×

CONTROL METHOD OF RECOVERABLE FILE PROTECTION DEVICE AND PROTECTION METHOD OF RECOVERABLE FILE

  • US 20170024401A1
  • Filed: 07/19/2016
  • Published: 01/26/2017
  • Est. Priority Date: 07/23/2015
  • Status: Active Grant
First Claim
Patent Images

1. A control method of a recoverable file protection device, comprising steps of:

  • displaying a file including a normal data zone and a customized hidden zone by the recoverable file protection device, and storing an unprotected data in the normal data zone;

    opening a file protection program via the recoverable file protection device by a file owner;

    setting a secured content in the unprotected data by the file owner after opening the file protection program via the recoverable file protection device;

    setting a secured content protection mode after setting the secured content via the recoverable file protection device;

    moving the secured content to the customized hidden zone in accordance with the secured content protection mode by the recoverable file protection device;

    saving the unprotected data without the secured content in the normal data zone to form a first protection data by the recoverable file protection device;

    encrypting the secured content with an authentication key inputted by the file owner via the recoverable file protection device;

    requesting a user to input an identification verifying data when the recoverable file protection device receives a control signal to open the file; and

    comparing the identification verifying data with the authentication key by the recoverable file protection device;

    moving the secured content from the customized hidden zone and the first protection data from the normal data zone to recover the unprotected data via the file protection program in the recoverable file protection device when the identification verifying data complies with the authentication key; and

    displaying the first protection data by the recoverable file protection device when the identification verifying data does not comply with the authentication key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×