CN100449559C - Data protection system for controlling and managing data entry point - Google Patents
Data protection system for controlling and managing data entry point Download PDFInfo
- Publication number
- CN100449559C CN100449559C CNB2006100875530A CN200610087553A CN100449559C CN 100449559 C CN100449559 C CN 100449559C CN B2006100875530 A CNB2006100875530 A CN B2006100875530A CN 200610087553 A CN200610087553 A CN 200610087553A CN 100449559 C CN100449559 C CN 100449559C
- Authority
- CN
- China
- Prior art keywords
- data
- data entry
- entry point
- identification
- contactless card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000013479 data entry Methods 0.000 title claims abstract description 57
- 238000012545 processing Methods 0.000 claims description 6
- 238000013459 approach Methods 0.000 claims description 3
- 238000000034 method Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域 technical field
本发明涉及一种数据保护系统,尤其涉及控管数据进入点的数据保护系统。The invention relates to a data protection system, in particular to a data protection system for controlling and managing data entry points.
背景技术 Background technique
一般计算机操作系统均以验证账号/密码的方式,作为数据保护的手段。虽然有些操作系统的账号/密码并不容易被破解,但是,如硬盘驱动器的数据处理装置,一但从计算机中被拆离,便可轻易地利用另一台计算机读取储存于其中的数据。General computer operating systems use account/password verification as a means of data protection. Although the accounts/passwords of some operating systems are not easily cracked, once a data processing device such as a hard drive is detached from a computer, another computer can be used to easily read the data stored therein.
为了克服这一问题,“中国台湾”第550459公告号的专利提供一种“电脑资料保护装置”,以期望能解决此问题。简略而言,其所运用的技术手段在于,在主机(或是计算机的CPU)与硬盘驱动器之间,额外增设此“电脑资料保护装置”,并借着写入/读取硬盘驱动器的数据时,借着加密/解密而达到数据保护的目的。In order to overcome this problem, the patent of "Taiwan, China" No. 550459 Bulletin No. provides a "computer data protection device" to expect to solve this problem. In short, the technical means used is to add this "computer data protection device" between the host computer (or the CPU of the computer) and the hard disk drive, and when writing/reading data from the hard drive, , to achieve the purpose of data protection through encryption/decryption.
然而,若有心人将硬盘驱动器连同此“电脑资料保护装置”一并从计算机中拆离时,仍可借着其内建的解密机制顺利将储存于其中的资料解密,因而仍无法确实有效达到数据保护的目的。However, if someone detaches the hard disk drive together with this "computer data protection device" from the computer, the data stored in it can still be successfully decrypted by means of its built-in decryption mechanism, so it is still impossible to effectively access the data. purpose of protection.
“中国台湾”专利第591630公告号专利“储存媒体之资料保护装置及资料保密方法”,是藉由“密码查验单元”而克服第550459公告号专利的问题。于“储存媒体之资料保护装置及资料保密方法”所揭露的技术来看,虽然可藉由查验密码是否正确,才决定是否允许解密机制开始进行资料解密的程序,而可避免因保护装置本身连带硬盘一起带走而无法达到数据保护的目的,但是,此种人为的密码设置仍有可能被破解的问题。The "Taiwan of China" patent No. 591630 patent "data protection device and data security method for storage media" overcomes the problem of the No. 550459 patent by "password checking unit". Judging from the technology disclosed in "Data Protection Device for Storage Media and Data Security Method", although it is possible to decide whether to allow the decryption mechanism to start the process of data decryption by checking whether the password is correct, it is possible to avoid accidents caused by the protection device itself. The purpose of data protection cannot be achieved if the hard disk is taken away together. However, this artificial password setting still has the possibility of being cracked.
再者,如同光盘可从光驱轻易抽离的数据处理装置,例如:软盘驱动器、闪存读写机、ZIP磁盘驱动器、JAZ磁盘驱动器、磁带装置等等。此种数据处理装置比起硬盘驱动器,更是容易被人将其用于储存资料的储存媒体带离,因此,这更是需要有一种完全的数据保护机制。Furthermore, as a data processing device that the optical disc can be easily detached from the optical drive, for example: a floppy disk drive, a flash memory reader, a ZIP disk drive, a JAZ disk drive, a magnetic tape device, and the like. Compared with the hard disk drive, this kind of data processing device is more likely to be taken away by the storage medium used for storing data. Therefore, a complete data protection mechanism is required.
此外,近年来,用于光盘烧录技术的突飞猛进,使得用以储存多媒体、游戏、应用程序等的光盘片,不论采用何种数据保护手段,最后仍遭到破解。这也代表着,数据保护的手段势必要有突破性的做法,方能顺利克服以上所述的种种问题。In addition, in recent years, the rapid development of optical disc burning technology makes the optical disc used to store multimedia, games, application programs, etc., no matter what data protection method is adopted, it is still cracked in the end. This also means that the means of data protection must have a breakthrough approach in order to successfully overcome the above-mentioned problems.
发明内容 Contents of the invention
本发明主要目的在提供一种控管数据进入点的数据保护系统,借着控管数据进入点(用来指向数据区域中特定扇区为进入点),使得未经辨识而被确认为合法的存取操作时,将无法获得此数据进入点而无法从数据区域中读取或写入数据,进而达到数据保护的目的。The main purpose of the present invention is to provide a data protection system that controls the data entry point. By controlling the data entry point (used to point to a specific sector in the data area as the entry point), it is confirmed as legal without identification. During the access operation, the data entry point cannot be obtained and the data cannot be read or written from the data area, thereby achieving the purpose of data protection.
基于上述目的,在本发明控管数据进入点的数据保护系统中,用来存取数据的储存单元包含数据进入点区域、实际储存数据的数据区域,数据进入点区域中的复数笔数据进入点会分别指向数据区域中特定扇区为进入点。所以,若非法者无法得知数据进入点的所在时,当然就无法从数据区域抓取数据。故需利用类似于钥匙的非接触卡解除锁定,系统才会提供相对的数据进入点,才允许相对的运算装置,对系统中的储存单元作数据存取。反之,锁定后则不再允许数据存取,藉此达到保护数据的目的。Based on the above purpose, in the data protection system for controlling data entry points of the present invention, the storage unit used to access data includes a data entry point area, a data area for actually storing data, and a plurality of data entry points in the data entry point area It will point to a specific sector in the data area as the entry point. Therefore, if the illegal person cannot know the location of the data entry point, of course, the data cannot be grabbed from the data area. Therefore, it is necessary to use a non-contact card similar to a key to unlock, and the system will provide a relative data entry point, allowing the corresponding computing device to access the storage unit in the system for data access. On the contrary, after locking, data access is no longer allowed, so as to achieve the purpose of data protection.
附图说明 Description of drawings
图1A-图1B为本发明控管数据进入点的数据保护系统的示意图。1A-1B are schematic diagrams of a data protection system for controlling data entry points according to the present invention.
图2为本发明储存单元的示意图。FIG. 2 is a schematic diagram of a storage unit of the present invention.
图中主要组件符号说明Explanation of main component symbols in the figure
5控管数据进入点的数据保护系统5 Data protection systems that control data entry points
10数据保护装置10 data protection device
12运算装置12 computing device
13总线13 bus
14非接触卡14 contactless card
16控制单元16 control unit
18辨识单元18 identification units
20备份单元20 backup units
22储存单元22 storage units
22a数据进入点区域22a Data entry point area
22b数据区域22b data area
24a、24b数据进入点24a, 24b data entry point
26a、26b数据26a, 26b data
具体实施方式 Detailed ways
请参阅图1A-1B,图1A-1B为本发明控管数据进入点的数据保护系统的示意图。如图1A所示,本发明控管数据进入点的数据保护系统5主要由数据保护装置10、均属于使用者的非接触卡14、运算装置12(例如可储存、处理数据的PDA)。Please refer to FIGS. 1A-1B . FIGS. 1A-1B are schematic diagrams of a data protection system for controlling data entry points according to the present invention. As shown in FIG. 1A , the
简略而言,若使用者需要从数据保护系统5抓取或写入数据时,除了将运算装置12与数据保护装置10总线13(例如USB、IDE、ATA等等)作电性连接外,尚需借着如同钥匙般合法的非接触卡14解除锁定后,使用者才得以借着运算装置12从数据保护系统5抓取或写入数据。在本发明系统中可为RFID的非接触卡14所储存的识别代码,可代替以往识别用的账号、密码,这是因为只需将非接触卡14靠近数据保护装置10时便会自动开始进行识别程序,若属合法时就可解除锁定和锁定,而不需要使用者输入账号、密码,故对使用者而言这是十分便利的识别方式。所谓锁定是指,如图1B所示的控制单元16针对特定非接触卡14的识别代码作锁定时,相对的运算装置12无法对储存单元22作数据存取。In short, if the user needs to capture or write data from the
需特别注意的是,利用非接触卡14作为识别并非本发明的最重要的特点,如图1B所示,本发明主要是利用辨识单元18识别通过后,允许控制单元16从备份单元20取得相对于识别代码的数据进入点(指向实际数据的存放所在),并藉此数据进入点才能进行数据传输,亦即才能从储存单元22抓取所需数据并传输至运算装置12或从运算装置12抓取数据并写入数据至储存单元22中。换句话说,若未经合法的非接触卡14解除锁定时,对于来自运算装置12的存取要求,控制单元16会响应拒绝存取,这使得非法者在未通过辨识,无法得知数据进入点的所在,当然就无法从储存单元22中数据区域22b(如图2所示)抓取数据。下面,将更详细地说明如何完成识别、在什么情况下进行锁定和解除锁定、如何借着数据进入点抓取或写入数据等等。It should be noted that using the
请参阅图2,图2为本发明储存单元的示意图。如图2所示,在本发明控管数据进入点的数据保护系统5中,用来存取数据的储存单元22包含数据进入点区域22a、实际储存数据的数据区域22b,而数据进入点区域22a中的如数据进入点24a、24b会分别指向数据区域22b中特定扇区为进入点(亦即A数据26a、B数据26b的进入点)。Please refer to FIG. 2 , which is a schematic diagram of the storage unit of the present invention. As shown in Figure 2, in the
举例来说,若非接触卡14接近辨识单元18时,由于在备份单元20中已存在有相对于非接触卡14的识别代码的数据进入点24a,且每一数据进入点均被分配给不同或相同非接触卡14的识别代码,故辨识单元18很快就能查到此非接触卡14是合法的,并将此识别结果通知控制单元16。控制单元16在辨识结果为合法时,便会基于备份单元20的数据进入点24a供运算装置12针对储存单元22作数据存取,亦即针对数据进入点24a所指向的A数据26a作读取。此外,为了更进一步保护储存在储存单元22中的数据,控制单元16会依据非接触卡14的识别代码作加密或解密处理,并使数据保护装置10的储存单元22的数据存取均作加密或解密处理。For example, if the
备份单元20会在每次发生解除锁定或锁定时,将数据进入点区域22a中该些笔数据进入点备份至备份单元20中,而将这些数据进入点作为识别以及保护数据用。会有保护数据的效果是因为非法者永远不会知道数据进入点所在,除非通过识别。The
若相对于非接触卡14的识别代码的执行工作状态属于非锁定时(例如:已通过辨识,且正在进行数据传输),且若非接触卡14再度接近辨识单元18时,控制单元16会针对相对非接触卡14的识别代码作锁定,这将会使得此数据传输立即终止或是等完成目前的数据传输后不得继续作其他存取操作。If the execution working state relative to the identification code of the
若运算装置12从总线13抽出时,而导致运算装置12、数据保护装置10之间原先合法电性连接关系(因通过识别)消失时,控制单元16也会针对相对的非接触卡14的识别代码作锁定。If the
若数据保护装置10需要关闭时,控制单元16会针对所有非接触卡的识别代码作锁定。If the
如同先前所述,若相对于非接触卡14的识别代码的执行工作状态属于锁定时,且若非接触卡14再度接近辨识单元18时,控制单元16会针对相对非接触卡14的识别代码作解除锁定。As previously mentioned, if the execution status of the identification code relative to the
综上所述,在本发明控管数据进入点的数据保护系统10中,由于未通过辨识就无法从备份单元20得知数据进入点的所在时,当然就无法从储存单元22的数据区域22b抓取数据。故需利用类似于钥匙的非接触卡14解除锁定,系统才会提供相对的数据进入点,才允许相对的运算装置12,对系统中的储存单元22作数据存取。To sum up, in the
藉由以上较佳具体实施例的详述,希望能更加清楚描述本发明的特征与精神,而并非以上述所揭露的较佳具体实施例来对本发明的范畴加以限制。相反地,其目的是希望能涵盖各种改变及具相等性的安排于发明所欲申请的专利范围的范畴内。Through the above detailed description of the preferred embodiments, it is hoped that the features and spirit of the present invention can be described more clearly, and the scope of the present invention is not limited by the preferred embodiments disclosed above. On the contrary, the purpose is to cover various changes and equivalent arrangements within the scope of the patent application for the invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100875530A CN100449559C (en) | 2006-06-14 | 2006-06-14 | Data protection system for controlling and managing data entry point |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100875530A CN100449559C (en) | 2006-06-14 | 2006-06-14 | Data protection system for controlling and managing data entry point |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101089866A CN101089866A (en) | 2007-12-19 |
CN100449559C true CN100449559C (en) | 2009-01-07 |
Family
ID=38943223
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100875530A Expired - Fee Related CN100449559C (en) | 2006-06-14 | 2006-06-14 | Data protection system for controlling and managing data entry point |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100449559C (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1467642A (en) * | 2002-07-09 | 2004-01-14 | ��ʿͨ��ʽ���� | Data Protection Procedures and Data Protection Methods |
CN1536495A (en) * | 2003-04-08 | 2004-10-13 | 联想(北京)有限公司 | Data protection device for host protection area and its method |
CN1632873A (en) * | 2003-12-22 | 2005-06-29 | 汇冠科技股份有限公司 | Disc Data Protection Method |
-
2006
- 2006-06-14 CN CNB2006100875530A patent/CN100449559C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1467642A (en) * | 2002-07-09 | 2004-01-14 | ��ʿͨ��ʽ���� | Data Protection Procedures and Data Protection Methods |
CN1536495A (en) * | 2003-04-08 | 2004-10-13 | 联想(北京)有限公司 | Data protection device for host protection area and its method |
CN1632873A (en) * | 2003-12-22 | 2005-06-29 | 汇冠科技股份有限公司 | Disc Data Protection Method |
Also Published As
Publication number | Publication date |
---|---|
CN101089866A (en) | 2007-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8356184B1 (en) | Data storage device comprising a secure processor for maintaining plaintext access to an LBA table | |
US20080120726A1 (en) | External storage device | |
US20090150631A1 (en) | Self-protecting storage device | |
US20080235809A1 (en) | Restricted erase and unlock of data storage devices | |
WO2010127030A2 (en) | Selectively securing data and/or erasing secure data caches responsive to security compromising conditions | |
JPH08505964A (en) | Device and method for providing data security in a computer memory with removable memory | |
CN106716333A (en) | Method for completing secure erase operation | |
US8307181B2 (en) | Apparatus and method for password protection of secure hidden memory | |
CN101403993B (en) | Data security safekeeping equipment and method | |
CN102385671A (en) | Method and system for encrypting software | |
CN103176917B (en) | Storage device protection system and storage device locking and unlocking method | |
KR100841982B1 (en) | Memory card for storing host identification information and its access method | |
CN102651079B (en) | IC (integrated circuit) card management method occupying memory space for a short time and IC card management system | |
US20100115201A1 (en) | Authenticable usb storage device and method thereof | |
US20100303239A1 (en) | Method and apparatus for protecting root key in control system | |
Hughes et al. | Tutorial on disk drive data sanitization | |
TWI329862B (en) | ||
CN100449559C (en) | Data protection system for controlling and managing data entry point | |
CN104794071A (en) | Method and system for unfreezing and adding coded lock on computer SATA hard disk based on USB flash disk | |
CN101169811A (en) | Contactless Digital Security System | |
KR102422680B1 (en) | Flash Storage System Having Embedded Security Program | |
CN114329376A (en) | Computer starting-up identity authentication system | |
CN1357839A (en) | Computer security system and its starting method | |
CN201274047Y (en) | Data security keeping device | |
JP3561203B2 (en) | Memory device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090107 Termination date: 20120614 |