[go: up one dir, main page]

TWI897106B - Data protection device and portable electronic device - Google Patents

Data protection device and portable electronic device

Info

Publication number
TWI897106B
TWI897106B TW112145150A TW112145150A TWI897106B TW I897106 B TWI897106 B TW I897106B TW 112145150 A TW112145150 A TW 112145150A TW 112145150 A TW112145150 A TW 112145150A TW I897106 B TWI897106 B TW I897106B
Authority
TW
Taiwan
Prior art keywords
detection
latch
data protection
identification
state
Prior art date
Application number
TW112145150A
Other languages
Chinese (zh)
Other versions
TW202522278A (en
Inventor
凃又仁
Original Assignee
神基科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 神基科技股份有限公司 filed Critical 神基科技股份有限公司
Priority to TW112145150A priority Critical patent/TWI897106B/en
Publication of TW202522278A publication Critical patent/TW202522278A/en
Application granted granted Critical
Publication of TWI897106B publication Critical patent/TWI897106B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)

Abstract

A data protection device which is applicable for a memory storing a target data, includes a plug slot, a plug, a detection component and a computing component. The plug is pluggably coupled to the plug slot and has an identification component. The detection component is disposed to correspond to the plug slot and is configured to perform detection to the plug slot. The computing component is connected to the detection component, and is configured to delete the target data when the existence of the identification component cannot be determined based on a detection result of the detection component.

Description

資料保護裝置及可攜式電子設備Data protection devices and portable electronic equipment

本發明係關於一種資料保護裝置及可攜式電子設備。The present invention relates to a data protection device and a portable electronic device.

在個人裝置的資料安全領域,可能仰賴多重因子驗證(Multi-Factor Authentication)來控制資料的存取權限。例如,可透過密碼、一次性驗證碼(OTP)、生物特徵驗證碼等,來限制非法的資料存取操作。然而,當硬體本身處在高風險的環境且硬體儲存的資料具有高度機密性時,可能需要額外的手段來確保資料安全性。In the area of personal device data security, multi-factor authentication (MFA) may be relied upon to control data access permissions. For example, passwords, one-time passwords (OTPs), and biometric authentication codes can be used to restrict unauthorized data access. However, when the hardware itself is in a high-risk environment and the data stored on the hardware is highly confidential, additional measures may be required to ensure data security.

鑒於上述,本發明提供一種資料保護裝置及可攜式電子設備。In view of the above, the present invention provides a data protection device and a portable electronic device.

依據本發明一實施例的資料保護裝置,適用於儲存一目標資料的一記憶體,包含一插銷槽、一插銷、一偵測元件以及一運算元件。所述插銷與所述插銷槽可插拔地耦合,且具有一識別元件。所述偵測元件設置為對應於所述插銷槽,且用於對所述插銷槽進行偵測。所述運算元件連接於所述偵測元件,且用於當無法根據所述偵測元件的偵測結果判斷所述識別元件存在時,刪除所述目標資料。According to one embodiment of the present invention, a data protection device is suitable for use in a memory storing target data, and includes a latch slot, a latch, a detection element, and an arithmetic element. The latch is removably coupled to the latch slot and has an identification element. The detection element is configured to correspond to the latch slot and is configured to detect the latch slot. The arithmetic element is connected to the detection element and is configured to delete the target data when the detection result of the detection element cannot determine that the identification element is present.

依據本發明一實施例的可攜式電子設備,包含如上所述的資料保護裝置及所述記憶體。A portable electronic device according to an embodiment of the present invention includes the data protection device and the memory as described above.

藉由上述結構,本案所揭示的資料保護裝置及可攜式電子設備,透過在資料保護裝置設置彼此可插拔地耦合的插銷與插銷槽,其中插銷上具有識別元件,且插銷槽中設置有偵測元件,使得當插銷自插銷槽中退出時,資料保護裝置可受觸發而自動執行資料刪除作業。據此,當持有資料保護裝置的使用者面臨緊急狀況時,可簡便地將插銷自插銷槽中退出,以迅速對記憶體中的目標資料銷毀或格式化,確保目標資料不被有心人士竊取。Through the above-described structure, the data protection device and portable electronic device disclosed in this application utilize a pluggable and coupled plug and socket on the data protection device. The plug has an identification element, and the socket has a detection element. When the plug is removed from the socket, the data protection device is triggered to automatically perform a data deletion operation. Consequently, when a user of the data protection device faces an emergency, they can simply remove the plug from the socket to quickly destroy or format the target data in the memory, ensuring that the target data cannot be stolen by malicious individuals.

以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the present disclosure and the following description of the embodiments are intended to demonstrate and explain the spirit and principles of the present invention, and to provide further explanation of the scope of the patent application of the present invention.

以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The following detailed description of the features and advantages of the present invention is sufficient to enable anyone skilled in the relevant art to understand the technical content of the present invention and implement it accordingly. Based on the disclosure, patent application scope, and drawings in this specification, anyone skilled in the relevant art can easily understand the relevant objectives and advantages of the present invention. The following examples are intended to further illustrate the concepts of the present invention in detail and are not intended to limit the scope of the present invention in any way.

請參考圖1,圖1係依據本發明一實施例所繪示的資料保護裝置的方塊圖。如圖1所示,資料保護裝置1,適用於儲存一目標資料的一記憶體2,其包含一插銷11、一插銷槽12、一偵測元件13以及一運算元件14。插銷11與插銷槽12可插拔地耦合,且具有一識別元件111。偵測元件13設置為對應於插銷槽12,且用於對插銷槽12進行偵測。運算元件14連接於偵測元件13,且用於當無法根據偵測元件13的偵測結果判斷識別元件111存在時,刪除所述目標資料。Please refer to Figure 1, which is a block diagram of a data protection device according to an embodiment of the present invention. As shown in Figure 1, the data protection device 1 is suitable for a memory 2 for storing a target data, which includes a latch 11, a latch slot 12, a detection element 13 and an arithmetic element 14. The latch 11 is pluggably coupled to the latch slot 12 and has an identification element 111. The detection element 13 is configured to correspond to the latch slot 12 and is used to detect the latch slot 12. The arithmetic element 14 is connected to the detection element 13 and is used to delete the target data when it is impossible to determine the existence of the identification element 111 based on the detection result of the detection element 13.

在本例中,資料保護裝置1可用於對一電子裝置中的記憶體2進行資料保護。具體而言,記憶體2可設置在一筆記型電腦、一平板電腦、一隨身硬碟或其他個人裝置中,本案不予以限制。也就是說,基於本文描述的資料保護裝置1,可在本領域具通常知識者的理解下,進行適當修改以適配於各種裝置中的搭載的記憶體2,如此對記憶體2儲存的目標資料進行保護。另外,記憶體2的類型包含但不限於各種非揮發性記憶體,如唯讀記憶體(Read Only Memory,ROM)等。In this example, a data protection device 1 can be used to protect data in a memory 2 in an electronic device. Specifically, the memory 2 can be installed in a laptop, a tablet, a portable hard drive, or other personal device, without limitation in this case. In other words, based on the data protection device 1 described herein, it can be appropriately modified, as understood by those skilled in the art, to adapt to the memory 2 installed in various devices, thereby protecting the target data stored in the memory 2. Furthermore, the types of memory 2 include, but are not limited to, various non-volatile memories, such as read-only memory (ROM).

資料保護裝置1可包含兩個部分,本體及插拔部,其中兩者可以插拔形式彼此拆解或耦合。資料保護裝置1的插拔部包含插銷11,且插銷11包含一識別元件111。資料保護裝置1的本體包含插銷槽12、偵測元件13及運算元件14,且插銷槽12、偵測元件13及運算元件14可設置於具有一容納空間的殼體中。插銷11在結構上可具有一握持部及一延伸部,其中握持部用於令使用者易於施力進行插拔操作,延伸部用於與插銷槽12可插拔地耦合,且識別元件111設置於延伸部上。具體而言,識別元件111可為基於無線射頻識別(Radio Frequency Identification,RFID)技術的元件,例如可包含一近場無線通訊(Near-Field Communication,NFC)單元。The data protection device 1 may include two parts, a main body and a plug-in portion, wherein the two parts can be disassembled or coupled to each other in a plug-in manner. The plug-in portion of the data protection device 1 includes a plug 11, and the plug 11 includes an identification element 111. The main body of the data protection device 1 includes a plug slot 12, a detection element 13, and an operating element 14, and the plug slot 12, the detection element 13, and the operating element 14 can be arranged in a housing having a accommodating space. The plug 11 can structurally have a grip portion and an extension portion, wherein the grip portion is used to make it easier for the user to apply force to perform plug-in and pull-out operations, and the extension portion is used to be pluggably coupled to the plug slot 12, and the identification element 111 is arranged on the extension portion. Specifically, the identification element 111 may be an element based on radio frequency identification (RFID) technology, for example, may include a near-field communication (NFC) unit.

當插銷11與插銷槽12相耦合時,設置為對應於插銷槽12的偵測元件13可偵測到位於插銷槽12的容置空間中的插銷11。具體而言,偵測元件13可偵測到插銷11的識別元件111,並產生一第一偵測結果;當插銷11未與插銷槽12相耦合時,偵測元件13無法偵測到插銷11的識別元件111,並產生一第二偵測結果;或者,當其他插銷與插銷槽12相耦合時,偵測元件13無法識別到對應的識別元件,並產生一第三偵測結果。舉例而言,偵測元件13可為基於無線射頻識別(RFID)技術的讀取元件,且可與識別元件111之間具有一對一的對應關係。When the latch 11 is coupled to the latch slot 12, the detection element 13 corresponding to the latch slot 12 can detect the latch 11 positioned within the receiving space of the latch slot 12. Specifically, the detection element 13 can detect the identification element 111 of the latch 11 and generate a first detection result. When the latch 11 is not coupled to the latch slot 12, the detection element 13 cannot detect the identification element 111 of the latch 11 and generate a second detection result. Alternatively, when another latch is coupled to the latch slot 12, the detection element 13 cannot identify the corresponding identification element and generates a third detection result. For example, the detection element 13 may be a reader element based on radio frequency identification (RFID) technology and may have a one-to-one correspondence with the identification element 111 .

運算元件14可為具有資料接收、記錄、運算、儲存及輸出功能之元件,例如微控制器、中央處理器、可程式化邏輯控制器等。運算元件14用於接收偵測元件13的偵測結果,並根據偵測結果執行對應的操作。當運算元件14無法根據偵測元件13的偵測結果判斷識別元件111存在時,刪除記憶體2中儲存的目標資料。舉例而言,當偵測元件13無法偵測到插銷11的識別元件111(即,運算元件14接收上述第二偵測結果)時,或者當無法識別到對應的識別元件(即,運算元件14接收上述第三偵測結果)時,運算元件14可對記憶體2中的目標資料進行格式化刪除的操作。當然,在正常狀態下,當偵測元件13可偵測到插銷11的識別元件111(即,運算元件14接收上述第一偵測結果)時,運算元件14不對記憶體2的目標資料進行刪除操作。The computing element 14 can be a device capable of receiving, recording, computing, storing, and outputting data, such as a microcontroller, a central processing unit, or a programmable logic controller. The computing element 14 is used to receive the detection results from the detection element 13 and perform corresponding operations based on the detection results. If the computing element 14 cannot determine the presence of the identification element 111 based on the detection results from the detection element 13, the target data stored in the memory 2 is deleted. For example, when the detection element 13 cannot detect the identification element 111 of the plug 11 (i.e., the computing element 14 receives the second detection result), or when the corresponding identification element cannot be identified (i.e., the computing element 14 receives the third detection result), the computing element 14 may format and delete the target data in the memory 2. Of course, under normal circumstances, when the detection element 13 can detect the identification element 111 of the plug 11 (i.e., the computing element 14 receives the first detection result), the computing element 14 does not delete the target data in the memory 2.

請參照圖2,圖2係依據本發明一實施例所繪示的可攜式電子設備的方塊圖。如圖2所示,可攜式電子設備3包含如圖1所示的資料保護裝置1及記憶體2,其中資料保護裝置1同樣包含插銷11、插銷槽12、偵測元件13及運算元件14,且插銷11同樣包含識別元件111,因此,相關的重複描述在此省略。在本例中,資料保護裝置1及記憶體2同屬於一可攜式電子設備3。可攜式電子設備3包含但不限於筆記型電腦、個人平板等。以可攜式電子設備3為筆記型電腦作為一例子而言,插銷槽12可位於筆記型電腦的殼體一處,且當插銷11與插銷槽12耦合時,插銷11的握持部與筆記型電腦的殼體之間具有些許縫隙,以利使用者在特殊情況下施力將插銷11拔出。Please refer to Figure 2, which is a block diagram of a portable electronic device according to an embodiment of the present invention. As shown in Figure 2, portable electronic device 3 includes the data protection device 1 and memory 2 shown in Figure 1. Data protection device 1 similarly includes latch 11, latch slot 12, detection element 13, and computing element 14, and latch 11 similarly includes identification element 111. Therefore, repeated description of the related information is omitted here. In this example, data protection device 1 and memory 2 belong to the same portable electronic device 3. Portable electronic device 3 includes, but is not limited to, a laptop computer, a personal tablet, etc. Taking the portable electronic device 3 as a laptop computer as an example, the latch slot 12 can be located at one location on the laptop computer housing. When the latch 11 is coupled to the latch slot 12 , a slight gap is provided between the grip portion of the latch 11 and the laptop computer housing, so that the user can apply force to pull out the latch 11 in special circumstances.

記憶體2可為筆記型電腦(可攜式電子設備3)中用於儲存特定的目標資料的記憶體。據此,當運算元件14接收偵測元件13的偵測結果且無法根據偵測結果判斷識別元件111存在時,可將記憶體2中的目標資料刪除。另外,當運算元件14接收偵測元件13的偵測結果且無法根據偵測結果判斷識別元件111存在時,運算元件14也可刪除記憶體2的所有資料。也就是說,透過此配置,本案提供了一種具有資料保護功能的個人電腦,可讓使用者在特殊情況下以簡易的拉出插銷的操作來將機密資料進行格式化刪除,防止機密資料被有心人士竊取利用。需要注意的是,運算元件14可為筆記型電腦(可攜式電子設備3)本身用於運作其他功能的中央處理器,或是筆記型電腦(可攜式電子設備3)專門設置來用於進行資料保護操作的獨立的微控制器,本案不予以限制。Memory 2 can be a memory in a laptop (portable electronic device 3) used to store specific target data. Accordingly, when the computing device 14 receives the detection result from the detection device 13 and cannot determine the presence of the identification device 111 based on the detection result, the target data in memory 2 can be deleted. Alternatively, when the computing device 14 receives the detection result from the detection device 13 and cannot determine the presence of the identification device 111 based on the detection result, the computing device 14 can also delete all data in memory 2. In other words, through this configuration, the present invention provides a personal computer with data protection functionality, allowing users to format and delete confidential data in special circumstances by simply pulling out a latch, thereby preventing the confidential data from being stolen and used by malicious individuals. It should be noted that the computing element 14 can be the central processing unit of the notebook computer (portable electronic device 3) itself used to operate other functions, or it can be an independent microcontroller specifically configured in the notebook computer (portable electronic device 3) for performing data protection operations, and this invention is not limited to this.

請參考圖3,圖3係依據本發明另一實施例所繪示的資料保護裝置的方塊圖。如圖3所示,本例的資料保護裝置1’除了包含插銷11、插銷槽12、偵測元件13、運算元件14以外,更包含連接於運算元件14的一提示元件15。本例的運算元件14除了執行上述實施例的功能以外,更可記錄無法根據所述偵測結果判斷識別元件111存在的狀態時間長度,且在所述狀態時間長度未達一預設時間長度前不刪除所述目標資料,直至所述狀態時間長度達所述預設時間長度方刪除所述目標資料。進一步,在本例中,運算元件14更可在記錄所述狀態時間長度時,致動提示元件15輸出關聯於所述預設時間長度的一提示訊號。具體而言,提示元件15可為一顯示器。關於此基於狀態時間長度的控制流程於後有更詳細的描述。Please refer to Figure 3, which is a block diagram of a data protection device according to another embodiment of the present invention. As shown in Figure 3, the data protection device 1' of this embodiment includes not only a latch 11, a latch slot 12, a detection element 13, and an arithmetic element 14, but also a prompt element 15 connected to the arithmetic element 14. In addition to performing the functions of the aforementioned embodiments, the arithmetic element 14 of this embodiment can also record the duration of the state in which the identification element 111 cannot be determined based on the detection results. The target data will not be deleted until the state duration reaches a preset duration. The target data will be deleted only when the state duration reaches the preset duration. Furthermore, in this example, when the computing device 14 records the state duration, it can activate the prompt device 15 to output a prompt signal associated with the preset duration. Specifically, the prompt device 15 can be a display. The control process based on the state duration is described in more detail below.

另外,本例的資料處理裝置1更包含一開機觸發開關121以及一控制器122。開機觸發開關121設置於插銷槽12中且具有一第一狀態及一第二狀態,當插銷11與插銷槽12耦合時,開機觸發開關121處於所述第一狀態,當插銷11從插銷槽12退出時,開機觸發開關121處於第二狀態。控制器122連接於開機觸發開關121及運算元件14,用於當運算元件14處於停能狀態且開機觸發開關121處於該第二狀態時,致動運算元件14。舉例而言,當插銷11與插銷槽12耦合時,開機觸發開關121可受到插銷11的壓迫而使其中的電路元件處於第一狀態(如導通或關斷狀態);或者當插銷11從插銷槽12退出時,開機觸發開關121可受到插銷11的牽引而使其中的電路元件處於與第一狀態不同的第二狀態(如關斷或導通狀態)。藉此,控制器122可判斷當運算元件14處於停能狀態且開機觸發開關121處於該第二狀態時,致動運算元件14。控制器122可具體為微控制器、中央處理器、可程式化邏輯控制器等。In addition, the data processing device 1 of this embodiment further includes a power-on trigger switch 121 and a controller 122. The power-on trigger switch 121 is disposed in the latch slot 12 and has a first state and a second state. When the latch 11 is coupled to the latch slot 12, the power-on trigger switch 121 is in the first state. When the latch 11 is removed from the latch slot 12, the power-on trigger switch 121 is in the second state. The controller 122 is connected to the power-on trigger switch 121 and the computing element 14 and is configured to activate the computing element 14 when the computing element 14 is in the disabled state and the power-on trigger switch 121 is in the second state. For example, when the latch 11 is coupled to the latch slot 12, the power trigger switch 121 may be pressed by the latch 11, causing the circuit components therein to be in a first state (e.g., on or off). Alternatively, when the latch 11 is removed from the latch slot 12, the power trigger switch 121 may be pulled by the latch 11, causing the circuit components therein to be in a second state different from the first state (e.g., off or on). In this way, the controller 122 can determine that the computing element 14 is in the disabled state and the power trigger switch 121 is in the second state, and activate the computing element 14. The controller 122 may be embodied as a microcontroller, a central processing unit, a programmable logic controller, etc.

在本例中,雖然控制器122與運算元件14屬於同一裝置,但是控制器122可長期處於待機狀態而非停能狀態。舉例而言,當資料保護裝置1’關機時,運算元件14可處於停能狀態,控制器122則處於待機狀態,使得當插銷11自插銷槽12中退出時,控制器122可即時喚醒運算元件14,而被喚醒的運算元件14可進一步對偵測元件13的偵測結果進行判斷,以執行後續的資料刪除操作。另外,本例的資料保護裝置1’的提示元件15為選擇性設置,或者,資料保護裝置1’的開機觸發開關121與控制器122為選擇性設置。In this example, although the controller 122 and the computing element 14 are part of the same device, the controller 122 can be placed in a standby state for extended periods of time rather than being disabled. For example, when the data protection device 1′ is powered off, the computing element 14 can be disabled while the controller 122 is placed in a standby state. This allows the controller 122 to immediately awaken the computing element 14 when the latch 11 is withdrawn from the latch slot 12. The awakened computing element 14 can then further evaluate the detection results of the detection element 13 to perform subsequent data deletion operations. Furthermore, the prompt element 15 of the data protection device 1′ in this example is optionally configured, or the power-on trigger switch 121 and controller 122 of the data protection device 1′ are optionally configured.

請參考圖4,圖4係依據本發明一實施例所繪示的資料保護裝置的插銷的示意圖。如圖4所示,插銷11具有一識別元件111、一脆弱部112及握持部113,其中識別元件111的讀取線路1112設置於脆弱部112。在本例中,識別元件111包含一近場通訊晶片1111、一讀取線路1112以及一天線1113。具體而言,近場通訊晶片1111設置於插銷11的脆弱部112的一端,天線1113設置於插銷11的脆弱部112的另一端,而讀取線路1112橫跨脆弱部112。然而在其他實施例中,識別元件111的其他部份可設置於脆弱部112,例如為一讀取晶片或一讀取線路。在本例中,脆弱部112為插銷11的具有較細寬度的一局部結構。在其他實施例中,脆弱部112也可透過以其他具有較低機械強度的材料形成的局部結構來實現,本案不予以限制。較佳者,脆弱部112可被設計為只能抵抗插銷11兩端承受一預設力矩值,使得使用者可針對插銷11的脆弱部112進行彎折或撕裂等的破壞手段。Please refer to Figure 4, which is a schematic diagram of a data protection device plug according to an embodiment of the present invention. As shown in Figure 4, the plug 11 has an identification element 111, a fragile portion 112, and a grip portion 113. The reader circuit 1112 of the identification element 111 is disposed within the fragile portion 112. In this example, the identification element 111 includes a near-field communication chip 1111, a reader circuit 1112, and an antenna 1113. Specifically, the near-field communication chip 1111 is disposed at one end of the fragile portion 112 of the plug 11, the antenna 1113 is disposed at the other end of the fragile portion 112, and the reader circuit 1112 spans the fragile portion 112. However, in other embodiments, other components of the identification element 111 may be located within the fragile portion 112, such as a reader chip or a reader circuit. In this example, the fragile portion 112 is a relatively narrow local structure of the latch 11. In other embodiments, the fragile portion 112 may also be implemented as a local structure formed from other materials with lower mechanical strength, which is not a limitation in this invention. Preferably, the fragile portion 112 is designed to withstand only a predetermined torque applied to the ends of the latch 11, allowing the user to perform destructive actions such as bending or tearing the fragile portion 112 of the latch 11.

請結合參考圖1,當插銷11與插銷槽12耦合時,偵測元件13可從天線1113透過讀取線路1112讀取到近場通訊晶片1111的資料,並得到一偵測訊號且產生一偵測結果。當插銷11從插銷槽12退出時,偵測元件13無法讀取到近場通訊晶片1111。進一步,當插銷11從插銷槽12退出且插銷11從脆弱部112被破壞時,由於讀取線路1112連同脆弱部112被破壞,近場通訊晶片1111與天線1113之間的電性連接可被斷開。如此一來,即使插銷11再度與插銷槽12耦合,偵測元件13將無法從天線1113透過讀取線路1112讀取到近場通訊晶片1111的資料。在其他實施態樣中,未必是讀取線路1112設置在脆弱部112,也可以是將近場通訊晶片1111或天線1113設置在脆弱部112,以上皆可達成使得脆弱部112被破壞的插銷11無法再度受到偵測元件13的識別的效果。Referring to Figure 1 , when the latch 11 is coupled to the latch slot 12, the detection element 13 can read data from the NFC chip 1111 via the read line 1112 from the antenna 1113, generating a detection signal and a detection result. When the latch 11 is removed from the latch slot 12, the detection element 13 cannot read the NFC chip 1111. Furthermore, when the latch 11 is removed from the latch slot 12 and the fragile portion 112 of the latch 11 is broken, the electrical connection between the NFC chip 1111 and the antenna 1113 is severed due to the destruction of the read line 1112 and the fragile portion 112. As a result, even if the latch 11 is re-engaged with the latch slot 12, the detection element 13 will not be able to read data from the NFC chip 1111 via the antenna 1113 via the read line 1112. In other embodiments, the read line 1112 need not be located in the fragile portion 112; the NFC chip 1111 or the antenna 1113 may also be located in the fragile portion 112. Both of these arrangements can prevent the detection element 13 from recognizing the latch 11 if its fragile portion 112 is damaged.

請結合圖1參考圖5,圖5係依據本發明一實施例所繪示的資料保護裝置的操作流程圖。如圖5所示,運算元件14的操作流程可包含步驟S11:判斷是否取得偵測訊號;若否,則執行步驟S12:刪除目標資料;若是,則執行步驟S13:判斷偵測訊號是否包含識別元件的資訊;若否,則執行步驟S12,若是,則執行步驟S14:不作動。Please refer to FIG5 in conjunction with FIG1 . FIG5 is a flowchart illustrating the operation of a data protection device according to an embodiment of the present invention. As shown in FIG5 , the operation of the computing element 14 may include step S11: determining whether a detection signal has been obtained; if not, executing step S12: deleting the target data; if so, executing step S13: determining whether the detection signal contains information identifying the component; if not, executing step S12; if so, executing step S14: taking no action.

在步驟S11中,當運算元件14無法取得來自偵測元件13的偵測訊號,表示偵測元件13無法偵測到插銷11的識別元件111(上述第二偵測結果),即插銷11未與插銷槽12耦合,此時運算元件14便執行刪除目標資料的操作。在步驟S13中,當運算元件14判斷偵測訊號不包含識別元件111的資訊時,表示其他插銷可能與插銷槽12相耦合,使偵測元件13無法識別到對應的識別元件,此時運算元件14便執行刪除目標資料的操作。另外,當運算元件14取得偵測訊號,且判斷偵測訊號中包含識別元件111的資訊時,即,當運算元件14可根據所述偵測結果判斷識別元件111存在時,可保留該記憶體儲存的該目標資料(步驟S14)。In step S11, if computing element 14 fails to receive the detection signal from detection element 13, this indicates that detection element 13 cannot detect identification element 111 of latch 11 (the second detection result described above), meaning that latch 11 is not coupled to latch slot 12. Computing element 14 then deletes the target data. In step S13, if computing element 14 determines that the detection signal does not contain information about identification element 111, this indicates that another latch may be coupled to latch slot 12, preventing detection element 13 from identifying the corresponding identification element. Computing element 14 then deletes the target data. In addition, when the computing element 14 obtains the detection signal and determines that the detection signal contains information of the identification element 111, that is, when the computing element 14 can determine the existence of the identification element 111 based on the detection result, the target data stored in the memory can be retained (step S14).

請結合圖3參考圖6,圖6係依據本發明另一實施例所繪示的資料保護裝置的操作流程圖。如圖6所示,運算元件14的操作流程可包含步驟S21:根據偵測元件的偵測結果判斷識別元件是否存在;若是,則執行步驟S22:不作動;若否,則執行步驟S23:記錄無法根據偵測結果判斷識別元件存在的狀態時間長度;步驟S24:判斷狀態時間長度是否達一預設時間長度;若否,則執行步驟S22,若是,則執行步驟S25:刪除目標資料。Please refer to FIG6 in conjunction with FIG3 . FIG6 is a flowchart illustrating an operation flow of a data protection device according to another embodiment of the present invention. As shown in FIG6 , the operation flow of the computing element 14 may include step S21: determining whether the identification element exists based on the detection result of the detection element; if so, executing step S22: performing no action; if not, executing step S23: recording the duration of the state in which the existence of the identification element cannot be determined based on the detection result; step S24: determining whether the duration of the state reaches a preset time length; if not, executing step S22; if so, executing step S25: deleting the target data.

在步驟S21及S23中,當運算元件14根據偵測元件13的偵測結果(上述第二偵測結果或第三偵測結果)判斷識別元件111不存在時,可記錄上述第二偵測結果或第三偵測結果持續的一狀態時間長度。具體而言,步驟S21的「判斷識別元件是否存在」可包含圖5所示的步驟S11的「判斷是否取得偵測訊號」以及步驟S13的「判斷偵測訊號是否包含識別元件的資訊」。於此同時,運算元件14可控制提示元件15輸出關聯於所述預設時間長度的一提示訊號。舉例而言,預設時間長度為10秒。運算元件14可控制提示元件15顯示狀態時間長度為從10秒開始倒數至0。在步驟S24及S25中,當運算元件14判斷所述狀態時間長度已經達到預設時間長度時,則刪除目標資料。另外,在步驟S24中,若在狀態時間長度達預設時間長度之前,運算元件14可根據偵測元件13的偵測結果判斷識別元件111存在,表示插銷11在從插銷槽12退出後的預設時間長度內已經重新與插銷槽12耦合,此時運算元件14不刪除目標資料,並維持正常運作。即,當運算元件14可根據所述偵測結果判斷識別元件111存在時,可保留該記憶體儲存的該目標資料(步驟S22)。需要注意的是,請結合參考圖4,當插銷11已經被破壞時,即使插銷11在預設時間長度內重新與插銷槽12耦合,由於偵測元件13無法進行讀取,運算元件14仍然無法判斷識別元件111存在,因此運算元件14仍會在狀態時間長度達預設時間長度時進行刪除目標資料的操作。In steps S21 and S23, when the computing device 14 determines that the identification device 111 is absent based on the detection result of the detection device 13 (the second or third detection result), it may record the duration of the second or third detection result. Specifically, the "determining whether the identification device exists" in step S21 may include the "determining whether a detection signal has been obtained" in step S11 shown in Figure 5 and the "determining whether the detection signal contains information about the identification device" in step S13. Simultaneously, the computing device 14 may control the prompting device 15 to output a prompting signal associated with the preset time duration. For example, the preset time duration is 10 seconds. The computing device 14 can control the prompt device 15 to display the status time length, counting down from 10 seconds to 0. In steps S24 and S25, if the computing device 14 determines that the status time length has reached the preset time length, it deletes the target data. Furthermore, in step S24, if, before the status time length reaches the preset time length, the computing device 14 determines, based on the detection result of the detection device 13, that the identification device 111 is present, indicating that the latch 11 has re-engaged with the latch slot 12 within the preset time length after being withdrawn from the latch slot 12, the computing device 14 does not delete the target data and maintains normal operation. That is, when the computing device 14 can determine the presence of the identification device 111 based on the detection result, the target data stored in the memory can be retained (step S22). It should be noted that, referring to Figure 4, when the latch 11 is damaged, even if the latch 11 re-engages with the latch slot 12 within the preset time length, the computing device 14 still cannot determine the presence of the identification device 111 because the detection device 13 cannot read it. Therefore, the computing device 14 will still perform the operation of deleting the target data when the state time length reaches the preset time length.

藉由上述結構,本案所揭示的資料保護裝置及可攜式電子設備,透過在資料保護裝置設置彼此可插拔地耦合的插銷與插銷槽,其中插銷上具有識別元件,且插銷槽中設置有偵測元件,使得當插銷自插銷槽中退出時,資料保護裝置可受觸發而自動執行資料刪除作業。據此,當持有資料保護裝置的使用者面臨緊急狀況時,可簡便地將插銷自插銷槽中退出,以迅速對記憶體中的目標資料銷毀或格式化,確保目標資料不被有心人士竊取。另外,本案的資料保護裝置的插銷可額外具有脆弱部的設計,並將識別元件的一部份設置於脆弱部上,使得插銷在從插銷槽中退出後可從脆弱部被破壞,進一步確保機密資料可以被銷毀,防止有心人士利用。Through the above-described structure, the data protection device and portable electronic device disclosed in this application utilize a pluggable and coupled plug and socket on the data protection device. The plug has an identification element, and the socket has a detection element. When the plug is removed from the socket, the data protection device is triggered to automatically perform a data deletion operation. Consequently, when a user of the data protection device faces an emergency, they can simply remove the plug from the socket to quickly destroy or format the target data in the memory, ensuring that the target data cannot be stolen by malicious individuals. In addition, the latch of the data protection device of this invention may be additionally designed with a fragile portion, and a portion of the identification element may be disposed on the fragile portion, so that the latch can be destroyed from the fragile portion after being withdrawn from the latch slot, further ensuring that confidential data can be destroyed and preventing malicious persons from exploiting it.

雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed above with reference to the aforementioned embodiments, they are not intended to limit the present invention. Any modifications and enhancements that do not depart from the spirit and scope of the present invention are within the scope of patent protection of the present invention. Please refer to the attached patent application for the scope of protection defined by the present invention.

1,1’:資料保護裝置 11:插銷 111:識別元件 1111:近場通訊晶片 1112:讀取線路 1113:天線 112:脆弱部 113:握持部 12:插銷槽 121:開機觸發開關 122:控制器 13:偵測元件 14:運算元件 15:提示元件 2:記憶體 3:可攜式電子裝置 S11-S14,S21-S25:步驟 1,1': Data protection device 11: Latch 111: Identification element 1111: Near-field communication chip 1112: Read circuit 1113: Antenna 112: Fragile portion 113: Grip 12: Latch slot 121: Power trigger 122: Controller 13: Detection element 14: Computing element 15: Alert element 2: Memory 3: Portable electronic device S11-S14, S21-S25: Steps

圖1係依據本發明一實施例所繪示的資料保護裝置的方塊圖。 圖2係依據本發明一實施例所繪示的可攜式電子設備的方塊圖。 圖3係依據本發明另一實施例所繪示的資料保護裝置的方塊圖。 圖4係依據本發明一實施例所繪示的資料保護裝置的插銷的示意圖。 圖5係依據本發明一實施例所繪示的資料保護裝置的操作流程圖。 圖6係依據本發明另一實施例所繪示的資料保護裝置的操作流程圖。 Figure 1 is a block diagram of a data protection device according to one embodiment of the present invention. Figure 2 is a block diagram of a portable electronic device according to one embodiment of the present invention. Figure 3 is a block diagram of a data protection device according to another embodiment of the present invention. Figure 4 is a schematic diagram of a latch of a data protection device according to one embodiment of the present invention. Figure 5 is a flowchart of the operation of a data protection device according to one embodiment of the present invention. Figure 6 is a flowchart of the operation of a data protection device according to another embodiment of the present invention.

1:資料保護裝置 1: Data protection device

11:插銷 11: Latch

111:識別元件 111: Identification Component

12:插銷槽 12: Latch slot

13:偵測元件 13: Detection Components

14:運算元件 14: Computing Elements

2:記憶體 2: Memory

Claims (20)

一種資料保護裝置,適用於儲存一目標資料的一記憶體,包含: 一插銷槽; 一插銷,具有一握持部及一延伸部,該延伸部與該插銷槽可插拔地耦合,且該延伸部上設置有一識別元件; 一偵測元件,設置為對應於該插銷槽,用於對該插銷槽進行偵測;以及 一運算元件,連接於該偵測元件,用於當無法根據該偵測元件的偵測結果判斷該識別元件存在於該延伸部時,刪除該目標資料。 A data protection device, adapted for use in a memory storing target data, comprises: a latch slot; a latch having a grip portion and an extension portion, the extension portion being removably coupled to the latch slot and having an identification element disposed on the extension portion; a detection element disposed corresponding to the latch slot and configured to detect the latch slot; and an arithmetic element connected to the detection element and configured to delete the target data if the detection result of the detection element cannot determine that the identification element is present in the extension portion. 如請求項1所述的資料保護裝置,其中該運算元件用於當無法取得來自該偵測元件的偵測訊號時,刪除該目標資料。The data protection device as described in claim 1, wherein the operating component is configured to delete the target data when the detection signal from the detection component cannot be obtained. 如請求項1所述的資料保護裝置,其中該運算元件用於當判斷來自該偵測元件的偵測訊號不包含該識別元件的資訊時,刪除該目標資料。The data protection device as described in claim 1, wherein the operating element is configured to delete the target data when it is determined that the detection signal from the detection element does not include the information of the identification element. 如請求項1所述的資料保護裝置,其中該運算元件更用於記錄無法根據該偵測結果判斷該識別元件存在的狀態時間長度,且在該狀態時間長度未達一預設時間長度前不刪除該目標資料,直至該狀態時間長度達該預設時間長度方刪除該目標資料。A data protection device as described in claim 1, wherein the computing element is further used to record the state time length during which it is impossible to determine the existence of the identification element based on the detection result, and the target data is not deleted before the state time length reaches a preset time length, and the target data is not deleted until the state time length reaches the preset time length. 如請求項4所述的資料保護裝置,更包含: 一提示元件,連接於該運算元件; 其中該運算元件更用於在記錄該狀態時間長度時,致動該提示元件輸出關聯於該預設時間長度的一提示訊號。 The data protection device of claim 4 further comprises: A prompt element connected to the computing element; Wherein, the computing element is further configured to activate the prompt element to output a prompt signal associated with the preset time duration when recording the state time duration. 如請求項1所述的資料保護裝置,其中該識別元件及該偵測元件係基於一無線射頻識別技術。The data protection device of claim 1, wherein the identification element and the detection element are based on a wireless radio frequency identification technology. 如請求項1所述的資料保護裝置,其中該插銷具有一脆弱部,該識別元件的一部份設置於該脆弱部,且該識別元件的該部分為一讀取晶片或一讀取線路。The data protection device as described in claim 1, wherein the pin has a fragile portion, a portion of the identification element is disposed on the fragile portion, and the portion of the identification element is a reading chip or a reading circuit. 如請求項1所述的資料保護裝置,其中該運算元件用於當無法根據該偵測結果判斷該識別元件存在時,刪除該記憶體的所有資料。The data protection device as described in claim 1, wherein the operating element is used to delete all data in the memory when it is impossible to determine that the identification element exists based on the detection result. 如請求項1所述的資料保護裝置,更包含: 一開機觸發開關,設置於該插銷槽中且具有一第一狀態及一第二狀態,當該插銷與該插銷槽耦合時,該開機觸發開關處於該第一狀態,當該插銷從該插銷槽退出時,該開機觸發開關處於該第二狀態;以及 一控制器,連接於該開機觸發開關及該運算元件,用於當該運算元件處於停能狀態且該開機觸發開關處於該第二狀態時,致動該運算元件。 The data protection device of claim 1 further comprises: a power trigger switch disposed in the latch slot and having a first state and a second state, wherein the power trigger switch is in the first state when the latch is coupled to the latch slot and in the second state when the latch is removed from the latch slot; and a controller connected to the power trigger switch and the computing element, configured to activate the computing element when the computing element is in the disabled state and the power trigger switch is in the second state. 一種可攜式電子設備,包含如請求項1至9任一者所述的資料保護裝置及該記憶體。A portable electronic device comprises the data protection device as claimed in any one of claims 1 to 9 and the memory. 一種資料保護方法,適用於儲存一目標資料的一記憶體包含: 以一偵測元件對一插銷槽進行偵測; 以一運算元件根據該偵測元件的偵測結果判斷一識別元件是否存在於一插銷的延伸部,其中該識別元件設置於可插拔地耦合於該插銷槽的一插銷;以及 當無法根據該偵測結果判斷該識別元件存在時,以該運算元件刪除該記憶體儲存的該目標資料。 A data protection method, applicable to a memory storing target data, comprises: Detecting a latch slot with a detection element; Determining whether an identification element is present in an extended portion of a latch based on the detection result of the detection element with an arithmetic element, wherein the identification element is disposed on a latch that is pluggably coupled to the latch slot; and Deleting the target data from the memory with the arithmetic element when the detection result fails to determine whether the identification element is present. 如請求項11所述的資料保護方法,其中根據該偵測元件的該偵測結果判斷該識別元件是否存在於該插銷的該延伸部包含: 判斷是否從該偵測元件取得一偵測訊號; 其中當無法取得該偵測訊號時,表示無法根據該偵測結果判斷該識別元件存在於該插銷的該延伸部。 The data protection method of claim 11, wherein determining whether the identification element is present in the extended portion of the latch based on the detection result of the detection element comprises: Determining whether a detection signal is obtained from the detection element; Failure to obtain the detection signal indicates that it is impossible to determine, based on the detection result, that the identification element is present in the extended portion of the latch. 如請求項12所述的資料保護方法,其中根據該偵測元件的偵測結果判斷設置於該插銷上的該識別元件是否存在於該插銷的該延伸部更包含: 當取得該偵測訊號時,判斷該偵測訊號是否包含該識別元件的資訊; 其中當判斷該偵測訊號不包含該識別元件的資訊時,表示無法根據該偵測結果判斷該識別元件存在於該插銷的該延伸部。 The data protection method of claim 12, wherein determining whether the identification element disposed on the plug is present in the extended portion of the plug based on a detection result of the detection element further comprises: When obtaining the detection signal, determining whether the detection signal includes information about the identification element; If it is determined that the detection signal does not include information about the identification element, it indicates that it is impossible to determine, based on the detection result, that the identification element is present in the extended portion of the plug. 如請求項11所述的資料保護方法,其中在刪除該記憶體儲存的該目標資料之前,更包含: 記錄無法根據該偵測結果判斷該識別元件存在的一狀態時間長度;以及 判斷該狀態時間長度達一預設時間長度。 The data protection method of claim 11, prior to deleting the target data stored in the memory, further comprises: Recording a duration during which it is impossible to determine the presence of the identification element based on the detection result; and Determining that the duration of the state has reached a preset duration. 如請求項11所述的資料保護方法,更包含: 當根據該偵測結果判斷該識別元件存在時,以該運算元件保留該記憶體儲存的該目標資料。 The data protection method of claim 11 further comprises: When the identification element is determined to be present based on the detection result, retaining the target data stored in the memory using the computing element. 如請求項14所述的資料保護方法,更包含: 在記錄該狀態時間長度時,致動一提示元件輸出關聯於該預設時間長度的一提示訊號。 The data protection method of claim 14 further comprises: When recording the duration of the status, activating a prompt element to output a prompt signal associated with the preset duration. 如請求項14所述的資料保護方法,其中根據該偵測元件的偵測結果判斷設置於該插銷上的該識別元件是否存在於該插銷的該延伸部包含: 判斷是否從該偵測元件取得一偵測訊號;以及 當取得該偵測訊號時,判斷該偵測訊號是否包含該識別元件的資訊; 其中當無法取得該偵測訊號或判斷該偵測訊號不包含該識別元件的資訊時,表示無法根據該偵測結果判斷該識別元件存在於該插銷的該延伸部。 The data protection method of claim 14, wherein determining whether the identification element disposed on the plug is present in the extended portion of the plug based on a detection result of the detection element comprises: Determining whether a detection signal is obtained from the detection element; and When the detection signal is obtained, determining whether the detection signal includes information about the identification element; Where the detection signal cannot be obtained or it is determined that the detection signal does not include information about the identification element, it indicates that it is impossible to determine, based on the detection result, that the identification element is present in the extended portion of the plug. 如請求項11所述的資料保護方法,其中刪除該記憶體儲存的該目標資料包含: 刪除該記憶體的所有資料。 The data protection method of claim 11, wherein deleting the target data stored in the memory comprises: Deleting all data in the memory. 如請求項11所述的資料保護方法,更包含: 以一控制器判斷該運算元件是否處於停能狀態,且判斷一開機觸發開關處於一第一狀態或一第二狀態;以及 當該控制器判斷該運算元件處於該停能狀態且該開機觸發開關處於該第二狀態時,致動該運算元件, 其中,該開機觸發開關設置於該插銷槽中,且當該插銷與該插銷槽耦合時,該開機觸發開關處於該第一狀態,當該插銷從該插銷槽退出時,該開機觸發開關處於該第二狀態。 The data protection method of claim 11 further comprises: Determining, using a controller, whether the computing element is in a disabled state and determining whether a power-on trigger switch is in a first state or a second state; and Actuating the computing element when the controller determines that the computing element is in the disabled state and the power-on trigger switch is in the second state. The power-on trigger switch is disposed in the latch slot, and when the latch is coupled to the latch slot, the power-on trigger switch is in the first state, and when the latch is removed from the latch slot, the power-on trigger switch is in the second state. 如請求項11所述的資料保護方法,其中以該偵測元件對該插銷槽進行偵測係基於一無線射頻識別技術。The data protection method as described in claim 11, wherein the detection of the latch slot by the detection element is based on a wireless radio frequency identification technology.
TW112145150A 2023-11-22 2023-11-22 Data protection device and portable electronic device TWI897106B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW112145150A TWI897106B (en) 2023-11-22 2023-11-22 Data protection device and portable electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW112145150A TWI897106B (en) 2023-11-22 2023-11-22 Data protection device and portable electronic device

Publications (2)

Publication Number Publication Date
TW202522278A TW202522278A (en) 2025-06-01
TWI897106B true TWI897106B (en) 2025-09-11

Family

ID=97224401

Family Applications (1)

Application Number Title Priority Date Filing Date
TW112145150A TWI897106B (en) 2023-11-22 2023-11-22 Data protection device and portable electronic device

Country Status (1)

Country Link
TW (1) TWI897106B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439964A (en) * 2002-02-22 2003-09-03 方可成 Anti-transcription digital recording medium protection and method for making master film
TW200828128A (en) * 2006-12-19 2008-07-01 Apac Opto Electronics Inc Electronic device with radio frequency identification technology
CN106101438A (en) * 2016-07-29 2016-11-09 哈尔滨理工大学 A kind of cellphone information protection lock

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439964A (en) * 2002-02-22 2003-09-03 方可成 Anti-transcription digital recording medium protection and method for making master film
TW200828128A (en) * 2006-12-19 2008-07-01 Apac Opto Electronics Inc Electronic device with radio frequency identification technology
CN106101438A (en) * 2016-07-29 2016-11-09 哈尔滨理工大学 A kind of cellphone information protection lock

Also Published As

Publication number Publication date
TW202522278A (en) 2025-06-01

Similar Documents

Publication Publication Date Title
CN101896914B (en) Systems, methods and apparatus for erasing memory on wireless devices
CN110020560B (en) Electronic disk system and method with data self-destruction protection function
TWI240165B (en) Information storage apparatus, system and method for memory access control and computer program
JP4863977B2 (en) Removable digital data storage device, method for protecting computer readable memory, article of manufacture including computer usable media (programmable memory device security method and system)
US20130111600A1 (en) Method and device for sensing and responding to an unauthorized opening of a biometric trait capture device
CN104903911B (en) One-Time Programmable Integrated Circuit Security
US11113429B2 (en) Solid state storage data destruction
US7696857B2 (en) Method and system for disabling an electronic device upon theft
CN104220994A (en) System and method for protecting data stored on a removable data storage device
CN111327422A (en) Cipher machine with key destruction function and key destruction method
CN103902934A (en) Computer case disassembling prevention detecting method and device
US20080106366A1 (en) Damage detection for an anti-theft interface
TWI897106B (en) Data protection device and portable electronic device
JP2000011268A (en) Security equipment
CN115292762A (en) Method for opening and closing active data self-destruction under system power-off state
JP4931543B2 (en) Information device and computer program
CN101930523B (en) Document protection system and method
JP5160940B2 (en) Hard disk drive
CN120030614A (en) Data protection device, portable electronic device and data protection method
CN102890762A (en) Anti-theft device, anti-theft method and computer system
CN103403741B (en) Start portable data storage medium
EP3444736A1 (en) Device and method for storing and accessing secret user-authentication data
TWI412950B (en) Document protection system and method thereof
CN102497637B (en) Security information protection secret-related equipment processing system and method based on WSN base station control
US20120047582A1 (en) Data deleting method for computer storage device