×

Control method of recoverable file protection device and protection method of recoverable file

  • US 10,216,745 B2
  • Filed: 07/19/2016
  • Issued: 02/26/2019
  • Est. Priority Date: 07/23/2015
  • Status: Active Grant
First Claim
Patent Images

1. A control method of a recoverable file protection device, comprising steps of:

  • displaying a file including a normal data zone and a customized hidden zone by the recoverable file protection device, and storing an unprotected data in the normal data zone;

    opening a file protection program via the recoverable file protection device by a file owner;

    setting a secured content in the unprotected data by the file owner after opening the file protection program via the recoverable file protection device;

    setting a secured content protection mode after setting the secured content via the recoverable file protection device;

    moving the secured content to the customized hidden zone in accordance with the secured content protection mode by the recoverable file protection device;

    saving the unprotected data without the secured content in the normal data zone to form a first protection data by the recoverable file protection device;

    encrypting the secured content with an authentication key inputted by the file owner via the recoverable file protection device;

    requesting a user to input an identification verifying data when the recoverable file protection device receives a control signal to open the file; and

    comparing the identification verifying data with the authentication key by the recoverable file protection device;

    moving the secured content from the customized hidden zone and the first protection data from the normal data zone to recover the unprotected data via the file protection program in the recoverable file protection device when the identification verifying data complies with the authentication key; and

    displaying the first protection data by the recoverable file protection device when the identification verifying data does not comply with the authentication key;

    setting a file sharing protection rule including a file secured content and a file secured content protection mode by the recoverable file protection device;

    setting the file secured content in the first protection data in accordance with the file sharing protection rule by the recoverable file protection device;

    moving the file secured content of the first protection data to the customized hidden zone in accordance with the file secured content protection mode of the file sharing protection rule; and

    saving the first protection data without the file secured content in the normal data zone to form a second protection data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×