[go: up one dir, main page]

TWI727717B - Data security system with encryption and method for its operation - Google Patents

Data security system with encryption and method for its operation Download PDF

Info

Publication number
TWI727717B
TWI727717B TW109109809A TW109109809A TWI727717B TW I727717 B TWI727717 B TW I727717B TW 109109809 A TW109109809 A TW 109109809A TW 109109809 A TW109109809 A TW 109109809A TW I727717 B TWI727717 B TW I727717B
Authority
TW
Taiwan
Prior art keywords
data
mobile device
user
authentication
security system
Prior art date
Application number
TW109109809A
Other languages
Chinese (zh)
Other versions
TW202029042A (en
Inventor
蘭夫M 巴露丁
艾力克 雷墨爾
馬可 辛爾
Original Assignee
美商克萊夫公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/987,749 external-priority patent/US10181055B2/en
Application filed by 美商克萊夫公司 filed Critical 美商克萊夫公司
Publication of TW202029042A publication Critical patent/TW202029042A/en
Application granted granted Critical
Publication of TWI727717B publication Critical patent/TWI727717B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Alarm Systems (AREA)

Abstract

A data storage device, and a method thereof, comprises: a memory; an interface controller for communications through a data channel that is locked until a user is authenticated; a wireless transceiver for radiofrequency communications outside the data channel, the wireless transceiver being configured for receiving user authentication input; an authentication subsystem having authentication information and an encryption key, the authentication subsystem unlocking the data channel of the data storage device based on the received user authentication input and the authentication information; and an encryption engine for encrypting, with the encryption key, data received through the data channel before storing the encrypted data in the memory, and for decrypting, with the encryption key, data read from the memory before sending the decrypted data through the data channel.

Description

具有加密性的資料保全系統及其操作方法 Encrypted data preservation system and operation method thereof 相關申請案之交互參照Cross-reference of related applications

本案為2010年3月29日提出之同時待審的美國專利申請號12/680,742之部分連續案,本案為2008年9月26日提出之國際申請號PCT/US2008/077766的國家階段,本案主張2007年9月27日提出之美國臨時專利申請序號60/975,814之優惠,並且該臨時專利申請之專利標的在此併入參考。 This case is a partial continuous case of the U.S. Patent Application No. 12/680,742 filed on March 29, 2010, which is pending at the same time. This case is the national phase of the International Application No. PCT/US2008/077766 filed on September 26, 2008. This case claims The U.S. Provisional Patent Application Serial No. 60/975,814 filed on September 27, 2007 has a discount, and the patent subject matter of the provisional patent application is incorporated herein by reference.

本專利申請含有由Lev M.Bolotin和Simon B.Johnson所同時提出之標題為”具有加密性的資料保全系統”之美國專利申請之相關的專利標的。該相關的申請係指定給ClevX,LLC並且以案卷編號502-018P-PCT-US.C1所標識。該美國專利申請之專利標的在此併入參考。 This patent application contains the relevant patent subject matter of the US patent application titled "Encrypted Data Security System" filed by Lev M. Bolotin and Simon B. Johnson at the same time. The related application is assigned to ClevX, LLC and identified with the file number 502-018P-PCT-US.C1. The patent subject matter of the U.S. patent application is incorporated herein by reference.

本發明大致係關於電子裝置,並且尤其係關於記憶體裝置。 The present invention generally relates to electronic devices, and particularly relates to memory devices.

保全是幾乎所有方面的電腦使用之關鍵性問題。儲存媒介(例如連結至電腦之硬碟)含有有價值的資訊,該資訊易於受到資料竊取。大量的金錢及努力是應用在保護個人、企業及政府保全資訊。 Security is a key issue in almost all aspects of computer use. The storage medium (such as a hard disk connected to a computer) contains valuable information that is vulnerable to data theft. A lot of money and efforts are used to protect personal, corporate and government information.

當可攜式記憶體儲存裝置已經變得更小、更容易遺失、更無處不在、更便宜及更大的記憶體容量時,也會造成極大的保全問題。現在能夠秘密地下載大量的資訊至可攜式記憶體儲存裝置內,諸如萬用序列匯流排(USB,Universal Serial Bus)快閃及微型隨身碟、行動電話、攝像機、數位相機、iPOD、MP3/4播放器、智慧手機、掌上及膝上電腦、遊戲設備、認證器、代幣(含有記憶體)等等-通常為,大量儲存裝置(MSD,mass storage device)。 When portable memory storage devices have become smaller, easier to lose, more ubiquitous, cheaper, and have greater memory capacity, it will also cause great security problems. Now it is possible to secretly download a large amount of information to portable memory storage devices, such as Universal Serial Bus (USB, Universal Serial Bus) flash and micro flash drives, mobile phones, camcorders, digital cameras, iPOD, MP3/ 4 Players, smart phones, palm and laptop computers, gaming equipment, authenticators, tokens (including memory), etc.-usually, mass storage device (MSD, mass storage device).

具體而言,有數以百萬計的MSD是使用於備份、轉移、中間儲存器及主儲存器,以供資訊能夠輕易地由電腦下載並帶走。任何MSD之主要目的係在於儲存及提取「可攜式內容」,該「可攜式內容」是僅限於特定所有者而非特定電腦之資料及資訊。 Specifically, there are millions of MSDs used in backup, transfer, intermediate storage and main storage, so that information can be easily downloaded and taken away by the computer. The main purpose of any MSD is to store and retrieve "portable content". The "portable content" is data and information restricted to a specific owner rather than a specific computer.

提供儲存保全之最常見的手法是使用電腦輸入之密碼來認證該使用者。密碼是對照MSD儲存的數值而有效。若發生匹配,則該磁碟機將開啟。或者,該密碼本身是使用作為加密金鑰,用以加密/解密儲存至該MSD內之資料。 The most common method of providing storage security is to use a password entered by a computer to authenticate the user. The password is valid against the value stored in the MSD. If a match occurs, the drive will turn on. Alternatively, the password itself is used as an encryption key to encrypt/decrypt the data stored in the MSD.

對於支援動態加密之磁碟機,該加密金鑰通常以加密的形式儲存於該媒介上。由於該加密金鑰儲存於該媒介上,所以對於有意規避標準介面而直接讀取該媒介之人士將變得容易取用。因此,密碼是使用作為加密該加密金鑰之金鑰。 For disk drives that support dynamic encryption, the encryption key is usually stored on the medium in an encrypted form. Since the encryption key is stored on the medium, it will become easy for those who intend to circumvent the standard interface and read the medium directly. Therefore, the password is used as the key to encrypt the encryption key.

對於自我認證的磁碟機,本身的認證次系統是負責用於維持保全。並不需要依賴該磁碟機所連接之主機電腦。因此,密碼無法(或者不需要)由該主機發送藉以解鎖該MSD。事實上,該加密金鑰不再需要儲存在該媒介上。該認證次系統變成用於管理加密金鑰之工具。 For self-certified drives, its own certification subsystem is responsible for maintaining security. There is no need to rely on the host computer to which the drive is connected. Therefore, the password cannot (or does not need to) be sent by the host to unlock the MSD. In fact, the encryption key no longer needs to be stored on the medium. The authentication subsystem becomes a tool for managing encryption keys.

因此,仍然存在用於改良保全之需求。鑑於不斷增加的商業化競爭壓力,結合不斷成長的消費者期望及對於在市場上有意義的產品差異化之該逐漸減少的機會,關鍵在於找到這些問題的答案。此外,降低成本、改善效率及效能及滿足競爭壓力之需求,對於找到這些問題的答案之關鍵必要性甚至增加了更大的急迫性。 Therefore, there is still a need for improved preservation. In view of the ever-increasing commercial competition pressure, combined with growing consumer expectations and the diminishing opportunities for meaningful product differentiation in the market, the key lies in finding answers to these questions. In addition, the need to reduce costs, improve efficiency and performance, and meet competitive pressures has even increased the urgency of the key necessity to find answers to these questions.

習知該領域者已經長期尋求對於這些問題之解決方法但是先前的開發並未教導或建議任何解決方案,因此,熟習該項技藝之人士已經長期對於這些問題之解決方法束手無策。 Those who are familiar with the field have been seeking solutions to these problems for a long time, but the previous developments have not taught or suggested any solutions. Therefore, those who are familiar with the art have long been at a loss for solutions to these problems.

本發明提供一種方法,包含:偵測具有上鎖之資料通道的資料儲存裝置的連接,該資料儲存裝置進一步包括:一介面控制器,係用以透過資料通道通訊;一記憶體;一認證次系統,其具有認證資訊及加密金鑰;一加密引擎;及一無線收發器,係用於該資料通道外部之射頻通訊;經由該無線收發器,在通過該介面控制器的該資料通道上鎖時,接收使用者認證輸入;依據被接收之該使用者認證輸入及該認證次系統的該認證資訊,解鎖該資料儲 存裝置的該資料通道;以及在該資料通道被解鎖時:在儲存加密資料於該記憶體中之前,透過加密金鑰加密透過該資料通道接收的資料;及在透過該資料通道發送解密資料之前,透過該加密金鑰解密讀取來自該記憶體的資料。 The present invention provides a method including: detecting the connection of a data storage device with a locked data channel, the data storage device further comprising: an interface controller for communicating through the data channel; a memory; and an authentication time A system with authentication information and encryption keys; an encryption engine; and a wireless transceiver for radio frequency communication outside the data channel; through the wireless transceiver, the data channel through the interface controller is locked When the user authentication input is received; according to the received user authentication input and the authentication information of the authentication sub-system, the data storage is unlocked The data channel of the storage device; and when the data channel is unlocked: before storing the encrypted data in the memory, encrypt the data received through the data channel with the encryption key; and before sending the decrypted data through the data channel , Decrypt and read the data from the memory through the encryption key.

本發明提供一種資料儲存裝置,包含:一記憶體;一介面控制器,係用於透過資料通道進行通訊,該資料通道係上鎖直到使用者獲得授權;一無線收發器,係用於該資料通道外部之射頻通訊,該無線收發器係組構以接收使用者認證輸入;一認證次系統,其具有認證資訊及加密金鑰,依據被接收之該使用者認證輸入及該認證資訊,解鎖該資料儲存裝置的該資料通道;以及一加密引擎,在儲存加密資料於該記憶體中之前,透過加密金鑰加密經由該資料通道接收的資料,及在透過該資料通道發送解密資料之前,透過該加密金鑰解密讀取來自該記憶體的資料。 The present invention provides a data storage device, including: a memory; an interface controller for communicating through a data channel that is locked until the user is authorized; and a wireless transceiver for the data For radio frequency communication outside the channel, the wireless transceiver is configured to receive user authentication input; an authentication sub-system has authentication information and encryption key, and unlocks the user authentication input and authentication information based on the received user authentication input and authentication information. The data channel of the data storage device; and an encryption engine that encrypts the data received through the data channel with the encryption key before storing the encrypted data in the memory, and transmits the decrypted data through the data channel before sending the decrypted data through the data channel. The encryption key decrypts and reads the data from the memory.

本發明提供一種系統,包括:一或更多個電腦處理器;資料通道,係連接於該一或更多個電腦處理器;以及自我加密裝置,係連接於該資料通道,該自我加密裝置包括:一認證次系統,係包括一認證處理器;一加密引擎;一儲存媒介,係儲存加密資料,該加密資料係由該認證次系統提供之加密金鑰所加密;一射頻(RF,radio frequency)收發器,係與該資料通道外部通訊;及一介面控制器的一資料介面,係耦接於該資料通道,該資料介面自發送及接收資料上鎖直至該自我加密裝置經由該認證次系統透過該RF收發器接收的使用者認證資訊解鎖。 The present invention provides a system including: one or more computer processors; a data channel connected to the one or more computer processors; and a self-encrypting device connected to the data channel, the self-encrypting device including : An authentication subsystem includes an authentication processor; an encryption engine; a storage medium for storing encrypted data, which is encrypted by an encryption key provided by the authentication subsystem; a radio frequency (RF, radio frequency) ) The transceiver communicates with the data channel externally; and a data interface of an interface controller is coupled to the data channel. The data interface is locked from sending and receiving data until the self-encrypting device passes the authentication sub-system The user authentication information received through the RF transceiver is unlocked.

本發明提供一種方法,包括:提供自我加密裝置於主機電腦系統,該主機電腦系統進一步具有一或更多個處理器及一資料通道,該資料通道係連接於該一或更多個處理器以及連接於該自我加密裝置;建立通訊通道於該自我加密裝置的資料介面與該資料通道之間,該通訊通道被上鎖直至該自我加密裝置被授權;經由該自我加密裝置的射頻(RF,radio frequency)收發器用於該資料通道外部的通訊以接收使用者認證資訊;由該自我加密裝置的認證次系統依據該使用者認證資訊解鎖該通訊通道;藉由該自我加密裝置透過該資料介面接收經由該自我加密裝置的該認證次系統提供具有加密金鑰的加密資料;以及儲存該加密資料於該自我加密裝置的儲存次系統中。 The present invention provides a method including: providing a self-encrypting device in a host computer system, the host computer system further has one or more processors and a data channel, the data channel is connected to the one or more processors and Connect to the self-encrypting device; establish a communication channel between the data interface of the self-encrypting device and the data channel, the communication channel is locked until the self-encrypting device is authorized; through the self-encrypting device's radio frequency (RF, radio frequency) The transceiver is used for communication outside the data channel to receive user authentication information; the authentication subsystem of the self-encrypting device unlocks the communication channel according to the user authentication information; and the self-encrypting device receives via the data interface The authentication sub-system of the self-encrypting device provides encrypted data with an encryption key; and the encrypted data is stored in the storage sub-system of the self-encrypting device.

除了或替代上述提到的目的之外,本發明之特定實施例具有其它目的。當參考附加圖式時,該目的對於熟習該項技藝之人士在閱讀該下列的詳細說明將變得顯而易見。 In addition to or instead of the above-mentioned purposes, the specific embodiments of the present invention have other purposes. When referring to the attached drawings, the purpose will become obvious to those who are familiar with the art after reading the following detailed description.

100:資料保全系統 100: Data Protection System

102:外部通訊通道 102: External communication channel

104:認證次系統 104: certification sub-system

106:儲存次系統 106: storage system

108:介面控制器 108: Interface Controller

110:加密引擎 110: encryption engine

112:儲存媒介 112: storage medium

114:認證控制器 114: Certified Controller

116:加密金鑰 116: Encryption key

118:認證金鑰 118: authentication key

120:主機電腦系統 120: host computer system

122:使用者 122: User

202:使用者身份識別 202: user identification

206:通道 206: Channel

300:資料保全系統 300: Data Security System

301:通訊組合 301: Communication combination

302:行動收發器 302: mobile transceiver

304:使用者身份識別 304: user identification

306:資料保全收發器 306: Data Security Transceiver

310:認證次系統 310: Certification sub-system

320:生物識別感測器 320: biometric sensor

322:生物識別輸入 322: Biometric input

330:電機輸入機制 330: Motor input mechanism

332:唯一碼 332: unique code

400:資料保全系統 400: Data Protection System

402:主機應用程式 402: host application

406:主機識別碼 406: Host ID

408:認證次系統 408: authentication system

500:資料保全方法 500: Data preservation method

502:步驟方塊 502: Step Block

504:步驟方塊 504: Step Block

506:步驟方塊 506: Step Block

600:資料保全通訊系統 600: Data Security Communication System

610:行動裝置 610: mobile device

612:行動收發器 612: mobile transceiver

614:天線 614: Antenna

618:資料保全系統應用程式 618: Data Protection System Application

620:資料保全系統 620: Data Security System

622:天線 622: Antenna

624:資料保全收發器 624: Data Security Transceiver

626:保全控制器 626: Security Controller

630:主機電腦 630: host computer

640:伺服器/控制台 640: Server/Control Panel

642:使用者管理資料庫 642: User Management Database

650:雲端 650: Cloud

700:連接 700: Connect

706:資料保全系統連接、啟動及發現操作 706: Data preservation system connection, activation and discovery operations

712:確認:資料保全系統解鎖訊號 712: Confirmation: Data security system unlock signal

714:管理者操作 714: Manager Operation

716:設定其它限制操作 716: Set other restricted operations

800:資料保全系統應用程式啟動操作 800: Data security system application start operation

802:行動裝置ID解鎖訊號 802: Mobile device ID unlock signal

804:資料保全系統解鎖操作 804: Data Security System Unlocking Operation

806:確認:資料保全系統解鎖操作 806: Confirmation: Data preservation system unlock operation

900:輸入使用者名稱/密碼操作 900: Input user name/password operation

902:確認使用者ID訊號 902: Confirm user ID signal

904:使用者名稱/密碼有效判定 904: User name/password valid judgment

906:有效使用者訊號 906: valid user signal

908:輸入PIN操作 908: Input PIN operation

910:確認解鎖訊號 910: Confirm unlock signal

912:使用者授權判定 912: User authorization determination

914:解鎖允許訊號 914: Unlock allow signal

916:解鎖請求訊號 916: Unlock request signal

1000:解鎖特定資料保全系統操作 1000: Unlock specific data security system operations

1002:獲得的位置及/或目前的時間操作 1002: Obtained position and/or current time operation

1004:確認解鎖訊號 1004: Confirm unlock signal

1006:條件符合判定 1006: The condition meets the judgment

1008:解鎖允許訊號 1008: Unlock allow signal

1010:確認解鎖訊號 1010: Confirm unlock signal

1012:資料保全系統允許判定 1012: Data preservation system allows judgment

1100:任何指令等待訊號 1100: Any command is waiting for a signal

1102:重置指令判定 1102: Reset command judgment

1104:執行重置訊號 1104: Perform reset signal

1106:重置保全糸統訊號 1106: Reset the security system signal

1108:資料保全系統重置操作 1108: Data security system reset operation

1110:確認:資料保全系統重置訊號 1110: Confirmation: Data security system reset signal

1112:確認:資料保全系統重置操作 1112: Confirmation: Data preservation system reset operation

1200:解鎖 1200: Unlock

1202:管理者的密碼解鎖訊號 1202: Administrator's password unlock signal

1204:管理者的密碼解鎖訊號 1204: Administrator's password unlock signal

1300:變更密碼判定 1300: Change password judgment

1302:變更使用者密碼訊號 1302: Change user password signal

1304:變更使用者密碼訊號 1304: Change user password signal

第1圖為依據本發明之實施例之資料保全系統之示意圖; Figure 1 is a schematic diagram of a data security system according to an embodiment of the present invention;

第2圖為使用該資料保全系統之認證金鑰交付方法之說明; Figure 2 is an illustration of the authentication key delivery method using the data security system;

第3圖為用於讓該使用者與該資料保全系統互動之不同系統之說明; Figure 3 is an illustration of different systems for the user to interact with the data protection system;

第4圖為該使用者如何能夠使用該主機電腦 系統以與資料保全系統互動之說明;以及 Figure 4 shows how the user can use the host computer Instructions for the system to interact with the data security system; and

第5圖為使用用於該資料保全系統之使用者確認之資料保全方法。 Figure 5 shows the data preservation method used for the user confirmation of the data preservation system.

第6圖為例示性的資料保全通訊系統。 Figure 6 is an exemplary data security communication system.

第7圖為顯示在行動裝置與該資料保全系統之間之操作的順序之管理者排序圖。 Figure 7 is an administrator sequence diagram showing the sequence of operations between the mobile device and the data preservation system.

第8圖為該行動裝置是認證因素之解鎖排序圖。 Figure 8 is an unlock sequence diagram of the mobile device being an authentication factor.

第9圖為顯示由該行動裝置使用PIN輸入而解鎖之解鎖排序圖。 Figure 9 is an unlock sequence diagram showing the unlocking sequence of the mobile device using PIN input.

第10圖為經由該伺服器/控制台使用PIN輸入及使用者ID/位置/時間確認而解鎖之解鎖排序圖。 Figure 10 is an unlock sequence diagram of unlocking through the server/controller using PIN input and user ID/location/time confirmation.

第11圖為顯示使用伺服器/控制台重置該資料保全系統之重置排序圖。 Figure 11 shows the reset sequence diagram of using the server/controller to reset the data security system.

第12圖為顯示使用該伺服器/控制台解鎖該資料保全系統之解鎖排序圖。 Figure 12 is a diagram showing the unlock sequence of using the server/controller to unlock the data security system.

第13圖為使用該伺服器/控制台之改變使用者的密碼排序圖。 Figure 13 is a sequence diagram of changing the user's password using the server/controller.

下列實施例將以充分詳細的方式作描述以使得熟悉該項技藝之人士製作及使用本發明。應該瞭解的是,其它實施例依據本發明揭露將是顯而易見的,並且可在不違反本發明之範疇的情況下對系統、製程或機構做出改變。 The following embodiments will be described in sufficient detail to enable those skilled in the art to make and use the present invention. It should be understood that other embodiments will be obvious according to the disclosure of the present invention, and changes can be made to the system, manufacturing process, or mechanism without violating the scope of the present invention.

在下列的描述中,將給定各種特定的細節以提供本發明之完整的瞭解。然而,將顯而易見的是,本發明可以在未具有這些特定的細節下而實施。為了避免模糊本發明,某些已知的電路、系統配置及製程步驟並未做詳細揭露。 In the following description, various specific details are given to provide a complete understanding of the present invention. However, it will be apparent that the present invention can be implemented without these specific details. In order to avoid obscuring the present invention, some known circuits, system configurations and process steps have not been disclosed in detail.

同樣地,該系統之顯示實施例之圖式為半圖解及未按照比例,並且尤其,某些尺寸是為了明確呈現及誇大顯示於該圖式中。其中多個實施例為揭露及描述具有某些共同的特徵,為了該實施例之明確及容易說明、描述及理解,彼此類似及相似的特徵一般將以類似或相同的元件符號作描述。同樣地,雖然在該圖式中之視圖為了容易說明通常顯示類似的方向,但在該圖式中之說明對於大多數部分是任意方向的。通常,本發明可以以任何方向來進行。 Similarly, the drawings of the display embodiments of the system are semi-diagrammatic and not to scale, and in particular, certain sizes are shown in the drawings for clarity and exaggeration. Many of the embodiments have certain common features for disclosure and description. For clarity and ease of description, description and understanding of the embodiments, similar and similar features will generally be described with similar or identical element symbols. Similarly, although the views in this drawing usually show similar directions for ease of explanation, the description in this drawing is in any direction for most parts. Generally, the present invention can be carried out in any direction.

在此所使用之名詞「系統」係依據該名詞所使用之上下文而意指及定義為本發明之該方法及該裝置。在此所使用之名詞「方法」係意指及定義為裝置之操作步驟。 The term "system" used herein refers to and defines the method and device of the present invention based on the context in which the term is used. The term "method" used here means and defines the operating steps of the device.

為求便利性及不做限制性,名詞「資料」是定義為能夠藉由電腦產生或儲存於電腦中之資訊。名詞「資料保全系統」是定義為意指合併儲存媒介之任何可攜式記憶體裝置。在此所使用之名詞「儲存媒介」意指及定義為任何固態、反及閘快閃及/或磁性資料記錄系統。名詞「上鎖」意指當儲存媒介不可存取時之資料保全系統並且名詞「解鎖」意指當儲存媒介是可存取時之資料保全系統。 For convenience and without limitation, the term "data" is defined as information that can be generated by a computer or stored in a computer. The term "data security system" is defined as any portable memory device that means a combined storage medium. The term "storage medium" as used herein means and defines any solid-state, NAND flash and/or magnetic data recording system. The noun "locked" means a data security system when the storage medium is inaccessible and the noun "unlocked" means a data security system when the storage medium is accessible.

通常有兩種方法防止儲存裝置篡改: There are generally two ways to prevent tampering with storage devices:

1.塗敷環氧樹脂於組件上-塗敷至印刷電路板之環氧樹脂可以使得在不破壞儲存媒介之情況下拆解該儲存裝置變得困難。 1. Coating epoxy resin on components-The epoxy resin applied to the printed circuit board can make it difficult to disassemble the storage device without damaging the storage medium.

2.加密記憶體資料-當資料寫入儲存媒介時對資料進行加密並且該資料需要加密金鑰才得以解密。 2. Encrypted memory data-when the data is written into the storage medium, the data is encrypted and the data needs an encryption key to be decrypted.

現參考第1圖,其中依據本發明之實施例顯示資料保全系統100之示意圖。該資料保全系統100由外部通訊通道102、認證次系統104及儲存次系統106所組成。 Referring now to Figure 1, which shows a schematic diagram of a data security system 100 according to an embodiment of the present invention. The data preservation system 100 is composed of an external communication channel 102, an authentication subsystem 104, and a storage subsystem 106.

該儲存次系統106為包含介面控制器108、加密引擎110及儲存媒介112之電子電路。該儲存媒介112可以是內部或外部硬碟、USB快閃隨身碟、固態硬碟、複合磁碟機、記憶卡、卡式磁帶及包含光碟(例如,藍光光碟、數位多功能影音光碟或DVD及雷射唱片或CD)之光學媒介。該儲存媒介112可以包含資料保護應用、檔案儲存系統及雲端資料儲存系統。該雲端資料儲存系統可以是使用插件(plug-in或“plugin”)應用或安裝在瀏覽器內之擴充軟體而存取,不論是在該主機電腦上或經由有線或無線網路(諸如射頻或光學)、或者透過全球資訊網(World Wide Web)連接至該主機電腦之另一個系統上。 The storage subsystem 106 is an electronic circuit including an interface controller 108, an encryption engine 110, and a storage medium 112. The storage medium 112 can be an internal or external hard disk, a USB flash drive, a solid state drive, a hybrid drive, a memory card, a cassette tape, and includes an optical disc (for example, a Blu-ray disc, a digital versatile audio-visual disc or a DVD and Optical media of compact discs or CDs. The storage medium 112 may include data protection applications, file storage systems, and cloud data storage systems. The cloud data storage system can be accessed using plug-in (plug-in or "plugin") applications or expansion software installed in the browser, whether on the host computer or via a wired or wireless network (such as radio frequency or Optical), or connected to another system of the host computer through the World Wide Web.

介面控制器108包含電子組件,諸如具有軟體或硬體之加密引擎110的微控制器,但該加密引擎110也可以是在儲存次系統106中不同的控制器內。 The interface controller 108 includes electronic components, such as a microcontroller with a software or hardware encryption engine 110, but the encryption engine 110 may also be in a different controller in the storage subsystem 106.

該認證次系統104為包含認證控制器114(諸如微控制器)之電子電路,該認證控制器114可以具有屬 於自己的非揮發性記憶體,諸如電子可抹除可程式化唯讀記憶體(EEPROM,Electrically Erasable Programmable Read-Only Memory)。 The authentication subsystem 104 is an electronic circuit including an authentication controller 114 (such as a microcontroller), and the authentication controller 114 may have attributes In its own non-volatile memory, such as Electronically Erasable Programmable Read-Only Memory (EEPROM, Electrically Erasable Programmable Read-Only Memory).

該外部通訊通道102提供與主機電腦系統120交換資料之工具。萬用序列匯流排(USB)為連接該資料保全系統100至該主機電腦系統120的其中一個最普遍的工具。該外部通訊通道102之其它例子包含火線(Firewire)、無線USB、序列ATA(SATA)、高畫質多媒體介面(HDMI,High Definition Multimedia Interface)、推薦標準232(RS-232,Recommended Standard 232)及射頻無線網路。 The external communication channel 102 provides tools for exchanging data with the host computer system 120. A universal serial bus (USB) is one of the most common tools for connecting the data security system 100 to the host computer system 120. Other examples of the external communication channel 102 include Firewire, Wireless USB, Serial ATA (SATA), High Definition Multimedia Interface (HDMI), Recommended Standard 232 (RS-232), and Radio frequency wireless network.

該介面控制器108是能夠將USB封包資料轉譯成為可以寫入USB快閃隨身碟中之該儲存媒介112的資料。 The interface controller 108 is capable of translating USB packet data into data that can be written into the storage medium 112 in the USB flash drive.

該加密引擎110是實作該介面控制器108之一部分並且從該主機電腦系統120取得明確的文字及/或資料(資訊)然後轉換該文字及/或資料成為寫入該MSD或該儲存媒介112之加密形式。該加密引擎110亦將來自該儲存媒介112之加密資訊轉換並且解密成為明確的資訊給該主機電腦系統120。該加密引擎110亦可以是一個雙控制器次系統,其具有:加密控制器,具有動態加密/解密資料連同管理通訊協定、記憶體及其它操作條件的加密能力;以及通訊/保全控制器,用於處理該通訊、加密金鑰管理及與該加密控制器通訊。 The encryption engine 110 implements a part of the interface controller 108 and obtains clear text and/or data (information) from the host computer system 120 and then converts the text and/or data into the MSD or the storage medium 112 The encrypted form. The encryption engine 110 also converts and decrypts the encrypted information from the storage medium 112 into clear information to the host computer system 120. The encryption engine 110 can also be a dual-controller sub-system, which has: an encryption controller, which has the ability to dynamically encrypt/decrypt data and manage communication protocols, memory, and other operating conditions; and a communication/security controller that uses It handles the communication, encryption key management and communication with the encryption controller.

加密引擎110需要加密金鑰116來加密/解密資訊。該加密金鑰116是使用於一種演算法(例如,256位元高級加密標準(AES,Advanced Encryption Standard)加密)中,該演算法藉由加密演算法分別地加密/解密資料以使資料成為不可讀的或可讀的。該加密金鑰116可以儲存至該認證控制器114內部或外部。 The encryption engine 110 needs an encryption key 116 to encrypt/decrypt information. The encryption key 116 is used in an algorithm (for example, 256-bit Advanced Encryption Standard (AES, Advanced Encryption Standard) encryption). The algorithm separately encrypts/decrypts data by means of an encryption algorithm to make the data unavailable. Read or readable. The encryption key 116 can be stored inside or outside the authentication controller 114.

一旦具有身份識別號碼或金鑰之使用者122已經對照認證金鑰118進行確認,該加密金鑰116就會藉由該認證次系統104傳輸至該加密引擎110。 Once the user 122 with the identification number or key has verified against the authentication key 118, the encryption key 116 will be transmitted to the encryption engine 110 through the authentication subsystem 104.

已經發現到,藉由使用該認證金鑰118及該加密金鑰116,本發明之各種實施例之可攜式記憶體儲存裝置可以提供先前在此類裝置中無法獲得之極高程度的保全。 It has been found that by using the authentication key 118 and the encryption key 116, the portable memory storage device of various embodiments of the present invention can provide an extremely high degree of security previously unavailable in such devices.

當該資料保全系統100被上鎖時,該認證金鑰118仍然在該認證次系統104內部並且無法由外部讀取。隱藏該認證金鑰118的其中一個方法是將該認證金鑰118儲存於該認證次系統104內之該認證控制器114中。該認證控制器114設置安全熔絲使得無法存取該認證金鑰118,除非該使用者122已被確認時該認證控制器114允許提取。很多微控制器配備有當燒斷時避免存取任何內部記憶體之安全熔絲。這是眾所周知及廣泛使用的保全特徵。此類微控制器可以使用於該認證控制器114。該認證控制器114可以是微控制器或微處理器。 When the data security system 100 is locked, the authentication key 118 is still inside the authentication subsystem 104 and cannot be read by the outside. One method of hiding the authentication key 118 is to store the authentication key 118 in the authentication controller 114 in the authentication subsystem 104. The authentication controller 114 sets a security fuse so that the authentication key 118 cannot be accessed unless the authentication controller 114 allows extraction when the user 122 has been confirmed. Many microcontrollers are equipped with a safety fuse that prevents access to any internal memory when blown. This is a well-known and widely used security feature. Such a microcontroller can be used in the authentication controller 114. The authentication controller 114 may be a microcontroller or a microprocessor.

該認證金鑰118可以用作為數種功能形式: The authentication key 118 can be used in several functional forms:

1.作為該加密金鑰116,用以直接加密/解密該資訊。 1. As the encryption key 116, it is used to directly encrypt/decrypt the information.

2.作為金鑰,用以回復儲存於可以由該介面控制器108所存取之該資料保全系統100中之該加密金鑰116。 2. As a key, it is used to recover the encryption key 116 stored in the data security system 100 that can be accessed by the interface controller 108.

3.用於供該介面控制器108直接比較以啟動該外部通訊通道102。 3. Used for direct comparison by the interface controller 108 to activate the external communication channel 102.

現參考第2圖,其中顯示配合該資料保全系統100所使用之認證金鑰交付方法之說明。在這個說明中,該認證金鑰118及該加密金鑰116合在一起並且相同。該加密引擎110使用該認證金鑰118作為該加密金鑰116。 Referring now to Figure 2, which shows the description of the authentication key delivery method used in conjunction with the data security system 100. In this description, the authentication key 118 and the encryption key 116 are combined and the same. The encryption engine 110 uses the authentication key 118 as the encryption key 116.

該使用者122必須藉由提供使用者身份識別202、號碼或金鑰至該認證次系統104而與該認證次系統104互動。該認證次系統104對照該認證金鑰118驗證該使用者122。該認證次系統104接著傳輸該認證金鑰118作為該加密金鑰116至該介面控制器108。 The user 122 must interact with the authentication subsystem 104 by providing the user identification 202, number or key to the authentication subsystem 104. The authentication subsystem 104 authenticates the user 122 against the authentication key 118. The authentication subsystem 104 then transmits the authentication key 118 as the encryption key 116 to the interface controller 108.

在該介面控制器108中之該加密引擎110使用該認證金鑰118以沿著通道206將明確的資訊轉換成為加密的資訊及將加密的資訊轉換成為明確的資訊。在沒有該加密金鑰116的情況下,任何從該儲存媒介112讀取加密資訊的嘗試通常會造成任何電腦無法採用之資訊。 The encryption engine 110 in the interface controller 108 uses the authentication key 118 to convert the clear information into encrypted information and the encrypted information into clear information along the channel 206. Without the encryption key 116, any attempt to read the encrypted information from the storage medium 112 usually results in any information that cannot be used by the computer.

現參考第3圖,其中顯示供該使用者122與資料保全系統300互動之不同的系統。該互動可以是藉由通訊組合301,該通訊組合301可以是與行動電話、智慧手機、智能手錶、穿戴應用或其它無線裝置之實體接觸、有線連接或無線連接。 Referring now to FIG. 3, a different system for the user 122 to interact with the data security system 300 is shown. The interaction can be through a communication combination 301, which can be a physical contact, a wired connection, or a wireless connection with a mobile phone, a smart phone, a smart watch, a wearable application, or other wireless devices.

在其中一個認證系統中,行動收發器302係用以傳輸使用者身份識別304至位於認證次系統310中之資料保全收發器306。為了例示性之目的,收發器是用於雙向通訊的靈活性,但是也可使用單向的傳輸之發送器-接收器組合。該認證次系統310包含該認證控制器114,該認證控制器114是連接至位於該儲存次系統106中之該介面控制器108。該使用者身份識別304是藉由來自該資料保全系統300之該儲存次系統106外部之該行動收發器302提供至該認證次系統310內之該資料保全收發器306。該無線通訊可以包含無線保真(WiFi,Wireless Fidelity)、藍芽(BT,Bluetooth)、藍芽智能、近場通訊(NFC,Near Field Communication)、全球定位系統(GPS,Global Positioning System)、光學、行動通訊(例如,長期演進技術(LTE,Long-Term Evolution)、先進長期演進技術(LTE-A,Long-Term Evolution Advanced))、分碼多重存取(CDMA,Code Division Multiple Access)、寬頻分碼多重存取(WCDMA,Wideband Code Division Multiple Access)、通用移動電信系統(UMTS,Universal Mobile Telecommunications System)、無線寬帶(WiBro,Wireless Broadband)或全球移動通訊系統(GSM,Global System for Mobile Communications)及類似技術。 In one of the authentication systems, the mobile transceiver 302 is used to transmit the user identification 304 to the data security transceiver 306 in the authentication subsystem 310. For illustrative purposes, the transceiver is used for the flexibility of two-way communication, but a transmitter-receiver combination for one-way transmission can also be used. The authentication subsystem 310 includes the authentication controller 114, and the authentication controller 114 is connected to the interface controller 108 in the storage subsystem 106. The user identification 304 is provided from the mobile transceiver 302 outside the storage subsystem 106 of the data security system 300 to the data security transceiver 306 in the authentication subsystem 310. The wireless communication can include wireless fidelity (WiFi, Wireless Fidelity), Bluetooth (BT, Bluetooth), Bluetooth Smart, Near Field Communication (NFC, Near Field Communication), Global Positioning System (GPS, Global Positioning System), optical , Mobile communications (for example, Long-Term Evolution (LTE, Long-Term Evolution), Long-Term Evolution Advanced (LTE-A, Long-Term Evolution Advanced)), Code Division Multiple Access (CDMA, Code Division Multiple Access), broadband Code Division Multiple Access (WCDMA, Wideband Code Division Multiple Access), Universal Mobile Telecommunications System (UMTS), Wireless Broadband (WiBro, Wireless Broadband) or Global System for Mobile Communications (GSM) And similar technologies.

該認證次系統310藉由從對照該認證金鑰118而被驗證之該行動收發器302所發送之碼而驗證對照該認證金鑰118之該使用者122。該認證次系統310接著 跨越該通訊組合301傳輸該加密金鑰116給該介面控制器108。 The authentication subsystem 310 verifies the user 122 against the authentication key 118 by the code sent from the mobile transceiver 302 that is verified against the authentication key 118. The certification sub-system 310 then The encryption key 116 is transmitted to the interface controller 108 across the communication combination 301.

該加密引擎110接著使用該加密金鑰116沿著該通道206以將明確的資訊轉換成為加密的資訊及將加密的資訊轉換成為明確的資訊。在沒有該加密金鑰116的情況下,任何從該儲存媒介112讀取加密資訊的嘗試都會造成該主機電腦系統120無法使用之資訊。 The encryption engine 110 then uses the encryption key 116 along the channel 206 to convert the clear information into encrypted information and the encrypted information into clear information. Without the encryption key 116, any attempt to read the encrypted information from the storage medium 112 will result in information that the host computer system 120 cannot use.

在視需要的第二認證機制中,藉由讓該使用者122使用生物識別感測器320提供生物識別輸入322而確認他/她的身份識別是授權的使用者,該認證次系統310便能對照該認證金鑰118驗證該使用者122。生物識別的類型包含指紋、虹膜掃描、聲紋等等。 In the optional second authentication mechanism, by allowing the user 122 to use the biometric sensor 320 to provide the biometric input 322 to confirm that his/her identity is an authorized user, the authentication subsystem 310 can The user 122 is verified against the authentication key 118. The types of biometrics include fingerprints, iris scans, voiceprints, and so on.

在視需要的第三認證機制中,藉由讓該使用者122使用電機輸入機制330提供唯一碼332而確認他/她的身份識別是授權的使用者,該認證次系統310便能對照該認證金鑰118驗證該使用者122。該唯一碼332可以包含數字碼、字母與數字組成的碼或字母碼,例如PIN。該電機輸入機制330是位在該認證次系統310內部。該電機輸入機制330從該資料保全系統300外部接收來自該使用者122之唯一碼332。該唯一碼332是提供給位在該資料保全系統300之該儲存次系統106外部之該認證次系統310內之該電機輸入機制330。 In the optional third authentication mechanism, by allowing the user 122 to use the motor input mechanism 330 to provide a unique code 332 to confirm that his/her identity is an authorized user, the authentication subsystem 310 can compare the authentication The key 118 authenticates the user 122. The unique code 332 may include a numeric code, a code composed of letters and numbers, or an alphabetic code, such as a PIN. The motor input mechanism 330 is located inside the authentication subsystem 310. The motor input mechanism 330 receives the unique code 332 from the user 122 from outside the data security system 300. The unique code 332 is provided to the motor input mechanism 330 in the authentication subsystem 310 outside the storage subsystem 106 of the data security system 300.

不論使用哪個方法驗證該使用者122,該認證金鑰118及該加密金鑰116仍然維持隱藏直到該使用者 獲得授權。 No matter which method is used to authenticate the user 122, the authentication key 118 and the encryption key 116 remain hidden until the user Authorized.

現參考第4圖,其中顯示該使用者122如何可以使用該主機電腦系統120與資料保全系統400互動之說明。 Referring now to FIG. 4, it shows an explanation of how the user 122 can use the host computer system 120 to interact with the data security system 400.

該主機電腦系統120設有主機應用程式402。該主機應用程式402為軟體或靭體,透過該資料保全系統400之外部通訊通道102進行通訊。 The host computer system 120 is provided with a host application 402. The host application 402 is software or firmware, and communicates through the external communication channel 102 of the data security system 400.

該主機應用程式402交付與其環境相關聯之主機識別碼406,諸如內部組件序號(例如,硬碟)、網路卡之媒體存取控制(MAC,Media Access Control)位址、使用者之登入名稱、網際網路協定(IP,Internet Protocol)位址、由該資料保全系統所建立並儲存至該主機之ID、由該資料保全系統所建立並儲存至該網路之ID等等。該主機識別碼406是由位於該資料保全系統400中之認證次系統408所使用。 The host application 402 delivers the host identification code 406 associated with its environment, such as internal component serial number (for example, hard disk), the media access control (MAC, Media Access Control) address of the network card, and the user's login name , Internet Protocol (IP, Internet Protocol) address, ID created by the data security system and stored on the host, ID created by the data security system and stored on the network, etc. The host identification code 406 is used by the authentication subsystem 408 in the data security system 400.

當該認證次系統408藉由確認該主機識別碼406而對照該認證金鑰118驗證該使用者122時,該資料保全系統400將解鎖。 When the authentication subsystem 408 verifies the user 122 against the authentication key 118 by confirming the host identification code 406, the data security system 400 will be unlocked.

例如,使用者122將被上鎖之資料保全系統400連接至主機電腦系統120。主機應用程式402發送本身的網路卡之MAC位址給該資料保全系統400。該資料保全系統400認知這個MAC位址是合法的並解鎖而不需要第1圖之該使用者122必須輸入使用者身份識別。這種實作並不需要與該使用者122做任何互動。在這個例子中,被驗 證的是該主機電腦系統120以及與其相關聯的環境。 For example, the user 122 connects the locked data security system 400 to the host computer system 120. The host application 402 sends the MAC address of its own network card to the data security system 400. The data security system 400 recognizes that the MAC address is legal and unlocks it without the need for the user 122 in FIG. 1 to input user identification. This implementation does not require any interaction with the user 122. In this example, the tested The proof is the host computer system 120 and the environment associated with it.

該資料保全系統400包含:提供儲存於該認證次系統104內之該認證金鑰118;藉由該認證次系統104提供該主機電腦系統120之確認;藉由該認證次系統104提交該保加密金鑰116給該儲存次系統106;以及藉由該儲存次系統106解密該儲存媒介內容而提供存取該儲存媒介112。 The data security system 400 includes: providing the authentication key 118 stored in the authentication subsystem 104; using the authentication subsystem 104 to provide confirmation of the host computer system 120; and submitting the security encryption through the authentication subsystem 104 The key 116 is given to the storage sub-system 106; and the storage sub-system 106 decrypts the storage medium content to provide access to the storage medium 112.

該資料保全系統更包含用於判讀該生物識別輸入並確認該使用者122的該認證次系統104。 The data preservation system further includes the authentication sub-system 104 for interpreting the biometric input and confirming the user 122.

該資料保全系統更包含直接使用該認證金鑰118作為該加密金鑰116。 The data preservation system further includes directly using the authentication key 118 as the encryption key 116.

該資料保全系統更包含使用該認證金鑰118以解密及提取用以解碼內部內容的該加密金鑰116。 The data preservation system further includes using the authentication key 118 to decrypt and extract the encryption key 116 for decoding internal content.

該資料保全系統更包含用於判讀訊號輸入及確認發送單元的該認證次系統104。 The data preservation system further includes the authentication sub-system 104 for interpreting signal input and confirming the sending unit.

該資料保全系統更包含用於判讀人工鍵入的輸入並確認該使用者122的該認證次系統104。 The data preservation system further includes the authentication sub-system 104 for interpreting the manually typed input and confirming the user 122.

該資料保全系統更包含用於判讀由主機常駐軟體應用程式所發送之輸入來確認該主機電腦系統120的該認證次系統104。 The data preservation system further includes the authentication subsystem 104 for interpreting the input sent by the host resident software application to confirm the host computer system 120.

該資料保全系統更包含在該介面控制器108外部但連接至該外部通訊通道102之該加密引擎110,用於將明確資料轉換成為加密資料以用於解鎖該資料保全系統100。 The data security system further includes the encryption engine 110 external to the interface controller 108 but connected to the external communication channel 102 for converting explicit data into encrypted data for unlocking the data security system 100.

現參考第5圖,其中顯示針對該資料保全系統100之使用者確認之資料保全方法500。該資料保全方法500包含:在步驟方塊502中對照認證金鑰而確認使用者;在步驟方塊504中使用該認證金鑰用於提取加密金鑰;以及在步驟方塊506中使用該加密金鑰用於透過在主機電腦系統與儲存媒介之間之儲存次系統允許未加密的通訊。 Referring now to Fig. 5, it shows a data preservation method 500 confirmed by the user of the data preservation system 100. The data preservation method 500 includes: verifying the user against the authentication key in step 502; using the authentication key for extracting the encryption key in step 504; and using the encryption key for extracting the encryption key in step 506 It allows unencrypted communication through the storage subsystem between the host computer system and the storage medium.

現參考第6圖,其中顯示例示性的資料保全通訊系統600。例示性的資料保全通訊系統600包含行動裝置610、資料保全系統620、主機電腦630及伺服器/控制台640。該行動裝置610及該伺服器/控制台640是透過雲端650而以有線或無線方式連接,該雲端650可以是網際網路雲端。該行動裝置610及該資料保全系統620是藉由該通訊組合301所連接。 Referring now to Figure 6, an exemplary data security communication system 600 is shown. An exemplary data security communication system 600 includes a mobile device 610, a data security system 620, a host computer 630, and a server/controller 640. The mobile device 610 and the server/controller 640 are connected in a wired or wireless manner through a cloud 650, which may be an Internet cloud. The mobile device 610 and the data security system 620 are connected by the communication combination 301.

在該例示性的資料保全通訊系統600中,該通訊組合301包含位於該行動裝罝610中之行動收發器612,其具有天線614與位在該資料保全系統620中之資料保全收發器624之天線622無線地通訊。 In the exemplary data security communication system 600, the communication combination 301 includes a mobile transceiver 612 located in the mobile device 610, which has an antenna 614 and a data security transceiver 624 located in the data security system 620. The antenna 622 communicates wirelessly.

在其中一項實施例中,該行動裝置610可以是智慧手機。在該行動裝置610中,該行動收發器612可以連接至習知的行動裝置組件及連接至資料保全系統應用程式618,該行動收發器612提供資訊給該資料保全系統620使用。 In one of the embodiments, the mobile device 610 may be a smart phone. In the mobile device 610, the mobile transceiver 612 can be connected to conventional mobile device components and to the data security system application 618, and the mobile transceiver 612 provides information for the data security system 620 to use.

該資料保全收發器624是連接至保全控制器 626,該保全控制器626可以含有身份識別、密碼、個人資料或包含可以存取該資料保全系統620之不同的行動裝置之資訊。該保全控制器626為連接至類似該認證次系統310、該儲存次系統106(在某些實施例中,該儲存次系統106可以具有加密以加密資料)及該外部通訊通道102之次系統。 The data security transceiver 624 is connected to the security controller 626. The security controller 626 may contain identification, password, personal data, or information containing different mobile devices that can access the data security system 620. The security controller 626 is connected to a secondary system similar to the authentication subsystem 310, the storage subsystem 106 (in some embodiments, the storage subsystem 106 may have encryption to encrypt data), and the external communication channel 102.

該外部通訊通道102可連接至該主機電腦630以允許在特定環境下存取在該儲存次系統106中之資料。 The external communication channel 102 can be connected to the host computer 630 to allow access to the data in the storage subsystem 106 under a specific environment.

該資料保全系統620之其中一項實施例可以僅利用無線連接至該行動裝置610,諸如智慧手機,從而消除第3圖之該生物識別感測器320及該電機輸入機制330。已經發現到,這種實作使得該資料保全系統620更加安全及有用。 An embodiment of the data preservation system 620 can only use wireless connection to the mobile device 610, such as a smart phone, thereby eliminating the biometric sensor 320 and the motor input mechanism 330 in FIG. 3. It has been found that this implementation makes the data protection system 620 more secure and useful.

該資料保全系統應用程式618允許該行動裝置610找到位在該行動裝置610附近之所有資料保全系統並且顯示出他們的狀態(上鎖/解鎖/空白、配對/未配對等等)。 The data security system application 618 allows the mobile device 610 to find all data security systems located near the mobile device 610 and display their status (locked/unlocked/blank, paired/unpaired, etc.).

該資料保全系統應用程式618允許該行動裝置610連接/配對、上鎖、解鎖、改變名稱及密碼,並且重置位在該資料保全系統620上之所有資料。 The data security system application 618 allows the mobile device 610 to connect/pair, lock, unlock, change the name and password, and reset all data on the data security system 620.

該資料保全系統應用程式618允許該行動裝置610設定閒置自動上鎖(inactivity auto-lock),以便在預定的閒置時間週期後使該資料保全系統620自動地上鎖, 或者設定感應自動上鎖(proximity auto-lock),使得當該行動裝置610沒有位於預定感應距離內持續預定的時間週期時,該資料保全系統620將會上鎖(以改良可靠度及避免訊號彈跳)。 The data security system application 618 allows the mobile device 610 to set inactivity auto-lock, so as to automatically lock the data security system 620 after a predetermined period of inactivity. Or set the proximity auto-lock so that when the mobile device 610 is not within the predetermined sensing distance for a predetermined period of time, the data security system 620 will be locked (to improve reliability and avoid signal bounce) ).

該資料保全系統應用程式618允許該行動裝置610記住密碼、使用TouchID及Apple手錶(在此所提及的TouchID及Apple手錶兩者僅為例子,有很多能夠以類似模式使用之具有生物識別感測器及可穿戴裝置的其它行動裝置)以便資料保全系統620可以解鎖而不需要在該行動裝置上輸入重新進入的密碼。 The data security system application 618 allows the mobile device 610 to remember passwords, use TouchID and Apple watches (both TouchID and Apple watches mentioned here are only examples, there are many biometrics that can be used in similar modes) Other mobile devices such as sensors and wearable devices) so that the data security system 620 can be unlocked without the need to enter a re-entry password on the mobile device.

該資料保全系統應用程式618允許該行動裝置610經由設定使得僅與特定的行動裝置產生操作,諸如該行動裝置610,以便該資料保全系統620無法用其它行動裝置解鎖(1Phone)。 The data security system application 618 allows the mobile device 610 to be configured to only operate with a specific mobile device, such as the mobile device 610, so that the data security system 620 cannot be unlocked by other mobile devices (1Phone).

該資料保全系統應用程式618允許該行動裝置610設定該資料保全系統620為唯讀。 The data security system application 618 allows the mobile device 610 to set the data security system 620 as read-only.

該資料保全系統應用程式618允許該行動裝置610以使用者模式或管理者模式(管理者的模式覆蓋使用者的設定)操作並且使用該伺服器/控制台640。該伺服器/控制台640為電腦與控制台的組合,該控制台用於輸入資訊進入該電腦。 The data security system application 618 allows the mobile device 610 to operate in a user mode or an administrator mode (the administrator's mode overrides the user's settings) and use the server/controller 640. The server/controller 640 is a combination of a computer and a control panel, and the control panel is used to input information into the computer.

該伺服器/控制台640含有使用者管理資料庫642,該使用者管理資料庫642含有可以經由雲端650傳輸至該行動裝置610之額外資訊,以提供額外的功能性 給該行動裝置610。 The server/controller 640 contains a user management database 642, which contains additional information that can be transmitted to the mobile device 610 via the cloud 650 to provide additional functionality To the mobile device 610.

該使用者管理資料庫642允許該伺服器/控制台640建立及確認使用UserID(使用者名稱及密碼)之使用者及阻擋/允許解鎖該資料保全系統620及提供遠端輔助。 The user management database 642 allows the server/controller 640 to create and confirm users using UserID (user name and password) and block/allow unlocking the data security system 620 and provide remote assistance.

該使用者管理資料庫642允許該伺服器/控制台640遠端重置或解鎖該資料保全系統620。 The user management database 642 allows the server/controller 640 to reset or unlock the data security system 620 remotely.

該使用者管理資料庫642允許該伺服器/控制台640遠端變更該資料保全系統使用者的PIN。 The user management database 642 allows the server/controller 640 to remotely change the PIN of the user of the data security system.

該使用者管理資料庫642允許該伺服器/控制台640從特定位置(藉由使用地理圍欄)限制/允許解鎖資料保全系統620。 The user management database 642 allows the server/controller 640 to restrict/allow the unlocking of the data security system 620 from a specific location (by using geofencing).

該使用者管理資料庫642允許該伺服器/控制台640限制/允許在特定的時間週期及不同的時間區域中解鎖資料保全系統620。 The user management database 642 allows the server/controller 640 to restrict/allow the unlocking of the data security system 620 in a specific time period and different time zones.

該使用者管理資料庫642允許該伺服器/控制台640限制解鎖在特定團隊/組織/網路等等外部之資料保全系統620。 The user management database 642 allows the server/controller 640 to restrict the unlocking of the data security system 620 outside the specific team/organization/network, etc.

現參考第7圖,其中顯示呈現在該行動裝置610及該資料保全系統620之間之操作順序之管理者排序圖。 Referring now to FIG. 7, which shows an administrator sequence diagram showing the operation sequence between the mobile device 610 and the data preservation system 620.

在該資料保全系統620及該行動裝置610之間的連接700首先建立和其它裝置或系統的彼此發現、配對該裝置及系統及連線該裝置與系統。該連接700是使用 共享秘密而保全,接著使用該共享秘密以保全(加密)在該資料保全系統620及該行動裝置610之間之通訊而用於所有的未來通訊對話。標準加密演算法係被選擇成既可在該資料保全系統620上有效執行又可被全球保全標準所認可。 The connection 700 between the data security system 620 and the mobile device 610 first establishes mutual discovery with other devices or systems, pairing the device and the system, and connecting the device and the system. The connection 700 is using The shared secret is secured, and then the shared secret is used to secure (encrypt) the communication between the data security system 620 and the mobile device 610 for all future communication conversations. The standard encryption algorithm is selected so that it can be effectively executed on the data security system 620 and can be recognized by global security standards.

只要該資料保全系統620及該行動裝置610是在彼此之預定距離內,該連接700便由該資料保全系統應用程式618或該保全控制器628或兩者一起操作所維持。再者,若超過該預定距離時,該連接700會維持預定的時間週期,在該時間週期之後該資料保全系統620便上鎖。 As long as the data security system 620 and the mobile device 610 are within a predetermined distance from each other, the connection 700 is maintained by the data security system application 618 or the security controller 628 or both. Furthermore, if the predetermined distance is exceeded, the connection 700 will be maintained for a predetermined period of time, and the data security system 620 will be locked after the period of time.

在該行動裝置610及該資料保全系統620連接之後,資料保全系統管理者應用程式啟動操作702於該行動裝置610中產生。接著管理者於管理者密碼操作704中設定密碼。而且在該行動裝置610與該資料保全系統620連接之後,該資料保全系統620在資料保全系統連接、啟動及發現操作706中是連接至第6圖之該主機電腦630而由該主機電腦630啟動及發現。 After the mobile device 610 and the data security system 620 are connected, the data security system manager application startup operation 702 is generated in the mobile device 610. Then the administrator sets a password in the administrator password operation 704. And after the mobile device 610 is connected to the data security system 620, the data security system 620 is connected to the host computer 630 in FIG. 6 and activated by the host computer 630 in the data security system connection, activation, and discovery operation 706 And discover.

在該管理者密碼操作704之後,該行動裝置610發送設定管理者密碼及解鎖訊號708給該資料保全系統620。該設定管理者密碼及解鎖訊號708造成管理者密碼設定及資料保全系統解鎖操作716於該資料保全系統620中產生。 After the administrator password operation 704, the mobile device 610 sends a set administrator password and an unlock signal 708 to the data security system 620. The setting of the administrator password and the unlock signal 708 causes the administrator password setting and data security system unlock operation 716 to be generated in the data security system 620.

當該管理者密碼設定及資料保全系統解鎖操 作716完成時,確認:資料保全系統解鎖訊號712是發送至該行動裝置610,在該行動裝置610中,確認:資料保全系統解鎖作為管理者操作714操作。該確認:資料保全系統解鎖作為管理者操作714允許設定其它限制操作716使用該行動裝置610而執行。該設定其它限制操作716造成設定管理者限制訊號718發送至該資料保全系統620,其中該管理者限制被設定並且確認:限制設定訊號720回到該行動裝置610。之後,該行動裝置610及該資料保全系統620是在完全可操作的通訊中。 When the administrator’s password is set and the data security system is unlocked When the operation 716 is completed, it is confirmed that the data security system unlock signal 712 is sent to the mobile device 610, and in the mobile device 610, it is confirmed that the data security system unlocking is operated as the administrator operation 714. The confirmation: Unlocking the data security system as an administrator operation 714 allows setting other restriction operations 716 to be executed using the mobile device 610. The setting other restriction operation 716 causes the setting manager restriction signal 718 to be sent to the data security system 620, wherein the manager restriction is set and it is confirmed that the restriction setting signal 720 is returned to the mobile device 610. After that, the mobile device 610 and the data security system 620 are in fully operational communication.

因為能夠在不與該資料保全系統620實體接觸的情況下與該資料保全系統620通訊,所以與該資料保全系統620的大量互動是需要有資料保全系統唯一識別碼來完成,而該資料保全系統唯一識別碼是印在該資料保全系統620上或是附帶在該資料保全系統620封包,並且對於該資料保全系統620擁有者而言是輕易可取得的。 Because it can communicate with the data security system 620 without physically contacting the data security system 620, a large number of interactions with the data security system 620 require a unique identification code of the data security system to complete, and the data security system The unique identification code is printed on the data security system 620 or attached to the data security system 620 packet, and is easily obtainable by the owner of the data security system 620.

在做出可能影響使用者資料之請求時(諸如解鎖或重置該資料保全系統620),需要這種唯一識別碼(unique ID)。未具有正確識別碼而執行這種操作的嘗試將會被忽略並且不造成傷害。該唯一識別碼是用來以一種需要使用者對該資料保全系統620有實體控制的方式對該行動裝置610識別該資料保全系統620,以及用來確認該連接700是建立在已授權、先前已配對之裝置及系統之間,諸如該行動裝置610及該資料保全系統620。一旦這些裝置被配對,便可使用該共享祕密以使通訊加密。 This unique ID is required when making a request that may affect user data (such as unlocking or resetting the data security system 620). Attempts to perform this operation without the correct identification code will be ignored and cause no harm. The unique identification code is used to identify the data security system 620 to the mobile device 610 in a way that requires the user to have physical control of the data security system 620, and to confirm that the connection 700 is established in an authorized, previously Between the paired devices and systems, such as the mobile device 610 and the data security system 620. Once these devices are paired, the shared secret can be used to encrypt the communication.

配對意味著行動裝置及資料保全系統具有建立在過去某個時間並且持續之唯一且定義的關係。 Pairing means that the mobile device and the data security system have a unique and defined relationship that was established and continued at a certain time in the past.

當使用者具有該資料保全系統之實體控制時,該唯一識別碼能夠給予該使用者對該資料保全系統有某些控制。 When the user has physical control of the data security system, the unique identification code can give the user some control over the data security system.

在行動裝置610是智慧手機的情況下,為了增加與資料保全系統620通訊之保全,使用者可以選擇啟用功能,例如在此稱為1Phone之功能。此功能將與資料保全系統620的大量使用者互動限制給一個且只有一個行動裝置610。這是藉由以在該資料保全系統620與該行動裝置610之間保全地共享之隨機識別碼取代上文所描述之該資料保全系統唯一識別碼而完成。因此,例如,當該使用者解鎖該資料保全系統620時,必須改為給定該1Phone識別碼,而不是呈現該資料保全系統唯一識別碼。在效果上,除了PIN或密碼之外,這方式使得使用者的行動裝置610成為用於使用該資料保全系統620之第二個認證因素。例如,經選擇做為「1Phone」之已配對的使用者手機可以在沒有PIN的情況下使用,並且作為使用者認證單一因素及/或在與任何其它使用者認證因素之組合中。若選擇了此類功能(1Phone),除了之前管理者的解鎖有被啟用,否則該資料保全系統620無法以任何其它手機開啟。 In the case that the mobile device 610 is a smart phone, in order to increase the security of the communication with the data security system 620, the user can choose to enable a function, for example, a function called 1Phone here. This function limits the interaction with a large number of users of the data security system 620 to one and only one mobile device 610. This is accomplished by replacing the unique identification code of the data security system described above with a random identification code that is securely shared between the data security system 620 and the mobile device 610. Therefore, for example, when the user unlocks the data security system 620, the 1Phone identification code must be given instead of presenting the unique identification code of the data security system. In effect, in addition to the PIN or password, this approach makes the user's mobile device 610 the second authentication factor for using the data security system 620. For example, a paired user phone selected as "1Phone" can be used without a PIN, as a single factor for user authentication and/or in combination with any other user authentication factors. If this type of function (1Phone) is selected, the data protection system 620 cannot be opened with any other mobile phones except that the unlocking of the administrator has been enabled before.

將會瞭解的是,其它實施例可能會在該資料保全系統620上要求管理者的密碼以利於使用該1Phone功能。另一個實施例可能要求在在該行動裝置610上的 1Phone資料遺失的情況下,該伺服器/控制台640能夠回復該資料保全系統620。 It will be understood that other embodiments may require the administrator's password on the data security system 620 to facilitate the use of the 1Phone function. Another embodiment may require that on the mobile device 610 In the case that the 1Phone data is lost, the server/controller 640 can restore the data security system 620.

該使用者對於該資料保全系統620可以啟用感應自動上鎖功能。在通訊對話期間,第6圖之該資料保全收發器624回報給資料保全系統620對於該行動裝置610之訊號強度量測。在該行動裝置610上之該資料保全系統應用程式618發送給該資料保全系統620該初始訊號功率水準及用於感應之閾值兩者。 The user can enable the induction automatic lock function for the data security system 620. During the communication session, the data security transceiver 624 in FIG. 6 reports back to the data security system 620 to measure the signal strength of the mobile device 610. The data security system application 618 on the mobile device 610 sends to the data security system 620 both the initial signal power level and the threshold for sensing.

因為該訊號強度會因為該收發器周圍之環境條件而變動,所以該資料保全系統620會以數學方式平滑化該訊號強度量測以降低假陽性(false positive)的可能性。當該資料保全系統620偵測到所接收的訊號功率已經降到低於預定閾值持續預定的時間週期時,將會立即上鎖該資料保全系統620及避免存取第6圖之該儲存次系統106。 Because the signal strength will vary due to the environmental conditions around the transceiver, the data security system 620 will mathematically smooth the signal strength measurement to reduce the possibility of false positives. When the data security system 620 detects that the received signal power has fallen below a predetermined threshold for a predetermined period of time, it will immediately lock the data security system 620 and avoid access to the storage sub-system in Figure 6 106.

該資料保全系統620可以使用於三個不同模式中:使用者模式,其中該資料保全系統620之功能性是由使用者所決定;管理者模式,其中管理者可以設定管理者密碼及強制某些限制於該資料保全系統620(例如,在預定的無活動週期後自動上鎖、唯讀、1Phone)上並且限制不能被使用者移除;以及伺服器模式,其中管理者角色被設定,該伺服器/控制台640可以遠端重置該資料保全系統620、變更使用者密碼或只是解鎖該資料保全系統620。 The data security system 620 can be used in three different modes: user mode, in which the functionality of the data security system 620 is determined by the user; manager mode, in which the manager can set the manager password and force certain Restricted to the data security system 620 (for example, automatically locked after a predetermined period of inactivity, read-only, 1Phone) and the restriction cannot be removed by the user; and the server mode, in which the role of the administrator is set, the server The device/controller 640 can remotely reset the data security system 620, change the user password, or just unlock the data security system 620.

現參考第8圖,其中顯示該行動裝置610為 認證因素之解鎖排序圖。該圖顯示由來自特定行動裝置(該行動裝置610)之該資料保全系統應用程式618所初始化之該資料保全系統620之自動解鎖程序。使用者可以使用僅其中一個與該資料保全系統620初始配對之行動裝置。若該配對的行動裝置610遺失,則該資料保全系統620可能無法解鎖(除非之前設定有如第7圖中所顯示的管理者密碼)。 Now refer to Figure 8, which shows that the mobile device 610 is The unlock sequence diagram of authentication factors. The figure shows the automatic unlocking procedure of the data security system 620 initialized by the data security system application 618 from a specific mobile device (the mobile device 610). The user can use only one of the mobile devices initially paired with the data security system 620. If the paired mobile device 610 is lost, the data security system 620 may not be able to unlock (unless the administrator password as shown in Figure 7 is previously set).

類似於第7圖,在該連接700建立之後,資料保全系統應用程式啟動操作800產生。在資料保全系統連接、啟動及發現操作706之後,需要行動裝置ID解鎖訊號802便從該行動裝置610發送至該資料保全系統620。資料保全系統解鎖操作804產生,然後從該資料保全系統620發送確認:資料保全系統解鎖訊號712。在確認:資料保全系統解鎖操作806之後,該行動裝置610及該資料保全系統620便在完全可操作的通訊中。 Similar to FIG. 7, after the connection 700 is established, the data security system application start operation 800 is generated. After the data security system connects, starts, and discovers operations 706, the mobile device ID unlock signal 802 is sent from the mobile device 610 to the data security system 620. The data security system unlock operation 804 is generated, and then a confirmation is sent from the data security system 620: a data security system unlock signal 712. After confirming: the data security system unlocking operation 806, the mobile device 610 and the data security system 620 are in fully operational communication.

若個人身份識別碼(PIN,Personal Identification Number)並未設定,則已配對的行動裝置是使用作為單一認證因素(1-authentication factor)。 If the Personal Identification Number (PIN) is not set, the paired mobile device is used as a single authentication factor (1-authentication factor).

現參考第9圖,其中顯示呈現從該行動裝置610使用PIN輸入而解鎖之解鎖排序圖。該圖顯示藉由輸入PIN於該行動裝置610中之該資料保全系統應用程式618內而解鎖該資料保全系統620之流程。 Referring now to FIG. 9, it shows an unlock sequence diagram showing the unlocking of the mobile device 610 using PIN input. The figure shows the process of unlocking the data security system 620 by entering a PIN into the data security system application 618 in the mobile device 610.

雖然類似於第7及8圖,但輸入使用者名稱/密碼操作900在該資料保全系統應用程式啟動操作800之 後產生。在該輸入使用者稱/密碼操作900之後,該行動裝置610發送確認使用者ID訊號902給該伺服器/控制台640。該伺服器/控制台640接著做出使用者名稱/密碼有效判定904。 Although similar to Figures 7 and 8, the input user name/password operation 900 is in the data security system application startup operation 800 Later produced. After the input user name/password operation 900, the mobile device 610 sends a confirmation user ID signal 902 to the server/controller 640. The server/controller 640 then makes a determination 904 that the username/password is valid.

當該使用者名稱/密碼有效判定904確認該使用者時,有效使用者訊號906是發送至該行動裝置610以供使用者於行動裝置610中之輸入PIN操作908輸入正確的PIN。該行動裝置610接著發送確認解鎖訊號910以判定是否正確的PIN已經輸入至該伺服器/控制台640。 When the user name/password validity determination 904 confirms the user, the valid user signal 906 is sent to the mobile device 610 for the user to input the correct PIN by the PIN input operation 908 in the mobile device 610. The mobile device 610 then sends a confirmation unlock signal 910 to determine whether the correct PIN has been entered into the server/controller 640.

該伺服器/控制台640做出使用者授權判定912而判定是否該使用者被授權使用該PIN被授權的特定資料保全系統,例如該資料保全系統620。若被授權,則將解鎖允許訊號914發送至該行動裝置610,該行動裝置610便傳遞解鎖請求訊號916至該資料保全系統620。 The server/controller 640 makes a user authorization decision 912 to determine whether the user is authorized to use the specific data security system authorized by the PIN, such as the data security system 620. If authorized, the unlock permission signal 914 is sent to the mobile device 610, and the mobile device 610 transmits the unlock request signal 916 to the data security system 620.

該資料保全系統解鎖操作804將進行並將確認:資料保全系統解鎖訊號712發送至將進行確認:資料保全系統解鎖操作806的該行動裝置610。 The data security system unlocking operation 804 will be performed and confirm: the data security system unlock signal 712 will be sent to the mobile device 610 that will perform the confirmation: the data security system unlocking operation 806.

現參考第10圖,其中顯示呈現經由該伺服器/控制台640使用PIN輸入及使用者ID/位置/時間確認而解鎖之解鎖排序圖。該圖藉由從該行動裝置610輸入PIN於該資料保全系統應用程式618中、使用UserID(使用者名稱/密碼)於該伺服器/控制台640伺服器中認證及藉由確認地理圍欄允許而於特定位置及於特定時間範圍解鎖該資料保全系統620,顯示解鎖該資料保全系統620之最安 全的流程。在沒有輸入PIN、使用者名稱及密碼及讓行動裝置610位於特定(預定)位置及特定(預定)時間的情況下,該資料保全系統620無法解鎖。 Referring now to FIG. 10, an unlocking sequence diagram of unlocking through the server/controller 640 using PIN input and user ID/location/time confirmation is displayed. The figure is obtained by entering a PIN from the mobile device 610 in the data security system application 618, using the UserID (user name/password) to authenticate in the server/controller 640 server, and by confirming that the geofence is allowed. Unlock the data security system 620 at a specific location and within a specific time range, showing the safest way to unlock the data security system 620 The whole process. Without entering the PIN, user name and password, and leaving the mobile device 610 at a specific (predetermined) location and specific (predetermined) time, the data security system 620 cannot be unlocked.

雖然類似於第7-9圖,但在該伺服器/控制台640處,將執行解鎖特定資料保全系統操作1000以允許所需的條件之設定,在該條件之下將操作特定資料保全系統,例如該資料保全系統620,。例如,該條件可以在特定的地理區域內及/或特定的時間範圍內。 Although similar to Figures 7-9, at the server/controller 640, the unlocking of the specific data security system operation 1000 will be executed to allow the setting of the required conditions, under which the specific data security system will be operated, For example, the data preservation system 620,. For example, the condition may be within a specific geographic area and/or within a specific time range.

在該行動裝置610處,將作出目前條件的判定,例如獲得的位置及/或目前的時間操作1002。將進行此操作以判定該行動裝置610位在何處或該行動裝置610所在處之目前時間為何。亦可以判定關於該行動裝置610之其它的目前條件並藉由確認解鎖訊號1004發送至做出條件符合判定1006之該伺服器/控制台640。 At the mobile device 610, a determination of the current conditions, such as the obtained position and/or the current time operation 1002, will be made. This operation will be performed to determine where the mobile device 610 is located or the current time when the mobile device 610 is located. It is also possible to determine other current conditions of the mobile device 610 and send the confirmation unlock signal 1004 to the server/controller 640 that makes the condition meet the determination 1006.

當所需的條件符合時,解鎖允許訊號1008便發送至該行動裝置610以供執行輸入PIN操作908。在輸入該PIN之後,確認解鎖訊號1010是連同PIN及在操作上感應該行動裝置610之該資料保全系統620之身份識別一起發送。該確認解鎖訊號1010是被該伺服器/控制台640所接收並且做出資料保全系統允許判定1012以判定特定的資料保全系統是允許由授權的使用者所解鎖。該伺服器/控制台640確認這個「特定的」使用者是經過授權以使用該特定的資料保全系統。 When the required conditions are met, the unlock permission signal 1008 is sent to the mobile device 610 for the PIN input operation 908 to be performed. After inputting the PIN, it is confirmed that the unlocking signal 1010 is sent together with the PIN and the identification of the data security system 620 that senses the mobile device 610 in operation. The confirmation unlock signal 1010 is received by the server/controller 640 and a data security system permission determination 1012 is made to determine that the specific data security system is allowed to be unlocked by an authorized user. The server/controller 640 confirms that the "specified" user is authorized to use the specified data security system.

在判定已經提供正確的資訊之後,該伺服器 /控制台640將提供解鎖允許訊號914至該行動裝置610,該行動裝置610將提供解鎖請求訊號916。該解鎖請求訊號916造成該資料保全系統620進行操作。 After determining that the correct information has been provided, the server The console 640 will provide an unlock permission signal 914 to the mobile device 610, and the mobile device 610 will provide an unlock request signal 916. The unlock request signal 916 causes the data security system 620 to operate.

現參考第11圖,其中顯示使用該伺服器/控制台640重置該資料保全系統620之重置排序圖。此圖顯示經由該伺服器/控制台640遠端地重置該資料保全系統620的能力。該資料保全系統620可以經由無線連接僅從該行動裝置610接收指令。然而,藉由設定「重置」旗標於該伺服器/控制台640上用於特定的資料保全系統(使用本身的序號(S/N)),在該行動裝置610上運行之該資料保全系統應用程式618將向該伺服器/控制台640查詢於該使用者管理資料庫642中之任何旗標/未決的請求。當該使用者連接該資料保全系統620時,在該行動裝置610上之該資料保全系統應用程式618將執行等待「重置」指令。在成功的重置(所有使用者資料及憑證消失)之後,該伺服器/控制台640將移除該重置旗標以便當該行動裝置610連接至該特定資料保全系統時,該重置在下一次將不會執行。 Referring now to FIG. 11, it shows a reset sequence diagram of using the server/controller 640 to reset the data security system 620. This figure shows the ability to remotely reset the data security system 620 via the server/controller 640. The data preservation system 620 can only receive commands from the mobile device 610 via a wireless connection. However, by setting the "reset" flag on the server/controller 640 for a specific data security system (using its own serial number (S/N)), the data security running on the mobile device 610 The system application 618 will query the server/controller 640 for any flags/pending requests in the user management database 642. When the user connects to the data security system 620, the data security system application 618 on the mobile device 610 will execute a waiting "reset" command. After a successful reset (all user data and certificates disappear), the server/controller 640 will remove the reset flag so that when the mobile device 610 is connected to the specific data security system, the reset is as follows It will not be executed once.

雖然類似於第7-11圖,但該行動裝置610回應於有效使用者訊號906以發送任何指令等待訊號1100至該伺服器/控制台640以做出重置指令判定1102。當該重置指令出現時,執行重置訊號1104將發送至該行動裝置610。 Although similar to FIGS. 7-11, the mobile device 610 responds to the valid user signal 906 to send any command waiting signal 1100 to the server/console 640 to make a reset command decision 1102. When the reset command appears, the reset execution signal 1104 will be sent to the mobile device 610.

該行動裝置610將發送重置保全糸統訊號1106至該資料保全系統620以開始資料保全系統重置操作 1108。一旦該資料保全系統重置操作1108完成之後,該資料保全系統620將發送確認:資料保全系統重置訊號1110至該行動裝置610以設定確認:資料保全系統重置操作1112進入操作。之後,該行動裝置610及該資料保全系統620便與該資料保全系統620重置在完全可操作的通訊狀態下。 The mobile device 610 will send a reset security system signal 1106 to the data security system 620 to start the data security system reset operation 1108. Once the data security system reset operation 1108 is completed, the data security system 620 will send a confirmation: a data security system reset signal 1110 to the mobile device 610 to confirm the setting: the data security system reset operation 1112 enters the operation. After that, the mobile device 610 and the data security system 620 are reset to the data security system 620 in a fully operable communication state.

現參考第12圖,其中顯示使用該伺服器/控制台640解鎖該資料保全系統620之解鎖排序圖。此圖顯示經由該伺服器/控制台640遠端地解鎖該資料保全系統620的能力。該資料保全系統620可以經由無線連接僅從該行動裝置610接收指令。然而,藉由設定「管理者解鎖」旗標於該伺服器/控制台640控制台上用於特定資料保全系統(使用本身的序號(S/N)),在該行動裝置610上運行之該資料保全系統應用程式618將向該伺服器/控制台640查詢任何旗標/未決的請求。當該使用者連接該資料保全系統620時,在該行動裝置610上之該資料保全系統應用程式618將執行等待”管理者解鎖”指令。在成功的管理者解鎖之後,該使用者的資料維持不變,但是該使用者的密碼會被移除(該資料保全系統620無法由該使用者解鎖)。該伺服器/控制台640將移除用於該資料保全糸統620之重置旗標,因此當該行動裝置610連接至該資料保全系統620時,該重置在下一次將不會執行。 Referring now to FIG. 12, an unlock sequence diagram of using the server/controller 640 to unlock the data security system 620 is shown. This figure shows the ability of remotely unlocking the data security system 620 via the server/controller 640. The data preservation system 620 can only receive commands from the mobile device 610 via a wireless connection. However, by setting the "Administrator Unlock" flag on the server/controller 640 control panel for a specific data security system (using its own serial number (S/N)), the mobile device 610 running on the The data security system application 618 will query the server/controller 640 for any flags/pending requests. When the user connects to the data security system 620, the data security system application 618 on the mobile device 610 will execute the wait for the "manager to unlock" command. After the successful administrator unlocks, the user's data remains unchanged, but the user's password will be removed (the data security system 620 cannot be unlocked by the user). The server/controller 640 will remove the reset flag for the data protection system 620, so when the mobile device 610 is connected to the data protection system 620, the reset will not be performed next time.

雖然類似於第7-11圖,但在接收任何指令等待訊號1100之後,當有以管理者的密碼解鎖的指令時, 該伺服器/控制台640執行解鎖1200。以管理者的密碼解鎖訊號1202是發送至該行動裝置610,該行動裝置610提供以管理者的密碼解鎖訊號1204至該資料保全系統620以開始該資料保全系統解鎖操作804。之後,該行動裝置610及該資料保全系統620便在完全可操作的通訊狀態下。 Although similar to Figures 7-11, after receiving any command to wait for the signal 1100, when there is a command to unlock with the administrator’s password, The server/controller 640 performs unlocking 1200. The administrator's password unlock signal 1202 is sent to the mobile device 610, and the mobile device 610 provides the administrator's password unlock signal 1204 to the data security system 620 to start the data security system unlock operation 804. After that, the mobile device 610 and the data security system 620 are in a fully operable communication state.

現參考第13圖,其中顯示使用該伺服器/控制台640之變更使用者密碼的排序圖。此圖顯示經由該伺服器/控制台640遠端地變更用於資料保全系統620之使用者密碼的能力。即使資料保全系統620可以經由無線連接僅從該行動裝置610接收指令,但藉由設定「變更使用者密碼」旗標於該伺服器/控制台640控制台上用於特定的資料保全系統(使用本身的序號(S/N)),在該行動裝置610上運行之該資料保全系統應用程式618將向該伺服器/控制台640查詢任何旗標/未決的請求。當使用者將連接他的資料保全系統620時,在行動裝置610上之資料保全系統應用程式618將執行等待「變更使用者密碼」指令。在成功的解鎖及變更密碼之後,該使用者的資料維持不變並且該資料保全系統620可以用新的使用者密碼解鎖。該伺服器/控制台640將移除用於該資料保全糸統620之「變更使用者密碼」旗標,因此當該行動裝置610是連接至該特定資料保全系統時,該變更使用者密碼旗標在下一次將不會執行。 Referring now to Figure 13, which shows a sequence diagram of changing user passwords using the server/controller 640. This figure shows the ability to remotely change the user password for the data security system 620 via the server/controller 640. Even though the data security system 620 can only receive commands from the mobile device 610 via a wireless connection, by setting the "change user password" flag on the server/controller 640 console for a specific data security system (using With its own serial number (S/N)), the data security system application 618 running on the mobile device 610 will query the server/controller 640 for any flags/pending requests. When the user connects to his data security system 620, the data security system application 618 on the mobile device 610 will execute the waiting "change user password" command. After successfully unlocking and changing the password, the user's data remains unchanged and the data security system 620 can be unlocked with the new user password. The server/controller 640 will remove the "change user password" flag for the data security system 620, so when the mobile device 610 is connected to the specific data security system, the change user password flag The mark will not be executed next time.

雖然類似於第7-12圖,該伺服器/控制台640藉由做出變更密碼判定1300以回應於任何指令等待訊號 1100。當在該伺服器/控制台640處已經有密碼變更時,變更使用者密碼訊號1302是發送至該行動裝置610,該行動裝置610發送變更使用者密碼訊號1304至該資料保全系統620。之後,該行動裝置610及該資料保全系統620是以新的密碼在完全可操作的通訊狀態下。 Although similar to Figures 7-12, the server/controller 640 responds to any command waiting signal by making a password change decision 1300 1100. When the password has been changed at the server/controller 640, the user password change signal 1302 is sent to the mobile device 610, and the mobile device 610 sends the user password change signal 1304 to the data security system 620. After that, the mobile device 610 and the data security system 620 are in a fully operable communication state with the new password.

資料保全系統之操作之方法包括:提供具有用於與該資料保全系統連接之資料保全系統應用程式之行動裝置;開始該資料保全系統應用程式;以及維持該資料保全系統與該行動裝置之連接。 The operation method of the data security system includes: providing a mobile device with a data security system application for connecting with the data security system; starting the data security system application; and maintaining the connection between the data security system and the mobile device.

如同上文所描述之方法,其中,維持該連接是當該資料保全系統在該行動裝置之預定感應距離內時維持連接。 As in the method described above, the maintaining the connection is maintaining the connection when the data security system is within the predetermined sensing distance of the mobile device.

如同上文所描述之方法,其中,維持該連接之是當該資料保全系統在該行動裝置之預定感應距離內持續預定的時間週期時維持連接。 As in the method described above, in which the connection is maintained when the data security system is maintained within the predetermined sensing distance of the mobile device for a predetermined period of time.

如同上文所描述之方法,其中,建立該連接包含使用在該資料保全系統與該行動裝置之間之雙向通訊。 As in the method described above, wherein establishing the connection includes using two-way communication between the data security system and the mobile device.

如同上文所描述之方法,其中,建立該連接包含使用在該資料保全系統與該行動裝置之間之單向通訊。 As with the method described above, wherein establishing the connection includes using one-way communication between the data security system and the mobile device.

如同上文所描述之方法,更包括在具有該資料保全系統應用程式之該行動裝置與含有使用者管理資料庫之伺服器之間之通訊。 Like the method described above, it further includes the communication between the mobile device with the data security system application and the server containing the user management database.

如同上文所描述之方法,更包括提供在該資料保全系統中之保全控制器內之保全資訊。 Like the method described above, it further includes providing the security information in the security controller in the data security system.

如同上文所描述之方法,更包括:提供具有特定資料保全系統之身份識別之伺服器;提供具有特定身份識別之該資料保全系統;以及當該特定資料保全系統之該身份識別是相同於該資料保全系統之該特定身份識別時,解鎖該資料保全系統。 As the method described above, it further includes: providing a server with the identity of a specific data security system; providing the data security system with a specific identity; and when the identity of the specific data security system is the same as the When the specific identity of the data security system is identified, the data security system is unlocked.

如同上文所描述之方法,其中,提供具有該資料保全系統應用程式之行動裝置提供資料保全系統管理者的應用程式並且更包含:設定管理者的密碼於該行動裝置中;從該行動裝置傳輸該管理者的密碼至該資料保全系統;以及設定該管理者的密碼於該資料保全系統中並解鎖該資料保全系統。 As the method described above, wherein providing a mobile device with the data security system application provides an application for a data security system administrator and further includes: setting the administrator’s password in the mobile device; transmitting from the mobile device The password of the manager is to the data security system; and the password of the manager is set in the data security system and unlocks the data security system.

如同上文所描述之方法,更包括:提供結合來自該行動裝置之行動裝置身份識別之解鎖請求至該資料保全系統;以及接收該資料保全系統中之該解鎖請求並解鎖該資料保全系統。 As the method described above, it further includes: providing an unlocking request combined with the mobile device identification from the mobile device to the data security system; and receiving the unlocking request in the data security system and unlocking the data security system.

如同上文所描述之方法,更包括:輸入使用者名稱或密碼於該行動裝置中;在由該行動裝置接收該使用者名稱或密碼之後,判定何時該使用者名稱或密碼於伺服器中是有效的;當該使用者名稱或密碼有效時,由該伺服器至該行動裝置產生通訊;以及當該使用者名稱或密碼有效而解鎖該資料保全系統時,由該行動裝置至該資料保全系統產生通訊。 Like the method described above, it further includes: inputting a user name or password in the mobile device; after receiving the user name or password by the mobile device, determining when the user name or password is in the server Valid; when the user name or password is valid, communication is generated from the server to the mobile device; and when the user name or password is valid to unlock the data security system, from the mobile device to the data security system Generate communications.

如同上文所描述之方法,更包括:輸入使用者名稱或密碼於行動裝置中;在由該行動裝置接收該使用者名稱或密碼之後,判定何時該使用者名稱或密碼於伺服器中是有效的;當該使用者名稱或密碼有效時,由該伺服器與該行動裝置產生通訊;在接收來自該行動裝置之身份識別號碼之後,判定何時該身份識別號碼於該伺服器中是有效的;以及當該伺服器判定該身份識別號碼有效時,透過該行動裝置解鎖該資料保全系統。 As the method described above, it further includes: inputting the user name or password in the mobile device; after receiving the user name or password by the mobile device, determining when the user name or password is valid in the server When the user name or password is valid, the server communicates with the mobile device; after receiving the identification number from the mobile device, determine when the identification number is valid in the server; And when the server determines that the identification number is valid, it unlocks the data security system through the mobile device.

如同上文所描述之方法,更包括:提供該行動裝置之有效位置至伺服器;判定於該伺服器中何時該行動裝置是在該有效位置內;以及當該伺服器判定該行動裝置是在該有效位置內時,透過該行動裝置解鎖該資料保全系統。 As the method described above, it further includes: providing the valid location of the mobile device to the server; determining when the mobile device is in the valid location in the server; and when the server determines that the mobile device is in the valid location When in the valid location, unlock the data security system through the mobile device.

如同上文所描述之方法,更包括:提供在該行動裝置處用於該資料保全系統之操作的目前時間給伺服器;判定於該伺服器中何時該行動裝置是在該目前時間內;以及當該伺服器判定該行動裝置具有該目前時間時,透過該行動裝置解鎖該資料保全系統。 Like the method described above, it further includes: providing the current time for the operation of the data security system at the mobile device to the server; determining when the mobile device is in the current time in the server; and When the server determines that the mobile device has the current time, the data security system is unlocked through the mobile device.

如同上文所描述之方法,更包括:提供於伺服器中之指令;由該伺服器提供該指令至該行動裝置以回應來自該行動裝置之指令等待訊號;以及當該指令是由該伺服器所提供時,透過該行動裝置執行於該資料保全系統中之該指令。 As the method described above, it further includes: providing a command in a server; providing the command to the mobile device by the server in response to a command waiting signal from the mobile device; and when the command is issued by the server When provided, execute the command in the data security system through the mobile device.

如同上文所描述之方法,更包括:提供於伺 服器中之變更密碼指令;由該伺服器提供該變更密碼指令至該行動裝置以回應於來自該行動裝置的變更密碼訊號;以及使用在該資料保全系統中之該變更密碼解鎖該資料保全系統。 Like the method described above, it also includes: The change password command in the server; the server provides the change password command to the mobile device in response to the change password signal from the mobile device; and uses the change password in the data security system to unlock the data security system .

如同上文所描述之方法,更包括連接該資料保全系統至主機電腦用於啟動並可由該主機電腦發現。 Like the method described above, it further includes connecting the data security system to the host computer for activation and discovery by the host computer.

資料保全系統包括:資料保全收發器或接收器;可操作地連接至該資料保全收發器或接收器之認證次系統;以及連接至該認證次系統之儲存次系統。 The data security system includes: a data security transceiver or receiver; an authentication sub-system operably connected to the data security transceiver or receiver; and a storage sub-system connected to the authentication sub-system.

如同上文所描述之該系統更包括連接至該資料保全收發器或該接收器及連接至該認證次系統之保全控制器。 As described above, the system further includes a security controller connected to the data security transceiver or the receiver and to the authentication sub-system.

如同上文所描述之系統更包括具有資料保全系統應用程式之行動裝置,當該資料保全系統是在該行動裝置的預定感應距離內時,與該保全控制器一起操作以用於維持連接。 The system as described above further includes a mobile device with a data security system application. When the data security system is within a predetermined sensing distance of the mobile device, it operates together with the security controller to maintain the connection.

如同上文所描述之該系統更包括具有資料保全系統應用程式之行動裝置,當該資料保全系統是在該行動裝置的預定感應距離內持續預定的時間週期時,與該保全控制器一起操作用於維持連接。 As described above, the system further includes a mobile device with a data security system application. When the data security system is within the predetermined sensing distance of the mobile device for a predetermined period of time, it is used to operate together with the security controller To maintain the connection.

如同上文所描述之該系統更包括具有用於維持連接之行動收發器或接收器之行動裝置,包含在該資料保全系統與該行動裝置之間使用雙向通訊。 As described above, the system further includes a mobile device with a mobile transceiver or receiver for maintaining the connection, including the use of two-way communication between the data security system and the mobile device.

如同上文所描述之該系統更包括具有用於維 持連接之行動收發器或接收器之行動裝置,包含在該資料保全系統與該行動裝置之間使用單向通訊。 As described above, the system further includes A mobile device with a connected mobile transceiver or receiver includes the use of one-way communication between the data security system and the mobile device.

如同上文所描述之該系統更包括在具有資料保全系統應用程式之行動裝置與含有使用者管理資料庫之伺服器之間之有線或無線連接通訊。 As described above, the system further includes wired or wireless communication between a mobile device with a data security system application and a server containing a user management database.

如同上文所描述之該系統,其中,該資料保全系統包含用於連接至主機電腦之外部通訊通道。 Like the system described above, the data security system includes an external communication channel for connecting to the host computer.

本發明提供一種方法,包含:偵測具有上鎖之資料通道的資料儲存裝置的連接,該資料儲存裝置進一步包括:一介面控制器,係用以透過資料通道通訊;一記憶體;一認證次系統,其具有認證資訊及加密金鑰;一加密引擎;及一無線收發器,係用於該資料通道外部之射頻通訊;經由該無線收發器,在通過該介面控制器的該資料通道上鎖時,接收使用者認證輸入;依據被接收之該使用者認證輸入及該認證次系統的該認證資訊,解鎖該資料儲存裝置的該資料通道;以及在該資料通道被解鎖時:在儲存加密資料於該記憶體中之前,透過加密金鑰加密透過該資料通道接收的資料;及在透過該資料通道發送解密資料之前,透過該加密金鑰解密讀取來自該記憶體的資料。 The present invention provides a method including: detecting the connection of a data storage device with a locked data channel, the data storage device further comprising: an interface controller for communicating through the data channel; a memory; and an authentication time A system with authentication information and encryption keys; an encryption engine; and a wireless transceiver for radio frequency communication outside the data channel; through the wireless transceiver, the data channel through the interface controller is locked When the user authentication input is received; unlock the data channel of the data storage device based on the received user authentication input and the authentication information of the authentication subsystem; and when the data channel is unlocked: store encrypted data Before in the memory, encrypt the data received through the data channel with an encryption key; and decrypt the data from the memory with the encryption key before sending the decrypted data through the data channel.

本發明提供一種資料儲存裝置,包含:一記憶體;一介面控制器,係用於透過資料通道進行通訊,該資料通道係上鎖直到使用者獲得授權;一無線收發器,係用於該資料通道外部之射頻通訊,該無線收發器係組構以接收使用者認證輸入;一認證次系統,其具有認證資訊及 加密金鑰,依據被接收之該使用者認證輸入及該認證資訊,解鎖該資料儲存裝置的該資料通道;以及一加密引擎,在儲存加密資料於該記憶體中之前,透過加密金鑰加密經由該資料通道接收的資料,及在透過該資料通道發送解密資料之前,透過該加密金鑰解密讀取來自該記憶體的資料。 The present invention provides a data storage device, including: a memory; an interface controller for communicating through a data channel that is locked until the user is authorized; and a wireless transceiver for the data RF communication outside the channel, the wireless transceiver is configured to receive user authentication input; an authentication sub-system, which has authentication information and The encryption key unlocks the data channel of the data storage device based on the received user authentication input and the authentication information; and an encryption engine that encrypts the data through the encryption key before storing the encrypted data in the memory The data received by the data channel and the data from the memory are decrypted by the encryption key before sending the decrypted data through the data channel.

本發明提供一種系統,包括:一或更多個電腦處理器;資料通道,係連接於該一或更多個電腦處理器;以及自我加密裝置,係連接於該資料通道,該自我加密裝置包括:一認證次系統,係包括一認證處理器;一加密引擎;一儲存媒介,係儲存加密資料,該加密資料係由該認證次系統提供之加密金鑰所加密;一射頻(RF,radio frequency)收發器,係與該資料通道外部通訊;及一介面控制器的一資料介面,係耦接於該資料通道,該資料介面自發送及接收資料上鎖直至該自我加密裝置經由該認證次系統透過該RF收發器接收的使用者認證資訊解鎖。 The present invention provides a system including: one or more computer processors; a data channel connected to the one or more computer processors; and a self-encrypting device connected to the data channel, the self-encrypting device including : An authentication subsystem includes an authentication processor; an encryption engine; a storage medium for storing encrypted data, which is encrypted by an encryption key provided by the authentication subsystem; a radio frequency (RF, radio frequency) ) The transceiver communicates with the data channel externally; and a data interface of an interface controller is coupled to the data channel. The data interface is locked from sending and receiving data until the self-encrypting device passes the authentication sub-system The user authentication information received through the RF transceiver is unlocked.

本發明提供一種方法,包括:提供自我加密裝置於主機電腦系統,該主機電腦系統進一步具有一或更多個處理器及一資料通道,該資料通道係連接於該一或更多個處理器以及連接於該自我加密裝置;建立通訊通道於該自我加密裝置的資料介面與該資料通道之間,該通訊通道被上鎖直至該自我加密裝置被授權;經由該自我加密裝置的射頻(RF,radio frequency)收發器用於該資料通道外部的通訊以接收使用者認證資訊;由該自我加密裝置的認證次系統依據該使用者認證資訊解鎖該通訊通道;藉由該自 我加密裝置透過該資料介面接收經由該自我加密裝置的該認證次系統提供具有加密金鑰的加密資料;以及儲存該加密資料於該自我加密裝置的儲存次系統中。 The present invention provides a method including: providing a self-encrypting device in a host computer system, the host computer system further has one or more processors and a data channel, the data channel is connected to the one or more processors and Connect to the self-encrypting device; establish a communication channel between the data interface of the self-encrypting device and the data channel, the communication channel is locked until the self-encrypting device is authorized; through the self-encrypting device's radio frequency (RF, radio frequency) The transceiver is used for communication outside the data channel to receive user authentication information; the authentication subsystem of the self-encrypting device unlocks the communication channel according to the user authentication information; The my encryption device receives the encrypted data with the encryption key provided by the authentication sub-system of the self-encrypting device through the data interface; and stores the encrypted data in the storage sub-system of the self-encrypting device.

雖然本發明已經結合特定最佳模式做描述,應該瞭解的是很多替代、修正及變化對於熟習該項技藝之人士依據先前的描述將是顯而易見的。因此,本發明意在涵括落在該包含的申請專利範圍之範疇內之所有此類的替代、修正及變化。在此所提出或顯示於該附加的圖式中之所有的事項應當解讀為說明及限定的意義。 Although the present invention has been described in conjunction with the specific best mode, it should be understood that many alternatives, modifications and changes will be obvious to those familiar with the art based on the previous description. Therefore, the present invention is intended to include all such substitutions, modifications and changes within the scope of the included patent application. All items proposed or shown in the attached drawings should be interpreted as explanations and limitations.

100:資料保全系統 100: Data Protection System

102:外部通訊通道 102: External communication channel

104:認證次系統 104: certification sub-system

106:儲存次系統 106: storage system

108:介面控制器 108: Interface Controller

110:加密引擎 110: encryption engine

112:儲存媒介 112: storage medium

114:認證控制器 114: Certified Controller

116:加密金鑰 116: Encryption key

118:認證金鑰 118: authentication key

120:主機電腦系統 120: host computer system

122:使用者 122: User

Claims (27)

一種具有加密性的資料保全系統之操作方法,包括:偵測具有上鎖之資料通道的資料儲存裝置的連接,該資料儲存裝置進一步包括:一介面控制器,係用以透過該資料通道通訊;一記憶體;一認證次系統,具有認證資訊及加密金鑰;一加密引擎;及一無線收發器,係用於該資料通道外部之射頻通訊;經由該無線收發器,在通過該介面控制器的該資料通道上鎖時,接收使用者認證輸入;經由該無線收發器與行動裝置中的應用程式通訊,其中,遠端伺服器藉由確認預定位置內的該行動裝置的存在驗證該使用者認證輸入,及驗證位置允許以限制該資料儲存裝置於特定位置的使用;在該使用者經由該遠端伺服器驗證之後,由該資料儲存裝置透過該無線收發器從該行動裝置接收該使用者認證輸入;依據被接收之該使用者認證輸入及該認證次系統的該認證資訊,解鎖該資料儲存裝置的該資料通道;以及在該資料通道被解鎖時:在儲存加密資料於該記憶體中之前,透過該加 密金鑰加密透過該資料通道接收的資料;及在透過該資料通道發送解密資料之前,透過該加密金鑰解密讀取來自該記憶體的資料。 An operation method of an encrypted data security system includes: detecting the connection of a data storage device with a locked data channel, the data storage device further comprising: an interface controller for communicating through the data channel; A memory; an authentication sub-system with authentication information and encryption keys; an encryption engine; and a wireless transceiver for radio frequency communication outside the data channel; through the wireless transceiver, the interface controller When the data channel of is locked, the user authentication input is received; the wireless transceiver communicates with the application in the mobile device, wherein the remote server verifies the user by confirming the existence of the mobile device in the predetermined location Authentication input and authentication location allow to restrict the use of the data storage device in a specific location; after the user is authenticated by the remote server, the data storage device receives the user from the mobile device through the wireless transceiver Authentication input; unlock the data channel of the data storage device based on the received user authentication input and the authentication information of the authentication subsystem; and when the data channel is unlocked: store encrypted data in the memory Previously, through the addition The secret key encrypts the data received through the data channel; and before sending the decrypted data through the data channel, decrypt the data from the memory through the encryption key. 如申請專利範圍第1項所述之方法,進一步包括:依據該解鎖從該認證次系統傳輸該加密金鑰至該加密引擎,其中,該加密金鑰不儲存於該資料儲存裝置中的該記憶體中,其中,該加密金鑰不從該資料儲存裝置的外部存取。 For example, the method described in claim 1 further includes: transmitting the encryption key from the authentication sub-system to the encryption engine according to the unlocking, wherein the encryption key is not stored in the memory of the data storage device In the body, the encryption key is not accessed from outside the data storage device. 如申請專利範圍第1項所述之方法,其中,接收該使用者認證輸入進一步包括:該行動裝置中的應用程式經由該無線收發器通訊;以及從該行動裝置接收該使用者認證輸入。 According to the method described in claim 1, wherein receiving the user authentication input further includes: the application in the mobile device communicates via the wireless transceiver; and receiving the user authentication input from the mobile device. 如申請專利範圍第1項所述之方法,進一步包括:在該行動裝置中的該應用程式接收指令以變更來自該遠端伺服器的該認證資訊之後,接收該指令以變更來自該行動裝置中之該應用程式的該認證資訊。 The method described in item 1 of the scope of patent application further includes: after the application in the mobile device receives a command to change the authentication information from the remote server, receiving the command to change the authentication information from the mobile device The certification information of the application. 如申請專利範圍第1項所述之方法,其中,該行動裝置中的該應用程式允許該行動裝置對該資料儲存裝置的該資料通道上鎖、對該資料儲存裝置的該資料通道解鎖、變更使用者名稱、變更該認證資訊、及重置該資料儲存裝置。 Such as the method described in item 1 of the scope of patent application, wherein the application in the mobile device allows the mobile device to lock the data channel of the data storage device, unlock and change the data channel of the data storage device User name, change the authentication information, and reset the data storage device. 如申請專利範圍第1項所述之方法,其中,該行動裝置中的該應用程式使該遠端伺服器重置該資料儲存裝置 和解鎖該資料儲存裝置。 The method described in item 1 of the scope of patent application, wherein the application in the mobile device causes the remote server to reset the data storage device And unlock the data storage device. 如申請專利範圍第1項所述之方法,其中,該行動裝置中的該應用程式使該遠端伺服器藉由確認地理圍欄內該行動裝置的存在以限制該資料儲存裝置於特定位置的使用。 The method described in item 1 of the scope of patent application, wherein the application in the mobile device enables the remote server to restrict the use of the data storage device in a specific location by confirming the existence of the mobile device in the geofence . 如申請專利範圍第1項所述之方法,其中,該行動裝置中的該應用程式使該遠端伺服器限制該資料儲存裝置於特定時間區域及時間週期的使用。 The method described in item 1 of the scope of patent application, wherein the application in the mobile device causes the remote server to restrict the use of the data storage device in a specific time zone and time period. 如申請專利範圍第1項所述之方法,其中,該資料通道為電腦匯流排介面。 Such as the method described in item 1 of the scope of patent application, wherein the data channel is a computer bus interface. 如申請專利範圍第1項所述之方法,其中,該射頻通訊為無線保真(WiFi,Wireless Fidelity)、藍芽(BT,Bluetooth)、藍芽智能(BLE,Bluetooth Smart)、近場通訊(NFC,Near Field Communication)、或行動通訊(cellular communication)之一者。 For example, the method described in item 1 of the scope of patent application, wherein the radio frequency communication is wireless fidelity (WiFi, Wireless Fidelity), Bluetooth (BT, Bluetooth), Bluetooth Smart (BLE, Bluetooth Smart), near field communication ( NFC, Near Field Communication, or cellular communication. 一種資料儲存裝置,包括:一記憶體;一介面控制器,係用於透過資料通道進行通訊,該資料通道係上鎖直到使用者獲得授權;一無線收發器,係用於該資料通道外部之射頻通訊,該無線收發器係組構以接收使用者認證輸入,該無限收發器係組構以:與行動裝置中的應用程式通訊,其中,遠端伺服器藉由確認預定位置內的該行動裝置的存在驗證 該使用者認證輸入,及驗證位置允許以限制該資料儲存裝置於特定位置的使用;及在該使用者經由該遠端伺服器驗證之後,從該行動裝置接收該使用者認證輸入;一認證次系統,具有認證資訊及加密金鑰,依據被接收之該使用者認證輸入及該認證資訊,解鎖該資料儲存裝置的該資料通道;以及一加密引擎,在儲存加密資料於該記憶體中之前,透過該加密金鑰加密經由該資料通道接收的資料,及在透過該資料通道發送解密資料之前,透過該加密金鑰解密讀取來自該記憶體的資料。 A data storage device includes: a memory; an interface controller for communicating through a data channel, the data channel is locked until the user obtains authorization; a wireless transceiver is used for the outside of the data channel Radio frequency communication, the wireless transceiver is configured to receive user authentication input, the wireless transceiver is configured to: communicate with the application in the mobile device, wherein the remote server confirms the mobile in a predetermined location Device presence verification The user authentication input and the authentication location allow to restrict the use of the data storage device in a specific location; and after the user is authenticated by the remote server, the user authentication input is received from the mobile device; one authentication time The system has authentication information and an encryption key, unlocks the data channel of the data storage device based on the received user authentication input and the authentication information; and an encryption engine, before storing encrypted data in the memory, The data received through the data channel is encrypted by the encryption key, and the data from the memory is decrypted by the encryption key before the decrypted data is sent through the data channel. 如申請專利範圍第11項所述之資料儲存裝置,其中,該認證次系統依據該解鎖將該加密金鑰傳輸至該加密引擎,其中,該加密金鑰不儲存於該資料儲存裝置的該記憶體中,其中,該加密金鑰不從該資料儲存裝置的外部存取。 For example, the data storage device described in item 11 of the scope of patent application, wherein the authentication sub-system transmits the encryption key to the encryption engine according to the unlocking, wherein the encryption key is not stored in the memory of the data storage device In the body, the encryption key is not accessed from outside the data storage device. 如申請專利範圍第11項所述之資料儲存裝置,其中,接收該使用者認證輸入進一步包括:經由該無線收發器與該行動裝置中的應用程式通訊;以及經由該無線收發器,從該行動裝置接收該使用者認證輸入。 For the data storage device described in claim 11, wherein receiving the user authentication input further includes: communicating with the application in the mobile device via the wireless transceiver; and from the mobile device via the wireless transceiver The device receives the user authentication input. 如申請專利範圍第11項所述之資料儲存裝置,其中,該認證次系統組構以在該行動裝置中的該應用程式接 收指令以變更來自該遠端伺服器的該認證資訊之後,接收該指令以變更來自該行動裝置中之該應用程式的該認證資訊。 For example, the data storage device described in item 11 of the scope of patent application, wherein the authentication subsystem is configured to interface with the application in the mobile device After receiving an instruction to change the authentication information from the remote server, receive the instruction to change the authentication information from the application in the mobile device. 一種具有加密性的資料保全系統,該資料保全系統包括:一或更多個電腦處理器;資料通道,連接於該一或更多個電腦處理器;以及自我加密裝置,係連接於該資料通道,該自我加密裝置包括:一認證次系統,係包括一認證處理器;一加密引擎;一儲存媒介,係儲存加密資料,該加密資料係由該認證次系統提供之加密金鑰所加密;一射頻(RF,radio frequency)收發器,係與該資料通道外部通訊,該射頻收發器係組構以:與行動裝置中的應用程式通訊,其中,遠端伺服器藉由確認預定位置內的該行動裝置的存在驗證使用者認證輸入,及驗證位置允許以限制該自我加密裝置於特定位置的使用;及在該使用者經由該遠端伺服器驗證之後,從該行動裝置接收該使用者認證輸入;及一介面控制器的一資料介面,係與該資料通道耦接,該資料介面自發送及接收資料上鎖直至該自我加 密裝置經由該認證次系統透過該RF收發器接收的使用者認證資訊解鎖。 An encrypted data security system, the data security system comprising: one or more computer processors; a data channel connected to the one or more computer processors; and a self-encrypting device connected to the data channel , The self-encrypting device includes: an authentication sub-system including an authentication processor; an encryption engine; a storage medium storing encrypted data, the encrypted data being encrypted by an encryption key provided by the authentication sub-system; A radio frequency (RF) transceiver communicates externally with the data channel. The radio frequency transceiver is configured to communicate with an application in a mobile device. The remote server confirms the The existence of the mobile device verifies the user authentication input, and the verification location allows to restrict the use of the self-encrypting device in a specific location; and after the user is authenticated by the remote server, the user authentication input is received from the mobile device ; And a data interface of an interface controller, which is coupled with the data channel, the data interface is locked from sending and receiving data until the self-adding The secret device is unlocked by the user authentication information received by the authentication subsystem through the RF transceiver. 如申請專利範圍第15項所述之系統,其中,該RF收發器組構以從該行動裝置接收該使用者認證資訊,該行動裝置與該一或更多個電腦處理器分開,其中,該自我加密裝置係組構以解鎖該資料介面,以回應自該行動裝置所接收的該使用者認證資訊。 For example, the system described in claim 15, wherein the RF transceiver is configured to receive the user authentication information from the mobile device, and the mobile device is separated from the one or more computer processors, wherein the The self-encrypting device is configured to unlock the data interface in response to the user authentication information received from the mobile device. 如申請專利範圍第16項所述之系統,其中,該RF收發器係組構以使用獨立的加密於該行動裝置的RF通訊中,該獨立的加密與用於該RF通訊的通訊協定所提供之加密分開。 The system described in the 16th patent application, wherein the RF transceiver is configured to use independent encryption in the RF communication of the mobile device, and the independent encryption is provided by the communication protocol used for the RF communication The encryption is separated. 如申請專利範圍第16項所述之系統,其中,該行動裝置中的應用程式經由管理伺服器驗證使用者以授權該使用者,其中,該行動裝置發送解鎖指令至該自我加密裝置以回應該管理伺服器驗證該使用者。 For example, the system described in item 16 of the scope of patent application, wherein the application in the mobile device authenticates the user through the management server to authorize the user, wherein the mobile device sends an unlock command to the self-encrypting device in response The management server authenticates the user. 如申請專利範圍第15項所述之系統,進一步包括:一加密引擎,其中,該認證次系統儲存一加密金鑰,並且當使用者成功被授權時,該認證次系統傳輸該加密金鑰至該加密引擎。 For example, the system described in item 15 of the scope of patent application further includes: an encryption engine, wherein the authentication sub-system stores an encryption key, and when the user is successfully authorized, the authentication sub-system transmits the encryption key to The encryption engine. 如申請專利範圍第15項所述之系統,其中,當偵測到該系統關閉時,該自我加密裝置將計時器初始化,其中,如果該系統在該計時器期滿之前被重新啟動,該自我加密裝置以解鎖狀態初始化,其中,如果該系統在該計時器期滿之後被重新啟動,該自我加密裝置以上鎖狀 態初始化。 For example, the system described in item 15 of the scope of patent application, wherein when detecting that the system is shut down, the self-encrypting device initializes a timer, wherein if the system is restarted before the timer expires, the self-encrypting device The encryption device is initialized in an unlocked state, where if the system is restarted after the timer expires, the self-encrypting device is locked State initialization. 如申請專利範圍第15項所述之系統,其中,資料係在該資料介面與該資料通道之間以明確的形式傳輸。 Such as the system described in item 15 of the scope of patent application, wherein the data is transmitted in a clear form between the data interface and the data channel. 如申請專利範圍第15項所述之系統,其中,該系統係為膝上電腦、個人電腦、廚房用具、印表機、掃描器、伺服器、平板電腦裝置、醫療裝置、門解鎖系統、安全存取系統、存取控制裝置、家庭自動化裝置、家庭用具、行動電話、車輛、或智能電視機組之一者。 Such as the system described in item 15 of the scope of patent application, wherein the system is a laptop computer, a personal computer, a kitchen appliance, a printer, a scanner, a server, a tablet computer device, a medical device, a door unlocking system, and a security One of access systems, access control devices, home automation devices, household appliances, mobile phones, vehicles, or smart TV sets. 一種具有加密性的資料保全系統之操作方法,包括:提供自我加密裝置於主機電腦系統,該主機電腦系統進一步具有一或更多個處理器及一資料通道,該資料通道係連接於該一或更多個處理器以及連接於該自我加密裝置;建立通訊通道於該自我加密裝置的資料介面與該資料通道之間,該通訊通道被上鎖直至該自我加密裝置被授權;經由該自我加密裝置的射頻(RF,radio frequency)收發器接收使用者認證資訊以用於該資料通道外部的通訊;經由該射頻收發器與行動裝置中的應用程式通訊,其中,遠端伺服器藉由確認預定位置內的該行動裝置的存在驗證使用者認證輸入,及驗證位置允許以限制該自我加密裝置於特定位置的使用;及在該使用者經由該遠端伺服器驗證之後,從該行 動裝置接收該使用者認證輸入;由該自我加密裝置的認證次系統依據該使用者認證資訊解鎖該通訊通道;藉由該自我加密裝置透過該資料介面接收經由該自我加密裝置的該認證次系統提供具有加密金鑰的加密資料;以及儲存該加密資料於該自我加密裝置的儲存次系統中。 An operation method of an encrypted data security system includes: providing a self-encrypting device to a host computer system, the host computer system further has one or more processors and a data channel, the data channel is connected to the one or More processors and connected to the self-encrypting device; establishing a communication channel between the data interface of the self-encrypting device and the data channel, and the communication channel is locked until the self-encrypting device is authorized; through the self-encrypting device The radio frequency (RF) transceiver receives user authentication information for communication outside the data channel; communicates with the application in the mobile device through the radio frequency transceiver, where the remote server confirms the predetermined location The existence of the mobile device within the verification user authentication input, and the verification location allows to restrict the use of the self-encrypting device in a specific location; and after the user is verified by the remote server, from the line The mobile device receives the user authentication input; the authentication subsystem of the self-encrypting device unlocks the communication channel according to the user authentication information; the self-encrypting device receives the authentication subsystem through the self-encrypting device through the data interface Provide encrypted data with an encryption key; and store the encrypted data in the storage subsystem of the self-encrypting device. 如申請專利範圍第23項所述之方法,其中,該自我加密裝置不需要使用該主機電腦系統的該一或更多個處理器以授權使用者。 Such as the method described in claim 23, wherein the self-encrypting device does not need to use the one or more processors of the host computer system to authorize the user. 如申請專利範圍第23項所述之方法,進一步包括:經由該RF收發器且從行動裝置接收該使用者認證資訊;以及解鎖該自我加密裝置以回應經由該RF收發器接收的該使用者認證資訊。 The method described in claim 23, further comprising: receiving the user authentication information from a mobile device via the RF transceiver; and unlocking the self-encrypting device in response to the user authentication received via the RF transceiver News. 如申請專利範圍第25項所述之方法,其中,該行動裝置中的應用程式藉由管理伺服器驗證使用者以授權該使用者,該方法進一步包括:從該行動裝置接收解鎖指令以回應該管理伺服器驗證該使用者。 For example, the method of claim 25, wherein the application in the mobile device authenticates the user by the management server to authorize the user, and the method further includes: receiving an unlock command from the mobile device to respond The management server authenticates the user. 如申請專利範圍第23項所述之方法,其中,當偵測到該主機電腦系統關閉時,該自我加密裝置將計時器初始化,其中,如果該主機電腦系統在該計時器期滿之前被 重新啟動,該自我加密裝置以解鎖狀態初始化,其中,如果該主機電腦系統在該計時器期滿之後被重新啟動,該自我加密裝置以上鎖狀態初始化。 For example, the method described in item 23 of the scope of patent application, wherein when detecting that the host computer system is shut down, the self-encrypting device initializes a timer, wherein if the host computer system is blocked before the timer expires When restarting, the self-encrypting device is initialized in an unlocked state, wherein if the host computer system is restarted after the timer expires, the self-encrypting device is initialized in a locked state.
TW109109809A 2016-01-04 2017-01-04 Data security system with encryption and method for its operation TWI727717B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/987,749 2016-01-04
US14/987,749 US10181055B2 (en) 2007-09-27 2016-01-04 Data security system with encryption

Publications (2)

Publication Number Publication Date
TW202029042A TW202029042A (en) 2020-08-01
TWI727717B true TWI727717B (en) 2021-05-11

Family

ID=59311569

Family Applications (2)

Application Number Title Priority Date Filing Date
TW106100149A TWI692704B (en) 2016-01-04 2017-01-04 Data security system and method of operating the same
TW109109809A TWI727717B (en) 2016-01-04 2017-01-04 Data security system with encryption and method for its operation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW106100149A TWI692704B (en) 2016-01-04 2017-01-04 Data security system and method of operating the same

Country Status (6)

Country Link
JP (3) JP6633228B2 (en)
KR (2) KR102054711B1 (en)
CN (2) CN108604982B (en)
GB (2) GB2562923B (en)
TW (2) TWI692704B (en)
WO (1) WO2017123433A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11971967B2 (en) 2007-09-27 2024-04-30 Clevx, Llc Secure access device with multiple authentication mechanisms

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
TWI651626B (en) * 2017-11-30 2019-02-21 大陸商北京集創北方科技股份有限公司 Biometric data encryption method and information processing device using same
WO2019177563A1 (en) * 2018-03-12 2019-09-19 Hewlett-Packard Development Company, L.P. Hardware security
GB2574433B (en) * 2018-06-06 2022-11-02 Istorage Ltd Dongle for ciphering data
WO2020037053A1 (en) * 2018-08-16 2020-02-20 Clevx, Llc Self-encrypting module with embedded wireless user authentication
GB2582900A (en) 2019-03-18 2020-10-14 Pqshield Ltd Cryptography using a cryptographic state
CN110225515B (en) * 2019-06-24 2022-08-23 喀斯玛(北京)科技有限公司 Authentication management system, method and device
GB201911802D0 (en) 2019-08-16 2019-10-02 Pqshield Ltd Lattice Coprocessor
JP2022050899A (en) * 2020-09-18 2022-03-31 キオクシア株式会社 Memory system
US20220278963A1 (en) * 2021-03-01 2022-09-01 Samsung Electronics Co., Ltd. Storage device, storage system, and method of secure data movement between storage devices
GB2608999A (en) 2021-07-15 2023-01-25 Pqshield Ltd Cryptographic system for post-quantum cryptographic operations
TWI788936B (en) * 2021-08-02 2023-01-01 民傑資科股份有限公司 Flash drive locked with wireless communication manner
KR102540669B1 (en) * 2021-12-17 2023-06-08 주식회사 그리다에너지 System for Job history authentication using encrypted and non-editable job data
CN114598461B (en) * 2022-02-24 2023-10-31 广东天波信息技术股份有限公司 Online unlocking method of terminal equipment, terminal equipment and readable storage medium
TWI885339B (en) * 2023-03-07 2025-06-01 一德金屬工業股份有限公司 How to control combination locks

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070248232A1 (en) * 2006-04-10 2007-10-25 Honeywell International Inc. Cryptographic key sharing method
TW200915074A (en) * 2007-09-27 2009-04-01 Clevx Llc Data security system with encryption
TW201530338A (en) * 2013-12-06 2015-08-01 Apple Inc Provisioning and authenticating credentials on an electronic device
TW201546729A (en) * 2014-06-03 2015-12-16 Alibaba Group Services Ltd Secure identity verification

Family Cites Families (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10340231A (en) * 1997-06-05 1998-12-22 Kokusai Electric Co Ltd Ic card
US6529949B1 (en) * 2000-02-07 2003-03-04 Interactual Technologies, Inc. System, method and article of manufacture for remote unlocking of local content located on a client device
US6708272B1 (en) * 1999-05-20 2004-03-16 Storage Technology Corporation Information encryption system and method
WO2001020463A1 (en) * 1999-09-17 2001-03-22 Fingloq Ab Security arrangement
US8677505B2 (en) * 2000-11-13 2014-03-18 Digital Doors, Inc. Security system with extraction, reconstruction and secure recovery and storage of data
US7099663B2 (en) * 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
TW583568B (en) * 2001-08-27 2004-04-11 Dataplay Inc A secure access method and system
US20030109218A1 (en) * 2001-10-18 2003-06-12 Azalea Microelectronics Corporation Portable wireless storage unit
US7561691B2 (en) * 2001-11-12 2009-07-14 Palm, Inc. System and method for providing secured access to mobile devices
US7198571B2 (en) * 2002-03-15 2007-04-03 Igt Room key based in-room player tracking
JP2004326763A (en) * 2003-04-10 2004-11-18 Matsushita Electric Ind Co Ltd Password change system
WO2004090738A1 (en) 2003-04-10 2004-10-21 Matsushita Electric Industrial Co., Ltd. Password change system
JP2006025249A (en) * 2004-07-08 2006-01-26 Fujitsu Ltd Terminal device, data backup system thereof, data backup method thereof, and data backup program thereof
JP2008512738A (en) * 2004-09-06 2008-04-24 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Portable storage device and method for exchanging data
US20060075230A1 (en) * 2004-10-05 2006-04-06 Baird Leemon C Iii Apparatus and method for authenticating access to a network resource using multiple shared devices
JP2006139757A (en) * 2004-10-15 2006-06-01 Citizen Watch Co Ltd Locking system and locking method
US20060129829A1 (en) * 2004-12-13 2006-06-15 Aaron Jeffrey A Methods, systems, and computer program products for accessing data with a plurality of devices based on a security policy
US20060176146A1 (en) 2005-02-09 2006-08-10 Baldev Krishan Wireless universal serial bus memory key with fingerprint authentication
JP4781692B2 (en) * 2005-03-08 2011-09-28 インターナショナル・ビジネス・マシーンズ・コーポレーション Method, program and system for restricting I/O access by clients
US8335920B2 (en) * 2005-07-14 2012-12-18 Imation Corp. Recovery of data access for a locked secure storage device
TWI288553B (en) * 2005-10-04 2007-10-11 Carry Computer Eng Co Ltd Portable storage device having main identification information and method of setting main identification information thereof
CN101375259B (en) * 2006-01-24 2011-10-19 克莱夫公司 Data security system
WO2008147577A2 (en) * 2007-01-22 2008-12-04 Spyrus, Inc. Portable data encryption device with configurable security functionality and method for file encryption
US20080303631A1 (en) * 2007-06-05 2008-12-11 Beekley John S Mass Storage Device With Locking Mechanism
CN100533459C (en) * 2007-10-24 2009-08-26 北京飞天诚信科技有限公司 Data safe reading method and safe storage device thereof
US20100293374A1 (en) 2008-07-30 2010-11-18 Bushby Donald P Secure Portable Memory Storage Device
JP2010102617A (en) 2008-10-27 2010-05-06 Dainippon Printing Co Ltd System, device, method and program of access management of external storage, apparatus and recording medium
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
US9286493B2 (en) * 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
US8112066B2 (en) * 2009-06-22 2012-02-07 Mourad Ben Ayed System for NFC authentication based on BLUETOOTH proximity
US20110154023A1 (en) * 2009-12-21 2011-06-23 Smith Ned M Protected device management
US9270663B2 (en) * 2010-04-30 2016-02-23 T-Central, Inc. System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
CN103797491B (en) * 2011-09-28 2017-06-23 惠普发展公司,有限责任合伙企业 Storage device is unlocked
JP6029592B2 (en) 2011-11-19 2016-11-24 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Storage device
US8972728B2 (en) 2012-10-15 2015-03-03 At&T Intellectual Property I, L.P. Method and apparatus for providing subscriber identity module-based data encryption and remote management of portable storage devices
GB201221433D0 (en) * 2012-11-28 2013-01-09 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource on a mobile device
US20140149742A1 (en) * 2012-11-28 2014-05-29 Arnold Yau Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
US9215250B2 (en) * 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070248232A1 (en) * 2006-04-10 2007-10-25 Honeywell International Inc. Cryptographic key sharing method
TW200915074A (en) * 2007-09-27 2009-04-01 Clevx Llc Data security system with encryption
TW201530338A (en) * 2013-12-06 2015-08-01 Apple Inc Provisioning and authenticating credentials on an electronic device
TW201546729A (en) * 2014-06-03 2015-12-16 Alibaba Group Services Ltd Secure identity verification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11971967B2 (en) 2007-09-27 2024-04-30 Clevx, Llc Secure access device with multiple authentication mechanisms
US12437040B2 (en) 2007-09-27 2025-10-07 Clevx, Llc Secure access device with multiple authentication mechanisms

Also Published As

Publication number Publication date
JP6633228B2 (en) 2020-01-22
JP6938602B2 (en) 2021-09-22
JP2021192265A (en) 2021-12-16
GB2580549A (en) 2020-07-22
GB2562923B (en) 2020-02-12
GB201919421D0 (en) 2020-02-12
GB2562923A (en) 2018-11-28
KR20180107775A (en) 2018-10-02
JP7248754B2 (en) 2023-03-29
CN108604982A (en) 2018-09-28
KR20190137960A (en) 2019-12-11
KR102201093B1 (en) 2021-01-08
GB201811137D0 (en) 2018-08-22
KR102054711B1 (en) 2019-12-11
CN108604982B (en) 2020-09-04
TW202029042A (en) 2020-08-01
JP2020057412A (en) 2020-04-09
CN112054892A (en) 2020-12-08
JP2019511791A (en) 2019-04-25
TWI692704B (en) 2020-05-01
TW201737151A (en) 2017-10-16
WO2017123433A1 (en) 2017-07-20
CN112054892B (en) 2024-06-21
GB2580549B (en) 2020-12-23

Similar Documents

Publication Publication Date Title
TWI727717B (en) Data security system with encryption and method for its operation
US12437040B2 (en) Secure access device with multiple authentication mechanisms
US10985909B2 (en) Door lock control with wireless user authentication
US10783232B2 (en) Management system for self-encrypting managed devices with embedded wireless user authentication
US11190936B2 (en) Wireless authentication system
US9262611B2 (en) Data security system with encryption
EP3788538B1 (en) Self-encrypting module with embedded wireless user authentication
KR20160105958A (en) Close Range User Recognization Method Using OTP
KR20140007627A (en) Ic chip