TWI897106B - Data protection device and portable electronic device - Google Patents
Data protection device and portable electronic deviceInfo
- Publication number
- TWI897106B TWI897106B TW112145150A TW112145150A TWI897106B TW I897106 B TWI897106 B TW I897106B TW 112145150 A TW112145150 A TW 112145150A TW 112145150 A TW112145150 A TW 112145150A TW I897106 B TWI897106 B TW I897106B
- Authority
- TW
- Taiwan
- Prior art keywords
- detection
- latch
- data protection
- identification
- state
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Abstract
Description
本發明係關於一種資料保護裝置及可攜式電子設備。The present invention relates to a data protection device and a portable electronic device.
在個人裝置的資料安全領域,可能仰賴多重因子驗證(Multi-Factor Authentication)來控制資料的存取權限。例如,可透過密碼、一次性驗證碼(OTP)、生物特徵驗證碼等,來限制非法的資料存取操作。然而,當硬體本身處在高風險的環境且硬體儲存的資料具有高度機密性時,可能需要額外的手段來確保資料安全性。In the area of personal device data security, multi-factor authentication (MFA) may be relied upon to control data access permissions. For example, passwords, one-time passwords (OTPs), and biometric authentication codes can be used to restrict unauthorized data access. However, when the hardware itself is in a high-risk environment and the data stored on the hardware is highly confidential, additional measures may be required to ensure data security.
鑒於上述,本發明提供一種資料保護裝置及可攜式電子設備。In view of the above, the present invention provides a data protection device and a portable electronic device.
依據本發明一實施例的資料保護裝置,適用於儲存一目標資料的一記憶體,包含一插銷槽、一插銷、一偵測元件以及一運算元件。所述插銷與所述插銷槽可插拔地耦合,且具有一識別元件。所述偵測元件設置為對應於所述插銷槽,且用於對所述插銷槽進行偵測。所述運算元件連接於所述偵測元件,且用於當無法根據所述偵測元件的偵測結果判斷所述識別元件存在時,刪除所述目標資料。According to one embodiment of the present invention, a data protection device is suitable for use in a memory storing target data, and includes a latch slot, a latch, a detection element, and an arithmetic element. The latch is removably coupled to the latch slot and has an identification element. The detection element is configured to correspond to the latch slot and is configured to detect the latch slot. The arithmetic element is connected to the detection element and is configured to delete the target data when the detection result of the detection element cannot determine that the identification element is present.
依據本發明一實施例的可攜式電子設備,包含如上所述的資料保護裝置及所述記憶體。A portable electronic device according to an embodiment of the present invention includes the data protection device and the memory as described above.
藉由上述結構,本案所揭示的資料保護裝置及可攜式電子設備,透過在資料保護裝置設置彼此可插拔地耦合的插銷與插銷槽,其中插銷上具有識別元件,且插銷槽中設置有偵測元件,使得當插銷自插銷槽中退出時,資料保護裝置可受觸發而自動執行資料刪除作業。據此,當持有資料保護裝置的使用者面臨緊急狀況時,可簡便地將插銷自插銷槽中退出,以迅速對記憶體中的目標資料銷毀或格式化,確保目標資料不被有心人士竊取。Through the above-described structure, the data protection device and portable electronic device disclosed in this application utilize a pluggable and coupled plug and socket on the data protection device. The plug has an identification element, and the socket has a detection element. When the plug is removed from the socket, the data protection device is triggered to automatically perform a data deletion operation. Consequently, when a user of the data protection device faces an emergency, they can simply remove the plug from the socket to quickly destroy or format the target data in the memory, ensuring that the target data cannot be stolen by malicious individuals.
以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the present disclosure and the following description of the embodiments are intended to demonstrate and explain the spirit and principles of the present invention, and to provide further explanation of the scope of the patent application of the present invention.
以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The following detailed description of the features and advantages of the present invention is sufficient to enable anyone skilled in the relevant art to understand the technical content of the present invention and implement it accordingly. Based on the disclosure, patent application scope, and drawings in this specification, anyone skilled in the relevant art can easily understand the relevant objectives and advantages of the present invention. The following examples are intended to further illustrate the concepts of the present invention in detail and are not intended to limit the scope of the present invention in any way.
請參考圖1,圖1係依據本發明一實施例所繪示的資料保護裝置的方塊圖。如圖1所示,資料保護裝置1,適用於儲存一目標資料的一記憶體2,其包含一插銷11、一插銷槽12、一偵測元件13以及一運算元件14。插銷11與插銷槽12可插拔地耦合,且具有一識別元件111。偵測元件13設置為對應於插銷槽12,且用於對插銷槽12進行偵測。運算元件14連接於偵測元件13,且用於當無法根據偵測元件13的偵測結果判斷識別元件111存在時,刪除所述目標資料。Please refer to Figure 1, which is a block diagram of a data protection device according to an embodiment of the present invention. As shown in Figure 1, the data protection device 1 is suitable for a memory 2 for storing a target data, which includes a latch 11, a latch slot 12, a detection element 13 and an arithmetic element 14. The latch 11 is pluggably coupled to the latch slot 12 and has an identification element 111. The detection element 13 is configured to correspond to the latch slot 12 and is used to detect the latch slot 12. The arithmetic element 14 is connected to the detection element 13 and is used to delete the target data when it is impossible to determine the existence of the identification element 111 based on the detection result of the detection element 13.
在本例中,資料保護裝置1可用於對一電子裝置中的記憶體2進行資料保護。具體而言,記憶體2可設置在一筆記型電腦、一平板電腦、一隨身硬碟或其他個人裝置中,本案不予以限制。也就是說,基於本文描述的資料保護裝置1,可在本領域具通常知識者的理解下,進行適當修改以適配於各種裝置中的搭載的記憶體2,如此對記憶體2儲存的目標資料進行保護。另外,記憶體2的類型包含但不限於各種非揮發性記憶體,如唯讀記憶體(Read Only Memory,ROM)等。In this example, a data protection device 1 can be used to protect data in a memory 2 in an electronic device. Specifically, the memory 2 can be installed in a laptop, a tablet, a portable hard drive, or other personal device, without limitation in this case. In other words, based on the data protection device 1 described herein, it can be appropriately modified, as understood by those skilled in the art, to adapt to the memory 2 installed in various devices, thereby protecting the target data stored in the memory 2. Furthermore, the types of memory 2 include, but are not limited to, various non-volatile memories, such as read-only memory (ROM).
資料保護裝置1可包含兩個部分,本體及插拔部,其中兩者可以插拔形式彼此拆解或耦合。資料保護裝置1的插拔部包含插銷11,且插銷11包含一識別元件111。資料保護裝置1的本體包含插銷槽12、偵測元件13及運算元件14,且插銷槽12、偵測元件13及運算元件14可設置於具有一容納空間的殼體中。插銷11在結構上可具有一握持部及一延伸部,其中握持部用於令使用者易於施力進行插拔操作,延伸部用於與插銷槽12可插拔地耦合,且識別元件111設置於延伸部上。具體而言,識別元件111可為基於無線射頻識別(Radio Frequency Identification,RFID)技術的元件,例如可包含一近場無線通訊(Near-Field Communication,NFC)單元。The data protection device 1 may include two parts, a main body and a plug-in portion, wherein the two parts can be disassembled or coupled to each other in a plug-in manner. The plug-in portion of the data protection device 1 includes a plug 11, and the plug 11 includes an identification element 111. The main body of the data protection device 1 includes a plug slot 12, a detection element 13, and an operating element 14, and the plug slot 12, the detection element 13, and the operating element 14 can be arranged in a housing having a accommodating space. The plug 11 can structurally have a grip portion and an extension portion, wherein the grip portion is used to make it easier for the user to apply force to perform plug-in and pull-out operations, and the extension portion is used to be pluggably coupled to the plug slot 12, and the identification element 111 is arranged on the extension portion. Specifically, the identification element 111 may be an element based on radio frequency identification (RFID) technology, for example, may include a near-field communication (NFC) unit.
當插銷11與插銷槽12相耦合時,設置為對應於插銷槽12的偵測元件13可偵測到位於插銷槽12的容置空間中的插銷11。具體而言,偵測元件13可偵測到插銷11的識別元件111,並產生一第一偵測結果;當插銷11未與插銷槽12相耦合時,偵測元件13無法偵測到插銷11的識別元件111,並產生一第二偵測結果;或者,當其他插銷與插銷槽12相耦合時,偵測元件13無法識別到對應的識別元件,並產生一第三偵測結果。舉例而言,偵測元件13可為基於無線射頻識別(RFID)技術的讀取元件,且可與識別元件111之間具有一對一的對應關係。When the latch 11 is coupled to the latch slot 12, the detection element 13 corresponding to the latch slot 12 can detect the latch 11 positioned within the receiving space of the latch slot 12. Specifically, the detection element 13 can detect the identification element 111 of the latch 11 and generate a first detection result. When the latch 11 is not coupled to the latch slot 12, the detection element 13 cannot detect the identification element 111 of the latch 11 and generate a second detection result. Alternatively, when another latch is coupled to the latch slot 12, the detection element 13 cannot identify the corresponding identification element and generates a third detection result. For example, the detection element 13 may be a reader element based on radio frequency identification (RFID) technology and may have a one-to-one correspondence with the identification element 111 .
運算元件14可為具有資料接收、記錄、運算、儲存及輸出功能之元件,例如微控制器、中央處理器、可程式化邏輯控制器等。運算元件14用於接收偵測元件13的偵測結果,並根據偵測結果執行對應的操作。當運算元件14無法根據偵測元件13的偵測結果判斷識別元件111存在時,刪除記憶體2中儲存的目標資料。舉例而言,當偵測元件13無法偵測到插銷11的識別元件111(即,運算元件14接收上述第二偵測結果)時,或者當無法識別到對應的識別元件(即,運算元件14接收上述第三偵測結果)時,運算元件14可對記憶體2中的目標資料進行格式化刪除的操作。當然,在正常狀態下,當偵測元件13可偵測到插銷11的識別元件111(即,運算元件14接收上述第一偵測結果)時,運算元件14不對記憶體2的目標資料進行刪除操作。The computing element 14 can be a device capable of receiving, recording, computing, storing, and outputting data, such as a microcontroller, a central processing unit, or a programmable logic controller. The computing element 14 is used to receive the detection results from the detection element 13 and perform corresponding operations based on the detection results. If the computing element 14 cannot determine the presence of the identification element 111 based on the detection results from the detection element 13, the target data stored in the memory 2 is deleted. For example, when the detection element 13 cannot detect the identification element 111 of the plug 11 (i.e., the computing element 14 receives the second detection result), or when the corresponding identification element cannot be identified (i.e., the computing element 14 receives the third detection result), the computing element 14 may format and delete the target data in the memory 2. Of course, under normal circumstances, when the detection element 13 can detect the identification element 111 of the plug 11 (i.e., the computing element 14 receives the first detection result), the computing element 14 does not delete the target data in the memory 2.
請參照圖2,圖2係依據本發明一實施例所繪示的可攜式電子設備的方塊圖。如圖2所示,可攜式電子設備3包含如圖1所示的資料保護裝置1及記憶體2,其中資料保護裝置1同樣包含插銷11、插銷槽12、偵測元件13及運算元件14,且插銷11同樣包含識別元件111,因此,相關的重複描述在此省略。在本例中,資料保護裝置1及記憶體2同屬於一可攜式電子設備3。可攜式電子設備3包含但不限於筆記型電腦、個人平板等。以可攜式電子設備3為筆記型電腦作為一例子而言,插銷槽12可位於筆記型電腦的殼體一處,且當插銷11與插銷槽12耦合時,插銷11的握持部與筆記型電腦的殼體之間具有些許縫隙,以利使用者在特殊情況下施力將插銷11拔出。Please refer to Figure 2, which is a block diagram of a portable electronic device according to an embodiment of the present invention. As shown in Figure 2, portable electronic device 3 includes the data protection device 1 and memory 2 shown in Figure 1. Data protection device 1 similarly includes latch 11, latch slot 12, detection element 13, and computing element 14, and latch 11 similarly includes identification element 111. Therefore, repeated description of the related information is omitted here. In this example, data protection device 1 and memory 2 belong to the same portable electronic device 3. Portable electronic device 3 includes, but is not limited to, a laptop computer, a personal tablet, etc. Taking the portable electronic device 3 as a laptop computer as an example, the latch slot 12 can be located at one location on the laptop computer housing. When the latch 11 is coupled to the latch slot 12 , a slight gap is provided between the grip portion of the latch 11 and the laptop computer housing, so that the user can apply force to pull out the latch 11 in special circumstances.
記憶體2可為筆記型電腦(可攜式電子設備3)中用於儲存特定的目標資料的記憶體。據此,當運算元件14接收偵測元件13的偵測結果且無法根據偵測結果判斷識別元件111存在時,可將記憶體2中的目標資料刪除。另外,當運算元件14接收偵測元件13的偵測結果且無法根據偵測結果判斷識別元件111存在時,運算元件14也可刪除記憶體2的所有資料。也就是說,透過此配置,本案提供了一種具有資料保護功能的個人電腦,可讓使用者在特殊情況下以簡易的拉出插銷的操作來將機密資料進行格式化刪除,防止機密資料被有心人士竊取利用。需要注意的是,運算元件14可為筆記型電腦(可攜式電子設備3)本身用於運作其他功能的中央處理器,或是筆記型電腦(可攜式電子設備3)專門設置來用於進行資料保護操作的獨立的微控制器,本案不予以限制。Memory 2 can be a memory in a laptop (portable electronic device 3) used to store specific target data. Accordingly, when the computing device 14 receives the detection result from the detection device 13 and cannot determine the presence of the identification device 111 based on the detection result, the target data in memory 2 can be deleted. Alternatively, when the computing device 14 receives the detection result from the detection device 13 and cannot determine the presence of the identification device 111 based on the detection result, the computing device 14 can also delete all data in memory 2. In other words, through this configuration, the present invention provides a personal computer with data protection functionality, allowing users to format and delete confidential data in special circumstances by simply pulling out a latch, thereby preventing the confidential data from being stolen and used by malicious individuals. It should be noted that the computing element 14 can be the central processing unit of the notebook computer (portable electronic device 3) itself used to operate other functions, or it can be an independent microcontroller specifically configured in the notebook computer (portable electronic device 3) for performing data protection operations, and this invention is not limited to this.
請參考圖3,圖3係依據本發明另一實施例所繪示的資料保護裝置的方塊圖。如圖3所示,本例的資料保護裝置1’除了包含插銷11、插銷槽12、偵測元件13、運算元件14以外,更包含連接於運算元件14的一提示元件15。本例的運算元件14除了執行上述實施例的功能以外,更可記錄無法根據所述偵測結果判斷識別元件111存在的狀態時間長度,且在所述狀態時間長度未達一預設時間長度前不刪除所述目標資料,直至所述狀態時間長度達所述預設時間長度方刪除所述目標資料。進一步,在本例中,運算元件14更可在記錄所述狀態時間長度時,致動提示元件15輸出關聯於所述預設時間長度的一提示訊號。具體而言,提示元件15可為一顯示器。關於此基於狀態時間長度的控制流程於後有更詳細的描述。Please refer to Figure 3, which is a block diagram of a data protection device according to another embodiment of the present invention. As shown in Figure 3, the data protection device 1' of this embodiment includes not only a latch 11, a latch slot 12, a detection element 13, and an arithmetic element 14, but also a prompt element 15 connected to the arithmetic element 14. In addition to performing the functions of the aforementioned embodiments, the arithmetic element 14 of this embodiment can also record the duration of the state in which the identification element 111 cannot be determined based on the detection results. The target data will not be deleted until the state duration reaches a preset duration. The target data will be deleted only when the state duration reaches the preset duration. Furthermore, in this example, when the computing device 14 records the state duration, it can activate the prompt device 15 to output a prompt signal associated with the preset duration. Specifically, the prompt device 15 can be a display. The control process based on the state duration is described in more detail below.
另外,本例的資料處理裝置1更包含一開機觸發開關121以及一控制器122。開機觸發開關121設置於插銷槽12中且具有一第一狀態及一第二狀態,當插銷11與插銷槽12耦合時,開機觸發開關121處於所述第一狀態,當插銷11從插銷槽12退出時,開機觸發開關121處於第二狀態。控制器122連接於開機觸發開關121及運算元件14,用於當運算元件14處於停能狀態且開機觸發開關121處於該第二狀態時,致動運算元件14。舉例而言,當插銷11與插銷槽12耦合時,開機觸發開關121可受到插銷11的壓迫而使其中的電路元件處於第一狀態(如導通或關斷狀態);或者當插銷11從插銷槽12退出時,開機觸發開關121可受到插銷11的牽引而使其中的電路元件處於與第一狀態不同的第二狀態(如關斷或導通狀態)。藉此,控制器122可判斷當運算元件14處於停能狀態且開機觸發開關121處於該第二狀態時,致動運算元件14。控制器122可具體為微控制器、中央處理器、可程式化邏輯控制器等。In addition, the data processing device 1 of this embodiment further includes a power-on trigger switch 121 and a controller 122. The power-on trigger switch 121 is disposed in the latch slot 12 and has a first state and a second state. When the latch 11 is coupled to the latch slot 12, the power-on trigger switch 121 is in the first state. When the latch 11 is removed from the latch slot 12, the power-on trigger switch 121 is in the second state. The controller 122 is connected to the power-on trigger switch 121 and the computing element 14 and is configured to activate the computing element 14 when the computing element 14 is in the disabled state and the power-on trigger switch 121 is in the second state. For example, when the latch 11 is coupled to the latch slot 12, the power trigger switch 121 may be pressed by the latch 11, causing the circuit components therein to be in a first state (e.g., on or off). Alternatively, when the latch 11 is removed from the latch slot 12, the power trigger switch 121 may be pulled by the latch 11, causing the circuit components therein to be in a second state different from the first state (e.g., off or on). In this way, the controller 122 can determine that the computing element 14 is in the disabled state and the power trigger switch 121 is in the second state, and activate the computing element 14. The controller 122 may be embodied as a microcontroller, a central processing unit, a programmable logic controller, etc.
在本例中,雖然控制器122與運算元件14屬於同一裝置,但是控制器122可長期處於待機狀態而非停能狀態。舉例而言,當資料保護裝置1’關機時,運算元件14可處於停能狀態,控制器122則處於待機狀態,使得當插銷11自插銷槽12中退出時,控制器122可即時喚醒運算元件14,而被喚醒的運算元件14可進一步對偵測元件13的偵測結果進行判斷,以執行後續的資料刪除操作。另外,本例的資料保護裝置1’的提示元件15為選擇性設置,或者,資料保護裝置1’的開機觸發開關121與控制器122為選擇性設置。In this example, although the controller 122 and the computing element 14 are part of the same device, the controller 122 can be placed in a standby state for extended periods of time rather than being disabled. For example, when the data protection device 1′ is powered off, the computing element 14 can be disabled while the controller 122 is placed in a standby state. This allows the controller 122 to immediately awaken the computing element 14 when the latch 11 is withdrawn from the latch slot 12. The awakened computing element 14 can then further evaluate the detection results of the detection element 13 to perform subsequent data deletion operations. Furthermore, the prompt element 15 of the data protection device 1′ in this example is optionally configured, or the power-on trigger switch 121 and controller 122 of the data protection device 1′ are optionally configured.
請參考圖4,圖4係依據本發明一實施例所繪示的資料保護裝置的插銷的示意圖。如圖4所示,插銷11具有一識別元件111、一脆弱部112及握持部113,其中識別元件111的讀取線路1112設置於脆弱部112。在本例中,識別元件111包含一近場通訊晶片1111、一讀取線路1112以及一天線1113。具體而言,近場通訊晶片1111設置於插銷11的脆弱部112的一端,天線1113設置於插銷11的脆弱部112的另一端,而讀取線路1112橫跨脆弱部112。然而在其他實施例中,識別元件111的其他部份可設置於脆弱部112,例如為一讀取晶片或一讀取線路。在本例中,脆弱部112為插銷11的具有較細寬度的一局部結構。在其他實施例中,脆弱部112也可透過以其他具有較低機械強度的材料形成的局部結構來實現,本案不予以限制。較佳者,脆弱部112可被設計為只能抵抗插銷11兩端承受一預設力矩值,使得使用者可針對插銷11的脆弱部112進行彎折或撕裂等的破壞手段。Please refer to Figure 4, which is a schematic diagram of a data protection device plug according to an embodiment of the present invention. As shown in Figure 4, the plug 11 has an identification element 111, a fragile portion 112, and a grip portion 113. The reader circuit 1112 of the identification element 111 is disposed within the fragile portion 112. In this example, the identification element 111 includes a near-field communication chip 1111, a reader circuit 1112, and an antenna 1113. Specifically, the near-field communication chip 1111 is disposed at one end of the fragile portion 112 of the plug 11, the antenna 1113 is disposed at the other end of the fragile portion 112, and the reader circuit 1112 spans the fragile portion 112. However, in other embodiments, other components of the identification element 111 may be located within the fragile portion 112, such as a reader chip or a reader circuit. In this example, the fragile portion 112 is a relatively narrow local structure of the latch 11. In other embodiments, the fragile portion 112 may also be implemented as a local structure formed from other materials with lower mechanical strength, which is not a limitation in this invention. Preferably, the fragile portion 112 is designed to withstand only a predetermined torque applied to the ends of the latch 11, allowing the user to perform destructive actions such as bending or tearing the fragile portion 112 of the latch 11.
請結合參考圖1,當插銷11與插銷槽12耦合時,偵測元件13可從天線1113透過讀取線路1112讀取到近場通訊晶片1111的資料,並得到一偵測訊號且產生一偵測結果。當插銷11從插銷槽12退出時,偵測元件13無法讀取到近場通訊晶片1111。進一步,當插銷11從插銷槽12退出且插銷11從脆弱部112被破壞時,由於讀取線路1112連同脆弱部112被破壞,近場通訊晶片1111與天線1113之間的電性連接可被斷開。如此一來,即使插銷11再度與插銷槽12耦合,偵測元件13將無法從天線1113透過讀取線路1112讀取到近場通訊晶片1111的資料。在其他實施態樣中,未必是讀取線路1112設置在脆弱部112,也可以是將近場通訊晶片1111或天線1113設置在脆弱部112,以上皆可達成使得脆弱部112被破壞的插銷11無法再度受到偵測元件13的識別的效果。Referring to Figure 1 , when the latch 11 is coupled to the latch slot 12, the detection element 13 can read data from the NFC chip 1111 via the read line 1112 from the antenna 1113, generating a detection signal and a detection result. When the latch 11 is removed from the latch slot 12, the detection element 13 cannot read the NFC chip 1111. Furthermore, when the latch 11 is removed from the latch slot 12 and the fragile portion 112 of the latch 11 is broken, the electrical connection between the NFC chip 1111 and the antenna 1113 is severed due to the destruction of the read line 1112 and the fragile portion 112. As a result, even if the latch 11 is re-engaged with the latch slot 12, the detection element 13 will not be able to read data from the NFC chip 1111 via the antenna 1113 via the read line 1112. In other embodiments, the read line 1112 need not be located in the fragile portion 112; the NFC chip 1111 or the antenna 1113 may also be located in the fragile portion 112. Both of these arrangements can prevent the detection element 13 from recognizing the latch 11 if its fragile portion 112 is damaged.
請結合圖1參考圖5,圖5係依據本發明一實施例所繪示的資料保護裝置的操作流程圖。如圖5所示,運算元件14的操作流程可包含步驟S11:判斷是否取得偵測訊號;若否,則執行步驟S12:刪除目標資料;若是,則執行步驟S13:判斷偵測訊號是否包含識別元件的資訊;若否,則執行步驟S12,若是,則執行步驟S14:不作動。Please refer to FIG5 in conjunction with FIG1 . FIG5 is a flowchart illustrating the operation of a data protection device according to an embodiment of the present invention. As shown in FIG5 , the operation of the computing element 14 may include step S11: determining whether a detection signal has been obtained; if not, executing step S12: deleting the target data; if so, executing step S13: determining whether the detection signal contains information identifying the component; if not, executing step S12; if so, executing step S14: taking no action.
在步驟S11中,當運算元件14無法取得來自偵測元件13的偵測訊號,表示偵測元件13無法偵測到插銷11的識別元件111(上述第二偵測結果),即插銷11未與插銷槽12耦合,此時運算元件14便執行刪除目標資料的操作。在步驟S13中,當運算元件14判斷偵測訊號不包含識別元件111的資訊時,表示其他插銷可能與插銷槽12相耦合,使偵測元件13無法識別到對應的識別元件,此時運算元件14便執行刪除目標資料的操作。另外,當運算元件14取得偵測訊號,且判斷偵測訊號中包含識別元件111的資訊時,即,當運算元件14可根據所述偵測結果判斷識別元件111存在時,可保留該記憶體儲存的該目標資料(步驟S14)。In step S11, if computing element 14 fails to receive the detection signal from detection element 13, this indicates that detection element 13 cannot detect identification element 111 of latch 11 (the second detection result described above), meaning that latch 11 is not coupled to latch slot 12. Computing element 14 then deletes the target data. In step S13, if computing element 14 determines that the detection signal does not contain information about identification element 111, this indicates that another latch may be coupled to latch slot 12, preventing detection element 13 from identifying the corresponding identification element. Computing element 14 then deletes the target data. In addition, when the computing element 14 obtains the detection signal and determines that the detection signal contains information of the identification element 111, that is, when the computing element 14 can determine the existence of the identification element 111 based on the detection result, the target data stored in the memory can be retained (step S14).
請結合圖3參考圖6,圖6係依據本發明另一實施例所繪示的資料保護裝置的操作流程圖。如圖6所示,運算元件14的操作流程可包含步驟S21:根據偵測元件的偵測結果判斷識別元件是否存在;若是,則執行步驟S22:不作動;若否,則執行步驟S23:記錄無法根據偵測結果判斷識別元件存在的狀態時間長度;步驟S24:判斷狀態時間長度是否達一預設時間長度;若否,則執行步驟S22,若是,則執行步驟S25:刪除目標資料。Please refer to FIG6 in conjunction with FIG3 . FIG6 is a flowchart illustrating an operation flow of a data protection device according to another embodiment of the present invention. As shown in FIG6 , the operation flow of the computing element 14 may include step S21: determining whether the identification element exists based on the detection result of the detection element; if so, executing step S22: performing no action; if not, executing step S23: recording the duration of the state in which the existence of the identification element cannot be determined based on the detection result; step S24: determining whether the duration of the state reaches a preset time length; if not, executing step S22; if so, executing step S25: deleting the target data.
在步驟S21及S23中,當運算元件14根據偵測元件13的偵測結果(上述第二偵測結果或第三偵測結果)判斷識別元件111不存在時,可記錄上述第二偵測結果或第三偵測結果持續的一狀態時間長度。具體而言,步驟S21的「判斷識別元件是否存在」可包含圖5所示的步驟S11的「判斷是否取得偵測訊號」以及步驟S13的「判斷偵測訊號是否包含識別元件的資訊」。於此同時,運算元件14可控制提示元件15輸出關聯於所述預設時間長度的一提示訊號。舉例而言,預設時間長度為10秒。運算元件14可控制提示元件15顯示狀態時間長度為從10秒開始倒數至0。在步驟S24及S25中,當運算元件14判斷所述狀態時間長度已經達到預設時間長度時,則刪除目標資料。另外,在步驟S24中,若在狀態時間長度達預設時間長度之前,運算元件14可根據偵測元件13的偵測結果判斷識別元件111存在,表示插銷11在從插銷槽12退出後的預設時間長度內已經重新與插銷槽12耦合,此時運算元件14不刪除目標資料,並維持正常運作。即,當運算元件14可根據所述偵測結果判斷識別元件111存在時,可保留該記憶體儲存的該目標資料(步驟S22)。需要注意的是,請結合參考圖4,當插銷11已經被破壞時,即使插銷11在預設時間長度內重新與插銷槽12耦合,由於偵測元件13無法進行讀取,運算元件14仍然無法判斷識別元件111存在,因此運算元件14仍會在狀態時間長度達預設時間長度時進行刪除目標資料的操作。In steps S21 and S23, when the computing device 14 determines that the identification device 111 is absent based on the detection result of the detection device 13 (the second or third detection result), it may record the duration of the second or third detection result. Specifically, the "determining whether the identification device exists" in step S21 may include the "determining whether a detection signal has been obtained" in step S11 shown in Figure 5 and the "determining whether the detection signal contains information about the identification device" in step S13. Simultaneously, the computing device 14 may control the prompting device 15 to output a prompting signal associated with the preset time duration. For example, the preset time duration is 10 seconds. The computing device 14 can control the prompt device 15 to display the status time length, counting down from 10 seconds to 0. In steps S24 and S25, if the computing device 14 determines that the status time length has reached the preset time length, it deletes the target data. Furthermore, in step S24, if, before the status time length reaches the preset time length, the computing device 14 determines, based on the detection result of the detection device 13, that the identification device 111 is present, indicating that the latch 11 has re-engaged with the latch slot 12 within the preset time length after being withdrawn from the latch slot 12, the computing device 14 does not delete the target data and maintains normal operation. That is, when the computing device 14 can determine the presence of the identification device 111 based on the detection result, the target data stored in the memory can be retained (step S22). It should be noted that, referring to Figure 4, when the latch 11 is damaged, even if the latch 11 re-engages with the latch slot 12 within the preset time length, the computing device 14 still cannot determine the presence of the identification device 111 because the detection device 13 cannot read it. Therefore, the computing device 14 will still perform the operation of deleting the target data when the state time length reaches the preset time length.
藉由上述結構,本案所揭示的資料保護裝置及可攜式電子設備,透過在資料保護裝置設置彼此可插拔地耦合的插銷與插銷槽,其中插銷上具有識別元件,且插銷槽中設置有偵測元件,使得當插銷自插銷槽中退出時,資料保護裝置可受觸發而自動執行資料刪除作業。據此,當持有資料保護裝置的使用者面臨緊急狀況時,可簡便地將插銷自插銷槽中退出,以迅速對記憶體中的目標資料銷毀或格式化,確保目標資料不被有心人士竊取。另外,本案的資料保護裝置的插銷可額外具有脆弱部的設計,並將識別元件的一部份設置於脆弱部上,使得插銷在從插銷槽中退出後可從脆弱部被破壞,進一步確保機密資料可以被銷毀,防止有心人士利用。Through the above-described structure, the data protection device and portable electronic device disclosed in this application utilize a pluggable and coupled plug and socket on the data protection device. The plug has an identification element, and the socket has a detection element. When the plug is removed from the socket, the data protection device is triggered to automatically perform a data deletion operation. Consequently, when a user of the data protection device faces an emergency, they can simply remove the plug from the socket to quickly destroy or format the target data in the memory, ensuring that the target data cannot be stolen by malicious individuals. In addition, the latch of the data protection device of this invention may be additionally designed with a fragile portion, and a portion of the identification element may be disposed on the fragile portion, so that the latch can be destroyed from the fragile portion after being withdrawn from the latch slot, further ensuring that confidential data can be destroyed and preventing malicious persons from exploiting it.
雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed above with reference to the aforementioned embodiments, they are not intended to limit the present invention. Any modifications and enhancements that do not depart from the spirit and scope of the present invention are within the scope of patent protection of the present invention. Please refer to the attached patent application for the scope of protection defined by the present invention.
1,1’:資料保護裝置 11:插銷 111:識別元件 1111:近場通訊晶片 1112:讀取線路 1113:天線 112:脆弱部 113:握持部 12:插銷槽 121:開機觸發開關 122:控制器 13:偵測元件 14:運算元件 15:提示元件 2:記憶體 3:可攜式電子裝置 S11-S14,S21-S25:步驟 1,1': Data protection device 11: Latch 111: Identification element 1111: Near-field communication chip 1112: Read circuit 1113: Antenna 112: Fragile portion 113: Grip 12: Latch slot 121: Power trigger 122: Controller 13: Detection element 14: Computing element 15: Alert element 2: Memory 3: Portable electronic device S11-S14, S21-S25: Steps
圖1係依據本發明一實施例所繪示的資料保護裝置的方塊圖。 圖2係依據本發明一實施例所繪示的可攜式電子設備的方塊圖。 圖3係依據本發明另一實施例所繪示的資料保護裝置的方塊圖。 圖4係依據本發明一實施例所繪示的資料保護裝置的插銷的示意圖。 圖5係依據本發明一實施例所繪示的資料保護裝置的操作流程圖。 圖6係依據本發明另一實施例所繪示的資料保護裝置的操作流程圖。 Figure 1 is a block diagram of a data protection device according to one embodiment of the present invention. Figure 2 is a block diagram of a portable electronic device according to one embodiment of the present invention. Figure 3 is a block diagram of a data protection device according to another embodiment of the present invention. Figure 4 is a schematic diagram of a latch of a data protection device according to one embodiment of the present invention. Figure 5 is a flowchart of the operation of a data protection device according to one embodiment of the present invention. Figure 6 is a flowchart of the operation of a data protection device according to another embodiment of the present invention.
1:資料保護裝置 1: Data protection device
11:插銷 11: Latch
111:識別元件 111: Identification Component
12:插銷槽 12: Latch slot
13:偵測元件 13: Detection Components
14:運算元件 14: Computing Elements
2:記憶體 2: Memory
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW112145150A TWI897106B (en) | 2023-11-22 | 2023-11-22 | Data protection device and portable electronic device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW112145150A TWI897106B (en) | 2023-11-22 | 2023-11-22 | Data protection device and portable electronic device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW202522278A TW202522278A (en) | 2025-06-01 |
| TWI897106B true TWI897106B (en) | 2025-09-11 |
Family
ID=97224401
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW112145150A TWI897106B (en) | 2023-11-22 | 2023-11-22 | Data protection device and portable electronic device |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI897106B (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1439964A (en) * | 2002-02-22 | 2003-09-03 | 方可成 | Anti-transcription digital recording medium protection and method for making master film |
| TW200828128A (en) * | 2006-12-19 | 2008-07-01 | Apac Opto Electronics Inc | Electronic device with radio frequency identification technology |
| CN106101438A (en) * | 2016-07-29 | 2016-11-09 | 哈尔滨理工大学 | A kind of cellphone information protection lock |
-
2023
- 2023-11-22 TW TW112145150A patent/TWI897106B/en active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1439964A (en) * | 2002-02-22 | 2003-09-03 | 方可成 | Anti-transcription digital recording medium protection and method for making master film |
| TW200828128A (en) * | 2006-12-19 | 2008-07-01 | Apac Opto Electronics Inc | Electronic device with radio frequency identification technology |
| CN106101438A (en) * | 2016-07-29 | 2016-11-09 | 哈尔滨理工大学 | A kind of cellphone information protection lock |
Also Published As
| Publication number | Publication date |
|---|---|
| TW202522278A (en) | 2025-06-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101896914B (en) | Systems, methods and apparatus for erasing memory on wireless devices | |
| CN110020560B (en) | Electronic disk system and method with data self-destruction protection function | |
| TWI240165B (en) | Information storage apparatus, system and method for memory access control and computer program | |
| JP4863977B2 (en) | Removable digital data storage device, method for protecting computer readable memory, article of manufacture including computer usable media (programmable memory device security method and system) | |
| US20130111600A1 (en) | Method and device for sensing and responding to an unauthorized opening of a biometric trait capture device | |
| CN104903911B (en) | One-Time Programmable Integrated Circuit Security | |
| US11113429B2 (en) | Solid state storage data destruction | |
| US7696857B2 (en) | Method and system for disabling an electronic device upon theft | |
| CN104220994A (en) | System and method for protecting data stored on a removable data storage device | |
| CN111327422A (en) | Cipher machine with key destruction function and key destruction method | |
| CN103902934A (en) | Computer case disassembling prevention detecting method and device | |
| US20080106366A1 (en) | Damage detection for an anti-theft interface | |
| TWI897106B (en) | Data protection device and portable electronic device | |
| JP2000011268A (en) | Security equipment | |
| CN115292762A (en) | Method for opening and closing active data self-destruction under system power-off state | |
| JP4931543B2 (en) | Information device and computer program | |
| CN101930523B (en) | Document protection system and method | |
| JP5160940B2 (en) | Hard disk drive | |
| CN120030614A (en) | Data protection device, portable electronic device and data protection method | |
| CN102890762A (en) | Anti-theft device, anti-theft method and computer system | |
| CN103403741B (en) | Start portable data storage medium | |
| EP3444736A1 (en) | Device and method for storing and accessing secret user-authentication data | |
| TWI412950B (en) | Document protection system and method thereof | |
| CN102497637B (en) | Security information protection secret-related equipment processing system and method based on WSN base station control | |
| US20120047582A1 (en) | Data deleting method for computer storage device |