TWI665579B - Active network backup - Google Patents
Active network backup Download PDFInfo
- Publication number
- TWI665579B TWI665579B TW106118922A TW106118922A TWI665579B TW I665579 B TWI665579 B TW I665579B TW 106118922 A TW106118922 A TW 106118922A TW 106118922 A TW106118922 A TW 106118922A TW I665579 B TWI665579 B TW I665579B
- Authority
- TW
- Taiwan
- Prior art keywords
- hardware
- computer host
- data
- backup
- unit
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
本發明一種主動式網路備份器,主要包含有至少一電腦主機與硬體件,電腦主機及其他網路設備無法對硬體件進行登入、設定、資料存取等,藉此可以讓硬體件確實的防禦並阻斷病毒、綁架軟體與駭客的攻擊;不僅如此,更具有實體安全開關控制著連接埠的啟與閉,必須用人為的操作去開啟該實體安全開關才能使用獨立的輸出入連接埠,藉以確認管理人員是臨機操作的行為,以防止機器人程式駭入,最重要的是硬體件無法執行破壞性指令病毒無法在硬體件內執行或運作,亦可避免因設定錯誤而發生誤刪等意外,或被綁架軟或惡意程式偽裝成設定程式,被粗心的使用者下載後執行而破壞檔案。 An active network backup device of the present invention mainly includes at least one computer host and hardware components. The computer host and other network devices cannot log in, set, and access data on the hardware components, thereby enabling hardware This software prevents and blocks viruses, kidnapping software, and hackers; not only that, it also has a physical security switch that controls the opening and closing of the port. You must use artificial operations to turn on the physical security switch to use independent outputs. Enter the port to confirm that the management personnel act on the fly to prevent robot programs from hacking. The most important thing is that the hardware cannot execute destructive instructions. The virus cannot execute or operate in the hardware. It can also avoid setting errors. Accidents such as accidental deletion, or abducted software or malicious programs disguised as setting programs are downloaded and executed by careless users to destroy files.
Description
本發明一種主動式網路備份器,詳指應用於網路安全領域之技術,而主要的技術重點在於藉由獨立存放硬體空間,且不具有任何網際網路連線之設計,使安全管理者能夠精準的備份資料而不受到破壞,更重要的是透過各種軟體硬體的手段及人性因素的考量,層層保護,強化檔案的安全。而且設定完成後便會自動執行,不須人力介入,避免偷懶、遺忘等人為因素影響檔案安全,為一種實用性極佳之發明。 An active network backup device of the present invention refers to a technology applied to the field of network security in detail, and the main technical focus lies in the design of independent storage of hardware space without any Internet connection to enable security management Users can accurately back up data without being damaged. More importantly, through various software and hardware methods and considerations of human factors, layer-by-layer protection to enhance file security. And after the setting is completed, it will be automatically executed without human intervention, avoiding human factors such as laziness and forgetting to affect the security of the file, which is a very practical invention.
現今科技的蓬勃發展下,資訊的傳輸都是透過無線網路的方式進行互通,藉此節省了時間且縮短了人與人之間的距離,然而為了資料的安全性,一般都會對資料進行加密或者是放置雲端,以致於資料必須是使用者才可以進行開啟、下載等操作,但在網際網路中充斥的腥、羶、色,更有一堆非法的人(稱之為駭客)會對於一些網站進行攻擊、綁架資料等違法情事,嚴重者還會進行網路的癱瘓、投擲病毒等,這對於極須要具有保密隱私的人們、公司行號等非常的頭痛,然而市面上相關業者對於駭客的所作所為進一步研發推出了所謂安全裝置、防火牆等,雖然短期內可以如期的將病毒、攻擊等進阻擋,甚至是隔離,但是駭客自詡的就是那高超的手段,長久之下就會攻破安全裝置、防火牆的限制,導致一而再再 而三的事情不斷發生。 Under the current vigorous development of technology, information is transmitted through wireless networks to save time and shorten the distance between people. However, for data security, data is generally encrypted. Or it is placed in the cloud, so that the data can only be opened or downloaded by the user. However, the Internet is full of fishy, ridiculous, colorful, and a bunch of illegal people (called hackers) will Some websites conduct illegal activities such as attacking and abducting materials, and severe cases will also perform network paralysis and virus throwing. This is a headache for people who need confidentiality and company names. However, relevant industry players on the market are afraid of What the guest has done further develops so-called security devices, firewalls, etc. Although viruses, attacks, etc. can be blocked or even isolated in a short period of time as expected, the hacker's self-proclaimed is the superb means, in the long run it will Breaking the restrictions of security devices and firewalls has led to repeated occurrences.
又現今市面上也有不少專門的公司行號,其主要是提供公司行號、使用者進行資料的備存,避免內部遭受駭客的侵襲而造成所有資料遺失、壞損等問題,要不然就是使用者在操作上的疏忽,以致於資料遺失、壞損而無法搶救回來等問題,此種公司行號的設置就是要解決上述的問題,可是此種安全公司在進行資料的備份上,所採用的手段還是要藉由網際網路的連線設置才可以達到資料傳輸的有無,這對於駭客來說不外乎是一條可以入侵的管道,因此安全公司的備份手段卻還是存在有相當程度上的缺陷。 There are also many specialized company accounts on the market today, which mainly provide company account numbers and users' data storage to avoid internal data loss and damage caused by hackers. Otherwise, otherwise The user's negligence in operation has resulted in data loss or damage that cannot be rescued. Such a company line is set up to solve the above problems, but this type of security company uses data backup. The means of data transmission can only be achieved through the Internet connection settings. This is nothing more than a hackable channel for hackers, so the backup methods of security companies still exist to a certain extent. Defects.
有鑑於上述情形,本發明人投入許多時間研究相關知識,並加以比較各項優劣,進行相關產品的研究及開發,並歷經的多次實驗及測試,而終於推出一種『主動式網路備份器』改善上述缺失,以符合大眾所需使用。 In view of the above circumstances, the inventor has invested a lot of time in researching related knowledge, comparing various advantages and disadvantages, conducting research and development of related products, and undergoing many experiments and tests, and finally launched an "active network backup device" "Improve the above-mentioned shortcomings to meet the needs of the public.
本發明主要目的是提供資料的備份上具有絕對的安全性,且可以方便、快速的進行分類、壓縮、加密等,藉此保護所要備存的資料以外,整個備份還原過程是由硬體件CPU主動去做存取資料的工作,更不會占據原本電腦或網路儲存設備內的資源與空間,其改善習知技術在進行資料備份上因為其電腦主機或網路儲存設備等會連接到網際網路,以致於容易受到駭客、病毒的入侵而壞損、綁架等問題發生。藉此,為了達成上述之目的與功效,本發明具有三種實施型態,第一種為一種主動式網路備份器,其包括:至少一電腦主機(如SERVER,PC,NB,NAS或其他網路儲存設備等等,以下簡稱電腦主機),其具有一權限單元;一硬體件,其與至少一電腦 主機之間以直接連線或用有線、無線區域網路連線方式相互連結,又該硬體件內設有一存取空間存取至少一電腦主機所複製之資料,而該至少一電腦主機的權限單元係開放讀取權限給予硬體件主動進行單一方向的資料抓取複製,以及需要還原備份資料時該權限單元開放寫入權限給硬體件做單一方向寫入資料、還原其備份的資料回電腦主機,又該硬體件內建有一彙整單元對存取空間內的資料進行整理、編排、壓縮、加密等,以及內建有一控制單元控制硬體件對電腦主機進行資料讀取、資料寫入,以及硬體件的運作;其中,電腦主機及其他網路設備無法對硬體件進行登入、設定、資料存取,藉此可以讓硬體件確實的防禦並阻斷病毒、綁架軟體與駭客的攻擊。 The main purpose of the present invention is to provide absolute security in the backup of data, and to facilitate easy and fast classification, compression, encryption, etc., thereby protecting the data to be stored. The entire backup and restore process is performed by hardware CPU Actively do the work of accessing data, not to occupy the resources and space of the original computer or network storage device. Its improved conventional technology is used for data backup because its computer host or network storage device will be connected to the Internet. Internet, making it vulnerable to hackers, viruses, damage and kidnapping. Therefore, in order to achieve the above-mentioned object and effect, the present invention has three implementation modes. The first is an active network backup device, which includes: at least one computer host (such as SERVER, PC, NB, NAS, or other network). Storage device, etc., hereinafter referred to as a computer host), which has a permission unit; a hardware piece that is connected to at least one computer host by direct connection or by wired or wireless LAN connection, and An access space is provided in the hardware to access the data copied by at least one computer host, and the authority unit of the at least one computer host is open to read permission to the hardware to actively perform data capture and copy in one direction, and When the backup data needs to be restored, the permission unit opens the write permission to write data to the hardware in a single direction, restore the backed up data to the computer host, and the hardware has a built-in integration unit to perform data in the access space. Organize, arrange, compress, encrypt, etc., as well as a built-in control unit to control the hardware to read and write data to the host computer, and the operation of the hardware; , Computer hosts and other network devices cannot log in, set up, or access data to the hardware. This allows the hardware to reliably prevent and block attacks from viruses, kidnapping software, and hackers.
本發明根據前述說明與定義下,其進一步的技術特徵在於,該硬體件只能在上述直接連線或用有線、無線區域網路內進行備份與還原的相關動作,因其不具有連上網際網路的功能,可以避免被網際網路的惡意程式入侵。 According to the foregoing description and definition, the present invention is further technically characterized in that the hardware can only perform backup and restore related operations in the above direct connection or using a wired or wireless LAN, because it does not have a connection The function of the Internet can avoid being invaded by malicious programs on the Internet.
本發明根據前述說明與定義下,其進一步的技術特徵在於,該硬體件進一步內建有一設定單元及獨立的有線或無線一連接埠,該設定單元係可設定硬體件對電腦主機的資料備份及還原之程序設定,該設定單元必須透過硬體件獨立的有線或無線的輸出入連接埠連接外部設備(如行動裝置、鍵盤、滑鼠或顯示器)才能進行硬體件的操作與設定,外部設備與硬體件的連接是獨立於硬體件與電腦主機的連線之外,彼此之間是互相隔離的,因無法透過電腦主機進行硬體件的設定及操作,故可避免病毒、綁架軟體與駭客透過電腦主機連線入侵硬體件。 According to the foregoing description and definition, the present invention is further technically characterized in that the hardware further includes a setting unit and an independent wired or wireless port, and the setting unit can set the data of the hardware to the host computer. Backup and restore program settings. The setting unit must be connected to external devices (such as mobile devices, keyboards, mice, or monitors) through independent wired or wireless input and output ports of the hardware. The connection between the external equipment and the hardware is independent of the connection between the hardware and the host computer, and is isolated from each other. Because the hardware settings and operations cannot be performed through the host computer, viruses, The abduction software and hackers invaded the hardware through the host computer connection.
本發明根據前述說明與定義下,其進一步的技術特徵 在於,該硬體件進一步內建有一偵測警示單元,該偵測警示單元主要偵測存取空間內所複製的資料,以及所要複製之電腦主機內之資料是否異常,該偵測警示單元並進一步控制硬體件之一警示組件產生警示訊息提醒;而該警示組件係為喇叭、蜂鳴器、閃爍燈或聲光元件,亦可於電腦主機安裝一具警示功能的應用程式,透過與電腦主機的連線,通知電腦主機用聲光、簡訊、郵件等方式提出警訊,通知使用者。 According to the foregoing description and definition, the present invention is further technically characterized in that the hardware further has a detection warning unit built in, and the detection warning unit mainly detects the data copied in the access space and the data to be copied. If the data in the host computer is abnormal, the alarm unit is detected and further controlled by a warning component of the hardware to generate a warning message reminder; and the warning component is a horn, a buzzer, a flashing light, or an acousto-optic component. The computer host installs an application with a warning function, and through the connection with the computer host, notifies the computer host to use a sound and light, text message, mail and other methods to raise a warning message to notify the user.
其發明根據前述說明與定義下,其進一步的技術特徵在於,該硬體件進一步設有一切換開關,該切換開關係可強制關閉硬體件與電腦主機之間的連線運作,可用於系統提出病毒或駭客入侵警示時自動或手動切斷硬體件與電腦主機的連線。 According to the invention, according to the foregoing description and definition, its further technical feature is that the hardware is further provided with a switch, and the switch-on relationship can forcibly close the connection between the hardware and the computer host, which can be used for system proposal. Automatic or manual disconnection of hardware from the host computer when a virus or hacking alert occurs.
其發明根據前述說明與定義下,其進一步的技術特徵在於,該硬體件係可設置於至少一電腦主機內或者是分離設置。 According to the invention, according to the foregoing description and definition, a further technical feature is that the hardware can be installed in at least one computer host or separated.
而本發明第二種為一種主動式網路備份器,具備一實體安全開關,其包括:至少一電腦主機,其具有一權限單元;一硬體件,其與至少一電腦主機之間以直接連線或有線、無線區域網路連線方式相互連結,又該硬體件內設有一存取空間,存取至少一電腦主機所複製之資料,而該至少一電腦主機的權限單元係開放讀取權限給予硬體件主動進行單一方向的資料抓取複製,以及需要還原備份資料時該權限單元開放寫入權限給硬體件做單一方向寫入資料、還原其備份的資料回電腦主機;另外,該硬體件具有一實體安全開關,該實體安全開關控制著硬體件的至少一有線或無線之獨立輸出入連接埠的啟與閉,而該獨立的輸出入連接埠用於連接外部輸入設備以進行設定硬體件的備份及還原的程序設定。該實體安全開 關為至少由一個手動開關或鎖頭或指紋辨識或虹膜辨識所構成;其中,當管理人員需要進行或變更體硬件對電腦主機的設定之前,必須用人為的操作去開啟該實體安全開關才能使用獨立的輸出入連接埠,以進行硬體件的設定,藉以確認管理人員是臨機操作的行為,以防止機器人程式駭入。 The second type of the present invention is an active network backup device with a physical security switch, which includes: at least one computer host having a permission unit; and a hardware component directly connected to the at least one computer host. Connected or wired or wireless LAN connections are interconnected, and an access space is provided in the hardware to access data copied by at least one computer host, and the authority unit of the at least one computer host is open for reading The permission is given to the hardware to actively perform data capture and copy in a single direction, and when the backup data needs to be restored, the permission unit opens the write permission to the hardware to write data in a single direction and restore the backup data to the computer host; The hardware piece has a physical safety switch which controls the opening and closing of at least one wired or wireless independent input / output port of the hardware piece, and the independent input / output port is used to connect external input The device is used to configure the backup and restore program settings of the hardware. The physical security switch is composed of at least one manual switch or lock or fingerprint recognition or iris recognition. Among them, before the administrator needs to make or change the hardware settings of the computer host, it must be manually operated to turn on the physical security. The switch can use independent I / O ports for hardware settings to confirm that the management personnel acted on the fly to prevent robot programs from hacking.
本發明根據第二種實施型態的說明、定義下,其進一步的技術特徵在於,該硬體件具備一身分辨識單元,當實體安全開關被人員臨機開啟後,如果不是指紋辨識或虹膜辨識,則該管理人員必須再輸入密碼、語音識別等身份確認程序,才能登入及操作硬體件,以確保臨機操作的是管理人員。 According to the description and definition of the second implementation form, the present invention further has the technical feature that the hardware is provided with an identity recognition unit. When the physical security switch is turned on by personnel, if it is not fingerprint recognition or iris recognition, Then the manager must enter the password, voice recognition and other identity verification procedures to log in and operate the hardware to ensure that the manager is operating on the fly.
本發明根據第二種實施型態的說明、定義下,其進一步的技術特徵在於,該實體安全開關具有一自動計時關閉,如果在有效計時期間內有收到正確的設定訊息,便會重新計時,延緩自動關閉連線功能,以防止臨機操作的管理人員忘記關閉硬體件獨立的輸出入連接埠與設定硬體件時必需使用的鍵盤、滑鼠、螢幕、行動電話、可攜式裝置等等外部輸出入設備之間的連結。 According to the description and definition of the second implementation mode, the present invention further has the technical feature that the physical safety switch has an automatic timing off. If the correct setting message is received within the valid timing period, it will be re-timed. , Delay the automatic closing of the connection function, to prevent the management personnel on the fly from forgetting to close the independent input and output ports of the hardware and the keyboard, mouse, screen, mobile phone, portable device, etc. that must be used when setting the hardware Wait for the connection between external input and output devices.
本發明根據第二種實施型態的說明、定義下,其進一步的技術特徵在於,該自動計時器關閉結構在達到關閉條件後會先提出即將關閉連線的警告,使用者只要再操作一次實體安全開關或輸入正確的設定訊息就可以再延緩自動關閉功能。 According to the description and definition of the second implementation mode, the present invention further has the technical feature that the automatic timer closing structure will first warn that the connection will be closed after the closing condition is reached, and the user only needs to operate the entity again. The safety switch or entering the correct setting message can delay the auto-off function again.
本發明第三種實施型態為一種主動式網路備份器,具備排除破壞檔案指令的功能,其包括:至少一電腦主機,其具有一權限單元;一硬體件,其與至少一電腦主機之間以直接連線或有線、無線區域網路連線方式相互連結,又該硬體件內設有一存取空間存 取至少一電腦主機所複製之資料,而該至少一電腦主機的權限單元係開放讀取權限給予硬體件進行單一方向的資料抓取複製,以及需要還原備份資料時該權限單元開放寫入權限給硬體件做單一方向寫入資料、還原其備份的資料回電腦主機;其中,為了備份檔案的安全,該硬體件無法執行破壞性指令,如刪除、修改、開啟檔案(執行檔案)等會破壞或變更檔案的指令,僅有不具破壞性的指令如建立、搬移、複製、備份、還原等,當硬體件不幸備份到後來被病毒感染的資料時,因為該病毒無法在硬體件內執行或運作,所以無法破壞之前已經備份完成的資料,亦可避免因設定錯誤而發生誤刪等意外,或被綁架軟或惡意程式偽裝成設定程式,被粗心的使用者下載後執行而破壞檔案。 The third embodiment of the present invention is an active network backup device with a function of eliminating instructions for destroying files, which includes: at least one computer host having a permission unit; a hardware component and at least one computer host They are connected to each other by a direct connection or a wired or wireless LAN connection, and the hardware has an access space to access the data copied by at least one computer host, and the authority unit of the at least one computer host The open read permission gives hardware hardware a single direction of data grabbing and copying, and when the backup data needs to be restored, the permission unit opens the write permission to the hardware to write data in a single direction and restore the backup data back to the computer host. Among them, for the safety of backup files, this hardware cannot execute destructive instructions, such as delete, modify, open files (execute files), etc., which will destroy or change files, only non-destructive instructions such as create, move , Copy, backup, restore, etc., when the hardware is unfortunately backed up to the virus-infected data later, because the virus cannot be executed inside the hardware Or operations, it can not be destroyed before the backup data has been completed, the set also prevent accidental deletion and other unexpected errors occur, or abducted or malware disguised as soft setup program, and undermine the implementation of the file to be downloaded after careless users.
本發明根據第三種實施型態的說明、定義下,其進一步的技術特徵在於,該硬體件具備有外接備份媒體專用的一串接埠,該串接埠用以連接儲存媒體來搬移存取空間內老舊過期的備份資料以節省空間,當執行搬移指令時,如果沒有插入外接媒體,將無法完成搬移指令而停止。 According to the description and definition of the third embodiment, the present invention is further technically characterized in that the hardware is provided with a serial port dedicated to external backup media, and the serial port is used to connect to a storage medium for moving storage. Take the old and expired backup data in the space to save space. When the move instruction is executed, if the external media is not inserted, the move instruction cannot be completed and stopped.
因此本發明可說是一種相當具有實用性及進步性之發明,相當值得產業界來推廣,並公諸於社會大眾。 Therefore, the present invention can be said to be a very practical and progressive invention, which is worthy of being promoted by the industry and being made public.
(1)‧‧‧電腦主機 (1) ‧‧‧Computer host
(11)‧‧‧權限單元 (11) ‧‧‧Authority unit
(2)‧‧‧硬體件 (2) ‧‧‧hardware
(21)‧‧‧存取空間 (21) ‧‧‧Access Space
(22)‧‧‧彙整單元 (22) ‧‧‧Consolidation Unit
(23)‧‧‧控制單元 (23) ‧‧‧Control unit
(24)‧‧‧設定單元 (24) ‧‧‧Setting unit
(25)‧‧‧連接埠 (25) ‧‧‧Port
(26)‧‧‧偵測警示單元 (26) ‧‧‧Detection and warning unit
(27)‧‧‧身份辨識單元 (27) ‧‧‧Identification Unit
(28)‧‧‧串接埠 (28) ‧‧‧Port
(3)‧‧‧警示組件 (3) ‧‧‧Warning kit
(4)‧‧‧切換開關 (4) ‧‧‧Switch
(5)‧‧‧實體安全開關 (5) ‧‧‧Physical safety switch
(52)‧‧‧自動計時開關 (52) ‧‧‧Automatic timing switch
第一圖為本發明方塊示意圖。 The first figure is a block diagram of the present invention.
為了清楚說明本發明所能達成上述之目的及功效,茲搭配圖示就本發明的實施例加以詳細說明其特徵與功效。請參閱第 一圖至第三圖所示,本發明具有三種實施型態,首先第一種實施型態為一種主動式網路備份器,其包括:至少一電腦主機(1),其具有一權限單元(11);一硬體件(2),其與至少一電腦主機(1)之間以直接連線或用有線、無線區域網路連線方式相互連結,又於該硬體件(2)內部或外部設有一存取空間(21)存取至少一電腦主機(1)所複製之資料,而該至少一電腦主機(1)的權限單元(11)係開放讀取權限給予硬體件(2)主動進行單一方向的資料抓取複製,以及需要還原備份資料時該權限單元(11)開放寫入權限給硬體件(2)做單一方向寫入資料、還原其備份的資料回電腦主機(1),又該硬體件(2)內建有一彙整單元(22)對存取空間(21)內的資料進行整理、編排,以及內建有一控制單元(23)控制硬體件(2)對電腦主機(1)進行資料讀取、資料寫入,以及硬體件(2)的運作;其中,電腦主機(1)及其他網路設備無法對硬體件(2)進行登入、設定、資料存取,藉此可以讓硬體件(2)有至少一份安全獨立的備份資料以確實的防禦並阻斷病毒、綁架軟體與駭客的攻擊(前述為本發明主實施例之主要技術特徵,其對應本案申請專利範圍第一項的內容,得以詳知本發明之目的與實施型態,而其餘附屬申請專利範圍所述的技術特徵是為對申請專利範圍第一項內容的詳述或附加技術特徵,而非用以限制申請專利範圍第一項的界定範圍,應知本案申請專利範圍第一項不必要一定包含其餘附屬申請專利範圍所述的技術特徵)。 In order to clearly illustrate the above-mentioned objects and effects that the present invention can achieve, the features and effects of the embodiments of the present invention will be described in detail with reference to the drawings. Please refer to the first diagram to the third diagram. The present invention has three implementation forms. First, the first implementation form is an active network backup device, which includes: at least a computer host (1), which has a Authority unit (11); a hardware piece (2), which is connected to at least one computer host (1) by direct connection or wired or wireless LAN connection, and is connected to the hardware piece ( 2) An access space (21) is provided internally or externally to access the data copied by at least one computer host (1), and the authority unit (11) of the at least one computer host (1) is open to read hardware to the hardware (2) actively grab and copy data in a single direction, and when the backup data needs to be restored, the permission unit (11) opens the write permission to the hardware (2) to write data in a single direction and restore the backup data back The computer host (1) and the hardware (2) have a built-in integration unit (22) to organize and arrange the data in the access space (21), and a built-in control unit (23) to control the hardware (2) Read data, write data to the host computer (1), and operate the hardware (2); Machine (1) and other network equipment cannot log in, set, and access the hardware (2), so that the hardware (2) can have at least one secure and independent backup data to prevent and prevent Blocks attacks by viruses, kidnapping software, and hackers (the foregoing is the main technical feature of the main embodiment of the present invention, which corresponds to the content of the first item of the scope of the patent application for this case, and the purpose and implementation mode of the present invention can be known in detail, and The technical features described in the patent application scope of the subsidiary application are detailed or additional technical features of the first content of the patent application scope, rather than limiting the scope of the first patent application scope. Items do not necessarily include the technical features described in the scope of the remaining subsidiary application patents).
一般的公司行號或者是具有極高機密的檔案最怕的就是惡意軟體、綁架軟體、病毒及駭客的入侵、感染、攻擊,由其是在有網際網路連線的狀態下,病毒、惡意軟體等上述問題最容易透過網際網路的連線而四處流竄,導致電腦主機內部的各種資料、 檔案、軟體等遭受中毒、綁架等,以致於辛苦製作的檔案、資料都付諸流水,雖然市面上有所謂的防火牆與防毒、防盜軟體的協助,但是所具有的能力及功效實在有限,且根據現今科技的進步以及有心人士的惡意下,再高強的防火牆、安全軟體都還是有漏洞的存在,唯有隨時且持續備份才能減少損失,因此本發明透過硬體件(2)與電腦主機(1)之間的非網際網路方式連結設置下,讓硬體件(2)單獨成為獨立的元件,而硬體件(2)與電腦主機(1)之間的關係僅只有權限單元(11)具有開通與硬體件(2)之間傳輸的權限,且只能限制硬體件(2)單一方向的抓取、備份電腦主機(1)內的資料而儲放在存取空間(21)內,接著透過硬體件(2)內的彙整單元(22)將所複製進入存取空間(21)內的資料進行整理分類,此方式完全不須要透過網際網路的使用,大幅減少病毒、綁架軟體、駭客經由網際網路而攻擊、入侵;另外,當公司行號因電腦主機(1)內資料的遺失時,即可透過硬體件(2)的備存而找回原本的資料,但硬體件(2)內的資料要還原回電腦主機(1)時,僅能透過電腦主機(1)對硬體件(2)開放權限,讓原本位於存取空間(21)內未被感染(未被破壞)的資料一一還原回電腦主機(1),如此一來使用者可以從原本的歷程而繼續作業,不會造成檔案的遺失而必須重新製作而花費更多的精神及體力。 Ordinary company names or highly confidential files are most afraid of intrusions, infections, and attacks by malware, kidnapping software, viruses, and hackers. Because of the Internet connection, viruses, The above problems, such as malware, are most likely to flow around through the Internet connection, causing all kinds of data, files, software, etc. in the computer host to be poisoned and abducted, so that the hard-made files and data are put to waste, although There are so-called firewalls and the assistance of anti-virus and anti-theft software in the market, but their capabilities and effects are really limited. According to the advancement of science and technology and the malicious intentions of the people, there are still loopholes in high-performance firewalls and security software. The loss can be reduced only by continuous and continuous backup. Therefore, the present invention allows the hardware (2) to become independent independently through the non-internet connection between the hardware (2) and the computer host (1). Components, and the relationship between the hardware (2) and the host computer (1) is only the authority unit (11) has the authority to open and transfer between the hardware (2), and It can limit the single-direction grabbing of the hardware (2), backup the data in the computer host (1) and store it in the access space (21), and then through the integration unit (22) in the hardware (2) Sort and classify the data copied into the access space (21). This method does not require the use of the Internet at all, which greatly reduces viruses, kidnapping software, and hackers' attacks and intrusions via the Internet. In addition, when When the company line number is lost due to the loss of data in the computer host (1), the original data can be retrieved through the backup of the hardware (2), but the data in the hardware (2) must be restored to the computer ( 1), only through the computer host (1) to the hardware (2) to open the permissions, so that the original uninfected (undamaged) data in the access space (21) can be restored back to the computer host (1 ), In this way, users can continue to work from the original process, without causing the loss of files and must be re-created to spend more mental and physical energy.
根據前述本發明的第一實施型態之下,該硬體件(2)與電腦主機(1)之間必須為直接連線或者是利用有線、無線區域網路的架構下進行硬體件(2)對電腦主機(1)的資料備份與還原之相關動作,因為硬體件(2)本身不具備連上網際網路的功能,而且不能被電腦主機(1)等等設備控制與存取資料,如此一來可以杜絕了硬體件(2)遭受惡意程式、病毒、綁架軟體等予以入侵,避免已經備份完成的 資料受到破壞;另外,請參閱第一圖所示,本發明在該硬體件(2)的設計上進一步內建有一設定單元(24),以及一獨立運作的有線、無線之連接埠(25),其中該設定單元(24)可以針對硬體件(2)對電腦主機(1)的資料備份還原之程序設定,譬如說透過設定單元(24)可以設定硬體件(2)對電腦主機(1)的重要資料進行備份的設定,例如:資料選擇、備份週期、備份的位址、還原日期的設定(還原多久前的資料)等,上述都僅是列舉說明並非用以限定設定的類型,再者該設定單元(24)必須透過硬體件(2)獨立的連接埠(25),以有線或者是無線的連接才可以讓使用者透過設定單元(24)對硬體件(2)進行操作與設定,而該連接埠(25)可以連結外部設備提供使用者操作,又前述所指的外部設備例如行動裝置、鍵盤、滑鼠或是顯示器等,而外部設備透過連接埠(25)對硬體件(2)的連結並不會干涉且不同於硬體件(2)與電腦主機(1)之間的連結關係,因此兩種連線是相互隔離的狀態,藉此可以避免病毒、綁架軟體、駭客透過電腦主機(1)而入侵硬體件(2),請參閱第一圖所示。 According to the foregoing first embodiment of the present invention, the hardware (2) and the host computer (1) must be connected directly or be implemented using a wired or wireless LAN architecture. 2) Actions related to data backup and restoration of the computer host (1), because the hardware (2) itself does not have the function of connecting to the Internet, and cannot be controlled and accessed by the computer host (1) and other equipment Data, in this way, hardware (2) can be prevented from being invaded by malicious programs, viruses, abduction software, etc., to avoid damage to the data that has been backed up; in addition, please refer to the first figure, the present invention The design of the body piece (2) further includes a setting unit (24) and an independent wired and wireless port (25). The setting unit (24) can be used for the hardware (2) to the computer. Host computer (1) data backup and restore program settings, for example, through the setting unit (24), you can set the hardware (2) to back up important data of the computer host (1), such as: data selection, backup cycle , Setting of backup address and restore date The above information is just an example and is not used to limit the type of setting. In addition, the setting unit (24) must be wired or wireless through the independent port (25) of the hardware (2). The connection allows the user to operate and set the hardware (2) through the setting unit (24), and the port (25) can be connected to an external device for user operation, and the aforementioned external device such as a mobile device , Keyboard, mouse, or display, etc., and the connection of external devices to the hardware (2) through the port (25) does not interfere and is different from the connection between the hardware (2) and the host computer (1) Connection, so the two connections are isolated from each other, which can prevent viruses, kidnapping software, and hackers from invading the hardware (2) through the host computer (1), see the first figure.
請參閱第一圖所示,為了讓使用者能夠在第一時間判斷硬體件(2)對於電腦主機(1)的備份、還原之資料是否為正常,因此在該硬體件(2)進一步內建有一偵測警示單元(26),該偵測警示單元(26)主要偵測存取空間(21)內所複製的資料,以及所要複製之電腦主機(1)內之資料是否異常,該偵測警示單元(26)並進一步控制硬體件(2)之一警示組件(3)產生警示訊息提醒;而該警示組件(3)係為喇叭、蜂鳴器、閃爍燈或聲光元件,當硬體件(2)對電腦主機(1)進行備份時,如果發現所要備份的資料有異常的數據變化時,該偵測警示單元(26)因為是隨時處於檢查的運作下,以致於偵測到問題時就會啟 動一警示組件(3)產生警報的異常訊息提醒,或是通知電腦主機或使用者的可攜式裝置上提出警訊,如此一來就可以提供硬體件(2)的使用者快速的得知電腦主機(1)發生問題、異常;另外,本發明硬體件(2)的設置方式係可自己為獨立運作並與電腦主機(1)為分離設計,又或者是硬體件(2)內建於至少一電腦主機(1)內或NAS等網路儲存設備(1)內部。 Please refer to the first figure. In order to allow the user to determine at the first time whether the backup and restore data of the computer host (1) is normal, the hardware (2) further Built-in a detection warning unit (26), the detection warning unit (26) mainly detects whether the data copied in the access space (21) and whether the data in the computer host (1) to be copied is abnormal. Detecting the warning unit (26) and further controlling one of the warning components (3) of the hardware (2) to generate a warning message reminder; and the warning component (3) is a horn, a buzzer, a flashing light or an acousto-optic element, When the hardware (2) backs up the computer host (1), if it is found that the data to be backed up has abnormal data changes, the detection and warning unit (26) is under inspection at any time, so that the detection When a problem is detected, a warning component (3) will be activated to generate an abnormal message reminder of the alarm, or the computer host or the user's portable device will be alerted, so that hardware components can be provided (2) Users quickly learn that the host computer (1) has a problem or anomaly; in addition, The installation method of the invented hardware (2) can be designed to operate independently and separate from the computer host (1), or the hardware (2) is built in at least one computer host (1) or NAS, etc. Inside the network storage device (1).
最後,本發明在硬體件(2)的設計上進一步設有一切換開關(4),其主要是提供使用者在發現問題的時候能夠立即的停止運作,所以說透過切換開關(4)的設置下可以強制關閉硬體件(2)與電腦主機(1)之間的連線運作,可用於系統提出病毒或駭客入侵警示時自動或手動切斷或停止硬體件(2)與電腦主機(1)之間的連結,藉此保障了硬體件(2)、電腦主機(1)內部的安全性,以及資料的完整度,請參閱第一圖所示。 Finally, the present invention further provides a switch (4) on the design of the hardware (2), which mainly provides the user to stop the operation immediately when a problem is found. Therefore, the setting of the switch (4) You can forcibly close the connection between the hardware (2) and the computer host (1), which can be used to automatically or manually cut or stop the hardware (2) and the computer host when the system raises a virus or hacking intrusion alert (1) to ensure the internal security of the hardware (2), the host computer (1), and the integrity of the data. Please refer to the first figure.
根據上述本發明第一種實施型態之下,其第二種實施型態與第一種的差異僅在於該硬體件(2)設有一實體安全開關(5),該實體切換開關(4)控制著硬體件(2)的一有線或無線的獨立輸出入連接埠(25)的開啟與關閉,而該獨立的輸出入連接埠(25)用於設定硬體件(2)的備份及還原的程序設定。該實體安全開關(5)為至少由一個手動開關或鎖頭或指紋辨識或虹膜辨識所構成,請參閱第一圖所示,當管理人員需要進行或變更體硬體件(2)對電腦主機(1)的設定之前,必須用人為的操作去開啟該實體安全開關(5)才能使用獨立的輸出入連接埠(25),以進行硬體件(2)的備份或還原設定,藉以確認管理人員是臨機操作的行為,以防止機器人程式駭入,請參閱第一圖所示。 According to the first embodiment of the present invention, the second embodiment differs from the first embodiment only in that the hardware (2) is provided with a physical safety switch (5), and the physical switch (4) ) Controls the opening and closing of a wired or wireless independent I / O port (25) of the hardware (2), and the independent I / O port (25) is used to set up a backup of the hardware (2) And restore program settings. The physical security switch (5) is composed of at least one manual switch or lock or fingerprint recognition or iris recognition. Please refer to the first picture, when the management staff needs to make or change the hardware and hardware parts (2) to the computer host Before the setting of (1), the physical security switch (5) must be turned on manually to use the independent I / O port (25) to perform the backup or restore settings of the hardware (2) to confirm the management Personnel are ad hoc operations to prevent robot programs from hacking, please refer to the first picture.
接續上述之說明,為了確保是使用者開啟硬體件(2)的運作,因此該硬體件(2)進一步包含有一身份辨識單元(27),當實體安全開關(5)被人員臨機開啟後,如果不是指紋辨識或虹膜辨識,則該管理人員必須再輸入密碼、語音識別等身份確認程序,才能登入及操作硬體件(2),以確保臨機操作的是管理人員(使用者),請參閱第一圖所示;又為了要徹底的達到預防病毒、綁架軟體的入侵,必須確實的限制使用者使用的時間,因此該實體安全開關(5)具有一自動計時開關(52),如果在有效計時期間內有收到正確的設定訊息,便會重新計時,延緩自動關閉連線功能,以防止臨機操作的管理人員忘記關閉硬體件(2)與設定輸入設備之間的連接埠(25)連結,反之如果在有效時間內尚未正確的設定訊息時,即刻關閉硬體件(2)與設定輸入設備之間獨立的輸出入連接埠(25)連線,避免有意圖的病毒、軟體透過此連結的輸入設備入侵硬體件(2),又該自動計時開關(52)在達到關閉條件後(時間到)會先提出即將關閉連線的警告,使用者只要再操作一次實體安全開關(5)或輸入正確的設定訊息就可以再延緩自動關閉功能,如第一圖所示。 Following the above description, in order to ensure that the operation of the hardware piece (2) is turned on by the user, the hardware piece (2) further includes an identification unit (27). When the physical security switch (5) is turned on by the personnel on the plane If it is not fingerprint recognition or iris recognition, the manager must enter the identity verification procedures such as password and voice recognition to log in and operate the hardware (2) to ensure that the manager (user) is operating on-the-fly. Refer to the first figure; and in order to completely prevent the invasion of viruses and abduction software, the user's time must be restricted. Therefore, the physical security switch (5) has an automatic timer switch (52). When the correct setting message is received within the valid time period, it will re-time and delay the automatic closing of the connection function to prevent the manager of ad hoc operation from forgetting to close the port between the hardware (2) and the setting input device (25 ) Connection, if the setting information has not been set correctly within the valid time, immediately close the independent I / O port (25) connection between the hardware (2) and the setting input device to avoid The intended virus and software invade the hardware (2) through this connected input device, and the automatic timer switch (52) will first warn that the connection will be closed after the shutdown condition is reached (time is up). By operating the physical security switch (5) once or entering the correct setting message, the automatic shutdown function can be postponed again, as shown in the first figure.
最後,本發明第三實施型態有別於前兩種實施型態,其重點在於為了備份檔案的安全,該硬體件(2)無法執行破壞性指令,如刪除、修改、開啟檔案(執行檔案)等等會破壞或變更檔案的指令,僅有不具破壞性的指令,例如建立、搬移、複製、備份、還原等,當硬體件不幸備份到後來被病毒感染的資料時,因為該病毒無法在硬體件內執行或運作,所以無法破壞之前已經備份完成的資料,亦可避免因設定錯誤而發生誤刪等意外,或被綁架軟或惡意程式偽裝成設定程式,被粗心的使用者下載後執行而破壞檔案;另外, 該硬體件(2)具備有外接備份媒體專用的一串接埠(28),該串接埠(28)用以連接儲存媒體來搬移存取空間內老舊過期的備份資料以節省空間,當執行搬移指令時,如果沒有插入外接媒體,將無法完成搬移指令而停止,請參閱第一圖所示。 Finally, the third embodiment of the present invention is different from the first two implementations. The main point is that for the safety of backup files, the hardware (2) cannot execute destructive instructions, such as deleting, modifying, and opening files (executing Files) and other instructions that can destroy or change files. There are only non-destructive instructions, such as creating, moving, copying, backing up, restoring, etc., when the hardware is unfortunately backed up to data that was later infected by the virus, because the virus It cannot be executed or operated in hardware, so it cannot destroy previously backed up data. It can also avoid accidents such as accidental deletion due to incorrect settings, or abducted software or malicious programs disguised as setting programs and being careless users. The file is executed after downloading and destroys the file. In addition, the hardware (2) is provided with a series of ports (28) dedicated to external backup media. The series of ports (28) are used to connect storage media to move the old storage space. The old expired backup data saves space. When the move instruction is executed, if the external media is not inserted, the move instruction cannot be completed and stopped, see the first figure.
由上所述者僅為用以解釋本發明之較佳實施例,並非企圖據以對本發明做任何形式上之限制,是以,凡有在相同之發明精神下所做有關本發明之任何修飾或變更者,為其他可據以實施之型態且具有相同效果者,皆仍應包括在本發明意圖保護之範疇內。 The above are only used to explain the preferred embodiments of the present invention, and are not intended to limit the present invention in any form. Therefore, any modification of the present invention made in the same spirit of the invention Or the changes, which are other forms that can be implemented and have the same effect, should still be included in the scope of the present invention.
綜上所述,本發明「主動式網路備份器」,其實用性及成本效益上,確實是完全符合產業上發展所需,且所揭露之結構發明亦是具有前所未有的創新構造,所以其具有「新穎性」應無疑慮,又本發明可較習用之結構更具功效之增進,因此亦具有「進步性」,其完全符合我國專利法有關發明專利之申請要件的規定,乃依法提起專利申請,並敬請 鈞局早日審查,並給予肯定。 To sum up, the "active network backup device" of the present invention is practically and cost-effectively in full compliance with the needs of industrial development, and the disclosed structural invention also has an unprecedented innovative structure, so its There should be no doubt about "newness", and the present invention can be more effective than the conventional structure, so it is also "progressive". It fully meets the requirements of the patent application requirements for invention patents in China. Application and kindly ask the Bureau to review and give affirmation.
Claims (12)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106118922A TWI665579B (en) | 2017-06-07 | 2017-06-07 | Active network backup |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106118922A TWI665579B (en) | 2017-06-07 | 2017-06-07 | Active network backup |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201903642A TW201903642A (en) | 2019-01-16 |
| TWI665579B true TWI665579B (en) | 2019-07-11 |
Family
ID=65803477
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW106118922A TWI665579B (en) | 2017-06-07 | 2017-06-07 | Active network backup |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI665579B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW200428215A (en) * | 2003-06-11 | 2004-12-16 | Ming-Chiao Ho | Information recovery device of computer system and method for the device to restore information of computer system |
| TW200908006A (en) * | 2007-08-13 | 2009-02-16 | Transcend Information Inc | Write-protection module and method for storage device |
-
2017
- 2017-06-07 TW TW106118922A patent/TWI665579B/en not_active IP Right Cessation
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW200428215A (en) * | 2003-06-11 | 2004-12-16 | Ming-Chiao Ho | Information recovery device of computer system and method for the device to restore information of computer system |
| TW200908006A (en) * | 2007-08-13 | 2009-02-16 | Transcend Information Inc | Write-protection module and method for storage device |
Also Published As
| Publication number | Publication date |
|---|---|
| TW201903642A (en) | 2019-01-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20180375826A1 (en) | Active network backup device | |
| US10303877B2 (en) | Methods of preserving and protecting user data from modification or loss due to malware | |
| CA3040115C (en) | Method and system for countering ransomware | |
| EP3479280B1 (en) | Ransomware protection for cloud file storage | |
| KR101641697B1 (en) | Security box | |
| EP3502943A1 (en) | Method and system for generating cognitive security intelligence for detecting and preventing malwares | |
| CN107563199A (en) | It is a kind of that software detection and defence method in real time are extorted based on file request monitoring | |
| CN101877039A (en) | A Fault Detection Technology for Server Operating System | |
| Maniath et al. | Survey on prevention, mitigation and containment of ransomware attacks | |
| AlKilani et al. | Data exfiltration techniques and data loss prevention system | |
| CN110087238B (en) | Information security protection system of mobile electronic equipment | |
| KR20180060819A (en) | Apparatus and method for blocking attack of ransom ware | |
| TWI665579B (en) | Active network backup | |
| Kezron | An Offline Cybersecurity Device for US Small Businesses: Detecting Ransomware and Restoring Data Without Internet or Cloud | |
| Alzahrani et al. | An overview of ransomware in the windows platform | |
| CN207051883U (en) | Active network backup device | |
| TWM553005U (en) | Active network backup | |
| CN109002371A (en) | Active network backup device | |
| Shi et al. | The security and protection strategy study of computer network information | |
| McIntosh | RanDeter: using novel statistical and physical controls to deter ransomware attacks: a thesis presented in partial fulfillment of the requirements for the degree of Master of Information Sciences in Software Engineering at Massey University, Auckland, New Zealand | |
| CN105718810B (en) | The guard method of virtual machine sensitive document and device | |
| Branche | Ransomware: An Analysis of the Current and Future Threat Ransomware Presents | |
| Shastri et al. | Data vault: A security model for preventing data theft in corporate | |
| González et al. | Versatile endpoint storage security with trusted integrity modules | |
| Rodriguez | Hidden Backdoor |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |