to S23 of an embodiment are the same, and steps S87 to S89 are the same as steps S27 to S29 of the first embodiment. The main difference is in steps S84 to S86 for judging whether or not the electronic device 2 is located in the authorized area 301, as explained below.

在步驟S84中,該電子裝置2的影像拍攝模組26拍攝該電子裝置2所在環境以產生一影像。 In step S84, the image capturing module 26 of the electronic device 2 captures the environment of the electronic device 2 to generate an image.

在步驟S85中,該電子裝置2的處理模組25產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該影像,並將該金鑰請求傳送至該伺服器單元1。 In step S85, the processing module 25 of the electronic device 2 generates a key request for requesting the key, the key request includes the image, and transmits the key request to the server unit 1.

在步驟S86中,該伺服器單元1的處理單元13使用一影像比對技術判斷該金鑰請求的影像與該辨別資料的參考影像相似,若結果為是,則該處理單元13判斷該電子裝置2位於該被授權區域301內,並進入步驟S87。若結果為否,則進入步驟S89,結束本實施例,但不以此為限。 In step S86, the processing unit 13 of the server unit 1 uses an image comparison technique to determine that the image requested by the key is similar to the reference image of the identification data. If the result is yes, the processing unit 13 determines the electronic device. 2 is located in the authorized area 301, and proceeds to step S87. If the result is no, the process proceeds to step S89, and the embodiment is ended, but not limited thereto.

請參閱圖9,本發明一種區域性資料分享系統100一第五實施例與第一實施例大致相同,差別在於本實施例還包含多個電子裝置2,且在本實施例中,該伺服器單元1與每一電子裝置2的結構及功能與該第一實施例大致相同,於此不再贅述。 Referring to FIG. 9, a fifth embodiment of a regional data sharing system 100 of the present invention is substantially the same as the first embodiment. The difference is that the embodiment further includes a plurality of electronic devices 2, and in the embodiment, the server The structure and function of the unit 1 and each of the electronic devices 2 are substantially the same as those of the first embodiment, and details are not described herein again.

請參閱圖9及圖10,該區域性資料分享系統100的第五實施例例如用以執行本發明區域性資料分享方法的一第五實施例,該實施例包含以下步驟。 Referring to FIG. 9 and FIG. 10, a fifth embodiment of the regional data sharing system 100 is, for example, a fifth embodiment for performing the regional data sharing method of the present invention. The embodiment includes the following steps.

在步驟S101中,該等電子裝置2其中一者的處理模組25產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元1。該資料請求包含該等電子裝置2的該其中一者的用 戶識別資訊。 In step S101, the processing module 25 of one of the electronic devices 2 generates a data request for requesting the encrypted data, and transmits the data request to the server unit 1. The data request includes the use of one of the electronic devices 2 User identification information.

在步驟S102中,當該伺服器單元1的處理單元13接收到來自該等電子裝置2的該其中一者的資料請求,該處理單13判斷該資料請求的用戶識別資訊與該第一授權名單的第一用戶識別資訊是否相同,若結果為是,則進入步驟S103。若結果為否,則進入步驟S110,結束本實施例,但不以此為限。 In step S102, when the processing unit 13 of the server unit 1 receives the data request from the one of the electronic devices 2, the processing unit 13 determines the user identification information of the data request and the first authorization list. Whether the first user identification information is the same or not, if the result is YES, the process proceeds to step S103. If the result is no, the process proceeds to step S110, and the embodiment is terminated, but not limited thereto.

於步驟S103中,該處理單元13將該加密資料傳送至該等電子裝置2的該其中一者。 In step S103, the processing unit 13 transmits the encrypted data to the one of the electronic devices 2.

在步驟S104中,所述該等電子裝置2的該其中一者的GPS模組24產生一所述該等電子裝置2的該其中一者所在位置的GPS座標。 In step S104, the GPS module 24 of the one of the electronic devices 2 generates a GPS coordinate of the location of the one of the electronic devices 2.

在步驟S105中,該等電子裝置2的該其中一者產生一用於索取該金鑰的金鑰請求,該金鑰請求包含該等該等電子裝置2的該其中一者之用戶識別資訊(後稱金鑰用戶識別資訊)及該GPS座標,且所述該等電子裝置2的該其中一者將該金鑰請求傳送至該伺服器單元1。 In step S105, the one of the electronic devices 2 generates a key request for requesting the key, the key requesting user identification information including the one of the electronic devices 2 ( The key is referred to as the key user identification information and the GPS coordinates, and the one of the electronic devices 2 transmits the key request to the server unit 1.

在步驟S106中,當該伺服器單元1的處理單元13接收到來該等該等電子裝置2的該其中一者的金鑰請求,該處理單元13根據該金鑰請求的GPS座標及該辨別資料的GPS座標範圍判斷所述該等電子裝置2其中一者是否位於該被授權區域301內且判斷所 述該等電子裝置2的該其中一者的金鑰用戶識別資訊是否尚未被加入一出席清單,若結果皆為是,則進入步驟S107。若結果為否,則進入步驟S110,結束本實施例,但不以此為限。補充說明的是,判斷所述該等電子裝置2的該其中一者是否位於該被授權區域301內的方式不以此為限,在其他的實施態樣中,也可透過譬如第二至第四實施例所揭露的方法並配合對應的系統實施例執行進行判斷,換句話說,該被授權區域301也可以為一特定地點譬如會議室或教室等等。 In step S106, when the processing unit 13 of the server unit 1 receives a key request for the one of the electronic devices 2, the processing unit 13 determines the GPS coordinates and the identification data according to the key. The GPS coordinate range determines whether one of the electronic devices 2 is located in the authorized area 301 and judges Whether the key user identification information of the one of the electronic devices 2 has not been added to an attendance list, and if the result is yes, the process proceeds to step S107. If the result is no, the process proceeds to step S110, and the embodiment is terminated, but not limited thereto. It is to be noted that the manner of determining whether the one of the electronic devices 2 is located in the authorized area 301 is not limited thereto. In other implementation manners, the second to the second The method disclosed in the fourth embodiment is performed in conjunction with the corresponding system embodiment. In other words, the authorized area 301 can also be a specific place such as a conference room or a classroom.

在步驟S107中,該處理單元13將該金鑰請求的該金鑰用戶識別資訊加入該出席清單,並判斷該出席清單中的金鑰用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元13判斷該出席清單中的金鑰用戶識別資訊的數目到達該預定出席門檻,則進入步驟S108。若結果為否,則進入步驟S110,結束本實施例,但不以此為限。在本實施例中,該預定出席門檻是指預設的電子裝置2的數量,因此,若每一電子裝置2是由一使用者所操作,則該預定出席門檻代表位於該被授權區內的使用者的出席人數,而出席人數必須到達該門檻,才能進入步驟S108。 In step S107, the processing unit 13 adds the key user identification information requested by the key to the attendance list, and determines whether the number of key user identification information in the presence list reaches a predetermined attendance threshold, when the processing is performed. The unit 13 judges that the number of key user identification information in the presence list reaches the predetermined attendance threshold, and proceeds to step S108. If the result is no, the process proceeds to step S110, and the embodiment is terminated, but not limited thereto. In this embodiment, the predetermined presence threshold refers to the number of preset electronic devices 2. Therefore, if each electronic device 2 is operated by a user, the predetermined presence threshold is located in the authorized area. The number of attendees of the user, and the number of attendees must reach the threshold before proceeding to step S108.

在步驟S108中,該處理單元13將該金鑰傳送至該出席清單中的金鑰用戶識別資訊對應之電子裝置2。 In step S108, the processing unit 13 transmits the key to the electronic device 2 corresponding to the key user identification information in the attendance list.

在步驟S109中,該出席清單中的金鑰用戶識別資訊對 應之電子裝置2使用該金鑰將該加密資料解密。 In step S109, the key user identification information pair in the attendance list The electronic device 2 should use the key to decrypt the encrypted data.

由上述可知,透過以區域性資料分享系統100的第五實施例執行步驟S106~S109,不僅能確保只有位於該GPS座標範圍(即被授權區域301,也可以是一會議室或教室)內的電子裝置2才能使用該金鑰開啟該加密資料,且還能確保當該電子裝置2使用該金鑰開起該加密資料時,位於該GPS座標範圍內的電子裝置2數量已到達一預定出席門檻。換句話說,加密資料的提供者可藉由設定該預定出席門檻,進而控管每一使用該加密資料的使用者必須位於該GPS座標範圍內而且位於該GPS座標範圍內的使用者人數達到一定數量才能得到該金鑰。 It can be seen from the above that by performing steps S106-S109 in the fifth embodiment of the regional data sharing system 100, it is ensured that only the GPS coordinate range (ie, the authorized area 301, or a conference room or classroom) is located. The electronic device 2 can use the key to open the encrypted data, and can also ensure that when the electronic device 2 uses the key to open the encrypted data, the number of electronic devices 2 located within the GPS coordinate range has reached a predetermined attendance threshold. . In other words, the provider of the encrypted data can control the number of users who are within the GPS coordinate range and are within the GPS coordinates by setting the predetermined attendance threshold. The quantity can get the key.

請回顧圖9,本發明一種區域性資料分享系統100一第六實施例該第五實施例大致相同,主要差別在於該伺服器單元1的儲存單元11還儲存有一第二授權名單,該第二授權名單包含一相異於該第一授權名單的用戶識別資訊之用戶識別資訊。 Referring to FIG. 9 , a fifth embodiment of a regional data sharing system 100 of the present invention is substantially the same. The main difference is that the storage unit 11 of the server unit 1 further stores a second authorization list, and the second The authorization list contains user identification information that is different from the user identification information of the first authorization list.

請參閱9及圖11,該區域性資料分享系統100的第六實施例例如用以執行本發明區域性資料分享方法的一第六實施例,該實施例包含以下步驟。 Referring to FIG. 9 and FIG. 11, a sixth embodiment of the regional data sharing system 100 is, for example, a sixth embodiment for performing the regional data sharing method of the present invention. The embodiment includes the following steps.

在步驟S111中,該等電子裝置2其中一者的處理模組25產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元1。該資料請求包含所述該等電子裝置2的該其中一者 的用戶識別資訊。 In step S111, the processing module 25 of one of the electronic devices 2 generates a data request for requesting the encrypted data, and transmits the data request to the server unit 1. The data request includes one of the electronic devices 2 User identification information.

在步驟S112中,當該伺服器單元1的處理單元13接收到來自所述該等電子裝置2其中一者的資料請求,該處理單元13判斷該資料請求的用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊是否相同,當該處理單元13判斷該資料請求的用戶識別資訊與該第一授權名單或該第二授權名單的用戶識別資訊相同,則進入步驟S113。若該資料請求的用戶識別資訊與該第一授權名單的第一用戶識別資訊或該第二授權名單的第二用戶識別資訊皆不相同,則進入步驟S120,結束本實施例,但不以此為限。 In step S112, when the processing unit 13 of the server unit 1 receives a data request from one of the electronic devices 2, the processing unit 13 determines the user identification information of the data request and the first authorization list. Or the user identification information of the second authorization list is the same. When the processing unit 13 determines that the user identification information requested by the data is the same as the user identification information of the first authorization list or the second authorization list, the process proceeds to step S113. If the user identification information requested by the data is different from the first user identification information of the first authorization list or the second user identification information of the second authorization list, the process proceeds to step S120, and the embodiment is terminated. Limited.

在步驟S113中,該處理單元13將該加密資料傳送至所述該等電子裝置2的該其中一者。 In step S113, the processing unit 13 transmits the encrypted data to the one of the electronic devices 2.

在步驟S114中,該GPS模組24產生一所述該等電子裝置2的該其中一者所在位置的GPS座標。 In step S114, the GPS module 24 generates a GPS coordinate of a location of the one of the electronic devices 2.

在步驟S115中,所述該等電子裝置2的該其中一者產生一用於索取該金鑰的金鑰請求,該金鑰請求包含所述該等電子裝置2的該其中一者之用戶識別資訊及該GPS座標,且所述該等電子裝置2其中一者將該金鑰請求傳送至該伺服器單元1。 In step S115, the one of the electronic devices 2 generates a key request for requesting the key, the key request including the user identification of the one of the electronic devices 2 Information and the GPS coordinates, and one of the electronic devices 2 transmits the key request to the server unit 1.

在步驟S116中,當該伺服器單元1的處理單元13接收到來自所述該等電子裝置2其中一者的金鑰請求,該處理單元13根據該金鑰請求的GPS座標及該辨別資料的GPS座標範圍判斷所述 該等電子裝置2其中一者是否位於該GPS座標範圍(即該被授權區域301,也可以是一會議室或教室)內且該資料請求的用戶識別資訊與該第一授權名單的用戶識別資訊是否相同,若答案皆為是,則進入步驟S117。若其中一結果為否,則進入步驟S120,結束本實施例,但不以此為限。補充說明的是,判斷所述該等電子裝置2其中一者是否位於該被授權區域301內的方式不以此為限,在其他的實施態樣中,也可透過譬如第二至第四實施例所揭露的方法並配合對應的系統實施例執行進行判斷,換句話說,該被授權區域301也可以為一特定地點譬如會議室或教室等等。 In step S116, when the processing unit 13 of the server unit 1 receives a key request from one of the electronic devices 2, the processing unit 13 according to the GPS coordinates of the key request and the identification data GPS coordinate range judgment Whether one of the electronic devices 2 is located in the GPS coordinate range (ie, the authorized area 301, or a conference room or a classroom) and the user identification information requested by the data and the user identification information of the first authorization list If they are the same, if the answer is yes, the process proceeds to step S117. If one of the results is no, the process proceeds to step S120, and the embodiment is terminated, but not limited thereto. It is to be noted that the manner of determining whether one of the electronic devices 2 is located in the authorized area 301 is not limited thereto. In other implementation manners, for example, the second to fourth implementations may also be implemented. The method disclosed in the example is performed in conjunction with the corresponding system embodiment. In other words, the authorized area 301 can also be a specific place such as a conference room or a classroom.

在步驟S117中,該處理單元13將該金鑰傳送至所述該等電子裝置2其中一者。 In step S117, the processing unit 13 transmits the key to one of the electronic devices 2.

在步驟S118中,所述該等電子裝置2其中一者使用該金鑰將該加密資料解密。 In step S118, one of the electronic devices 2 decrypts the encrypted data using the key.

在步驟S119中,所述該等電子裝置2其中一者的處理模組25將該金鑰傳送至另一對應於該第二授權名單的用戶識別資訊之電子裝置2,供所述另一電子裝置2使用該金鑰將該加密資料解密。 In step S119, the processing module 25 of one of the electronic devices 2 transmits the key to another electronic device 2 corresponding to the user identification information of the second authorization list for the other electronic device. The device 2 decrypts the encrypted data using the key.

由上述可知,透過以區域性資料分享系統100的第六實施例執行步驟S116~S119,當持有一與該第一授權名單具有相同的用戶識別資訊的電子裝置2之持有者(譬如一會議之主席)在該被 授權區域31內,其他持有對應於第二授權名單的第二用戶識別資訊之電子裝置2的使用者(譬如與會者)才能取得該金鑰並且使用該加密資料。 It can be seen from the above that the holders of the electronic device 2 having the same user identification information as the first authorization list are executed through the steps S116 to S119 in the sixth embodiment of the regional data sharing system 100 (for example, The chairman of the meeting) Within the authorization area 31, other users (such as attendees) of the electronic device 2 holding the second user identification information corresponding to the second authorization list can obtain the key and use the encrypted data.

綜上所述,在本發明區域性資料分享系統100及區域性資料分享方法的第一至第四實施例中,該伺服器單元1的處理單元13判斷該電子裝置2及該第一授權名單的用戶識別資訊相同後,則將該加密資料傳送至屬於該第一授權名單內的電子裝置2,藉此確保加密資料是被預先被傳送至該第一授權名單內的電子裝置2,接者,以不同的方式判斷該電子裝置2之所在區域是位於該被授權區域301內,才將該金鑰傳送至位於該被授權區域301的電子裝置2,以供該電子裝置2的處理模組25將該加密資料解密,藉此確保該加密資料僅於該被授權區域301內被使用。在第五實施例中,該處理單元13還需進一步判斷出席清單中的用戶識別資訊的數目是否到達一預定出席門檻,才將金鑰傳送至出席清單的用戶識別資訊所對應的電子裝置,換句話說,加密資料的提供者可透過設定該預定出席門檻確保位於該被授權區域31內的電子裝置2之使用者的出席人數到達一預定數量才讓各個使用者使用該金鑰解開該加密資料。在第六實施例中,該處理單元13還需進一步判斷該等電子裝置2的該其中一者的用戶識別資訊與該第一授權名單的第一用戶識別資訊是相同且位於被授權區域301內,該等電子裝置2的該其中一者才 會接收到該金鑰,並將該金鑰傳送至另一對應於第二授權名單的用戶識別資訊之電子裝置2,換句話說,當持有一與該第一授權名單具有相同的用戶識別資訊的電子裝置2之持有者(譬如一會議之主席)在該被授權區域31內,其他持有對應於第二授權名單的第二用戶識別資訊之電子裝置2的使用者(譬如與會者)才能取得該金鑰並且使用該加密資料。故確實能達成本發明之目的。 In summary, in the first to fourth embodiments of the regional data sharing system 100 and the regional data sharing method of the present invention, the processing unit 13 of the server unit 1 determines the electronic device 2 and the first authorization list. After the user identification information is the same, the encrypted data is transmitted to the electronic device 2 belonging to the first authorization list, thereby ensuring that the encrypted data is previously transmitted to the electronic device 2 in the first authorization list. In a different manner, it is determined that the area where the electronic device 2 is located is located in the authorized area 301, and the key is transmitted to the electronic device 2 located in the authorized area 301 for processing module of the electronic device 2. The encrypted data is decrypted 25, thereby ensuring that the encrypted material is used only in the authorized area 301. In the fifth embodiment, the processing unit 13 further needs to determine whether the number of user identification information in the presence list reaches a predetermined attendance threshold, and then transmits the key to the electronic device corresponding to the user identification information of the attendance list. In other words, the provider of the encrypted data can ensure that the number of attendees of the electronic device 2 located in the authorized area 31 reaches a predetermined number by setting the predetermined attendance threshold, so that each user uses the key to unlock the encryption. data. In the sixth embodiment, the processing unit 13 further needs to determine that the user identification information of the one of the electronic devices 2 is the same as the first user identification information of the first authorization list and is located in the authorized area 301. One of the electronic devices 2 Receiving the key and transmitting the key to another electronic device 2 corresponding to the user identification information of the second authorization list, in other words, holding the same user identification as the first authorization list The holder of the electronic device 2 of the information (such as the chairman of a conference) in the authorized area 31, other users of the electronic device 2 holding the second user identification information corresponding to the second authorization list (such as a participant) ) to get the key and use the encrypted data. Therefore, the object of the present invention can be achieved.

惟以上所述者,僅為本發明之實施例而已,當不能以此限定本發明實施之範圍,凡是依本發明申請專利範圍及專利說明書內容所作之簡單的等效變化與修飾,皆仍屬本發明專利涵蓋之範圍內。 However, the above is only the embodiment of the present invention, and the scope of the invention is not limited thereto, and all the equivalent equivalent changes and modifications according to the scope of the patent application and the patent specification of the present invention are still The scope of the invention is covered.

Claims (14)

一種區域性資料分享系統,包含:一伺服器單元,包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、用於解密該加密資料的一金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含至少一第一用戶識別資訊;及至少一電子裝置,包括一處理模組;該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元,該資料請求包含一用戶識別資訊;當該伺服器單元的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置;當該伺服器單元的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置;該電子裝置的處理模組使用該金鑰將該加密資料解 密。 A regional data sharing system includes: a server unit, including a storage unit and a processing unit electrically connected to the storage unit, the storage unit storing encrypted data, a key for decrypting the encrypted data, and a first An authorization list, and the identification information related to an authorized area, the first authorization list includes at least one first user identification information; and at least one electronic device, including a processing module; the processing module of the electronic device generates a And a data request for requesting the encrypted data, and transmitting the data request to the server unit, the data request includes a user identification information; when the processing unit of the server unit receives the data request, the processing unit determines the Whether the user identification information requested by the data is the same as the first user identification information of the first authorization list, and the processing unit determines that the user identification information requested by the data is the same as the first user identification information of the first authorization list. And the processing unit transmits the encrypted data to the electronic device; when the processing unit of the server unit Receiving a key request from the electronic device for requesting the key, the processing unit determining, according to the key request and the identification data, whether the electronic device is located in the authorized area, when the processing unit is based on the gold The key request and the identification data determine that the electronic device is located in the authorized area, and the processing unit transmits the key to the electronic device; the processing module of the electronic device uses the key to solve the encrypted data dense. 如請求項1所述的區域性資料分享系統,其中,該第一授權名單包含多個第一用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置;當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該等第一用戶識別資訊其中一者是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該等第一用戶識別資訊的該其中一者相同,該處理單元將該加密資料傳送至該等電子裝置的該其中一者;該金鑰請求包含一金鑰用戶識別資訊,當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷該等電子裝置的該其中一者位於該被授權區域內,且該金鑰請求的該金鑰用戶識別資訊尚未被加入一出席清單,則該處理單元將該金鑰請求的該金鑰用戶識別資訊加入該出席清單,並判斷該出席清單中的金鑰用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的該等金鑰用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的該等金鑰用戶識別資訊對應之電子裝置,供該出席清單中的該等金鑰用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。 The regional data sharing system of claim 1, wherein the first authorization list comprises a plurality of first user identification information, and the regional data sharing system comprises a plurality of electronic devices; when the server unit processes Receiving, by the unit, the data request from one of the electronic devices, the processing unit determining whether the user identification information requested by the data is identical to one of the first user identification information of the first authorization list, when the The processing unit determines that the user identification information requested by the data is the same as the one of the first user identification information of the first authorization list, and the processing unit transmits the encrypted data to the one of the electronic devices The key request includes a key user identification information, when the processing unit of the server unit receives a key request from one of the electronic devices, and the processing unit determines according to the key request and the identification data. One of the electronic devices is located in the authorized area, and the key user identification information requested by the key has not been added. Upon attending the list, the processing unit adds the key user identification information requested by the key to the attendance list, and determines whether the number of key user identification information in the presence list reaches a predetermined attendance threshold, when the processing unit Determining that the number of the key user identification information in the attendance list reaches the predetermined attendance threshold, the processing unit transmitting the key to the electronic device corresponding to the key user identification information in the attendance list for the attendance The electronic device corresponding to the key user identification information in the list uses the key to decrypt the encrypted data. 如請求項1所述的區域性資料分享系統,其中,該儲存單元還儲存有一第二授權名單,該第二授權名單包含相異於該第一授權名單的該第一用戶識別資訊之一第二用戶識別資訊,所述的區域性資料分享系統包含多個電子裝置;當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊或該第二授權名單的該第二用戶識別資訊是否相同,當該處理單元判斷該資料請求的該第一用戶識別資訊與該第一授權名單的該第一用戶識別資訊或該第二授權名單的該第二用戶識別資訊相同,該處理單元將該加密資料傳送至該等電子裝置的該其中一者;該金鑰請求包含一金鑰用戶識別資訊,當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷所述該等電子裝置的該其中一者位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊相同,則該處理單元將該金鑰傳送至該等電子裝置的該其中一者,供該等電子裝置的該其中一者使用該金鑰將該加密資料解密;該等電子裝置的該其中一者的處理模組將該金鑰傳送至另一對應於該第二授權名單的該第二用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密。 The regional data sharing system of claim 1, wherein the storage unit further stores a second authorization list, where the second authorization list includes one of the first user identification information different from the first authorization list. Two user identification information, the regional data sharing system includes a plurality of electronic devices; when the processing unit of the server unit receives the data request from one of the electronic devices, the processing unit determines the data request Whether the user identification information is the same as the first user identification information of the first authorization list or the second user identification information of the second authorization list, and the processing unit determines the first user identification information of the data request and the The first user identification information of the first authorization list or the second user identification information of the second authorization list is the same, and the processing unit transmits the encrypted data to the one of the electronic devices; the key request includes a key user identification information, when the processing unit of the server unit receives a key request from one of the electronic devices, and The processing unit determines that the one of the electronic devices is located in the authorized area according to the key request and the identification data, and the processing unit determines the user identification information requested by the data and the first authorization list If the first user identification information is the same, the processing unit transmits the key to the one of the electronic devices, and the one of the electronic devices decrypts the encrypted data using the key; The processing module of the one of the electronic devices transmits the key to another electronic device corresponding to the second user identification information of the second authorization list, for the another electronic device to use the key The encrypted data is decrypted. 如請求項1至3其中任一項所述的區域性資料分享系統,其中,該電子裝置還包括一電連接該處理模組的GPS模組,該GPS模組產生指示出該電子裝置所在位置的一GPS座標,該金鑰請求還包含該GPS座標,該伺服器單元所儲存的該辨別資料包含該被授權區域的一GPS座標範圍;當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該處理單元判斷該電子裝置位於該被授權區域內。 The regional data sharing system of any one of claims 1 to 3, wherein the electronic device further comprises a GPS module electrically connected to the processing module, the GPS module generating a location indicating the electronic device a GPS coordinate, the key request further comprising the GPS coordinate, the identification data stored by the server unit includes a GPS coordinate range of the authorized area; when the processing unit determines that the GPS coordinate of the key request falls Within the GPS coordinate range of the discrimination data, the processing unit determines that the electronic device is located in the authorized area. 如請求項1至3其中任一項所述的區域性資料分享系統,還包含一位於該被授權區域內的存取點,當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址其中該至少一者的該金鑰請求;該伺服器單元所儲存的該辨別資料包含該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者;當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者相同,該處理單元判斷該電子裝置位於該被授權區域內。 The regional data sharing system of any one of claims 1 to 3, further comprising an access point located in the authorized area, when the electronic device is connected to a communication network via the access point, the electronic device Receiving, by the access point, at least one of a media access control address, a service setting identifier, and an IP address, and generating the media access control address, the service setting identifier, and the IP address The at least one of the key request; the identification data stored by the server unit includes the media access control address, the service setting identifier, and the IP address; when the processing unit Determining the media access control address of the key request, the service setting identifier, and the one of the IP address and the media access control address of the identification material, the service setting identifier, and the IP One of the addresses is the same, and the processing unit determines that the electronic device is located within the authorized area. 如請求項1至3其中任一項所述的區域性資料分享系統,還包含一位於該被授權區域內的通訊裝置,該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被 授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求;該伺服器單元所儲存的該辨別資料包含該識別碼;當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。 The regional data sharing system of any one of claims 1 to 3, further comprising a communication device located in the authorized area, the communication device transmitting an identification code using a short-range communication technology, when the electronic device Located in the quilt In the authorized area, the electronic device receives the identification code by using the short-range communication technology, and generates the key request including the identification code; the identification data stored by the server unit includes the identification code; when the processing unit determines The identification code of the key request is the same as the identification code of the identification material, and the processing unit determines that the electronic device is located in the authorized area. 如請求項1至3其中任一項所述的區域性資料分享系統,該電子裝置還包括一電連接該處理模組的影像拍攝模組,該影像拍攝模組用於拍攝該電子裝置所在環境以產生一影像,該金鑰請求還包含該影像;該伺服器單元所儲存的該辨別資料包含一相關於該被授權區域的參考影像;當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。 The area data sharing system of any one of claims 1 to 3, wherein the electronic device further comprises an image capturing module electrically connected to the processing module, wherein the image capturing module is configured to capture an environment of the electronic device To generate an image, the key request further includes the image; the identification data stored by the server unit includes a reference image related to the authorized area; and when the processing unit uses an image matching technology to determine the key The requested image is similar to the reference image of the identification material, and the processing unit determines that the electronic device is located in the authorized area. 一種區域性資料分享方法,由一伺服器單元及至少一電子裝置共同執行,該伺服器單元包括一儲存單元及一電連接該儲存單元的處理單元,該儲存單元儲存有加密資料、用於解密該加密資料的一金鑰、一第一授權名單,及相關於一被授權區域的辨別資料,該第一授權名單包含一第一用戶識別資訊,且該電子裝置包括一處理模組,該方法包含以下步驟:(A)該電子裝置的處理模組產生一用於索取該加密資料的資料請求,並將該資料請求傳送至該伺服器單元,該 資料請求包含一用戶識別資訊;(B)當該伺服器單元的處理單元接收到該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊相同,則該處理單元將該加密資料傳送至該電子裝置;(C)當該伺服器單元的處理單元接收到一來自該電子裝置且用於索取該金鑰的金鑰請求,該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置是否位於該被授權區域內,當該處理單元根據該金鑰請求及該辨別資料判斷該電子裝置位於該被授權區域內,該處理單元將該金鑰傳送至該電子裝置;及(D)該電子裝置的處理模組使用該金鑰將該加密資料解密。 A regional data sharing method is jointly performed by a server unit and at least one electronic device. The server unit includes a storage unit and a processing unit electrically connected to the storage unit. The storage unit stores encrypted data for decryption. a key of the encrypted data, a first authorization list, and a identification data related to an authorized area, the first authorization list includes a first user identification information, and the electronic device includes a processing module, the method The method includes the following steps: (A) the processing module of the electronic device generates a data request for requesting the encrypted data, and transmits the data request to the server unit, where The data request includes a user identification information; (B) when the processing unit of the server unit receives the data request, the processing unit determines the user identification information requested by the data and the first user identification information of the first authorization list. Whether it is the same, when the processing unit determines that the user identification information requested by the data is the same as the first user identification information of the first authorization list, the processing unit transmits the encrypted data to the electronic device; (C) when Receiving, by the processing unit of the server unit, a key request from the electronic device for requesting the key, the processing unit determining, according to the key request and the identification data, whether the electronic device is located in the authorized area, when The processing unit determines, according to the key request and the identification data, that the electronic device is located in the authorized area, the processing unit transmits the key to the electronic device; and (D) the processing module of the electronic device uses the gold The key decrypts the encrypted data. 如請求項8所述的區域性資料分享方法,是由該伺服器單元及多個電子裝置執行,該第一授權名單包含多個第一用戶識別資訊,其中,在該步驟(A)中,當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該等用戶識別資訊其中一者是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的的該等第一用戶識別資訊其中一者相同,該處理單元將該加密資 料傳送至該等電子裝置的該其中一者;在該步驟(C)中,該金鑰請求包含一金鑰用戶識別資訊,當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷該等電子裝置的該其中一者位於該被授權區域內,且該金鑰請求的該金鑰用戶識別資訊尚未被加入一出席清單,則該處理單元將該金鑰請求的該金鑰用戶識別資訊加入該出席清單,並判斷該出席清單中的金鑰用戶識別資訊的數目是否到達一預定出席門檻,當該處理單元判斷該出席清單中的金鑰用戶識別資訊的數目到達該預定出席門檻,該處理單元將該金鑰傳送至該出席清單中的該等金鑰用戶識別資訊對應之電子裝置,供該出席清單中的該等金鑰用戶識別資訊對應之電子裝置使用該金鑰將該加密資料解密。 The method for sharing a regional data according to claim 8 is performed by the server unit and a plurality of electronic devices, wherein the first authorization list includes a plurality of first user identification information, wherein, in the step (A), When the processing unit of the server unit receives the data request from one of the electronic devices, the processing unit determines one of the user identification information requested by the data and the user identification information of the first authorization list. Whether the same is the same, when the processing unit determines that the user identification information requested by the data is the same as one of the first user identification information of the first authorization list, the processing unit uses the encryption element Transferring to one of the electronic devices; in the step (C), the key request includes a key user identification information, and when the processing unit of the server unit receives one of the electronic devices The key request of the user, and the processing unit determines, according to the key request and the identification data, that the one of the electronic devices is located in the authorized area, and the key user identification information requested by the key has not been When the attendance list is added, the processing unit adds the key user identification information requested by the key to the attendance list, and determines whether the number of key user identification information in the attendance list reaches a predetermined attendance threshold, when the processing is performed. The unit determines that the number of key user identification information in the attendance list reaches the predetermined attendance threshold, and the processing unit transmits the key to the electronic device corresponding to the key user identification information in the attendance list for the attendance list The electronic device corresponding to the key user identification information in the key uses the key to decrypt the encrypted data. 如請求項8所述的區域性資料分享方法,是由該伺服器單元及多個電子裝置執行,該儲存單元還儲存有一第二授權名單,該第二授權名單包含相異於該第一授權名單的第一用戶識別資訊之一第二用戶識別資訊,其中,在步驟(D)後,還包含:(E)該等電子裝置的該其中一者的處理模組將該金鑰傳送至另一對應於該第二授權名單的該第二用戶識別資訊之電子裝置,供所述另一電子裝置使用該金鑰將該加密資料解密;其中,在該步驟(A)中,當該伺服器單元的處理單元 接收到來自該等電子裝置其中一者的該資料請求,該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊或該第二授權名單的該第二用戶識別資訊是否相同,當該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊或該第二授權名單的該第二用戶識別資訊相同,該處理單元將該加密資料傳送至該等電子裝置的該其中一者;在該步驟(C)中,該金鑰請求包含一金鑰用戶識別資訊,當該伺服器單元的處理單元接收到來自該等電子裝置其中一者的金鑰請求,且該處理單元根據該金鑰請求及該辨別資料判斷該等電子裝置的該其中一者位於該被授權區域內,且該處理單元判斷該資料請求的該用戶識別資訊與該第一授權名單的該第一用戶識別資訊相同,則該處理單元將該金鑰傳送至該等電子裝置的該其中一者,供該等電子裝置的該其中一者使用該金鑰將該加密資料解密。 The method for sharing a regional data according to claim 8 is performed by the server unit and a plurality of electronic devices, wherein the storage unit further stores a second authorization list, where the second authorization list is different from the first authorization The second user identification information of the first user identification information of the list, wherein, after the step (D), the method further comprises: (E) processing module of the one of the electronic devices transmitting the key to another An electronic device corresponding to the second user identification information of the second authorization list, wherein the another electronic device decrypts the encrypted data by using the key; wherein, in the step (A), when the server Unit processing unit Receiving the data request from one of the electronic devices, the processing unit determining the user identification information requested by the data and the first user identification information of the first authorization list or the second of the second authorization list Whether the user identification information is the same, and the processing unit determines that the user identification information requested by the data is the same as the first user identification information of the first authorization list or the second user identification information of the second authorization list, the processing unit Transmitting the encrypted data to the one of the electronic devices; in the step (C), the key request includes a key user identification information, and when the processing unit of the server unit receives the electronic Determining a key request of one of the devices, and the processing unit determines, according to the key request and the identification data, that the one of the electronic devices is located in the authorized area, and the processing unit determines the user of the data request The identification information is the same as the first user identification information of the first authorization list, and the processing unit transmits the key to the electronic device. In one, the one of which for such an electronic device using this key to decrypt the encrypted data. 如請求項8至10任一項所述的區域性資料分享方法,該電子裝置還包括一電連接該處理模組的GPS模組,其中,在步驟(C)前,還包含:(F)該GPS模組產生指示出該電子裝置所在位置的一GPS座標,該金鑰請求還包含該GPS座標,該伺服器單元所儲存的該辨別資料包含該被授權區域的一GPS座標範圍;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的GPS座標落在該辨別資料的該GPS座標範圍內,該 處理單元判斷該電子裝置位於該被授權區域內。 The regional data sharing method according to any one of claims 8 to 10, further comprising: a GPS module electrically connected to the processing module, wherein, before the step (C), the method further comprises: (F) The GPS module generates a GPS coordinate indicating the location of the electronic device, the key request further includes the GPS coordinate, and the identification data stored by the server unit includes a GPS coordinate range of the authorized area; In the step (C), when the processing unit determines that the GPS coordinate of the key request falls within the GPS coordinate range of the identification material, the The processing unit determines that the electronic device is located within the authorized area. 如請求項8至10任一項所述的區域性資料分享方法,還由一位於該被授權區域內的存取點共同執行,該伺服器單元所儲存的該辨別資料包含一媒體存取控制位址、一服務設定識別符及一IP位址其中至少一者,其中,在步驟(C)前,還包含:(G)當該電子裝置經由該存取點連接一通訊網路,該電子裝置由該存取點接收該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者,並產生包含該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者的該金鑰請求;其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者與該辨別資料的該媒體存取控制位址、該服務設定識別符及該IP位址的該其中一者相同,該處理單元判斷該電子裝置位於該被授權區域內。 The regional data sharing method according to any one of claims 8 to 10, further executed by an access point located in the authorized area, the identification data stored by the server unit includes a media access control At least one of a address, a service setting identifier and an IP address, wherein, before the step (C), the method further comprises: (G) when the electronic device is connected to a communication network via the access point, the electronic device Receiving, by the access point, the media access control address, the service setting identifier, and the IP address, and generating the media access control address, the service setting identifier, and the IP bit The key request of the one of the addresses; wherein, in the step (C), the processing unit determines the media access control address, the service setting identifier, and the IP address of the key request One of the ones is the same as the media access control address, the service setting identifier, and the IP address of the identification material, and the processing unit determines that the electronic device is located in the authorized area. 如請求項8至10任一項所述的區域性資料分享方法,還由一位於該被授權區域內的通訊裝置共同執行,該伺服器單元所儲存的該辨別資料包含該識別碼,其中,在步驟(C)前,還包含:(H)該通訊裝置使用一短距離通訊技術發送一識別碼,當該電子裝置位於該被授權區域內,該電子裝置使用該短距離通訊技術接收該識別碼,並產生包含該識別碼的該金鑰請求; 其中,在該步驟(C)中,當該處理單元判斷該金鑰請求的該識別碼與該辨別資料的該識別碼相同,該處理單元判斷該電子裝置位於該被授權區域內。 The method for sharing a regional data according to any one of claims 8 to 10, which is further executed by a communication device located in the authorized area, wherein the identification data stored by the server unit includes the identification code, wherein Before the step (C), the method further comprises: (H) the communication device transmitting an identification code by using a short-distance communication technology, and when the electronic device is located in the authorized area, the electronic device receives the identification by using the short-range communication technology a code and generate the key request containing the identification code; In the step (C), when the processing unit determines that the identification code of the key request is the same as the identification code of the identification material, the processing unit determines that the electronic device is located in the authorized area. 如請求項8至10其中任一項所述的區域性資料分享方法,該電子裝置還包括一電連接該處理模組的影像拍攝模組,該伺服器單元所儲存的該辨別資料包含一相關於該被授權區域的參考影像,其中,在步驟(C)前,還包含:(I)該影像拍攝模組拍攝該電子裝置所在環境以產生一影像;其中,在該步驟(C)中,該金鑰請求還包含該影像且當該處理單元使用一影像比對技術判斷該金鑰請求的該影像與該辨別資料的該參考影像相似,該處理單元判斷該電子裝置位於該被授權區域內。 The method of claim 4, wherein the electronic device further comprises an image capturing module electrically connected to the processing module, wherein the identifying data stored by the server unit comprises a correlation And the reference image of the authorized area, wherein, before the step (C), the method further comprises: (I) the image capturing module capturing an environment of the electronic device to generate an image; wherein, in the step (C), The key request further includes the image, and when the processing unit uses an image matching technique to determine that the image requested by the key is similar to the reference image of the identification material, the processing unit determines that the electronic device is located in the authorized area. .
TW105120876A 2016-07-01 2016-07-01 Regional data sharing system and method TWI622886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105120876A TWI622886B (en) 2016-07-01 2016-07-01 Regional data sharing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105120876A TWI622886B (en) 2016-07-01 2016-07-01 Regional data sharing system and method

Publications (2)

Publication Number Publication Date
TW201802701A TW201802701A (en) 2018-01-16
TWI622886B true TWI622886B (en) 2018-05-01

Family

ID=61725155

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105120876A TWI622886B (en) 2016-07-01 2016-07-01 Regional data sharing system and method

Country Status (1)

Country Link
TW (1) TWI622886B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI759908B (en) * 2020-10-15 2022-04-01 威聯通科技股份有限公司 The method of generating the authorization allow list and the information security system using it

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201032084A (en) * 2009-02-16 2010-09-01 Fineart Technology Co Ltd System for managing the external access of electronic file and method of the same
TW201408088A (en) * 2012-08-15 2014-02-16 Muchtel Technology Inc Location based digital right access authentication method and system thereof
US20140201528A1 (en) * 2012-04-10 2014-07-17 Scott A. Krig Techniques to monitor connection paths on networked devices
US20150169896A1 (en) * 2013-12-17 2015-06-18 Inwellcom Technology Co., Ltd. File management system and method
CN105516110A (en) * 2015-12-01 2016-04-20 成都汇合乾元科技有限公司 Mobile equipment secure data transmission method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201032084A (en) * 2009-02-16 2010-09-01 Fineart Technology Co Ltd System for managing the external access of electronic file and method of the same
US20140201528A1 (en) * 2012-04-10 2014-07-17 Scott A. Krig Techniques to monitor connection paths on networked devices
TW201408088A (en) * 2012-08-15 2014-02-16 Muchtel Technology Inc Location based digital right access authentication method and system thereof
US20150169896A1 (en) * 2013-12-17 2015-06-18 Inwellcom Technology Co., Ltd. File management system and method
CN105516110A (en) * 2015-12-01 2016-04-20 成都汇合乾元科技有限公司 Mobile equipment secure data transmission method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI759908B (en) * 2020-10-15 2022-04-01 威聯通科技股份有限公司 The method of generating the authorization allow list and the information security system using it

Also Published As

Publication number Publication date
TW201802701A (en) 2018-01-16

Similar Documents

Publication Publication Date Title
EP2938112B1 (en) Portable authorization device
US10097666B2 (en) Accessing a service using an encrypted token
US7930556B2 (en) Fingerprint system and method for access control
CN102739642A (en) Permitting access to a network
CN102739643A (en) Permitting access to a network
KR101442136B1 (en) Service access method, system and device based on wlan access authentication
KR20130022846A (en) System and method for sharing content suing nfc in cloud circumstance
EP2874422B1 (en) Simplified wi-fi setup
CN102111766A (en) Network accessing method, device and system
KR101853813B1 (en) Method and apparatus for generating secured link between devices
US10356067B2 (en) Device and method for providing user-configured trust domains
EP2856789A1 (en) Method for tracking a mobile device onto a remote displaying unit
US8156326B2 (en) Method to search for affinities between subjects and relative apparatus
JP2016019233A (en) Communication system, communication device, key managing device and communication method
US20160050184A1 (en) Method for secure e-mail exchange
TWI622886B (en) Regional data sharing system and method
CN113163399B (en) Communication method and device for terminal and server
KR101568940B1 (en) Authentication method for device to device communication in mobile open iptv system and device to device communication method in mobile open iptv system
CN104902473A (en) Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication
CN110830240B (en) Communication method and device of terminal and server
KR101845610B1 (en) Security system of moving object information and security method of moving object information using the system
JP5545433B2 (en) Portable electronic device and operation control method for portable electronic device
JP6654934B2 (en) Authentication system
KR101834632B1 (en) Security system of moving object information and security method of moving object information using the system
JP4678322B2 (en) Data sharing system, data sharing method, and data distribution terminal