[go: up one dir, main page]

TW200928739A - Storage device and access authority management system and method used therefor - Google Patents

Storage device and access authority management system and method used therefor Download PDF

Info

Publication number
TW200928739A
TW200928739A TW96151589A TW96151589A TW200928739A TW 200928739 A TW200928739 A TW 200928739A TW 96151589 A TW96151589 A TW 96151589A TW 96151589 A TW96151589 A TW 96151589A TW 200928739 A TW200928739 A TW 200928739A
Authority
TW
Taiwan
Prior art keywords
storage device
terminal device
terminal
program
storage
Prior art date
Application number
TW96151589A
Other languages
Chinese (zh)
Other versions
TWI358642B (en
Inventor
Lung-Yuan Wu
Original Assignee
Fineart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fineart Technology Co Ltd filed Critical Fineart Technology Co Ltd
Priority to TW96151589A priority Critical patent/TWI358642B/en
Publication of TW200928739A publication Critical patent/TW200928739A/en
Application granted granted Critical
Publication of TWI358642B publication Critical patent/TWI358642B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A storage device and access authority management system and method used therefor are provided. The authority management system includes a storage device having an identified program with a client name list and a client with a client name. While the storage device and the client is connected by a plug-and-play connecting interface, the identified program runs a checking client process automatically to decide the authority of the storage device depending on the result to check that the client name list and the client name.

Description

200928739 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種儲存裝置的使用權限管理系統及其 方法’且特別是有關於一種隨插即用之儲存裝置及其之使用權 限管理系統及方法。 【先前技術】 Ο200928739 IX. Description of the Invention: [Technical Field] The present invention relates to a usage right management system for a storage device and a method thereof, and in particular to a plug-and-play storage device and a usage rights management system thereof And methods. [Prior Art] Ο

由於通用序列匯流排(Universai seriai Bus,USB)具有高傳 輸速度之優異特性與隨插即用之便利性,目前已被使用於各種 外接裝,之連接介面。啊仙為快閃記雜的製程不斷進 步,使得快閃記憶體的體積日趨縮小,且容量更大而成本變 低所以近年來有許多廠商相繼推出通用序列匯流排搭配快閃 ^憶體的隨料接式儲存裝置(即-般通稱的USB隨身碟),已 =費者廣泛接受,逐漸取代傳統的軟碟片、光等。但也 ,為這些USB外_存裝置使験來實在太過方便了,只要 ΞίΤΠΓ的電腦,就可以馬上將電腦中的資料備份到 資;長多企_ 裝置時,卿何做適^長權期限困/控::^*對員工使用這類 企,爲了提昇卫作效率,通常只想要准 者可以使用USB外接儲存裝置 =疋97作 :=資料存取的動作。二 果’透過USB外接料裝置,帶回研發之 、=析與研究;市場人貞可⑽企業 訊,藉由USB外接儲存裝置,帶 :::,身 2可以將客戶所需之㈣内部之相_料m 2 館存装置,直接請批戶手巾。由魏衫 5 200928739 而 料外茂的風險又是科—個門題,#存於其巾的機密資 制,便::合待 【發明内容】 在梦ί發甘明▲出—種儲存裝置之使用權限管理系統,句人. ❹ ❹ 驗二程犬、具有第—連接介面與内建有終端裝置名稱表=身, 7及終端裝置,具有第二連 執行介連麟,身份驗證 述的终以比對此終端裝置名稱表是否具有上 、k裝置名稱’並在終端襄置名稱表具有此終端 時,開放儲存裝置於此終端裝置之使用權限。 稱 再提出—種儲存裝置之使用權限管理方法,其提供 端儲存裝置,此儲存裝置内建具有-個終 你裝f名稱表之身份驗證程式,此外也提供具有第二連接介面 :一固終端裝置名稱之終端裝置。當儲存裝置之第—連接 、終鳊装置的第二連接介面相連接時,身份驗證程式就會執行 一個終端裝置認證程序,關此比麟端裝置名稱表中是否具 有此終端裝置名稱。最後再根據比對的結果決定儲存裝置是否 可在此終端装置上使用。 本發明$提出一種儲存裝置,至少包含具有終端裝置名稱 表之身分驗_程式之光碟區以及被設定為隱藏狀態之明文 區。當身分蜂證程式執行並得到預定結果之後,此明文區就會 被取消其隱藜狀態。 本發明P提出之儲存裝置的使用權限管理系統及其方 法’使得儲;^裝置對於各終端裝置之使用權限可以做適當的管 200928739 理,同時也可以降低當使用者不慎遺失儲存裝置時,產生機密 資料外洩之風險。 為讓本發明之上述和其他目的、特徵和優點能更明顯易 懂,下文特舉較佳實施例,並配合所附圖式,作詳細說明如下。 【實施方式】 ❹Since the universal serial bus (Universal seriai Bus, USB) has excellent transmission speed and convenience of plug-and-play, it has been used in various external connection interfaces. The process of flashing and flashing is constantly improving, making the volume of flash memory shrinking day by day, and the capacity is larger and the cost is lower. So in recent years, many manufacturers have successively introduced the universal serial bus with the flashing Connected storage devices (that is, commonly known as USB flash drives) have been widely accepted by consumers, gradually replacing traditional floppy disks, light, and the like. But also, it is too convenient for these USB external storage devices to be used. As long as the computer is ΞίΤΠΓ, you can immediately back up the data in the computer to the capital. When the long-term enterprise _ device, how to do the right Deadline/Control::^* Use this type of enterprise for employees. In order to improve the efficiency of the security, it is usually only possible to use USB external storage device = 疋97 for: = data access action. The second fruit 'via the USB external device, bring back the research and development, analysis and research; market people can (10) enterprise news, with USB external storage device, with :::, body 2 can be used by customers (4) internal Phase _ material m 2 library storage device, please directly approve the hand towel. From Wei Bing 5 200928739, the risk of being out of the house is also a subject--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- The use of rights management system, sentence person. ❹ 验 test two-way dog, with the first connection interface and built-in terminal device name table = body, 7 and terminal device, with the second connection implementation of Lin Lin, identity verification Finally, when the terminal device name table has the upper, k device name 'and the terminal device name table has the terminal, the storage device is used to use the terminal device. Said to re-propose a storage device usage rights management method, which provides an end storage device, the storage device has an identity verification program with a final name list, and a second connection interface: a solid terminal Terminal device of the device name. When the first connection interface of the first connection and the final device of the storage device is connected, the authentication program executes a terminal device authentication program to determine whether the terminal device name is present in the name list of the device. Finally, based on the result of the comparison, it is determined whether the storage device can be used on the terminal device. The present invention proposes a storage device comprising at least a disc area having an identification device of a terminal device name table and a plaintext area set to a hidden state. After the identity certification program is executed and the predetermined result is obtained, the plaintext area is cancelled. The usage right management system and method of the storage device proposed by the invention P can make the storage device have the appropriate authority for each terminal device, and can also reduce the loss of the storage device when the user accidentally loses the storage device. Risk of leakage of confidential information. The above and other objects, features and advantages of the present invention will become more <RTIgt; [Embodiment] ❹

本發明主要是提供一種儲存裝置的使用權限管理系統及 其方法’使得儲存裝置在各終端裝置之使用權限可以做適當的 =理’同時也可崎低當使用者不慎遺失儲存裝置時,產生機 密資料外洩之風險。相關之實施例說明如下。 布固兩不贫明第一實施例之示意圖。其包含儲存裝置 γ多個終端裝置2G (如第—終端裝置2卜第二終端裝置 20、八裝置23等);且儲存裝置10與這些終端裝置 有―互通性的連接介面丨9、219、229、239等, 些終端裝置2〇可以藉由連接介面19、 置必定且纟魏山疋成資料傳遞之任務。其中’每個終端裝 裝置= 置名稱’因為終端装置名稱是每個終端 終端裝置22之第二終端裝置名^财置名稱為A、第二 三終端裝置名稱為C。二存裝、第二終端裝置23之第 證程式⑴,且身份驗證程式^内具有一個身份驗 置10之所有終端裝置清單的終端允許使用健存裝 置ω之連接介面19插入任—終tT U2。當儲存裝 動執行身份驗證程式Ul,進置之連接介面時,便會自 份驗證程式m會去讀取其:用麵_驗證工作;此身 稱,並與身份驗證程式lu、 2之終端裝置的終端裝置名 的、、、端裝置名稱表U2進行比 200928739 的終端名稱表112令具有與其所插入之終端裝置相同 插人使用;但若終端裝置名稱表112中不具有與其所 於此終端聚的終端裝置名稱’則不開放儲存裝置10 端裝置舉名H儲存裝置1G之終端裝置名稱表112,具有終 稱為A)時,身二入第-終端裝置21(終端裝置名 終端震置名稱表112,1會自行比對儲存裝置10中之 端裝置名稱表m確實於此時終 存裝置ίο之使用權n裝置名稱A’於疋便會開放此儲 裝置22 (終㈣署Jl’r述之健存裝置10插入第二終端 對儲存裝置10中B)時,身份驗證程S111同樣自動 =裝置10中之終端裝置名稱表112進行比對。 之;找到終端裝置名稱B’因此將不開放儲存裝置1: 10中身份^3\即ill终端褒置認證程序。透過上述儲存裝置 Ο 效對儲存裝Γ的細_=的=裝=,,可以有 特定終端裝置上之使的權限f理,·特定儲存裝置於 請同時參照第2A圖與第犯圖,其中 月第二實施例之示意圖,第一 …本發 作方法的施行步驟流㈣。其彡置I =之一種操 包含儲存裝置H)以及多齡端裝統=如:第—實施例所述, 置1〇中之身份驗唯一不同的是儲存裝 外、爭I身 式113,除了具有終端裝置名稱表114 預設密碼115,且其執行驗證程序錢兩步驟。第 了為終端裝置認證程序包含步驟S細與_,同J 實施例所述,在此不再贅述。坌-半 同第 8 200928739 得身份驗證程式113可以進行預設密碼115與所使用者密碼之 比對若相符則開放儲存裝置1〇於之所插入之終端裝置的使 用權限(步驟S230);若不符則關閉儲存裝置10的使用權限 (步驟S24G)。透過上述之終端裝置認證程序,可以 =存裝置對於終端裝置之使用觀;更進―步密嗎認證 程序,可以確認儲存裝置為使用者本人所使用,預防 ===存裝置時’可以透過密碼認證程序’防止他人使 ❹ 意的是,前述執行驗練相兩録職沒有絕對的 = 時,可以先進行第一步驟,待第一步: 步驟,或者,也可以先進行第二步驟,待第二 步驟進行第—步驟;或者,可以讓第—步驟與第二 為本請Γ參照第3A圖與第犯圖,其中,第3A圖 〇 二操:r的施行步称流程圖。其系統』 =裝==10以及多個終端裝置2。;唯-不= 除了 么 辨識裝置18,且身份驗證程式m, 含執第;T為,裝置認證程序’其包 會被要杯儲序(步驟_,此時使用者 圖案讀取,完成後身份驗證程=6識蔣裝置18進行使用者指紋 用者指紋圖案進行1斜3116將預設指紋圖案118與使 限(步驟S3301 · 4 士 Μ右目符則開放儲存裝置10的使用權 ’右不目符則關閉儲存裝110的使用權限(步 9 200928739 L經由此雙重的驗證方式,不但可以利用終端裝置 有效管理儲存裝置對終端裝置之使用權限;更進一 =====置為使用者本人所使用,預 防止他人使用此存裝置時,可以透過指紋認證程序, ❹ ❹ 關係同樣的’前述執行驗證程序的兩個步驟並沒有絕對的先後 第4^明2供一種具有權限管理功能之儲存裝置30,如 相通之連接介面49的二裝置30與具有 區32及隱藏區33 ;其中,光碟區31是存 置30之自動執行程式的位置;明文區32是提供ϋ 藏區是—般使用者無法看見及^作 Γ二ίΐΐ 之製造商所提供之原始密碼,並 ^理定=,是將市售儲存裝置,透過系 驗證程式311更具有儲存裝置 =其中身伤 扣,此時身份驗證程式 ==之終端裝糊與:份驗證^ 轉魏置40之之^端 裝置名稱表312具有其所插入 此時便授_#^ 稱,義麟轉置紐程序。 之隱臧Μ,職給使用者自*存取資料於明文 200928739 使用權限 並差ί,ΐίΓ實施例之儲存裝置’係如前—實施例所述, 其差異疋身純證程式311之設計。換言之,身分驗證程式 311可以疋具有終端裝置認證程序及密碼認證程序之雙重驗^ 模式;或具有終端裝置紐程序及指紋紐程序之雙重驗證^The invention mainly provides a usage right management system for a storage device and a method thereof, so that the usage authority of the storage device in each terminal device can be appropriately determined and can also be low when the user accidentally loses the storage device. The risk of leakage of confidential information. Related embodiments are described below. A schematic diagram of the first embodiment in which the two embodiments are not poor. The storage device γ includes a plurality of terminal devices 2G (such as the first terminal device 2, the second terminal device 20, the eight devices 23, etc.); and the storage device 10 has an interoperability connection interface 丨9, 219 with the terminal devices. 229, 239, etc., some of the terminal devices 2 can be connected by the interface 19, and must be transferred to Weishan. Here, 'each terminal device=name' is because the terminal device name is the second terminal device name of each terminal terminal device 22, and the second terminal device name is C. The second storage device, the second terminal device 23's certificate program (1), and the terminal having the list of all terminal devices having the identity verification device 10 in the authentication program ^ allows the connection interface 19 of the health device ω to be inserted into the terminal tT U2 . When the storage device executes the authentication program U1 and enters the connection interface, the self-certification program m will read it: use the face_verification work; this body name, and the terminal with the authentication program lu, 2 The terminal device name table U2 of the terminal device name of the device is the same as the terminal device table of the 200928739 having the same terminal device as the terminal device inserted therein; however, if the terminal device name table 112 does not have the terminal device therewith The terminal device name of the cluster is not opened. The terminal device name table 112 of the H device 1G, which has a final name of A), is connected to the terminal device 21 (the terminal device name is shocked) The name table 112, 1 will automatically compare the end device name table m in the storage device 10, and the device name A' will be opened at this time. The device name A' will open the storage device 22 (final (four) department Jl' When the storage device 10 is inserted into the second terminal pair storage device 10 B), the authentication process S111 is also automatically = the terminal device name table 112 in the device 10 is compared. The terminal device name B' is found. Not open for storage Set 1: 10 identities ^ 3 \ ill terminal 认证 authentication program. Through the above storage device to verify the storage device _ = = =, you can have the permissions on the specific terminal device, · For specific storage devices, please refer to FIG. 2A and the first map at the same time, wherein the second embodiment of the month is a schematic diagram, the first...the execution step of the attack method is flown (4). The device of the setting I = includes the storage device H) And the multi-aged end-mounted system = as described in the first embodiment, the only difference between the identification and the identification is that the storage device is out of the box, except for having the terminal device name table 114 preset password 115, and It performs two steps of verifying the program money. The first terminal device authentication program includes the steps S and _, which are described in the same manner as the J embodiment, and are not described herein again.坌- 半同8th 200928739 The authentication program 113 can perform the comparison between the preset password 115 and the user password to open the usage right of the terminal device inserted by the storage device 1 (step S230); If not, the usage right of the storage device 10 is turned off (step S24G). Through the above-mentioned terminal device authentication program, it is possible to use the device to view the use of the terminal device; further, the step-by-step authentication program can confirm that the storage device is used by the user himself, and the prevention can be used when the device is prevented. The certification procedure 'prevents others from making sense is that when there is no absolute = for the two executions of the above-mentioned execution temptation, the first step can be performed first, and the first step is: Step, or, the second step can be performed first. The second step performs the first step; or, the first step and the second step can refer to the 3A map and the first map, wherein the 3A diagram is the second step: the execution step of the r is called a flowchart. Its system』 = installed == 10 and a plurality of terminal devices 2. ;only - no = except for the identification device 18, and the authentication program m, including the implementation; T is, the device authentication program 'the package will be the cup storage order (step _, the user pattern is read at this time, after completion) The authentication process=6 recognizes the Chiang device 18 to perform the user fingerprint user fingerprint pattern 1 oblique 3116 to preset the fingerprint pattern 118 and the limit (step S3301 · 4 Μ Μ right eye then open the storage device 10 use right right) The object is to close the use permission of the storage device 110 (step 9 200928739 L through this dual verification mode, not only can the terminal device be used to effectively manage the storage device to use the terminal device; further ===== is set to the user himself When used, pre-preventing others from using this device, you can use the fingerprint authentication program, ❹ ❹ the same 'the two steps of the above-mentioned execution verification program are not absolutely sequential. 4^明2 for a storage with rights management function The device 30, such as the two devices 30 of the connection interface 49, has a zone 32 and a hidden zone 33; wherein the optical zone 31 is the location of the automatic execution program of the storage 30; the plaintext zone 32 provides the storage zone. The original user can't see and use the original password provided by the manufacturer, and it is determined that the commercially available storage device has a storage device through the system verification program 311. When the authentication program == terminal paste and: copy verification ^ turn Wei set 40 ^ end device name table 312 has its inserted at this time will be granted _ # ^ said, Yilin transferred to the new program. Μ, the user gives the user access to the data in plain text 200928739. The permission and the difference between the storage device of the embodiment are as described in the previous embodiment. The difference is the design of the pure certificate program 311. In other words, the identity The verification program 311 can have a dual verification mode with a terminal device authentication program and a password authentication program; or a dual verification with a terminal device new program and a fingerprint button program^

❹ 式。其中,終端裝置驗證程序、密瑪驗證程序及指紋驗證程序, 如上述實施射之綱’不加贅述。經由上述兩種雙重之驗證 方式,不僅可以有效管理儲存裝置對終端裝置之朗權限;更 可以進-步的確職存裝置為使用者本人所使用,明防當使 用者不慎遺失此儲存裝置時,防止他人使用此儲存裝置。 紅上所述,本發明之儲存裝置1〇、3〇可以是具有儲存資 料功能之裝置,例如快閃記憶體(FlashMem〇ry)、磁性記憶 體等。連接介面19、39、219、229、239、39、49等,可以是 任何具有隨插即用(Plug-anci-piay)功能的連接介面,例如通 用序列匯流排(USB)或IEEE1394等。而終端裝置2〇、21、 22、23、40等,則可以是任何具有儲存資料功能的電子裝置, 例如個人電腦(PC )、工作站(Work Station)或伺服器(Server) 等。指紋辨識裝置18,是具有讀取指紋圖案功能之裝置,例 如是按壓式紋辨識裝置或掃描式紋辨識裝置。再者,本發明之 另一實施例,是將指紋辨識裝置18設置於終端裝置上,而非 儲存裝置上。 雖然本發明已以較佳實施例揭露如上,然其並非用以限定 本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍 内’當可作些許之更動與潤飾,因此本發明之保護範圍當視後 附之申請專利範圍所界定者為準。 11 200928739 【圖式簡單說明】 第1圖為本發明之第一實施例之示意圖。 第2A圖為本發明之第二實施例之示意圖。 第2B圖為第二實施例之一種操作方法的施行步驟流程 圖。 第3A圖為本發明之第三實施例之示意圖。 第3B圖為第三實施例之一種操作方法的施行步驟流程 圖。 第4圖為本發明之第四實施例之示意圖。 【主要元件符號說明】 10、30 :儲存裝置 20、40 :終端裝置 18 :指紋辨識裝置 21 :第一終端裝置 22 :第二終端裝置 23 :第三終端裝置 19、219、229、239、39、49 :連接介面 111、 113、116、311 :身份驗證程式 118 :預設指紋圖案 32 :明文區 35 :本體 112、 114、117、312 :終端裝置名稱表 115 :預設密碼 31 :光碟區 33 :隱藏區 S200〜S240 :本發明一實施例之施行步驟 S300〜S340 ·本發明一實施例之施行步驟 12❹ style. Among them, the terminal device verification program, the MME verification program, and the fingerprint verification program are as described above. Through the above two dual verification methods, not only can the storage device be able to manage the remote device's remote authority, but the user can also use the user's own device to prevent the user from accidentally losing the storage device. To prevent others from using this storage device. As described above, the storage device 1〇, 3〇 of the present invention may be a device having a storage function, such as a flash memory (FlashMem〇ry), a magnetic memory, or the like. The connection interface 19, 39, 219, 229, 239, 39, 49, etc., may be any connection interface having a plug-and-play (Plug-anci-piay) function, such as a general-purpose serial bus (USB) or IEEE1394. The terminal devices 2, 21, 22, 23, 40, etc., may be any electronic device having a data storage function, such as a personal computer (PC), a workstation (Work Station), or a server (Server). The fingerprint recognition device 18 is a device having a function of reading a fingerprint pattern, such as a push pattern recognition device or a scanning pattern recognition device. Furthermore, another embodiment of the present invention is to place the fingerprint recognition device 18 on the terminal device instead of the storage device. While the invention has been described above by way of a preferred embodiment, it is not intended to limit the invention, and the invention may be modified and modified without departing from the spirit and scope of the invention. The scope of protection is subject to the definition of the scope of the patent application. 11 200928739 [Simple description of the drawings] Fig. 1 is a schematic view showing a first embodiment of the present invention. Fig. 2A is a schematic view showing a second embodiment of the present invention. Fig. 2B is a flow chart showing the execution steps of an operation method of the second embodiment. Figure 3A is a schematic view of a third embodiment of the present invention. Fig. 3B is a flow chart showing the execution steps of an operation method of the third embodiment. Figure 4 is a schematic view of a fourth embodiment of the present invention. [Description of main component symbols] 10, 30: storage device 20, 40: terminal device 18: fingerprint identification device 21: first terminal device 22: second terminal device 23: third terminal device 19, 219, 229, 239, 39 49: connection interface 111, 113, 116, 311: authentication program 118: preset fingerprint pattern 32: plaintext area 35: body 112, 114, 117, 312: terminal device name table 115: preset password 31: optical disc area 33: hidden area S200~S240: performing steps S300 to S340 according to an embodiment of the present invention · Step 12 of an embodiment of the present invention

Claims (1)

200928739 十、申請專利範園〗 L 種儲存裝置之使用權限管理系統,包含: 7存裝置,具有一第一連接介面與内建有一終端裝置 名稱表之一身份驗證程式;以及 其中終=裝置,具有一第二連接介面與一終端裝置名稱, 份驗證程接介面連接時,該身 稱表#:$:钒仃終端裝置認證程序以比對該終端裝置名 Ο 終端有該終端裝置名稱,並在該終端裝置名稱表具有該 2名f時,開放該儲存裝置於該終端裝置之使用權限。 理系絲如:專利範圍第1項所述之儲存裝置之使用權限管 物户壯右該終端裝置名稱表不具有該終端裝置名稱,則關閉 °亥儲存裝置於該終職置之使用權限。 理系姑如申請專利範圍第1項所述之儲存裝置之使用權限管 漆m &amp;其中更包括執行一密碼認證程序以將輸入之一使用者 =與該身份驗證程式中所内建之―職密碼進行比對;若一 ’則開放該儲存裝置於祕端裝置之使用娜:若不一致, =開放該儲存|置於該終端裝置之使用權限。 .如申睛專利範圍第1項所述之儲存裝置之使用權限管 統,更包括執行—指紋認證程序以將輸人之一使用者指紋 對·、,該身份驗證程式中所内建之一預設指紋圖案進行比 二若一致,則開放該儲存裝置於該終端裝置之使用權限;若 不一致,則不開放該儲存裝置於該終端裝置之使用權限。 5.如申請專利範圍第4項所述之儲存裝置之使用權限管 、、先,其中該儲存裝置更包含一指紋辨識裝置。 王 如申β月專利範圍第5項所述之儲存裝置之使用權限管 =系統’其中該指紋辨識裝置包括一按壓式指紋辨識裝置或一 婦描式指紋辨識裝置。 13 200928739 7. —種儲存裝置之使用權限管理方法,·包含· 提供具有—第—連接介面之一儲存裝置,_存裝置内 建具有一終端裝置名稱表之一身份驗證程式; 裝置提供具有一第二連接介面與一終端震置名稱之-終端 -連當接該八儲面該第—連接介面與鱗縣置的該第 -連接”面相連接時,使該身份驗證程錢行— Ο ❹ 以比對該終端裝置名稱表是否具有該終端裝置名 根據崎的結果決定該儲存裝置是否可在祕端裝置 上便用。 8. 如申請專利範圍第7項所述之儲存裝置之使 管 理方法’更包括於執行該終端裝置認證程序之外 證程序將輸入之一使用者密碼與該身份驗 也程式中所内建之—預設密碼進行比對;若 ;=!端裝置之使用權限;若不-致,則不== 裝置於該終端裝置之使用權限。 揮i如申請專利範圍第7項所述之儲存裝置之使用權限管 =法,更包括於執行該終端裝置認證程序之外再執行一指咬 序’以將輸入之一使用者指紋圖案與該身份驗證程式中 二Ϊ之一預設指紋圖案進行比對;若-致,則開放該儲存裝 =該終職置之❹權限;若不—致,關放該 該終端裝置之使用權限。 夏於 ι〇. 一種儲存裝置,包含: 一光碟區’儲存具有一終端裝置名稱表之一身分驗 式;以及 ^ 明文區,係被設定為隱藏狀態,並在該身分驗證程式 200928739 執行並得到預定結果之後取消隱藏狀態‘,_ 其中’該明文區被設定為隱藏狀態時無法被使用者所 用’當該明文區被取消隱藏狀態時則可供使用者進行資料 存取。 其中該儲存 11.如申請專利範圍第1〇項所述之儲存裝置, 裝置更包含一隱藏區。 ❹200928739 X. Applying for a patent garden 〗 The usage rights management system of the L storage device comprises: 7 storage device, having a first connection interface and an identity verification program having a terminal device name table built therein; and a final device; When there is a second connection interface and a terminal device name, and the verification process interface is connected, the body name table #:$: vanadium 仃 terminal device authentication program has the terminal device name than the terminal device name terminal, and When the terminal device name table has the two fs, the access authority of the storage device to the terminal device is opened. If the terminal device name table does not have the terminal device name, the system is closed. The application system is the application of the storage device for the storage device described in the first paragraph of the patent scope, m&amp;; further includes executing a password authentication program to input one of the users = and the built-in function in the authentication program The password is compared; if one's, the storage device is opened for use by the secret device: if it is inconsistent, = open the storage | placed in the terminal device. The use authority of the storage device described in item 1 of the scope of the patent application further includes an execution-fingerprint authentication program to input a fingerprint of one of the users, and one of the built-in authentication programs If the preset fingerprint pattern is consistent with the second, the access authority of the storage device to the terminal device is opened; if not, the usage permission of the storage device for the terminal device is not opened. 5. The use authority of the storage device of claim 4, wherein the storage device further comprises a fingerprint identification device. Wang Rushen's use of the storage device described in item 5 of the β patent patent range = system' wherein the fingerprint identification device comprises a push-type fingerprint recognition device or a woman-style fingerprint recognition device. 13 200928739 7. A method for managing usage rights of a storage device, comprising: providing a storage device having a first connection interface, wherein the storage device has an identity verification program having a terminal device name table; When the second connection interface is connected to the terminal-located name-terminal-connected connection, the first connection surface of the eight storage surface is connected with the first connection side of the scale county, so that the identity verification process is performed - Ο ❹ Whether or not the storage device can be used on the secret device is determined according to whether the terminal device name table has the terminal device name or not. 8. The management method for the storage device according to claim 7 of the patent application scope 'In addition to executing the terminal device authentication program, the certificate program compares one of the input user passwords with the preset password built in the program; if; the use authority of the device is; If not, then === the right to use the device in the terminal device. The use of the storage device as described in item 7 of the patent application scope is also included in the execution of the terminal. The end device authentication program executes a finger bite sequence to compare one of the input user fingerprint patterns with one of the preset fingerprint patterns of the authentication program; if so, the storage device is opened. The right of the final position; if not, the authority to use the terminal device. Xia Yu ι〇. A storage device, comprising: a CD-ROM area storage with a terminal device name table ; and ^ Mingwen District, is set to the hidden state, and after the identity verification program 200928739 is executed and the predetermined result is obtained, the hidden state ', _ where 'the plaintext area is set to the hidden state cannot be used by the user' When the plaintext area is unhidden, the user can access the data. The storage device is as described in claim 1, wherein the device further includes a hidden area. 12. 如申請專利範圍第1〇項所述之儲存裝置,其中當該儲 存裝置被插入具有一終端裝置名稱之一終端裝置時,該身分驗 證程式便會執行一終端裝置認證程序。 13. 如申請專利範圍第12項所述之儲存襞置,其中該終端 裝置認證程序係比對該終端裝置名稱表是否具有該終端裝置 名稱,若有則取消該明文區之隱藏狀態,並開放該儲存裝置於 該終端裝置之使用權限。 、 14. 如申請專利範圍第12項所述之儲存裝置,其中該身份 驗證程式在執行該終端裝置認證程序之外,更執行二密碼認證 程序以將輸人之-使用者密碼與該身份驗證程式中所内建之 -預設密碼進行比對;若—致,麻消該明文區之隱藏狀態, 並開放該儲存裝置於該終端裝置之使用權限。 15. 如申請專利範圍第12項所述之儲存裝置,其中該身份 驗證程式純行祕端裝置繼程序之外,更執行—指紋認證 =序以將輸人之_使用者指紋圖案與該身份驗證程式中所内 ,之一預設指紋圖案進行崎H,則取消該明文區之隱 藏狀態’並開放該儲存裝置於該終端裝置之使用權限。 1512. The storage device of claim 1, wherein the identity verification program executes a terminal device authentication procedure when the storage device is inserted into a terminal device having a terminal device name. 13. The storage device of claim 12, wherein the terminal device authentication program has a terminal device name than the terminal device name table, and if so, cancels the hidden state of the plaintext region and is open. The storage device has the right to use the terminal device. 14. The storage device of claim 12, wherein the authentication program executes a second password authentication program to execute the terminal-user password and the identity verification. The preset password is built in the program for comparison; if so, the hidden state of the plaintext area is eliminated, and the storage device is opened for use in the terminal device. 15. The storage device of claim 12, wherein the authentication program is executed in addition to the program, and the fingerprint authentication is performed to input the user fingerprint pattern and the identity. In the verification program, one of the preset fingerprint patterns performs the H, then cancels the hidden state of the plaintext area and opens the use permission of the storage device to the terminal device. 15
TW96151589A 2007-12-31 2007-12-31 Storage device and access authority management sys TWI358642B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96151589A TWI358642B (en) 2007-12-31 2007-12-31 Storage device and access authority management sys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96151589A TWI358642B (en) 2007-12-31 2007-12-31 Storage device and access authority management sys

Publications (2)

Publication Number Publication Date
TW200928739A true TW200928739A (en) 2009-07-01
TWI358642B TWI358642B (en) 2012-02-21

Family

ID=44864192

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96151589A TWI358642B (en) 2007-12-31 2007-12-31 Storage device and access authority management sys

Country Status (1)

Country Link
TW (1) TWI358642B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9633196B2 (en) 2014-11-26 2017-04-25 Wistron Corporation Electronic system, electronic apparatus and access authentication method thereof
TWI651624B (en) * 2017-01-25 2019-02-21 楊建綱 Smart hardware safety carrier
US10425821B2 (en) 2017-01-25 2019-09-24 Chien-Kang Yang Mobile data storage device with access control functionality
TWI791151B (en) * 2020-05-20 2023-02-01 楊建綱 Data automatic deletion method and system thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9633196B2 (en) 2014-11-26 2017-04-25 Wistron Corporation Electronic system, electronic apparatus and access authentication method thereof
TWI651624B (en) * 2017-01-25 2019-02-21 楊建綱 Smart hardware safety carrier
US10425821B2 (en) 2017-01-25 2019-09-24 Chien-Kang Yang Mobile data storage device with access control functionality
TWI791151B (en) * 2020-05-20 2023-02-01 楊建綱 Data automatic deletion method and system thereof

Also Published As

Publication number Publication date
TWI358642B (en) 2012-02-21

Similar Documents

Publication Publication Date Title
US9245130B2 (en) Multi-user universal serial bus (USB) key with customizable file sharing permissions
US9311470B2 (en) Method and system for authenticating a user
JP2008547120A (en) Biometric authentication system
KR20040070059A (en) Authentication surety and decay system and method
JP2004519791A (en) Portable device with biometrics-based authentication function
WO2001088677A2 (en) Apparatus and method for secure object access
WO2010103663A1 (en) Person authentication system and person authentication method
CN106845102A (en) Method and device for authorization of community medical and health records
TW200928739A (en) Storage device and access authority management system and method used therefor
TW201019113A (en) Authenticable USB storage device and method thereof
US20080092219A1 (en) Data storage and access facilitating techniques
CN104361275A (en) A root user login method for managing Linux systems
CN111784550B (en) Processing method, device and equipment for inherited business
US12032700B2 (en) Embedded removable boot drive
CN111163089B (en) A smart contract authority control method and system
TW200839563A (en) An authorization managing method for accessing electronic documents
CN104715175A (en) Computer system safety protection method and device
TWI788936B (en) Flash drive locked with wireless communication manner
Firozabadi et al. Revocation in the privilege calculus
TW473659B (en) Computer security protection method
CN108491712A (en) A kind of method and apparatus for hospital&#39;s classified papers safe read-write
CˇVUT Integration of a biometric user authentication in unix-like systems Josef Hajas
Lakshminarayanan et al. 1.1. 2 Applying Model Based Systems Engineering approach to Smart Grid Software Systems Security Requirements
Rath et al. Towards enforcement of purpose for privacy policy in distributed healthcare
US20080244163A1 (en) Portable data access device