TW200828074A - Security method, security system and pairing/encryption system - Google Patents
Security method, security system and pairing/encryption system Download PDFInfo
- Publication number
- TW200828074A TW200828074A TW95150017A TW95150017A TW200828074A TW 200828074 A TW200828074 A TW 200828074A TW 95150017 A TW95150017 A TW 95150017A TW 95150017 A TW95150017 A TW 95150017A TW 200828074 A TW200828074 A TW 200828074A
- Authority
- TW
- Taiwan
- Prior art keywords
- data
- security
- host
- storage
- storage space
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000003860 storage Methods 0.000 claims abstract description 129
- 238000004321 preservation Methods 0.000 claims description 29
- 238000004364 calculation method Methods 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 10
- 239000010931 gold Substances 0.000 claims description 5
- 229910052737 gold Inorganic materials 0.000 claims description 5
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 claims description 4
- 235000015170 shellfish Nutrition 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 3
- 239000000463 material Substances 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 238000013500 data storage Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 239000011257 shell material Substances 0.000 description 2
- 241000283973 Oryctolagus cuniculus Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 239000004575 stone Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 239000002023 wood Substances 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
Description
200828074 九、發明說明: 【發明所屬之技術領域】 本發__-_全方法與純,尤指—種 ^方法與系統’及其相關之儲存裝置與主機之配對加密 【先前技術】 消費電子產品的功能曰趨多樣化,使旦吹 料的儲存需求也隨之增加。因此,、来 ^大谷里貝 卡(例如,包括Multimedla J過插接小型快閃記憶 格之記恃、+、笠锉六壯罢士心 Memory stick cards等規 4b被儲;^於儲广板擴充其記憶容量已為趨勢。這 二ί ί儲存1置的數位資料料有機密性質,或受到 隹呆瞍’則必^藉由保全程序限制末端使用者的存取 ^以避免數位資料被隨意複製散播。 在此’先大致說賴㈣料的保全方法 ^ ^知技術之儲錢心的讀㈣統t c忍圖。如弟一圖所示,—儲存裝置 ς 記憶體150係儲存有—保全資料。儲存裝置15 全資料的合法性,之後,主機10 用戶而存取/ 15〇的保全資料。一上士匕二始可存取與使用記憶: 下列兩大方向。、而5財子裳置Μ的保全方法包; 了先,係將被儲存的保全資料加师·ypti〇n),儲;200828074 IX. Description of the invention: [Technical field of invention] The method of __-_ full method and pure, especially the method and system 'and its associated storage device and host pair encryption [previous technology] consumer electronics The functions of the products are diversified, and the storage requirements for the blown materials are also increased. Therefore, come to Otani Ribeka (for example, including Multimedla J over plugged small flash memory memory, +, 笠锉 壮 壮 Memory Memory Memory stick cards, etc. 4b is stored; ^ in the storage board Expanding its memory capacity has become a trend. The storage of the digital data of the 1st 料 置 有机 有机 有机 有机 有机 有机 有机 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 则 保 保 保 保 保 保 保 保 保Copying and spreading. Here's a general description of the preservation method of Lai (four) materials ^ ^ Knowledge of the storage of the money of the heart of the reading (four) system tc endurance. As shown in the figure of a younger, - storage device 记忆 memory 150 is stored - security The storage device 15 legality of the full data, after that, the host 10 user access / 15 〇 security data. A sergeant can be accessed and used memory: the following two major directions. Set the preservation method package; first, the department will store the preservation information plus ypti〇n), storage;
= 與主機10具有個別的金餘(Key),透過儲存裝 ‘主機10,兩者對金餘進行交互驗證後,解出真正的I 谷i—tent key);其後,再以此内容金錄對加密I 200828074 資料騎解密(DeCryption);最後,再由主機1〇輸出 的保全貝料。其次’係驗證主機及儲存裝置15的識別 碼以確認主機1G對儲存裝£ 15的存取權限,通過驗證 之後,再由主機1〇存取與使用保全資料。 、上述驗證方式雖可對保全資料提供一定程度的保護, 然’鑑於轉流通㈣的制性*騎升,使得保全資料 遭到,,散播的風險隨之提高,從而危及保全資料提供業 者^榷ϋ °為了保護保全資料創作者的智慧財產, 全貧料的驗證卿係為必要。同時,若保全資料遭戶、 端不慎更動,或者遭形卜人纽,關及好 出本;Γ:有鑑於此,卿 本求之k出,更進一步強化儲存裝置的保全, 者與用戶端均提供更周全的保障。 貝针徒i、 【發明内容】 因此,本發明之-目的係在於提供—種保全= With the host 10 has a separate key (Key), through the storage device 'host 10, the two sides of the mutual verification of Jin Yu, solve the real I valley i-tent key); thereafter, then this content gold Record pair encryption I 200828074 data riding decryption (DeCryption); Finally, the host 1 〇 output of the preservation of the material. Next, the identification code of the host and the storage device 15 is verified to confirm the access authority of the host 1G to the storage device 15. After the verification, the host 1 accesses and uses the security data. Although the above-mentioned verification method can provide a certain degree of protection for the preservation data, the risk of dissemination is increased, which threatens the preservation of the data provider, in view of the fact that the system of circulation (4) is riding up and the security data is taken up. ϋ ° In order to protect the intellectual property of the creator of the preservation data, it is necessary to verify the entire poor. At the same time, if the information is protected, the households are inadvertently changed, or the people are shaped, and the customs are well-off; Γ: In view of this, Qing has sought out, and further strengthens the preservation of storage devices, users and users. More comprehensive protection is provided at the end. The present invention is directed to providing a kind of preservation.
統,其猎㈣勤保全錄、儲存裝置之第—識別碼= 二識別碼所加密演算之資料’以控制主機存 二弟 係可使保全資料被竄改或被不當使用時,枯+子衣置, 裝置進行絲。 #止主機對儲存 本發明之另一目的係在於提供一種 藉由對保全資料、儲存裝置之第—識別系統,其 行加密演算,以產生-域資料儲存於別石馬進 主機察覺保全資料被竄改或被不當使^罝,係可使 存裝置進行存取。 而示止主機對儲 7 200828074 本發明係揭示一種保全方法,其傜適用於控制_主機 對一儲存袭置進行存取。該儲存裝置係可插拔地連接於今 主機,該儲存裝置包括一記憶體,該記憶體係儲存有_°第 一識別碼以及一檔案系統。該檔案系統之結構係配合儲存 一保全資料以及一第一儲存空間。該主機係預先儲存有一 第二識別碼。該保全方法之步驟係首先,將該第一儲存命 間之資料上載至該主機,其中該第一儲存空間係預先 一配對加密程序所產生。其次,將該第—儲存空間之資= 解密,以產生一解密資料。隨後,判別該解密資料之1確 ,,,中該解密資料之正確性的判別包括驗證該解密資= 是否符合該第-識別碼以及該保全資料。最後H妒 密資料之正確性,控制該主機存取該保全資料。豕4 括下明之。具體實施例中’所述之配對加密程序包 加密裝置,其中該配對加密裝置具有 内ϊ次:該配對加密裝置擷取該保全資料, ;5=合° ^後’利用該特徵内容、該第一如踩 生以形成-加“ 加密資料下载至該第-館存空間,並將該 本發明更揭示一種 储存衣置包括—記憶體 及-主機。該 以及一槽案系統 安^己,肢係儲存有一第—識別碼 有弟財子空間,其中該第 ^^科,且具 仔工間所儲存之資料係. 8 200828074 預先經過—配對加純 裝置,且具有-記憶體,該記憶生料=機係'連接於該储存 該第-儲存空間之資料係被上存有―弟二識別碼。 一儲存空間之資料解密,生—,主機,該主機將該第 該解密資料是否符合該第—解密資料。該主機驗證 制對保全資料的存取。0馬以及該保全貧料,以控 本發明另揭示一種$ 括一儲存②、糸統,該配對加密系統包 ,兄憶體,該記憶體係儲存 =衣置 案系統,該檔# 4別碼w及—檔 記情雕… 儲存有一保全資料。該主機包括-System, its hunting (four) diligent security record, storage device - identification code = two identification code encrypted calculation data 'to control the host to save the second brother can make the preservation data was tampered or improperly used, dry + sub-clothing , the device carries the wire. Another object of the present invention is to provide a first-identification system for the preservation data and the storage device, and to perform the encryption calculation to generate the domain data stored in the other stone horse into the host to detect the security data. Tampering or being improperly enabled can be accessed by the storage device. The present invention discloses a security method, which is applicable to the control host to access a storage attack. The storage device is detachably coupled to the host computer. The storage device includes a memory, and the memory system stores a first identification code and a file system. The file system is structured to store a security data and a first storage space. The host system pre-stores a second identification code. The step of the security method is to first upload the data of the first storage location to the host, wherein the first storage space is generated by a pairing encryption program. Secondly, the first storage space is decrypted to generate a decrypted data. Then, judging whether the decrypted data is correct, the determination of the correctness of the decrypted data includes verifying whether the decrypted asset = conforms to the first identification code and the security information. Finally, the correctness of the H-density data controls the host to access the security data.豕 4 Included in the description. In the embodiment, the paired encryption package encryption device is described, wherein the paired encryption device has an internal order: the paired encryption device retrieves the security data, and 5= is followed by 'using the feature content, the first Just as stepping on the life to form - plus "encrypted data downloaded to the first - library space, and the invention further discloses a storage device including - memory and - host. The and a slot system system, limbs The system stores a first identification code with a diver's sub-space, wherein the first ^^ section has a data system stored in the laboratories. 8 200828074 Pre-passing-pairing plus pure device, and having -memory, the memory The material=device's data connected to the storage-storage space is stored with the “secondary identification code.” The data of a storage space is decrypted, and the host, the host, whether the first decrypted data meets the The first-decryption data. The host verification system accesses the security data. The horse and the security material are used to control the invention. The invention further discloses a storage system, a system, a pairing encryption system package, a brother memory system, Memory system storage = clothing system, the file # 4 别 code w and - file record love carving ... stored a security information. The host includes -
置;ΐ垃…己饭體係儲存有—第二識別碼。該配對加贫Fΐ ΐ ... 己 己 己 己 己 己 己 己 己 己 己 己The pairing plus poverty F
存裝置!及該主機。該配對加密裝置G 义可絲取该保全資料,產生一特f支内客,廿妥〆、 特徵内容、琴笛一域付欲内合,亚利用該 瞀,、°κ 為別碼以及該第二識別碼進行加密演 Γ执以產生—加密資料。該配對加密裝置並於該儲存梦晋 案系統產生-第-儲存空間,將該加密f料下= 乐—儲存空間。 5亥 、以上之概述與接下來的詳細說明及附圖,皆是為了能 ^步5兒明本發明為達成預定目的所採取之方式、手段及 力欢。而有關本發明的其他目的及優點,將在後續的說明 及圖式中加以闡述。 ϋ 【實施方式】 首先,請參閱第二圖,該圖係為本發明之配對加密系 、、先2之系統架構示意圖。如第二圖所示,配對加密系統2 包括一儲存裝置20、一主機22以及一配對加密裝置24。 200828074 儲存裝置20係儲存有一保全資料,且被設定為與主機^ 相互配對。此配對白勺用意係在於限制儲存裝置Μ之保全 料的使用權限’用戶端僅能以主機22存取儲存裝置2〇之 保全資料。此處之主機22係為一電子產品,例如,個人數 位助理、無線通訊裝置、數位相機、數位影音播放装置以 ^ GPS絲糸鱗。而儲存裝置2()係指—大 f包括各魏格之快閃記針。齡裝置㈣可插拔^ 連接於主機22,主機22孫左俶"杜m 拔也 之保全資料。 婦取亚使用儲存裝置20所儲存 如第二圖所示,儲存装置20包括— 體200係儲存有一第一n U肢200,,己诫 檔案系請具有:保===案系統· 存該伴令眘祖+ 、 工θ〗204,用以配合儲 儲存有—第包括—記憶體細,記憶體22〇係 装置加以及—主5==配^猶置24係連接於儲存 取該保全資料,以產生_‘二置24具有一權限,可擷 用該特徵内容、第—配對加密裝置24並利 加密演算,以產生-力以及第二識別碼功進行 裝置20之標案系_山產貝生一 f置24並於儲存 密資料下载至第1存空間^ 一儲存空間挪,將該加 所述之第一識別碼201 觀,將身分識別碼紀錄 ^二*成後,須配合規 於產品的管理。同、、」、閃卡的特定儲存區,以利 有的身份識別碼,二J,別碼221係為主機22所特 此乐-硪別碼221可為主機22的產品序 10 200828074 號。再者,檔案系統2〇2係可 / 或NTFS槽宰季·招〜$據勝12、FATi6、FAT32 間204“ = = ^=架構,而保全資料儲存空 ^ 一 存工間206係為檔案型離。 裝置St全接於配對加密 S接法㈣。配對加密裝置^2 空間206的^ %、始具有產生儲存加密資料之第一儲存 -解密金势^ ^自對^主機22的記憶體22G係儲存有Save the device! And the host. The pairing encryption device G can take the security data, and generate a special f-internal customer, which is suitable for the content, the content of the genre, and the genre of the genre. The second identification code is encrypted and executed to generate an encrypted data. The pairing encryption device generates a -first storage space in the storage dreaming system, and the encryption material is down = music storage space. 5 Hai, the above summary and the following detailed description and drawings are all intended to be able to explain the ways, means and strengths of the invention for achieving the intended purpose. Other objects and advantages of the present invention will be described in the following description and drawings. ϋ [Embodiment] First, please refer to the second figure, which is a schematic diagram of the system architecture of the paired encryption system of the present invention. As shown in the second figure, the pairing encryption system 2 includes a storage device 20, a host 22, and a pairing encryption device 24. 200828074 The storage device 20 stores a security data and is set to be paired with the host. The purpose of this pairing is to limit the usage rights of the storage device. The client can only access the storage device 2 by the host 22. The host 22 here is an electronic product, for example, a personal digital assistant, a wireless communication device, a digital camera, a digital audio and video playback device, and a GPS wire scale. The storage device 2 () means that the large f includes the flash marks of each Weige. The age device (4) can be plugged and unplugged ^ connected to the host 22, the host 22 Sun Zuoyu " Du m pull also the security information. The storage device 20 is stored as shown in the second figure. The storage device 20 includes a first n U limb 200 stored in the body 200, and the file system has a system of: === case system Accompanied by Shen Zu +, θ 〗 〖204, used to match the storage and storage - the first includes - the memory is fine, the memory 22 〇 system is added and the main 5 = = ^ 犹 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 The data is generated to generate a _'two-set 24 having a privilege, and the feature content, the first-pair cryptographic device 24, and the encryption calculus can be used to generate a force and a second identification code to perform the standard system of the device 20 Produce Besun and F to set 24 and download the confidential data to the first storage space ^ a storage space, add the first identification code 201, and record the identity identification code ^^* Regulated in the management of products. The specific storage area of the same, "," flash card, with the unique identification code, the second J, the code 221 is the host 22 special. The music-code 221 can be the product sequence of the host 22 10 200828074. In addition, the file system 2〇2 can be / or NTFS slot season · move ~ $ according to 12, FATi6, FAT32 between 204 " = = ^ = architecture, and the preservation of data storage space ^ a warehouse 206 as a file The device St is connected to the paired encryption S connection method (4). The pairing encryption device ^2 space 206 has the first storage-decryption gold potential for generating the encrypted data. 22G series has been stored
權限不同、\ ^ Μ金餘223的權限與電子金錄26的 隹限不冋,其功能將再作詳述。 J 及加密裝置24包括了一資料存取模組240以 口在凟异模組242。資料存取模电^ 2〇、主機”丨、;u7人 μ供、、丑係對储存裝置 係連接;^ # %讀26進行絲。加㈣算模組242 =於-貝料存取模組240,加密演算模組242係 利=取拉組240擷取該保全資料,以產生—特徵内容,】 利用§亥特徵内容、第一 iik n.r Zff 〇Γ. 並 行加密演算,以產生該二¥1/ ^第二識別碼221進 係為L ㈣之配對㈣裝置24 2 :式配合電腦硬體架構之機制,以實現前述配對力I 。此外,熟習本領域技術者當可知悉,儲存裝ί ς ^制Γ 22 #透過製程治具連接於配對加密裝置24,所述 ^程治具係依據實務需求設置,因此,在此便不再作^ 盘士接著’請參閱第三圖’該圖係為本發明之儲存裝置20 /、機22之配對加密方法之步驟流程圖。其中.相關之系統 200828074 架構請同時參照第二圖。如第彡圖所示’此配對加密方法 包括下列步驟: 首先,將儲存裝置20及主機22連接於配對加密裝置 24,其中配對加密裝置24異有/產生第一儲存空間206 之權限(步驟S300); 其次,配對加密裝置24擷取該保全資料,以產生一 特徵内容(步驟S302);The permissions are different, the permissions of \^ Μ金余223 and the e-gold record 26 are not limited, and their functions will be described in detail. The J and encryption device 24 includes a data access module 240 to interface with the module 242. Data access mode ^ 2 〇, host "丨,; u7 people μ supply, ugly system connection to the storage device; ^ # % read 26 for wire. Add (four) calculation module 242 = Yu-before access module Group 240, the encryption calculation module 242 is responsible for the collection group 240 to retrieve the security data to generate the feature content, using the §Hai feature content, the first iik nr Zff . parallel encryption calculus to generate the second ¥1/^ The second identification code 221 is paired with L (four) (4) device 24 2 : the mechanism of the computer hardware architecture is used to achieve the aforementioned pairing force I. In addition, those skilled in the art can know that the storage device is known. ί ς ^ Γ 22 # Connected to the pairing encryption device 24 through the process fixture, the control tool is set according to the actual needs, therefore, no longer do ^ ^ then "see the third picture" The figure is a flow chart of the steps of the pairing encryption method of the storage device 20 / and the machine 22 of the present invention. The related system 200828074 architecture should also refer to the second figure. As shown in the figure, the pairing encryption method includes the following steps. : First, connect the storage device 20 and the host 22 to the paired encryption device. 24, wherein the encryption device 24 paired with a heterologous / permission generating a first storage 206 (step S300); secondly, the encryption device 24 to retrieve the pairing preservation of data content to generate a feature (step S302);
隨後,配對加密裝置24利用特徵内容、第一識別碼 2〇1以及第二識別碼221進行加密演算,以形成一如密資 料(步驟S304),以及 最後,配對加密裝置24於儲存裝置20之檔案系统2〇2 中產生第一儲存空間206,炎將該加密資料下载至該第— 儲存空間206 (步驟S306)。 於步驟S300中,更包括了將電子金鑰26連接於配對 加密裝置24,以使配對加密裝置24具有該產生第〜、 空間206之權限的步驟。 $存 於步驟S 3 02中,配對加密裝置2 4之加密 :對該保全資-行祕(抛 按,步驟S3〇4令所述利用特 以及第二識別碼功進行加輯曾 :、別碼201 演算方法係為f知,謂依據實;來=加;資料的 再作贅述。 為而求;叹什,在此便不 係為本發明之保全系統3 3係用以控制保全資料的 /接著,請參閱第四圖,該圖 之系統架構示意圖。此保全系统 12 200828074 存取。儲存裝置2〇 對加密程序,於♦汉 ‘ 22經過配對加密系統2的配 於主機22。如P際使用中’儲存裝置20係可插拔地連接 以及主機22。=圖壯戶Γ,保全系統3包括了儲存裝置2〇 係儲存有第彳衣20包括一記憶體2〇〇 ’記憶體200 包括一保全資檔案系統繼。檔案系統撤 保全資料儲存工曰’ 204以及-第-儲存空間206。 空間寫戶斤^存之^系儲存有該保全資料,而第一儲存 生。主機22係輯過^對加密程序所產 記憶體220係、儲在p 置2Q’且具有—記憶體220, 之資料解密,以產生mf22將第―儲存空間挪 是否符合該第—識別:2〇;貝料。主機22驗證該 全資料的存取。 "乂及该保全育料,以控制對保 =圖中’儲存裝置2〇之檔 更 —储存空間208,此筮-找十a 又巴栝一乐 二識別碼221。弟一储存工間观係用以配合儲存第 解密金鑰223為主機22使用保全資料的 又,主機22更具有一解密/驗 '钭解狯。 /么心 姨組226,解密/驗嘮捃知 226係利用解密金餘223蔣笛妙— σ松 '、且 料解密為解密資料:並 別碼以及魏全資料。;料是否符合該第—識 合主機22之處理二226係為應用程式配 證功能。 寻硬㈣構之機制,以實現其解密與驗 13 200828074 料配對加密方法可知,第—儲存空間206的資 料、第一識別碼201以及第二識別碼221經 5笫二:二所產生。因此,保全系統3係利用解密金鑰223 次料1子空間206所儲存之資料解密,並逐-比對保全 別碼加以及第二識別竭221,以確認保全 貝’、、…白、合錄’亚且,確認保全資料是否被更動。 卩]之糸、、先木構%同時來昭第一 此保全方法包括下列步驟:—㈣®如仏®所7^ 中第第一儲存空間206之資料上載至主機22,其 驟S5〇〇:);子工間2〇6係預先經過配對加密程序所產生(步 ,、_人,主機22將第—儲存空間206之資料解穷,以產 生—解密資料(步驟S5G2); (貝精在以產 資料判別該解密㈣之正確性,其中該解密 識別碼20 括驗證該解密資料是否符合該第一 4別碼201以及該保全資料(步驟S504);以及 全資之正確㈣ 法之ϋυ參閱第六圖,該圖係為本發明之保全方 實:二驟如_所示,此具體 裝置^步’射主機22係駐料於错存 ”人將第-儲存空間2〇&之資料上載至主機叫步 14 200828074 驟 S610); 接著,_驗證模組226利用解密錢 存空間m之資料解密,以產生—解密資料, 貢料包括-裝置碼、-主機碼以及—資料碼(步驟襲山; 隨後,解密/驗證模組220利肖I# , 空間寫之資料是否與利用配對二二 :二)藉以判別第-儲存空間2G6之資料是否^加動^ S680); 對保全貢料的存取(步驟 若步驟S630的判斷為第一 次、 密資料相同,則將第二儲存办門f S ―之貝料與加 22,解密/驗證模組226並|= 〇δ之賁料上载至主機 資料是否符合第 烟弟二儲存空間208所儲存的 付口弟一哉別碼221 (步驟S64〇); 若步驟S640的判斷幺榮-丄 料不符合第二識別碼221,則—」堵存空間208所儲存的資 是否儲存有資料(步驟S64f;—步判別第二儲存空間2〇8 若步驟S642的剌齡去μ 一 料,則代表儲存裝置空間208係儲存有資 非法使用,之後,即&二主枝22不匹配,此資料存取為 S680); 、機22對保全資料的存取(步驟 若步驟S642的判斷兔_ 料,則代表儲存裝置2η「、,—諸存空間尚未儲存資 機22便將第二識別糸:大連接於主機22,之後,主 下载至弟二儲存空間208(步驟 15 :f斷為解密資料之裝置碼符合第-識 二匈,解密資料之資料碼是否符合保全 貝料是否被更動(步驟S660),· ㈣_解密㈣之資料碼不符合保全 資料被更動過,之後,即終止主機22 (步驟 S680);Then, the pairing encryption device 24 performs the encryption calculation using the feature content, the first identification code 2〇1 and the second identification code 221 to form a confidential data (step S304), and finally, the pairing encryption device 24 is in the storage device 20. A first storage space 206 is generated in the file system 2〇2, and the encrypted data is downloaded to the first storage space 206 (step S306). In step S300, the electronic key 26 is further connected to the pairing encryption device 24, so that the pairing encryption device 24 has the step of generating the rights of the first and the space 206. In the step S 3 02, the encryption of the pairing encryption device 24: the security-dealing (the pressing, the step S3〇4 orders the use of the special and the second identification code work to add: The code 201 calculation method is f, which is based on the actual; to = plus; the data is re-stated. For the sake of; sigh, here is not the security system of the invention 3 3 is used to control the preservation of data / Next, please refer to the fourth figure, the system architecture diagram of the figure. This security system 12 200828074 access. The storage device 2 〇 encryption program, in the ' ' '22 through the paired encryption system 2 is assigned to the host 22. For example, P In the middle of use, the storage device 20 is pluggably connected and the host 22. = Figure 壮 Γ, the security system 3 includes the storage device 2, the 彳 clothing 20 includes a memory 2 〇〇 'memory 200 Including a full-service file system. The file system is withdrawn from the full data storage process '204 and - the first - storage space 206. The space writers save the security data, and the first storage students. Edited the memory 220 produced by the encryption program, stored in p 2Q And having - memory 220, the data is decrypted to generate mf22 to move the first storage space to meet the first - identification: 2 〇; shell material. The host 22 verifies the access to the full data. "乂 and the preservation In order to control the protection = the storage device 2 〇 更 — 储存 储存 储存 储存 储存 储存 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找 找The decryption key 223 is used for the host 22 to use the security data, and the host 22 has a decryption/testing solution. / 姨心姨 group 226, decryption/inspection 226 system uses the decryption Jin Yu 223 Jiang Di Miao - σ松', and the material is decrypted as decrypted data: and the code and Wei Quan data. Whether the material meets the requirements of the first-identification host 22 processing 226 system is the application matching function. Seeking the hard (four) structure mechanism, Achieving its decryption and verification 13 200828074 The material pairing encryption method shows that the data of the first storage space 206, the first identification code 201 and the second identification code 221 are generated by 5:2: 2. Therefore, the security system 3 uses the decryption gold. The data stored in the sub-space 206 of the key 223 is decrypted, and - The comparison of the security code plus the second recognition 221, to confirm the preservation of the ',, ... white, the combined record 'Asia, and confirm whether the preservation information has been changed. 卩] 糸,, first wood structure% at the same time The first method of preservation includes the following steps: - (4) The data of the first storage space 206 in the 7®® 7^ is uploaded to the host 22, and the step S5 〇〇:); The encryption program generates (step, _ person, the host 22 de-provisions the data of the first storage space 206 to generate - decrypt the data (step S5G2); (Bei Jing determines the correctness of the decryption (4) by the production data, wherein The decryption identification code 20 includes verifying whether the decrypted data conforms to the first 4th code 201 and the preservation data (step S504); and the wholly-owned correct (four) method, refer to the sixth figure, which is a preservation of the present invention. Fang Shi: The second step is as shown in _, this specific device ^ step 'shooting host 22 is stationed in the wrong memory" person uploads the first storage space 2〇 & the data to the host called step 14 200828074 step S610); , the verification module 226 decrypts the data of the decrypted money storage space m to generate a solution Confidential information, tribute includes - device code, - host code and - data code (steps to attack the mountain; then, decryption / verification module 220 Li Xiao I #, space write data and use pairing 22: 2) to distinguish Whether the data of the first storage space 2G6 is ^^ 680); access to the security tribute (if the judgment of step S630 is the first time, the secret information is the same, then the second storage door f S - the shell And the data of the encryption/verification module 226 and the 〇δ are uploaded to the host data to meet the payment code 221 stored in the second storage space 208 (step S64〇); If the judgment of S640 is not in accordance with the second identification code 221, then the data stored in the storage space 208 is stored with data (step S64f; step-by-step determination of the second storage space 2〇8) If the age is gone, it means that the storage device space 208 is stored illegally, and then, the & main branch 22 does not match, the data access is S680); and the machine 22 accesses the security data (step If the rabbit is judged in step S642, it represents the storage device 2n ",, - The storage space has not yet stored the asset machine 22, and the second identification port is connected to the host 22, and then the main download is downloaded to the second storage space 208 (step 15: f is broken to decrypt the data device code conforms to the first-identification two Hungary, decryption Whether the data code of the data conforms to whether the security material is changed (step S660), (4) the data code of the decryption (4) is not conformed to the security data, and then the host 22 is terminated (step S680);
200828074 S644); 解密資料之裝置碼是否符合第-識別碼 .識別碼2〇Γ,為解密資料之裝置瑪不符合第一 :料存取為非法二=置20與主機22不匹配,此資 取(步驟S680);八即終止主機22對保全資料的存 若步驟S650 別碼201,則進一 資料,以確認保全 若步驟S660 資料,則代表保全 對保全資料的存取 料,:⑽的判斷為料之資料碼符合保全1 更動過,之後,即結束此保全; 驟S670)。 、22亚取得存取與使用保全資料的權限(^ 、猎由上述實例詳述可知,本發明之保全方法與系統係 =過主,14儲存裝置的配對加密程序,將保全資料、儲存 袋置之第一識別碼及第二識別碼加密演#,以i生加密資 料。其後,保全方法與系統再藉由將第一儲存空間之資料 解密,驗證儲存裝置是否與主機B,並X,確認加密資 料以及保全㈣是否被更動,從而強化保全資料使用的合 法性與正轉性。 16 200828074 惟,以上所述,僅為本發明的具體實施例之詳細說明 及圖式而已,並非用以限制本發明,本發明之所有範圍應 以下述之申請專利範圍為準,任何熟悉該項技藝者在本發 明之領域内,可輕易思及之變化或修飾皆可涵蓋在以下本 案所界定之專利範圍。 ; 【圖式簡單說明】 第一圖係為習'知技術之儲存裝置讀取系統之系統架構示 • 意圖; 第二圖係為本發明之配對加密系統之系統架構示意圖; 第三圖係為本發明之配對加密程序之步驟流程圖; 第四圖係為本發明之保全系統之系統架構示意圖; 第五圖係為本發明之保全方法之步驟流程圖;以及 第六圖係為本發明之保全方法之一具體實施例之步驟流 程圖。 Φ 【主要元件符號說明】 1 :儲存裝置之讀取系統 2 :配對加密系統 3:保全系統 • 10、22 :主機 : 15、20:儲存裝置 150、200、220 :記憶體 201 :第一識別碼 202 :檔案系統 17 200828074 204 :保全資料儲存空間 206 :第一儲存空間 208 :第二儲存空間 221 :第二識別碼 223 :解密金鑰 226 :解密/驗證模組 24 :配對加密裝置 240 :資料存取模組 242 :加密演算模組 26 :電子金鑰 18200828074 S644); Whether the device code of the decrypted data conforms to the first-identification code. The identification code is 2〇Γ, and the device for decrypting the data does not conform to the first: the material access is illegal, and the device 20 does not match the host 22. (Step S680); 8 is to terminate the host 22 to save the data if the step S650 code 201, then enter a data to confirm the preservation if the step S660 data, on behalf of the preservation of the access to the preservation data,: (10) judgment If the information code of the material meets the security 1 change, then the maintenance is completed; step S670). 22, access to access and use of security information (^, hunting as detailed in the above examples, the preservation method and system of the present invention = over the main, 14 storage device pairing encryption program, the preservation data, storage bag The first identification code and the second identification code are encrypted to generate the data, and then the security method and the system decrypt the data of the first storage space to verify whether the storage device is connected to the host B, and X, Confirming whether the encrypted data and the security (4) are changed, thereby enhancing the legality and forwardness of the use of the security data. 16 200828074 However, the above description is only for the detailed description and drawings of the specific embodiments of the present invention, and is not intended to be used. The invention is to be construed as being limited by the scope of the following claims, and any one skilled in the art in the field of the invention can be easily changed or modified to cover the patents defined in the following. Scope. [Simplified description of the diagram] The first diagram is the system architecture of the storage device reading system of the known technology. The second diagram is the distribution of the invention. Schematic diagram of the system architecture of the encryption system; the third diagram is a flow chart of the steps of the paired encryption procedure of the present invention; the fourth diagram is a schematic diagram of the system architecture of the security system of the present invention; Step flow chart; and the sixth figure is a flow chart of steps of a specific embodiment of the preservation method of the present invention. Φ [Main component symbol description] 1: Storage device reading system 2: Paired encryption system 3: Security system • 10, 22: host: 15, 20: storage device 150, 200, 220: memory 201: first identification code 202: file system 17 200828074 204: security data storage space 206: first storage space 208: second storage space 221: second identification code 223: decryption key 226: decryption/verification module 24: pairing encryption device 240: data access module 242: encryption calculation module 26: electronic key 18
Claims (1)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW95150017A TW200828074A (en) | 2006-12-29 | 2006-12-29 | Security method, security system and pairing/encryption system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW95150017A TW200828074A (en) | 2006-12-29 | 2006-12-29 | Security method, security system and pairing/encryption system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW200828074A true TW200828074A (en) | 2008-07-01 |
Family
ID=44817539
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW95150017A TW200828074A (en) | 2006-12-29 | 2006-12-29 | Security method, security system and pairing/encryption system |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW200828074A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI570324B (en) * | 2012-03-20 | 2017-02-11 | 渥班資產公司 | Method for configuring a wind power generation facility and wind power generation facility |
| WO2021087710A1 (en) * | 2019-11-05 | 2021-05-14 | 林晖 | Structure and method for digital data memory card encryption |
-
2006
- 2006-12-29 TW TW95150017A patent/TW200828074A/en unknown
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI570324B (en) * | 2012-03-20 | 2017-02-11 | 渥班資產公司 | Method for configuring a wind power generation facility and wind power generation facility |
| WO2021087710A1 (en) * | 2019-11-05 | 2021-05-14 | 林晖 | Structure and method for digital data memory card encryption |
| CN114556308A (en) * | 2019-11-05 | 2022-05-27 | 林晖 | Structure and method for encrypting digital data memory card |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7124443B2 (en) | Information transaction system | |
| US7191238B2 (en) | Method and system for authenticating content distribution and content reproduction requests based on biometric features | |
| KR101689351B1 (en) | Device and method for digital right management | |
| US20090268906A1 (en) | Method and System for Authorized Decryption of Encrypted Data | |
| US10616215B1 (en) | Virtual smart card to perform security-critical operations | |
| US20100310076A1 (en) | Method for Performing Double Domain Encryption in a Memory Device | |
| CN101595488A (en) | Method and apparatus for binding content to separate storage devices | |
| KR101702748B1 (en) | Method, system and recording medium for user authentication using double encryption | |
| TW200840306A (en) | Methods and apparatuses for binding content to a separate memory device | |
| CN101578608B (en) | Method and apparatus for accessing content based on session tickets | |
| JP2020052990A (en) | Ownership management method of virtual object and related interactive platform | |
| CN111147248A (en) | Encrypted transmission method, device and system of face feature library and storage medium | |
| US8763110B2 (en) | Apparatuses for binding content to a separate memory device | |
| TW200828074A (en) | Security method, security system and pairing/encryption system | |
| Uludag et al. | Multimedia content protection via biometrics-based encryption | |
| US20080112566A1 (en) | Apparatuses for accessing content based on a session ticket | |
| TWI473488B (en) | Method and storage device for protecting digital content | |
| TW200807437A (en) | Access control for secure protable storage device | |
| CN101617318A (en) | Be used for method and apparatus that content and licence are linked | |
| JP2004318902A (en) | Content delivery method and content delivery system | |
| US20230410073A1 (en) | Methods, systems, apparatuses, and devices for facilitating managing collectibles for owners of the collectibles | |
| JP2021177581A (en) | Apparatus for managing secret information, method and program therefor | |
| TWI461949B (en) | A method for generating a parameter configured for use in decrypting content, a method for generating a reference to a cryptographic key, and a host computing device | |
| KR20100067997A (en) | Apparatus for reading and writing smartcard, and data security method thereby | |
| JP2010086309A (en) | Portable content management device |