TWI646425B - Virtual disk protection system - Google Patents

Virtual disk protection system Download PDF

Info

Publication number
TWI646425B
TWI646425B TW106112046A TW106112046A TWI646425B TW I646425 B TWI646425 B TW I646425B TW 106112046 A TW106112046 A TW 106112046A TW 106112046 A TW106112046 A TW 106112046A TW I646425 B TWI646425 B TW I646425B
Authority
TW
Taiwan
Prior art keywords
virtual disk
file
protection
disk
virtual
Prior art date
Application number
TW106112046A
Other languages
Chinese (zh)
Other versions
TW201837718A (en
Inventor
劉雨芊
劉振漢
Original Assignee
精品科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 精品科技股份有限公司 filed Critical 精品科技股份有限公司
Priority to TW106112046A priority Critical patent/TWI646425B/en
Priority to CN201710413398.5A priority patent/CN108694327B/en
Publication of TW201837718A publication Critical patent/TW201837718A/en
Application granted granted Critical
Publication of TWI646425B publication Critical patent/TWI646425B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0667Virtualisation aspects at data level, e.g. file, record or object virtualisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0674Disk device
    • G06F3/0676Magnetic disk device

Abstract

一種虛擬磁碟之防護系統,包括一虛擬磁碟掛載程式,用以掛載一儲存裝置之一預定要保護的檔案;一虛擬磁碟掛載驅動器,用以模擬該檔案,以產生一虛擬磁碟以供該檔案存取;以及一檔案系統防護驅動器,用以防止掛載於該虛擬磁碟之中的檔案存入到該虛擬磁碟之外的一第二磁碟。 A virtual disk protection system includes a virtual disk mount program for mounting a file intended to be protected by a storage device; a virtual disk mount drive for simulating the file to generate a virtual disk; A magnetic disk for the file access; and a file system protection drive for preventing files mounted on the virtual disk from being stored on a second disk outside the virtual disk.

Description

虛擬磁碟之防護系統 Virtual disk protection system

本發明係關於一種虛擬磁碟(Virtual Disk)之技術,且特別有關於一種虛擬磁碟之防護系統與方法,其中使用者可以在特定主機上對於電子文件或檔案進行附掛(Mount)。 The invention relates to a technology of a virtual disk, and in particular to a system and method for protecting a virtual disk, in which a user can mount electronic files or files on a specific host.

隨著電腦科技的發展,現代人不管在工作、學習或其他應用皆以電腦作為重要工具。因此,在現代生活中,不管是家庭、學校、政府機關、軍方、商業機構或其他各式各樣的單位,每天都在產生大量的電子文件。其中不乏包含重要機密之文件,包含軍事機密、商業機密、考試資訊及其他等。另外,由於網際網路的發達,各式各樣的有線/無線網路的發展及儲存裝置的應用等,這些電子文件的保密便顯得相當不容易。由於現代電腦的作業系統多可容納多組使用者帳號,亦或網路伺服器的分享,因此在多位使用者同時共享下,就必須對各種不同機密程度的文件加以區分。 With the development of computer technology, modern people use computers as an important tool whether they are at work, study or other applications. Therefore, in modern life, whether it is homes, schools, government agencies, military, commercial organizations or other various units, a large number of electronic files are being generated every day. Many of them contain important confidential documents, including military secrets, trade secrets, test information, and more. In addition, due to the development of the Internet, the development of various wired / wireless networks and the application of storage devices, the confidentiality of these electronic files has become quite difficult. Because the operating system of modern computers can accommodate multiple groups of user accounts, or sharing by web servers, it is necessary to distinguish between various documents with different levels of confidentiality when multiple users share at the same time.

另外,傳統之電子檔案有多種保密方法。其中最常見者係利用軟體程式在電子檔案儲存時依照檔案產生者設定使用者或使用群組賦予特定權限。而當開啟電子檔案時,則依照使用者名稱及密碼判定使用者或使用群組是否賦予權限處理檔案。未經認可的使用者或使用群組將無法處理電子檔案,以防止機密電子檔案外洩。 In addition, traditional electronic archives have multiple methods of confidentiality. The most common is to use software programs to set users based on the creator of the file or use groups to grant specific permissions when storing electronic files. When the electronic file is opened, it is determined whether the user or the use group has given permission to process the file according to the user name and password. Unauthorized users or user groups will not be able to process electronic files to prevent leakage of confidential electronic files.

上述電子檔案儲存流程為電子檔案儲存時先行選擇是否設定使用權限。若不是,則直接存檔;若是,則先設定使用者或使用群組,再設定使用權限而完成電子檔案存檔流程。再則,電子檔案開啟流程為軟體程式將電子檔案開啟時先行判斷開啟人是否為檔案產生者。若是,則直接開啟並執行操作;若不是,則判斷是否為認可之使用者或使用群組,若是,則依所賦予之權限開啟電子檔案並執行操作,若不是,則拒絕開啟。 The above electronic file storage process is to first select whether to set the use permission when the electronic file is stored. If not, then archive directly; if so, first set up users or use groups, and then set usage rights to complete the electronic file archiving process. Furthermore, the electronic file opening process is a software program that first determines whether the opener is the file producer when opening the electronic file. If it is, then directly open and execute the operation; if not, determine whether it is a recognized user or use group; if so, open the electronic file and perform the operation according to the permissions granted; if not, refuse to open.

在電腦系統中,一些應用程式,例如加密裝置應用程式(Encrypted Device Application,EDA),可以將一個特定的檔案空間進行加密,且將加密檔 案附掛為虛擬磁碟。虛擬磁碟可以使用不同的加密演算法來保存使用者的資訊,以避免病毒或是駭客的惡意攻擊。 In the computer system, some applications, such as the Encrypted Device Application (EDA), can encrypt a specific file space and encrypt the encrypted file. The case is attached as a virtual disk. Virtual disks can use different encryption algorithms to store user information to avoid malicious attacks by viruses or hackers.

習知技術中,在建立加密檔案的過程中,加密裝置應用程式係依據使用者設定的密碼來對於檔案進行加密。在附掛加密檔案的過程中,加密裝置應用程式亦判斷密碼是否正確來決定是否將加密檔案附掛為虛擬磁碟。由於檔案僅依據使用者設定之單一密碼進行加密。密碼極有可能被其他人破解,使得加密檔案可以被其他人使用。另外,由於習知的虛擬磁碟不具有任何的控管機制,無法提供不同使用者的存取彈性。此外,由於習知虛擬磁碟之管理機制中並無法辨識加密檔案所屬之主機,加密檔案亦可能被複製到其他的主機上使用。 In the conventional technology, during the process of creating an encrypted file, the encryption device application program encrypts the file according to a password set by the user. In the process of attaching the encrypted file, the encryption device application also determines whether the password is correct to decide whether to attach the encrypted file as a virtual disk. Because the file is encrypted based on a single password set by the user. Passwords are very likely to be cracked by others, making encrypted files available to others. In addition, since the conventional virtual disk does not have any control mechanism, it cannot provide access flexibility for different users. In addition, because the known virtual disk management mechanism cannot identify the host to which the encrypted file belongs, the encrypted file may also be copied to other hosts for use.

如前所述,習知技術均圍繞在利用使用者設定的密碼以加密的方法、思維來進行檔案的防護。若密碼被破解,加密檔案就可能被其他人使用而無法達到防護的效果。 As mentioned earlier, the conventional technologies are all about protecting the files with the encryption method and thinking using the password set by the user. If the password is cracked, the encrypted file may be used by others without protection.

鑒於上述習知技術的缺點,本發明提供一種嶄新的虛擬磁碟之防護系統與方法以克服上述缺點。 In view of the shortcomings of the above-mentioned conventional technologies, the present invention provides a new virtual disk protection system and method to overcome the above shortcomings.

本發明提供一種虛擬磁碟之防護系統,包括:一儲存裝置;一虛擬磁碟掛載程式,用以掛載儲存裝置之一預定要保護的檔案;一虛擬磁碟掛載驅動器,用以模擬該檔案,以產生一虛擬磁碟以供存取該檔案;以及一檔案系統防護驅動器,用以防止掛載於該虛擬磁碟之中的檔案存入到該虛擬磁碟之外的一第二磁碟。 The invention provides a virtual disk protection system, which includes: a storage device; a virtual disk mount program for mounting a file intended to be protected by one of the storage devices; a virtual disk mount drive for emulating The file to generate a virtual disk for accessing the file; and a file system protection drive to prevent a file mounted on the virtual disk from being stored in a second outside the virtual disk Disk.

根據本發明之一觀點,其中該虛擬磁碟係表示所掛載之該檔案。 According to an aspect of the present invention, the virtual disk indicates the mounted file.

根據本發明之一觀點,其中該檔案系統防護驅動器可用以防止檔案總管或其他應用程式將該第二磁碟中之第二檔案存入該虛擬磁碟。 According to an aspect of the present invention, the file system protection drive can be used to prevent a file manager or other applications from storing the second file in the second disk into the virtual disk.

根據本發明之另一觀點,其中該檔案系統防護驅動器可防止用以保護虛擬磁碟路徑之一保護程式被刪除。 According to another aspect of the present invention, the file system protection drive prevents a protection program used to protect a virtual disk path from being deleted.

根據本發明之又一觀點,該系統更包括一防護軟體,用以防止掛載於該虛擬磁碟之中的檔案之內容被貼入、拖拉到非預設開啟該檔案之應用程式之中。 According to another aspect of the present invention, the system further includes a protection software to prevent the content of the file mounted on the virtual disk from being pasted and dragged into an application program that does not open the file by default.

根據本發明之再一觀點,其中該防護軟體用以防止掛載於該虛擬 磁碟之中的檔案被存入於一雲端伺服器之中。 According to still another aspect of the present invention, the protection software is used to prevent the software from being mounted on the virtual machine. The files on the disk are stored in a cloud server.

根據本發明之一觀點,其中該防護軟體,用以防止掛載於該虛擬磁碟之中的檔案之中的資料被一外接裝置所輸出。該外接裝置為一印表機。 According to an aspect of the present invention, the protection software is configured to prevent data in a file mounted on the virtual disk from being output by an external device. The external device is a printer.

根據本發明之一觀點,其中檔案系統防護驅動器,可防護用以保護虛擬磁碟路徑之一保護程式使其不被使用者刪除。 According to an aspect of the present invention, the file system protection drive can protect a protection program for protecting a virtual disk path from being deleted by a user.

根據本發明之一觀點,該系統更包括一防護軟體,用以產生螢幕浮水印或印表機浮水印,或防止該虛擬磁碟之中的該檔案之資料被複製、刪減、拖拉、預覽、或印表機列印。 According to an aspect of the present invention, the system further includes a protection software for generating a screen watermark or a printer watermark, or preventing data of the file in the virtual disk from being copied, deleted, dragged, and previewed. , Or a printer.

此些優點及其他優點從以下較佳實施例之敘述及申請專利範圍將使讀者得以清楚了解本發明。 These advantages and other advantages will make the reader understand the present invention clearly from the description of the following preferred embodiments and the scope of patent application.

100‧‧‧檔案總管 100‧‧‧archive director

105‧‧‧檔案 105‧‧‧Files

110‧‧‧安裝模組 110‧‧‧Mounting Module

120‧‧‧虛擬磁碟掛載程式 120‧‧‧Virtual Disk Mounter

130‧‧‧虛擬磁碟掛載驅動器 130‧‧‧ Virtual Disk Mount Drive

140‧‧‧檔案系統防護驅動器(程式) 140‧‧‧File System Protection Driver (Program)

150‧‧‧檔案系統防護公用檔 150‧‧‧File System Protection Public File

160‧‧‧掛載公用檔 160‧‧‧ mount public files

165‧‧‧右鍵公用檔 165‧‧‧Right public file

170‧‧‧防護軟體 170‧‧‧Protection software

175‧‧‧編輯程式 175‧‧‧Edit Program

180‧‧‧連結公用檔 180‧‧‧ Link public file

190‧‧‧虛擬磁碟公用檔 190‧‧‧Virtual Disk Common File

195‧‧‧保護程式 195‧‧‧Protection Program

200‧‧‧虛擬磁碟路徑(E:) 200‧‧‧Virtual Disk Path (E :)

300‧‧‧磁碟(C:\) 300‧‧‧disk (C: \)

400‧‧‧檔案總管或其他應用程式 400‧‧‧File Explorer or other applications

500‧‧‧雲端伺服器 500‧‧‧ Cloud Server

600‧‧‧裝置 600‧‧‧ device

如下所述之對本發明的詳細描述與實施例之示意圖,應使本發明更被充分地理解;然而,應可理解此僅限於作為理解本發明應用之參考,而非限制本發明於一特定實施例之中。 The detailed description of the present invention and the schematic diagrams of the embodiments described below should make the present invention more fully understood; however, it should be understood that this is only used as a reference for understanding the application of the present invention, rather than limiting the present invention to a specific implementation. Example.

第一圖顯示根據本發明之一實施例之一虛擬磁碟之防護系統之一示意圖;第二圖顯示根據本發明之一實施例之一虛擬磁碟之防護流程之一示意圖。 The first figure shows a schematic diagram of a virtual disk protection system according to an embodiment of the present invention; the second figure shows a schematic diagram of a virtual disk protection process according to an embodiment of the present invention.

此處本發明將針對發明具體實施例及其觀點加以詳細描述,此類描述為解釋本發明之結構或步驟流程,其係供以說明之用而非用以限制本發明之申請專利範圍。因此,除說明書中之具體實施例與較佳實施例外,本發明亦可廣泛施行於其他不同的實施例中。 The present invention will be described in detail herein with regard to specific embodiments of the invention and their perspectives. Such descriptions are intended to explain the structure or flow of steps of the present invention, and are intended to be illustrative and not to limit the scope of patent application of the present invention. Therefore, in addition to the specific embodiments and preferred embodiments in the description, the present invention can be widely implemented in other different embodiments.

第一圖顯示根據本發明之一實施例之一虛擬磁碟之防護系統之示意圖。虛擬磁碟之防護系統係包含於一電腦之中,或者包含於一計算裝置之中。在本實施例中,列出了與虛擬磁碟有關的程式或元件。在一實施例中,虛擬磁碟為一防護磁碟,其中的檔案或電子文件被鎖住而無法複製到其他的儲存裝置之中,且檔案內容為明文、沒有加密而只能於所在的主機中編輯、儲存;因此,可以達到端點防護的效果。在一實施例之中,一個檔案或電子文件對應一個虛擬磁碟路徑。在另一實施例之中,多個檔案或電子文件對應一個虛擬磁 碟路徑,而每一個檔案於虛擬磁碟路徑之中具有不同的檔名。虛擬磁碟之防護流程包括:當一檔案掛載為虛擬磁碟之後,於終端螢幕(例如:液晶顯示器)上將顯示一虛擬磁碟路徑E,實際上虛擬磁碟路徑E表示所掛載的該檔案;之後,於顯示的虛擬磁碟路徑E之中,使用者點選該虛擬磁碟路徑E,則實際上是開啟了該檔案,例如開啟PowerPoint檔案(E:\A.PPTX)。 The first figure is a schematic diagram of a virtual disk protection system according to an embodiment of the present invention. The protection system of the virtual disk is included in a computer or a computing device. In this embodiment, the programs or components related to the virtual disk are listed. In one embodiment, the virtual disk is a protected disk, in which files or electronic files are locked and cannot be copied to other storage devices, and the content of the files is in plain text, without encryption, and only on the host where it is located. Edit, save; therefore, the effect of endpoint protection can be achieved. In one embodiment, one file or electronic file corresponds to one virtual disk path. In another embodiment, multiple files or electronic files correspond to a virtual magnetic file. Disk path, and each file has a different file name in the virtual disk path. The protection process of a virtual disk includes: after a file is mounted as a virtual disk, a virtual disk path E will be displayed on the terminal screen (for example, an LCD display). In fact, the virtual disk path E indicates the mounted disk. The file; then, among the displayed virtual disk paths E, the user clicks the virtual disk path E, and the file is actually opened, for example, a PowerPoint file (E: \ A.PPTX) is opened.

在本發明之中,虛擬磁碟技術係指利用一虛擬磁碟掛載驅動器(virtual disc driver)來模擬一般資訊儲存裝置(例如:硬碟,具有硬碟檔案配置表)的結構,而利用在明文區的檔案來儲存虛擬磁碟路徑的資料,所以作業系統與虛擬磁碟掛載驅動程式可經由硬碟檔案配置表取得位址,而使用者在虛擬磁碟路徑對明文資訊的存取,事實上是對此檔案的存取;而明文資訊寫入到虛擬磁碟路徑,本質上就是明文資訊為保護資訊後寫入此檔案。在一實施例之中,可以藉由一個保護程式來禁止對於虛擬磁碟中之資訊刪除。 In the present invention, the virtual disk technology refers to the use of a virtual disk driver to simulate the structure of a general information storage device (for example, a hard disk with a hard disk file configuration table), and uses it in The file in the plain text area stores the data of the virtual disk path, so the operating system and the virtual disk mount driver can obtain the address through the hard disk file configuration table, and the user accesses the plain text information in the virtual disk path. In fact, it is access to this file; while the plaintext information is written to the virtual disk path, it is essentially that the plaintext information is written into the file to protect the information. In one embodiment, a protection program can be used to prohibit the deletion of information in the virtual disk.

請參閱第一圖,本發明之虛擬磁碟之防護系統之功能方塊示意圖。如第一圖所示,其僅列出了虛擬磁碟相關的功能範圍,當然其他有用的軟體、程式或公用檔(dynamic link library:DLL,動態連結程式庫)也可以隨需要而增加。首先,安裝模組110啟動安裝一虛擬磁碟掛載程式120,例如透過右鍵公用檔165來啟動安裝。當一使用者利用虛擬磁碟掛載程式120以掛載一預定要保護的檔案,該檔案係儲存於硬碟之檔案總管100之中的一個檔案。然後,透過虛擬磁碟掛載驅動器(應用程式)130來模擬該檔案,以產生一虛擬磁碟路徑以供該檔案存取。這個於虛擬磁碟路徑中存取的待保護資訊將自動被轉存到該虛擬磁碟的檔案之中,而在虛擬磁碟之中的待保護資訊即保存於其中,以防止資料任意散佈與竄改。在一實施例之中,一個檔案或電子文件對應一個虛擬磁碟路徑。因此,若有多個檔案待保護,虛擬磁碟掛載程式120可以一次掛載這些預定要保護的檔案,透過虛擬磁碟掛載驅動器130來模擬該些檔案,每一個檔案對應一個虛擬磁碟路徑,因此產生了多個虛擬磁碟路徑顯示於終端螢幕上(例如:原先硬碟中之檔案總管100列有C磁碟路徑、D磁碟路徑,而終端螢幕上更顯示了虛擬磁碟路徑E:\、虛擬磁碟路徑F:\、虛擬磁碟路徑G:\...)。在另一例子中,虛擬磁碟掛載程式120係以一個一個檔案的方式依次掛載該些檔案,透過虛擬磁碟掛載驅動器130來模擬該些檔案,同樣產生了多個虛擬磁碟路徑顯示於終端螢幕上。上述虛擬磁碟掛載程式120於掛載的同時,虛擬磁碟之防護 系統也會通知虛擬磁碟公用檔190協助其掛載或執行其他工作。 Please refer to the first figure, which is a functional block diagram of the virtual disk protection system of the present invention. As shown in the first figure, it only lists the functional scope related to the virtual disk. Of course, other useful software, programs, or public files (dynamic link library: DLL) can also be added as needed. First, the installation module 110 starts to install a virtual disk mounter 120, for example, by right-clicking the public file 165 to start installation. When a user uses the virtual disk mounter 120 to mount a file to be protected, the file is a file stored in the file manager 100 of the hard disk. Then, the file is simulated through a virtual disk mounting drive (application) 130 to generate a virtual disk path for the file to access. The to-be-protected information accessed in the virtual disk path will be automatically transferred to the file of the virtual disk, and the to-be-protected information in the virtual disk will be stored therein to prevent the random distribution of data Tampering. In one embodiment, one file or electronic file corresponds to one virtual disk path. Therefore, if there are multiple files to be protected, the virtual disk mounter 120 can mount these files to be protected at one time, and simulate the files through the virtual disk mount drive 130, each file corresponding to a virtual disk Paths, so multiple virtual disk paths are generated and displayed on the terminal screen (for example, the file manager 100 in the original hard disk listed the C disk path and D disk path, and the virtual disk path is displayed on the terminal screen. E: \, virtual disk path F: \, virtual disk path G: \ ...). In another example, the virtual disk mount program 120 mounts these files one by one in a file-by-file manner. The virtual disk mount driver 130 is used to simulate the files, and multiple virtual disk paths are also generated. Displayed on the terminal screen. The above virtual disk mounter 120 protects the virtual disk while mounting it. The system will also notify the virtual disk utility 190 to assist it in mounting or performing other tasks.

在複數個虛擬磁碟路徑之中,這些虛擬磁碟路徑之中的檔案,每一個檔案對應於一個虛擬磁碟路徑,每一個虛擬磁碟路徑為獨立的,並且這些虛擬磁碟路徑之間互不相關。在另一實施例之中,多個檔案對應一個虛擬磁碟路徑,而在該虛擬磁碟路徑之中的每一個檔案具有不同的檔名(例如,E:\A.PPTX、E:\B.PPTX、E:\C.PPTX...)。 Among the multiple virtual disk paths, each of the files in these virtual disk paths corresponds to a virtual disk path, each virtual disk path is independent, and the virtual disk paths are mutually irrelevant. In another embodiment, multiple files correspond to a virtual disk path, and each file in the virtual disk path has a different file name (for example, E: \ A.PPTX, E: \ B .PPTX, E: \ C.PPTX ...).

而在虛擬磁碟路徑之中的待保護檔案需透過檔案系統防護驅動器(程式)140,始能達到防止檔案資料任意被散佈與竄改之目的。亦即,虛擬磁碟掛載程式120於掛載的同時,虛擬磁碟公用檔190連結檔案系統防護公用檔150,並通知檔案系統防護驅動器140啟動,以保護虛擬磁碟掛載驅動器130模擬出來而掛載於虛擬磁碟路徑之中的檔案。舉例而言,利用檔案系統防護驅動器140可以防止:(1)掛載於虛擬磁碟路徑之中的檔案存入到虛擬磁碟路徑之外的磁碟路徑(例如:硬碟之中的C磁碟路徑、D磁碟路徑)、(2)檔案總管(File Explorer)或其他應用程式將其中的檔案存入虛擬磁碟路徑、(3)保護程式195被刪除。意即,一旦虛擬磁碟路徑產生,保護程式195可以保護虛擬磁碟路徑之中的檔案,而本身不會被刪除。此外,連結公用檔180可以連結掛載公用檔160,可以輔助上述虛擬磁碟之防護系統的連結與掛載之執行。 The files to be protected in the virtual disk path need to be protected by a file system protection drive (program) 140 to prevent the file data from being randomly distributed and tampered with. That is, while the virtual disk mount program 120 is mounted, the virtual disk public file 190 is linked to the file system protection public file 150, and the file system protection drive 140 is notified to start, so as to protect the virtual disk mount drive 130 from being simulated. Files mounted in the virtual disk path. For example, using the file system protection drive 140 can prevent: (1) files mounted in the virtual disk path from being stored in a disk path other than the virtual disk path (for example, the C disk in a hard disk) (Disk path, D disk path), (2) File Explorer or other applications save the files in the virtual disk path, and (3) the protection program 195 is deleted. That is, once the virtual disk path is generated, the protection program 195 can protect files in the virtual disk path without itself being deleted. In addition, the link public file 180 can link the mount public file 160, which can assist the connection and mounting of the above-mentioned protection system of the virtual disk.

在一實施例之中,利用防護軟體170可以防止:掛載於虛擬磁碟路徑之中的檔案之內容被貼入、拖拉到與該檔案不同型態之應用程式之中、虛擬磁碟路徑之中的檔案透過網路(網際網路或無線網路)儲存到雲端伺服器、虛擬磁碟路徑之中的檔案資料被外接的裝置所輸出(例如:印表機將檔案資料列印出來、投影機將檔案資料投影出來)。意即,舉一實施例而言,防護軟體170可以防止:虛擬磁碟路徑之中的檔案資料被複製(Copy)、刪減(Cut)、拖拉(Drag Drop)、預覽(PrtScr)、印表機列印,或產生螢幕浮水印、印表機浮水印。 In one embodiment, the protection software 170 can be used to prevent: the content of the file mounted in the virtual disk path from being pasted and dragged into an application of a different type from the file, and the virtual disk path The files in the file are saved to the cloud server through the network (Internet or wireless network), and the file data in the virtual disk path is output by the external device (for example: the printer prints the file data, projects it Projector will project the file data). In other words, in one embodiment, the protection software 170 can prevent: the file data in the virtual disk path from being copied, cut, drag dropped, previewed, and printed. Printer to print, or produce screen watermark, printer watermark.

在一實施例之中,利用編輯程式175連結安裝模組110、虛擬磁碟掛載程式120,可以修改或編輯安裝模組110、虛擬磁碟掛載程式120之中的參數設定或參數預設。 In one embodiment, the editing program 175 is used to link the installation module 110 and the virtual disk mount program 120 to modify or edit the parameter settings or parameter presets in the installation module 110 and the virtual disk mount program 120. .

第二圖顯示根據本發明之一實施例之一虛擬磁碟路徑之防護的流程圖。在本實施例中,列出了與虛擬磁碟有關的防護路徑。在本發明之中,因為檔案內容為明文、沒有加密,所以使用者無需輸入使用者密碼、使用者指 紋或使用者個人資訊來驗證,就可以開啟虛擬磁碟檔案,或進行檔案編輯。虛擬磁碟之防護流程包括:當一檔案105掛載為虛擬磁碟之後,例如利用第一圖之虛擬磁碟掛載程式120來執行掛載動作,於終端螢幕(例如:液晶顯示器)上將顯示一虛擬磁碟路徑(E:)200,實際上虛擬磁碟路徑(E:)200係表示所掛載的該檔案105。之後,於顯示的虛擬磁碟路徑(E:)200之中,使用者點擊該虛擬磁碟路徑(E:)200,則實際上是開啟了該檔案105,例如開啟PowerPoint檔案(E:\A.PPTX)105。在一防護流程(a)之中,PowerPoint檔案(E:\A.PPTX)105無法將內容資料(A.PPTX)存入虛擬磁碟路徑(E:)200之外的磁碟(例如存入磁碟C:\)300。在此防護流程(a)之中,例如係透過第一圖之檔案系統防護驅動器140來加以防護。 The second figure shows a flowchart of protection of a virtual disk path according to an embodiment of the present invention. In this embodiment, the protection paths related to the virtual disk are listed. In the present invention, since the content of the file is in plain text and is not encrypted, the user does not need to enter a user password, and the user indicates Pattern or user personal information to verify, you can open the virtual disk file or edit the file. The protection process of the virtual disk includes: after a file 105 is mounted as a virtual disk, for example, the virtual disk mount program 120 of the first figure is used to perform a mount operation, and the terminal screen (for example, an LCD monitor) will be mounted. A virtual disk path (E :) 200 is displayed. In fact, the virtual disk path (E :) 200 indicates the file 105 mounted. After that, in the displayed virtual disk path (E :) 200, the user clicks the virtual disk path (E :) 200, and the file 105 is actually opened, for example, a PowerPoint file (E: \ A .PPTX) 105. In a protection process (a), the PowerPoint file (E: \ A.PPTX) 105 cannot save the content data (A.PPTX) to a disk other than the virtual disk path (E :) 200 (for example, to Disk C: \) 300. In this protection process (a), for example, protection is performed by the file system protection driver 140 in the first figure.

在一防護流程(b)之中,檔案總管或其他應用程式400無法將其中的檔案存入虛擬磁碟路徑(E:)。在此防護流程(b)之中,例如係透過第一圖之檔案系統防護驅動器140來加以防護。 In a protection process (b), the file manager or other applications 400 cannot save the files in the virtual disk path (E :). In this protection process (b), for example, protection is performed by the file system protection driver 140 in the first figure.

在一防護流程(c)之中,虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105之中的內容(資料)禁止被貼入、拖拉到其他應用程式(例如:貼入、拖拉至Word檔案)400之中。在此防護流程(c)之中,例如係透過第一圖之防護軟體170來加以防護。另外,依照使用者的防護策略,也可以開放而讓虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105之中的內容(資料)被貼入、拖拉到其他應用程式(例如:貼入、拖拉至Word檔案)之中。 In a protection process (c), the content (data) in the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) is prohibited from being pasted and dragged to other applications (for example: Paste and drag into Word file) 400. In this protection process (c), for example, protection is performed by the protection software 170 of the first figure. In addition, according to the user's protection policy, it can also be opened to let the content (data) in the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) be pasted and dragged to other applications (For example: paste, drag and drop into a Word file).

另外,在一防護流程(d)之中,虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105之中的內容(資料)無法被存入雲端伺服器500之中。在此防護流程(d)之中,例如係透過第一圖之防護軟體170來加以防護。另外,依照使用者的防護策略,也可以開放而讓虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105之中的內容被存入雲端伺服器500之中。 In addition, during a protection process (d), the content (data) in the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) cannot be stored in the cloud server 500. In this protection process (d), for example, protection is performed by the protection software 170 of the first figure. In addition, according to the protection strategy of the user, the content in the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) can also be opened and stored in the cloud server 500.

再者,在一防護流程(e)之中,虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105之中的資料內容無法被外接於電腦主機的裝置600所輸出(例如:印表機將檔案105資料列印出來、投影機將檔案105資料投影出來)。在此防護流程(e)之中,例如係透過第一圖之防護軟體170來加以防護。另外,依照使用者的防護策略,也可以開放而讓虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105之中的資料內容被外接於電腦主機的裝置600所輸出(例如:印 表機將檔案105資料列印出來、投影機將檔案105資料投影出來)。 Furthermore, in a protection process (e), the data content in the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) cannot be output by the device 600 connected to the host computer ( For example: the printer prints the data of file 105, and the projector projects the data of file 105). In this protection process (e), for example, protection is performed by the protection software 170 of the first figure. In addition, according to the user's protection strategy, it can also be opened so that the data content in the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) is output by the device 600 connected to the host computer ( Example: India The table printer prints the file 105 data, and the projector projects the file 105 data).

最後,在一防護流程(f)之中,保護程式195可以保護虛擬磁碟路徑(E:)之PowerPoint檔案(E:\A.PPTX)105,而本身不會被使用者刪除。在此防護流程(f)之中,例如係透過第一圖之檔案系統防護驅動器140來加以防護保護程式195不被使用者刪除。 Finally, in a protection process (f), the protection program 195 can protect the PowerPoint file (E: \ A.PPTX) 105 of the virtual disk path (E :) without being deleted by the user. In this protection flow (f), for example, the protection program 195 is protected by the file system protection driver 140 of the first figure from being deleted by the user.

因此,透過本案之虛擬磁碟之防護流程及系統,使用者可以在特定主機上對於一檔案或電子文件進行附掛。此外,亦可強化虛擬磁碟之控管機制,以增加虛擬磁碟之存取彈性。 Therefore, through the protection process and system of the virtual disk in this case, the user can attach a file or electronic file on a specific host. In addition, the control mechanism of the virtual disk can be strengthened to increase the access flexibility of the virtual disk.

本發明之虛擬磁碟之防護系統及方法,其特定型態或其部份,可以以程式碼的型態包含於實體媒體,例如:軟碟、光碟片、硬碟、或是任何其他機器可讀取(例如電腦可讀取)儲存媒體;其中當程式碼被機器,例如電腦,載入且執行時,此機器變成用以實現本發明之裝置。本發明之方法與裝置也可以以程式碼型態透過一些傳送媒體,例如:電線或電纜、光纖、或是任何傳輸型態進行傳送,其中當程式碼被機器,例如電腦接收、載入且執行時,此機器變成用以實現本發明之裝置。當在一般用途處理器實作時,程式碼結合處理器提供一操作類似於應用特定邏輯電路之獨特裝置。 The specific system or part of the virtual magnetic disk protection system of the present invention may be included in the physical media in the form of code, such as: a floppy disk, an optical disk, a hard disk, or any other machine. Reading (eg, computer-readable) storage media; wherein when a code is loaded and executed by a machine, such as a computer, the machine becomes a device for implementing the present invention. The method and device of the present invention can also be transmitted in code form through some transmission media, such as: wire or cable, optical fiber, or any transmission type, wherein when the code is received, loaded, and executed by a machine, such as a computer At this time, the machine becomes a device for implementing the present invention. When implemented on a general-purpose processor, the code in combination with the processor provides a unique device that operates similarly to application-specific logic circuits.

除描述於此之外,可藉由敘述於本發明中之實施例及實施方式所達成之不同改良方式,皆應涵蓋於本發明之範疇中。因此,上述敘述係為本發明之較佳實施例。此領域之技藝者應得以領會其係用以說明本發明而非用以限定本發明所主張之專利權利範圍。其專利保護範圍當視後附之申請專利範圍及其等同領域而定。凡熟悉此領域之技藝者,在不脫離本專利精神或範圍內,所作之更動或潤飾,均屬於本發明所揭示精神下所完成之等效改變或設計,且應包含在下述之申請專利範圍內。 In addition to the descriptions here, different improvements that can be achieved by the examples and implementations described in the present invention should be covered in the scope of the present invention. Therefore, the above description is a preferred embodiment of the present invention. Those skilled in the art should understand that it is used to explain the present invention and not to limit the scope of the patent rights claimed by the present invention. The scope of its patent protection shall depend on the scope of the attached patent application and its equivalent fields. Anyone skilled in this field can make changes or modifications without departing from the spirit or scope of this patent, which belong to the equivalent changes or designs made in the spirit disclosed by the present invention, and should be included in the scope of patent application described below. Inside.

Claims (7)

一種虛擬磁碟之防護系統,包括:一虛擬磁碟掛載程式,用以掛載一儲存裝置之一預定要保護的檔案;一虛擬磁碟掛載驅動器,用以模擬該檔案,以產生一虛擬磁碟以供存取該檔案;一保護程式,用以禁止刪除該虛擬磁碟中之資訊,以保護掛載於該虛擬磁碟之該檔案;以及一檔案系統防護驅動器,用以防止掛載於該虛擬磁碟之中的該檔案存入到該虛擬磁碟之外的一第二磁碟,用以防止檔案總管或其他應用程式將該第二磁碟中之第二檔案存入該虛擬磁碟,以及用以防止該保護程式被刪除或使其不被使用者刪除。A virtual disk protection system includes: a virtual disk mount program for mounting a file intended to be protected by a storage device; a virtual disk mount drive for simulating the file to generate a file; A virtual disk for accessing the file; a protection program to prohibit deletion of information in the virtual disk to protect the file mounted on the virtual disk; and a file system protection drive to prevent hanging The file contained in the virtual disk is stored on a second disk other than the virtual disk to prevent the file manager or other applications from storing the second file in the second disk into the second disk. Virtual disks, and to prevent the protection program from being deleted or keep it from being deleted by the user. 如請求項1所述之虛擬磁碟之防護系統,其中該虛擬磁碟係表示所掛載之該檔案。The protection system for a virtual disk according to claim 1, wherein the virtual disk indicates the file mounted. 如請求項1所述之虛擬磁碟之防護系統,更包括一防護軟體,用以防止掛載於該虛擬磁碟之中的該檔案之內容被貼入、拖拉到非預設開啟該檔案之應用程式之中。The protection system for a virtual disk as described in claim 1, further comprising a protection software to prevent the content of the file mounted on the virtual disk from being pasted and dragged to a file that is not opened by default. Application. 如請求項3所述之虛擬磁碟之防護系統,其中該防護軟體,用以防止掛載於該虛擬磁碟之中的該檔案被存入於一雲端伺服器之中。The protection system for a virtual disk according to claim 3, wherein the protection software is used to prevent the file mounted on the virtual disk from being stored in a cloud server. 如請求項3所述之虛擬磁碟之防護系統,其中該防護軟體,用以防止掛載於該虛擬磁碟之中的該檔案之中的資料被一外接裝置所輸出。The protection system for a virtual disk according to claim 3, wherein the protection software is used to prevent data in the file mounted on the virtual disk from being output by an external device. 如請求項5所述之虛擬磁碟之防護系統,其中該外接裝置為一印表機。The protection system for a virtual disk according to claim 5, wherein the external device is a printer. 如請求項1所述之虛擬磁碟之防護系統,更包括一防護軟體,用以產生螢幕浮水印或印表機浮水印,或防止該虛擬磁碟之中的該檔案之資料被複製、刪減、拖拉、預覽、或印表機列印。The protection system for a virtual disk as described in claim 1, further comprising a protection software for generating a screen watermark or a printer watermark, or preventing data of the file in the virtual disk from being copied or deleted. Reduce, drag, preview, or print to the printer.
TW106112046A 2017-04-11 2017-04-11 Virtual disk protection system TWI646425B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW106112046A TWI646425B (en) 2017-04-11 2017-04-11 Virtual disk protection system
CN201710413398.5A CN108694327B (en) 2017-04-11 2017-06-05 Protection system of virtual disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW106112046A TWI646425B (en) 2017-04-11 2017-04-11 Virtual disk protection system

Publications (2)

Publication Number Publication Date
TW201837718A TW201837718A (en) 2018-10-16
TWI646425B true TWI646425B (en) 2019-01-01

Family

ID=63843697

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106112046A TWI646425B (en) 2017-04-11 2017-04-11 Virtual disk protection system

Country Status (2)

Country Link
CN (1) CN108694327B (en)
TW (1) TWI646425B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711207B (en) * 2018-12-29 2020-10-30 杭州宏杉科技股份有限公司 Data encryption method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW576996B (en) * 2002-05-10 2004-02-21 Fine Art Technology Co Ltd Method for encrypting secured data with virtual space
TW200813773A (en) * 2006-09-07 2008-03-16 Via Tech Inc Virtual disks management methods and systems
CN102637151A (en) * 2011-12-19 2012-08-15 上海华御信息技术有限公司 Cloud architecture based virtual safety U-disk system
CN102708335A (en) * 2012-05-05 2012-10-03 南京赛孚科技有限公司 Confidential file protection method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5987565A (en) * 1997-06-25 1999-11-16 Sun Microsystems, Inc. Method and apparatus for virtual disk simulation
CN101499038B (en) * 2008-01-30 2011-09-07 精品科技股份有限公司 Controllable information access storage device, information access control method and information protection method
TW201025064A (en) * 2008-12-25 2010-07-01 Jmicron Technology Corp Interface transformation device capable of enhance information security in a computer system
CN102063585A (en) * 2010-10-29 2011-05-18 华南理工大学 Xen based secure virtual disk access control method
CN103218573B (en) * 2013-05-07 2016-12-28 安徽海加技术服务有限公司 A kind of seamless access control method based on virtual disk protection and device
CN105843621A (en) * 2016-03-25 2016-08-10 山东超越数控电子有限公司 ReWorks system acceleration method on Loongson 1A hardware platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW576996B (en) * 2002-05-10 2004-02-21 Fine Art Technology Co Ltd Method for encrypting secured data with virtual space
TW200813773A (en) * 2006-09-07 2008-03-16 Via Tech Inc Virtual disks management methods and systems
CN102637151A (en) * 2011-12-19 2012-08-15 上海华御信息技术有限公司 Cloud architecture based virtual safety U-disk system
CN102708335A (en) * 2012-05-05 2012-10-03 南京赛孚科技有限公司 Confidential file protection method

Also Published As

Publication number Publication date
CN108694327A (en) 2018-10-23
CN108694327B (en) 2022-05-24
TW201837718A (en) 2018-10-16

Similar Documents

Publication Publication Date Title
JP4769304B2 (en) Operating system independent data management
Hasan et al. Toward a threat model for storage systems
JP4759513B2 (en) Data object management in dynamic, distributed and collaborative environments
ES2730219T3 (en) System and procedure for automatic data protection in a computer network
CN109923548A (en) Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process
US10037429B1 (en) Copy protection for secured files
US20080196082A1 (en) Method and system for policy-based protection of application data
JP2003345654A (en) Data protection system
Scarfone et al. Guide to storage encryption technologies for end user devices
Grothe et al. How to break microsoft rights management services
US20220292195A1 (en) Ransomware prevention
TWI646425B (en) Virtual disk protection system
KR20120139271A (en) System and method for preventing electronic document leakage
CN105205403B (en) Method, the system of control local area network file data based on file filter
JP2008276376A (en) Document file protection method
KR20090048293A (en) Apparatus and method of managing system resources of computer and processes
KR100939106B1 (en) Method for preventing unauthorized copies of data stored in removable storage apparatus and system adapted to the same
Carter et al. Securing SQL Server
TWI745784B (en) Disc security system
Ma et al. Study on access control for cloud storage security
CN112784321B (en) Disk resource security system
TWI479354B (en) Information security management system
CN105787304A (en) DRM (digital rights management) method based on device binding
Cochran Defining Trustworthy Documents to Include Documents in an Electronic Form
Brooks et al. Creating a tailored trustworthy space for democracy advocates using hostile host