TWM492580U - Wireless processing system for file encryption / decryption - Google Patents
Wireless processing system for file encryption / decryption Download PDFInfo
- Publication number
- TWM492580U TWM492580U TW103215031U TW103215031U TWM492580U TW M492580 U TWM492580 U TW M492580U TW 103215031 U TW103215031 U TW 103215031U TW 103215031 U TW103215031 U TW 103215031U TW M492580 U TWM492580 U TW M492580U
- Authority
- TW
- Taiwan
- Prior art keywords
- unit
- file
- host
- wireless device
- encrypted
- Prior art date
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Description
一種加/解密的系統,特別有關於一種檔案加/解密的無線處理系統。 An encryption/decryption system, in particular, relates to a wireless processing system for file encryption/decryption.
隨著計算機的普及,也帶動資訊的快速傳遞。由於使用者對檔案的存取並無進行保護,因此有心人士可以透過不正當的手段取得檔案。雖然可以透過密碼或加密的手續來提高存取檔案的安全性。在進行檔案的存取還要另外點選或執行其他程序,這樣的操作對於使用者而言是額外的負擔。而且密碼的長度也會影響使用者的使用習慣。過多或過長的密碼長度會造成使用者在記憶上的不便利。 With the popularity of computers, it also drives the rapid transmission of information. Since the user does not protect the access to the file, the person who is interested can obtain the file through improper means. Although it is possible to increase the security of accessing files through passwords or encryption procedures. In order to access the file, it is necessary to additionally select or execute other programs, such an operation is an additional burden for the user. And the length of the password will also affect the user's usage habits. Too many or too long password lengths can cause inconvenience to the user.
雖然檔案可以透過前述的方式進行保護,但存放檔案的設備本身卻無相應的保護。因此有心人士可以透過非法的方式直接從儲存設備中取得檔案。例如:從目標計算機中拔除硬碟,將硬碟安裝至其他計算機。所以儲存設備的本身也需要保護。 Although the file can be protected in the manner described above, the device storing the file itself has no corresponding protection. Therefore, people who are interested can obtain files directly from the storage device through illegal means. For example: Unplug the hard drive from the target computer and mount the hard drive to another computer. Therefore, the storage device itself needs protection.
此外,在公共場所時,使用者如果沒有將筆記型電腦鎖固於定點。當使用者離開筆記型電腦時,筆記型電腦容易被小偷所竊取。因此計算機設備的本體也需要提供防盜的措施。 In addition, in a public place, the user does not lock the notebook to a fixed point. When the user leaves the notebook, the notebook is easily stolen by the thief. Therefore, the body of the computer device also needs to provide anti-theft measures.
本新型提供一種檔案加/解密的無線處理系統,應用於檔案存取及主機端距離過遠或過久時的防護處理,對檔案的加密或解密處理。 The invention provides a wireless processing system for file encryption/decryption, which is applied to file access and protection processing when the host end is too far or too long, and encrypts or decrypts the file.
本新型的無線處理系統包括:第一主機端、第二主機端與無線設備。第一主機端具有第一傳輸單元、第一處理單元、第一儲存單元與第一警示單元,第一處理單元連接第一傳輸單元、第一儲存單元與第一警示單元;第二主機端具有第二傳輸單元、第二處理單元、第二儲存單元與 第二警示單元,第二處理單元連接第二傳輸單元、第二儲存單元與第二警示單元;無線設備具有控制元件、通訊元件與第三儲存單元,控制元件電性連接於通訊元件與第三儲存單元,無線設備輪流連接第一主機端與第二主機端,控制元件驅動通訊元件發出存活資訊與識別資訊,或由通訊元件接收確認資訊;若經過第一時間且第一主機端偵測未與無線設備連接,則第一主機端將第一儲存單元中的第一明文檔案進行加密並驅動第一警示單元;若經過第一時間且第二主機端偵測未與無線設備連接,則第二主機端將第二儲存單元中的第二明文檔案進行加密並驅動第二警示單元。 The wireless processing system of the present invention comprises: a first host end, a second host end, and a wireless device. The first host end has a first transmission unit, a first processing unit, a first storage unit and a first warning unit, the first processing unit is connected to the first transmission unit, the first storage unit and the first warning unit; a second transmission unit, a second processing unit, and a second storage unit a second warning unit, the second processing unit is connected to the second transmission unit, the second storage unit and the second warning unit; the wireless device has a control component, a communication component and a third storage unit, and the control component is electrically connected to the communication component and the third a storage unit, the wireless device is connected to the first host end and the second host end in turn, the control component drives the communication component to send the survival information and the identification information, or the communication component receives the confirmation information; if the first time passes and the first host detects Connected to the wireless device, the first host end encrypts the first plaintext file in the first storage unit and drives the first alert unit; if the first time passes and the second host detects that the wireless device is not connected, The second host encrypts the second plaintext file in the second storage unit and drives the second alert unit.
本新型的檔案加/解密的無線處理系統與其方法在進行檔案的存取過程提供加密或解密的對應處理。而且主機端會根據無線設備的是否連接或無線設備正確與否,進而決定是否啟動所述的加解密處理。因此,只有在無線設備正確的連接於主機端,使用者才能對檔案進行存取。 The wireless file processing/decryption wireless processing system of the present invention and its method provide corresponding processing of encryption or decryption in the file access process. Moreover, the host side determines whether to start the encryption and decryption process according to whether the wireless device is connected or the wireless device is correct or not. Therefore, the user can access the file only if the wireless device is properly connected to the host.
有關本新型的特徵與實作,茲配合圖式作最佳實施例詳細說明如下。 The features and implementations of the present invention are described in detail below with reference to the drawings.
100‧‧‧無線處理系統 100‧‧‧Wireless Processing System
110‧‧‧第一主機端 110‧‧‧First host
111‧‧‧第一傳輸單元 111‧‧‧First transmission unit
112‧‧‧第一處理單元 112‧‧‧First Processing Unit
113‧‧‧第一儲存單元 113‧‧‧First storage unit
114‧‧‧第一警示單元 114‧‧‧First warning unit
120‧‧‧第二主機端 120‧‧‧second host
121‧‧‧第二傳輸單元 121‧‧‧Second transmission unit
122‧‧‧第二處理單元 122‧‧‧Second processing unit
123‧‧‧第二儲存單元 123‧‧‧Second storage unit
124‧‧‧第二警示單元 124‧‧‧Second warning unit
130‧‧‧無線設備 130‧‧‧Wireless equipment
131‧‧‧實體接口 131‧‧‧ physical interface
132‧‧‧控制元件 132‧‧‧Control elements
133‧‧‧通訊元件 133‧‧‧Communication components
134‧‧‧第三儲存單元 134‧‧‧ third storage unit
135‧‧‧第三警示單元 135‧‧‧3rd warning unit
151‧‧‧第一正常分區 151‧‧‧First normal division
152‧‧‧第一加密分區 152‧‧‧First encrypted partition
210‧‧‧主要主機端 210‧‧‧main host
第1A圖係為本新型的架構示意圖。 Figure 1A is a schematic diagram of the new architecture.
第1B圖係為本新型的第一儲存單元的各分區示意圖。 Figure 1B is a schematic diagram of each partition of the first storage unit of the present invention.
第1C圖係為本新型的第一正常分區與第一加密區示意圖。 The 1C figure is a schematic diagram of the first normal partition and the first encrypted area of the new type.
第2圖係為本新型的設定流程示意圖。 Figure 2 is a schematic diagram of the new set process.
第3圖係為本新型的運作流程示意圖。 Figure 3 is a schematic diagram of the operation of the new model.
第4A圖係為本新型在各第二時間的設備連接示意圖。 Figure 4A is a schematic diagram of the connection of the new type of equipment at each second time.
第4B圖係為本新型在各第一時間的設備連接示意圖。 Figure 4B is a schematic diagram of the connection of the device at the first time.
第4C圖係為本新型無線設備連接時的操作示意圖。 Figure 4C is a schematic diagram of the operation of the new wireless device when it is connected.
第4D圖係為本新型無線設備斷線時的操作示意圖。 The 4D figure is a schematic diagram of the operation of the new wireless device when the line is broken.
請參考第1A圖所示,其係為本新型的架構示意圖。本新型的檔案加/解密的無線處理系統100包括:第一主機端110、第二主機端120與無線設備130。第一主機端110或第二主機端120可以是個人電腦 (personal computer)、筆記型電腦(notebook)、智慧型手機(smart phone)或平板電腦(tablet)等。第一主機端110與第二主機端120可以是兩種不同類型的計算機。 Please refer to Figure 1A for a schematic diagram of the new architecture. The wireless file processing system 100 of the present invention includes: a first host end 110, a second host end 120, and a wireless device 130. The first host end 110 or the second host end 120 may be a personal computer (personal computer), notebook (notebook), smart phone (smart phone) or tablet (tablet). The first host end 110 and the second host end 120 can be two different types of computers.
第一主機端110具有第一傳輸單元111、第一處理單元112、第一儲存單元113與第一警示單元114。第一處理單元112連接第一傳輸單元111、第一儲存單元113與第一警示單元114。第一傳輸單元111接用於接收來自於無線設備130的資訊,或傳送資訊至無線設備130。第一警示單元114的種類可以是但不限定為蜂鳴器(buzzer)或發光二極體(LED)。第一處理單元112透過第一警示單元114向使用者發出相關的提示訊息。第一處理單元112執行第一儲存單元113中的第一代理程序(agent process)。第一代理程序用於識別無線設備130是否連接於第一主機端110,並驗證所連接的無線設備130是否為合法。本新型中的合法所指的是主機端正確的識別無線設備130。若主機端偵測有未配對過的無線設備130(意即非法的無線設備130)接近,則主機端不會對該無線設備進行連接與加解密的相關處理。 The first host end 110 has a first transmission unit 111, a first processing unit 112, a first storage unit 113, and a first alert unit 114. The first processing unit 112 is connected to the first transmission unit 111, the first storage unit 113, and the first warning unit 114. The first transmission unit 111 is configured to receive information from the wireless device 130 or to transmit information to the wireless device 130. The type of the first alert unit 114 may be, but is not limited to, a buzzer or a light emitting diode (LED). The first processing unit 112 sends a related prompt message to the user through the first alert unit 114. The first processing unit 112 executes a first agent process in the first storage unit 113. The first agent is for identifying whether the wireless device 130 is connected to the first host 110 and verifying whether the connected wireless device 130 is legitimate. The law in the present invention refers to the correct identification of the wireless device 130 by the host. If the host detects that the unpaired wireless device 130 (that is, the illegal wireless device 130) is approaching, the host does not perform connection and encryption related processing on the wireless device.
第二主機端120具有第二傳輸單元121、第二處理單元122、第二儲存單元123與第二警示單元124。第二處理單元122連接第二傳輸單元121、第二儲存單元123與第二警示單元124。第二傳輸單元121接用於接收來自於無線設備130的資訊,或傳送資訊至無線設備130。第二警示單元124的種類可以是但不限定為蜂鳴器或發光二極體。第二處理單元122透過第二警示單元124向使用者發出相關的提示訊息。第二處理單元122執行第二儲存單元123中的第二代理程序。第二代理程序用於識別無線設備130是否連接於第二主機端120,並驗證所連接的無線設備130是否為合法。 The second host end 120 has a second transmission unit 121, a second processing unit 122, a second storage unit 123, and a second alert unit 124. The second processing unit 122 is connected to the second transmission unit 121, the second storage unit 123, and the second warning unit 124. The second transmission unit 121 is configured to receive information from the wireless device 130 or transmit information to the wireless device 130. The type of the second warning unit 124 may be, but not limited to, a buzzer or a light emitting diode. The second processing unit 122 sends a related prompt message to the user through the second alert unit 124. The second processing unit 122 executes the second agent in the second storage unit 123. The second agent is for identifying whether the wireless device 130 is connected to the second host 120 and verifying whether the connected wireless device 130 is legitimate.
請配合參考第1B圖,其係為本新型的第一儲存單元的各分區示意圖。在本新型的第一儲存單元113(或第二儲存單元123)中至少劃分出一個加密分區(encrypt partition),而加密分區外的磁碟空間則定義為正常分區。同理,第二儲存單元123的加密分區與正常分區的設定也與第一儲存單元113相似。 Please refer to FIG. 1B, which is a schematic diagram of each partition of the first storage unit of the present invention. At least one encryption partition is defined in the first storage unit 113 (or the second storage unit 123) of the present invention, and the disk space outside the encrypted partition is defined as a normal partition. Similarly, the setting of the encrypted partition and the normal partition of the second storage unit 123 is also similar to that of the first storage unit 113.
為清楚說明,對於第一儲存單元113被劃分為第一正常分區151與第一加密分區152。在第一正常分區151中存儲第一作業系統與多個第一明文檔案,請參考第1C圖。在第一加密分區152中存儲多個第一已加密檔案。本新型的第二儲存單元123被劃分為第二正常分區與第二加密分區。在第二正常分區中存儲第二作業系統與多個第二明文檔案。在第二加密分區中存儲多個第二已加密檔案。 For clarity of explanation, the first storage unit 113 is divided into a first normal partition 151 and a first encrypted partition 152. The first operating system and the plurality of first plaintext files are stored in the first normal partition 151, please refer to FIG. 1C. A plurality of first encrypted files are stored in the first encrypted partition 152. The second storage unit 123 of the present invention is divided into a second normal partition and a second encrypted partition. The second operating system and the plurality of second plaintext files are stored in the second normal partition. A plurality of second encrypted files are stored in the second encrypted partition.
一般而言,第一主機端110(或第二主機端120)可以透過磁區管理程序(Disk management process)來對第一儲存單元113的磁碟空間進行分區(partition)的管理。所述作業系統均被儲存至各自儲存單元的正常分區之中。加密分區用於儲存已加密檔案(encryption file)。在本新型中,未經過加密的檔案統稱為明文檔案(plaintext file)。而經過加密後的檔案則定義為已加密檔案(encrypt file)。 In general, the first host end 110 (or the second host end 120) can manage the partition space of the first storage unit 113 through a disk management process. The operating systems are all stored in a normal partition of the respective storage unit. The encrypted partition is used to store the encrypted file. In the present invention, unencrypted files are collectively referred to as plaintext files. The encrypted file is defined as an encrypted file.
無線設備130具有實體接口131、控制元件132、通訊元件133、第三儲存單元134與第三警示單元135。控制元件132電性連接於實體接口131、通訊元件133、第三儲存單元134與第三警示單元135。實體接口131用於傳輸對無線設備130的設定資料。實體接口131的種類可以是但不限定為通用序列匯流排(Universal Serial Bus,USB)。 The wireless device 130 has a physical interface 131, a control element 132, a communication component 133, a third storage unit 134, and a third alert unit 135. The control component 132 is electrically connected to the physical interface 131, the communication component 133, the third storage unit 134, and the third alert unit 135. The physical interface 131 is used to transmit configuration data to the wireless device 130. The type of the physical interface 131 may be, but not limited to, a Universal Serial Bus (USB).
通訊元件133用於對第一傳輸單元111或第二傳輸單元121進行通訊。換言之,通訊元件133的所採用的通訊協議係與第一傳輸單元111(第二傳輸單元121)的通訊協議是相同的。控制元件132驅動通訊元件133發出存活資訊與識別資訊,或由通訊元件133接收來自於第一主機端110(或第二主機端120)的確認資訊。無線設備130透過存活資訊的方式用於提示所述主機端是否仍處於連接狀態中。而所述主機端會返回確認資訊,使得無線設備130可以得知主機端是否維持連線。而存活資訊可以透過心跳(heart beat)的方式定時發送。 The communication component 133 is configured to communicate with the first transmission unit 111 or the second transmission unit 121. In other words, the communication protocol employed by the communication component 133 is the same as the communication protocol of the first transmission unit 111 (second transmission unit 121). The control component 132 drives the communication component 133 to transmit survival information and identification information, or the communication component 133 receives confirmation information from the first host terminal 110 (or the second host terminal 120). The wireless device 130 uses the survival information to indicate whether the host is still in the connected state. The host device returns a confirmation message, so that the wireless device 130 can know whether the host terminal maintains the connection. Survival information can be sent periodically via a heart beat.
本新型所述的通訊元件133可以是無線連接(wireless)的介面。無線傳輸介面的種類可以是但不限定為藍芽無線傳輸協議、無線網路協議、ZigBee、無線射頻辨識(Radio Frequency Identification,簡稱RFID)或近場通訊協議(Near Field Communication,簡稱NFC)。 The communication component 133 of the present invention may be a wireless interface. The type of the wireless transmission interface may be, but not limited to, a Bluetooth wireless transmission protocol, a wireless network protocol, a ZigBee, a Radio Frequency Identification (RFID), or a Near Field Communication (NFC).
無線設備130的第三儲存單元134用於儲存識別資訊。識別資訊的內容除了可以根據使用者(或製造商)所設定的字串,也可能是第一主機端110或第二主機端120的相關資訊。例如:第一主機端110的實體位址(Media Access Control address,MAC address)或網路位址(IP Address)。第三警示單元135用於向使用者發出相關的提示訊息。 The third storage unit 134 of the wireless device 130 is configured to store identification information. The content of the identification information may be related information according to the user (or manufacturer), or may be related information of the first host end 110 or the second host end 120. For example, the first host end 110 has a physical address (MAC address) or a network address (IP address). The third alert unit 135 is configured to send a related prompt message to the user.
為清楚說明本新型在設定與使用的過程,因此將兩個過程分別於下文列出。而設定無線設備130的過程中會以相異於第一主機與第二主機端120的另一台主機端作為說明,將此一主機端定義為主要主機端210。但實際上,主要主機端210也可以由第一主機端110(或第二主機端120)執行。請參考第2圖所示,其係為本新型的流程示意圖。本新型的安裝流程包括以下步驟:步驟S210:無線設備連接於主要主機端,主要主機端連接至無線設備;步驟S220:主要主機端要求無線設備對第一主機端或第二主機端進行配對;步驟S230:持續監視無線設備是否連接於主要主機端;步驟S240:若無線設備未連接於主要主機端,無線設備終止配對的程序;以及步驟S250:無線設備記錄已經完成配對的第一主機端或第二主機端。 In order to clarify the process of setting and using the present invention, the two processes are listed below. In the process of setting the wireless device 130, another host end that is different from the first host and the second host 120 is used as a description, and the host is defined as the main host 210. In practice, however, the primary host side 210 can also be executed by the first host end 110 (or the second host side 120). Please refer to Figure 2, which is a schematic diagram of the new process. The installation process of the present invention includes the following steps: Step S210: the wireless device is connected to the main host, and the main host is connected to the wireless device; Step S220: the primary host requires the wireless device to pair the first host or the second host; Step S230: continuously monitoring whether the wireless device is connected to the primary host end; step S240: if the wireless device is not connected to the primary host, the wireless device terminates the pairing procedure; and step S250: the wireless device records the first host that has completed pairing or The second host.
使用者可操作主要主機端210並對無線設備130進行設定。使用者可以選擇無線設備130要與第一主機端110或第二主機端120進行配對。以下說明係以第一主機端110作為說明。首先,將無線設備130透過實體接口131連接於主要主機端210。主要主機端210在與第一主機端110連接,而連接的方式可以透過實體電纜(cable)或無線網路等方式。主要主機端210取得第一主機端110的識別資訊,並將識別資訊傳送至無線設備130。無線設備130可以根據識別資訊與第一主機端110進行通訊,並識別所連接的主機端是否為合法。 The user can operate the primary host side 210 and make settings for the wireless device 130. The user can select that the wireless device 130 is to be paired with the first host end 110 or the second host end 120. The following description is based on the first host end 110. First, the wireless device 130 is connected to the primary host 210 via the physical interface 131. The main host end 210 is connected to the first host end 110, and the connection manner can be through a physical cable (cable) or a wireless network. The main host end 210 obtains the identification information of the first host end 110 and transmits the identification information to the wireless device 130. The wireless device 130 can communicate with the first host 110 according to the identification information and identify whether the connected host is legal.
在完成無線設備130與第一主機端110(或第二主機端120)的設定後,無線設備130即可與第一主機端110(或第二主機端120)進行以下的操作。請參考第3圖所示,其係為本新型的運作流程示意圖。本新 型的運作流程包括以下步驟:步驟S310:無線設備對第一主機端與第二主機端輪流連接;步驟S320:若無線設備連接於第一主機端時,第一主機端在第一時間中,第一主機端未偵測與無線設備連接,第一主機端將第一儲存單元中的第一明文檔案進行加密並輸出為第一已加密檔案,並驅動第一主機端的第一警示單元與無線設備的第三警示單元;以及步驟S330:若無線設備連接於第二主機端時,第二主機端在第一時間中,第二主機端未偵測與無線設備連接,第二主機端將第二儲存單元中的第二明文檔案進行加密並輸出為第二已加密檔案,並驅動第二主機端的第二警示單元與無線設備的第三警示單元。 After completing the setting of the wireless device 130 and the first host end 110 (or the second host end 120), the wireless device 130 can perform the following operations with the first host end 110 (or the second host end 120). Please refer to Figure 3, which is a schematic diagram of the new operational process. This new The operation process includes the following steps: Step S310: The wireless device connects the first host end and the second host end in turn; Step S320: If the wireless device is connected to the first host end, the first host end is in the first time, The first host end does not detect the connection with the wireless device, and the first host end encrypts the first plaintext file in the first storage unit and outputs the first encrypted file, and drives the first warning unit of the first host end and the wireless device. a third alert unit of the device; and step S330: if the wireless device is connected to the second host, the second host is not detected to be connected to the wireless device in the first time, and the second host is The second plaintext file in the second storage unit is encrypted and output as the second encrypted file, and drives the second alert unit of the second host end and the third alert unit of the wireless device.
本新型的無線設備130會輪流的連接第一主機端110與第二主機端120,請參考第4A圖與第4B圖所示。當無線設備130僅記錄一台主機端時,則無線設備130持續的連接至所述主機端,直至有第二台主機端與無線設備130連線。在本新型中,無線設備130每隔第二時間後,無線設備130會從現在連接的主機端換成另一主機端。舉例來說,無線設備130正連接於第一主機端110。在經過第二時間後,無線設備130會先斷開第一主機端110的連線,並連接至第二主機端120。又在經過第二時間後,無線設備130會從第二主機端120改連接至第一主機端110。 The wireless device 130 of the present invention connects the first host end 110 and the second host end 120 in turn, as shown in Figures 4A and 4B. When the wireless device 130 records only one host, the wireless device 130 is continuously connected to the host until the second host is connected to the wireless device 130. In the present invention, after the second time of the wireless device 130, the wireless device 130 will switch from the currently connected host to another host. For example, the wireless device 130 is being connected to the first host end 110. After the second time, the wireless device 130 first disconnects the first host 110 and connects to the second host 120. After the second time, the wireless device 130 is reconnected from the second host 120 to the first host 110.
而所述主機端連接於無線設備130時,所述主機端在第一時間內持續偵測無線設備130是否斷線(或離線)。以第一主機端110為例,第一主機端110與無線設備130連線後。第一主機端110可以對第一明文檔案進行加密或存取,也可以對已加密檔案進行解密,請參考第4C圖所示。在此期間內,第一主機端110會在第一時間內持續偵測無線設備130是否連線。為避免切換的過程中產生誤偵測的情況,本新型的所述主機端在偵測斷線時,更可以加入緩衝用的預備時間。 When the host end is connected to the wireless device 130, the host end continuously detects whether the wireless device 130 is disconnected (or offline) for a first time. Taking the first host end 110 as an example, the first host end 110 is connected to the wireless device 130. The first host end 110 can encrypt or access the first plaintext file, and can also decrypt the encrypted file. Please refer to FIG. 4C. During this period, the first host 110 continuously detects whether the wireless device 130 is connected for the first time. In order to avoid the occurrence of false detection during the switching process, the host terminal of the present invention can add the buffering preparation time when detecting the disconnection.
若在第一時間內,無線設備130偵測到與第一主機端110斷線,第一處理單元112在經過一預備時間內偵測是否已經與無線設備130 恢復連線。若第一主機端110在經過預備時間後未與無線設備130連線則第一處理單元112會將第一主機端110將第一儲存單元113中的第一明文檔案進行加密並輸出為第一已加密檔案。並且第一處理單元112會驅動第一警示單元114發出警報,用以通知使用者無線設備130已經離線。而此一同時,第一主機端110會將操作中的第一明文檔案進行加密,請參考第4D圖所示。 If the wireless device 130 detects that the first host 110 is disconnected from the first host 110, the first processing unit 112 detects whether it has been connected to the wireless device 130 after a preliminary time. Restore the connection. If the first host terminal 110 is not connected to the wireless device 130 after the standby time, the first processing unit 112 encrypts the first plaintext file in the first storage unit 113 and outputs the first file. Encrypted file. And the first processing unit 112 drives the first alert unit 114 to issue an alarm to notify the user that the wireless device 130 is offline. At the same time, the first host end 110 encrypts the first plaintext file in operation, as shown in FIG. 4D.
當第一主機端110與無線設備130連線時,第一處理單元112確認識別資訊是否正確。若識別資訊正確,第一處理單元112會掛載第一加密分區152至第一作業系統中。當第一加密分區152被掛載於第一作業系統時,第一處理單元112將寫入第一加密分區152的第一明文檔案加密為第一已加密檔案,或從第一加密分區152取得任一第一已加密檔案,第一處理單元112對第一已加密檔案進行解密並輸出第一明文檔案。 When the first host end 110 is connected to the wireless device 130, the first processing unit 112 confirms whether the identification information is correct. If the identification information is correct, the first processing unit 112 mounts the first encrypted partition 152 to the first operating system. When the first encrypted partition 152 is mounted on the first operating system, the first processing unit 112 encrypts the first plaintext file written to the first encrypted partition 152 into the first encrypted file, or obtains from the first encrypted partition 152. For any of the first encrypted files, the first processing unit 112 decrypts the first encrypted file and outputs the first plaintext file.
同理,對於第二主機端120而言,無線設備130的連接與斷線處理也跟第一主機端110相同。當第二主機端120與無線設備130連線時,第二處理單元122確認識別資訊是否正確。若識別資訊正確,第二處理單元122會掛載第二加密分區至第二作業系統中。當第二加密分區被掛載於第二作業系統時,第二處理單元122將寫入第二加密分區的第二明文檔案加密為第二已加密檔案,或從第二加密分區取得任一第二已加密檔案,第二處理單元122對第二已加密檔案進行解密並輸出第二明文檔案。 Similarly, for the second host end 120, the connection and disconnection processing of the wireless device 130 is also the same as the first host end 110. When the second host 120 is connected to the wireless device 130, the second processing unit 122 confirms whether the identification information is correct. If the identification information is correct, the second processing unit 122 mounts the second encrypted partition to the second operating system. When the second encrypted partition is mounted on the second operating system, the second processing unit 122 encrypts the second plaintext file written in the second encrypted partition into the second encrypted file, or obtains any number from the second encrypted partition. The second encrypted unit deletes the second encrypted file and outputs the second plaintext file.
若第二主機端120在經過第一時間後未與無線設備130連線則第二處理單元122會將第二主機端120將第二儲存單元123中的第二明文檔案進行加密並輸出為第二已加密檔案。並且第二處理單元122會驅動第二警示單元124發出警報。 If the second host 120 is not connected to the wireless device 130 after the first time, the second processing unit 122 encrypts and outputs the second plaintext file in the second storage unit 123 to the second host 120. Two encrypted files. And the second processing unit 122 drives the second alert unit 124 to issue an alarm.
本新型的檔案加/解密的無線處理系統100與其方法在進行檔案的存取過程提供加密或解密的對應處理。而主機端會根據無線設備130的正確與否,進而決定是否啟動所述的加解密處理。因此,只有使用者將正確的無線設備130連接於主機端,使用者才能對檔案進行存取。 The wireless file processing/decryption wireless processing system 100 of the present invention and its method provide corresponding processing of encryption or decryption in the process of performing file access. The host side determines whether to activate the encryption and decryption process according to the correctness of the wireless device 130. Therefore, the user can access the file only if the user connects the correct wireless device 130 to the host.
雖然本新型以前述之較佳實施例揭露如上,然其並非用以限定本新型,任何熟習相像技藝者,在不脫離本新型之精神和範圍內,當可 作些許之更動與潤飾,因此本新型之專利保護範圍須視本說明書所附之申請專利範圍所界定者為準。 Although the present invention has been described above in terms of the preferred embodiments thereof, it is not intended to limit the present invention, and those skilled in the art can, without departing from the spirit and scope of the present invention, In the case of a certain change and refinement, the scope of patent protection of this new type shall be subject to the definition of the scope of the patent application attached to this specification.
100‧‧‧無線處理系統 100‧‧‧Wireless Processing System
110‧‧‧第一主機端 110‧‧‧First host
111‧‧‧第一傳輸單元 111‧‧‧First transmission unit
112‧‧‧第一處理單元 112‧‧‧First Processing Unit
113‧‧‧第一儲存單元 113‧‧‧First storage unit
114‧‧‧第一警示單元 114‧‧‧First warning unit
120‧‧‧第二主機端 120‧‧‧second host
121‧‧‧第二傳輸單元 121‧‧‧Second transmission unit
122‧‧‧第二處理單元 122‧‧‧Second processing unit
123‧‧‧第二儲存單元 123‧‧‧Second storage unit
124‧‧‧第二警示單元 124‧‧‧Second warning unit
130‧‧‧無線設備 130‧‧‧Wireless equipment
131‧‧‧實體接口 131‧‧‧ physical interface
132‧‧‧控制元件 132‧‧‧Control elements
133‧‧‧通訊元件 133‧‧‧Communication components
134‧‧‧第三儲存單元 134‧‧‧ third storage unit
135‧‧‧第三警示單元 135‧‧‧3rd warning unit
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103215031U TWM492580U (en) | 2014-08-21 | 2014-08-21 | Wireless processing system for file encryption / decryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103215031U TWM492580U (en) | 2014-08-21 | 2014-08-21 | Wireless processing system for file encryption / decryption |
Publications (1)
Publication Number | Publication Date |
---|---|
TWM492580U true TWM492580U (en) | 2014-12-21 |
Family
ID=52577534
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW103215031U TWM492580U (en) | 2014-08-21 | 2014-08-21 | Wireless processing system for file encryption / decryption |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWM492580U (en) |
-
2014
- 2014-08-21 TW TW103215031U patent/TWM492580U/en not_active IP Right Cessation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3198789B1 (en) | Securely pairing computing devices | |
CN105245541B (en) | Authentication method, equipment and system | |
US9755824B2 (en) | Power line based theft protection of electronic devices | |
US20170372085A1 (en) | Protecting data in a storage device | |
EP3198514B1 (en) | Technologies for sensor action verification | |
WO2013078796A1 (en) | Mobile phone and communication method thereof | |
JP5827692B2 (en) | Bound data card and mobile host authentication method, apparatus and system | |
JP6807153B2 (en) | Devices and related methods for secure hearing device communication | |
US9953497B2 (en) | Merchandise security system with data collection features and relevant technical field | |
WO2015158043A1 (en) | Method, terminal and system for protecting terminal security | |
CN107590025A (en) | A kind of back-up restoring method and system | |
CN105653969A (en) | Data processing method, apparatus and electronic equipment | |
WO2015090155A1 (en) | Mobile terminal and method | |
CN103236926A (en) | Point-to-point-based data transmission system and data transmission method | |
JP5054317B2 (en) | Encryption key setting method, network system, management apparatus, information processing terminal, and encryption key setting program | |
CN117041956A (en) | Communication authentication method, device, computer equipment and storage medium | |
KR101659294B1 (en) | An apparatus for secure usb memory using beacon signals and the operating method thereof | |
WO2023103425A1 (en) | Communicative connection method, system, and apparatus, storage medium, and processor | |
CN110781504A (en) | Data protection method and related equipment | |
CN107317925B (en) | Mobile terminal | |
TWM492580U (en) | Wireless processing system for file encryption / decryption | |
US20200272769A1 (en) | Methods and apparatus for performing secure back-up and restore | |
TWI524805B (en) | System with wireless network device and method for processing wireless network setting | |
TW201608410A (en) | A wireless process system and method for the file encrypt/decrypt | |
US20170126669A1 (en) | Hard drive management system and method thereof with network authentication function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4K | Annulment or lapse of a utility model due to non-payment of fees |