Method with the functions of virtual space and data encryption and invisibility
First Claim
1. A kind of method with the functions of virtual space and data encryption and invisibility is applied to an embedded data storage device to protect files through an encryption procedure and conceal data of the embedded data storage device and a data process apparatus;
- the method consists of the following steps;
Installing the embedded data storage device into a data process apparatus;
Establishing at least a virtual database on the data process apparatus;
Setting the virtual database through the user end;
Storing a file in the virtual database;
Detecting if the data process apparatus is still equipped with the embedded data storage device; and
Concealing a specific path of the file displayed on the data process apparatus.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method with the functions of virtual space and data encryption and invisibility that stores a file data as encrypted code through an encryption mechanism. Data can be read through an embedded data storage device only. In the mean while, the invention enables a specific path of data stored on the data process apparatus can be concealed. The invention utilizes dual security for enhancing data security and confidentiality to achieve the object of data security management.
-
Citations
19 Claims
-
1. A kind of method with the functions of virtual space and data encryption and invisibility is applied to an embedded data storage device to protect files through an encryption procedure and conceal data of the embedded data storage device and a data process apparatus;
- the method consists of the following steps;
Installing the embedded data storage device into a data process apparatus;
Establishing at least a virtual database on the data process apparatus;
Setting the virtual database through the user end;
Storing a file in the virtual database;
Detecting if the data process apparatus is still equipped with the embedded data storage device; and
Concealing a specific path of the file displayed on the data process apparatus. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
- the method consists of the following steps;
Specification