CN100390699C - Authority identification method using plug-and-play device and system applying method - Google Patents
Authority identification method using plug-and-play device and system applying method Download PDFInfo
- Publication number
- CN100390699C CN100390699C CNB2004100559731A CN200410055973A CN100390699C CN 100390699 C CN100390699 C CN 100390699C CN B2004100559731 A CNB2004100559731 A CN B2004100559731A CN 200410055973 A CN200410055973 A CN 200410055973A CN 100390699 C CN100390699 C CN 100390699C
- Authority
- CN
- China
- Prior art keywords
- user
- plug
- storage device
- data
- play
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012545 processing Methods 0.000 claims abstract description 24
- 238000012795 verification Methods 0.000 claims description 24
- 238000013475 authorization Methods 0.000 claims description 9
- 238000007726 management method Methods 0.000 description 14
- 230000006399 behavior Effects 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域 technical field
本发明涉及一种使用权限识别方法,特别涉及一种判断电性连接一数据处理装置的随插即用端口上的随插即用储存装置,是否为一合法装置的使用随插即用装置的权限识别方法及应用此方法的系统。The present invention relates to a method for identifying use rights, in particular to a method for judging whether a plug-and-play storage device electrically connected to a plug-and-play port of a data processing device is a legal device using a plug-and-play device A permission identification method and a system for applying the method.
背景技术 Background technique
近年来,由于可携式的随插即用储存装置如随身碟、数字相机、AppleiPod等的普及,使得电子数据的流通更为便利。由于此型装置的储存容量从64MB到1GB不等,其又多以传输速率极高的USB亦或1394为传输接口,当其插接于计算机时,将可十分快捷的传输或复制大量储存于计算机中的数据,这虽对使用者造成极大的便利,但也相对性的对此等电子数据的管理者增加了管制上的困难。In recent years, due to the popularity of portable plug-and-play storage devices such as flash drives, digital cameras, and Apple iPods, the circulation of electronic data has become more convenient. Since the storage capacity of this type of device ranges from 64MB to 1GB, and most of them use USB or 1394 with a very high transmission rate as the transmission interface, when it is plugged into the computer, it will be very fast. Although the data in the computer brings great convenience to users, it also relatively increases the difficulty in the management of such electronic data managers.
为了防止使用者利用随插即用储存装置任意复制储存于任一计算机中的电子数据,而造成电子数据的外流,目前,大致有二类型的方法可加以管制。其一,是可由一远程的控制台对所管理的终端计算机下达关闭或开启随插即用端口,如USB port、1394 port的命令,而在终端计算机则可根据此命令,决定是否要移除此等随插即用端口上的装置在终端计算机的操作系统上的注册(registry),藉此,来禁止或允许随插即用储存装置的使用。但是这是只针对计算机作锁定,且只可决定开启亦或关闭此等随插即用端口,无法弹性的根据使用者的身分给予不同权限的使用。In order to prevent the user from using the plug-and-play storage device to arbitrarily copy the electronic data stored in any computer, resulting in the outflow of the electronic data, currently, there are generally two types of methods that can be controlled. One is that a remote console can issue a command to close or open a plug-and-play port, such as USB port and 1394 port, to the managed terminal computer, and the terminal computer can decide whether to remove it according to this command. The devices on these plug-and-play ports register (registry) on the operating system of the terminal computer, thereby prohibiting or allowing the use of plug-and-play storage devices. But this is only locked for the computer, and can only decide to open or close these plug-and-play ports, and it is impossible to flexibly give different permissions according to the identity of the user.
另一种方法,是可对此终端计算机上拥有账号的使用者,依其账号,来决定计算机外设连接端口的启闭,以限制其使用权限。此种作法,虽已可依使用者身份来确认使用权限的功能,但仅限于在此个人计算机上拥有账号的使用者,这对于随插即用储存装置的便利性,将大幅降低,且当使用者以其账号开启计算机外设的连接端口后,计算机将不再管制连接端口的启闭,故,若有他人于此时电连接一随插即用储存装置至该计算机,将可沿用开启此计算机的使用者的使用权限,这对储存于此计算机中的数据的控管,将形成极大的漏洞。Another method is to determine the opening and closing of the connection ports of the computer peripherals according to the accounts of the users who have accounts on the terminal computer, so as to limit their use rights. Although this kind of practice can confirm the function of using authority according to the identity of the user, it is only limited to the user who has an account on this personal computer, which will greatly reduce the convenience of the plug-and-play storage device, and when After the user opens the connection port of the computer peripheral with his account, the computer will no longer control the opening and closing of the connection port. Therefore, if someone else electrically connects a plug-and-play storage device to the computer at this time, the open The use authority of the user of this computer will form a huge loophole in the control and control of the data stored in this computer.
发明内容 Contents of the invention
因此,本发明的目的,即在提供一种以辨别随插即用储存装置的使用者身份为依据,并在不影响随插即用储存装置便利性的条件下,判断电性连接一数据处理装置的随插即用端口上的随插即用储存装置,是否为一合法装置的使用随插即用装置的权限识别方法及应用此方法的系统。Therefore, the object of the present invention is to provide a method for judging the electrical connection-data processing based on the identification of the user identity of the plug-and-play storage device and without affecting the convenience of the plug-and-play storage device. A method for identifying whether the plug-and-play storage device on the plug-and-play port of the device is a legitimate device and the system for using the plug-and-play device.
于是,本发明揭露一种使用随插即用装置的权限识别方法,用以判断电性连接一数据处理装置的随插即用端口上的随插即用储存装置是否为一合法装置,该方法包含下述步骤:A)检测在随插即用储存装置及数据处理装置其中之一,是否存在至少一电子凭证;B)若有,要求输入一使用者专用密钥;C)核对使用者专用密钥;D)若核对无误,容许数据写入该随插即用储存装置。Therefore, the present invention discloses a method for identifying the authority of a plug-and-play device, which is used to determine whether a plug-and-play storage device electrically connected to a plug-and-play port of a data processing device is a legitimate device. The method comprises the following steps: A) detecting whether there is at least one electronic certificate in one of the plug-and-play storage device and the data processing device; B) if so, requiring input of a user-specific key; C) checking the user-specific Key; D) If the verification is correct, data is allowed to be written into the plug-and-play storage device.
本发明另揭露了一种使用随插即用装置的权限识别方法,应用于一控制端及一使用者端,该控制端及该使用者端藉由一网络彼此互相连结,其中,该控制端具有一服务器,该使用者端具有至少一数据处理装置,该方法包含下述步骤:A)检测在随插即用储存装置及数据处理装置其中之一,是否存在至少一电子凭证;B)若有,要求输入一使用者专用密钥;C)核对使用者专用密钥;D)若核对无误,容许数据写入该随插即用储存装置。The present invention also discloses a permission identification method using a plug-and-play device, which is applied to a control terminal and a user terminal, and the control terminal and the user terminal are connected to each other through a network, wherein the control terminal There is a server, the user end has at least one data processing device, the method includes the following steps: A) detecting whether at least one electronic certificate exists in one of the plug-and-play storage device and the data processing device; B) if Yes, it is required to input a user-specific key; C) check the user-specific key; D) if the verification is correct, allow data to be written into the plug-and-play storage device.
此外,本发明亦揭露了一种计算机可读取的记录媒体,其可被载置于一数据处理器上,藉以判断电性连接一该数据处理器随插即用端口上的随插即用储存装置是否为一合法装置,该记录媒体中记录有一可驱使该数据处理器动作的程序代码,该程序代码可于该数据处理器中执行如下的步骤:A)检测在随插即用储存装置及数据处理装置其中之一,是否存在至少一电子凭证;B)若有,要求输入一使用者专用密钥;C)核对使用者专用密钥;D)若核对无误,容许数据写入该随插即用储存装置。In addition, the present invention also discloses a computer-readable recording medium, which can be loaded on a data processor, so as to determine the electrical connection to a plug-and-play port on the data processor plug-and-play port. Whether the storage device is a legal device, a program code that can drive the data processor to act is recorded in the recording medium, and the program code can perform the following steps in the data processor: A) detect the plug-and-play storage device and one of the data processing devices, whether there is at least one electronic certificate; B) if there is, request to input a user-specific key; C) check the user-specific key; D) if the check is correct, allow data to be written into the random Plug and play storage.
本发明更揭露了一种使用随插即用装置的权限识别系统,用以判断电性连接一数据处理装置的随插即用端口上的随插即用储存装置是否为一合法装置,该系统包含一随插即用储存装置、一服务器,及至少一数据处理器。服务器用以核发一专属一申请者的电子凭证;数据处理器是以网络与该服务器连结,具有至少一随插即用端口,并安装有一应用程序,每检测到该随插即用端口电性连接该随插即用储存装置时,即判断是否存在该电子凭证,若有,则要求输入一使用者专用密钥,并于核对无误时,容许数据写入该随插即用储存装置。The present invention further discloses a permission identification system using a plug-and-play device to determine whether a plug-and-play storage device electrically connected to a plug-and-play port of a data processing device is a legitimate device. It includes a plug-and-play storage device, a server, and at least one data processor. The server is used to issue an electronic certificate exclusive to an applicant; the data processor is connected to the server with a network, has at least one plug-and-play port, and installs an application program, and detects the electrical performance of the plug-and-play port When the plug-and-play storage device is connected, it is judged whether the electronic certificate exists, and if so, a user-specific key is required to be input, and when the verification is correct, data is allowed to be written into the plug-and-play storage device.
附图说明 Description of drawings
图1是一示意图,说明本发明使用随插即用装置的权限识别系统的较佳实施例;Fig. 1 is a schematic diagram illustrating a preferred embodiment of the authority identification system using a plug-and-play device of the present invention;
图2是一方块图,说明一远程管理程序;Figure 2 is a block diagram illustrating a remote management program;
图3是一流程图,说明一电子凭证申请方式;Fig. 3 is a flowchart illustrating an electronic voucher application method;
图4是一方块图,说明一代理人程序;Figure 4 is a block diagram illustrating an agent program;
图5是一流程图,说明本发明使用随插即用装置的权限识别方法的部分动作流程;Fig. 5 is a flow chart illustrating the partial action flow of the authority identification method using the plug-and-play device of the present invention;
图6是一流程图,说明接续图5的其余动作流程。FIG. 6 is a flow chart illustrating the flow of the remaining operations following FIG. 5 .
附图符号说明Description of reference symbols
1-识别系统1- Identification system
11-远程管理中心11-Remote Management Center
12-终端机12-terminal
13-终端机13-Terminal
2-远程管理程序2- Remote management program
21-凭证管理模块21- Credential Management Module
22-安全等级管理模块22-Security level management module
23-文件纪录维护模块23-File record maintenance module
3-代理人程序3- Agent procedure
31-凭证验证模块31-Credential Verification Module
32-权限检索模块32-Authority retrieval module
501-504-步骤501-504-step
701-717-步骤701-717-step
具体实施方式 Detailed ways
本发明的前述及其它技术内容、特征与优点,在以下配合参考附图的一较佳实施例的详细说明中,将可清楚明白。The aforementioned and other technical contents, features and advantages of the present invention will be clearly understood in the following detailed description of a preferred embodiment with reference to the accompanying drawings.
首先请参阅图1,本发明使用随插即用装置的权限识别系统1,用以判断电性连接一数据处理装置的随插即用端口上的随插即用储存装置是否为一合法装置,其是为有效监控公司所拥有的电子文件,以防止此等文件遭不被认可的使用者任意复制、下载于随插即用(Plug-and-Play)储存装置`6,并对公司所认可的使用者,依其使用权限,限制并纪录其于这些文件进行的使用行为,借以完整详尽的确认这些文件的流向,以对公司的文件达到最确实的保护。Please refer to Fig. 1 at first, the present invention uses the
识别系统1包含一控制端及一使用者端,是建构于一局域网络(Intranet),亦或一因特网(Internet)上,其中,控制端具有一服务器11,使用者端具有至少一可上网的数据处理装置12。且服务器11上安装有一远程管理程序2,数据处理装置12上安装有一代理人程序3及一文件系统驱动程序4。在本实施例中,此数据处理装置12为一具有至少一随插即用端口(图未示)的终端机,但亦可为一具有至少一随插即用端口的PDA或其它电子设备,不应已此为限。且为说明方便,在下文中,服务器11将以远程管理中心称之,数据处理装置12将以终端机称之。The
参阅图2、3,远程管理程序2安装于远程管理中心11上,具有一凭证管理模块21、一安全等级管理模块22。凭证管理模块21具有一组互相搭配的管理者公开密钥及管理者专用密钥,是用以建立一安全严密的认证机制,以管理电子凭证(Certificate)的签发、更新、废止等…。此电子凭证核发机制,是依据ITU-T(CCITT)所定义的X.509国际标准所订定,其核发的流程如图3所示,并简述如下。步骤501,凭证管理模块21接收到使用者经由一具有凭证申请程序(Certificate Issue Agent)的终端机13所发送的凭证申请数据,及一做为一使用者专用密钥的密码。其中,依X.509标准,此等数据应包含有使用者姓名、所属部门单位,及隶属国家等…。Referring to FIGS. 2 and 3 , the
步骤502、503,凭证管理模块21产生一相对应该使用者专用密钥的使用者公开密钥,并利用管理者专用密钥对使用者发送的凭证申请数据及使用者公开密钥加密而形成专属于使用者的电子凭证,步骤504,再依据使用者的指定,传送至该终端机或该外围的储存装置。使用者接收到远程管理中心11核发的电子凭证后,即可储存于一随插即用储存装置6或终端机12中,用以于使用随插即用储存装置6时,供终端机12做验证。In
其中,使用者公开密钥是配对于使用者专用密钥,即经过其中一把密钥加密过后的信息,需由另一密钥才可将此信息解密。由于此公开密钥(Public-Key)密码法的技术,是目前密码学中所普偏使用的方法,且非本发明的重点,故在此不再多加赘述。Wherein, the user's public key is paired with the user's private key, that is, the information encrypted by one of the keys needs to be decrypted by the other key. Since the technology of the public-key cryptography is a method commonly used in cryptography at present, and is not the focus of the present invention, it will not be repeated here.
参阅图2,安全等级管理模块22是具有一使用权限清单,此使用权限清单是由远程管理中心11的管理人员来建制,其是依使用者身份的不同而对随插即用装置设定不同的使用权限。在本实施例中,此等使用权限是分为只可读取随插即用装置所储存的数据,及可读取/可写入数据至随插即用装置两种等级。当然,此种权限的分野,亦可是以针对电子文件来做分类,不同的文件设置不同的等级,使用者只可依照本身等级的使用权限,来读写符合权限范围内的文件,并不应以本实施例揭露者为限。Referring to Fig. 2, the security
参阅图1、4,终端机12安装有代理人程序3,代理人程序3具有一凭证验证模块31,及一使用权限检索模块32,当随插即用储存装置6插设于终端机12的随插即用端口时,凭证验证模块31即搜寻随插即用储存装置6及终端机12的电子凭证,由于,各终端机12及随插即用储存装置6并无限制可储存的电子凭证数目,故,其可能储存有多个电子凭证,在本实施例中,凭证验证模块31会将搜寻到的电子凭证表列于终端机12的显示器上,用以供使用者选择属于个人的电子凭证。当然,此电子凭证的选择方式,亦可由使用者直接输入电子凭证储存的地址,以供凭证验证模块31使用。Referring to Figures 1 and 4, the
其中,凭证验证模块31具有一定期向远程管理中心12下载并更新管理者公开密钥,当凭证验证模块31取得电子凭证后,将以此管理者公开密钥对电子凭证进行验证,如前文所述,由于电子凭证是由凭证管理模块21以管理者专用密钥加密,故若此电子凭证是由此凭证管理模块21所产生,则将可顺利验证而得到使用者的凭证申请数据及使用者公开密钥。反之,此电子凭证将被视为不合法。若,凭证验证模块31确认其为不合法的凭证,则将发送一请求,用以请求终端机12停止供应此随插即用储存装置6所需的电源,如此,随插即用储存装置6将无法使用。Wherein, the
当凭证验证模块31以管理者公开密钥确认了电子凭证的合法性后,将产生一组随机数(random number),并以验证电子凭证后所得到的使用者公开密钥对此组随机数进行加密,而产生一密文。此时,凭证验证模块31将请求使用者输入使用者专用密钥来对此密文解密,用以验证解密后得到的数据,是否同等于原先凭证验证模块31产生的随机数。When the
若相同,则可确认此使用者是为一合法的使用者,即可再交由使用权限检索模块32,依使用者的使用权限来限制使用者可被允许的使用行为,反之,将视其为一不合法的使用者,其将发送一请求,请求终端机12停止供应此随插即用储存装置6所需的电源。If it is the same, then it can be confirmed that the user is a legal user, and then it can be handed over to the use
使用权限检索模块32定期由终端机12下载、更新使用权限清单,当凭证验证模块31利用使用权限清单比对使用者身份,确认使用者的使用权限,将依据其使用权限,以决定其是否可读/写随插即用储存装置6、或只可读取随插即用储存装置6所储存的数据,若此使用权限清单上无使用者的名字,则其亦将视为一不合法的使用者,终端机12亦将停止供应此随插即用储存装置6所需的电源。藉此,终端机12将可于电连接一随插即用储存装置6后,以一身份验证的机制,来识别使用者身份及确认其使用权限,并依其使用权限来限制使用者所被允许的使用行为,这将有效的保有了随插即用储存装置6的便利性,及对数据管制上更为确实。The use
此外,为了让数据管理上更为严谨,管理者可利用远程管理程序2的安全等级管理模块22设定一终端机安全等级清单并下载至各终端机12的使用权限检索模块32,用以针对不同的终端机12,依其所设定的使有者职权的不同,对其所属的终端机12订定高、中、低不同的安全等级,以限制各终端机12是否可使用此随插即用储存装置6。其中,安全等级为高者,终端机12即被禁止随插即用储存装置6的使用,即终端机12不供应此随插即用储存装置6所需的电源,安全等级为中者,将只允许使用权限清单上的使用者使用随插即用储存装置6,安全等级为低者,终端机12将不对随插即用储存装置6作任何限制。In addition, in order to make the data management more rigorous, the administrator can use the security
故,当终端机12开机后,使用权限检索模块32将先检视终端机12所属的安全等级。如此,本识别系统1即除了原先只针对使用者身份办识外,再增加一针对终端机12的安全等级做一限制。Therefore, when the
此外,远程管理程序2另具有一文件纪录维护模块23,终端机12亦具有一文件系统驱动程序4。当确认使用者身份后,使用权限检索模块32将发送一信号,用以驱动文件系统驱动程序4纪录使用者的使用行为,并定期地传送此数据至远程管理程序2的文件纪录维护模块23,以供管理者所需查证纪录时使用。藉此,将可使数据的管理上更为严谨。In addition, the
参阅图1、图5及图6,依据上述使用随插即用装置的权限识别系统1的识别方法整理如下,首先如步骤701,终端机12检测到使用者连接一随插即用储存装置6至随插即用端口,步骤702,使用权限检索模块32判读终端机12的安全等级,当等级为高时,执行步骤703,等级为中时,执行步骤704。步骤703,若安全等级为高,则停止供应电源至随插即用储存装置6,步骤704,若安全等级为中,凭证验证模块31将搜寻一电子凭证,并于有搜寻到电子凭证时进入步骤706,反之,则至步骤705。Referring to Fig. 1, Fig. 5 and Fig. 6, according to the identification method of the
步骤705,无搜寻到任一电子凭证,限制使用者只可读取随插即用储存装置6中的数据。步骤706、707,凭证验证模块31使用管理者公开密钥对电子凭证进行验证(authentication),以识别此电子凭证的真伪,其中,若验证结果显示该电子凭证为有效,将取得使用者公开密钥(k1)及凭证申请数据,并代表此电子凭证是由一被认同的凭证管理模块21所核发,是为一合法的电子凭证,即进入步骤708,反之,则至步骤703。
步骤708,凭证验证模块31产生一组随机数(R),步骤709,利用验证后得到的使用者公开密钥对此组随机数进行加密,而产生一密文(cipher)。此加密步骤可由下列方程式来完成:In
C=Ek1(R),C = E k1 (R),
其中,E代表加密函数(encrypt),k1代表使用者公开密钥,R代表随机数(random number),而C代表利用使用者公开密钥k1加密随机数R所得的密文(cipher)。接下来在步骤710、711中,凭证验证模块31请求使用者输入一组密码,即使用者专用密钥(k2)来对此密文解密。此解密步骤可由下列方程式来完成:Among them, E represents the encryption function (encrypt), k1 represents the user's public key, R represents a random number (random number), and C represents the ciphertext (cipher) obtained by encrypting the random number R with the user's public key k1. Next in
R’=Dk2(C),R' = D k2 (C),
其中,D代表解密函数(decrypt),k2代表使用者专用密钥,C代表利用使用者公开密钥k1加密随机数R所得的密文(cipher),而R’代表解密后所得到的随机数数据。接下来在步骤712中,判别解密后得到的数据,是否同等于原先凭证验证模块31产生的随机数,若不同,则至步骤703,若相同,则可确认此使用者是为一合法的使用者,并至步骤713。步骤713,使用权限检索模块32依使用者身份检索使用权限清单,以依使用者的使用权限来限制可被允许的使用行为。Among them, D represents the decryption function (decrypt), k2 represents the user's private key, C represents the ciphertext (cipher) obtained by encrypting the random number R with the user's public key k1, and R' represents the random number obtained after decryption data. Next in
其中,若使用者权限是可读/写随插即用储存装置6则进入步骤714,若只可读取随插即用储存装置6所储存的数据,则进入步骤705,若此使用权限清单上无使用者的名字,则其将视为一不合法的使用者,即进入步骤703。步骤714-716,当确认使用者身份后,使用权限检索模块32将发送一信号,驱动文件系统驱动程序4纪录使用者的使用行为,并定期地传送此纪录至远程管理中心12的文件纪录维护模块23储存,以供管理者所需查证纪录时使用。Wherein, if the user authority is to read/write the plug-and-
归纳上述,本发明使用随插即用装置的权限识别方法及应用此方法的系统,是当使用者电连接一随插即用储存装置6至终端机12后,利用一电子凭证及使用者再行输入的使用者专用密钥,进行一身份识别及权限确认的管制,并利用一文件系统驱动程序4纪录使用者的使用行为,并定期地传送此纪录至远程管理中心12,以供管理者所需查证纪录时使用,而能有效的管理及监控数据的流向,以维护公司的权益,故确实能达成其发明目的。To sum up the above, the present invention uses a plug-and-play device authority identification method and a system applying this method. After the user electrically connects a plug-and-
惟以上所述者,仅为本发明的较佳实施例而已,当不能以此限定本发明实施的范围,即大凡依本发明申请专利范围及发明说明书内容所作的简单的等效变化与修饰,皆应仍属本发明专利涵盖的范围内。But the above are only preferred embodiments of the present invention, and should not limit the scope of the present invention with this, that is, all simple equivalent changes and modifications made according to the patent scope of the present invention and the content of the description of the invention, All should still belong to the scope that the patent of the present invention covers.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100559731A CN100390699C (en) | 2004-08-03 | 2004-08-03 | Authority identification method using plug-and-play device and system applying method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100559731A CN100390699C (en) | 2004-08-03 | 2004-08-03 | Authority identification method using plug-and-play device and system applying method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1734387A CN1734387A (en) | 2006-02-15 |
CN100390699C true CN100390699C (en) | 2008-05-28 |
Family
ID=36076845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100559731A Expired - Fee Related CN100390699C (en) | 2004-08-03 | 2004-08-03 | Authority identification method using plug-and-play device and system applying method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100390699C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI566103B (en) * | 2015-11-16 | 2017-01-11 | 宇瞻科技股份有限公司 | Pcie bridge transformation device and method thereof |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102195780A (en) * | 2010-03-15 | 2011-09-21 | 英威康科技股份有限公司 | Electronic key system |
CN102332073A (en) * | 2011-07-07 | 2012-01-25 | 曙光信息产业股份有限公司 | Method for controlling universal serial bus (USB) port equipment switch |
CN102867151B (en) * | 2011-07-08 | 2015-09-23 | 纬创资通股份有限公司 | Electronic device with information encryption function and information encryption method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000019301A2 (en) * | 1998-09-30 | 2000-04-06 | Phoenix Technologies Ltd. | Automatic generation of acpi source language for peripheral resource configuration |
WO2001035193A1 (en) * | 1999-11-08 | 2001-05-17 | International Business Machines Corporation | Wireless security access management for a portable data storage cartridge |
CN1400602A (en) * | 2001-07-31 | 2003-03-05 | 台均实业有限公司 | Portable readable and writable memory with USB interface and its data management method |
-
2004
- 2004-08-03 CN CNB2004100559731A patent/CN100390699C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000019301A2 (en) * | 1998-09-30 | 2000-04-06 | Phoenix Technologies Ltd. | Automatic generation of acpi source language for peripheral resource configuration |
WO2001035193A1 (en) * | 1999-11-08 | 2001-05-17 | International Business Machines Corporation | Wireless security access management for a portable data storage cartridge |
CN1400602A (en) * | 2001-07-31 | 2003-03-05 | 台均实业有限公司 | Portable readable and writable memory with USB interface and its data management method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI566103B (en) * | 2015-11-16 | 2017-01-11 | 宇瞻科技股份有限公司 | Pcie bridge transformation device and method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN1734387A (en) | 2006-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8966580B2 (en) | System and method for copying protected data from one secured storage device to another via a third party | |
US8898477B2 (en) | System and method for secure firmware update of a secure token having a flash memory controller and a smart card | |
KR101657613B1 (en) | Backing up digital content that is stored in a secured storage device | |
US8621601B2 (en) | Systems for authentication for access to software development kit for a peripheral device | |
US20090276474A1 (en) | Method for copying protected data from one secured storage device to another via a third party | |
KR101254209B1 (en) | Apparatus and method for moving and copying right objects between device and portable storage device | |
JP4550050B2 (en) | Usage authentication method, usage authentication program, information processing apparatus, and recording medium | |
KR100608575B1 (en) | Home network device, home network system and method therefor capable of automatic ownership authentication | |
US20090150631A1 (en) | Self-protecting storage device | |
KR20050094273A (en) | Digital rights management structure, handheld storage deive and contents managing method using handheld storage device | |
JP4610557B2 (en) | DATA MANAGEMENT METHOD, PROGRAM THEREOF, AND PROGRAM RECORDING MEDIUM | |
KR102777277B1 (en) | Storage device providing safe discard of data and Operating method thereof | |
JP2008005408A (en) | Recording data processing device | |
JP2008033512A (en) | Security chip and platform | |
CN1965278A (en) | Authentication method for authenticating a first party to a second party | |
US20090293117A1 (en) | Authentication for access to software development kit for a peripheral device | |
CN100390699C (en) | Authority identification method using plug-and-play device and system applying method | |
JP2004070875A (en) | Secure system | |
CN100555205C (en) | Portable memory and in portable memory the method for management document | |
CN115618306B (en) | Software protection method, device, system, CPU chip and electronic equipment | |
CN116842545A (en) | File encryption-based data anti-luxury method and system | |
JP4673150B2 (en) | Digital content distribution system and token device | |
KR101241413B1 (en) | Apparatus and method for moving and copying right objects between device and portable storage device | |
JP2008529339A (en) | Method for preventing unauthorized distribution of content in a DRM system for commercial or personal content | |
JP2008191851A (en) | Electronic equipment and information processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080528 |
|
CF01 | Termination of patent right due to non-payment of annual fee |