TWI237178B - A encryption system and method of securing internal business data - Google Patents
A encryption system and method of securing internal business data Download PDFInfo
- Publication number
- TWI237178B TWI237178B TW92120900A TW92120900A TWI237178B TW I237178 B TWI237178 B TW I237178B TW 92120900 A TW92120900 A TW 92120900A TW 92120900 A TW92120900 A TW 92120900A TW I237178 B TWI237178 B TW I237178B
- Authority
- TW
- Taiwan
- Prior art keywords
- server
- data
- user
- file
- encryption
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000005540 biological transmission Effects 0.000 claims description 16
- 230000008859 change Effects 0.000 claims description 8
- 230000009471 action Effects 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 3
- 230000003287 optical effect Effects 0.000 claims description 3
- 241001441724 Tetraodontidae Species 0.000 claims description 2
- 239000012634 fragment Substances 0.000 claims description 2
- 230000007774 longterm Effects 0.000 claims description 2
- 239000000463 material Substances 0.000 claims description 2
- 230000007246 mechanism Effects 0.000 claims description 2
- 229940014425 exodus Drugs 0.000 claims 4
- 241000251468 Actinopterygii Species 0.000 claims 1
- 239000003795 chemical substances by application Substances 0.000 claims 1
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 3
- 230000010365 information processing Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 235000015278 beef Nutrition 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 235000015170 shellfish Nutrition 0.000 description 1
- 210000002784 stomach Anatomy 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 235000013311 vegetables Nutrition 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
Description
1237178 五、發明說明(1) 【發明所屬之技術領域】 ’特別是一種用以保 法〇 ^本务明係為一種槽案加密的方法 護企業内資料外流的加密系統及其方 【先前技術】 在科技一日千里的今曰 技術早已日漸普及,並且廣 訊處理裝置的功能亦越來越 時代,各個企業内無不加強 符合現今潮流的要求,以提 業正努力提升資訊處理裝置 生出其他相關的安全控管問 舉例來說,企業中所使 企業内部區域網路(Intrane 端與一個伺服器端所構成, 所以造成管理不易,然而, 透過網際網路外流,提供了 譬如:防火牆、防毒程式的 侵或是企業員工透過網際網 用外接式儲存設備讓資料外 不過針對上述問題,專 稱·用以追蹤資訊外流狀況 有長1出解決的手段,該發明 策略來執行不同的資料保護 ’資訊處理裝置與通訊相關的 泛應用在每—個領域,所以資 多元化’同時在這資訊爆炸的 其資訊處理裝置的週邊設備來 升企業的競爭力;不過,當企 週邊設備的同時,也相對地衍 題。 用的分散式系統,大多都透過 ΐ)加以連結,由複數個使用者 彼此間資料的流量相當驚人, 近年來為了避免企業内部資料 一些手段來解決上述的問題, 資訊安全系統,避免駭客的入 路讓資料外洩,此時,對於利 戌並無特別的保護方法。 利公告號第34330 1號,發明名 之資訊保全系統及方法一案’ 案的目的在於按照不同的保全 方法’其重點在於只要當企業1237178 V. Description of the invention (1) [Technical field to which the invention belongs] 'Especially an encryption system used to protect the law. This is an encryption method that protects the outflow of data in the enterprise and its methods [Previous technology ] In today's fast-moving technology, technology has become increasingly popular, and the functions of broadcast processing equipment have become more and more era. All enterprises have strengthened their requirements to meet the current trend. For example, the security control problem is caused by the company's internal intranet (intrane and a server), which makes management difficult. However, the outflow of the Internet provides, for example, firewalls, antivirus programs, Infringement or enterprise employees use the external storage device of the Internet to keep data out. However, for the above problems, it is known that there is a long-term solution to track the situation of information outflow. The invention strategy implements different data protection 'information processing. Devices and communications are widely used in every field, so multiple sources of information The information explosion of the peripheral equipment of the information processing device to enhance the competitiveness of enterprises; however, when the peripheral equipment of the enterprise is also relatively relevant, the decentralized systems used are mostly connected through ΐ) and used by multiple The flow of data between each other is quite amazing. In recent years, in order to avoid some internal data of the enterprise to solve the above problems, information security systems, to prevent hackers from letting the data leak out. At this time, there is no special protection for Lee. method. Profit Announcement No. 34330 1, Case of Information Preservation System and Method of Invention Name 'The purpose of the case is to follow different preservation methods.
第5頁 1237178 五、發明說明(2) 内部資料要 得授權後才 將假的資料 部區域網路 在一龐大的 資源便會被 多企業員工 有類似的情 如上所 能,且又可 行加密,實 外流時 放行, 回傳至 會有很 企業, 佔據, 的時間 況。 述,如 使一般 為一具 或是ϋ Ϊ端就必須與伺服器 使用ίί词服器端執行加密 大的負Γ,但透過這種方式 會同i:,甚至降低網路的 次」有相當多筆的連線, 貝訊一來一回的傳送下, 對於現今的技術面來看, 何讓企業内資料彳外流有兼 的,用者端也可單獨地針對 有實用性之思考方向。 端聯絡,取 的動作然後 對於企業内 速度,因為 此時系統的 也會浪費很 著實不應會 具保密的功 外流標案進 【發明 有 的加密 密所寫 業受到 ,以達 根 統及其 器端資 模式與 器端最 出檔案 内容】 鑑於此 系統及 出檔案 損害, 資料安 據本發 方法, 料庫及 伺服器 新之資 資料至 ’本發明 其方法, 來防止企 讓企業内 全的目的 明所揭露 至少包含 其維護功 端進行連 料並進行 外接式儲 提供一種用 其主要目的 業資訊由外 部所有的檔 〇 用以保護企 下列步驟: 能,接下來 線’然後使 單機作業, 存設備之命 以保護企業内資料外流 係單獨透過使用者端加 接式儲存設備流出使企 案只能在企業内部使用 業内資料外流的加密系 透過伺服器端建立伺服 使用者端依據不同選擇 用者端取得並確認伺服 使用者端判斷是否有寫 令,其後使用者端向使Page 5 1237178 V. Description of the invention (2) The internal data must be authorized before the fake data department is networked on a huge resource. Many employees will have similar sentiments as above, and it is feasible to encrypt. When it goes out, it will be released, and it will be transmitted back to the time when there will be a lot of business, occupation, and time. As described above, if it is generally one or ϋ Ϊ end, you must use the server to perform a large negative Γ encryption with the server side, but this way will be the same as i :, and even reduce the number of times on the network. The connection of the pen is transmitted one by one by Beixun. For the current technical aspect, how to let the company's data flow out, the user can also individually target the practical thinking direction. End communication, take action and then the speed of the enterprise, because at this time the system will also be wasted. It should not be a case of confidential outflow of work. Device-side asset model and file content of the device] In view of the damage of this system and the file, the data security method, the new data of the database and the server are transferred to the method of the present invention to prevent the enterprise The purpose of the disclosure is to include at least its maintenance function to connect materials and external storage. Provide a file with its main purpose and industry information to be owned by the outside. To protect the company's following steps: Yes, next line, and then make stand-alone operation. The storage of the device's life to protect the outflow of data in the enterprise is a separate outflow through the user-side add-on storage device, so that the company can only use the industry's data out of the company's internal encryption. The server establishes the server's client through the server. Select the user side to obtain and confirm that the server user side determines whether there is a write order, and then the user side uses the
1237178 L、發明~ ---—------------ 用者端資料座跑p 全設定剌?取女全設定’取得完畢,使用者端依據安 :1斷是否需管制寫出檔案資料,檔 料透過加密 全設定剌 f取得安全設定’取得完畢,使用者端依據安 方ί寫出斷是否需管制寫出檔案資料,檔案資料透過加密 之ί己錄柃至外接式儲存設備並為安全槽,最後將寫出槽案 姑供、^存入祠服器端資料庫。有關本發明之詳細内容及 技術,兹就配合圖式說明如下。 【實施方式】 ^發明係為一種用以保護企業内資料外流的加密系統 内2料法、’請參照第1圖,第1圖為本發明用以保護企業 二j外流的加密系統之系統架構圖,說明了本發明之基 本架構,其說明如下: 山本發明之系統架構係由伺服器端1 0 0與至少一個使用 八j2 〇 〇所構成,而使用者端2 0 〇與伺服器端1 ο 0係透過一 ==内部區域網路(Intranet)加以連結,藉由該伺服器端 2 σ己錄所有馬出的動作並透過該使用者端加密所寫出檔 ^避免企業資料外流’其中伺服器端10 〇係用以接收 4¾料,並整合管理企業内部之資料,儲存了安全設定 者端200的使用記錄,以及更新使用者端2〇〇中該安 全設,資料之功能,並包含了(1)管理介面模組no、(2) 伺服Is端資料庫丨20、(3)動態目錄模組丨3〇及(4)伺服器端 傳送接收介面140,進一步說明如下·· (1)管理介面模組110,係提供一管理介面,讓系統操 作人員可直接下達指令並管理伺服器端1〇〇。 (2 )伺服器端資料庫1 2 〇,係提供一空間存放伺服器端 1237178 五、發明說明(4) 1 〇 0之資料與其他外來輸入的資料,並使其資料可直接存 取。 (3)動態目錄模組i3〇(Active Directory),係可透過 輕畺目錄存取通訊協定(Lightweight Directory Access Protocol ; LDAP)取得企業員工及部門群組資料,並回存 至伺服器端資料庫1 2 〇。 (4 )伺服器端傳送接收介面丨4 〇,係接收使用者端2 〇 〇 之資料並回存至伺服器端資料庫丨2 〇及傳送伺服器端丨〇 〇所 欲發出之資料。 而該使用者端2 0 0,係用以接收傳送資料,並透過安 全設定進行單機操作寫出一般檔及安全檔的作業,以達資 料加密的功能’並包含了(丨)核心功能模組2丨〇、( 2 )使用 者端資料庫220、(3)使用者介面模組230及(4)使用者端傳 送接收介面2 4 0,進一步說明如下·· (1 )核心功能模組2 1 〇,係為一保護機制,以防止使用 者而2 0 〇 ^料外流,透過安全設定判別該一般樓與安全檔 之差異;一般檔係指未經由加密之檔案並以明文方式呈現 〇 (2一)使用者端資料庫22〇,係提供一空間存放使用者端 Μ 0之貧料與其他外來輸入的資料,並可直接存取該安全 楷’文全槽係指經由加密之檔案並以密文方式呈現。 ^ ( 3 )使用者介面模組2 3 〇 ’係為一使用者介面,可在取 :泫2全設定之後對一寫出檔案加密,並在送出該寫出檔 ”到一外接式儲存設備3 〇 〇時,要求核心功能模組2丨〇放行1237178 L 、 Invention ~ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- The file data is controlled to be written. The file is encrypted through the full setting 剌 f to obtain the security settings. After the acquisition is completed, the user terminal should control whether to write the file data according to the security side. The file data is encrypted to the external The storage device is also a safe slot. Finally, the slot case will be written and stored in the temple server database. The details and technology of the present invention are described below with reference to the drawings. [Embodiment] ^ The invention is a method for protecting an internal data outflow of an enterprise. 'Please refer to FIG. 1. FIG. 1 is a system architecture of an encryption system used to protect an enterprise ’s outflow. The figure illustrates the basic architecture of the present invention, which is described as follows: The system architecture of Yamamoto's invention is composed of a server end 100 and at least one using eight j2 00, and a user end 2 00 and a server end 1 ο 0 is connected through an == intranet, through the server side 2 σ has recorded all the actions and encrypted files written by the user side ^ Avoid the outflow of corporate data The server-side server 100 is used to receive the data and manage the internal data of the enterprise. It stores the usage record of the security user 200 and updates the security device and data functions in the user server 200. (1) management interface module no, (2) servo Is-side database 丨 20, (3) dynamic directory module 丨 30, and (4) server-side transmission and reception interface 140, further explained as follows: (1 ) Management Interface Module 110 A management interface, so that the operating system can directly give instructions and manage server-side 1〇〇. (2) The server-side database 1220 provides a space for storing the server-side 1237178 V. Description of the invention (4) 100 and other externally input data, and make the data directly accessible. (3) Active Directory module i30 (Active Directory), which can obtain the data of enterprise employees and department groups through Lightweight Directory Access Protocol (LDAP) and save it to the server-side database 1 2 0. (4) The server-side transmission and reception interface 丨 4 〇, which is to receive the data from the user-side 〇 200 and return it to the server-side database 丨 2 〇 and the server-side data 丨 〇 〇 want to send data. The user terminal 200 is used for receiving and transmitting data, and performing single-machine operations to write out general files and security files through security settings to achieve the function of data encryption and includes (丨) core function modules. 2 丨 〇, (2) the user database 220, (3) the user interface module 230, and (4) the user transmitting and receiving interface 2 4 0, further explained as follows: (1) Core function module 2 10 is a protection mechanism to prevent users from outflowing data. Through the security settings, the difference between the general building and the security file is discriminated. The general file refers to an unencrypted file and is presented in plain text. 0 ( 21) The user-side database 22 is a space for storing the data of the client M 0 and other external input data, and can directly access the secure script. The full-text slot refers to the encrypted file and Presented in cipher text. ^ (3) The user interface module 2 3 0 ′ is a user interface, which can encrypt a write file after taking all settings: 泫 2, and send the write file to an external storage device. At 3:00, the core function module 2 is required to be released
第8頁 1237178Page 8 1237178
=使用者端傳送接收介面24。,係•收飼服器端ι〇〇= User-side send and receive interface 24. Department • Feeding device end 〇〇〇
欲:Ϊ U 者端資料庫22 0及傳送使用者端20 0所 从發出之資料。 同使用者名稱及電腦上 上述之安全設定係包含按照不 特定的機器訊號。 使用者端2GG所用之加密的方式可為非對稱式的加密 及對稱式的加密,而非對稱式的加密可以是公開金鑰 (PKI)、RSA演算法及橢圓曲線密碼的其中之一;而對稱式 的加密可以是Blowfish、Triple DES、DES、IDEA、RC5、 CAST-128及RC2的其中之一。 上述之外接式儲存設備3〇〇可從軟碟機、光碟機、ζιρ 、M0、燒錄機、萬用串列匯流排(Universai ““Μ Bus ;USB)連接線至萬用串列匯流排連接線、並行埠連接線 (Parallel Port)、串列埠連接線(Serial p〇rt)及移動式 資訊儲存裝置的組合中任意擇一。 上述之伺服器端100存放了 一寫出檔案之記錄檔,此 一記錄檔至少包含下列攔位··寫出檔案之時間、電腦機器 辨識碼、使用者名稱、寫出之檔案名稱、檔案拇指紋 資料結構)及隨機片段内容。 接著明看到第2圖,第2圖為本發明之使用者端將資 料寫出至外接式儲存設備之示意圖。 使用端20 0可透過使用者端傳送接收介面24〇與伺服器 端100聯絡,以保持使用者端資料庫22〇中的資訊保持最新 1237178 五、發明說明(6) 的狀態,當使用者端欲將檔案移動到外接式儲存設備3〇〇 時’便會透過前述之加密方式,將此一檔案加密°而成加密 安全檔3 5 0,若其他人要開啟該加密安全檔3 5 〇,便會以密 文方式呈現,讓任何人都無法閱讀。 ’ 請參照圖示,第3圖為本發明伺服器端與複數個使用 者端連間之關係圖,本圖主要是說明企業内部一個伺服 端1 0 0係透過伺服器端傳送接收介面丨4 〇與分別複數個 者端20 0a〜200η的使用者端傳送接收介面24〇a〜24〇n加以 絡,讓資料的傳送與接收更為迅速。 # 請參閱第4 -a圖與第4 ^圖,第4 _a圖為本發明 用以保濩企業内資料外流加密方法之流程圖(一),而 4 一b圖為本發明用以保護企業内資料 程圖(二),說明如下: ^ 首先透過一伺服器端1 〇 〇建立一 其維護功能(步驟40 0 ),此時請看牛貝料庫12〇及 第5圖為本發明飼服器端建V:服 圖;步驟A之後,先建立一管理人貝料庫之細部流程 伺服器端資料庫1 2〇執行存取功^果組11 〇使其可進入該 動態目錄模組130取得企業員工步驟4〇2),接著透過一 ,最後才將該資料存入該伺服端?群組資料(步驟4〇4) 然後再回到第4—a圖延續步驟(步糊)。 端200依據不同模式選擇與該伺之後的m 一使用者 41(0,連線的模式可分為主H100進行連線(步驟 被動連線模式(步驟42〇),分線摈式(步驟415),或是 〜進入步驟B與步驟C,這兩 1237178 、發明說明(7) 種連線的模式待陳述完第4_a圖及第4〜b 線完成“,該使用者端2〇〇取得及確 器、= 新之資料並進行單機作業(步驟43〇)柒100最 判斷是否有寫出一擋案資料至一 >卜 ^使用者端200 只丨了王 外接式健存設備^ η n + a 令(步驟440) ’若沒有收到寫出檔案資 :: 備3 0 0的命令,則該使用者端2〇〇持續監控(步驟 3〇〇的命令,則該使用者踹H / 接式儲存設備 尸一 /入外Λ ΐ 使用者端資料庫220取 :一女王s又疋(步驟460 ) ’此一安全設定係包含按照不同 joo用佑者/兮稱及電腦上特定的機器訊號。接著該使用者端 2依據該女全設定判斷是否需管制寫出該檔案資料( 4J0) ’若判斷不需要管制寫出該檔案資料,則該檔案資料 直2寫出至該外接式儲存設備300並為般檔(步驟49〇) ,接者將一寫出檔案之記錄檔存入使用者端資料庫22〇 (步驟4 9 5 ),若判斷有需要管制寫出該檔案資料,則該播 案資料透過一加岔方式寫出至該外接式儲存 -安全檔(步驟),最後接著將一寫出槽案之肴記錄;;子 入使用者端資料庫220 (步驟495 ),並結束本流程。 接著來說明步驟B之後的流程,請看到第6 一 a圖與第 β〜b圖,第6 —a圖為本發明使用者端主動連線模式之細 部流程圖(一)及第6 —b圖為本發明使用者端主動連線模 式之細部流程圖(二),說明如下·· 步驟B之後,首先透過一使用者端資料庫22〇取得該使 用者端20 0之一特徵(步驟50 0 ),此一特徵係指電腦機器辨To: Ϊ U data from the database 22 0 and send the data from the client 200. Same as user name and on computer. The above security settings are based on unspecified machine signals. The encryption method used by the client 2GG can be asymmetric encryption and symmetric encryption, and asymmetric encryption can be one of public key (PKI), RSA algorithm, and elliptic curve cryptography; and Symmetric encryption can be one of Blowfish, Triple DES, DES, IDEA, RC5, CAST-128 and RC2. The above-mentioned external storage device 300 can be connected from the floppy disk drive, optical disk drive, ζιρ, M0, recorder, universal serial bus (Universai "" M Bus; USB) connection cable to the universal serial bus Any one of a combination of a connection cable, a parallel port connection cable (Parallel Port), a serial port connection cable (Serial port), and a mobile information storage device. The server 100 described above stores a log file of the written file. This log file contains at least the following stops: the time when the file was written, the computer identification code, the user name, the file name written, and the file thumb. Pattern data structure) and random fragment content. Next, see the second figure, which is a schematic diagram of the user terminal of the present invention writing data to an external storage device. The user end 20 can communicate with the server end 100 through the user end sending and receiving interface 24 to keep the information in the user end database 220 up to date 1237178. V. State of the invention description (6) When you want to move the file to the external storage device 300, it will encrypt this file through the aforementioned encryption method to create an encrypted security file 3 50. If other people want to open the encrypted security file 3 500, It will be presented in cipher text, making it impossible for anyone to read. '' Please refer to the figure, Figure 3 is the relationship between the server end of the present invention and a plurality of user end connections. This figure is mainly to explain that a server end in the enterprise 1 0 0 transmits and receives the interface through the server end. 4 〇 and a plurality of user-side transmitting and receiving interfaces 24a ~ 24n of 20a ~ 200n respectively, so as to make data transmission and reception more rapid. # Please refer to Figure 4-a and Figure 4 ^, Figure 4 _a is a flowchart (a) of the method for encrypting data out of the enterprise in accordance with the present invention, and Figure 4 a and b is a method for protecting the enterprise in accordance with the present invention The internal data flow chart (2) is described as follows: ^ First, a maintenance function (step 40) is established through a server end 100. At this time, please see the beef and shellfish storehouse 120 and FIG. 5 for the feed of the present invention. Server-side construction V: server diagram; after step A, first establish a detailed process of the manager's shell database server-side database 1 2 0 to perform the access function ^ fruit group 11 0 so that it can enter the dynamic directory module 130 Get the enterprise employee step 402), then go through one, and finally save the data to the server? Group data (step 404) and then return to Figure 4-a to continue the steps (step paste). The terminal 200 selects the m-user 41 (0) after the server according to different modes. The connection mode can be divided into the connection to the main H100 (step passive connection mode (step 42)), and the split line mode (step 415). ), Or ~ Enter step B and step C, the two 1237178, invention description (7) The connection mode is to be completed. Figures 4_a and 4 ~ b are completed. The user terminal 2000 obtains and Validator, = New data and stand-alone operation (step 43) 柒 100 The most judgement is whether there is a case file written to one > Bu ^ 200 on the user side 丨 Wang external storage device ^ n n + a command (step 440) 'If no write file data is received :: prepare for 3 00's command, the user's terminal 200 will continue to monitor (command at 3'00, then the user 踹 H / Connected storage device corpse / enter Λ ΐ ΐ User database 220 fetch: a queen s again 步骤 (step 460) 'This security setting contains different users / names and specific machines on the computer Signal. Then the user terminal 2 judges whether it is necessary to control the writing of the file data according to the female all settings (4J0) ' If it is judged that it is not necessary to control the writing of the file data, the file data is directly written to the external storage device 300 as a normal file (step 49), and the user saves a recorded file of the written file to the user terminal. Database 22 (step 4 95), if it is judged that it is necessary to control the writing of the file data, the broadcast data is written to the external storage-security file (step) by a plus method, and finally a Write out the dish record of the case; sub-enter the user-side database 220 (step 495), and end this process. Next, to explain the process after step B, please see Figure 6 aa and β ~ b Figure 6-a is a detailed flowchart (1) of the active connection mode of the user terminal of the invention and Figure 6-b is a detailed flowchart (2) of the active connection mode of the user terminal of the invention, which is described as follows. · After step B, first obtain a feature of the client 200 (step 50 0) through a client database 22o. This feature refers to the identification of the computer machine.
第11頁 1237178 五、發明說明(8) 識碼及使用者名稱,接著透過—使用者端傳送接收介面 240發送一同步資料之命令(步驟5〇2),發送完 一伺服器端傳送接收介面U0接收該同步資料之命//進過 入該祠服器端資料庫12〇(步驟5〇4),其 進 庫12〇比對該^徵是否正確(步_6),若該特貝;; <1 回報錯誤汛息至該使用者端2〇〇(步驟52 0 ),此時該使用 者端20 0針對該使用者端資料庫22〇設定限制以 流(步驟522);若該特徵正確無誤,則透過該免貝端^外 料庫120判斷該使用者端資料庫22〇是否需進行同步比對貝 (步驟510) ’若該使用者端資料庫22〇不需要進行同步比對 則將該寫出檔案之記錄檔存入該伺服器端牛 ^40) ; ^該使用者端資料庫22〇需要進行同步比=2〇(則步 拉該伺服益端資料庫12〇更新的資料透過該 1 '仃接收並存入該使用者端資料庫22〇(步驟 w z ),並結束本流程。 200需本要圖動連線模式的觸發之時機可從該使用者端 連通服器端100取回資料或是開機後第—次網路 。通或疋s玄使用者端2〇〇自由設定一時間週期中任意一種 接著來說明步驟C之後的詳細流程,步驟C可分A H器端m通知改變設定(步驟⑴及直接透過飼^^ 第(步驟c2),如第7—a圖及第7〜b圖, a圖為本發明使用者端被動連線模式且透過词服器 1237178 五、發明說明(9) 端通知改變設定的細部流程圖及第7 一b圖為本發明使用 者端被動連線模式且直接透過伺服器端傳送改變設定的細 部流程圖,說明如下:Page 11 1237178 V. Description of the invention (8) Identification code and user name, and then send a command for synchronizing data through the user-side transmission and receiving interface 240 (step 502), and send a server-side transmission and reception interface U0 receives the order of the synchronization data // and entered the server database 12 (step 504), and whether the ratio of entering the database 12 is correct (step _6). ; < 1 Report error flooding to the client 200 (step 52 0), at this time the client 200 sets a limit to flow to the client database 22 (step 522); if If the feature is correct, it is judged whether the client database 22 needs to be synchronized through the shell-free external database 120 (step 510) 'If the client database 22 does not need to be synchronized For comparison, the log file of the written file is stored in the server end of the server ^ 40); ^ The user database 22 needs to be synchronized = 20 (step by step pulling the server benefit end database 12) The updated data is received and stored in the user database 22 (step wz) through the 1 ′, and the process ends. 20 0 The timing of triggering the connection mode is required to retrieve the data from the user terminal to the server 100 or the first time network after booting. It can be set freely through the user terminal. Any one of a time period will then explain the detailed process after step C. Step C can be divided into AH device m to notify the change of settings (step ⑴ and directly through the feed ^^ (step c2), as shown in Figure 7-a and Figure Figure 7 ~ b, Figure a is the passive connection mode of the user terminal of the present invention and through the word server 1237178 V. Description of the invention (9) Detailed flow chart of the notification change setting of the terminal and Figure 7b is the user terminal of the present invention The detailed flow chart of the passive connection mode and changing the settings directly through the server is explained as follows:
步驟C1之後’該伺服器端1 〇 〇判斷一管理介面模組1 ! 〇 是否有變更安全設定(步驟600),若沒有變更安全設定, 則該祠服器端1 0 0持續監控(步驟6 1 〇 ),並重回到步驟6 〇 〇 ;若有變更安全設定,則該伺服器端1 〇 〇透過該伺服器端 傳送接收介面140通知各使用者端2〇〇需改變安全設定(步 驟620 ),然後各使用者端2 0 0透過該使用者端傳送接收介 面240接收該通知訊號並向該伺服器端傳送接收介面14〇要 求取回新的安全設定(步驟6 3 0 ),最後,該伺服器端1〇〇透 過該管理介面模組1 1 0回傳新的安全設定給該使用者端2 〇 〇 ,該使用者端200並存入至該使用者端資料庫220(步驟640 ),並結束C1之流程。 步驟C 2之後,該伺服器端1 0 0判斷一管理介面模組1 1 〇 是否有變更安全設定(步驟6 50 ),若沒有變更安全設定, 則該伺服器端持續監控;若有變更安全設定,則透過該伺 服器端傳送接收介面140直接傳送新的安全設定至該使用 者端傳送接收介面240(步驟670),最後,該使用者端傳送 接收介面240將新的安全設定存入該使用者端資料庫220 (步驟680 )。 雖然本發明以較佳之實施例揭露如上,然其並非用以 限定本發明,任何熟習此技藝者,在不脫離本發明之精神 和範圍内,當可作些許之更動與潤飾,因此本發明之保護After step C1, the server side 1 determines whether a management interface module 1 has changed the security setting (step 600). If the security setting is not changed, the server end 1 0 0 continuously monitors (step 6) 1 〇), and return to step 6 〇 〇; if there is a change in security settings, the server side 〇 00 through the server-side transmission and receiving interface 140 to notify each user side 200 need to change the security settings (step 620), then each user terminal 200 receives the notification signal through the user terminal transmission and receiving interface 240 and sends the receiving interface 14 to the server terminal to request to retrieve the new security settings (step 6 3 0), and finally , The server 100 returns the new security setting to the user 200 through the management interface module 110, and the user 200 is stored in the user database 220 (step 640), and end the process of C1. After step C 2, the server end 100 determines whether a management interface module 1 110 has changed the security setting (step 6 50). If the security setting has not been changed, the server side continuously monitors; if there is a change in security Settings, the server-side transmitting and receiving interface 140 directly transmits the new security settings to the user-side transmitting and receiving interface 240 (step 670), and finally, the user-side transmitting and receiving interface 240 stores the new security settings into the The client database 220 (step 680). Although the present invention is disclosed in the preferred embodiment as above, it is not intended to limit the present invention. Any person skilled in the art can make some changes and decorations without departing from the spirit and scope of the present invention. protection
1237178 五、發明說明(ίο) 範圍當視後附之申請專利範圍所界定者為準 IBii 第14頁 1237178 圖式簡單說明 【圖式簡單說明】 第1圖為本發明用以保護企業内資料外流的加密系統之系 統架構圖; 第2圖為本發明之使用者端將資料寫出至外接式儲存設備 之示意圖; 、 第3圖為本發明伺服器端與複數個使用者端連間之關係圖 第4 一 a圖為本發明用以保護企業内資料外流加密方法之 流程圖(一); 第4 -b圖為本發明用以#護企業内資料外流加密方法之 流程圖(二); 第5圖為本發明伺服器端建立伺服器端資料庫之細部流程 圖; 第6 —a圖為本發明使用者端主動連線模式之細部流程 (-); ° 第6 ~ b圖為本發明使用者端主動連線模式之細部流程 (二); L王圖 器 過伺 第7 ~^圖1*為4本發明使用者端被動連線模式且透過伺 第d j文變設定的細部流程圖;* 服 ¥ 發明使用者端被動連線模式且直接it 〔符Λ傳送改變設定的細部流程圖 1付唬說明〕 ^ 100 110 伺服器端 管理介面模組1237178 V. Scope of Invention (ίο) Scope shall be determined by the scope of the appended patent application. IBii Page 14 1237178 Schematic Illustration [Schematic Illustration] Figure 1 is used to protect the outflow of data in the enterprise. Figure 2 is a system architecture diagram of the encryption system; Figure 2 is a schematic diagram of the user terminal of the present invention writing data to an external storage device; and Figure 3 is a relationship between the server end of the present invention and a plurality of user terminals Figure 4a is a flowchart (a) of the method for protecting data outflow encryption in an enterprise according to the present invention; Figure 4 -b is a flowchart (b) of the method for protecting the data outflow encryption in an enterprise according to the present invention (2); Fig. 5 is a detailed flowchart of establishing a server-side database on the server side of the present invention; Fig. 6-a is a detailed flow of the active connection mode of the user side of the present invention (-); ° Figs. 6 ~ b are as follows The detailed flow of the user-side active connection mode of the invention (2); The L King charter overserving the 7th ~ ^ Figure 1 * is 4 the detailed flow of the user-side passive connection mode of the invention and the setting through the dj text change Figure; * Service ¥ Invention user end Passive connection mode and direct it [Detailed flow chart for changing the settings of the symbol Λ 1 for bluffing instructions] ^ 100 110 Server-side management interface module
第15頁 1237178Page 12 1237178
伺服器端資料庫 動態目錄模組 圖式簡單說明 120 130 140 伺服器端傳送接收介面 2 0 0 使用者端 200a〜20 0η 使用者端 210 核心功能模組 220 使用者端資料庫 230 使用者介面模組 240 使用者端傳送接收介面 240a〜240η 使用者端傳送接收介面 3 0 0 外接式儲存設備 3 5 0 加密安全檔 步驟400 透過一伺服器端建立一 維護功能 伺服器端資料庫 及其 步驟402 步驟404 步驟406 步驟410 步驟415 步驟420 步驟430 ρ Λ®偎殂使其可推λ 資料庫執行存取功能 入該伺服器 透過一動態目錄模組取得企 組資料 菜貝工及部門 :該資料存入該飼服器端資料庫 一使用者端依據不同模式選 進行連線 ^遠词服器 主動連線模式 被動連線模式 該使用者端取得及確認該伺服器端 敬新之資Server-side database dynamic directory module diagram brief description 120 130 140 Server-side sending and receiving interface 2 0 0 User-side 200a ~ 20 0η Client-side 210 Core function module 220 User-side database 230 User-interface Module 240 User-side transmission and reception interface 240a ~ 240η User-side transmission and reception interface 3 0 0 External storage device 3 50 0 Encryption security file step 400 Establish a maintenance function server-side database and steps through a server side 402 step 404 step 406 step 410 step 415 step 420 step 430 ρ Λ® 偎 殂 so that it can push the λ database to perform the access function into the server to obtain enterprise data through a dynamic directory module Vegetables and departments: the Data is stored in the feeder database. A client chooses to connect according to different modes. ^ Far word server Active connection mode Passive connection mode The client obtains and confirms the server's new resources
12371781237178
步驟440 步驟450 步驟460 料並進行單機作業 該使用者端判斷是否有 外接式儲存設備之命令Step 440 Step 450 Step 460 Data and stand-alone operation The user terminal determines whether there is an order for an external storage device
該使用者端持續監控 該使用者端向一使用者端資料庫取得一 設定 全 步驟470 該使用者端依據該安全設定判斷是否需管制 寫出該檔案資料 步驟480 該檔案資料透過一加密方式寫出至該外接式 儲存設備並為一安全檔 步驟490 該檔案資料直接寫出至該外接式儲存設備並The client continuously monitors the client to obtain a setting from a client database. Step 470 The client determines whether to write out the file data according to the security setting. Step 480 The file data is written in an encrypted manner. Step 490 export the file data to the external storage device and write it to the external storage device.
為·--般稽 W 步驟495 將一寫出檔案之記錄檔存入伺服器端資料庫 步驟50 0 透過一使用者端資料庫取得該使用者端之一 特徵 步驟5 0 2 步驟5 04 步驟5 〇 6 步驟51〇 步驟5 2 〇 少驟5 2 2 透過一使用者端傳送接收介面發送一同步資 料之命令 胃 透過一伺服器端傳送接收介面接收該同步資 料之命令並進入該伺服器端資料庫 該伺服器端資料庫比對該特徵是否正確 透過該伺服器端資料庫判斷該使用者端資料 庫是否需進行同步比對 > 回報一錯誤訊息至該使用者端 該使用者端針對該使用者端資料庫設定限制For ... --- General W Step 495 Save a log file of the written file to the server-side database Step 50 0 Get a characteristic of the client through a client database Step 5 0 2 Step 5 04 Step 5 〇 step 51 〇 step 5 2 〇 less step 5 2 2 send a command of synchronization data through a user-end transmission and reception interface stomach receive a command of synchronization data through a server-side transmission and reception interface and enter the server side Database The server-side database compares whether the feature is correct. Use the server-side database to determine whether the client-side database needs to be compared. ≫ Report an error message to the client. Limits on this client database
第17頁 1237178 步驟610 步驟620 步驟630 步驟640 步驟650 步驊66〇 以避免資料外流 服f端資料庫更新的資料透過該伺服 β知傳达接收介面進行傳 = ;接收介面進行接收並存入該使 ^該寫出槽案之記錄標存人該飼服器端資料 ,=f f端判斷一管理介面模組是否有變更 安全设定 該伺服器端持續監控 ㈣服㈣透過該㈣ϋ端傳送接收介面通 知各使用者端需改變安全設定 該各使用者端透過該使用者端傳送接收面接 收該通知訊號並向該伺服器端傳送接收介面 要求取回新的安全設定 該伺服器端透過該管理介面模組回傳新的安 該使用者端,該使用者端並存入至 該使用者端資料庫 端判斷-管理介面模組是否有變更 該祠服器端持續監控 透過該飼服墙僖$ i & a γ + 々八# 為^得逆接收介面直接傳送新的 文王=ί該使用者端傳送接收介面 該使用者端傳送接收介面將新的安全設定存 第18頁 1237178 圖式簡單說明 入該使用者端資料庫 圓國 第19頁Page 17 1237178 Step 610 Step 620 Step 630 Step 640 Step 650 Step 骅 66. To avoid data outflow, the updated data on the f-end database is transmitted through the server. The receiving interface is used to transmit =; The ^ should write the record of the slot case, and store the data of the feeder side. The ff side judges whether a management interface module has changed the security setting. The server side continuously monitors the server and sends and receives it through the terminal. The interface notifies each user terminal that the security settings need to be changed. Each user terminal receives the notification signal through the user terminal's transmitting and receiving surface and sends a receiving interface to the server terminal to request the retrieval of new security settings. The server terminal passes the management The interface module returns a new security client, and the client is stored in the database of the user to determine whether the management interface module has been changed. The server end is continuously monitored through the feeding wall. $ i & a γ + 々 八 # to send the new King of text directly to the receiving interface = ί the client sends and receives the interface and the client sends and receives the interface to save the new security settings 18 1237178 Schema simple instructions on page 19 of the user end database into the country round
Claims (1)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW92120900A TWI237178B (en) | 2003-07-30 | 2003-07-30 | A encryption system and method of securing internal business data |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW92120900A TWI237178B (en) | 2003-07-30 | 2003-07-30 | A encryption system and method of securing internal business data |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200504510A TW200504510A (en) | 2005-02-01 |
| TWI237178B true TWI237178B (en) | 2005-08-01 |
Family
ID=36821359
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW92120900A TWI237178B (en) | 2003-07-30 | 2003-07-30 | A encryption system and method of securing internal business data |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI237178B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI573079B (en) * | 2007-01-08 | 2017-03-01 | 精品科技股份有限公司 | Information security management system and method for electronic document |
-
2003
- 2003-07-30 TW TW92120900A patent/TWI237178B/en not_active IP Right Cessation
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI573079B (en) * | 2007-01-08 | 2017-03-01 | 精品科技股份有限公司 | Information security management system and method for electronic document |
Also Published As
| Publication number | Publication date |
|---|---|
| TW200504510A (en) | 2005-02-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11153290B2 (en) | Advanced security protocol for broadcasting and synchronizing shared folders over local area network | |
| US11159312B2 (en) | Secure data exchange network | |
| JP5242134B2 (en) | Private network system and method | |
| KR101883146B1 (en) | Providing devices as a service | |
| US8738750B2 (en) | System and method for efficient replication of and access to application specific environments and data | |
| US10382197B1 (en) | Key management and dynamic perfect forward secrecy | |
| US9654288B1 (en) | Securing group communications | |
| WO2016197764A1 (en) | Data processing method, apparatus and system based on mobile application entrance | |
| US11509488B2 (en) | Secure time-to-live | |
| US10129260B1 (en) | Mutual privacy management | |
| CN110690967A (en) | Instant communication key establishment method independent of server security | |
| TWI237178B (en) | A encryption system and method of securing internal business data | |
| CN101167333A (en) | Method and apppratus for communicating information between devices | |
| US12074882B2 (en) | System and method for providing authenticated entities access to a user's metadata and data | |
| TWI244849B (en) | An internal business data decryption method | |
| Li et al. | Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers | |
| KR20250048631A (en) | One-time cloud file upload system without login using transmission code | |
| Suthar et al. | PMS-Sharing: Framework for Automatically Authenticating users in a Group to Allow Sharing Storage | |
| AU2013204382B2 (en) | A private network and system | |
| Ferguson et al. | Key negotiation | |
| Bhutada et al. | Adopting Encryption for Intranet File Communication System |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK4A | Expiration of patent term of an invention patent |