[go: up one dir, main page]

TW200828074A - Security method, security system and pairing/encryption system - Google Patents

Security method, security system and pairing/encryption system Download PDF

Info

Publication number
TW200828074A
TW200828074A TW95150017A TW95150017A TW200828074A TW 200828074 A TW200828074 A TW 200828074A TW 95150017 A TW95150017 A TW 95150017A TW 95150017 A TW95150017 A TW 95150017A TW 200828074 A TW200828074 A TW 200828074A
Authority
TW
Taiwan
Prior art keywords
data
security
host
storage
storage space
Prior art date
Application number
TW95150017A
Other languages
Chinese (zh)
Inventor
Stanley Tseng
Original Assignee
Universal Scient Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Universal Scient Ind Co Ltd filed Critical Universal Scient Ind Co Ltd
Priority to TW95150017A priority Critical patent/TW200828074A/en
Publication of TW200828074A publication Critical patent/TW200828074A/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A security method for access control between a host and a storage device is provided. The storage device includes a memory which memory stores a fist identity code and a file system therein. The file system is configured to store a secured data and a first storage space. The host is stored with a second identity code. The security method includes the following steps. First, the data stored in the first storage space is uploaded to the host, wherein the first storage space is generated by a pairing/encryption process. Following, the data stored in the first storage space is decrypted into a decrypted data. Afterward, the decrypted data is compared with the first identity code and the secured data for verifying the validity of the decrypted data. Last, according to the validity of the decrypted data, the right of the host for accessing the secured data is decided.

Description

200828074 九、發明說明: 【發明所屬之技術領域】 本發__-_全方法與純,尤指—種 ^方法與系統’及其相關之儲存裝置與主機之配對加密 【先前技術】 消費電子產品的功能曰趨多樣化,使旦吹 料的儲存需求也隨之增加。因此,、来 ^大谷里貝 卡(例如,包括Multimedla J過插接小型快閃記憶 格之記恃、+、笠锉六壯罢士心 Memory stick cards等規 4b被儲;^於儲广板擴充其記憶容量已為趨勢。這 二ί ί儲存1置的數位資料料有機密性質,或受到 隹呆瞍’則必^藉由保全程序限制末端使用者的存取 ^以避免數位資料被隨意複製散播。 在此’先大致說賴㈣料的保全方法 ^ ^知技術之儲錢心的讀㈣統t c忍圖。如弟一圖所示,—儲存裝置 ς 記憶體150係儲存有—保全資料。儲存裝置15 全資料的合法性,之後,主機10 用戶而存取/ 15〇的保全資料。一上士匕二始可存取與使用記憶: 下列兩大方向。、而5財子裳置Μ的保全方法包; 了先,係將被儲存的保全資料加师·ypti〇n),儲;200828074 IX. Description of the invention: [Technical field of invention] The method of __-_ full method and pure, especially the method and system 'and its associated storage device and host pair encryption [previous technology] consumer electronics The functions of the products are diversified, and the storage requirements for the blown materials are also increased. Therefore, come to Otani Ribeka (for example, including Multimedla J over plugged small flash memory memory, +, 笠锉 壮 壮 Memory Memory Memory stick cards, etc. 4b is stored; ^ in the storage board Expanding its memory capacity has become a trend. The storage of the digital data of the 1st 料 置 有机 有机 有机 有机 有机 有机 有机 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 保 保 保 保 保 保 保 保 保Copying and spreading. Here's a general description of the preservation method of Lai (four) materials ^ ^ Knowledge of the storage of the money of the heart of the reading (four) system tc endurance. As shown in the figure of a younger, - storage device 记忆 memory 150 is stored - security The storage device 15 legality of the full data, after that, the host 10 user access / 15 〇 security data. A sergeant can be accessed and used memory: the following two major directions. Set the preservation method package; first, the department will store the preservation information plus ypti〇n), storage;

= 與主機10具有個別的金餘(Key),透過儲存裝 ‘主機10,兩者對金餘進行交互驗證後,解出真正的I 谷i—tent key);其後,再以此内容金錄對加密I 200828074 資料騎解密(DeCryption);最後,再由主機1〇輸出 的保全貝料。其次’係驗證主機及儲存裝置15的識別 碼以確認主機1G對儲存裝£ 15的存取權限,通過驗證 之後,再由主機1〇存取與使用保全資料。 、上述驗證方式雖可對保全資料提供一定程度的保護, 然’鑑於轉流通㈣的制性*騎升,使得保全資料 遭到,,散播的風險隨之提高,從而危及保全資料提供業 者^榷ϋ °為了保護保全資料創作者的智慧財產, 全貧料的驗證卿係為必要。同時,若保全資料遭戶、 端不慎更動,或者遭形卜人纽,關及好 出本;Γ:有鑑於此,卿 本求之k出,更進一步強化儲存裝置的保全, 者與用戶端均提供更周全的保障。 貝针徒i、 【發明内容】 因此,本發明之-目的係在於提供—種保全= With the host 10 has a separate key (Key), through the storage device 'host 10, the two sides of the mutual verification of Jin Yu, solve the real I valley i-tent key); thereafter, then this content gold Record pair encryption I 200828074 data riding decryption (DeCryption); Finally, the host 1 〇 output of the preservation of the material. Next, the identification code of the host and the storage device 15 is verified to confirm the access authority of the host 1G to the storage device 15. After the verification, the host 1 accesses and uses the security data. Although the above-mentioned verification method can provide a certain degree of protection for the preservation data, the risk of dissemination is increased, which threatens the preservation of the data provider, in view of the fact that the system of circulation (4) is riding up and the security data is taken up. ϋ ° In order to protect the intellectual property of the creator of the preservation data, it is necessary to verify the entire poor. At the same time, if the information is protected, the households are inadvertently changed, or the people are shaped, and the customs are well-off; Γ: In view of this, Qing has sought out, and further strengthens the preservation of storage devices, users and users. More comprehensive protection is provided at the end. The present invention is directed to providing a kind of preservation.

統,其猎㈣勤保全錄、儲存裝置之第—識別碼= 二識別碼所加密演算之資料’以控制主機存 二弟 係可使保全資料被竄改或被不當使用時,枯+子衣置, 裝置進行絲。 #止主機對儲存 本發明之另一目的係在於提供一種 藉由對保全資料、儲存裝置之第—識別系統,其 行加密演算,以產生-域資料儲存於別石馬進 主機察覺保全資料被竄改或被不當使^罝,係可使 存裝置進行存取。 而示止主機對儲 7 200828074 本發明係揭示一種保全方法,其傜適用於控制_主機 對一儲存袭置進行存取。該儲存裝置係可插拔地連接於今 主機,該儲存裝置包括一記憶體,該記憶體係儲存有_°第 一識別碼以及一檔案系統。該檔案系統之結構係配合儲存 一保全資料以及一第一儲存空間。該主機係預先儲存有一 第二識別碼。該保全方法之步驟係首先,將該第一儲存命 間之資料上載至該主機,其中該第一儲存空間係預先 一配對加密程序所產生。其次,將該第—儲存空間之資= 解密,以產生一解密資料。隨後,判別該解密資料之1確 ,,,中該解密資料之正確性的判別包括驗證該解密資= 是否符合該第-識別碼以及該保全資料。最後H妒 密資料之正確性,控制該主機存取該保全資料。豕4 括下明之。具體實施例中’所述之配對加密程序包 加密裝置,其中該配對加密裝置具有 内ϊ次:該配對加密裝置擷取該保全資料, ;5=合° ^後’利用該特徵内容、該第一如踩 生以形成-加“ 加密資料下载至該第-館存空間,並將該 本發明更揭示一種 储存衣置包括—記憶體 及-主機。該 以及一槽案系統 安^己,肢係儲存有一第—識別碼 有弟財子空間,其中該第 ^^科,且具 仔工間所儲存之資料係. 8 200828074 預先經過—配對加純 裝置,且具有-記憶體,該記憶生料=機係'連接於該储存 該第-儲存空間之資料係被上存有―弟二識別碼。 一儲存空間之資料解密,生—,主機,該主機將該第 該解密資料是否符合該第—解密資料。該主機驗證 制對保全資料的存取。0馬以及該保全貧料,以控 本發明另揭示一種$ 括一儲存②、糸統,該配對加密系統包 ,兄憶體,該記憶體係儲存 =衣置 案系統,該檔# 4別碼w及—檔 記情雕… 儲存有一保全資料。該主機包括-System, its hunting (four) diligent security record, storage device - identification code = two identification code encrypted calculation data 'to control the host to save the second brother can make the preservation data was tampered or improperly used, dry + sub-clothing , the device carries the wire. Another object of the present invention is to provide a first-identification system for the preservation data and the storage device, and to perform the encryption calculation to generate the domain data stored in the other stone horse into the host to detect the security data. Tampering or being improperly enabled can be accessed by the storage device. The present invention discloses a security method, which is applicable to the control host to access a storage attack. The storage device is detachably coupled to the host computer. The storage device includes a memory, and the memory system stores a first identification code and a file system. The file system is structured to store a security data and a first storage space. The host system pre-stores a second identification code. The step of the security method is to first upload the data of the first storage location to the host, wherein the first storage space is generated by a pairing encryption program. Secondly, the first storage space is decrypted to generate a decrypted data. Then, judging whether the decrypted data is correct, the determination of the correctness of the decrypted data includes verifying whether the decrypted asset = conforms to the first identification code and the security information. Finally, the correctness of the H-density data controls the host to access the security data.豕 4 Included in the description. In the embodiment, the paired encryption package encryption device is described, wherein the paired encryption device has an internal order: the paired encryption device retrieves the security data, and 5= is followed by 'using the feature content, the first Just as stepping on the life to form - plus "encrypted data downloaded to the first - library space, and the invention further discloses a storage device including - memory and - host. The and a slot system system, limbs The system stores a first identification code with a diver's sub-space, wherein the first ^^ section has a data system stored in the laboratories. 8 200828074 Pre-passing-pairing plus pure device, and having -memory, the memory The material=device's data connected to the storage-storage space is stored with the “secondary identification code.” The data of a storage space is decrypted, and the host, the host, whether the first decrypted data meets the The first-decryption data. The host verification system accesses the security data. The horse and the security material are used to control the invention. The invention further discloses a storage system, a system, a pairing encryption system package, a brother memory system, Memory system storage = clothing system, the file # 4 别 code w and - file record love carving ... stored a security information. The host includes -

置;ΐ垃…己饭體係儲存有—第二識別碼。該配對加贫Fΐ ΐ ... 己 己 己 己 己 己 己 己 己 己 己 己The pairing plus poverty F

存裝置!及該主機。該配對加密裝置G 义可絲取该保全資料,產生一特f支内客,廿妥〆、 特徵内容、琴笛一域付欲内合,亚利用該 瞀,、°κ 為別碼以及該第二識別碼進行加密演 Γ执以產生—加密資料。該配對加密裝置並於該儲存梦晋 案系統產生-第-儲存空間,將該加密f料下= 乐—儲存空間。 5亥 、以上之概述與接下來的詳細說明及附圖,皆是為了能 ^步5兒明本發明為達成預定目的所採取之方式、手段及 力欢。而有關本發明的其他目的及優點,將在後續的說明 及圖式中加以闡述。 ϋ 【實施方式】 首先,請參閱第二圖,該圖係為本發明之配對加密系 、、先2之系統架構示意圖。如第二圖所示,配對加密系統2 包括一儲存裝置20、一主機22以及一配對加密裝置24。 200828074 儲存裝置20係儲存有一保全資料,且被設定為與主機^ 相互配對。此配對白勺用意係在於限制儲存裝置Μ之保全 料的使用權限’用戶端僅能以主機22存取儲存裝置2〇之 保全資料。此處之主機22係為一電子產品,例如,個人數 位助理、無線通訊裝置、數位相機、數位影音播放装置以 ^ GPS絲糸鱗。而儲存裝置2()係指—大 f包括各魏格之快閃記針。齡裝置㈣可插拔^ 連接於主機22,主機22孫左俶"杜m 拔也 之保全資料。 婦取亚使用儲存裝置20所儲存 如第二圖所示,儲存装置20包括— 體200係儲存有一第一n U肢200,,己诫 檔案系請具有:保===案系統· 存該伴令眘祖+ 、 工θ〗204,用以配合儲 儲存有—第包括—記憶體細,記憶體22〇係 装置加以及—主5==配^猶置24係連接於儲存 取該保全資料,以產生_‘二置24具有一權限,可擷 用該特徵内容、第—配對加密裝置24並利 加密演算,以產生-力以及第二識別碼功進行 裝置20之標案系_山產貝生一 f置24並於儲存 密資料下载至第1存空間^ 一儲存空間挪,將該加 所述之第一識別碼201 觀,將身分識別碼紀錄 ^二*成後,須配合規 於產品的管理。同、、」、閃卡的特定儲存區,以利 有的身份識別碼,二J,別碼221係為主機22所特 此乐-硪別碼221可為主機22的產品序 10 200828074 號。再者,檔案系統2〇2係可 / 或NTFS槽宰季·招〜$據勝12、FATi6、FAT32 間204“ = = ^=架構,而保全資料儲存空 ^ 一 存工間206係為檔案型離。 裝置St全接於配對加密 S接法㈣。配對加密裝置^2 空間206的^ %、始具有產生儲存加密資料之第一儲存 -解密金势^ ^自對^主機22的記憶體22G係儲存有Save the device! And the host. The pairing encryption device G can take the security data, and generate a special f-internal customer, which is suitable for the content, the content of the genre, and the genre of the genre. The second identification code is encrypted and executed to generate an encrypted data. The pairing encryption device generates a -first storage space in the storage dreaming system, and the encryption material is down = music storage space. 5 Hai, the above summary and the following detailed description and drawings are all intended to be able to explain the ways, means and strengths of the invention for achieving the intended purpose. Other objects and advantages of the present invention will be described in the following description and drawings. ϋ [Embodiment] First, please refer to the second figure, which is a schematic diagram of the system architecture of the paired encryption system of the present invention. As shown in the second figure, the pairing encryption system 2 includes a storage device 20, a host 22, and a pairing encryption device 24. 200828074 The storage device 20 stores a security data and is set to be paired with the host. The purpose of this pairing is to limit the usage rights of the storage device. The client can only access the storage device 2 by the host 22. The host 22 here is an electronic product, for example, a personal digital assistant, a wireless communication device, a digital camera, a digital audio and video playback device, and a GPS wire scale. The storage device 2 () means that the large f includes the flash marks of each Weige. The age device (4) can be plugged and unplugged ^ connected to the host 22, the host 22 Sun Zuoyu " Du m pull also the security information. The storage device 20 is stored as shown in the second figure. The storage device 20 includes a first n U limb 200 stored in the body 200, and the file system has a system of: === case system Accompanied by Shen Zu +, θ 〗 〖204, used to match the storage and storage - the first includes - the memory is fine, the memory 22 〇 system is added and the main 5 = = ^ 犹 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 The data is generated to generate a _'two-set 24 having a privilege, and the feature content, the first-pair cryptographic device 24, and the encryption calculus can be used to generate a force and a second identification code to perform the standard system of the device 20 Produce Besun and F to set 24 and download the confidential data to the first storage space ^ a storage space, add the first identification code 201, and record the identity identification code ^^* Regulated in the management of products. The specific storage area of the same, "," flash card, with the unique identification code, the second J, the code 221 is the host 22 special. The music-code 221 can be the product sequence of the host 22 10 200828074. In addition, the file system 2〇2 can be / or NTFS slot season · move ~ $ according to 12, FATi6, FAT32 between 204 " = = ^ = architecture, and the preservation of data storage space ^ a warehouse 206 as a file The device St is connected to the paired encryption S connection method (4). The pairing encryption device ^2 space 206 has the first storage-decryption gold potential for generating the encrypted data. 22G series has been stored

權限不同、\ ^ Μ金餘223的權限與電子金錄26的 隹限不冋,其功能將再作詳述。 J 及加密裝置24包括了一資料存取模組240以 口在凟异模組242。資料存取模电^ 2〇、主機”丨、;u7人 μ供、、丑係對储存裝置 係連接;^ # %讀26進行絲。加㈣算模組242 =於-貝料存取模組240,加密演算模組242係 利=取拉組240擷取該保全資料,以產生—特徵内容,】 利用§亥特徵内容、第一 iik n.r Zff 〇Γ. 並 行加密演算,以產生該二¥1/ ^第二識別碼221進 係為L ㈣之配對㈣裝置24 2 :式配合電腦硬體架構之機制,以實現前述配對力I 。此外,熟習本領域技術者當可知悉,儲存裝ί ς ^制Γ 22 #透過製程治具連接於配對加密裝置24,所述 ^程治具係依據實務需求設置,因此,在此便不再作^ 盘士接著’請參閱第三圖’該圖係為本發明之儲存裝置20 /、機22之配對加密方法之步驟流程圖。其中.相關之系統 200828074 架構請同時參照第二圖。如第彡圖所示’此配對加密方法 包括下列步驟: 首先,將儲存裝置20及主機22連接於配對加密裝置 24,其中配對加密裝置24異有/產生第一儲存空間206 之權限(步驟S300); 其次,配對加密裝置24擷取該保全資料,以產生一 特徵内容(步驟S302);The permissions are different, the permissions of \^ Μ金余223 and the e-gold record 26 are not limited, and their functions will be described in detail. The J and encryption device 24 includes a data access module 240 to interface with the module 242. Data access mode ^ 2 〇, host "丨,; u7 people μ supply, ugly system connection to the storage device; ^ # % read 26 for wire. Add (four) calculation module 242 = Yu-before access module Group 240, the encryption calculation module 242 is responsible for the collection group 240 to retrieve the security data to generate the feature content, using the §Hai feature content, the first iik nr Zff . parallel encryption calculus to generate the second ¥1/^ The second identification code 221 is paired with L (four) (4) device 24 2 : the mechanism of the computer hardware architecture is used to achieve the aforementioned pairing force I. In addition, those skilled in the art can know that the storage device is known. ί ς ^ Γ 22 # Connected to the pairing encryption device 24 through the process fixture, the control tool is set according to the actual needs, therefore, no longer do ^ ^ then "see the third picture" The figure is a flow chart of the steps of the pairing encryption method of the storage device 20 / and the machine 22 of the present invention. The related system 200828074 architecture should also refer to the second figure. As shown in the figure, the pairing encryption method includes the following steps. : First, connect the storage device 20 and the host 22 to the paired encryption device. 24, wherein the encryption device 24 paired with a heterologous / permission generating a first storage 206 (step S300); secondly, the encryption device 24 to retrieve the pairing preservation of data content to generate a feature (step S302);

隨後,配對加密裝置24利用特徵内容、第一識別碼 2〇1以及第二識別碼221進行加密演算,以形成一如密資 料(步驟S304),以及 最後,配對加密裝置24於儲存裝置20之檔案系统2〇2 中產生第一儲存空間206,炎將該加密資料下载至該第— 儲存空間206 (步驟S306)。 於步驟S300中,更包括了將電子金鑰26連接於配對 加密裝置24,以使配對加密裝置24具有該產生第〜、 空間206之權限的步驟。 $存 於步驟S 3 02中,配對加密裝置2 4之加密 :對該保全資-行祕(抛 按,步驟S3〇4令所述利用特 以及第二識別碼功進行加輯曾 :、別碼201 演算方法係為f知,謂依據實;來=加;資料的 再作贅述。 為而求;叹什,在此便不 係為本發明之保全系統3 3係用以控制保全資料的 /接著,請參閱第四圖,該圖 之系統架構示意圖。此保全系统 12 200828074 存取。儲存裝置2〇 對加密程序,於♦汉 ‘ 22經過配對加密系統2的配 於主機22。如P際使用中’儲存裝置20係可插拔地連接 以及主機22。=圖壯戶Γ,保全系統3包括了儲存裝置2〇 係儲存有第彳衣20包括一記憶體2〇〇 ’記憶體200 包括一保全資檔案系統繼。檔案系統撤 保全資料儲存工曰’ 204以及-第-儲存空間206。 空間寫戶斤^存之^系儲存有該保全資料,而第一儲存 生。主機22係輯過^對加密程序所產 記憶體220係、儲在p 置2Q’且具有—記憶體220, 之資料解密,以產生mf22將第―儲存空間挪 是否符合該第—識別:2〇;貝料。主機22驗證該 全資料的存取。 "乂及该保全育料,以控制對保 =圖中’儲存裝置2〇之檔 更 —储存空間208,此筮-找十a 又巴栝一乐 二識別碼221。弟一储存工間观係用以配合儲存第 解密金鑰223為主機22使用保全資料的 又,主機22更具有一解密/驗 '钭解狯。 /么心 姨組226,解密/驗嘮捃知 226係利用解密金餘223蔣笛妙— σ松 '、且 料解密為解密資料:並 別碼以及魏全資料。;料是否符合該第—識 合主機22之處理二226係為應用程式配 證功能。 寻硬㈣構之機制,以實現其解密與驗 13 200828074 料配對加密方法可知,第—儲存空間206的資 料、第一識別碼201以及第二識別碼221經 5笫二:二所產生。因此,保全系統3係利用解密金鑰223 次料1子空間206所儲存之資料解密,並逐-比對保全 別碼加以及第二識別竭221,以確認保全 貝’、、…白、合錄’亚且,確認保全資料是否被更動。 卩]之糸、、先木構%同時來昭第一 此保全方法包括下列步驟:—㈣®如仏®所7^ 中第第一儲存空間206之資料上載至主機22,其 驟S5〇〇:);子工間2〇6係預先經過配對加密程序所產生(步 ,、_人,主機22將第—儲存空間206之資料解穷,以產 生—解密資料(步驟S5G2); (貝精在以產 資料判別該解密㈣之正確性,其中該解密 識別碼20 括驗證該解密資料是否符合該第一 4別碼201以及該保全資料(步驟S504);以及 全資之正確㈣ 法之ϋυ參閱第六圖,該圖係為本發明之保全方 實:二驟如_所示,此具體 裝置^步’射主機22係駐料於错存 ”人將第-儲存空間2〇&之資料上載至主機叫步 14 200828074 驟 S610); 接著,_驗證模組226利用解密錢 存空間m之資料解密,以產生—解密資料, 貢料包括-裝置碼、-主機碼以及—資料碼(步驟襲山; 隨後,解密/驗證模組220利肖I# , 空間寫之資料是否與利用配對二二 :二)藉以判別第-儲存空間2G6之資料是否^加動^ S680); 對保全貢料的存取(步驟 若步驟S630的判斷為第一 次、 密資料相同,則將第二儲存办門f S ―之貝料與加 22,解密/驗證模組226並|= 〇δ之賁料上载至主機 資料是否符合第 烟弟二儲存空間208所儲存的 付口弟一哉別碼221 (步驟S64〇); 若步驟S640的判斷幺榮-丄 料不符合第二識別碼221,則—」堵存空間208所儲存的資 是否儲存有資料(步驟S64f;—步判別第二儲存空間2〇8 若步驟S642的剌齡去μ 一 料,則代表儲存裝置空間208係儲存有資 非法使用,之後,即&二主枝22不匹配,此資料存取為 S680); 、機22對保全資料的存取(步驟 若步驟S642的判斷兔_ 料,則代表儲存裝置2η「、,—諸存空間尚未儲存資 機22便將第二識別糸:大連接於主機22,之後,主 下载至弟二儲存空間208(步驟 15 :f斷為解密資料之裝置碼符合第-識 二匈,解密資料之資料碼是否符合保全 貝料是否被更動(步驟S660),· ㈣_解密㈣之資料碼不符合保全 資料被更動過,之後,即終止主機22 (步驟 S680);Then, the pairing encryption device 24 performs the encryption calculation using the feature content, the first identification code 2〇1 and the second identification code 221 to form a confidential data (step S304), and finally, the pairing encryption device 24 is in the storage device 20. A first storage space 206 is generated in the file system 2〇2, and the encrypted data is downloaded to the first storage space 206 (step S306). In step S300, the electronic key 26 is further connected to the pairing encryption device 24, so that the pairing encryption device 24 has the step of generating the rights of the first and the space 206. In the step S 3 02, the encryption of the pairing encryption device 24: the security-dealing (the pressing, the step S3〇4 orders the use of the special and the second identification code work to add: The code 201 calculation method is f, which is based on the actual; to = plus; the data is re-stated. For the sake of; sigh, here is not the security system of the invention 3 3 is used to control the preservation of data / Next, please refer to the fourth figure, the system architecture diagram of the figure. This security system 12 200828074 access. The storage device 2 〇 encryption program, in the ' ' '22 through the paired encryption system 2 is assigned to the host 22. For example, P In the middle of use, the storage device 20 is pluggably connected and the host 22. = Figure 壮 Γ, the security system 3 includes the storage device 2, the 彳 clothing 20 includes a memory 2 〇〇 'memory 200 Including a full-service file system. The file system is withdrawn from the full data storage process '204 and - the first - storage space 206. The space writers save the security data, and the first storage students. Edited the memory 220 produced by the encryption program, stored in p 2Q And having - memory 220, the data is decrypted to generate mf22 to move the first storage space to meet the first - identification: 2 〇; shell material. The host 22 verifies the access to the full data. "乂 and the preservation In order to control the protection = the storage device 2 〇 更 — 储存 储存 储存 储存 储存 储存 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找The decryption key 223 is used for the host 22 to use the security data, and the host 22 has a decryption/testing solution. / 姨心姨 group 226, decryption/inspection 226 system uses the decryption Jin Yu 223 Jiang Di Miao - σ松', and the material is decrypted as decrypted data: and the code and Wei Quan data. Whether the material meets the requirements of the first-identification host 22 processing 226 system is the application matching function. Seeking the hard (four) structure mechanism, Achieving its decryption and verification 13 200828074 The material pairing encryption method shows that the data of the first storage space 206, the first identification code 201 and the second identification code 221 are generated by 5:2: 2. Therefore, the security system 3 uses the decryption gold. The data stored in the sub-space 206 of the key 223 is decrypted, and - The comparison of the security code plus the second recognition 221, to confirm the preservation of the ',, ... white, the combined record 'Asia, and confirm whether the preservation information has been changed. 卩] 糸,, first wood structure% at the same time The first method of preservation includes the following steps: - (4) The data of the first storage space 206 in the 7®® 7^ is uploaded to the host 22, and the step S5 〇〇:); The encryption program generates (step, _ person, the host 22 de-provisions the data of the first storage space 206 to generate - decrypt the data (step S5G2); (Bei Jing determines the correctness of the decryption (4) by the production data, wherein The decryption identification code 20 includes verifying whether the decrypted data conforms to the first 4th code 201 and the preservation data (step S504); and the wholly-owned correct (four) method, refer to the sixth figure, which is a preservation of the present invention. Fang Shi: The second step is as shown in _, this specific device ^ step 'shooting host 22 is stationed in the wrong memory" person uploads the first storage space 2〇 & the data to the host called step 14 200828074 step S610); , the verification module 226 decrypts the data of the decrypted money storage space m to generate a solution Confidential information, tribute includes - device code, - host code and - data code (steps to attack the mountain; then, decryption / verification module 220 Li Xiao I #, space write data and use pairing 22: 2) to distinguish Whether the data of the first storage space 2G6 is ^^ 680); access to the security tribute (if the judgment of step S630 is the first time, the secret information is the same, then the second storage door f S - the shell And the data of the encryption/verification module 226 and the 〇δ are uploaded to the host data to meet the payment code 221 stored in the second storage space 208 (step S64〇); If the judgment of S640 is not in accordance with the second identification code 221, then the data stored in the storage space 208 is stored with data (step S64f; step-by-step determination of the second storage space 2〇8) If the age is gone, it means that the storage device space 208 is stored illegally, and then, the & main branch 22 does not match, the data access is S680); and the machine 22 accesses the security data (step If the rabbit is judged in step S642, it represents the storage device 2n ",, - The storage space has not yet stored the asset machine 22, and the second identification port is connected to the host 22, and then the main download is downloaded to the second storage space 208 (step 15: f is broken to decrypt the data device code conforms to the first-identification two Hungary, decryption Whether the data code of the data conforms to whether the security material is changed (step S660), (4) the data code of the decryption (4) is not conformed to the security data, and then the host 22 is terminated (step S680);

200828074 S644); 解密資料之裝置碼是否符合第-識別碼 .識別碼2〇Γ,為解密資料之裝置瑪不符合第一 :料存取為非法二=置20與主機22不匹配,此資 取(步驟S680);八即終止主機22對保全資料的存 若步驟S650 別碼201,則進一 資料,以確認保全 若步驟S660 資料,則代表保全 對保全資料的存取 料,:⑽的判斷為料之資料碼符合保全1 更動過,之後,即結束此保全; 驟S670)。 、22亚取得存取與使用保全資料的權限(^ 、猎由上述實例詳述可知,本發明之保全方法與系統係 =過主,14儲存裝置的配對加密程序,將保全資料、儲存 袋置之第一識別碼及第二識別碼加密演#,以i生加密資 料。其後,保全方法與系統再藉由將第一儲存空間之資料 解密,驗證儲存裝置是否與主機B,並X,確認加密資 料以及保全㈣是否被更動,從而強化保全資料使用的合 法性與正轉性。 16 200828074 惟,以上所述,僅為本發明的具體實施例之詳細說明 及圖式而已,並非用以限制本發明,本發明之所有範圍應 以下述之申請專利範圍為準,任何熟悉該項技藝者在本發 明之領域内,可輕易思及之變化或修飾皆可涵蓋在以下本 案所界定之專利範圍。 ; 【圖式簡單說明】 第一圖係為習'知技術之儲存裝置讀取系統之系統架構示 • 意圖; 第二圖係為本發明之配對加密系統之系統架構示意圖; 第三圖係為本發明之配對加密程序之步驟流程圖; 第四圖係為本發明之保全系統之系統架構示意圖; 第五圖係為本發明之保全方法之步驟流程圖;以及 第六圖係為本發明之保全方法之一具體實施例之步驟流 程圖。 Φ 【主要元件符號說明】 1 :儲存裝置之讀取系統 2 :配對加密系統 3:保全系統 • 10、22 :主機 : 15、20:儲存裝置 150、200、220 :記憶體 201 :第一識別碼 202 :檔案系統 17 200828074 204 :保全資料儲存空間 206 :第一儲存空間 208 :第二儲存空間 221 :第二識別碼 223 :解密金鑰 226 :解密/驗證模組 24 :配對加密裝置 240 :資料存取模組 242 :加密演算模組 26 :電子金鑰 18200828074 S644); Whether the device code of the decrypted data conforms to the first-identification code. The identification code is 2〇Γ, and the device for decrypting the data does not conform to the first: the material access is illegal, and the device 20 does not match the host 22. (Step S680); 8 is to terminate the host 22 to save the data if the step S650 code 201, then enter a data to confirm the preservation if the step S660 data, on behalf of the preservation of the access to the preservation data,: (10) judgment If the information code of the material meets the security 1 change, then the maintenance is completed; step S670). 22, access to access and use of security information (^, hunting as detailed in the above examples, the preservation method and system of the present invention = over the main, 14 storage device pairing encryption program, the preservation data, storage bag The first identification code and the second identification code are encrypted to generate the data, and then the security method and the system decrypt the data of the first storage space to verify whether the storage device is connected to the host B, and X, Confirming whether the encrypted data and the security (4) are changed, thereby enhancing the legality and forwardness of the use of the security data. 16 200828074 However, the above description is only for the detailed description and drawings of the specific embodiments of the present invention, and is not intended to be used. The invention is to be construed as being limited by the scope of the following claims, and any one skilled in the art in the field of the invention can be easily changed or modified to cover the patents defined in the following. Scope. [Simplified description of the diagram] The first diagram is the system architecture of the storage device reading system of the known technology. The second diagram is the distribution of the invention. Schematic diagram of the system architecture of the encryption system; the third diagram is a flow chart of the steps of the paired encryption procedure of the present invention; the fourth diagram is a schematic diagram of the system architecture of the security system of the present invention; Step flow chart; and the sixth figure is a flow chart of steps of a specific embodiment of the preservation method of the present invention. Φ [Main component symbol description] 1: Storage device reading system 2: Paired encryption system 3: Security system • 10, 22: host: 15, 20: storage device 150, 200, 220: memory 201: first identification code 202: file system 17 200828074 204: security data storage space 206: first storage space 208: second storage space 221: second identification code 223: decryption key 226: decryption/verification module 24: pairing encryption device 240: data access module 242: encryption calculation module 26: electronic key 18

Claims (1)

200828074 十、申凊專利範圍: 種保王U ’係適用於控制—主機對—壯罢 存取,該儲存裝置係可插拔地連接於該存衣置進行 置包括-記憶體,該記憶體係儲存二、’_存裝 一播案系统,該檔案系統之結構係配::識別碼以及 碼,該保全方法包括下列步驟:健存有—弟二識別 ⑻將該第—儲存空間之資料上裁 儲存空間係預先經過-配對加密程=,其中該第一 齡亥第-儲存空間之資料解密,以產生^生, _別該解密資料之正雜 ^生:解密資料; 的判別包括驗證該解密資料是;^^之^確性 以及該保全資料;以及 付口忒弗一硪別碼 ⑷=該解密資料之正確性,控制該主機存取該保全資 權限; 產生该弟一储存空間之 (-)該容配對加密裝置操取該保全資料,以產生—特徵内 (a-3)利用該特徵内容、該 進行加密演算m “第二識別碼 ㈣)於該儲存f置 ^—加密資料;以及 件衣置之私案糸統中產生該第一儲存空間, 19 200828074 並將該加密資料下載至該第一儲存空間。 3、 如申請專利範圍第2項所述之保全方法,其中於步驟(a-1) 中,更包括將一電子金鑰連接於該配對加密裝置,以使 該配對加密裝置具有該產生該第一儲存空間之權限的 步驟。 4、 如申請專利範圍第2項所述之保全方法,其中該配對加 密裝置係對該保全資料進行雜湊(Hash)演算,以產生 該特徵内容。 5、 如申請專利範圍第1項所述之保全方法,其中該主機係 儲存有一解密金鑰5該主機係利用該解密金鑰將該第一 儲存空間之資料解密,以產生該解密資料。 6、 如申請專利範圍第1項所述之保全方法,其中該解密資 料包括一裝置碼、一主機碼以及一資料碼。 7、 如申請專利範圍第6項所述之保全方法,其中於步驟(c) 係分別驗證該裝置碼以及該資料碼是否符合該第一識 別碼以及該保全貢料,以判別该解德、貢料的正確性。 8、 如申請專利範圍第7項所述之保全方法,其中該儲存裝 置之檔案系統更包括一第二儲存空間,該第二儲存空間 係配合儲存該第二識別碼。 9、 如申請專利範圍第8項所述之保全方法,其中於步驟(c) 中更包括下列步驟: (c-Ι)上載該第二儲存空間之資料至該主機; (c-2)判別該第二儲存空間之資料是否符合該第二識別 碼;以及 (〇3)依據該第二儲存空間之資料是否符合該第二識別 20 200828074 碼,控制該主機存取該保全 1〇、^1專魏圍第9項所述之保全方法,㈠ 中,右該乐—儲存空間之資料不符合該中於步驟(c-3) 終止該主機對該保全資料的存取口 V罘二識別碼,則 1卜=申請專·S$ 9項所述之保全方法 中,若該第二儲存空間之資料不符:中於步驟(c-2) 包括下列步驟: "^乐二識別碼,更 _)判斷該第二儲存空間是否儲存有 (c-22)若該第二儲存空間未儲存資料有將'=,以及 12 下載至該第二儲存空間。、f遠第二識別碼 如申請專利範圍第2項所:二呆 , 中,更包括下列步驟: 〜,其中於步驟(b) ㈣·該解密資料,判別該第—儲 與該加密資料相同;以及 二間之資料是否 (b-2)若㈣—儲存空間之㈣與該加密 亥主機對該保全資料的存取。、问, 13、 如申請專利範_〗項所述μ 中二若該解密資料不正確,則終止該主機,中於步驟(d 的存取。 钱对該係全資申 14、 -種保全系統’係翻於控制—保全 全系統包括: 、’斗之存取’該保 一儲存裝置,包括一却愔挪 識別碼以及—檔案系::體憶體係儲存有-第一 資料,且具有一第一儲^=案糸統係儲存有該保全 储存工間,直中該第—. 所儲存之資料係預先經過_配對加密程序所產 200828074 及 -主機’係連接於該 該記憶體係儲存 亥域具有^己憶體, 其中該第-儲存二識別碼; 將該第-儲存空;:=!被上載至該主機,該主機 主機驗證該解產卜㈣資料,該 15 全貝枓’从控制對保全資料的存取。 及遠保 如申請專利範圍第14 之記憶體係儲存有—解=之保全系統,其中該主機 16 鑛該第-儲存;主機係利用該解密金 w太車,, 間所儲存之資料解密為該解密警杜 =專_第15項所述之保全系統,以機 解嶋模組,該解密 用 :『:第—儲存空間所儲存之資料解密= ^資^密資料是料合該第—識別碼以⑽ 17 圍第14項所述之保全系統,其中該解密 Β" ^=置碼以及一資料碼,該主機對該解密資料 疋否符口 4第-識別碼以及該保全資料的驗證,係判別 該裝置碼是否符合該第—識別碼,以及判別該資料碼是 否符合該保全資料。 18 ^申明專利關第14項所述之保全系統,其中該儲存 I置之檔案系統更包括一第二儲存空間。 19、如中請專利範圍第18項所述之保全系統,其中該第二 儲存空間之資料更被上載至該主機,該主機並驗證該第 二儲存空間之資料是否符合該第二識別砥,以控制對保 22 200828074 全資料的存取。 20 21 22 ::==_第14項所述之保全系統,其中該配對 擷取配= 加密演管為"以弟心別碼以及該第二識別碼進行 該加密;2密資料’以產生該第-錯存空間,並將 …貝枓儲存於該第一儲存空間。 -種配對加密系統,包括: 一儲存裂置’包括一記憶體 識別碼以及—於安多从‘u版係储存有一第一 資料;田木糸、、先,该檔案系統係儲存有一保全 一:機以Γ—記憶體,該記憶體係儲存有-第二識別 配衣置’係連接於該儲存裝置以及該主機,該 配對加密奘罟目士 p ^ 口发 -特,可擷取魏全資料,產生 兮第^二’亚利用該特徵内容、該第—識別碼以及 "昂一㈣碼進行加密演算, 於該儲存裳置之檔案系統產生一第一儲存二貝科二 加密資料下載至該第一儲存^間“存工間, 利範圍第21項所述之配對加密系統,更包括 杜二錢’⑧電子金鑰係被連接於該配對加密裝置, 使该配對加密裝置具有該權限。 '置 il+ri利耗㈣21項所述之配對加密系統,其中該 配對加密裝置包括: 資料存取模組,係對該儲存裝置、該主機以及該電子 金鑰進行存取;以及 23 23 200828074 一加密演算模組,係連接於該資料存取模組,該加密演 算模組係透過該資料存取模組擷取該保全資料,以產 生該特徵内容,並利用該特徵内容、該第一識別碼以 及該第二識別碼進行加密演算,以產生該加密資料。 24、如申請專利範圍第23項所述之配對加密系統,其中該 ^ 加密演算模組係對該保全資料進行雜湊演算,以產生該 " 特徵内容。 24200828074 X. The scope of the patent application: The seed protection king U ' is suitable for the control-host pair--strong access, the storage device is pluggably connected to the storage device to carry out the inclusion-memory, the memory system Storage 2, '_Storage and Broadcasting System>, the structure of the file system is equipped with: identification code and code, the security method includes the following steps: health storage - brother two identification (8) the first storage space information The storage space is pre-passed and paired with encryption=, wherein the data of the first-aged-storage space is decrypted to generate a positive data, and the decryption data is decrypted; The decrypted data is; ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -) the pairing encryption device operates the security data to generate - in the feature (a-3) using the feature content, the encryption algorithm m "second identification code (4)) is stored in the storage device. And clothing The first storage space is generated in the private case system, 19 200828074, and the encrypted data is downloaded to the first storage space. 3. The preservation method described in claim 2, wherein in step (a-1) The method further includes the step of connecting an electronic key to the pairing encryption device, so that the paired encryption device has the right to generate the first storage space. 4. The security method according to claim 2, wherein The pairing encryption device performs a hashing operation on the security data to generate the feature content. 5. The security method according to claim 1, wherein the host system stores a decryption key 5 Decrypting the data of the first storage space by using the decryption key to generate the decrypted data. 6. The security method of claim 1, wherein the decrypted data comprises a device code, a host code, and a The data code is as follows: 7. The method for preservation according to item 6 of the patent application, wherein in step (c), the device code is verified and the data code meets the first The identification code and the security tribute are used to determine the correctness of the solution and the tribute. 8. The preservation method according to claim 7, wherein the file system of the storage device further comprises a second storage space. The second storage space cooperates with storing the second identification code. 9. The security method of claim 8, wherein the step (c) further comprises the following steps: (c-Ι) uploading the second Storing the data of the space to the host; (c-2) determining whether the data of the second storage space conforms to the second identification code; and (〇3) whether the data according to the second storage space conforms to the second identification 20 200828074 a code for controlling the host to access the security method described in item 9 of the security, and (1), the data of the right music storage space does not comply with the termination in the step (c-3) If the host accesses the security data, the identification code is the second identification code, and if the information of the second storage space does not match: in step (c-2) ) includes the following steps: "^乐二标识码,更_) Whether the second storage space is stored or not is stored (c-22). If the second storage space has not stored data, '=, and 12 are downloaded to the second storage space. The second identification code of f far away is as in the second item of the patent application scope: second, middle, and further includes the following steps: ~, wherein in step (b) (four) · the decrypted data, the first storage is the same as the encrypted data And whether the data of the two rooms (b-2) if (4) - the storage space (4) and the encryption host access the security data. , ask, 13, if the application of the patent _ _ item, the second, if the decrypted data is incorrect, then terminate the host, in the step (d access. Money is fully funded for the system 14, - kind of security The system is turned over to control - the whole system includes: , 'Dou access', the storage device, including one but the identification code and the file system: the memory system stores the first data, and has The first storage system stores the security storage room, and the first stored data is stored in the memory system by the 200828074 and the host computer. The domain has a memory, wherein the first-storage identification code; the first-storage space;:=! is uploaded to the host, the host host verifies the solution (four) data, the 15 full-beauty From the control of the access to the security data. And the security system, such as the patent system of the 14th patent system, has a security system, where the host 16 mines the first storage; the host system uses the decryption gold w car, , the data stored between them is decrypted for the decryption Du=Special_The security system described in Item 15 is used to solve the module. The decryption uses: “: The data stored in the storage space is decrypted = ^ The information is the same as the first identification code to (10) 17 The security system according to Item 14, wherein the decryption file " ^=code and a data code, the host determines whether the decrypted data is not the 4th identification code and the verification of the security data. Whether the code meets the first-identification code, and whether the data code meets the security information. 18 ^ The security system of claim 14, wherein the storage file system further comprises a second storage space. 19. The security system of claim 18, wherein the data of the second storage space is further uploaded to the host, and the host verifies whether the data of the second storage space conforms to the second identification file. In order to control access to the full data of Bao 22 200828074. 20 21 22 ::==_ The security system described in Item 14, where the pairing match = the encryption exercise is " Two identification codes The encryption; 2 secret data 'to generate the first-to-fault space, and store the shellfish in the first storage space. - A paired encryption system, comprising: a storage splitting 'including a memory identifier and - Yu'an has stored a first data from the 'u version; Tian Muyu, first, the file system is stored with a security one: the machine is Γ-memory, the memory system stores - the second identification dressing set ' Connected to the storage device and the host, the pairing encryption 奘罟 p ^ ^ ^ 特 特 特 特 特 特 特 特 特 特 特 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏The Angyi (4) code is used for the encryption calculation, and the file system of the storage shelf is generated to generate a first storage of the second Becco 2 encrypted data to be downloaded to the first storage room, and the pairing mentioned in item 21 of the profit range The encryption system, further including the Du Er Qian '8 electronic key system, is connected to the pairing encryption device, so that the paired encryption device has the authority. a paired encryption system as described in item 21, wherein the paired encryption device comprises: a data access module that accesses the storage device, the host, and the electronic key; and 23 23 200828074 An encryption calculation module is connected to the data access module, and the encryption calculation module retrieves the security data through the data access module to generate the feature content, and utilizes the feature content, the first The identification code and the second identification code perform an encryption calculation to generate the encrypted data. 24. The paired encryption system of claim 23, wherein the ^cryption algorithm module performs a hash calculation on the security data to generate the " feature content. twenty four
TW95150017A 2006-12-29 2006-12-29 Security method, security system and pairing/encryption system TW200828074A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95150017A TW200828074A (en) 2006-12-29 2006-12-29 Security method, security system and pairing/encryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95150017A TW200828074A (en) 2006-12-29 2006-12-29 Security method, security system and pairing/encryption system

Publications (1)

Publication Number Publication Date
TW200828074A true TW200828074A (en) 2008-07-01

Family

ID=44817539

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95150017A TW200828074A (en) 2006-12-29 2006-12-29 Security method, security system and pairing/encryption system

Country Status (1)

Country Link
TW (1) TW200828074A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI570324B (en) * 2012-03-20 2017-02-11 渥班資產公司 Method for configuring a wind power generation facility and wind power generation facility
WO2021087710A1 (en) * 2019-11-05 2021-05-14 林晖 Structure and method for digital data memory card encryption

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI570324B (en) * 2012-03-20 2017-02-11 渥班資產公司 Method for configuring a wind power generation facility and wind power generation facility
WO2021087710A1 (en) * 2019-11-05 2021-05-14 林晖 Structure and method for digital data memory card encryption
CN114556308A (en) * 2019-11-05 2022-05-27 林晖 Structure and method for encrypting digital data memory card

Similar Documents

Publication Publication Date Title
US7124443B2 (en) Information transaction system
US7191238B2 (en) Method and system for authenticating content distribution and content reproduction requests based on biometric features
KR101689351B1 (en) Device and method for digital right management
US20090268906A1 (en) Method and System for Authorized Decryption of Encrypted Data
US10616215B1 (en) Virtual smart card to perform security-critical operations
US20100310076A1 (en) Method for Performing Double Domain Encryption in a Memory Device
CN101595488A (en) Method and apparatus for binding content to separate storage devices
KR101702748B1 (en) Method, system and recording medium for user authentication using double encryption
TW200840306A (en) Methods and apparatuses for binding content to a separate memory device
CN101578608B (en) Method and apparatus for accessing content based on session tickets
JP2020052990A (en) Ownership management method of virtual object and related interactive platform
CN111147248A (en) Encrypted transmission method, device and system of face feature library and storage medium
US8763110B2 (en) Apparatuses for binding content to a separate memory device
TW200828074A (en) Security method, security system and pairing/encryption system
Uludag et al. Multimedia content protection via biometrics-based encryption
US20080112566A1 (en) Apparatuses for accessing content based on a session ticket
TWI473488B (en) Method and storage device for protecting digital content
TW200807437A (en) Access control for secure protable storage device
CN101617318A (en) Be used for method and apparatus that content and licence are linked
JP2004318902A (en) Content delivery method and content delivery system
US20230410073A1 (en) Methods, systems, apparatuses, and devices for facilitating managing collectibles for owners of the collectibles
JP2021177581A (en) Apparatus for managing secret information, method and program therefor
TWI461949B (en) A method for generating a parameter configured for use in decrypting content, a method for generating a reference to a cryptographic key, and a host computing device
KR20100067997A (en) Apparatus for reading and writing smartcard, and data security method thereby
JP2010086309A (en) Portable content management device