[go: up one dir, main page]

TWI237178B - A encryption system and method of securing internal business data - Google Patents

A encryption system and method of securing internal business data Download PDF

Info

Publication number
TWI237178B
TWI237178B TW92120900A TW92120900A TWI237178B TW I237178 B TWI237178 B TW I237178B TW 92120900 A TW92120900 A TW 92120900A TW 92120900 A TW92120900 A TW 92120900A TW I237178 B TWI237178 B TW I237178B
Authority
TW
Taiwan
Prior art keywords
server
data
user
file
encryption
Prior art date
Application number
TW92120900A
Other languages
Chinese (zh)
Other versions
TW200504510A (en
Inventor
Henry Chen
Original Assignee
Fineart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fineart Technology Co Ltd filed Critical Fineart Technology Co Ltd
Priority to TW92120900A priority Critical patent/TWI237178B/en
Publication of TW200504510A publication Critical patent/TW200504510A/en
Application granted granted Critical
Publication of TWI237178B publication Critical patent/TWI237178B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention relates to an encryption system and method of securing internal business data. The invention is composed of a server end and user ends enabling output data to be entirely recorded by the server end and allowing written files to be encrypted at the user ends. Therefore, the invention prevents business information from being revealed through any external storage device, so as to achieve the objective of data security ensuring internal data files to be used within an enterprise only.

Description

1237178 五、發明說明(1) 【發明所屬之技術領域】 ’特別是一種用以保 法〇 ^本务明係為一種槽案加密的方法 護企業内資料外流的加密系統及其方 【先前技術】 在科技一日千里的今曰 技術早已日漸普及,並且廣 訊處理裝置的功能亦越來越 時代,各個企業内無不加強 符合現今潮流的要求,以提 業正努力提升資訊處理裝置 生出其他相關的安全控管問 舉例來說,企業中所使 企業内部區域網路(Intrane 端與一個伺服器端所構成, 所以造成管理不易,然而, 透過網際網路外流,提供了 譬如:防火牆、防毒程式的 侵或是企業員工透過網際網 用外接式儲存設備讓資料外 不過針對上述問題,專 稱·用以追蹤資訊外流狀況 有長1出解決的手段,該發明 策略來執行不同的資料保護 ’資訊處理裝置與通訊相關的 泛應用在每—個領域,所以資 多元化’同時在這資訊爆炸的 其資訊處理裝置的週邊設備來 升企業的競爭力;不過,當企 週邊設備的同時,也相對地衍 題。 用的分散式系統,大多都透過 ΐ)加以連結,由複數個使用者 彼此間資料的流量相當驚人, 近年來為了避免企業内部資料 一些手段來解決上述的問題, 資訊安全系統,避免駭客的入 路讓資料外洩,此時,對於利 戌並無特別的保護方法。 利公告號第34330 1號,發明名 之資訊保全系統及方法一案’ 案的目的在於按照不同的保全 方法’其重點在於只要當企業1237178 V. Description of the invention (1) [Technical field to which the invention belongs] 'Especially an encryption system used to protect the law. This is an encryption method that protects the outflow of data in the enterprise and its methods [Previous technology ] In today's fast-moving technology, technology has become increasingly popular, and the functions of broadcast processing equipment have become more and more era. All enterprises have strengthened their requirements to meet the current trend. For example, the security control problem is caused by the company's internal intranet (intrane and a server), which makes management difficult. However, the outflow of the Internet provides, for example, firewalls, antivirus programs, Infringement or enterprise employees use the external storage device of the Internet to keep data out. However, for the above problems, it is known that there is a long-term solution to track the situation of information outflow. The invention strategy implements different data protection 'information processing. Devices and communications are widely used in every field, so multiple sources of information The information explosion of the peripheral equipment of the information processing device to enhance the competitiveness of enterprises; however, when the peripheral equipment of the enterprise is also relatively relevant, the decentralized systems used are mostly connected through ΐ) and used by multiple The flow of data between each other is quite amazing. In recent years, in order to avoid some internal data of the enterprise to solve the above problems, information security systems, to prevent hackers from letting the data leak out. At this time, there is no special protection for Lee. method. Profit Announcement No. 34330 1, Case of Information Preservation System and Method of Invention Name 'The purpose of the case is to follow different preservation methods.

第5頁 1237178 五、發明說明(2) 内部資料要 得授權後才 將假的資料 部區域網路 在一龐大的 資源便會被 多企業員工 有類似的情 如上所 能,且又可 行加密,實 外流時 放行, 回傳至 會有很 企業, 佔據, 的時間 況。 述,如 使一般 為一具 或是ϋ Ϊ端就必須與伺服器 使用ίί词服器端執行加密 大的負Γ,但透過這種方式 會同i:,甚至降低網路的 次」有相當多筆的連線, 貝訊一來一回的傳送下, 對於現今的技術面來看, 何讓企業内資料彳外流有兼 的,用者端也可單獨地針對 有實用性之思考方向。 端聯絡,取 的動作然後 對於企業内 速度,因為 此時系統的 也會浪費很 著實不應會 具保密的功 外流標案進 【發明 有 的加密 密所寫 業受到 ,以達 根 統及其 器端資 模式與 器端最 出檔案 内容】 鑑於此 系統及 出檔案 損害, 資料安 據本發 方法, 料庫及 伺服器 新之資 資料至 ’本發明 其方法, 來防止企 讓企業内 全的目的 明所揭露 至少包含 其維護功 端進行連 料並進行 外接式儲 提供一種用 其主要目的 業資訊由外 部所有的檔 〇 用以保護企 下列步驟: 能,接下來 線’然後使 單機作業, 存設備之命 以保護企業内資料外流 係單獨透過使用者端加 接式儲存設備流出使企 案只能在企業内部使用 業内資料外流的加密系 透過伺服器端建立伺服 使用者端依據不同選擇 用者端取得並確認伺服 使用者端判斷是否有寫 令,其後使用者端向使Page 5 1237178 V. Description of the invention (2) The internal data must be authorized before the fake data department is networked on a huge resource. Many employees will have similar sentiments as above, and it is feasible to encrypt. When it goes out, it will be released, and it will be transmitted back to the time when there will be a lot of business, occupation, and time. As described above, if it is generally one or ϋ Ϊ end, you must use the server to perform a large negative Γ encryption with the server side, but this way will be the same as i :, and even reduce the number of times on the network. The connection of the pen is transmitted one by one by Beixun. For the current technical aspect, how to let the company's data flow out, the user can also individually target the practical thinking direction. End communication, take action and then the speed of the enterprise, because at this time the system will also be wasted. It should not be a case of confidential outflow of work. Device-side asset model and file content of the device] In view of the damage of this system and the file, the data security method, the new data of the database and the server are transferred to the method of the present invention to prevent the enterprise The purpose of the disclosure is to include at least its maintenance function to connect materials and external storage. Provide a file with its main purpose and industry information to be owned by the outside. To protect the company's following steps: Yes, next line, and then make stand-alone operation. The storage of the device's life to protect the outflow of data in the enterprise is a separate outflow through the user-side add-on storage device, so that the company can only use the industry's data out of the company's internal encryption. The server establishes the server's client through the server. Select the user side to obtain and confirm that the server user side determines whether there is a write order, and then the user side uses the

1237178 L、發明~ ---—------------ 用者端資料座跑p 全設定剌?取女全設定’取得完畢,使用者端依據安 :1斷是否需管制寫出檔案資料,檔 料透過加密 全設定剌 f取得安全設定’取得完畢,使用者端依據安 方ί寫出斷是否需管制寫出檔案資料,檔案資料透過加密 之ί己錄柃至外接式儲存設備並為安全槽,最後將寫出槽案 姑供、^存入祠服器端資料庫。有關本發明之詳細内容及 技術,兹就配合圖式說明如下。 【實施方式】 ^發明係為一種用以保護企業内資料外流的加密系統 内2料法、’請參照第1圖,第1圖為本發明用以保護企業 二j外流的加密系統之系統架構圖,說明了本發明之基 本架構,其說明如下: 山本發明之系統架構係由伺服器端1 0 0與至少一個使用 八j2 〇 〇所構成,而使用者端2 0 〇與伺服器端1 ο 0係透過一 ==内部區域網路(Intranet)加以連結,藉由該伺服器端 2 σ己錄所有馬出的動作並透過該使用者端加密所寫出檔 ^避免企業資料外流’其中伺服器端10 〇係用以接收 4¾料,並整合管理企業内部之資料,儲存了安全設定 者端200的使用記錄,以及更新使用者端2〇〇中該安 全設,資料之功能,並包含了(1)管理介面模組no、(2) 伺服Is端資料庫丨20、(3)動態目錄模組丨3〇及(4)伺服器端 傳送接收介面140,進一步說明如下·· (1)管理介面模組110,係提供一管理介面,讓系統操 作人員可直接下達指令並管理伺服器端1〇〇。 (2 )伺服器端資料庫1 2 〇,係提供一空間存放伺服器端 1237178 五、發明說明(4) 1 〇 0之資料與其他外來輸入的資料,並使其資料可直接存 取。 (3)動態目錄模組i3〇(Active Directory),係可透過 輕畺目錄存取通訊協定(Lightweight Directory Access Protocol ; LDAP)取得企業員工及部門群組資料,並回存 至伺服器端資料庫1 2 〇。 (4 )伺服器端傳送接收介面丨4 〇,係接收使用者端2 〇 〇 之資料並回存至伺服器端資料庫丨2 〇及傳送伺服器端丨〇 〇所 欲發出之資料。 而該使用者端2 0 0,係用以接收傳送資料,並透過安 全設定進行單機操作寫出一般檔及安全檔的作業,以達資 料加密的功能’並包含了(丨)核心功能模組2丨〇、( 2 )使用 者端資料庫220、(3)使用者介面模組230及(4)使用者端傳 送接收介面2 4 0,進一步說明如下·· (1 )核心功能模組2 1 〇,係為一保護機制,以防止使用 者而2 0 〇 ^料外流,透過安全設定判別該一般樓與安全檔 之差異;一般檔係指未經由加密之檔案並以明文方式呈現 〇 (2一)使用者端資料庫22〇,係提供一空間存放使用者端 Μ 0之貧料與其他外來輸入的資料,並可直接存取該安全 楷’文全槽係指經由加密之檔案並以密文方式呈現。 ^ ( 3 )使用者介面模組2 3 〇 ’係為一使用者介面,可在取 :泫2全設定之後對一寫出檔案加密,並在送出該寫出檔 ”到一外接式儲存設備3 〇 〇時,要求核心功能模組2丨〇放行1237178 L 、 Invention ~ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- The file data is controlled to be written. The file is encrypted through the full setting 剌 f to obtain the security settings. After the acquisition is completed, the user terminal should control whether to write the file data according to the security side. The file data is encrypted to the external The storage device is also a safe slot. Finally, the slot case will be written and stored in the temple server database. The details and technology of the present invention are described below with reference to the drawings. [Embodiment] ^ The invention is a method for protecting an internal data outflow of an enterprise. 'Please refer to FIG. 1. FIG. 1 is a system architecture of an encryption system used to protect an enterprise ’s outflow. The figure illustrates the basic architecture of the present invention, which is described as follows: The system architecture of Yamamoto's invention is composed of a server end 100 and at least one using eight j2 00, and a user end 2 00 and a server end 1 ο 0 is connected through an == intranet, through the server side 2 σ has recorded all the actions and encrypted files written by the user side ^ Avoid the outflow of corporate data The server-side server 100 is used to receive the data and manage the internal data of the enterprise. It stores the usage record of the security user 200 and updates the security device and data functions in the user server 200. (1) management interface module no, (2) servo Is-side database 丨 20, (3) dynamic directory module 丨 30, and (4) server-side transmission and reception interface 140, further explained as follows: (1 ) Management Interface Module 110 A management interface, so that the operating system can directly give instructions and manage server-side 1〇〇. (2) The server-side database 1220 provides a space for storing the server-side 1237178 V. Description of the invention (4) 100 and other externally input data, and make the data directly accessible. (3) Active Directory module i30 (Active Directory), which can obtain the data of enterprise employees and department groups through Lightweight Directory Access Protocol (LDAP) and save it to the server-side database 1 2 0. (4) The server-side transmission and reception interface 丨 4 〇, which is to receive the data from the user-side 〇 200 and return it to the server-side database 丨 2 〇 and the server-side data 丨 〇 〇 want to send data. The user terminal 200 is used for receiving and transmitting data, and performing single-machine operations to write out general files and security files through security settings to achieve the function of data encryption and includes (丨) core function modules. 2 丨 〇, (2) the user database 220, (3) the user interface module 230, and (4) the user transmitting and receiving interface 2 4 0, further explained as follows: (1) Core function module 2 10 is a protection mechanism to prevent users from outflowing data. Through the security settings, the difference between the general building and the security file is discriminated. The general file refers to an unencrypted file and is presented in plain text. 0 ( 21) The user-side database 22 is a space for storing the data of the client M 0 and other external input data, and can directly access the secure script. The full-text slot refers to the encrypted file and Presented in cipher text. ^ (3) The user interface module 2 3 0 ′ is a user interface, which can encrypt a write file after taking all settings: 泫 2, and send the write file to an external storage device. At 3:00, the core function module 2 is required to be released

第8頁 1237178Page 8 1237178

=使用者端傳送接收介面24。,係•收飼服器端ι〇〇= User-side send and receive interface 24. Department • Feeding device end 〇〇〇

欲:Ϊ U 者端資料庫22 0及傳送使用者端20 0所 从發出之資料。 同使用者名稱及電腦上 上述之安全設定係包含按照不 特定的機器訊號。 使用者端2GG所用之加密的方式可為非對稱式的加密 及對稱式的加密,而非對稱式的加密可以是公開金鑰 (PKI)、RSA演算法及橢圓曲線密碼的其中之一;而對稱式 的加密可以是Blowfish、Triple DES、DES、IDEA、RC5、 CAST-128及RC2的其中之一。 上述之外接式儲存設備3〇〇可從軟碟機、光碟機、ζιρ 、M0、燒錄機、萬用串列匯流排(Universai ““Μ Bus ;USB)連接線至萬用串列匯流排連接線、並行埠連接線 (Parallel Port)、串列埠連接線(Serial p〇rt)及移動式 資訊儲存裝置的組合中任意擇一。 上述之伺服器端100存放了 一寫出檔案之記錄檔,此 一記錄檔至少包含下列攔位··寫出檔案之時間、電腦機器 辨識碼、使用者名稱、寫出之檔案名稱、檔案拇指紋 資料結構)及隨機片段内容。 接著明看到第2圖,第2圖為本發明之使用者端將資 料寫出至外接式儲存設備之示意圖。 使用端20 0可透過使用者端傳送接收介面24〇與伺服器 端100聯絡,以保持使用者端資料庫22〇中的資訊保持最新 1237178 五、發明說明(6) 的狀態,當使用者端欲將檔案移動到外接式儲存設備3〇〇 時’便會透過前述之加密方式,將此一檔案加密°而成加密 安全檔3 5 0,若其他人要開啟該加密安全檔3 5 〇,便會以密 文方式呈現,讓任何人都無法閱讀。 ’ 請參照圖示,第3圖為本發明伺服器端與複數個使用 者端連間之關係圖,本圖主要是說明企業内部一個伺服 端1 0 0係透過伺服器端傳送接收介面丨4 〇與分別複數個 者端20 0a〜200η的使用者端傳送接收介面24〇a〜24〇n加以 絡,讓資料的傳送與接收更為迅速。 # 請參閱第4 -a圖與第4 ^圖,第4 _a圖為本發明 用以保濩企業内資料外流加密方法之流程圖(一),而 4 一b圖為本發明用以保護企業内資料 程圖(二),說明如下: ^ 首先透過一伺服器端1 〇 〇建立一 其維護功能(步驟40 0 ),此時請看牛貝料庫12〇及 第5圖為本發明飼服器端建V:服 圖;步驟A之後,先建立一管理人貝料庫之細部流程 伺服器端資料庫1 2〇執行存取功^果組11 〇使其可進入該 動態目錄模組130取得企業員工步驟4〇2),接著透過一 ,最後才將該資料存入該伺服端?群組資料(步驟4〇4) 然後再回到第4—a圖延續步驟(步糊)。 端200依據不同模式選擇與該伺之後的m 一使用者 41(0,連線的模式可分為主H100進行連線(步驟 被動連線模式(步驟42〇),分線摈式(步驟415),或是 〜進入步驟B與步驟C,這兩 1237178 、發明說明(7) 種連線的模式待陳述完第4_a圖及第4〜b 線完成“,該使用者端2〇〇取得及確 器、= 新之資料並進行單機作業(步驟43〇)柒100最 判斷是否有寫出一擋案資料至一 >卜 ^使用者端200 只丨了王 外接式健存設備^ η n + a 令(步驟440) ’若沒有收到寫出檔案資 :: 備3 0 0的命令,則該使用者端2〇〇持續監控(步驟 3〇〇的命令,則該使用者踹H / 接式儲存設備 尸一 /入外Λ ΐ 使用者端資料庫220取 :一女王s又疋(步驟460 ) ’此一安全設定係包含按照不同 joo用佑者/兮稱及電腦上特定的機器訊號。接著該使用者端 2依據該女全設定判斷是否需管制寫出該檔案資料( 4J0) ’若判斷不需要管制寫出該檔案資料,則該檔案資料 直2寫出至該外接式儲存設備300並為般檔(步驟49〇) ,接者將一寫出檔案之記錄檔存入使用者端資料庫22〇 (步驟4 9 5 ),若判斷有需要管制寫出該檔案資料,則該播 案資料透過一加岔方式寫出至該外接式儲存 -安全檔(步驟),最後接著將一寫出槽案之肴記錄;;子 入使用者端資料庫220 (步驟495 ),並結束本流程。 接著來說明步驟B之後的流程,請看到第6 一 a圖與第 β〜b圖,第6 —a圖為本發明使用者端主動連線模式之細 部流程圖(一)及第6 —b圖為本發明使用者端主動連線模 式之細部流程圖(二),說明如下·· 步驟B之後,首先透過一使用者端資料庫22〇取得該使 用者端20 0之一特徵(步驟50 0 ),此一特徵係指電腦機器辨To: Ϊ U data from the database 22 0 and send the data from the client 200. Same as user name and on computer. The above security settings are based on unspecified machine signals. The encryption method used by the client 2GG can be asymmetric encryption and symmetric encryption, and asymmetric encryption can be one of public key (PKI), RSA algorithm, and elliptic curve cryptography; and Symmetric encryption can be one of Blowfish, Triple DES, DES, IDEA, RC5, CAST-128 and RC2. The above-mentioned external storage device 300 can be connected from the floppy disk drive, optical disk drive, ζιρ, M0, recorder, universal serial bus (Universai "" M Bus; USB) connection cable to the universal serial bus Any one of a combination of a connection cable, a parallel port connection cable (Parallel Port), a serial port connection cable (Serial port), and a mobile information storage device. The server 100 described above stores a log file of the written file. This log file contains at least the following stops: the time when the file was written, the computer identification code, the user name, the file name written, and the file thumb. Pattern data structure) and random fragment content. Next, see the second figure, which is a schematic diagram of the user terminal of the present invention writing data to an external storage device. The user end 20 can communicate with the server end 100 through the user end sending and receiving interface 24 to keep the information in the user end database 220 up to date 1237178. V. State of the invention description (6) When you want to move the file to the external storage device 300, it will encrypt this file through the aforementioned encryption method to create an encrypted security file 3 50. If other people want to open the encrypted security file 3 500, It will be presented in cipher text, making it impossible for anyone to read. '' Please refer to the figure, Figure 3 is the relationship between the server end of the present invention and a plurality of user end connections. This figure is mainly to explain that a server end in the enterprise 1 0 0 transmits and receives the interface through the server end. 4 〇 and a plurality of user-side transmitting and receiving interfaces 24a ~ 24n of 20a ~ 200n respectively, so as to make data transmission and reception more rapid. # Please refer to Figure 4-a and Figure 4 ^, Figure 4 _a is a flowchart (a) of the method for encrypting data out of the enterprise in accordance with the present invention, and Figure 4 a and b is a method for protecting the enterprise in accordance with the present invention The internal data flow chart (2) is described as follows: ^ First, a maintenance function (step 40) is established through a server end 100. At this time, please see the beef and shellfish storehouse 120 and FIG. 5 for the feed of the present invention. Server-side construction V: server diagram; after step A, first establish a detailed process of the manager's shell database server-side database 1 2 0 to perform the access function ^ fruit group 11 0 so that it can enter the dynamic directory module 130 Get the enterprise employee step 402), then go through one, and finally save the data to the server? Group data (step 404) and then return to Figure 4-a to continue the steps (step paste). The terminal 200 selects the m-user 41 (0) after the server according to different modes. The connection mode can be divided into the connection to the main H100 (step passive connection mode (step 42)), and the split line mode (step 415). ), Or ~ Enter step B and step C, the two 1237178, invention description (7) The connection mode is to be completed. Figures 4_a and 4 ~ b are completed. The user terminal 2000 obtains and Validator, = New data and stand-alone operation (step 43) 柒 100 The most judgement is whether there is a case file written to one > Bu ^ 200 on the user side 丨 Wang external storage device ^ n n + a command (step 440) 'If no write file data is received :: prepare for 3 00's command, the user's terminal 200 will continue to monitor (command at 3'00, then the user 踹 H / Connected storage device corpse / enter Λ ΐ ΐ User database 220 fetch: a queen s again 步骤 (step 460) 'This security setting contains different users / names and specific machines on the computer Signal. Then the user terminal 2 judges whether it is necessary to control the writing of the file data according to the female all settings (4J0) ' If it is judged that it is not necessary to control the writing of the file data, the file data is directly written to the external storage device 300 as a normal file (step 49), and the user saves a recorded file of the written file to the user terminal. Database 22 (step 4 95), if it is judged that it is necessary to control the writing of the file data, the broadcast data is written to the external storage-security file (step) by a plus method, and finally a Write out the dish record of the case; sub-enter the user-side database 220 (step 495), and end this process. Next, to explain the process after step B, please see Figure 6 aa and β ~ b Figure 6-a is a detailed flowchart (1) of the active connection mode of the user terminal of the invention and Figure 6-b is a detailed flowchart (2) of the active connection mode of the user terminal of the invention, which is described as follows. · After step B, first obtain a feature of the client 200 (step 50 0) through a client database 22o. This feature refers to the identification of the computer machine.

第11頁 1237178 五、發明說明(8) 識碼及使用者名稱,接著透過—使用者端傳送接收介面 240發送一同步資料之命令(步驟5〇2),發送完 一伺服器端傳送接收介面U0接收該同步資料之命//進過 入該祠服器端資料庫12〇(步驟5〇4),其 進 庫12〇比對該^徵是否正確(步_6),若該特貝;; <1 回報錯誤汛息至該使用者端2〇〇(步驟52 0 ),此時該使用 者端20 0針對該使用者端資料庫22〇設定限制以 流(步驟522);若該特徵正確無誤,則透過該免貝端^外 料庫120判斷該使用者端資料庫22〇是否需進行同步比對貝 (步驟510) ’若該使用者端資料庫22〇不需要進行同步比對 則將該寫出檔案之記錄檔存入該伺服器端牛 ^40) ; ^該使用者端資料庫22〇需要進行同步比=2〇(則步 拉該伺服益端資料庫12〇更新的資料透過該 1 '仃接收並存入該使用者端資料庫22〇(步驟 w z ),並結束本流程。 200需本要圖動連線模式的觸發之時機可從該使用者端 連通服器端100取回資料或是開機後第—次網路 。通或疋s玄使用者端2〇〇自由設定一時間週期中任意一種 接著來說明步驟C之後的詳細流程,步驟C可分A H器端m通知改變設定(步驟⑴及直接透過飼^^ 第(步驟c2),如第7—a圖及第7〜b圖, a圖為本發明使用者端被動連線模式且透過词服器 1237178 五、發明說明(9) 端通知改變設定的細部流程圖及第7 一b圖為本發明使用 者端被動連線模式且直接透過伺服器端傳送改變設定的細 部流程圖,說明如下:Page 11 1237178 V. Description of the invention (8) Identification code and user name, and then send a command for synchronizing data through the user-side transmission and receiving interface 240 (step 502), and send a server-side transmission and reception interface U0 receives the order of the synchronization data // and entered the server database 12 (step 504), and whether the ratio of entering the database 12 is correct (step _6). ; < 1 Report error flooding to the client 200 (step 52 0), at this time the client 200 sets a limit to flow to the client database 22 (step 522); if If the feature is correct, it is judged whether the client database 22 needs to be synchronized through the shell-free external database 120 (step 510) 'If the client database 22 does not need to be synchronized For comparison, the log file of the written file is stored in the server end of the server ^ 40); ^ The user database 22 needs to be synchronized = 20 (step by step pulling the server benefit end database 12) The updated data is received and stored in the user database 22 (step wz) through the 1 ′, and the process ends. 20 0 The timing of triggering the connection mode is required to retrieve the data from the user terminal to the server 100 or the first time network after booting. It can be set freely through the user terminal. Any one of a time period will then explain the detailed process after step C. Step C can be divided into AH device m to notify the change of settings (step ⑴ and directly through the feed ^^ (step c2), as shown in Figure 7-a and Figure Figure 7 ~ b, Figure a is the passive connection mode of the user terminal of the present invention and through the word server 1237178 V. Description of the invention (9) Detailed flow chart of the notification change setting of the terminal and Figure 7b is the user terminal of the present invention The detailed flow chart of the passive connection mode and changing the settings directly through the server is explained as follows:

步驟C1之後’該伺服器端1 〇 〇判斷一管理介面模組1 ! 〇 是否有變更安全設定(步驟600),若沒有變更安全設定, 則該祠服器端1 0 0持續監控(步驟6 1 〇 ),並重回到步驟6 〇 〇 ;若有變更安全設定,則該伺服器端1 〇 〇透過該伺服器端 傳送接收介面140通知各使用者端2〇〇需改變安全設定(步 驟620 ),然後各使用者端2 0 0透過該使用者端傳送接收介 面240接收該通知訊號並向該伺服器端傳送接收介面14〇要 求取回新的安全設定(步驟6 3 0 ),最後,該伺服器端1〇〇透 過該管理介面模組1 1 0回傳新的安全設定給該使用者端2 〇 〇 ,該使用者端200並存入至該使用者端資料庫220(步驟640 ),並結束C1之流程。 步驟C 2之後,該伺服器端1 0 0判斷一管理介面模組1 1 〇 是否有變更安全設定(步驟6 50 ),若沒有變更安全設定, 則該伺服器端持續監控;若有變更安全設定,則透過該伺 服器端傳送接收介面140直接傳送新的安全設定至該使用 者端傳送接收介面240(步驟670),最後,該使用者端傳送 接收介面240將新的安全設定存入該使用者端資料庫220 (步驟680 )。 雖然本發明以較佳之實施例揭露如上,然其並非用以 限定本發明,任何熟習此技藝者,在不脫離本發明之精神 和範圍内,當可作些許之更動與潤飾,因此本發明之保護After step C1, the server side 1 determines whether a management interface module 1 has changed the security setting (step 600). If the security setting is not changed, the server end 1 0 0 continuously monitors (step 6) 1 〇), and return to step 6 〇 〇; if there is a change in security settings, the server side 〇 00 through the server-side transmission and receiving interface 140 to notify each user side 200 need to change the security settings (step 620), then each user terminal 200 receives the notification signal through the user terminal transmission and receiving interface 240 and sends the receiving interface 14 to the server terminal to request to retrieve the new security settings (step 6 3 0), and finally , The server 100 returns the new security setting to the user 200 through the management interface module 110, and the user 200 is stored in the user database 220 (step 640), and end the process of C1. After step C 2, the server end 100 determines whether a management interface module 1 110 has changed the security setting (step 6 50). If the security setting has not been changed, the server side continuously monitors; if there is a change in security Settings, the server-side transmitting and receiving interface 140 directly transmits the new security settings to the user-side transmitting and receiving interface 240 (step 670), and finally, the user-side transmitting and receiving interface 240 stores the new security settings into the The client database 220 (step 680). Although the present invention is disclosed in the preferred embodiment as above, it is not intended to limit the present invention. Any person skilled in the art can make some changes and decorations without departing from the spirit and scope of the present invention. protection

1237178 五、發明說明(ίο) 範圍當視後附之申請專利範圍所界定者為準 IBii 第14頁 1237178 圖式簡單說明 【圖式簡單說明】 第1圖為本發明用以保護企業内資料外流的加密系統之系 統架構圖; 第2圖為本發明之使用者端將資料寫出至外接式儲存設備 之示意圖; 、 第3圖為本發明伺服器端與複數個使用者端連間之關係圖 第4 一 a圖為本發明用以保護企業内資料外流加密方法之 流程圖(一); 第4 -b圖為本發明用以#護企業内資料外流加密方法之 流程圖(二); 第5圖為本發明伺服器端建立伺服器端資料庫之細部流程 圖; 第6 —a圖為本發明使用者端主動連線模式之細部流程 (-); ° 第6 ~ b圖為本發明使用者端主動連線模式之細部流程 (二); L王圖 器 過伺 第7 ~^圖1*為4本發明使用者端被動連線模式且透過伺 第d j文變設定的細部流程圖;* 服 ¥ 發明使用者端被動連線模式且直接it 〔符Λ傳送改變設定的細部流程圖 1付唬說明〕 ^ 100 110 伺服器端 管理介面模組1237178 V. Scope of Invention (ίο) Scope shall be determined by the scope of the appended patent application. IBii Page 14 1237178 Schematic Illustration [Schematic Illustration] Figure 1 is used to protect the outflow of data in the enterprise. Figure 2 is a system architecture diagram of the encryption system; Figure 2 is a schematic diagram of the user terminal of the present invention writing data to an external storage device; and Figure 3 is a relationship between the server end of the present invention and a plurality of user terminals Figure 4a is a flowchart (a) of the method for protecting data outflow encryption in an enterprise according to the present invention; Figure 4 -b is a flowchart (b) of the method for protecting the data outflow encryption in an enterprise according to the present invention (2); Fig. 5 is a detailed flowchart of establishing a server-side database on the server side of the present invention; Fig. 6-a is a detailed flow of the active connection mode of the user side of the present invention (-); ° Figs. 6 ~ b are as follows The detailed flow of the user-side active connection mode of the invention (2); The L King charter overserving the 7th ~ ^ Figure 1 * is 4 the detailed flow of the user-side passive connection mode of the invention and the setting through the dj text change Figure; * Service ¥ Invention user end Passive connection mode and direct it [Detailed flow chart for changing the settings of the symbol Λ 1 for bluffing instructions] ^ 100 110 Server-side management interface module

第15頁 1237178Page 12 1237178

伺服器端資料庫 動態目錄模組 圖式簡單說明 120 130 140 伺服器端傳送接收介面 2 0 0 使用者端 200a〜20 0η 使用者端 210 核心功能模組 220 使用者端資料庫 230 使用者介面模組 240 使用者端傳送接收介面 240a〜240η 使用者端傳送接收介面 3 0 0 外接式儲存設備 3 5 0 加密安全檔 步驟400 透過一伺服器端建立一 維護功能 伺服器端資料庫 及其 步驟402 步驟404 步驟406 步驟410 步驟415 步驟420 步驟430 ρ Λ®偎殂使其可推λ 資料庫執行存取功能 入該伺服器 透過一動態目錄模組取得企 組資料 菜貝工及部門 :該資料存入該飼服器端資料庫 一使用者端依據不同模式選 進行連線 ^遠词服器 主動連線模式 被動連線模式 該使用者端取得及確認該伺服器端 敬新之資Server-side database dynamic directory module diagram brief description 120 130 140 Server-side sending and receiving interface 2 0 0 User-side 200a ~ 20 0η Client-side 210 Core function module 220 User-side database 230 User-interface Module 240 User-side transmission and reception interface 240a ~ 240η User-side transmission and reception interface 3 0 0 External storage device 3 50 0 Encryption security file step 400 Establish a maintenance function server-side database and steps through a server side 402 step 404 step 406 step 410 step 415 step 420 step 430 ρ Λ® 偎 殂 so that it can push the λ database to perform the access function into the server to obtain enterprise data through a dynamic directory module Vegetables and departments: the Data is stored in the feeder database. A client chooses to connect according to different modes. ^ Far word server Active connection mode Passive connection mode The client obtains and confirms the server's new resources

12371781237178

步驟440 步驟450 步驟460 料並進行單機作業 該使用者端判斷是否有 外接式儲存設備之命令Step 440 Step 450 Step 460 Data and stand-alone operation The user terminal determines whether there is an order for an external storage device

該使用者端持續監控 該使用者端向一使用者端資料庫取得一 設定 全 步驟470 該使用者端依據該安全設定判斷是否需管制 寫出該檔案資料 步驟480 該檔案資料透過一加密方式寫出至該外接式 儲存設備並為一安全檔 步驟490 該檔案資料直接寫出至該外接式儲存設備並The client continuously monitors the client to obtain a setting from a client database. Step 470 The client determines whether to write out the file data according to the security setting. Step 480 The file data is written in an encrypted manner. Step 490 export the file data to the external storage device and write it to the external storage device.

為·--般稽 W 步驟495 將一寫出檔案之記錄檔存入伺服器端資料庫 步驟50 0 透過一使用者端資料庫取得該使用者端之一 特徵 步驟5 0 2 步驟5 04 步驟5 〇 6 步驟51〇 步驟5 2 〇 少驟5 2 2 透過一使用者端傳送接收介面發送一同步資 料之命令 胃 透過一伺服器端傳送接收介面接收該同步資 料之命令並進入該伺服器端資料庫 該伺服器端資料庫比對該特徵是否正確 透過該伺服器端資料庫判斷該使用者端資料 庫是否需進行同步比對 > 回報一錯誤訊息至該使用者端 該使用者端針對該使用者端資料庫設定限制For ... --- General W Step 495 Save a log file of the written file to the server-side database Step 50 0 Get a characteristic of the client through a client database Step 5 0 2 Step 5 04 Step 5 〇 step 51 〇 step 5 2 〇 less step 5 2 2 send a command of synchronization data through a user-end transmission and reception interface stomach receive a command of synchronization data through a server-side transmission and reception interface and enter the server side Database The server-side database compares whether the feature is correct. Use the server-side database to determine whether the client-side database needs to be compared. ≫ Report an error message to the client. Limits on this client database

第17頁 1237178 步驟610 步驟620 步驟630 步驟640 步驟650 步驊66〇 以避免資料外流 服f端資料庫更新的資料透過該伺服 β知傳达接收介面進行傳 = ;接收介面進行接收並存入該使 ^該寫出槽案之記錄標存人該飼服器端資料 ,=f f端判斷一管理介面模組是否有變更 安全设定 該伺服器端持續監控 ㈣服㈣透過該㈣ϋ端傳送接收介面通 知各使用者端需改變安全設定 該各使用者端透過該使用者端傳送接收面接 收該通知訊號並向該伺服器端傳送接收介面 要求取回新的安全設定 該伺服器端透過該管理介面模組回傳新的安 該使用者端,該使用者端並存入至 該使用者端資料庫 端判斷-管理介面模組是否有變更 該祠服器端持續監控 透過該飼服墙僖$ i & a γ + 々八# 為^得逆接收介面直接傳送新的 文王=ί該使用者端傳送接收介面 該使用者端傳送接收介面將新的安全設定存 第18頁 1237178 圖式簡單說明 入該使用者端資料庫 圓國 第19頁Page 17 1237178 Step 610 Step 620 Step 630 Step 640 Step 650 Step 骅 66. To avoid data outflow, the updated data on the f-end database is transmitted through the server. The receiving interface is used to transmit =; The ^ should write the record of the slot case, and store the data of the feeder side. The ff side judges whether a management interface module has changed the security setting. The server side continuously monitors the server and sends and receives it through the terminal. The interface notifies each user terminal that the security settings need to be changed. Each user terminal receives the notification signal through the user terminal's transmitting and receiving surface and sends a receiving interface to the server terminal to request the retrieval of new security settings. The server terminal passes the management The interface module returns a new security client, and the client is stored in the database of the user to determine whether the management interface module has been changed. The server end is continuously monitored through the feeding wall. $ i & a γ + 々 八 # to send the new King of text directly to the receiving interface = ί the client sends and receives the interface and the client sends and receives the interface to save the new security settings 18 1237178 Schema simple instructions on page 19 of the user end database into the country round

Claims (1)

1237178 六 申請專利範圍 .一種用以 伺服器端 器端完整 所寫出檔 該伺服 業内部之 用記錄, 能,並至 一祠服 之資料與 取; 一管理 人員可直 一動態 量目錄存 Protocol 存至該伺 一伺服 料並回存 發出之資 該使用 設定進行 以達資料 一使用 供 空間存放該使用者端1237178 Scope of six patent applications. A kind of file used to complete the server end and the internal record of the server industry. It can be used to obtain the information and information of a temple service. A manager can directly store a dynamic volume of the protocol. Deposit to the servo server and return the issued funds, the use settings should be made to achieve data, use space for storing the user terminal 第20頁 保護企業内資料外流的加密系統,係透過— 與至少一個一使用者端所組成,藉由該祠, 記錄所有寫出的動作並透過該使用者端^ $ 案,以避免企業資料外流,該系統更包含: 器端,係用以接收傳送資料,並整合管理企 資料,儲存了一安全設定與該使用者端的使 以及更新該使用者端中該安全設定資料之功 少包含: 器端資料庫,係提供一空間存放該祠服器立而 其他外來輸入的資料,並使其資料玎直接存 介面模組,係提供一管理介面,讓系統操作 接下達指令並管理該伺服器端; 目錄模組(Active Directory),係可透過輕 取通訊協定(Lightweight Directory Access ’ LDAP)取得企業員工及部門群組資料,並回 服器端資料庫; 、 器端傳送接收介面,係接收該使用者端之資 至該词服器端資料庫及傳送該伺服器端所欲 料; f端,係用以接收傳送資料,並透過該安全 ,,操作寫出一一般檔及一安全檔的作業, π进的功能’並至少包含: ' 者端資料庫,係 1237178 六、申請專利範圍 之資料與其他外來輸入的資料,旅使其資 取; 一核心功能模組,係為一保護機制’以 者端資料外流,透過該安全設定判別該一 全檔之差異; 一使用者介面模組,係為一使用者介面 該安全設定之後對一寫出檔案加密,並在 樓案到一外接式儲存設備時,要求該核心 行;及 ο 、使用者‘傳送接收介面,係接收該飼 料並回存至該使用者端資料庫及傳送該使 發出之資料。 2 ·如申請專利範圍第1項所述之用以保護企 流的加密系統,其中該使用者端與該伺服 一企業内部區域網路(Intranet)加以連結 3 ·如申請專利範圍第f項所述之用以保護企 流的加密系統,其中該安全設定係包含按 者名稱及電腦上特定的機器訊號。 4 ·如申請專利範圍第3項所述之用以保護企 流的加密系統,其中該加密的方式可為一 加密及一對稱式的加密。 5·如申請專利範圍第4項所述之用以保護企 流的加密系統,其中該非對稱式的加密可 (PKI ) 演算法及橢圓曲線密碼的組^ 料可直接存 防止該使用 般檔與該安 ,可在取得 送出該寫出 功能模組放 服器端之資 用者端所欲 業内資料外 器端係透過 〇 業内資料外 照不同使用 業内資料外 非對稱式的 業内資料外 從公開金鑰 卜中任意擇 1237178 六、申請專利範圍 6 ·如申請專利範圍第4項所述之用以保護企業内資料外 流的加密系統,其中該對稱式的加密可從Blow fish、 Triple DES 、DES 、IDEA 、RC5 、CAST-128 及RC2 的組 合中任意擇一。 7 ·如申請專利範圍第1項所述之用以保護企業内資料外 流的加密系統,其中該一般檔係指未經由加密之播案 並以明文方式呈現。 8 ·如申請專利範圍第1項所述之用以保護企業内資料外The encryption system that protects the outflow of data in the company on page 20 is composed of-and at least one user terminal. With this shrine, all actions written are recorded and passed through the user terminal ^ $ case to avoid corporate data Outflow, the system further includes: a server side, which is used to receive and transmit data, integrate management company data, store a security setting and the client's use, and update the security setting data in the client. The functions include: The server-side database provides a space for storing the externally input data of the temple server, and stores its data directly in the interface module. It provides a management interface for system operations to issue instructions and manage the server. End; Active Directory, which can obtain enterprise employee and department group data through Lightweight Directory Access (LDAP), and return to the server-side database; User-end data to the server-side database and send the server-side expectations; f-side is used to receive the transmitted data, and transparently This security, the operation of writing a general file and a security file, the function of π 'includes at least:' the client database, which is 1237178 VI. Patent application data and other externally input data, travel agents Its capital gains; a core function module, which is a protection mechanism, which uses the user-side data to flow out, and discriminates the full file difference through the security settings; a user interface module, which is a security setting for a user interface Then write a file to encrypt and request the core line when the building file is connected to an external storage device; and ο, the user's sending and receiving interface is to receive the feed and return it to the user database and Send the information sent by the messenger. 2 · Encryption system for protecting business flow as described in item 1 of the scope of patent application, wherein the client is connected to the server-intranet of an enterprise 3 · As stated in item f of the scope of patent application Describes the encryption system used to protect corporate traffic, where the security settings include the name of the person and specific machine signals on the computer. 4 • The encryption system used to protect corporate flows as described in item 3 of the scope of patent application, wherein the encryption method can be an encryption and a symmetric encryption. 5. The encryption system used to protect business flows as described in item 4 of the scope of the patent application, wherein the asymmetric encryption algorithm (PKI) algorithm and the combination of elliptic curve passwords can be directly stored to prevent the use of files and files. The security can be obtained by the user who sends the write-out function module server end to the industry data. The external device end is through different types of industry data and external photos. Data can be arbitrarily selected from the public key 1237178 VI. Patent Application Scope 6 · The encryption system used to protect the outflow of data in the enterprise as described in item 4 of the patent application scope, where the symmetric encryption can be obtained from Blow fish, Choose from Triple DES, DES, IDEA, RC5, CAST-128 and RC2. 7 • The encryption system used to protect the outflow of data in the enterprise as described in item 1 of the scope of the patent application, where the general file refers to an unencrypted broadcast and is presented in clear text. 8 To protect data inside and outside the enterprise as described in item 1 of the scope of patent application 流的加密系統,其中該安全檔係指經由加密之檔案並 以密文方式呈現。 9 ·如申請專利範圍第1項所述之用以保護企業内資料外 流的加密系統,其中該外接式儲存設備可從軟碟機、 光碟機、Z IP、M0、燒錄機、萬用串列匯流排 (Universal Serial Bus ; USB)連接線至萬用串列匯 流排連接線、並行埠連接線(paral lel ρ〇“)、串列 槔連接線(Serial P〇rt)及移動式資訊儲存裝置的組 合中任意擇一。Stream encryption system, where the security file refers to an encrypted file and is presented in cipher text. 9 · The encryption system used to protect the outflow of data in the enterprise as described in item 1 of the scope of the patent application, where the external storage device can be from floppy disk drive, optical disk drive, Z IP, M0, burner, universal string Universal Serial Bus (USB) cable to universal serial bus cable, parallel port cable (paral lel ρ〇 "), serial port cable (Serial Port) and mobile information storage Choose any combination of devices. 1 0 ·如申請專利範圍第丄項所述之用以保護企業内資料外 流的加密系統,其中該伺服器端存放一 記錄播’該記錄檔至少包含下列欄位:一=㈡ =名:電腦機器辨識碼、一使用者名稱、一“之 =業j稱、一檔案拇指紋(MD5資料結構)及一隨機片1 0 · The encryption system used to protect the outflow of data in the enterprise as described in item 丄 of the scope of the patent application, wherein the server stores a record broadcast 'The record file contains at least the following fields: = name: computer Machine identification code, a user name, an "of = industry title", a file thumbprint (MD5 data structure) and a random piece 第22頁 1237178 六、申請專利範圍 1 1 · 一種用以保護 端完整 寫出檔 列步驟 該伺服 用者端 用者端 作業; 用者端 備之命 用者端 用者端 料; 案資料 伺服器 加密所 包含下 透過 能; 該使 線; 該使 行單機 該使 儲存設 該使 該使 檔案資 該播 維護功 備並為一安全 將一寫出檔 1 2 ·如申請專利範 外流的加密方 器端資料庫及 建立一管王里 執行存取功能 透過一動態 ,業内資料外流的加密方法,係藉由一 2錄所有寫出的動作並透過一使用者端 ? 以避免企業資料外流,該方法至少 器端建立一伺服器端資料庫及其 依據不同模式選擇與該㈣器端進行連 取得及確認該词服器端最新之資料並進 判斷是否有寫出一檔案資料至一外接 令; I 向一使用者端資料庫取得—安全机 依據該安全設定判斷是否 =’ 丨疋货而官制寫出該 透過一加密方式寫出至該 檔;及 卜接式儲存設 案之記錄檔存入伺服器端資料庫。 圍第1 1 $所述之用以保護企業内 法’其中將透過該伺服器端建立服 介面模組使其可進入;;:::t驟: • 次1 j服裔端資料庫 9 目錄模組取得企業員工及 久°卩門群組資料Page 22 1237178 VI. Scope of patent application 1 1 · A step to protect the server from writing out the complete file steps The server user-side user-side operation; the user-side command the user-side user-end material; the case data servo Encryption included in the device; transmission line; the transmission line; the storage line; the storage line; the storage line; the storage file; the maintenance file; and the write-out file for a secure file. The database of the square device and the establishment of a Wangli executive access function. Through a dynamic, industry-wide data outflow encryption method, record all the written actions through a user terminal to avoid the outflow of corporate data. , The method at least establishes a server-side database on the server side and chooses to connect with the server side according to different modes to obtain and confirm the latest data of the server and to determine whether a file data has been written to an external order ; I obtain from a user-end database—the security machine judges according to the security setting whether it is equal to '' 疋 goods and the official system writes the file to the file through an encryption method; Storage case-fit set of log files stored in the BU end database server. The method described in Section 1 1 $ is used to protect the internal law of the enterprise, where a server interface module will be established through the server to make it accessible; ::: t-step: • times 1 j server database 9 directory Module to obtain corporate employee and long-term door group data 第23頁 I237l78Page 23 I237l78 申請專利範圍 及將該 3·如申請 外流的 揮與該 主動連 14·如申請 外流的 驟: 透過 透過 令; 透過 令並進 該伺 透過 需進行 將該 送接收 該使 端資料 1 5.如申清 外流的 及一使 資料存入該伺服器端 專利範圍第1 1項所 加密方法,其中將該 伺服器端進行連線的 線模式與一被動連線 專利範圍第1 3項所 加密方法,其中該主 該使用者端資料庫取 該使用者端傳送接收 資料庫。 述之用以保護 使用者端依據 步驟,不同模 模式。 述之用以保護 動連線模式, 得該使用者端 介面發送一同 企業内資料 不同模式選 式可分為一 企業内資料 包含下列步 之一特徵; 步資料之命 該伺服 入該4司 服器端 該伺服 同步比 伺服器 介面進 用者端 庫。 專利範 加密方 用者名 器端傳 服器端 資料庫 器端資 對; 端資料 行傳送 傳送接 圍第1 法,其 稱0 送接收介面接收該同步資料之命 資料庫; 比對該 料庫判 特徵是否正確 斷該使用者端 庫更新 :及 收介面 4項所 中該特 的資料透過該 進行接收並存 述之用以保護 欲係指一電腦 資料庫是否 伺服器端傳 入該使用者 企業内資料 機器辨識碼Scope of applying for a patent and the 3. If you apply for an outflow with the active company 14: If you apply for an outflow: Through the order; Through the order; The order is merged with the server; you need to send and receive the messenger information 1 5. If you apply The method of encrypting the outflow and storing the data into the server-side patented item 11 of the encryption method, wherein the line mode for connecting the server-side and the passively-connected method of the encrypted item 13 of the patent range, Wherein, the main client database is obtained from the client transmitting and receiving database. It is described to protect the user end according to the steps, different modes. It is described to protect the dynamic connection mode. The user interface can send the data in the enterprise together. The different mode options can be divided into an enterprise data including one of the following steps. The order of the data should be entered into the 4 server. The server-side synchronization of the server is more user-side than the server interface. Patent Fan Encryption User name server-side server-side database server-side data pair; end-of-line data transfer transmission method 1 method, which is called 0 send-receive interface to receive the synchronization data database; compare the data Whether the database judges the characteristics correctly to update the user-side database: and the specific data in the 4 items of the receiving interface are received and described through it. The purpose of protection is to refer to whether a computer database has been transmitted to the user by the server. Enterprise Data Machine ID I237178 六、申請專利範圍 1 6 ·如申請 外流的 或一使 1 7.如申請 外流的 從該使 一次網 合中任 18·如申請 外流的 透過伺 送改變 19·如申請 外流的 ’包含 該伺 定; 該伺 用者端 各使 知訊號 全設定 該伺 給該使 專利範圍第1 加密方法,其 用者名稱。 專利範圍第1 加密方法,其 用者端需要向 ^連通及該使 思擇一〇 專利範圍第1 加密方法,其 服器端通知改 設定。 專利範圍第1 加密方法,其 下列步驟: 服器端判 4項所述之用以保護企 中δ亥特徵係指一電腦機 4項所述之用以保護企 中該主動連線模式觸發 該伺服器端取回資料、 用者端自由設定一時間 3項所述之用以保護企 中該被動連線模式,又 變設定及一直接透過伺 8項所述之用以保護企 中該透過伺服器端通知 業内資料 器辨識碼 業内資料 之時機可 開機後第 週期的組 業内資料 可分為一 服器端傳 業内資料 改變設定 服器端透 需改變安全設 用者端透過一 並向該伺服器 ;及 服器端透過該 用者端,該使 斷一管理介面模組是否有變更安全設 過 伺服器端傳送接收介面 定; 使用者端傳送接收介面 端傳送接收介面要求取 管理介面模組回傳新的 用者端並存入至該使用 通知各使 接收該通 回新的安 安全設定 者端資料I237178 6. Scope of patent application 1 6 · If applying for exodus or a messenger 1 7. If applying for exodus, he should be taken out of the net for one time 18 · If applying for exodus through servo change 19 · If applying for exodus' includes this Servo; each of the users of the server sets the notification signal to set the first encryption method of the patent range, and its user name. For the first encryption method in the patent scope, the user side needs to communicate to ^ Connect and the user. The first encryption method in the patent scope needs to be notified by the server. The first encryption method in the scope of patent includes the following steps: The server end judges the δH feature described in item 4 to refer to a computer to protect the active connection mode in the item to trigger the The server side retrieves the data, the user side is free to set a time described in 3 items to protect the passive connection mode in the enterprise, and changes the settings and a direct pass through to serve the 8 items described in the enterprise to protect the communication. The server side informs the industry data server ID when the industry data can be turned on. The group of industry data can be divided into one server side and the industry data is changed. The server side needs to be changed. The user side needs to change the security settings. And to the server; and the server side, through the user side, whether to break a management interface module has been changed to set the server-side transmission and reception interface settings; the user-side transmission and reception interface side sends and receives the interface request to obtain The management interface module returns a new user side and stores it in the use notification to enable the user side to receive the new security settings. 第25頁 1237178 六、 申請專利範圍 庫0 以保護企業内資料 伺服器端傳送改變 是否有變更安全設 2 〇 ·如申請專利範圍第1 8項所述之用 外流的加密方法,其中該直接透過 設定,包含下列步驟; 該伺服器端判斷一管理介面模組 定; 透過一伺服器端傳送接收介面直接傳送新的安全設 定至一使用者端傳送接收介面;及 該使用者端傳送接收介面將新的安全設定存入該使 用者端資料庫。 〇 2 1.如申請專利範圍第1 1項所述之用以保護企業内資料 外μ的加也、方法’其中該外接式儲存設備可從軟碟機 、光碟機、Ζ IΡ、Μ0、燒錄機、萬用串列匯流排 (Universal Serial Bus ; USB)連接線至萬用串列匯 流排連接線、並行蜂連接線(P a r a 1 1 e 1 Ρ 〇 r t)、串列 淳連接線(Serial Port)及移動式資訊儲存裝置的組 合中任意擇一。 2 2 ·如申請專利範圍第1 1項所述之用以保護企業内資料 外流的加密方法,其中該安全設定係包含按照不同使 用者名稱及電腦上特定的機器訊號。 2 3 ·如申請專利範圍第1 1項所述之用以保護企業内資料 外流的加密方法,其中該加密方式可為一非對稱式的 加密及一對稱式的加密。 2 4 ·如申請專利範圍第2 3項所述之用以保護企業内資料Page 25 1237178 VI. Patent application scope library 0 to protect the data server in the enterprise to transmit changes to the server whether there are changes to the security settings 2 0. The outbound encryption method as described in item 18 of the patent application scope, which is directly transmitted through The setting includes the following steps; the server determines a management interface module; sends a new security setting directly to a user sending and receiving interface through a server sending and receiving interface; and the user sending and receiving interface will New security settings are stored in the client database. 〇1. As described in item 11 of the scope of the patent application, the method of adding μ to protect the internal data of the enterprise, the method 'wherein the external storage device can be from a floppy disk drive, optical disk drive, Z IP, M0, burning Recorder, universal serial bus (Universal Serial Bus; USB) cable to universal serial bus cable, parallel bee cable (Para 1 1 e 1 Ρ 〇rt), serial cable ( Serial Port) and mobile information storage device. 2 2 · The encryption method used to protect the outflow of data in the enterprise as described in item 11 of the scope of the patent application, where the security settings include different user names and specific machine signals on the computer. 2 3 · The encryption method used to protect the outflow of data in the enterprise as described in item 11 of the scope of patent application, wherein the encryption method can be an asymmetric encryption and a symmetric encryption. 2 4 · Used to protect enterprise data as described in item 23 of the scope of patent application 1237178 六、申請專利範圍 外流的加密方法,其中該非對稱式的加密可從公開金 鑰(PKI )、RSA演算法及橢圓曲線密碼的組合中任意擇 企業内資料 從 、CAST-128 企業内資料 檔,該記錄 、一電腦機 名稱、一檔 容。 企業内資料 服器端係透 結。 2 5.如申請專利範圍第2 3項所述之用以保護 外流的加密方法,其中該對稱式的加密可 Blowfish 、 Triple DES 、 DES 、 IDEA 、 RC5 及RC2的組合中任意擇一。 2 6.如申請專利範圍第1 1項所述之用以保護 外流的加密方法,其中該寫出檔案之記錄 檔至少包含下列攔位:一寫出檔案之時間 器辨識碼、一使用者名稱、一寫出之檔案 案拇指紋(MD5資料結構)及一隨機片段内 2 7.如申請專利範圍第1 1項所述之用以保護 外流的加密方法,其中該使用者端與該伺 過一企業内部區域網路(Intranet)加以連1237178 VI. Out-of-patent encryption method, in which the asymmetric encryption can be arbitrarily selected from the combination of public key (PKI), RSA algorithm, and elliptic curve password. CAST-128 enterprise data file , The record, a computer name, and a file. The data server end of the enterprise is fully connected. 2 5. The encryption method for protecting outflow as described in item 23 of the scope of patent application, wherein the symmetric encryption can be selected from any combination of Blowfish, Triple DES, DES, IDEA, RC5 and RC2. 2 6. The encryption method used to protect the outflow as described in item 11 of the scope of the patent application, wherein the record file of the write-out file includes at least the following stops: a timer identifier for writing the file, a user name 1. A file with a thumbprint (MD5 data structure) and a random fragment within the file. 7. The encryption method used to protect the outflow as described in item 11 of the patent application scope, where the client and server have A corporate intranet 第27頁Page 27
TW92120900A 2003-07-30 2003-07-30 A encryption system and method of securing internal business data TWI237178B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW92120900A TWI237178B (en) 2003-07-30 2003-07-30 A encryption system and method of securing internal business data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW92120900A TWI237178B (en) 2003-07-30 2003-07-30 A encryption system and method of securing internal business data

Publications (2)

Publication Number Publication Date
TW200504510A TW200504510A (en) 2005-02-01
TWI237178B true TWI237178B (en) 2005-08-01

Family

ID=36821359

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92120900A TWI237178B (en) 2003-07-30 2003-07-30 A encryption system and method of securing internal business data

Country Status (1)

Country Link
TW (1) TWI237178B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI573079B (en) * 2007-01-08 2017-03-01 精品科技股份有限公司 Information security management system and method for electronic document

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI573079B (en) * 2007-01-08 2017-03-01 精品科技股份有限公司 Information security management system and method for electronic document

Also Published As

Publication number Publication date
TW200504510A (en) 2005-02-01

Similar Documents

Publication Publication Date Title
US11153290B2 (en) Advanced security protocol for broadcasting and synchronizing shared folders over local area network
US11159312B2 (en) Secure data exchange network
JP5242134B2 (en) Private network system and method
KR101883146B1 (en) Providing devices as a service
US8738750B2 (en) System and method for efficient replication of and access to application specific environments and data
US10382197B1 (en) Key management and dynamic perfect forward secrecy
US9654288B1 (en) Securing group communications
WO2016197764A1 (en) Data processing method, apparatus and system based on mobile application entrance
US11509488B2 (en) Secure time-to-live
US10129260B1 (en) Mutual privacy management
CN110690967A (en) Instant communication key establishment method independent of server security
TWI237178B (en) A encryption system and method of securing internal business data
CN101167333A (en) Method and apppratus for communicating information between devices
US12074882B2 (en) System and method for providing authenticated entities access to a user's metadata and data
TWI244849B (en) An internal business data decryption method
Li et al. Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers
KR20250048631A (en) One-time cloud file upload system without login using transmission code
Suthar et al. PMS-Sharing: Framework for Automatically Authenticating users in a Group to Allow Sharing Storage
AU2013204382B2 (en) A private network and system
Ferguson et al. Key negotiation
Bhutada et al. Adopting Encryption for Intranet File Communication System

Legal Events

Date Code Title Description
MK4A Expiration of patent term of an invention patent