[go: up one dir, main page]

TWI791151B - Data automatic deletion method and system thereof - Google Patents

Data automatic deletion method and system thereof Download PDF

Info

Publication number
TWI791151B
TWI791151B TW109116649A TW109116649A TWI791151B TW I791151 B TWI791151 B TW I791151B TW 109116649 A TW109116649 A TW 109116649A TW 109116649 A TW109116649 A TW 109116649A TW I791151 B TWI791151 B TW I791151B
Authority
TW
Taiwan
Prior art keywords
data
host device
external device
identification
application program
Prior art date
Application number
TW109116649A
Other languages
Chinese (zh)
Other versions
TW202145032A (en
Inventor
楊建綱
Original Assignee
楊建綱
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 楊建綱 filed Critical 楊建綱
Priority to TW109116649A priority Critical patent/TWI791151B/en
Publication of TW202145032A publication Critical patent/TW202145032A/en
Application granted granted Critical
Publication of TWI791151B publication Critical patent/TWI791151B/en

Links

Images

Landscapes

  • Selective Calling Equipment (AREA)
  • Channel Selection Circuits, Automatic Tuning Circuits (AREA)
  • Storage Device Security (AREA)

Abstract

本發明係關於一種資料自動刪除方法及其系統,其包括一主機裝置及一外接裝置,該主機裝置執行一應用程式與該外接裝置建立一連接狀態,且當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關聯的一第二資料,且當該主機裝置判斷與該外接裝置的該連接狀態中斷時,該主機裝置刪除該主機裝置內的第二資料。如此一來,不僅降低資料外洩的風險之外,也方便資料的保存管理,藉此達到提升資料保管安全性、使用便利性的目的。The present invention relates to a method and system for automatically deleting data, which includes a host device and an external device, the host device executes an application program and establishes a connection state with the external device, and when the host device uses the external device When there is a first data, the host device generates a second data associated with the first data in the host device according to the first data, and when the host device determines that the connection status with the external device is interrupted, The host device deletes the second data in the host device. In this way, it not only reduces the risk of data leakage, but also facilitates the storage and management of data, so as to achieve the purpose of improving the security of data storage and the convenience of use.

Description

資料自動刪除方法及其系統Data automatic deletion method and system thereof

本發明係關於一種資料自動刪除方法及其系統,尤指一種於裝置之間中斷連接時即自動刪除資料的資料自動刪除方法及其系統。 The present invention relates to a method and system for automatically deleting data, in particular to a method and system for automatically deleting data when the connection between devices is interrupted.

現今,人們習慣將資料儲存在一可攜式之外接裝置內,例如USB隨身碟、SD記憶卡、隨身硬碟或者可作為隨身碟使用的行動裝置,讓資料可以方便攜帶並可隨處使用。 Nowadays, people are accustomed to storing data in a portable external device, such as a USB flash drive, SD memory card, portable hard drive, or a mobile device that can be used as a flash drive, so that the data can be easily carried and used anywhere.

當使用者需要使用存放於該外接裝置內的資料時,會將該外接裝置與一電腦主機相連接,通過該電腦主機讀取該外接裝置內的資料。而當使用者通過該電腦主機讀取外接裝置內的資料時,該電腦主機中會存有與該資料相關的暫存檔或紀錄檔案。此外,使用者為了使該外接裝置內的資料可有效率地在該電腦裝置中執行,往往會將資料從該外接裝置中複製或轉移到該電腦主機內。 When the user needs to use the data stored in the external device, he will connect the external device with a computer host, and read the data in the external device through the computer host. And when the user reads the data in the external device through the computer host, there will be a temporary file or record file related to the data in the computer host. In addition, in order to efficiently execute the data in the external device in the computer device, the user often copies or transfers the data from the external device to the computer host.

然而,當該資料被使用完畢後,使用者容易忘記刪除儲存在該電腦主機內與該外接裝置相關的資料,導致資料容易被不肖人士所利用。 However, when the data is used up, the user tends to forget to delete the data related to the external device stored in the host computer, which makes the data easily used by unscrupulous people.

且由於國人的個資保護意識逐漸提高,如何確保外接裝置中的資料不遺留於公用電腦中,降低外接裝置中資料不被洩露的風險,勢必將成為重要的研發方向。 And as Chinese people's awareness of personal information protection is gradually increasing, how to ensure that the data in the external device is not left on the public computer and reduce the risk of the data in the external device from being leaked will inevitably become an important research and development direction.

有鑑於上述現有技術存在有當將外接裝置自電腦主機上取下時,使用者容易忘記刪除在該電腦主機裝置內與該外接裝置相關的資料,導致資料被不肖人士惡意使用的問題,本發明的主要目的係提供一種資料自動刪除方法及其系統,當一主機裝置偵測到與一外接裝置之間的連接狀態中斷時,該主機裝置自動刪除與該外接裝置相關的資料,藉此保護資料不外洩。 In view of the problem in the above-mentioned prior art that when the external device is removed from the host computer, the user tends to forget to delete the data related to the external device in the host computer device, causing the data to be used maliciously by unscrupulous persons, the present invention The main purpose of the present invention is to provide a method and system for automatically deleting data. When a host device detects that the connection status with an external device is interrupted, the host device automatically deletes the data related to the external device, thereby protecting the data. Do not leak.

為了達成上述目的所採取的一技術手段,係令前述資料自動刪除方法,係包括以下步驟:該主機裝置執行一應用程式與該外接裝置建立一連接狀態;當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關之一第二資料;當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置刪除該主機裝置中的該第二資料。 A technical means adopted in order to achieve the above purpose is to make the above-mentioned data automatically delete method, which includes the following steps: the host device executes an application program and establishes a connection state with the external device; when the host device uses the external device When there is a first data, the host device generates a second data related to the first data in the host device according to the first data; when the host device judges that the connection status with the external device is interrupted, the host device The second data in the host device is deleted.

此外,為了達成上述目的所採取的另一技術手段,係令前述資料自動刪除系統,包括:一主機裝置;及一外接裝置,連接該主機裝置;其中,該主機裝置執行一應用程式與該外接裝置建立一連接狀態;當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關之一第二資料;當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置刪除該主機裝置中的該第二資料。 In addition, another technical means adopted to achieve the above purpose is to make the aforementioned data automatic deletion system, including: a host device; and an external device connected to the host device; wherein, the host device executes an application program and the external device The device establishes a connection state; when the host device uses a first data in the external device, the host device generates a second data related to the first data in the host device according to the first data; when the When the host device determines that the connection status with the external device is interrupted, the host device deletes the second data in the host device.

本發明藉由該主機裝置判斷與該外接裝置之間的連接狀態中斷時,該主機裝置將儲存在該主機裝置中對應該第一資料的第二資料刪除,以避免因為使用者因為忘記刪除資料,造成資料被有心人士利用、盜竊等問題,藉此可提升保管資料的安全性,以及對於資料使用的便利性。 In the present invention, when the host device judges that the connection state with the external device is interrupted, the host device deletes the second data corresponding to the first data stored in the host device, so as to prevent the user from forgetting to delete the data. , causing problems such as data being used and stolen by interested people, so as to improve the security of data storage and the convenience of data use.

10:外接裝置 10: External device

11:第一通訊單元 11: The first communication unit

12:控制單元 12: Control unit

13:第一儲存單元 13: The first storage unit

20:主機裝置 20: host device

21:第二通訊單元 21: The second communication unit

22:處理單元 22: Processing unit

23:第二儲存單元 23: Second storage unit

S201~S204,S301~S306,S501~S510,S701~S712:步驟 S201~S204, S301~S306, S501~S510, S701~S712: steps

圖1係本發明較佳實施例的系統架構方塊圖。 FIG. 1 is a block diagram of the system architecture of a preferred embodiment of the present invention.

圖2係本發明較佳實施例的方法流程圖。 Fig. 2 is a flow chart of the method of the preferred embodiment of the present invention.

圖3係本發明較佳實施例的方法流程圖。 Fig. 3 is a flow chart of the method of the preferred embodiment of the present invention.

圖4A及圖4B係本發明較佳實施例的方塊示意圖。 4A and 4B are schematic block diagrams of a preferred embodiment of the present invention.

圖5A及圖5B係本發明較佳實施例的方法流程圖。 5A and 5B are method flowcharts of a preferred embodiment of the present invention.

圖6A及圖6B係本發明較佳實施例的方塊示意圖。 6A and 6B are schematic block diagrams of a preferred embodiment of the present invention.

圖7A及圖7B係本發明較佳實施例的方法流程圖。 FIG. 7A and FIG. 7B are method flowcharts of a preferred embodiment of the present invention.

圖8A及圖8B係本發明較佳實施例的方塊示意圖。 8A and 8B are schematic block diagrams of a preferred embodiment of the present invention.

關於本發明資料自動刪除系統的較佳實施例,請參考圖1所示,其包括一外接裝置10及一主機裝置20,該外接裝置10以熱插拔或無線通訊例如:Wi-Fi、藍芽(Bluetooth)等,的方式與該主機裝置20連接,其中,該外接裝置10與該主機裝置20連接時,該主機裝置20執行一應用程式與該外接裝置10建立一連接狀態,當該外接裝置10從該主機裝置20上被移除(拔下)時,則該連接狀態中斷。在本實施例中,該外接裝置10可以是一USB隨身碟、一記憶卡、一OTG隨身碟、一作為OTG隨身碟使用的行動裝置、一無線隨身碟等具有儲存資料功能的外接裝置;該主機裝置20可以是一電腦裝置。 Regarding the preferred embodiment of the automatic data deletion system of the present invention, please refer to FIG. 1, which includes an external device 10 and a host device 20. The external device 10 uses hot plugging or wireless communication such as: Wi-Fi, Bluetooth Buds (Bluetooth), etc., are connected to the host device 20, wherein, when the external device 10 is connected to the host device 20, the host device 20 executes an application program to establish a connection state with the external device 10, when the external When the device 10 is removed (unplugged) from the host device 20, the connection state is interrupted. In this embodiment, the external device 10 can be a USB flash drive, a memory card, an OTG flash drive, a mobile device used as an OTG flash drive, a wireless flash drive and other external devices with the function of storing data; The host device 20 may be a computer device.

該外接裝置10包括一第一通訊單元11、一控制單元12及一第一儲存單元13,該控制單元12連接該第一通訊單元11及該第一儲存單元13,該第一通訊單元11與該主機裝置20通訊連接,該控制單元12用以處理資訊,該第一 儲存單元13儲存一筆以上第一資料,該第一通訊單元11可以是一通用序列匯流排(Universal Serial Bus,USB)或支持Wi-Fi、Bluetooth等無線通訊介面,該控制單元12可以是一智慧晶片。 The external device 10 includes a first communication unit 11, a control unit 12 and a first storage unit 13, the control unit 12 is connected to the first communication unit 11 and the first storage unit 13, the first communication unit 11 and the first storage unit 13 The host device 20 is connected in communication, the control unit 12 is used for processing information, the first The storage unit 13 stores more than one piece of first data. The first communication unit 11 can be a Universal Serial Bus (USB) or support wireless communication interfaces such as Wi-Fi and Bluetooth. The control unit 12 can be a smart wafer.

該主機裝置20包括一第二通訊單元21、一處理單元22及一第二儲存單元23,該處理單元22連接該第二通訊單元21及該第二儲存單元23,該第二通訊單元21與該第一通訊單元11通訊連接,該處理單元22處理接收到的資訊並執行相關的應用程式,該第二儲存單元23儲存資料,該第二通訊單元21可以是一通用序列匯流排(Universal Serial Bus,USB)或支持Wi-Fi、Bluetooth等無線通訊介面,具體而言,該第二通訊單元12可與該第一通訊單元11以熱插拔或Wi-Fi、Bluetooth等無線通訊的方式連接。 The host device 20 includes a second communication unit 21, a processing unit 22 and a second storage unit 23, the processing unit 22 is connected to the second communication unit 21 and the second storage unit 23, the second communication unit 21 and the second storage unit 23 The first communication unit 11 is connected in communication, the processing unit 22 processes the received information and executes related application programs, the second storage unit 23 stores data, and the second communication unit 21 can be a Universal Serial Bus (Universal Serial Bus) Bus, USB) or support wireless communication interfaces such as Wi-Fi and Bluetooth. Specifically, the second communication unit 12 can be connected to the first communication unit 11 by hot plugging or wireless communication such as Wi-Fi and Bluetooth. .

使用上,由該資料自動刪除系統執行本發明資料自動刪除方法,請一併參閱圖2所示,該資料自動刪除方法的較佳實施例包括有以下步驟:由該主機裝置20執行該應用程式與該外接裝置10建立連接狀態(S201);當該主機裝置20使用該外接裝置10中的第一資料時,該主機裝置20根據該第一資料於該主機裝置20中產生與該第一資料相關之一第二資料(S202);由該主機裝置20判斷與該外接裝置10的連接狀態是否中斷(S203),且當該主機裝置20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20刪除該主機裝置20中的該第二資料(S204)。 In use, the automatic data deletion method of the present invention is executed by the automatic data deletion system. Please also refer to FIG. Establish a connection state with the external device 10 (S201); when the host device 20 uses the first data in the external device 10, the host device 20 generates the first data in the host device 20 according to the first data Related to a second data (S202); the host device 20 judges whether the connection status with the external device 10 is interrupted (S203), and when the host device 20 judges that the connection status with the external device 10 is interrupted, the host device The device 20 deletes the second data in the host device 20 (S204).

在本實施例中,該主機裝置20使用該外接裝置10中的該第一資料的步驟包括,該主機裝置20讀取、複製或另存該外接裝置10中的該第一資料。 In this embodiment, the step of using the first data in the external device 10 by the host device 20 includes reading, copying or saving the first data in the external device 10 by the host device 20 .

如此一來,當該主機裝置20判斷與該外接裝置10之間的連接狀態中斷時,該主機裝置20便會將儲存在該主機裝置20中對應該第一資料的第二 資料刪除,以避免因為使用者忘記刪除資料,造成資料被有心人士利用、盜竊等問題,藉此可提升保管資料的安全性,以及對於資料使用的便利性。 In this way, when the host device 20 determines that the connection status with the external device 10 is interrupted, the host device 20 will store the second data corresponding to the first data stored in the host device 20. Data deletion, to avoid problems such as data being used and stolen by malicious people due to users forgetting to delete data, so as to improve the security of data storage and the convenience of data use.

進一步的,請參閱圖3所示,該外接裝置10預存有一識別表,且該識別表記錄至少一識別比對資訊。當使用者將該外接裝置10以熱插拔方式插接在該主機裝置20上,使該第一通訊單元11與該第二通訊單元21連接,使用者透過操作使該主機裝置20執行該應用程式。當該主機裝置20的該處理單元22執行該應用程式時,該主機裝置20的該處理單元22透過該第二通訊單元21發送一識別資訊至該外接裝置10的該第一通訊單元11(S301),且該外接裝置10的控制單元12根據該識別資訊判斷接收到的識別資訊與識別表中的識別比對資訊是否相同(S302)。當該外接裝置10的控制單元12判斷該識別比對資訊與該識別資訊相同時,該外接裝置10建立與該主機裝置20的連接狀態(S303)。如圖4A所示,當使用者需要使用該第一儲存單元13內的第一資料時,該主機裝置20的該處理單元22根據該第一資料於該主機裝置20中產生與該第一資料相關的一第二資料(S304),並且儲存在該第二儲存單元23中,且該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態是否中斷(S305)。如圖4B所示,當該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態中斷時,該主機裝置20的該處理單元22即刪除該主機裝置20中的該第二資料(S306)。在本實施例中,該應用程式可以是預先安裝於該主機裝置20內,或者該應用程式可以是儲存在該外接裝置10內,當該外接裝置10與該主機裝置20連接時,該外接裝置10會將該應用程式傳送給該主機裝置20進行安裝。 Further, please refer to FIG. 3 , the external device 10 pre-stores an identification table, and the identification table records at least one identification comparison information. When the user plugs the external device 10 into the host device 20 in a hot-swappable manner, and connects the first communication unit 11 to the second communication unit 21, the user makes the host device 20 execute the application through operation. program. When the processing unit 22 of the host device 20 executes the application program, the processing unit 22 of the host device 20 sends an identification information to the first communication unit 11 of the external device 10 through the second communication unit 21 (S301 ), and the control unit 12 of the external device 10 determines whether the received identification information is the same as the identification comparison information in the identification table according to the identification information (S302). When the control unit 12 of the external device 10 determines that the identification comparison information is the same as the identification information, the external device 10 establishes a connection state with the host device 20 (S303). As shown in FIG. 4A, when the user needs to use the first data in the first storage unit 13, the processing unit 22 of the host device 20 generates the first data in the host device 20 according to the first data. A related second data (S304) is stored in the second storage unit 23, and the processing unit 22 of the host device 20 determines whether the connection status with the external device 10 is interrupted (S305). As shown in FIG. 4B, when the processing unit 22 of the host device 20 determines that the connection status with the external device 10 is interrupted, the processing unit 22 of the host device 20 deletes the second data in the host device 20 ( S306). In this embodiment, the application program can be pre-installed in the host device 20, or the application program can be stored in the external device 10, when the external device 10 is connected to the host device 20, the external device 10 will send the application program to the host device 20 for installation.

在本實施例中,該第二資料包括該第一資料的暫存檔、該第一資料的複製檔或該第一資料編輯後之檔案至少一者。 In this embodiment, the second data includes at least one of a temporary file of the first data, a copy file of the first data, or an edited file of the first data.

進一步的,該主機裝置20的該第二儲存單元23還儲存有一資料紀錄表,且該主機裝置20產生該第二資料時,該主機裝置20的該應用程式記錄 該第二資料的一位址資訊至該資料紀錄表中。而當該主機裝置20判斷該外接裝置的連接狀態中斷時,該主機裝置20的該應用程式依據該資料紀錄表中的該位址資訊刪除該第二資料。在本實施例中,該資料紀錄表記錄該第二資料的名稱、位址、建立時間等資訊。 Further, the second storage unit 23 of the host device 20 also stores a data record table, and when the host device 20 generates the second data, the application program of the host device 20 records An address information of the second data is stored in the data record table. And when the host device 20 judges that the connection status of the external device is interrupted, the application program of the host device 20 deletes the second data according to the address information in the data record table. In this embodiment, the data record table records the name, address, creation time and other information of the second data.

舉例來說,當使用者透過該主機裝置20使用該外接裝置10的該第一資料時,該主機裝置20的應用程式會記錄該第二資料儲存在該第二儲存單元23中的路徑位址,即該位址資訊(如表2所示),故當該外接裝置10與該主機裝置20的連接狀態中斷後,該主機裝置20可根據該位址資訊刪除該第二資料。 For example, when the user uses the first data of the external device 10 through the host device 20, the application program of the host device 20 will record the path address where the second data is stored in the second storage unit 23 , that is, the address information (as shown in Table 2), so when the connection between the external device 10 and the host device 20 is interrupted, the host device 20 can delete the second data according to the address information.

進一步的,當該主機裝置20產生該第二資料時,該主機裝置20的該應用程式給予該第二資料一標記。當該主機裝置20判斷與該外接裝置10的連接狀態中斷時,該主機裝置20的該應用程式依據該標記搜尋該主機裝置20中的該第二資料並刪除該第二資料。 Further, when the host device 20 generates the second data, the application program of the host device 20 gives the second data a mark. When the host device 20 determines that the connection status with the external device 10 is interrupted, the application program of the host device 20 searches for the second data in the host device 20 according to the flag and deletes the second data.

也就是說,該主機裝置20在產生該第二資料時,該主機裝置20的該應用程式可直接記錄該第二資料的該位址資訊,或是給予該第二資料該標記,用於當該主機裝置20與該外接裝置10的連接狀態中斷時,該主機裝置20的該應用程式可根據該位址資訊或是該標記找到該主機裝置20中的該第二資料,並予以刪除。 That is to say, when the host device 20 generates the second data, the application program of the host device 20 can directly record the address information of the second data, or give the second data the mark for the current When the connection between the host device 20 and the external device 10 is interrupted, the application program of the host device 20 can find the second data in the host device 20 according to the address information or the tag, and delete it.

進一步的,請參閱圖5A及圖5B所示,由於該外接裝置10與該主機裝置20可能同時被不同的使用者使用,為了有效區別不同使用者透過該主機裝置20使用該外接裝置10內的第一資料的權限,該外接裝置10的該第一資料設有一第一機密級別,且該外接裝置10的該識別表更記錄該識別比對資訊對應之一使用權限級別,如表1所示。在本實施例中,該外接裝置10的該識別比對資訊包括有一識別碼、一密碼或一電腦識別資料,且該主機裝置20發送的該識別 資訊包括有一使用者帳號及一密碼,或是一電腦識別碼,如:電腦名稱、全域唯一識別碼(GUID)或通用唯一識別碼(UUID)。 Further, please refer to FIG. 5A and FIG. 5B , since the external device 10 and the host device 20 may be used by different users at the same time, in order to effectively distinguish different users from using the host device 20 in the external device 10 The authority of the first data, the first data of the external device 10 is provided with a first confidentiality level, and the identification table of the external device 10 further records a use authority level corresponding to the identification comparison information, as shown in Table 1 . In this embodiment, the identification comparison information of the external device 10 includes an identification code, a password or a computer identification data, and the identification information sent by the host device 20 The information includes a user account and a password, or a computer identification code, such as: computer name, globally unique identifier (GUID) or universally unique identifier (UUID).

Figure 109116649-A0305-02-0008-1
Figure 109116649-A0305-02-0008-1

舉例來說,該外接裝置10可根據接收到的識別資訊中的使用者帳號及密碼,判斷是否與識別比對資訊中的識別碼及密碼相同,藉此確認該識別資訊與該識別比對資訊是否相同,而該識別資訊中的該使用者帳號及該密碼可以是由使用者透過操作該主機裝置20的該應用程式輸入的,且由該主機裝置20將使用者輸入的該識別資訊傳送到該外接裝置10。又或是該識別資訊中僅具有電腦識別碼,且該識別比對資訊的該識別碼是電腦識別資料,該外接裝置10可根據該識別資訊中的該電腦識別碼與該識別比對資訊中的該電腦識別資料判斷該識別資訊與該識別比對資訊是否相同。由於該電腦識別碼與該電腦識別資料可以是一長串亂碼構成的資料、GUID、或UUID,不易被他人盜錄,仍具有相當的機密性,故以電腦識別碼與電腦識別資料進行比對時,可無需另外設置密碼供比對驗證。 For example, the external device 10 can determine whether the user account number and password in the received identification information are the same as the identification code and password in the identification comparison information, thereby confirming the identification information and the identification comparison information Whether they are the same, and the user account number and the password in the identification information may be input by the user through the application program operating the host device 20, and the host device 20 will send the identification information entered by the user to The external device 10 . Or the identification information only has a computer identification code, and the identification code in the identification comparison information is computer identification data, the external device 10 can use the computer identification code in the identification information and the identification comparison information determine whether the identification information is the same as the identification comparison information. Since the computer identification code and the computer identification data can be a long string of garbled characters, GUID, or UUID, it is not easy to be stolen by others and still has considerable confidentiality, so the computer identification code and computer identification data are compared , there is no need to set another password for comparison and verification.

當該主機裝置20執行該應用程式時,該主機裝置20傳送該識別資訊至該外接裝置10(S501),供該外接裝置10判斷該識別資訊是否與該識別比對資訊相同(S502)。當該外接裝置10判斷該識別比對資訊與該識別資訊相同時,該外接裝置10授予該主機裝置20與該識別資訊相同的該識別比對資訊對應 的該使用權限級別(S503),且該主機裝置20建立與該外接裝置10的連接狀態(S504)。當使用者需要使用該第一儲存單元13內的第一資料時,該主機裝置20向該外接裝置10請求使用該第一資料(S505),且該外接裝置10判斷該第一資料的該第一機密級別是否低於該使用權限級別(S506)。當該外接裝置10判斷該第一機密級別比該使用權限級別低時,該外接裝置10允許該主機裝置20使用該第一資料(S507),且該主機裝置20根據允許使用的該第一資料於該主機裝置20中產生與該允許使用的第一資料相關的第二資料(S508),且該主機裝置20判斷與該外接裝置10的連接狀態是否中斷(S509)。當該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態中斷時,該主機裝置20刪除該主機裝置20中的該第二資料(S510)。 When the host device 20 executes the application program, the host device 20 sends the identification information to the external device 10 (S501), for the external device 10 to determine whether the identification information is the same as the identification comparison information (S502). When the external device 10 judges that the identification comparison information is the same as the identification information, the external device 10 grants the host device 20 the identification comparison information that is the same as the identification information. The usage authority level (S503), and the host device 20 establishes a connection state with the external device 10 (S504). When the user needs to use the first data in the first storage unit 13, the host device 20 requests the external device 10 to use the first data (S505), and the external device 10 determines the first data of the first data. Whether the confidentiality level is lower than the usage authority level (S506). When the external device 10 judges that the first confidentiality level is lower than the usage authority level, the external device 10 allows the host device 20 to use the first data (S507), and the host device 20 uses the first data according to the permitted use. Generate second data related to the permitted first data in the host device 20 (S508), and the host device 20 determines whether the connection status with the external device 10 is interrupted (S509). When the processing unit 22 of the host device 20 determines that the connection status with the external device 10 is interrupted, the host device 20 deletes the second data in the host device 20 (S510).

舉例來說,如表1及圖6A所示,若該主機裝置20的識別資訊中的使用者帳號是User456,密碼是456,則該外接裝置10可根據識別表判斷與該識別資訊相同的識別比對資訊對應的使用權限級別是3,且該外接裝置10的第一儲存單元中存有複數第一資料,分別為:一第一資料a,設置的第一機密級別是LV1;一第一資料b,設置的第一機密級別是LV2;一第一資料c,設置的第一機密級別是LV3;一第一資料d,設置的第一機密級別是LV4;因此,該外接裝置10判斷該第一機密級別比該使用權限級別低的僅有該第一資料a及該第一資料b,該外接裝置10僅允許該主機裝置20使用該第一資料a及該第一資料b。故該主機裝置20僅可根據該第一資料a及該第一資料b,於該主機裝置20中產生對應的一第二資料a及一第二資料b。且如圖6B所示,當該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態中斷時,該主機裝置20即刪除該主機裝置20中的該第二資料a及第二資料b。 For example, as shown in Table 1 and FIG. 6A, if the user account in the identification information of the host device 20 is User456 and the password is 456, then the external device 10 can determine the same identification as the identification information according to the identification table. The usage authority level corresponding to the comparison information is 3, and there are a plurality of first data stored in the first storage unit of the external device 10, which are respectively: a first data a, and the set first confidentiality level is LV1; For data b, the first confidentiality level is LV2; for first data c, the first confidentiality level is LV3; for first data d, the first confidentiality level is LV4; therefore, the external device 10 judges the Only the first data a and the first data b have a first confidentiality level lower than the usage authority level, and the external device 10 only allows the host device 20 to use the first data a and the first data b. Therefore, the host device 20 can only generate a corresponding second data a and a second data b in the host device 20 according to the first data a and the first data b. And as shown in FIG. 6B, when the processing unit 22 of the host device 20 judges that the connection status with the external device 10 is interrupted, the host device 20 deletes the second data a and the second data in the host device 20. b.

進一步的,請參閱圖7A及7B所示,該第一資料設有該第一機密級別,且該主機裝置20預設有一資料保留級別。當該主機裝置20產生該第二資 料時,該主機裝置20的該應用程式給予該第二資料一第二機密級別,該第二機密級別與該第一資料的該第一機密級別相同,且該第二機密級別記錄在該資料紀錄表中,如表2所示。當主機裝置20判斷與該外接裝置10的連線中斷,且當該主機裝置20的該應用程式判斷該第二機密級別比該資料保留級別高時,該主機裝置20的該應用程式刪除該第二資料,反之,則不刪除該第二資料。 Further, please refer to FIGS. 7A and 7B , the first data is provided with the first confidentiality level, and the host device 20 presets a data retention level. When the host device 20 generates the second data When data is provided, the application program of the host device 20 gives the second data a second confidentiality level, the second confidentiality level is the same as the first confidentiality level of the first data, and the second confidentiality level is recorded in the data record table, as shown in Table 2. When the host device 20 determines that the connection with the external device 10 is interrupted, and when the application program of the host device 20 determines that the second confidentiality level is higher than the data retention level, the application program of the host device 20 deletes the second confidentiality level. Second data, otherwise, the second data will not be deleted.

Figure 109116649-A0305-02-0010-2
Figure 109116649-A0305-02-0010-2

也就是說,當該主機裝置20執行該應用程式時,該主機裝置20傳送該識別資訊至該外接裝置10(S701),供該外接裝置10判斷該識別資訊是否與該識別比對資訊相同(S702)。當該外接裝置10判斷該識別比對資訊與該識別資訊相同時,該外接裝置10授予該主機裝置20與該識別資訊相同的該識別比對資訊對應的該使用權限級別(S703),且該主機裝置20建立與該外接裝置10的連接狀態(S704)。當使用者需要使用該第一儲存單元13內的第一資料時,該主機裝置20向該外接裝置10請求使用該第一資料(S705),且該外接裝置10判斷該第一資料的該第一機密級別是否低於該使用權限級別(S706)。當該外接裝置10判斷該第一機密級別比該使用權限級別低時,該外接裝置10允許該主機裝置20使用該第一資料(S707),且該主機裝置20根據允許使用的第一資料於該主機裝置20中產生與該允許使用的第一資料相關的第二資料(S708),且該主機裝置20判斷與該外接裝置10的連接狀態是否中斷(S709)。 That is to say, when the host device 20 executes the application program, the host device 20 sends the identification information to the external device 10 (S701), for the external device 10 to determine whether the identification information is the same as the identification comparison information ( S702). When the external device 10 determines that the identification comparison information is the same as the identification information, the external device 10 grants the host device 20 the use authority level corresponding to the identification comparison information that is the same as the identification information (S703), and the The host device 20 establishes a connection state with the external device 10 (S704). When the user needs to use the first data in the first storage unit 13, the host device 20 requests the external device 10 to use the first data (S705), and the external device 10 determines the first data of the first data. Whether the confidentiality level is lower than the usage authority level (S706). When the external device 10 judges that the first confidentiality level is lower than the usage authority level, the external device 10 allows the host device 20 to use the first data (S707), and the host device 20 uses the permitted first data in the The host device 20 generates second data related to the allowed first data (S708), and the host device 20 determines whether the connection status with the external device 10 is interrupted (S709).

進一步的,當該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態中斷時,該主機裝置20判斷該第二資料的該第二機密級別是否高於該資料保留級別(S710)。當該第二資料的該第二機密級別高於該資料保留級別時,該主機裝置20刪除該主機裝置20中的該第二資料(S711)。反之,當該第二資料的該第二機密級別不高於該資料保留級別時,則該主機裝置20不刪除該第二資料(S712)。 Further, when the processing unit 22 of the host device 20 determines that the connection status with the external device 10 is interrupted, the host device 20 determines whether the second confidentiality level of the second data is higher than the data retention level (S710) . When the second confidentiality level of the second data is higher than the data retention level, the host device 20 deletes the second data in the host device 20 (S711). On the contrary, when the second confidentiality level of the second data is not higher than the data retention level, the host device 20 does not delete the second data (S712).

舉例來說,如表1、表2及圖8A所示,若該主機裝置20預設的資料保留級別是3,且該主機裝置20的識別資訊中的使用者帳號是User123,密碼是123,則該外接裝置10可根據識別表判斷與該識別資訊相同的識別比對資訊對應的使用權限級別是LV4,且該外接裝置10的第一儲存單元中存有該第一資料a、該第一資料b、該第一資料c及該第一資料d。因此,該外接裝置10判斷該第一機密級別比該使用權限級別低的有該第一資料a、該第一資料b、該第一資料c及該第一資料d,且該外接裝置10允許該主機裝置20使用該第一資料a、該第一資料b、該第一資料c及該第一資料d。故該主機裝置20可根據該第一資料a、該第一資料b、該第一資料c及該第一資料d,於該主機裝置20中產生對應的該第二資料a、該第二資料b、該第二資料c及該第二資料d,且該第二資料a、該第二資料b、該第二資料c及該第二資料d的第二資料機密級別分別與該第一資料a、該第一資料b、該第一資料c及該第一資料d的該第一機密級別相同,分別為LV1、LV2、LV3、LV4。 For example, as shown in Table 1, Table 2 and FIG. 8A, if the default data retention level of the host device 20 is 3, and the user account in the identification information of the host device 20 is User123, and the password is 123, Then the external device 10 can judge according to the identification table that the use authority level corresponding to the identification comparison information identical to the identification information is LV4, and the first storage unit of the external device 10 stores the first data a, the first data b, the first data c and the first data d. Therefore, the external device 10 judges that the first data a, the first data b, the first data c, and the first data d have the first confidentiality level lower than the authorization level, and the external device 10 allows The host device 20 uses the first data a, the first data b, the first data c and the first data d. Therefore, the host device 20 can generate the corresponding second data a, the second data b. The second data c and the second data d, and the second data confidentiality levels of the second data a, the second data b, the second data c and the second data d are respectively the same as the first data a. The first confidentiality levels of the first data b, the first data c, and the first data d are the same, which are LV1, LV2, LV3, and LV4, respectively.

且如圖8B所示,當該主機裝置20的該處理單元22判斷與該外接裝置10的連接狀態中斷時,該主機裝置20判斷該第二資料的第二機密級別高於該資料保留級別的僅有該第二資料d,因此,該主機裝置20僅刪除該主機裝置20中的該第二資料d,且不刪除該第二資料的第二機密級別不高於該資料保留級別的該第二資料a、該第二資料b及該第二資料c。 And as shown in FIG. 8B, when the processing unit 22 of the host device 20 determines that the connection status with the external device 10 is interrupted, the host device 20 determines that the second confidentiality level of the second data is higher than that of the data retention level. There is only the second data d, therefore, the host device 20 only deletes the second data d in the host device 20, and does not delete the second data whose second confidentiality level is not higher than the data retention level. Two data a, the second data b and the second data c.

綜上所述,本發明提供的資料自動刪除方法及其系統,連接外接裝置於主機裝置以使用外接裝置的資料時,不需擔心外接裝置的重要資料遺留在主機裝置造成資料外流的問題,符合各國對於重要資料保管規範的趨勢,特別是,可實現歐盟一般資料保護規範(GDPR)的資料被遺忘權。於一實施例,更可藉由識別資訊授予使用權限級別及建立主機裝置與外接裝置的連線狀態,增加連線及資料使用的安全層級。於一實施例,可依據資料機密級別與主機裝置的資料保留級別判斷主機裝置中相關資料的去留,僅刪除機密層級較高的資料而保留機密性較低的資料,增加資料刪除與保留的彈性。 To sum up, the data automatic deletion method and system provided by the present invention, when connecting the external device to the host device to use the data of the external device, there is no need to worry about the important data of the external device being left on the host device and causing data outflow. Trends in the regulation of important data storage in various countries, in particular, the right to be forgotten under the EU General Data Protection Regulation (GDPR). In one embodiment, the security level of the connection and data usage can be increased by granting the use authority level to the identification information and establishing the connection status between the host device and the external device. In one embodiment, it is possible to determine whether relevant data in the host device should be retained or not based on the data confidentiality level and the data retention level of the host device, and only delete data with a higher confidentiality level while retaining data with a lower confidentiality, increasing the risk of data deletion and retention. elasticity.

惟以上所述者,僅為本發明之實施例,當不能以此限定本發明實施之範圍,凡依本發明申請專利範圍及專利說明書內容所作之簡單的等效變化與修飾,皆仍屬本發明專利涵蓋之範圍內。 But the above-mentioned ones are only embodiments of the present invention, and should not limit the scope of the present invention. All simple equivalent changes and modifications made according to the patent scope of the present invention and the content of the patent specification are still within the scope of this invention. within the scope of invention patents.

10:外接裝置10: External device

11:第一通訊單元11: The first communication unit

12:控制單元12: Control unit

13:第一儲存單元13: The first storage unit

20:主機裝置20: host device

21:第二通訊單元21: The second communication unit

22:處理單元22: Processing unit

23:第二儲存單元23: Second storage unit

Claims (10)

一種資料自動刪除方法,包括以下步驟:一主機裝置執行一應用程式與一外接裝置建立一連接狀態;當該主機裝置使用該外接裝置中的一第一資料時,該主機裝置根據該第一資料於該主機裝置中產生與該第一資料相關之一第二資料;當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置刪除該主機裝置中的該第二資料。 A method for automatically deleting data, comprising the following steps: a host device executes an application program to establish a connection state with an external device; when the host device uses a first data in the external device, the host device A second data related to the first data is generated in the host device; when the host device judges that the connection state with the external device is interrupted, the host device deletes the second data in the host device. 如請求項1所述之資料自動刪除方法,其中,該外接裝置預存一識別表,該識別表記錄至少一識別比對資訊;其中,當該主機裝置執行該應用程式時,該主機裝置傳送一識別資訊至該外接裝置,且當該外接裝置判斷該識別比對資訊與該識別資訊相同時,該外接裝置建立與該主機裝置之連接狀態。 The method for automatically deleting data as described in claim 1, wherein the external device pre-stores an identification table, and the identification table records at least one identification comparison information; wherein, when the host device executes the application program, the host device sends a The identification information is sent to the external device, and when the external device determines that the identification comparison information is the same as the identification information, the external device establishes a connection state with the host device. 如請求項2所述之資料自動刪除方法,其中,該第一資料設有一第一機密級別,且該識別表更記錄該識別比對資訊對應之一使用權限級別;其中,當該外接裝置判斷該識別比對資訊與該識別資訊相同時,該外接裝置授予該主機裝置與該識別資訊相同的該識別比對資訊對應的該使用權限級別;其中,當該外接裝置判斷該第一機密級別比該使用權限級別低時,該外接裝置允許該主機裝置使用該第一資料。 The method for automatically deleting data as described in claim 2, wherein the first data is provided with a first confidentiality level, and the identification table further records a usage authority level corresponding to the identification comparison information; wherein, when the external device judges When the identification comparison information is the same as the identification information, the external device grants the host device the use authority level corresponding to the identification comparison information that is the same as the identification information; wherein, when the external device determines that the first confidentiality level is higher than When the usage authority level is low, the external device allows the host device to use the first data. 如請求項1所述之資料自動刪除方法,其中,該主機裝置存有一資料紀錄表;其中,當該主機裝置產生該第二資料時,該主機裝置的該應用程式記錄該第二資料的一位址資訊至該資料紀錄表中; 其中,當主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置的該應用程式依據該資料紀錄表中的該位址資訊刪除該第二資料。 The method for automatically deleting data as described in claim 1, wherein the host device stores a data record table; wherein, when the host device generates the second data, the application program of the host device records a part of the second data address information into the data record table; Wherein, when the host device determines that the connection status with the external device is interrupted, the application program of the host device deletes the second data according to the address information in the data record table. 如請求項1所述之資料自動刪除方法,其中,當該主機裝置產生該第二資料時,該主機裝置的該應用程式給予該第二資料一標記;其中,當該主機裝置判斷與該外接裝置的連接狀態中斷時,該主機裝置的該應用程式依據該標記搜尋該主機裝置中的該第二資料並刪除該第二資料。 The method for automatically deleting data as described in claim 1, wherein, when the host device generates the second data, the application program of the host device gives a mark to the second data; wherein, when the host device judges that the external When the connection state of the device is interrupted, the application program of the host device searches for the second data in the host device according to the mark and deletes the second data. 如請求項4或5所述之資料自動刪除方法,其中,該第一資料設有一第一機密級別,且該主機裝置預設有一資料保留級別;其中,當該主機裝置產生該第二資料時,該主機裝置的該應用程式給予該第二資料一第二機密級別,該第二機密級別與該第一資料的該第一機密級別相同;其中,當主機裝置判斷與該外接裝置的連線中斷,且當該主機裝置的該應用程式判斷該第二機密級別比該資料保留級別高時,該主機裝置的該應用程式刪除該第二資料。 The method for automatically deleting data as described in claim 4 or 5, wherein the first data is provided with a first confidentiality level, and the host device presets a data retention level; wherein, when the host device generates the second data , the application program of the host device gives the second data a second confidentiality level, and the second confidentiality level is the same as the first confidentiality level of the first data; wherein, when the host device determines that the connection with the external device interrupt, and when the application program of the host device determines that the second confidentiality level is higher than the data retention level, the application program of the host device deletes the second data. 如請求項1所述之資料自動刪除方法,其中,該主機裝置使用該外接裝置中的該第一資料的步驟包括,該主機裝置讀取、複製或另存該外接裝置中的該第一資料。 The method for automatically deleting data as described in Claim 1, wherein the step of using the first data in the external device by the host device includes reading, copying or saving the first data in the external device by the host device. 如請求項1至5及7中任一項所述之資料自動刪除方法,其中,該第二資料包括該第一資料的暫存檔、該第一資料的複製檔或該第一資料編輯後之檔案至少一者。 The method for automatically deleting data as described in any one of claims 1 to 5 and 7, wherein the second data includes a temporary file of the first data, a copy file of the first data, or an edited file of the first data At least one file. 如請求項6所述之資料自動刪除方法,其中,該第二資料包括該第一資料的暫存檔、該第一資料的複製檔或該第一資料編輯後之檔案至少一者。 The method for automatically deleting data as described in Claim 6, wherein the second data includes at least one of a temporary file of the first data, a copy file of the first data, or an edited file of the first data. 一種資料自動刪除系統,包括: 一主機裝置及一外接裝置;其中,該主機裝置與該外接裝置執行如請求項1至9中任一項所述之資料自動刪除方法。 An automatic data deletion system, including: A host device and an external device; wherein, the host device and the external device execute the method for automatically deleting data as described in any one of claims 1-9.
TW109116649A 2020-05-20 2020-05-20 Data automatic deletion method and system thereof TWI791151B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW109116649A TWI791151B (en) 2020-05-20 2020-05-20 Data automatic deletion method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109116649A TWI791151B (en) 2020-05-20 2020-05-20 Data automatic deletion method and system thereof

Publications (2)

Publication Number Publication Date
TW202145032A TW202145032A (en) 2021-12-01
TWI791151B true TWI791151B (en) 2023-02-01

Family

ID=80783875

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109116649A TWI791151B (en) 2020-05-20 2020-05-20 Data automatic deletion method and system thereof

Country Status (1)

Country Link
TW (1) TWI791151B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200928739A (en) * 2007-12-31 2009-07-01 Fineart Technology Co Ltd Storage device and access authority management system and method used therefor
TW201137659A (en) * 2010-04-28 2011-11-01 Nexcom Int Co Ltd Data deleting method for computer storage device
TW201602831A (en) * 2014-07-03 2016-01-16 Apacer Technology Inc Data storage system with information security protection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200928739A (en) * 2007-12-31 2009-07-01 Fineart Technology Co Ltd Storage device and access authority management system and method used therefor
TW201137659A (en) * 2010-04-28 2011-11-01 Nexcom Int Co Ltd Data deleting method for computer storage device
TW201602831A (en) * 2014-07-03 2016-01-16 Apacer Technology Inc Data storage system with information security protection

Also Published As

Publication number Publication date
TW202145032A (en) 2021-12-01

Similar Documents

Publication Publication Date Title
CN100580642C (en) Universal serial bus storage device and its access control method
CN102227733B (en) Method and apparatus for providing access to files based on user identity
US10650158B2 (en) System and method for secure file access of derivative works
CN103518196B (en) The messaging device of management secret information and method
CN105493054A (en) Fast data protection using dual file systems
JP6949338B2 (en) Electronic data management equipment, electronic data management system, programs and recording media for that purpose
US20160253509A1 (en) Implementing file security settings based on context
CN106682186A (en) File access control list (ACL) management method and related device and system
CN108108633A (en) A kind of data file and its access method, device and equipment
CN112463805B (en) Key management device and processor chip for data encryption and decryption
WO2019161582A1 (en) Mobile storage device and encryption method and apparatus therefor
CN117413267A (en) Firmware policy enforcement via security processor
CN104794390A (en) Linkman information access control method and device
CN110851795B (en) File management method, device, equipment and readable storage medium
TWI791151B (en) Data automatic deletion method and system thereof
WO2020238376A1 (en) Processing method for file data and solid-state drive
CN102780729B (en) Method for providing remote access and communication device thereof
JP2009169868A (en) Storage area access device and storage area access method
TW201830284A (en) Data storage system, data storage method and data read method
US20250384151A1 (en) Method to prevent data theft from a storage device
US11841771B1 (en) Data auto-backup system
KR101161686B1 (en) Memory device with security function and security method thereof
JP2010146300A (en) Apparatus, system, program and method for information management
JP4388040B2 (en) Unauthorized connection prevention system, unauthorized connection prevention method, user terminal, and program for user terminal
CN101770431A (en) Storage device capable of authentication and data protection method