CN102004864B - Data transmission and anti-copy method realized by man-machine interface device with mass storage level - Google Patents
Data transmission and anti-copy method realized by man-machine interface device with mass storage level Download PDFInfo
- Publication number
- CN102004864B CN102004864B CN2009101715231A CN200910171523A CN102004864B CN 102004864 B CN102004864 B CN 102004864B CN 2009101715231 A CN2009101715231 A CN 2009101715231A CN 200910171523 A CN200910171523 A CN 200910171523A CN 102004864 B CN102004864 B CN 102004864B
- Authority
- CN
- China
- Prior art keywords
- interface device
- human
- file
- computer interface
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A data transmission and anti-copy method for man-machine interface device realized by mass storage grade is to use the man-machine interface device as an external USB storage device to connect with the computer by mass storage grade protocol, so that the computer will not need to reinstall the driver because the used operating system and man-machine interface device are not supported, and when data is transmitted, the transmitted data is encrypted by dynamic cipher, and the data is not actually written into the file configuration table, so that the data will not be peeped and stolen by the third person.
Description
Technical field
The present invention is relevant for human-computer interface device, especially more relevant for the data anti-copying method that is applied to human-computer interface device.
Background technology
Man-machine interface (Human Machine Interface, HMI) device, or be called HID (Human-machine Interface Device), be the intermediary that operator and machinery compartment carry out communication switching, communication and interaction.The operator finishes the input of instruction by the control button on the human-computer interface device or the touch-control image on the window panel, makes those machines produce corresponding action to the instruction of operator's input, so as to improving convenience and the practicality of operator in machine operation.So human-computer interface device is not only so that industrial automatic control is more convenient on carrying out, even gradually replace the control card that tradition needs a large amount of distributions fully.
As shown in Figure 1, one human-computer interface device 1 mainly is to be connected to a programmable logic controller 2 (Programmable Logic Controller, PLC), send control command by 2 pairs of a plurality of external mechanical 3 of this programmable logic controller, and receive the operational data that those machines 3 are repaid.Present common this human-computer interface device 1 on the market, main by its inner affiliated control software, be presented at outside touch-control liquid crystal display (Liquid Crystal Display, LCD) on, make the operator be used simple touch-control action, namely those machines 3 are sent operational order, and according to the work that those machines 3 carry out, obtain corresponding operational data.And be speed of development in response to industrial technology, those softwares need regular down loading updating version, in order to keep the optimum condition of this human-computer interface device 1.Moreover those also need regularly be uploaded by the obtained operational data of human-computer interface device 1, make further record and preserve in order to the operator.
Only, as shown in Figure 1, this human-computer interface device 1 be need by with being connected an of outer computer 4, carry out the download of data or upload, and this computing machine 4 that connects, need to install the driver by manufacturer's manufacturing under this human-computer interface device 1.Yet when information development rapidly, the renewal speed of computer operating system (Operating System, OS) was very fast, and kind is also quite polynary.Therefore, when being connected with this computing machine 4, usually occur this human-computer interface device 1 be connected this computing machine 4 operating system incompatible, the awkward situation that causes driver not supported, cause this human-computer interface device 1 can't be smoothly and this computing machine 4 be connected to each other, and then can't the transmission of data.Thus, the manufacturer under this human-computer interface device 1 namely needs for various operating system, develops corresponding driver, need expend in fact cost and the time of certain degree.
And except above-mentioned direct-connected mode, at present there is on the market the part human-computer interface device can support to use external Portable disk (USB Flash Disk, UFD) come as the data transfer medium, so as to the data of exchange human-computer interface device and intercomputer.Only, virus is held sway now, and difficulty is taken care of yourself and wanted data to suffer Viral infection in transmission course, even may thereby be subject to hacker's attack, causes data to be usurped, and the shortcoming that causes is real can't ignore for the dealer.
Because above-mentioned disappearance, the real data transfer mode that a kind of novelty need be provided is made us the machine interface device when carrying out data transmission on the market, does not only need the problem of taking into account system compatibility, the more important thing is to be subject to intentionally usurping of personage, make development company suffer greatest loss.
Prior art
1 ... human-computer interface device 2 ... the programmable logic controller
3 ... external mechanical 4 ... computing machine
The present invention
4 ' ... outer computer 41 ... data transmission software
5 ... human-computer interface device 5 ' ... storage device 51,52 ... usb connecting port
53 ... file system 54 ... file configuration table 55 ... file
S40~S46, S50~S58, S60~S70 ... step
Summary of the invention
Fundamental purpose of the present invention; be to provide data transmission and the anti-copy method of a kind of human-computer interface device with the realization of mass storage grade; by the mass storage level protocol human-computer interface device and outer computer are connected; thereby do not need on outer computer to install the driver of human-computer interface device; and the protection mechanism when coming the mutual the transmission of data of construction by the rule of mass storage level protocol, make that data are unlikely is got a glimpse of by the 3rd people and stolen.
For achieving the above object, the invention provides data transmission and anti-copy method that a kind of human-computer interface device is realized with the mass storage grade, with universal serial bus (Universal Serial Bus, USB) mass storage grade (Mass Storage Class, MSC) agreement is modeled as this human-computer interface device one USB storage device and carries out data transmission with an outer computer, and the method comprises:
A) this human-computer interface device receives a cryptogram and a request command that transmits;
B) why this human-computer interface device judges this request command;
C) carry out the transmission of a data file according to this request command;
D) behind the step c, decipher this data file with a dynamic password of putting down in writing in this cryptogram;
Wherein, this human-computer interface device is this cryptogram that receives not to be write in the file configuration table (FileAllocation Table, FAT), can't learn the existence of this cryptogram so as to making this outer computer.
As mentioned above, wherein, this request command presents with the filename of this cryptogram.
As mentioned above, if judge among this step b that this request command is to be a file download request, then among this step c, receive the data download file by this dynamic password encryption that this outer computer transmits by this human-computer interface device.
As mentioned above, wherein, after this human-computer interface device receives this data download file, do not write in this document allocation list, can't learn the existence of this data download file so as to making this outer computer.
As mentioned above, if judge among this step b that this request command is to be a File Upload request, then this step c comprises:
C1) this human-computer interface device data upload file by this dynamic password encryption that it is inner stored writes in this document allocation list, learns the existence of this data upload file so as to making this outer computer;
C2) behind the step c1, when replication actions was correct, this human-computer interface device allowed this data upload file to be replicated;
C3) behind the step c2, this human-computer interface device is deleted this data upload file.
As mentioned above, wherein, among this step c1, after the processing of anti-copy mechanism, again this data upload file is write in this document allocation list, comprising:
C11) according to this dynamic password of putting down in writing in this cryptogram, by an expression formula, produce the random file name of this data upload file;
C12) according to this dynamic password of putting down in writing in this cryptogram, by an expression formula, produce a plurality of substitute files, wherein these a plurality of substitute files have the random file name;
C13) this data upload file and these a plurality of substitute files are write in this document allocation list jointly.
As mentioned above, wherein, among this step c2, when these a plurality of substitute files were required to copy, it was incorrect to be considered as replication actions.
As mentioned above, wherein, among this step c3, after this data upload file is replicated once, or replication actions is deleted this data upload file when incorrect from this document allocation list.
As mentioned above, wherein, this expression formula is a hash expression formula.
As mentioned above, wherein, the human-computer interface device that this is modeled as the USB storage device is in the data transmission software that uses human-computer interface device manufacturer exploitation, when transmitting the relevant data file of a human-computer interface device, could be smoothly and this outer computer do data transmission.
For achieving the above object more accurately, the invention provides data transmission and anti-copy method that a kind of human-computer interface device is realized with the mass storage grade, with universal serial bus (Universal Serial Bus, USB) mass storage grade (Mass Storage Class, MSC) agreement is modeled as this human-computer interface device one USB storage device and carries out data transmission with an outer computer, and the method comprises:
A) this human-computer interface device receives a cryptogram that transmits;
B) if this cryptogram is one to download cryptogram, then this human-computer interface device in confirm this download a dynamic password in cryptogram correct after, a password confirming file is write in the file configuration table (FileAllocation Table, FAT);
C) behind the step b, this human-computer interface device receives a data download file by this dynamic password encryption that transmits;
D) if this cryptogram is to upload cryptogram, then this human-computer interface device in confirm this upload a dynamic password in the cryptogram correct after, the one data upload file of being encrypted by this dynamic password is write in this document allocation list, learn the existence of this data upload file so as to making this outer computer;
E) after the steps d, when replication actions was correct, this human-computer interface device allowed this data upload file to be replicated;
F) behind the step e, this human-computer interface device is deleted this data upload file;
Wherein, this human-computer interface device does not write this cryptogram and this data download file that receives in this document allocation list, can't learn the existence of this cryptogram and this data download file so as to making this outer computer.
As mentioned above, wherein, also comprise a step g) behind step c or the step e, with this dynamic password of putting down in writing in this cryptogram, decipher this data download file or this data upload file.
As mentioned above, wherein, among this step c, be this outer computer after this password confirming file appears at this document allocation list, this data download file is transferred to this human-computer interface device.
As mentioned above, wherein, also comprising a step h) behind the step c, this human-computer interface device writes a data validation file in this document allocation list, has received the message of this data download file so as to replying this outer computer.
As mentioned above, wherein, in this steps d, be after processing by anti-copy mechanism, again this data upload file to be write in this document allocation list, comprising:
D1) according to this dynamic password of putting down in writing in this cryptogram, by an expression formula, produce the random file name of this data upload file;
D2) according to this dynamic password of putting down in writing in this cryptogram, by an expression formula, produce a plurality of substitute files, wherein these a plurality of substitute files have the random file name;
D3) this data upload file and these a plurality of substitute files are write in this document allocation list jointly.
As mentioned above, wherein, among this step e, be that it is incorrect to be considered as replication actions when these a plurality of substitute files are required to copy.
As mentioned above, wherein, among this step f, be after this data upload file is replicated once, or replication actions is deleted this data upload file when incorrect from this document allocation list.
As mentioned above, wherein, this expression formula is a hash expression formula.
As mentioned above, wherein, the human-computer interface device that this is modeled as the USB storage device is in the data transmission software that uses human-computer interface device manufacturer exploitation, when transmitting the relevant data file of a human-computer interface device, could be smoothly and this outer computer do data transmission.
The effect that the present invention can produce against existing technologies is, when human-computer interface device is connected with outer computer, the problem that the operating system that need not worry computing machine is not supported by the driver of human-computer interface device, and when carrying out data transmission, also there is not the risk that suffers the 3rd people to get a glimpse of and steal.Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
The use connection diagram of Fig. 1 human-computer interface device;
The transmission connection diagram of Fig. 2 A, Fig. 2 B human-computer interface device;
Fig. 3 uses the storage device synoptic diagram of mass storage level protocol;
The file transfer process flow diagram of Fig. 4 preferred embodiment of the present invention;
The file of Fig. 5 preferred embodiment of the present invention is downloaded process flow diagram;
The File Upload process flow diagram of Fig. 6 preferred embodiment of the present invention;
The anti-copy schematic diagram of mechanism of Fig. 7 preferred embodiment of the present invention.
Wherein, Reference numeral
Embodiment
Below in conjunction with accompanying drawing structural principle of the present invention and principle of work are done concrete description:
Hereby with regard to a preferred embodiment of the present invention, cooperate graphicly, be described in detail as follows.
Head sees also Fig. 2 A, Fig. 2 B, is the transmission connection diagram of a preferred embodiment of the present invention.As shown in the figure, a human-computer interface device 5 of the present invention (Human-machine Interface Device, HID) is by a universal serial bus (Universal Serial Bus, USB) connectivity port 51 or 52 is connected to each other with an outer computer 4 '.The present invention mainly is by using mass storage grade (the MassStorage Class of USB, MSC) agreement defines this HID 5, so as to the USB storage device 5 ' (for example circumscribed disc driver among Fig. 3) that this HID 5 is modeled to a circumscribed.Thus, by the MSC agreement of USB, this HID 5 namely possesses the effect of plug and play, so this computing machine 4 ' need not installed the driver that these HID 5 manufacturers develop, can be connected with this HID 5 at any time.
When this HID 5 was connected to each other with this computing machine 4 ', this computing machine 4 ' can send inquiry command, and the device that inquiry connects why, 5 these computing machines 4 ' of MSC protocol responses with USB of this HID.The persond having ordinary knowledge in the technical field of the present invention all knows, file system (the File System that comprises the disc driver of normal operation MSC agreement in those responses, F/S) due structure, Main Boot Record (Master Boot Record for example, MBR) and the information such as file configuration table (File Allocation Table, FAT).And this computing machine 4 ' is in case receive those responses, namely thinks coupled this HID 5, is the USB storage device 5 ' that uses the MSC agreement for, and configuration gives 5 one disk sequence numbers of this HID, such as " D: " or " E: " etc.Yet, this HID 5 of the present invention, that Yu Yuanchang sets when producing, when connecting with this computing machine 4 ', only have and use a data transmission software 41 (mainly being the data transmission software 41 of developing as manufacturer) that is installed in this computing machine 4 ', during with these HID 5 transmission one HID associated documents (the job record file of for example updating file of HID, or HID etc.), could successfully move.Therefore, if do not use this software 41 to carry out data transmission with this HID 5, when perhaps transmission is with this HID 5 incoherent file, all can't carry out to this HID 5 action of access.
As shown in Figure 3, this computing machine 4 ' is this HID 5 of the present invention to be used as this external storage device 5 ' use.The main action of this storage device 5 ' is by a file system 53, and the shelves name that will be stored in the file in this storage device 5 ' corresponds on the specific FAT 54.Then, again via the content of this FAT 54, correspond to those files 55 and be stored in physical address in this storage device 5 ', and then make the actions such as this computing machine 4 ' increases newly, revises, deletion.Thereby why the user can see the content of this storage device 5 ' on this computing machine 4 ', is the correspondence of all passing through this FAT 54.If those files 55 are stored in this storage device 5 ' really, but be not written into corresponding data among this FAT 54, the user namely can't learn, also can't see those files 55 on this computing machine 4 '.And the present invention carries out the protection of data transmission namely by the employed characteristic of above-mentioned MSC agreement, is described in detail as follows.
Consult Fig. 4, be the file transfer process flow diagram of a preferred embodiment of the present invention.At first, be this data transmission software 41 of installing by in this computing machine 4 ', transmit cryptogram that a content comprises a dynamic password to this HID 5, and this HID 5 is sent a request command (step S40).And this HID 5 is after receiving this cryptogram, although this cryptogram of smooth reception is arranged, the corresponding data with this cryptogram does not write among this FAT 54, and therefore, this computing machine 4 ' can't be seen this cryptogram from this storage device 5 ' content.For this reason, the 3rd people namely can't learn, check or steal this cryptogram by this computing machine 4 ', thereby can't obtain this dynamic password.Wherein, this dynamic password is to produce with the collocation of this HID 5 by this computing machine 4 ', and for example, this computing machine 4 ' is the sequence number that can obtain this HID 5, produces a dynamic password by an expression formula (a for example hash function); And this HID 5 itself also knows the sequence number of self, thereby can use same this expression formula, produce same this dynamic password come to the file uploading/download carry out enciphering/deciphering.Only this only is a preferred embodiments, should be as limit.Then, this HID 5 judges this request command that these computing machines 4 ' send why (step S42), that is, judgement will be carried out the download of file or uploading of file.
And after the step S42, this computing machine 4 ' carries out file transfer (step S44) namely by this software 41 with this HID 5.If in this step S42, this request command is to be a file download request, and then this moment, this HID 5 can receive a data download file that is transmitted by this computing machine 4 ', and this data download file is encrypted by this dynamic password.And this HID 5 in actual receive this data download file after, do not write among this FAT 54.Therefore, this computing machine 4 ' can't from this storage device 5 ' content, be seen this data download file; And if in this step S42, when this request command is a File Upload request, this HID5 is about to originally exist the corresponding data of the data upload file among this HID 5 to write among this FAT 54, make this computing machine 4 ' in this storage device 5 ' content, see this data upload file, and then can be by this software 41, this data upload file copy to this computing machine 4 ', is finished and uploaded action.Wherein, this data upload file is encrypted with this dynamic password.And this HID 5 and after upper driving is finished deletes this data upload file at once from this FAT 54, makes the 3rd people can't copy in addition this upload file.At last, after file transfer is finished, this HID 5 or this computing machine 4 ', can use this dynamic password that produces, by this expression formula, for this document that institute downloads or uploads is deciphered (step S46), and then obtain required data, and carry out follow-up utilization.
And in the step S42 of above-mentioned judgement request command, to confirm with the filename of this cryptogram the order of asking why, for example in step S40, can be with the filename called after " Download.dat " of this cryptogram, then this HID 5 can after receiving, learn that at once this computing machine 4 ' wish is the download of file by the action that this software 41 carries out; And if with the filename called after " Upload.dat " of this cryptogram, can learn that the action that this computing machine 4 ' wants to carry out is uploading of file.But this only is a preferred embodiments, the persond having ordinary knowledge in the technical field of the present invention all knows, the formulation of the filename of file, the person that is the visual programming and deciding, except can not using some special symbol, unfixing lays down a regulation, and should not thereby limit claim of the present invention.
Document flow among Fig. 4 can also be divided into further file and download process flow diagram with File Upload, is done more detailed explanation.As shown in Figure 5, the file that is a preferred embodiment of the present invention is downloaded process flow diagram.At first, this software 41 that this computing machine 4 ' passes through to install transmits a content and comprises the download cryptogram of this dynamic password to this HID 5 (step S50).After this HID 5 receives this download cryptogram, do not write among this FAT 54, this computing machine 4 ' can't be learnt whether transmission success of this download cryptogram from this storage device 5 ' content, and the 3rd people also has no way of obtaining this download cryptogram.And follow, if determine that this this dynamic password of downloading in cryptogram is correct, then this HID 5 needs to reply these computing machines 4 ' and receive the download cryptogram, and in the message of pending file download action.That is, in this FAT 54, write a password confirming file (step S52), and make the filename of this password confirming file have the prompting of answer effect, such as can be " get.dat " or " wait.dat " etc.This password confirming file is appeared in this storage device 5 ' content on this computing machine 4 ', and after this computing machine 4 ' sees this password confirming file by this software 41, can assert transmission success of this download cryptogram, so can carry out the data transmission of next step.
After the step S52, this computing machine 4 ' namely transmits a data download file to this HID5 (step S54) by this software 41, and this HID 5 by preventing being stolen by the 3rd people, does not therefore still write in this FAT 54 after receiving.Wherein this data download file is to encrypt with this dynamic password through this computing machine 4 '.But as this step S52, after this data download file of certain reception, in this FAT 54, write a data validation file (step S56), and make the filename of this data validation file have the prompting of answer effect, such as can be " down.dat " or " ok.dat " etc.This computing machine 4 ' checks in this data validation file in this storage device 5 ' content after, can assert that this data download file is transmitted.At last, this HID 5 can use this dynamic password in this download cryptogram, by this expression formula, deciphers this data download file (step S58) and is applied.Wherein, this password confirming file and this data validation file, purpose only is to reply this computing machine 4 ', this HID 5 receives the message of file really, so this two file itself need not possess any essential meaning or content, therefore this two file is write among the FAT 54, even stolen by the 3rd people, also can not cause any injury to data transfer.
Continuing sees also Fig. 6, is the File Upload process flow diagram of a preferred embodiment of the present invention.At first as this step S50 among Fig. 5, this software 41 that this computing machine 4 ' passes through to install, what transmit that a content comprises this dynamic password uploads cryptogram to this HID 5 (step S60).Then, when this HID 5 receives this and uploads cryptogram, can confirm that this computing machine 4 ' wish carries out the action of File Upload by this software 41.So in confirm this upload this dynamic password in the cryptogram correct after, this HID 5 is about to the data upload file that this computing machine 4 ' wants to obtain and writes among this FAT 54 (step S62).Wherein this data upload file is encrypted with this dynamic password through this HID 5, and is present in already among this HID 5, but does not write in this FAT 54.So this computing machine 4 ' before this step S62, and can't be seen this data upload file from this storage device 5 ' content.And after step S62 finished, this computing machine 4 ' can be seen this data upload file in this storage device 5 ' content, and then is able to by this software 41, with this data upload file copy to this computing machine 4 '.
It is worth mentioning that when copying this data upload file, this HID 5 can cooperate this software 41 to start anti-copy mechanism, so as to the replication actions of judging this computing machine 4 ' whether correct (step S64).If judge that the replication actions of this computing machine 4 ' is correct, then this HID 5 allows this computing machine 4 ' to copy this data upload file (step S66) by this software 41.And in copy finish after, this data upload file is deleted (step S68) from this FAT 54.And if in this step S64, judge that the action copy is incorrect, or non-ly carry out through this software 41, then do not allow this data upload file to be replicated.Directly carry out this step S68, at once this data upload file of deletion in this FAT 54.At last, this HID 5 can use this to upload this dynamic password in the cryptogram, by this expression formula, deciphers this data upload file (step S70) and is applied.
Above-mentioned anti-copy mechanism namely as shown in Figure 7, is the anti-copy schematic diagram of mechanism for a preferred embodiment of the present invention.When this HID 5 writes this data upload file among this FAT 54, make this data upload file when this storage device 5 ' content shows, by this dynamic password and this expression formula, produce a plurality of substitute files with random number, and will these a plurality of substitute files and this data upload file all be revised as " AEJAE4GHA.dat " or the insignificant at random a plurality of filenames such as " 1R5JGH6FB.dat " that have as shown in Figure 7.And this computing machine 4 ' is after this storage device 5 ' content is seen those files, is can be by this identical dynamic password and this expression formula, why calculates the correct filename of this data upload file, and carried out correct replication actions.Therefore, when this substitute files of filename mistake was required to copy, this HID5 had namely regarded as the 3rd people attempting the crawl file, therefore immediately All Files is deleted from this FAT 54.Thus, can stop the 3rd people and steal data.Even and by chance why guessed right correct file by the 3rd people and successfully copied, but still need to be by the calculating of this dynamic password and this expression formula, just can be correctly this data upload file of the meaningless filename that disguises oneself as be decrypted action, therefore still has the anti-copy effect of height.
Certainly; the present invention also can have other various embodiments; in the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make according to the present invention various corresponding changes and distortion, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.
Claims (19)
1. data transmission and the anti-copy method realized with the mass storage grade of a human-computer interface device, that mass storage level protocol with universal serial bus is modeled as this human-computer interface device one USB storage device and carries out data transmission with an outer computer, it is characterized in that the method comprises:
A) this human-computer interface device receives a cryptogram and a request command that transmits;
B) why this human-computer interface device judges this request command;
C) carry out the transmission of a data file according to this request command;
D) behind the step c, decipher this data file with a dynamic password of putting down in writing in this cryptogram;
Wherein, this human-computer interface device does not write this cryptogram that receives in one file configuration table, can't learn the existence of this cryptogram so as to making this outer computer.
2. human-computer interface device according to claim 1 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes, and this request command is that the filename with this cryptogram presents.
3. human-computer interface device according to claim 2 is with data transmission and the anti-copy method of the realization of mass storage grade, it is characterized in that, if judge among this step b that this request command is to be a file download request, among this step c, be to receive the data download file by this dynamic password encryption that this outer computer transmits by this human-computer interface device then.
4. human-computer interface device according to claim 3 is with data transmission and the anti-copy method of the realization of mass storage grade, it is characterized in that, after this human-computer interface device receives this data download file, do not write in this document allocation list, can't learn the existence of this data download file so as to making this outer computer.
5. human-computer interface device according to claim 2 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes, if judge among this step b that this request command is to be a File Upload request, then this step c comprises:
C1) this human-computer interface device data upload file by this dynamic password encryption that it is inner stored writes in this document allocation list, learns the existence of this data upload file so as to making this outer computer;
C2) behind the step c1, when replication actions was correct, this human-computer interface device allowed this data upload file to be replicated;
C3) behind the step c2, this human-computer interface device is deleted this data upload file.
6. human-computer interface device according to claim 5 is with data transmission and the anti-copy method of the realization of mass storage grade, it is characterized in that, among this step c1, be after processing by anti-copy mechanism, again this data upload file is write in this document allocation list, comprising:
C11) according to this dynamic password of putting down in writing in this cryptogram, by an expression formula, produce the random file name of this data upload file;
C12) produce a plurality of substitute files, wherein these a plurality of substitute files have according to this dynamic password of putting down in writing in this cryptogram, by the random file name of this expression formula generation;
C13) this data upload file and these a plurality of substitute files are write in this document allocation list jointly.
7. human-computer interface device according to claim 6 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes, among this step c2, is that it is incorrect to be considered as replication actions when these a plurality of substitute files are required to copy.
8. human-computer interface device according to claim 7 is with data transmission and the anti-copy method of the realization of mass storage grade, it is characterized in that, among this step c3, after this data upload file is replicated once, or replication actions is deleted this data upload file when incorrect from this document allocation list.
9. human-computer interface device according to claim 6 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes this expression formula is a hash expression formula.
10. human-computer interface device according to claim 1 is with data transmission and the anti-copy method of the realization of mass storage grade, it is characterized in that, this is modeled as the human-computer interface device of USB storage device, it is the data transmission software that uses human-computer interface device manufacturer exploitation in this outer computer, when transmitting the relevant data file of a human-computer interface device, could be smoothly and this outer computer do data transmission.
11. data transmission and anti-copy method that human-computer interface device is realized with the mass storage grade, that mass storage level protocol with universal serial bus is modeled as this human-computer interface device one USB storage device and carries out data transmission with an outer computer, it is characterized in that the method comprises:
A) this human-computer interface device receives a cryptogram that transmits;
B) if this cryptogram is one to download cryptogram, then this human-computer interface device in confirm this download a dynamic password in cryptogram correct after, a password confirming file is write in the file configuration table;
C) behind the step b, this human-computer interface device receives a data download file by this dynamic password encryption that transmits;
D) if this cryptogram is to upload cryptogram, then this human-computer interface device in confirm this upload a dynamic password in the cryptogram correct after, the one data upload file of being encrypted by this dynamic password is write in this document allocation list, learn the existence of this data upload file so as to making this outer computer;
E) after the steps d, when replication actions was correct, this human-computer interface device allowed this data upload file to be replicated;
F) behind the step e, this human-computer interface device is deleted this data upload file;
Wherein, this human-computer interface device does not write this cryptogram and this data download file that receives in this document allocation list, can't learn the existence of this cryptogram and this data download file so as to making this outer computer.
12. human-computer interface device according to claim 11 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes, also comprises a step
G) behind step c or the step e, with this dynamic password of putting down in writing in this cryptogram, decipher this data download file or this data upload file.
13. data transmission and anti-copy method that human-computer interface device according to claim 11 is realized with the mass storage grade, it is characterized in that, among this step c, be this outer computer after this password confirming file appears at this document allocation list, this data download file is transferred to this human-computer interface device.
14. human-computer interface device according to claim 13 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes, also comprises a step
H) behind the step c, this human-computer interface device writes a data validation file in this document allocation list, has received the message of this data download file so as to replying this outer computer.
15. data transmission and anti-copy method that human-computer interface device according to claim 11 is realized with the mass storage grade, it is characterized in that, in this steps d, be after processing by anti-copy mechanism, again this data upload file is write in this document allocation list, comprising:
D1) according to this dynamic password of putting down in writing in this cryptogram, by an expression formula, produce the random file name of this data upload file;
D2) produce a plurality of substitute files, wherein these a plurality of substitute files have according to this dynamic password of putting down in writing in this cryptogram, by the random file name of this expression formula generation;
D3) this data upload file and these a plurality of substitute files are write in this document allocation list jointly.
16. human-computer interface device according to claim 15 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes, among this step e, is that it is incorrect to be considered as replication actions when these a plurality of substitute files are required to copy.
17. data transmission and anti-copy method that human-computer interface device according to claim 16 is realized with the mass storage grade, it is characterized in that, among this step f, after this data upload file is replicated once, or replication actions is deleted this data upload file when incorrect from this document allocation list.
18. human-computer interface device according to claim 15 is characterized in that with data transmission and anti-copy method that the mass storage grade realizes this expression formula is a hash expression formula.
19. data transmission and anti-copy method that human-computer interface device according to claim 11 is realized with the mass storage grade, it is characterized in that, this is modeled as the human-computer interface device of USB storage device, it is the data transmission software that uses human-computer interface device manufacturer exploitation in this outer computer, when transmitting the relevant data file of a human-computer interface device, could be smoothly and this outer computer do data transmission.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2009101715231A CN102004864B (en) | 2009-08-28 | 2009-08-28 | Data transmission and anti-copy method realized by man-machine interface device with mass storage level |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2009101715231A CN102004864B (en) | 2009-08-28 | 2009-08-28 | Data transmission and anti-copy method realized by man-machine interface device with mass storage level |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102004864A CN102004864A (en) | 2011-04-06 |
| CN102004864B true CN102004864B (en) | 2013-03-13 |
Family
ID=43812221
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2009101715231A Expired - Fee Related CN102004864B (en) | 2009-08-28 | 2009-08-28 | Data transmission and anti-copy method realized by man-machine interface device with mass storage level |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102004864B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR3041787A1 (en) * | 2015-09-28 | 2017-03-31 | Orange | METHOD FOR TRANSFERRING CONFIGURATION INFORMATION OF A CONNECTED OBJECT |
| CN110519278B (en) * | 2019-08-29 | 2021-07-20 | 重庆市筑智建信息技术有限公司 | A BIM-based data security authentication method and system |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1542633A (en) * | 2003-04-30 | 2004-11-03 | 庞志平 | Universal serial bus interface bridge of digital camera |
| CN1707455A (en) * | 2004-06-11 | 2005-12-14 | 纬创资通股份有限公司 | Method for exchanging information flow between two electronic devices under USB framework and system applying the method |
-
2009
- 2009-08-28 CN CN2009101715231A patent/CN102004864B/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1542633A (en) * | 2003-04-30 | 2004-11-03 | 庞志平 | Universal serial bus interface bridge of digital camera |
| CN1707455A (en) * | 2004-06-11 | 2005-12-14 | 纬创资通股份有限公司 | Method for exchanging information flow between two electronic devices under USB framework and system applying the method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102004864A (en) | 2011-04-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1260679C (en) | Memory device | |
| CN115484275B (en) | Dynamic group membership of devices | |
| CN102084373B (en) | Back up digital content stored in secure storage | |
| JP5552870B2 (en) | Memory device, host device, and memory system | |
| CN102622311A (en) | USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system | |
| JPWO2008129701A1 (en) | File management system and method, and portable terminal device | |
| US10146461B2 (en) | Automatic back-up system with verification key and method of operation thereof | |
| TW201009710A (en) | Methods for enabling software in storage-capable devices | |
| JP2019067264A (en) | Software management system, software update device, software update method, and software update program | |
| KR101152388B1 (en) | Apparatus and method for operating many applications between portable storage device and digital device | |
| CN115129332A (en) | Firmware burning method, computer equipment and readable storage medium | |
| CN102004864B (en) | Data transmission and anti-copy method realized by man-machine interface device with mass storage level | |
| TWI499931B (en) | File management system and method | |
| JP5272602B2 (en) | Authentication function linkage device, authentication function linkage system, and authentication function linkage program | |
| KR101137523B1 (en) | Media, terminal and server for authentication and method for authenticating using the sames | |
| CN112257074B (en) | USB interface chip circuit, docking station and firmware authentication method and device | |
| JPWO2006075355A1 (en) | Peripheral device of programmable logic controller | |
| JP5154646B2 (en) | System and method for unauthorized use prevention control | |
| RU2316121C2 (en) | Device and method for providing notification about operation status of digital rights management | |
| US8479300B2 (en) | Method for transmitting data and preventing unauthorized data duplication for human-machine interface device using mass storage class operating on universal serial bus | |
| JP6393171B2 (en) | Information processing terminal and control program for information processing terminal | |
| JP5257899B2 (en) | Data transmission and copy guard method realized by mass storage class standard by human-machine interface device | |
| JP2012058803A (en) | Thin client system and method for updating operating system | |
| KR101042218B1 (en) | Data Security Method of Computer Data Security System | |
| TWI400616B (en) | Method for data transmitting and pirate preventing of human-machine interface device by using the usb mass storage class |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130313 |