Control method of recoverable file protection device and protection method of recoverable file
First Claim
1. A control method of a recoverable file protection device, comprising steps of:
- displaying a file including a normal data zone and a customized hidden zone by the recoverable file protection device, and storing an unprotected data in the normal data zone;
opening a file protection program via the recoverable file protection device by a file owner;
setting a secured content in the unprotected data by the file owner after opening the file protection program via the recoverable file protection device;
setting a secured content protection mode after setting the secured content via the recoverable file protection device;
moving the secured content to the customized hidden zone in accordance with the secured content protection mode by the recoverable file protection device;
saving the unprotected data without the secured content in the normal data zone to form a first protection data by the recoverable file protection device;
encrypting the secured content with an authentication key inputted by the file owner via the recoverable file protection device;
requesting a user to input an identification verifying data when the recoverable file protection device receives a control signal to open the file; and
comparing the identification verifying data with the authentication key by the recoverable file protection device;
moving the secured content from the customized hidden zone and the first protection data from the normal data zone to recover the unprotected data via the file protection program in the recoverable file protection device when the identification verifying data complies with the authentication key; and
displaying the first protection data by the recoverable file protection device when the identification verifying data does not comply with the authentication key;
setting a file sharing protection rule including a file secured content and a file secured content protection mode by the recoverable file protection device;
setting the file secured content in the first protection data in accordance with the file sharing protection rule by the recoverable file protection device;
moving the file secured content of the first protection data to the customized hidden zone in accordance with the file secured content protection mode of the file sharing protection rule; and
saving the first protection data without the file secured content in the normal data zone to form a second protection data.
1 Assignment
0 Petitions
Accused Products
Abstract
A control method of a recoverable file protection device and a protection method of a recoverable file are provided. After a file owner sets a secured content in an unprotected data, a secured content protection mode is selected. In accordance with the secured protection mode, the recoverable file protection device can move the secured content and the marked content can replace the secured content. An authentication key is inputted to encrypt the secured content. If a user would like to open the file, the user is requested to verify an identification data. If the identification data complies with the authentication key, the recoverable file protection device moves the secured content to recover the original content. If the identification data doesn'"'"'t comply with the authentication key, the file content without the secured content is opened. Therefore, a security of an e-file can be achieved.
-
Citations
35 Claims
-
1. A control method of a recoverable file protection device, comprising steps of:
-
displaying a file including a normal data zone and a customized hidden zone by the recoverable file protection device, and storing an unprotected data in the normal data zone; opening a file protection program via the recoverable file protection device by a file owner; setting a secured content in the unprotected data by the file owner after opening the file protection program via the recoverable file protection device; setting a secured content protection mode after setting the secured content via the recoverable file protection device; moving the secured content to the customized hidden zone in accordance with the secured content protection mode by the recoverable file protection device; saving the unprotected data without the secured content in the normal data zone to form a first protection data by the recoverable file protection device; encrypting the secured content with an authentication key inputted by the file owner via the recoverable file protection device; requesting a user to input an identification verifying data when the recoverable file protection device receives a control signal to open the file; and comparing the identification verifying data with the authentication key by the recoverable file protection device; moving the secured content from the customized hidden zone and the first protection data from the normal data zone to recover the unprotected data via the file protection program in the recoverable file protection device when the identification verifying data complies with the authentication key; and displaying the first protection data by the recoverable file protection device when the identification verifying data does not comply with the authentication key; setting a file sharing protection rule including a file secured content and a file secured content protection mode by the recoverable file protection device; setting the file secured content in the first protection data in accordance with the file sharing protection rule by the recoverable file protection device; moving the file secured content of the first protection data to the customized hidden zone in accordance with the file secured content protection mode of the file sharing protection rule; and saving the first protection data without the file secured content in the normal data zone to form a second protection data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A control method of a recoverable file protection device, comprising steps of:
-
connecting the recoverable file protection device with a server; receiving a file sharing protection rule including a file secured content and a file secured content protection mode and an authentication key from the server; displaying a file including a normal data zone and a customized hidden zone by the recoverable file protection device, and the normal data zone saving an unprotected data; opening a file protection program by a file owner in the recoverable file protection device; setting the file secured content in accordance with the file sharing protection rule after opening the file protection program in the recoverable file protection device and moving the file secured content to the customized hidden zone in accordance with the file secured content protection mode of the file sharing protection rule; saving the unprotected data without the file secured content in the normal data zone to form a first protection data by the recoverable file protection device; encrypting the file secured content with the authentication key by the recoverable file protection device; requesting a user to input an identification verifying data when the recoverable file protection device receives a control signal; comparing the identification verifying data with the authentication key by the recoverable file protection device; moving the file secured content from the customized hidden zone and the first protection data from the normal data zone to recover the unprotected data by the file protection program of the recoverable file protection device when the identification verifying data complies with the authentication key; and displaying the first protection data by the recoverable file protection device when the identification verifying data does not comply with the authentication key; setting a file sharing protection rule including a file secured content and a file secured content protection mode by the recoverable file protection device; setting the file secured content in the first protection data in accordance with the file sharing protection rule by the recoverable file protection device; moving the file secured content of the first protection data to the customized hidden zone in accordance with the file secured content protection mode of the file sharing protection rule; and saving the first protection data without the file secured content in the normal data zone to form a second protection data. - View Dependent Claims (22, 23, 24)
-
-
25. A protection method of a recoverable file comprising steps of:
-
including a normal data zone and a customized hidden zone in a file by a recoverable file protection device and saving an unprotected data in the normal data zone; opening a file protection program from the recoverable file protection device; setting a secured content in the unprotected data by the recoverable file protection device; setting a secured content protection mode after setting the secured content by the recoverable file protection device; moving the secured content to the customized hidden zone in accordance with the secured content protection mode by the recoverable file protection device; saving the unprotected data without the secured content in the normal data zone to form a first protection data in the recoverable file protection device; inputting an authentication key to encrypt the secured content in the recoverable file protection device; requesting a user to input an identification verifying data when the recoverable file protection device receiving a control signal to open the file; moving the secured content from the customized hidden zone and the first protection data from the normal data zone to recover the unprotected data when the identification verifying data complies with the authentication key in the recoverable file protection device; and displaying the first protection data when the identification verifying data does not comply with the authentication key in the recoverable file protection device; setting a file sharing protection rule including a file secured content and a file secured content protection mode by the recoverable file protection device; setting the file secured content in the first protection data in accordance with the file sharing protection rule by the recoverable file protection device; moving the file secured content of the first protection data to the customized hidden zone in accordance with the file secured content protection mode of the file sharing protection rule; and saving the first protection data without the file secured content in the normal data zone to form a second protection data. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification