[go: up one dir, main page]

TWI387298B - Interactive Data Backup System - Google Patents

Interactive Data Backup System Download PDF

Info

Publication number
TWI387298B
TWI387298B TW96142686A TW96142686A TWI387298B TW I387298 B TWI387298 B TW I387298B TW 96142686 A TW96142686 A TW 96142686A TW 96142686 A TW96142686 A TW 96142686A TW I387298 B TWI387298 B TW I387298B
Authority
TW
Taiwan
Prior art keywords
module
encryption
data
backup
decryption
Prior art date
Application number
TW96142686A
Other languages
Chinese (zh)
Other versions
TW200922258A (en
Original Assignee
Univ Nat Chunghsing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Chunghsing filed Critical Univ Nat Chunghsing
Priority to TW96142686A priority Critical patent/TWI387298B/en
Publication of TW200922258A publication Critical patent/TW200922258A/en
Application granted granted Critical
Publication of TWI387298B publication Critical patent/TWI387298B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

互動式資料備份系統Interactive data backup system

本發明係隸屬一種數位資料之備份技術領域,具體而言係指一種安全性高、且可長時間保存之資料備份系統,以提升保存重要資料的安全性。The invention belongs to the technical field of backup of digital data, in particular to a data backup system with high security and long-term preservation, so as to improve the security of storing important data.

按,近年來受到資訊科技的進步,人們日常的生活及工作已廣泛的創造與運用到各種數位資料,一但這些數位資料遭受系統損壞、電腦病毒/木馬/蠕蟲/間諜與惡意程式感染、駭客侵入、或因天災人禍而造成系統內數位資料損壞時,不僅對使用者造成相當的困擾,尤其是各種金融或研究實驗資料的遺失,甚至可能造成無法估計的損失,因此數位資料的安全問題一般是資訊人員亟欲克服的問題;而目前最常見的處理方式,係將前述的數位資料進行備份,但資料於備份中或備份後,這些備份資料可能因密碼外洩、保存不當、或遭駭客破解,而造成重要檔案遺失、損毀、竊取或是中毒的風險與遺憾。According to the advancement of information technology in recent years, people's daily life and work have been widely created and applied to various digital data. Once these digital data suffer system damage, computer virus/trojan/worm/spyware and malware infection, When hackers invade, or cause digital data damage in the system due to natural disasters and man-made disasters, it not only causes considerable trouble to users, especially the loss of various financial or research experimental data, and may even cause unpredictable losses, so the security of digital data. The problem is generally the problem that the information personnel wants to overcome; at present, the most common processing method is to back up the above-mentioned digital data, but the backup data may be leaked or improperly stored due to passwords during backup or backup. Hacked by hackers, causing the risk and regret of losing, damaging, stealing or poisoning important files.

換言之,如能進一步提升數位資料於備份的安全性,則將可進一步維護資料備份的安全性,且能強化重要檔案與資料的維護性、保存性、安全性、與管理性,在知識經濟的世代下,更能增加知識工作者的經濟產出。In other words, if the security of digital data can be further improved, the security of data backup can be further maintained, and the maintenance, preservation, security, and management of important files and data can be enhanced. Under the generation, it can increase the economic output of knowledge workers.

有鑑於此,本發明人乃針對前述備份資料時的需求深入探討,欲提供一種創新的個人重要資料備份系統,而藉由本發明人多年於本技術領域的開發經驗,積極尋求解決之道,經不斷努力之研究與試作,終於成功的開發出一種互動式資料之備份系統及方法,進一步可增進資料備份的安全性與保存性。In view of this, the present inventors have intensively discussed the needs of the foregoing backup materials, and intend to provide an innovative personal important data backup system, and the inventors actively seek solutions through years of experience in the development of the technical field. Continuous efforts in research and trials have finally succeeded in developing an interactive data backup system and method to further enhance the security and preservation of data backup.

因此,本發明之主要目的在於提供一種重要資料之備份系統,利用特殊之加解密規則與備份流程,以改變傳統資料備份的方式,提升資料的維護性、保存性、安全性、與管理性,並增進知識經濟產出。Therefore, the main object of the present invention is to provide a backup system for important data, which utilizes special encryption and decryption rules and backup processes to change the manner of traditional data backup, and improve data maintainability, preservability, security, and management. And increase knowledge economy output.

為此,本發明主要係透過下列的技術手段,來具體實現前述的目的與效能:其包含有:一本地端儲存裝置暨加解密系統,其具有一供控制、指揮、命令、管理檔案與資料備份之驗證、確認、授權、傳輸、與行動通訊的認證暨通訊模組,該本地端儲存裝置暨加解密系統並具有一供執行欲備份檔案與資料的備份動作之備份模組,且本地端儲存裝置暨加解密系統進一步具有一供執行擷取、組合與轉換動作、擷取、組合與轉換使用者的特徵資料使其成為一複合鑰之轉換模組,令轉換模組產出相應之驗證碼,又本地端儲存裝置暨加解密系統另具有一演算加解密模組,其中演算加解密模組可利用人工智慧演算,搭配生成之複合鑰與相應之驗證碼,用以加/解密欲備份之檔案與資料,再者本地端儲存裝置暨加解密系統更具有一執行本地端原始/備份檔案之儲存動作的儲存模組,且本地端儲存裝置暨加解密系統並具有一供執行備份檔案與資料之存取動作之存取模組;一傳輸認證暨行動通訊系統,其具有一可相對本地端儲存裝置暨加解密系統與異地端儲存裝置暨加解密系統執行行動通訊再確認動作的行動通訊模組,又該傳輸認證暨行動通訊系統另具有一用以執行認證、驗證、確認、授權檔案與資料傳輸動作的認證模組,且傳輸認證暨行動通訊系統並具有一供執行備份檔案與資料之傳輸與接收動作之傳輸模組,再者該傳輸認證暨行動通訊系統進一步具有一演算加解密模組,其中演算加解密模組可利用密碼與網路安全演算技術,用以再加密經本地端送往異地端之備份檔案與資料,反之用以解密經異地端送往本地端之備份檔案與資料;一異地端儲存裝置暨加解密系統,其具有一供控制、指揮、命令、管理檔案與資料備份之驗證、確認、授權、傳輸、與行動通訊的認證暨通訊模組,該異地端儲存裝置暨加解密系統並具有一演算加解密模組,其中演算加解密模組可利用密碼與網路安全演算技術,用以再加密經傳輸認證暨行動通訊系統送來異地端之備份檔案與資料,反之用以解密異地端之備份檔案與資料並送往傳輸認證暨行動通訊系統,又該異地端儲存裝置暨加解密系統另具有一供執行備份檔案與資料之存取動作之存取模組,再者異地端儲存裝置暨加解密系統並具有一供執行異地端備份檔案與資料之儲存動作的儲存模組,該儲存模組包含有一安全資料庫,用以供在異地端儲存備份檔案與資料; 藉此,透過前述技術手段的展現,可讓本發明在經特殊加解密規則與備份流程基礎下,可允許使用者安全、且長期備份重要資料,而能增加重要資料的維護性、保存性、及安全性,而能改善現有資料備化的不便,同時可強化知識經濟產出,當應用於商產業時,兼具提升經濟效益之效。To this end, the present invention mainly achieves the foregoing objects and effects through the following technical means: it comprises: a local end storage device and encryption and decryption system, which has a control, command, command, management file and data Backup verification, confirmation, authorization, transmission, and mobile communication authentication and communication module, the local storage device and encryption and decryption system has a backup module for performing backup operations of files and data to be backed up, and the local end The storage device and the encryption and decryption system further have a conversion module for performing the capture, combination and conversion actions, capturing, combining and converting the user's characteristic data to become a composite key, so that the conversion module outputs corresponding verification The code, the local storage device and the encryption and decryption system additionally have a calculus encryption and decryption module, wherein the calculus encryption and decryption module can use artificial intelligence calculation, and the generated composite key and the corresponding verification code are used for adding/decrypting to be backed up. The file and data, and the local storage device and encryption and decryption system have a storage action to execute the local raw/backup file. a storage module, and the local storage device and encryption and decryption system has an access module for performing backup file and data access operations; a transmission authentication and mobile communication system having a relatively local storage device The encryption and decryption system and the remote storage device and the encryption and decryption system perform the mobile communication re-confirmation action communication module, and the transmission authentication and mobile communication system further has a function for performing authentication, verification, confirmation, authorization file and data transmission The authentication module, and the transmission authentication and mobile communication system has a transmission module for performing the transmission and reception of the backup file and the data, and the transmission authentication and mobile communication system further has a calculation and decryption module, wherein The calculus encryption and decryption module can use the password and network security calculation technology to re-encrypt the backup files and data sent to the remote end through the local end, and vice versa to decrypt the backup files and data sent to the local end through the remote end; Off-site storage device and encryption and decryption system, which has a control, command, command, management file and data preparation The verification, confirmation, authorization, transmission, and mobile communication authentication and communication module, the remote storage device and encryption and decryption system have a calculus encryption and decryption module, wherein the calculus encryption and decryption module can utilize the password and the network The security calculation technology is used to re-encrypt the backup files and data sent by the transmission authentication and mobile communication system to the remote end, and vice versa to decrypt the backup files and data of the remote location and send them to the transmission authentication and mobile communication system. The storage device and the encryption and decryption system further have an access module for performing the backup file and data access operation, and the remote storage device and the encryption and decryption system have a storage action for performing the backup file and data storage at the remote end. a storage module, the storage module includes a security database for storing backup files and data at different places; Therefore, through the display of the foregoing technical means, the invention can allow the user to safely and long-term backup of important data under the special encryption and decryption rules and the backup process, thereby increasing the maintainability and preservability of the important data. And safety, but can improve the inconvenience of the existing information preparation, and at the same time strengthen the knowledge economy output, when applied to the commercial industry, both have the effect of improving economic efficiency.

為使 貴審查委員能進一步了解本發明的構成、特徵及其他目的,以下乃舉本發明之若干較佳實施例,並配合圖式詳細說明如后,同時讓熟悉該項技術領域者能夠具體實施,惟以下所述者,僅在於說明本發明之較佳實施例,並非用以限制本發明之範圍,故凡有以本發明之精神為基礎,而為本發明任何形式之修飾或變更,皆仍應屬於本發明意圖保護之範疇。The following is a description of the preferred embodiments of the present invention, and is described in detail with reference to the drawings, and the It is to be understood that the following description of the preferred embodiments of the present invention is not intended to limit the scope of the present invention. It should still fall within the scope of the intended protection of the invention.

本發明係一種互動式資料之備份系統,請參閱第一圖所顯示者,其係本發明之系統架構圖,該備份系統包含有一本地端儲存裝置暨加解密系統(10)、一傳輸認證暨行動通訊系統(20)、以及一異地端儲存裝置暨加解密系統(30),至於本發明各系統之詳細構成及作用,則如下所述:其中本地端儲存裝置暨加解密系統(10)用以控制、指揮、命令、管理與整合該系統之各模組,其包含有一認證暨通訊模組(11)、一備份模組(12)、一轉換模組(13)、一演算加解密模組(14)、一儲存模組(15)、及一存取模組(16)。前述認證暨通訊模組(11)用以控制、指揮、命令、管理檔案與資料備份之驗證、確認、授權、傳輸、與行動通訊,該認證暨通訊模組(11)進一步具有一認證模組(111)及一傳輸暨行動通訊模組(112),其中認證模組(111)係用以執行認證、驗證、確認、授權檔案與資料備份之動作,而傳輸暨行動通訊模組(112)則係用以執行備份檔案與資料之傳輸、接收、行動通訊之動作,其中備份檔案與資料之傳輸、接收、行動通訊之方式包含但不僅限於透過紅外線、藍芽【Bluetooth】、網際網路【Internet】、區域網路【LAN】、廣域網路【WAN】、無線網路【Wireless】、wiFi、WiMAX、以及第二代【2G】、第二點五代【2.5G】、第三代【3G】)、第三點五代【3.5G】)、第四代通訊【4G】行動通信所屬之GSM、EDGE、CDMA、TDMA、GPRS、UMTS、CDMA2000、TD-SCDMA、WCDMA、UMTSTDD、HSDPA傳輸協定技術;而本地端儲存裝置暨加解密系統(10)之備份模組(12)則係用以執行欲備份檔案與資料的備份動作。又本地端儲存裝置暨加解密系統(10)之轉換模組(13)係供執行擷取、組合與轉換動作,擷取、組合與轉換使用者之特徵資料【包含但不僅限於帳號、憑證、密碼、欲備份檔案與資料之名稱與內容、時間戳記(time stamp)與個人生物特徵】,使其成為一複合鑰【Compound Key】,並產出相應之驗證碼。再者本地端儲存裝置暨加解密系統(10)之演算加解密模組(14)則利用人工智慧(AI)演算,搭配生成之複合鑰【Compound Key】與相應之驗證碼,用以加/解密欲備份之檔案與資料。至於本地端儲存裝置暨加解密系統(10)之儲存模組(15)則係用以執行本地端原始/備份檔案的儲存動作。且該本地端儲存裝置暨加解密系統(10)之存取模組(16)用以執行備份檔案與資料之存取【送出與取回】動作。The present invention is a backup system for interactive data. Please refer to the figure shown in the first figure, which is a system architecture diagram of the present invention. The backup system includes a local storage device and encryption and decryption system (10), and a transmission authentication and cum. The mobile communication system (20), and an off-site storage device and encryption and decryption system (30), as for the detailed composition and function of each system of the present invention, are as follows: wherein the local storage device and encryption and decryption system (10) The modules for controlling, directing, commanding, managing and integrating the system include a certification and communication module (11), a backup module (12), a conversion module (13), and a calculation and decryption module. A group (14), a storage module (15), and an access module (16). The aforementioned authentication and communication module (11) is used for controlling, directing, commanding, managing, verifying, authenticating, transmitting, and communicating with the file and data backup. The authentication and communication module (11) further has an authentication module. (111) and a transmission and mobile communication module (112), wherein the authentication module (111) is used to perform authentication, verification, confirmation, authorization file and data backup operations, and the transmission and communication communication module (112) It is used to perform the functions of transmission, reception, and mobile communication of backup files and data. The methods for transmission, reception, and mobile communication of backup files and data include but are not limited to infrared, Bluetooth, and Internet. Internet], regional network [LAN], wide area network [WAN], wireless network [Wireless], wiFi, WiMAX, and second generation [2G], second and fifth generation [2.5G], third generation [3G] 】), the third and fifth generation [3.5G]), the fourth generation communication [4G] mobile communication belongs to the GSM, EDGE, CDMA, TDMA, GPRS, UMTS, CDMA2000, TD-SCDMA, WCDMA, UMTSTDD, HSDPA transmission agreement Technology; local end storage The backup module (12) of the storage device and encryption and decryption system (10) is used to perform backup operations of files and data to be backed up. The conversion module (13) of the local storage device and the encryption and decryption system (10) is for performing the operations of capturing, combining and converting, and extracting, combining and converting the user's characteristic data [including but not limited to the account number, the voucher, The password, the name and content of the file and data to be backed up, the time stamp and the personal biometrics, make it a composite key and produce the corresponding verification code. Furthermore, the calculus encryption and decryption module (14) of the local storage device and encryption and decryption system (10) uses artificial intelligence (AI) calculus, and the generated composite key [Compound Key] and the corresponding verification code are used to add / Decrypt the files and materials to be backed up. The storage module (15) of the local storage device and encryption and decryption system (10) is used to perform the storage operation of the local raw/backup file. The access module (16) of the local storage device and the encryption and decryption system (10) is configured to perform an access (send and retrieve) operation of the backup file and the data.

至於前述之傳輸認證暨行動通訊系統(20)係用以控制、指揮、命令、管理與整合該系統之各模組,該傳輸認證暨行動通訊系統(20)包含有一行動通訊模組(21)、一認證模組(22)、一傳輸模組(23)、及一演算加解密模組(24)。其中行動通訊模組(21)可相對本地端儲存裝置暨加解密系統(10)與異地端儲存裝置暨加解密系統(30)執行行動通訊再確認之動作。而該傳輸認證暨行動通訊系統(20)之認證模組(22)用以執行認證、驗證、確認、授權檔案與資料傳輸之動作。至於傳輸認證暨行動通訊系統(20)之傳輸模組(23)用於執行備份檔案與資料之傳輸與接收動作。且該傳輸認證暨行動通訊系統(20)之演算加解密模組(24)可利用密碼與網路安全演算技術【Cryptography and Network Security】,用以再加密經本地端送往異地端之備份檔案與資料,反之用以解密經異地端送往本地端之備份檔案與資料,其中密碼與網路安全演算技術有很多種,例如可以使用PKI【Public Key Infrastructure】1024bit長度之公私鑰加/解密技術。As for the aforementioned transmission authentication and mobile communication system (20) for controlling, directing, commanding, managing and integrating the modules of the system, the transmission authentication and mobile communication system (20) comprises a mobile communication module (21) , an authentication module (22), a transmission module (23), and a calculation encryption and decryption module (24). The mobile communication module (21) can perform the action communication re-confirmation action with respect to the local storage device and encryption and decryption system (10) and the remote storage device and encryption and decryption system (30). The authentication module (22) of the transmission authentication and mobile communication system (20) is used to perform authentication, verification, confirmation, authorization file and data transmission. As for the transmission authentication and mobile communication system (20), the transmission module (23) is used to perform the transmission and reception of backup files and data. And the calculus encryption and decryption module (24) of the transmission authentication and mobile communication system (20) can use the password and network security calculation technology [Cryptography and Network Security] to re-encrypt the backup file sent to the remote terminal through the local end. And the data, on the other hand, is used to decrypt the backup files and data sent to the local end by different places. There are many kinds of password and network security calculation techniques. For example, PKI [Public Key Infrastructure] 1024-bit length public-private key encryption/decryption technology can be used. .

又該異地端儲存裝置暨加解密系統(30)係用以控制、指揮、命令、管理與整合該系統之各模組,其包含有一認證暨通訊模組(31)、一演算加解密模組(32)、一存取模組(33)、及一儲存模組(34)。其中認證暨通訊模組(31)可用於控制、指揮、命令、管理檔案與資料備份之驗證、確認、授權、傳輸、與行動通訊,該認證暨通訊模組(31)具有一認證模組(311)與一傳輸暨行動通訊模組(312),其中認證模組(311)用以執行認證、驗證、確認、授權備份檔案與資料存取之動作;而傳輸暨行動通訊模組(312)則用於執行備份檔案與資料之傳輸、接收、行動通訊之動作,其中備份檔案與資料之傳輸、接收、行動通訊之方式,包含但不僅限於透過紅外線、藍芽【Bluetooth】、網際網路【Internet】、區域網路【LAN】、廣域網路【WAN】、無線網路【Wireless】、WiFi、WiMAX、以及第二代【2G】、第二點五代【2.5G】、第三代【3G】)、第三點五代【3.5G】)、第四代通訊【4G】行動通信所屬之GSM、EDGE、CDMA、TDMA、GPRS、UMTS、CDMA2000、TD-SCDMA、WCDMA、UMTSTDD、HSDPA傳輸協定技術;而前述異地端儲存裝置暨加解密系統(30)之演算加解密模組(32)係利用密碼與網路安全演算技術【Cryptography and Network Security】,用以再加密經傳輸認證暨行動通訊系統(20)送來異地端之備份檔案與資料,反之用以解密異地端之備份檔案與資料並送往傳輸認證暨行動通訊系統(20),其中密碼與網路安全演算技術有很多種,例如可以使用PKI【Public Key Infrastructure】1024bit長度之公私鑰加/解密技術。又該異地端儲存裝置暨加解密系統(30)之存取模組(33)可用於執行備份檔案與資料之存取【送出與取回】動作。至於異地端儲存裝置暨加解密系統(30)之儲存模組(34)用以執行異地端備份檔案與資料之儲存動作,該儲存模組(34)包含有一安全資料庫【Secured Database】(341),用以供在異地端儲存備份檔案與資料。The off-site storage device and encryption and decryption system (30) is used for controlling, directing, commanding, managing and integrating the modules of the system, and comprises a certification and communication module (31) and a calculation and decryption module. (32), an access module (33), and a storage module (34). The authentication and communication module (31) can be used for control, command, command, management file and data backup verification, confirmation, authorization, transmission, and mobile communication, and the authentication and communication module (31) has an authentication module ( 311) and a transmission and communication communication module (312), wherein the authentication module (311) is used to perform authentication, verification, confirmation, authorization of backup file and data access operations; and transmission and communication communication module (312) It is used to perform the functions of transmission, reception, and mobile communication of backup files and data. The way to back up files and data transmission, reception, and mobile communication includes, but is not limited to, infrared, Bluetooth, and Internet. Internet], regional network [LAN], wide area network [WAN], wireless network [Wireless], WiFi, WiMAX, and second generation [2G], second five generations [2.5G], third generation [3G 】), the third and fifth generation [3.5G]), the fourth generation communication [4G] mobile communication belongs to the GSM, EDGE, CDMA, TDMA, GPRS, UMTS, CDMA2000, TD-SCDMA, WCDMA, UMTSTDD, HSDPA transmission agreement Technology; The calculus encryption and decryption module (32) of the storage device and encryption and decryption system (30) uses Cryptography and Network Security to re-encrypt the transmission authentication and mobile communication system (20). Backup files and data from different locations, and vice versa to decrypt backup files and data from different locations and send them to the transmission authentication and mobile communication system (20). There are many kinds of password and network security algorithms, such as PKI [Public] Key Infrastructure] 1024-bit length public-private key encryption/decryption technology. The access module (33) of the remote storage device and encryption and decryption system (30) can be used to perform the operation of sending and sending back files and data. The storage module (34) of the remote storage device and the encryption and decryption system (30) is configured to perform the storage operation of the remote backup file and the data, and the storage module (34) includes a secure database [Secured Database] (341) ) for storing backup files and data on different locations.

藉此,組構成一維護性佳、且安全性高的互動式資料之備份系統及方法者。In this way, the group constitutes a backup system and method for interactive data with good maintenance and high security.

而關於本發明資料備份系統的備份方法,則可由下列之儲存備份檔案與取回備份檔案的實施例,做進一步的了解;For the backup method of the data backup system of the present invention, the following embodiments for storing the backup file and retrieving the backup file can be further understood;

實施例1儲存備份檔案:Embodiment 1 stores a backup file: 【請同時參照第一、二圖所示】[Please refer to the first and second figures at the same time]

1、開始1, start

2、使用者與系統接觸2, the user is in contact with the system

3、登入本地端系統首先進行本地端系統認證,經認證暨通訊模組(11)之認證模組(111)執行本地端系統操作之認證、驗證、確認、授權動作。3. Login to the local end system First, the local end system authentication is performed, and the authentication module (111) of the authentication and communication module (11) performs authentication, verification, confirmation, and authorization actions of the local end system operation.

4、本地端檔案加密【本地端儲存裝置暨加解密系統(10)】4.1先選取欲備份的檔案與資料;4.2並以備份模組(12)先生成備份檔案;4.3接著系統生成複合鑰【Compound Key】:其係根據使用者輸入之特徵資料【包含但不僅限於帳號、憑證、密碼、欲備份檔案與資料之名稱與內容、時間戳記(time stamp)與個人生物特徵】,利用轉換模組(13),系統自動擷取、組合、並轉換生成一複合鑰【Compound Key】,同時生成相應之驗證碼,供日後解密之用;4.4將欲備份檔案與資料加密:以演算加解密模組(14)利用所生成的複合鑰【Compound Key】,將欲備份檔案與資料加密,隨即完成備份檔案與資料的加密;4.5以儲存模組(15),先儲存該加密之備份檔案與資料於本地端。4, local file encryption [local storage device and encryption and decryption system (10)] 4.1 first select the files and data to be backed up; 4.2 and backup module (12) into a backup file; 4.3 then the system generates a composite key [ Compound Key]: Based on the characteristics of the user input [including but not limited to account number, credentials, password, name and content of the file and data to be backed up, time stamp and personal biometrics], using the conversion module (13), the system automatically captures, combines, and converts to generate a composite key [Compound Key], and generates a corresponding verification code for later decryption; 4.4 will want to backup files and data encryption: to calculate encryption and decryption module (14) Using the generated composite key [Compound Key], encrypt the file and data to be backed up, and then complete the encryption of the backup file and data; 4.5 using the storage module (15), first storing the encrypted backup file and data. Local side.

5、異地端備份檔案儲存之請求與身分認證【異地端儲存裝置暨加解密系統(30)】5.1先選取欲送往異地儲存之備份檔案與資料;5.2接著進行異地端認證:向異地端送出備份檔案儲存之請求,並輸入異地端系統【如:業者】所需之個人認證資料【包含但不僅限於帳號、憑證、密碼、備份檔案與資料之名稱與內容描述、與個人生物特徵】,經異地端認證暨通訊模組(31)之認證模組(311)執行認證、驗證、確認、授權動作。5, remote location backup file storage request and identity authentication [off-site storage device and encryption and decryption system (30)] 5.1 first select the backup files and data to be sent to off-site storage; 5.2 then carry out remote authentication: send to the remote end Back up the file storage request and input the personal authentication data required by the remote system [such as: the operator] [including but not limited to the account name, voucher, password, backup file and data name and content description, and personal biometrics] The authentication module (311) of the remote authentication and communication module (31) performs authentication, verification, confirmation, and authorization actions.

6、傳輸認證暨行動通訊系統6.1啟動傳輸認證暨行動通訊系統(20):通過異地端認證後,隨即啟動傳輸認證暨行動通訊系統(20);6.2進行行動通訊再確認:依傳輸暨行動通訊模組(312)、行動通訊模組(21)、傳輸暨行動通訊模組(112),向本地端【如:使用者】發出行動通訊再確認之需求,並執行行動通訊再確認之動作;6.3接著進行認證模組:經認證模組(22)執行認證、驗證、確認、授權動作,完成行動通訊再確認之動作;6.4依行動通訊模組(21)回覆資訊給異地端儲存裝置暨加解密系統,接受異地儲存備份檔案與資料之請求。6. Transmission authentication and mobile communication system 6.1 Start transmission authentication and mobile communication system (20): After passing the remote authentication, the transmission authentication and mobile communication system will be started (20); 6.2 Mobile communication reconfirmation: According to the transmission and mobile communication The module (312), the mobile communication module (21), and the transmission and communication communication module (112) send a request for re-confirmation of the mobile communication to the local end [eg, the user], and perform the action of re-confirming the mobile communication; 6.3 Next, the authentication module: the authentication module (22) performs authentication, verification, confirmation, authorization actions, and completes the action communication reconfirmation action; 6.4 responds to the information processing module (21) to the remote storage device and adds The decryption system accepts requests to store backup files and materials offsite.

7、將備份檔案送往異地端儲存7.1啟動本地端存取模組(16)、本地端傳輸暨行動通訊模組(112)、傳輸模組(23)、異地端傳輸暨行動通訊模組(312)、與異地端存取模組(33),開始將備份檔案送往異地端儲存;7.2先經傳輸認證暨行動通訊系統(20)-演算加解密模組(24):依傳輸暨行動通訊模組(112)與傳輸模組(23)將本地端之備份檔案與資料送往異地端,過程中並以演算加解密模組(24)之密碼與網路安全演算技術【Cryptography and Network Security】,將本地端送往異地端之備份檔案與資料再次加密,其中密碼與網路安全演算技術有很多種,例如可以使用PKI【Public Key Infrastructure】1024bit長度之公私鑰加/解密技術;7.3再經異地端儲存裝置暨加解密系統(30)之演算加解密模組(32):依異地端傳輸暨行動通訊模組(312)接收送來異地端之備份檔案與資料,過程中並以演算加解密模組(32)之密碼與網路安全演算技術【Cryptography and Network Security】,再加密異地端所接收之經傳輸認證暨行動通訊系統(20)送來之備份檔案與資料,其中密碼與網路安全演算技術有很多種,例如可以使用PKI【Public Key Infrastructure】1024bit長度之公私鑰加/解密技術;7.4完成異地端儲存動作:將經過本地端儲存裝置暨加解密系統(10)加密、傳輸認證暨行動通訊系統(20)加密、以及異地端儲存裝置暨加解密系統(30)三重加密之備份檔案與資料,經異地端存取模組(33)與儲存模組(34),儲存於異地端安全資料庫【Secured Database】(341)內,完成檔案備份的動作。7. Send the backup file to the remote storage 7.1 Start the local access module (16), the local transmission and mobile communication module (112), the transmission module (23), the remote transmission and mobile communication module ( 312), with the remote access module (33), start to send the backup file to the off-site storage; 7.2 first transmission authentication and mobile communication system (20) - calculus encryption and decryption module (24): according to transmission and action The communication module (112) and the transmission module (23) send the backup files and data of the local end to the remote end, and the password and network security calculation technology of the encryption and decryption module (24) are used in the process [Cryptography and Network Security], the local end is sent to the remote backup file and data encryption again, there are many kinds of password and network security algorithm, such as PKI [Public Key Infrastructure] 1024bit length public and private key encryption / decryption technology; 7.3 The calculus encryption and decryption module (32) of the remote storage device and encryption and decryption system (30): the remote local transmission and mobile communication module (312) receives the backup file and data sent from the remote location, and The encryption and decryption module (32) is dense Code and network security algorithm [Cryptography and Network Security], and then encrypt the backup files and data sent by the transmission authentication and mobile communication system (20) received by the remote end. There are many kinds of password and network security algorithm. For example, PKI [Public Key Infrastructure] 1024-bit length public-private key encryption/decryption technology can be used; 7.4 complete off-site storage action: encryption, transmission authentication and mobile communication system (20) will be passed through the local storage device and encryption and decryption system (10). Encryption, and off-site storage device and encryption and decryption system (30) triple-encrypted backup files and data, stored in the remote security database via the remote access module (33) and storage module (34) [Secured] Database] (341), complete the file backup action.

8、登出系統8, logout system

9、結束9, the end

實施例2 取回備份檔案:Embodiment 2 Retrieving a backup file: 【請同時參照第一、三圖所示】[Please refer to the first and third figures at the same time]

1、開始1, start

2、使用者與系統接觸2, the user is in contact with the system

3、登入本地端系統本地端系統認證:經認證暨通訊模組(11)之認證模組(111)執行本地端系統操作之認證、驗證、確認、授權動作。3. Login to the local end system Local end system authentication: The authentication module (111) of the authentication and communication module (11) performs authentication, verification, confirmation, and authorization actions of the local end system operation.

4、異地端備份檔案取回之請求與身分認證【異地端儲存裝置暨加解密系統(30)】4.1先於異地端認證:向異地端送出備份檔案取回之請求,並輸入異地端系統【如:業者】所需之個人認證資料【包含但不僅限於帳號、憑證、密碼、備份檔案與資料之名稱與內容描述、時間戳記(time stamp)與個人生物特徵】,經異地端認證暨通訊模組(31)之認證模組(311)執行認證、驗證、確認、授權動作;4.2選取欲由異地取回之備份檔案與資料。4, remote location backup file retrieval request and identity authentication [off-site storage device and encryption and decryption system (30)] 4.1 prior to remote authentication: send a backup file retrieval request to the remote location, and enter the remote system [ Such as: the industry] required personal authentication data [including but not limited to account, credentials, passwords, backup file and data name and content description, time stamp (time stamp) and personal biometrics], through the remote authentication and communication model The authentication module (311) of the group (31) performs authentication, verification, confirmation, and authorization actions; 4.2 selects backup files and materials to be retrieved from different places.

5、傳輸認證暨行動通訊系統5.1啟動傳輸認證暨行動通訊系統(20):通過異地端認證後,隨即啟動傳輸認證暨行動通訊系統(20);5.2進行行動通訊再確認:依傳輸暨行動通訊模組(312)、行動通訊模組(21)、傳輸暨行動通訊模組(112),向本地端【如:使用者】發出行動通訊再確認之需求,並執行行動通訊再確認之動作;5.3執行認證:經認證模組(22)執行認證、驗證、確認、授權動作,完成行動通訊再確認之動作;5.4依行動通訊模組(21)回覆資訊給異地端儲存裝置暨加解密系統(30),接受取回儲存備份檔案與資料之請求。5. Transmission authentication and mobile communication system 5.1 Start transmission authentication and mobile communication system (20): After passing the remote authentication, the transmission authentication and mobile communication system will be started (20); 5.2 Mobile communication reconfirmation: According to the transmission and mobile communication The module (312), the mobile communication module (21), and the transmission and communication communication module (112) send a request for re-confirmation of the mobile communication to the local end [eg, the user], and perform the action of re-confirming the mobile communication; 5.3 Execution of certification: The authentication module (22) performs authentication, verification, confirmation, authorization actions, and completes the action of re-confirming the action communication; 5.4 responding to the information storage module and encryption and decryption system according to the mobile communication module (21) 30), accept the request to retrieve the backup file and data.

6、取回儲存於異地端之備份檔案6.1啟動異地端存取模組(31)、異地端傳輸暨行動通訊模組(312)、傳輸模組(23)、本地端傳輸暨行動通訊模組(112)、與本地端存取模組(16),開始將異地端備份檔案取回本地端儲存;6.2先經異地端儲存裝置暨加解密系統(30)之演算加解密模組(32):先依演算加解密模組(32)之密碼與網路安全演算技術【Cryptography and Network Security】,解密日前經異地端演算加解密模組(32)加密且儲存於異地端之備份檔案與資料,再依異地端傳輸暨行動通訊模組(312)傳輸欲取回之備份檔案與資料,送往傳輸模組(23),其中密碼與網路安全演算技術有很多種,例如可以使用PKI【Public Key Infrastructure】1024bit長度之公私鑰加/解密技術;6.3再經傳輸認證暨行動通訊系統(20)-演算加解密模組(24):再依演算加解密模組(24)之密碼與網路安全演算技術【Cryptography and Network Security】,將異地端送往本地端之備份檔案與資料再次解密【即解密日前備份過程中,經傳輸認證暨行動通訊系統(20)-演算加解密模組(24)再加密之備份檔案與資料】,並依傳輸模組(23)與本地端傳輸暨行動通訊模組(112)接收送來本地端之備份檔案與資料,其中密碼與網路安全演算技術有很多種,例如可以使用PKI【Public Key Infrastructure】1024bit長度之公私鑰加/解密技術;6.4順利自異地端取回備份檔案與資料。6. Retrieve the backup file stored in the remote location. 6.1 Start the remote access module (31), the remote transmission and mobile communication module (312), the transmission module (23), the local transmission and mobile communication module. (112), and the local end access module (16), start to retrieve the offsite backup file back to the local end storage; 6.2 first through the remote storage device and encryption and decryption system (30) calculus encryption and decryption module (32) : Firstly, according to the cryptographic and decryption module (32) password and network security calculation technology [Cryptography and Network Security], decrypt the backup files and data that were encrypted by the remote calculus encryption and decryption module (32) and stored in different places. The remote transmission and mobile communication module (312) transmits the backup file and data to be retrieved, and sends it to the transmission module (23). There are many kinds of password and network security calculation techniques, for example, PKI can be used. Public Key Infrastructure] 1024-bit length public-private key encryption/decryption technology; 6.3 re-transmission authentication and mobile communication system (20)-calculation encryption and decryption module (24): password and network based on calculus encryption and decryption module (24) Road safety calculation technology [Cryptography and Netwo Rk Security], the backup file and data sent to the local end are decrypted again [that is, the backup file is decrypted during the backup process, and the backup file is encrypted by the transmission authentication and mobile communication system (20)-calculation encryption and decryption module (24). And the data], and according to the transmission module (23) and the local transmission and mobile communication module (112) receive the backup file and data sent to the local end, wherein there are many kinds of password and network security calculation techniques, for example, can be used PKI [Public Key Infrastructure] 1024-bit length public-private key encryption/decryption technology; 6.4 smoothly retrieve the backup files and data from different locations.

7、本地端檔案解密【本地端儲存裝置暨加解密系統(10)】7.1取回之備份檔案與資料解密:利用日前生成的複合鑰【Compound Key】與相應之驗證碼,以演算加解密模組(14)將取回之備份檔案與資料解密,隨即完成備份檔案與資料的解密;7.2完成取回異地端備份檔案與資料動作:將經過異地端儲存裝置暨加解密系統(30)解密、傳輸認證暨行動通訊系統(20)解密、以及本地端儲存裝置暨加解密系統(10)三重解密之備份檔案與資料,取回並經本地端存取模組(16)與儲存模組(15)儲存於本地端,完成備份檔案與資料的動作。7, local file decryption [local storage device and encryption and decryption system (10)] 7.1 retrieved backup files and data decryption: use the composite key [Compound Key] generated recently and the corresponding verification code to calculate the encryption and decryption mode The group (14) decrypts the retrieved backup files and data, and then decrypts the backup files and data; 7.2 completes the retrieval of the remote backup files and data actions: decrypts the remote storage device and encryption and decryption system (30). Transmission authentication and mobile communication system (20) decryption, and local storage device and encryption and decryption system (10) triple decryption backup files and data, retrieved and accessed via local access module (16) and storage module (15) ) Stored on the local side to complete the action of backing up files and data.

8、登出系統8, logout system

9、結束9, the end

透過前述的說明,在本互動式資料備份系統的運作流程下,其中本地端儲存裝置暨加解密系統(10)其主要功能為備份與加解密檔案與資料以防止異地端的系統業者竊取並開啟備份之檔案資料;而傳輸認證暨行動通訊系統(20)主要功能為認證、驗證、確認、授權、與加解密備份檔案與資料的傳輸與存取,並以行動通訊再確認機制,同時防止第三者與異地端的系統業者竊取並開啟備份之檔案資料;再者異地端儲存裝置暨加解密系統(30)主要功能為儲存、保存、及加解密已備份之檔案與資料以防止第三者【非該備份檔案與資料之使用者與業者】竊取並開啟備份之檔案資料;同時本發明所屬之三大系統皆有其特殊演算加解密模組,彼此皆可獨立運作互不干擾,當使用者欲備份檔案與資料時,透過本地端儲存裝置暨加解密系統(10),完成個人重要檔案與資料的加密備份動作,隨即經傳輸認證暨行動通訊系統(20)之認證、驗證、確認、授權與再加密後送往異地端,並經異地端儲存裝置暨加解密系統(30)再加密並儲存;當使用者欲取回備份之檔案與資料時,先由傳輸認證暨行動通訊系統(20)認證、驗證、確認、授權後,經異地端儲存裝置暨加解密系統(30)解密並送往傳輸認證暨行動通訊系統(20),經傳輸認證暨行動通訊系統(20)解密後,隨即送回本地端,經本地端儲存裝置暨加解密系統(10)解密之後,完成備份檔案與資料的取回動作。由於本發明著重於重要檔案與資料的備份系統與方法,在本發明的特殊加解密規則與備份流程基礎下,可允許使用者安全、且長期備份重要檔案與資料,並增加重要資料的維護性、保存性、及安全性,改善個人重要資料使用經驗,同時強化知識經濟產出,具有價值利益功效。Through the foregoing description, in the operation process of the interactive data backup system, the local storage device and encryption and decryption system (10) mainly functions to backup and encrypt and decrypt files and data to prevent the remote system vendors from stealing and opening backups. The file information; and the main functions of the transmission authentication and mobile communication system (20) are the authentication, verification, confirmation, authorization, encryption and decryption of backup files and data transmission and access, and the mobile communication re-confirmation mechanism, while preventing the third And the system operators in different places steal and open the backup file data; in addition, the remote storage device and encryption and decryption system (30) main function is to store, save, and encrypt and decrypt the backed up files and data to prevent third parties. The user and the operator of the backup file and data] steal and open the backup file data; at the same time, the three systems belonging to the present invention all have their own special algorithm encryption and decryption modules, and each of them can operate independently without interference, when the user wants When backing up files and data, encrypt the important files and data of the person through the local storage device and encryption and decryption system (10). The backup action is then sent to the remote end by the authentication, verification, confirmation, authorization and re-encryption of the transmission authentication and mobile communication system (20), and then encrypted and stored by the remote storage device and encryption and decryption system (30); When the user wants to retrieve the backup file and data, it is first authenticated, verified, confirmed and authorized by the transmission authentication and mobile communication system (20), and then decrypted and sent to the transmission authentication by the remote storage device and encryption and decryption system (30). The cum mobile communication system (20) is decrypted by the transmission authentication and mobile communication system (20), and then sent back to the local end, and after decryption by the local storage device and encryption and decryption system (10), the backup file and data retrieval are completed. action. Since the present invention focuses on backup systems and methods for important files and materials, under the special encryption and decryption rules and backup processes of the present invention, the user can be allowed to safely and long-termly back up important files and materials, and increase the maintenance of important data. , preservative, and safety, improve the use of important personal data, and strengthen the knowledge of economic output, with value benefits.

綜上所述,本發明具有上述眾多的實用價值,因此本發明確實為一新穎進步的創作,在相同的技術領域中未見相同或近似的產品公開使用,故本發明已符合發明專利的要件,乃依法提出申請,祈請早日賜准本案發明專利。In summary, the present invention has many of the above-mentioned practical values, and thus the present invention is indeed a novel and progressive creation, and the same or similar products are not disclosed in the same technical field, so the present invention has met the requirements of the invention patent. Is to apply in accordance with the law, pray for the early grant of the invention patent in this case.

(10)...本地端儲存裝置暨加解密系統(10). . . Local storage device and encryption and decryption system

(11)...認證暨通訊模組(11). . . Certification and communication module

(111)...認證模組(111). . . Authentication module

(112)...傳輸暨行動通訊模組(112). . . Transmission and mobile communication module

(12)...備份模組(12). . . Backup module

(13)...轉換模組(13). . . Conversion module

(14)...演算加解密模組(14). . . Calculus encryption and decryption module

(15)...儲存模組(15). . . Storage module

(16)...存取模組(16). . . Access module

(20)...傳輸認證暨行動通訊系統(20). . . Transmission authentication and mobile communication system

(21)...行動通訊模組(twenty one). . . Mobile communication module

(22)...認證模組(twenty two). . . Authentication module

(23)...傳輸模組(twenty three). . . Transmission module

(24)...演算加解密模組(twenty four). . . Calculus encryption and decryption module

(30)...異地端儲存裝置暨加解密系統(30). . . Off-site storage device and encryption and decryption system

(31)...認證暨通訊模組(31). . . Certification and communication module

(311)...認證模組(311). . . Authentication module

(312)...傳輸暨行動通訊膜組(312). . . Transmission and mobile communication film group

(32)...演算加解密模組(32). . . Calculus encryption and decryption module

(33)...存取模組(33). . . Access module

(34)...儲存模組(34). . . Storage module

(341)...安全資料庫(341). . . Safety database

第一圖:係本發明互動式資料備份系統之系統架構示意圖。The first figure is a schematic diagram of the system architecture of the interactive data backup system of the present invention.

第二圖:係本發明互動式資料備份系統之儲存備份資料的流程方塊示意圖。The second figure is a block diagram showing the process of storing backup data of the interactive data backup system of the present invention.

第三圖:係本發明互動式資料備份系統之取回備份資料的流程方塊示意圖。The third figure is a block diagram of the process of retrieving backup data of the interactive data backup system of the present invention.

(10)...本地端儲存裝置暨加解密系統(10). . . Local storage device and encryption and decryption system

(11)...認證暨通訊模組(11). . . Certification and communication module

(111)...認證模組(111). . . Authentication module

(112)...傳輸暨行動通訊模組(112). . . Transmission and mobile communication module

(12)...備份模組(12). . . Backup module

(13)...轉換模組(13). . . Conversion module

(14)...演算加解密模組(14). . . Calculus encryption and decryption module

(15)...儲存模組(15). . . Storage module

(16)...存取模組(16). . . Access module

(20)...傳輸認證暨行動通訊系統(20). . . Transmission authentication and mobile communication system

(21)...行動通訊模組(twenty one). . . Mobile communication module

(22)...認證模組(twenty two). . . Authentication module

(23)...傳輸模組(twenty three). . . Transmission module

(24)...演算加解密模組(twenty four). . . Calculus encryption and decryption module

(30)...異地端儲存裝置暨加解密系統(30). . . Off-site storage device and encryption and decryption system

(31)...認證暨通訊模組(31). . . Certification and communication module

(311)...認證模組(311). . . Authentication module

(312)...傳輸暨行動通訊模組(312). . . Transmission and mobile communication module

(32)...演算加解密模組(32). . . Calculus encryption and decryption module

(33)...存取模組(33). . . Access module

(34)...儲存模組(34). . . Storage module

(341)...安全資料庫(341). . . Safety database

Claims (8)

一種互動式資料備份系統,其包含有:一本地端儲存裝置暨加解密系統,其具有一供控制、指揮、命令、管理檔案與資料備份之驗證、確認、授權、傳輸、與行動通訊的認證暨通訊模組,該本地端儲存裝置暨加解密系統並具有一供執行欲備份檔案與資料的備份動作之備份模組,且本地端儲存裝置暨加解密系統進一步具有一供執行擷取、組合與轉換動作、擷取、組合與轉換使用者的特徵資料使其成為一複合鑰之轉換模組,令轉換模組產出相應之驗證碼,又本地端儲存裝置暨加解密系統另具有一演算加解密模組,其中演算加解密模組可利用人工智慧演算,搭配生成之複合鑰與相應之驗證碼,用以加/解密欲備份之檔案與資料,再者本地端儲存裝置暨加解密系統更具有一執行本地端原始/備份檔案之儲存動作的儲存模組,且本地端儲存裝置暨加解密系統並具有一供執行備份檔案與資料之存取動作之存取模組;一傳輸認證暨行動通訊系統,其具有一可相對本地端儲存裝置暨加解密系統與異地端儲存裝置暨加解密系統執行行動通訊再確認動作的行動通訊模組,又該傳輸認證暨行動通訊系統另具有一用以執行認證、驗證、確認、授權檔案與資料傳輸動作的認證模組,且傳輸認證暨行動通訊系統並具有一供執行備份檔案與資料之傳輸與接收動作之傳輸模組,再 者該傳輸認證暨行動通訊系統進一步具有一演算加解密模組,其中演算加解密模組可利用密碼與網路安全演算技術,用以再加密經本地端送往異地端之備份檔案與資料,反之用以解密經異地端送往本地端之備份檔案與資料;一異地端儲存裝置暨加解密系統,其具有一供控制、指揮、命令、管理檔案與資料備份之驗證、確認、授權、傳輸、與行動通訊的認證暨通訊模組,該異地端儲存裝置暨加解密系統並具有一演算加解密模組,其中演算加解密模組可利用密碼與網路安全演算技術,用以再加密經傳輸認證暨行動通訊系統送來異地端之備份檔案與資料,反之用以解密異地端之備份檔案與資料並送往傳輸認證暨行動通訊系統,又該異地端儲存裝置暨加解密系統另具有一供執行備份檔案與資料之存取動作之存取模組,再者異地端儲存裝置暨加解密系統並具有一供執行異地端備份檔案與資料之儲存動作的儲存模組,該儲存模組包含有一安全資料庫,用以供在異地端儲存備份檔案與資料;藉此,組構成一維護性佳、且安全性高的互動式資料之備份系統者。 An interactive data backup system comprising: a local storage device and an encryption and decryption system, which has a verification, confirmation, authorization, transmission, and mobile communication authentication for control, command, command, management file and data backup The communication module, the local storage device and the encryption and decryption system have a backup module for performing backup operations of backing up files and data, and the local storage device and encryption and decryption system further has a system for performing extraction and combination. Converting, capturing, combining and converting the user's characteristic data into a composite key conversion module, so that the conversion module outputs a corresponding verification code, and the local storage device and the encryption and decryption system have another calculation The encryption and decryption module, wherein the calculus encryption and decryption module can use the artificial intelligence calculation, the generated composite key and the corresponding verification code, for adding/decrypting the file and data to be backed up, and then the local storage device and encryption and decryption system. The utility model further has a storage module for performing a storage operation of the local original/backup file, and the local storage device and the encryption and decryption system are There is an access module for performing backup file and data access operations; a transmission authentication and mobile communication system having a local communication device and encryption and decryption system and an off-site storage device and encryption and decryption system for performing mobile communication The mobile communication module for reconfirming the action, the transmission authentication and mobile communication system further has an authentication module for performing authentication, verification, confirmation, authorization file and data transmission actions, and the transmission authentication and mobile communication system has one a transmission module for performing the transmission and reception of backup files and data, and then The transmission authentication and mobile communication system further has a calculus encryption and decryption module, wherein the calculus encryption and decryption module can use the password and network security calculation technology to re-encrypt the backup files and materials sent to the remote end through the local end. Conversely, it is used to decrypt the backup files and data sent to the local end through the remote end; a remote storage device and encryption and decryption system, which has a verification, confirmation, authorization, and transmission for control, command, command, management file and data backup. And the mobile communication authentication and communication module, the remote storage device and the encryption and decryption system have a calculus encryption and decryption module, wherein the calculus encryption and decryption module can use the password and network security calculation technology to re-encrypt the The transmission authentication and mobile communication system sends backup files and data from different places, and vice versa to decrypt the backup files and data from different places and send them to the transmission authentication and mobile communication system. The remote storage device and encryption and decryption system also has one An access module for performing backup file and data access operations, and an off-site storage device and encryption and decryption system a storage module for performing an off-site backup file and data storage operation, the storage module includes a security database for storing backup files and data at different places; thereby, the group constitutes a good maintenance and A highly secure backup system for interactive data. 如申請專利範圍第1項所述之互動式資料備份系統,其中,該本地端儲存裝置暨加解密系統之認證暨通訊模組包含有一認證模組及一傳輸暨行動通訊模組,其中認證模組係用以執行認證、驗證、確認、 授權檔案與資料備份之動作,而傳輸暨行動通訊模組則係用以執行備份檔案與資料之傳輸、接收、行動通訊之動作。 The interactive data backup system of claim 1, wherein the authentication and communication module of the local storage device and the encryption and decryption system comprises an authentication module and a transmission and communication communication module, wherein the authentication mode Groups are used to perform certification, verification, validation, The operation of authorizing files and data backup, and the transmission and mobile communication module is used to perform the operations of transferring, receiving, and communicating mobile files and data. 如申請專利範圍第2項所述之互動式資料備份系統,其中,備份檔案與資料之傳輸、接收、行動通訊之方式係選自紅外線、藍芽【Bluetooth】、網際網路【Internet】、區域網路【LAN】、廣域網路【WAN】、無線網路【Wireless】、WiFi、WiMAX、以及第二代【2G】、第二點五代【2.5G】、第三代【3G】)、第三點五代【3.5G】)、第四代通訊【4G】行動通信所屬之GSM、EDGE、CDMA、TDMA、GPRS、UMTS、CDMA2000、TD-SCDMA、WCDMA、UMTSTDD、HSDPA傳輸協定技術。 For example, the interactive data backup system described in claim 2, wherein the method for transmitting, receiving, and communicating the backup file and the data is selected from the group consisting of infrared, Bluetooth, Internet, and area. Network [LAN], wide area network [WAN], wireless network [Wireless], WiFi, WiMAX, and second generation [2G], second five generations [2.5G], third generation [3G], 3:5 [3.5G]), 4th generation communication [4G] GSM, EDGE, CDMA, TDMA, GPRS, UMTS, CDMA2000, TD-SCDMA, WCDMA, UMTSTDD, HSDPA transmission protocol technology. 如申請專利範圍第1項所述之互動式資料備份系統,其中,該本地端儲存裝置暨加解密系統之轉換模組的特徵資料係選自帳號、憑證、密碼、欲備份檔案與資料之名稱與內容、時間戳記與個人生物特徵等。 The interactive data backup system of claim 1, wherein the local storage device and the conversion module of the encryption and decryption system are selected from the group consisting of an account number, a voucher, a password, and a name of the file to be backed up. With content, time stamps, and personal biometrics. 如申請專利範圍第1項所述之互動式資料備份系統,其中,該傳輸認證暨行動通訊系統之演算加解密模組的網路安全演算技術係選自PKI【Public Key Infrastructure】各種應用長度之公私鑰加/解密技術。 For example, the interactive data backup system described in claim 1 is characterized in that the network security calculation technology of the calculus encryption and decryption module of the transmission authentication and mobile communication system is selected from PKI [Public Key Infrastructure] for various application lengths. Public and private key encryption/decryption technology. 如申請專利範圍第1項所述之互動式資料備份系統,其中,該異地端儲存裝置暨加解密系統之演算加解密模組的網路安全演算技術係選自PKI【Public Key Infrastructure】各種應用長度之公私鑰加/解密技術。 For example, the interactive data backup system described in claim 1 is characterized in that the network security calculation technology of the calculus encryption and decryption module of the remote storage device and the encryption and decryption system is selected from PKI [Public] Key Infrastructure] Public-private key encryption/decryption technology for various application lengths. 如申請專利範圍第1項所述之互動式資料備份系統,其中,該異地端儲存裝置暨加解密系統之認證暨通訊模組包含有一認證模組與一傳輸暨行動通訊模組,而認證模組用以執行認證、驗證、確認、授權備份檔案與資料存取之動作,至於傳輸暨行動通訊模組則用於執行備份檔案與資料之傳輸、接收、行動通訊之動作。 The interactive data backup system of claim 1, wherein the authentication and communication module of the remote storage device and the encryption and decryption system comprises an authentication module and a transmission and communication communication module, and the authentication mode The group is used to perform authentication, verification, confirmation, authorization of backup files and data access actions, and the transmission and mobile communication module is used to perform the operations of transferring files, data transmission, reception, and mobile communication. 如申請專利範圍第7項所述之互動式資料備份系統,其中,備份檔案與資料之傳輸、接收、行動通訊之方式係選自紅外線、藍芽【Bluetooth】、網際網路【Internet】、區域網路【LAN】、廣域網路【WAN】、無線網路【Wireless】、WiFi、WiMAX、以及第二代【2G】、第二點五代【2.5G】、第三代【3G】)、第三點五代【3.5G】)、第四代通訊【4G】行動通信所屬之GSM、EDGE、CDMA、TDMA、GPRS、UMTS、CDMA2000、TD-SCDMA、WCDMA、UMTSTDD、HSDPA傳輸協定技術。 For example, the interactive data backup system described in claim 7 wherein the method for transmitting, receiving, and communicating the backup file and the data is selected from the group consisting of infrared, Bluetooth, Internet, and area. Network [LAN], wide area network [WAN], wireless network [Wireless], WiFi, WiMAX, and second generation [2G], second five generations [2.5G], third generation [3G], 3:5 [3.5G]), 4th generation communication [4G] GSM, EDGE, CDMA, TDMA, GPRS, UMTS, CDMA2000, TD-SCDMA, WCDMA, UMTSTDD, HSDPA transmission protocol technology.
TW96142686A 2007-11-12 2007-11-12 Interactive Data Backup System TWI387298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96142686A TWI387298B (en) 2007-11-12 2007-11-12 Interactive Data Backup System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96142686A TWI387298B (en) 2007-11-12 2007-11-12 Interactive Data Backup System

Publications (2)

Publication Number Publication Date
TW200922258A TW200922258A (en) 2009-05-16
TWI387298B true TWI387298B (en) 2013-02-21

Family

ID=44728112

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96142686A TWI387298B (en) 2007-11-12 2007-11-12 Interactive Data Backup System

Country Status (1)

Country Link
TW (1) TWI387298B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201315191A (en) * 2011-09-27 2013-04-01 Jian Guo Hui Re-encryption method based on full row matrix
CN107967430B (en) * 2014-10-28 2019-10-18 深圳市大成天下信息技术有限公司 A kind of document protection method, equipment and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040030852A1 (en) * 2002-03-18 2004-02-12 Coombs David Lawrence System and method for data backup
TWI233733B (en) * 2003-12-30 2005-06-01 Icp Electronics Inc A real-time remote replication system and method thereof
WO2005091149A1 (en) * 2004-03-22 2005-09-29 Sharp Kabushiki Kaisha Backup device, backed-up device, backup intermediation device, backup system, backup method, data restoration method, program, and recording medium
US20060005048A1 (en) * 2004-07-02 2006-01-05 Hitachi Ltd. Method and apparatus for encrypted remote copy for secure data backup and restoration
TWI256550B (en) * 2004-06-09 2006-06-11 Omnidirectional Control Techno A storage system having real-time mirror backup function
US7251828B1 (en) * 2000-09-01 2007-07-31 Activcard Ireland Limited Flexible method of security data backup

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7251828B1 (en) * 2000-09-01 2007-07-31 Activcard Ireland Limited Flexible method of security data backup
US20040030852A1 (en) * 2002-03-18 2004-02-12 Coombs David Lawrence System and method for data backup
US20070094533A1 (en) * 2002-03-18 2007-04-26 Net Integration Technologies Inc. System and method for data backup
TWI233733B (en) * 2003-12-30 2005-06-01 Icp Electronics Inc A real-time remote replication system and method thereof
WO2005091149A1 (en) * 2004-03-22 2005-09-29 Sharp Kabushiki Kaisha Backup device, backed-up device, backup intermediation device, backup system, backup method, data restoration method, program, and recording medium
TWI256550B (en) * 2004-06-09 2006-06-11 Omnidirectional Control Techno A storage system having real-time mirror backup function
US20060005048A1 (en) * 2004-07-02 2006-01-05 Hitachi Ltd. Method and apparatus for encrypted remote copy for secure data backup and restoration

Also Published As

Publication number Publication date
TW200922258A (en) 2009-05-16

Similar Documents

Publication Publication Date Title
CN100490372C (en) A method for backup and recovery of encryption key
US8930700B2 (en) Remote device secure data file storage system and method
CN103179086B (en) Remote storage processing method and the system of data
EP1866873B1 (en) Method, system, personal security device and computer program product for cryptographically secured biometric authentication
CN103236930A (en) Data encryption method and system
CN102638568A (en) Cloud storage system and data management method thereof
CA2826837C (en) System and method for remote reset of password and encrytion key
CN105656621A (en) Safety management method for cryptographic device
CN106209823A (en) A kind of lightweight file remote encryption method under mobile cloud computing environment
CN101924739A (en) Method for encrypting, storing and retrieving software certificate and private key
CN111954211B (en) Novel authentication key negotiation system of mobile terminal
CA2686801C (en) Authetication using stored biometric data
CN101730886A (en) Secure storage system and method of use
CN116662957A (en) Identity authentication method, device, computer readable storage medium and computer equipment
CN114401087B (en) Passive lock identity authentication and key agreement system based on state cryptographic algorithm
TWI387298B (en) Interactive Data Backup System
CN105933117A (en) Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
CN109995785A (en) File security unlocking method in local area network based on quantum cryptography
CN112532380B (en) Cloud storage data deterministic deletion method based on SGX technology
WO2002103535A1 (en) Qualification certifying method using variable certification information
CN201199439Y (en) Mobile storage apparatus
CN107426628A (en) A kind of video data protection system and processing method
CN101895878A (en) Dynamic password configuration based mobile communication method and system
CN110210199A (en) Internet of things equipment identity identifying method based on fingerprint collecting and identification
CN115412236A (en) Method for key management and password calculation, encryption method and device

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees