1. Technical Field
Embodiments of the present disclosure relate generally to data security technologies, and particularly to an apparatus and a method for protecting data stored in a data storage device.
2. Description of Related Art
Data storage devices, such as mobile phones and personal digital assistants (PDA), may be used to store various data, which may include some private or confidential data. Sometimes, the data stored in the data storage devices may be illegally copied or transmitted to other devices. If private or confidential data is leaked without authorization, the owner of the data may experience difficulties or incalculable losses. Therefore, an improved solution for data security of the data storage device is desired.
The disclosure, including the accompanying drawings, is illustrated by way of example and not by way of limitation. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean at least one.
The data protection system 10 may include a plurality of programs in the form of one or more computerized instructions stored in the storage unit 11 and executed by the processor 12 to perform operations of the data storage device 1. In the embodiment, the data protection system 10 includes a setting module 101, a determination module 102, an execution module 103, and a verification module 104. In general, the word “module”, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language, such as, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as in an erasable programmable read only memory (EPROM). The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable medium include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives.
The setting module 101 sets one or more safe destinations, and correlates the one or more safe destinations with predetermined data stored in the data storage device 1. In the embodiment, each of the safe destinations is defined as an objective storage medium, which is authorized by a user to receive the predetermined data transmitted from the data storage device 1. The objective storage medium may include terminal devices (e.g., mobile phones and computers), website servers having determined website addresses, and other similar storage devices. In one example, when a terminal device is set as one of the safe destinations, identification of the terminal device is stored in the storage unit 11. For example, if the terminal device is a mobile phone, the identification of the mobile phone may be international mobile equipment identification (IMEI) of the mobile phone. If the terminal device is a computer, the identification of the computer may be a MAC address of the computer. If the terminal device is a website server, identification of the website server may be a website address of the website server.
The determination module 102 determines whether a target destination matches with one of the safe destinations, when target data of the data storage device 1 correlated with the safe destinations is needed to be transmitted to the target destination.
The execution module 103 executes a data transmission program of the data storage device 1, and transmits the target data to the target destination, when the target destination matches with one of the safe destinations. For example, if the target destination is a particular website server, the execution module 103 transmits the target data to the particular website server through a network between the data storage device 1 and the particular website server. If the target destination is a terminal device, the execution module 103 transmits the target data to the terminal device using a connection medium, such as BLUETOOTH or a data transmission bus connected between the data storage device 1 and the terminal device.
Upon the condition that the target destination does not match any of the safe destinations, the verification module 104 notifies the user to input a password and verifies whether the user is authorized to transmit the target data. In detail, the verification module 104 determines whether the user has input a valid password that is the same as a preset password within a predetermined time period. If the user has input the valid password within the predetermined time period, the user of the data storage device 1 is verified to be authorized to transmit the target data, and the execution module 103 transmits the target data to the target destination using the data transmission program. If the user has not input the valid password within the predetermined time period, the user is verified not to be authorized to transmit the target data, and the execution module 103 prevents the transmission of the target data to the target destination. In the embodiment, the preset password may be preset by the user using the setting module 101. As mentioned above, even if the target destination does not match any of the safe destinations, the target data can also be transmitted to the target destination upon the condition that a valid password has been inputted.
In step S01, the setting module 101 sets one or more safe destinations, and correlates predetermined data of the data storage device 1 with the one or more safe destinations.
In step S02, when target data stored correlated with the safe destinations is needed to be transmitted to a target destination, the determination module 102 determines whether the target destination matches with one of the safe destinations. If the target destination matches with one of the safe destinations, step S05 is implemented.
Otherwise, if the target destination does not match with any of the safe destinations, step S03 is implemented.
In step S03, the verification module 104 notifies the user to input a password when the target destination does not match any of the safe destinations.
In step S04, the verification module 104 determines whether the user has input a valid password that is the same to a preset password within a predetermined time period. If the user has input the valid password within the predetermined time period, the user of the data storage device 1 is verified to be authorized to transmit the target data and step S05 is implemented. If the user has not input the valid password within the predetermined time period, the user of the data storage device 1 is verified not to be authorized to transmit the target data and step S06 is implemented.
In step S05, the execution module 103 executes a data transmission program of the data storage device 1, and transmits the target data to the target destination.
In step S06, the execution module 103 prevents the transmission of the target data to the target destination.
Although certain embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
201210008335.9 | Jan 2012 | CN | national |