This application claims the benefit of People's Republic of China application Serial No. 201510017604.1, filed on Jan. 14, 2015, the subject matter of which is incorporated herein by reference.
1. Technical Field
The disclosure relates in general to a data protection method and an electronic device using the same, and more particularly to a data protection method using a hot key and an electronic device using the same.
2. Background
In conventional, when a file management program is executed, almost all data stored in a computer is displayed. As a result, the displayed data may be subjected to a risk of data being stolen, even if the displayed data is protected by password.
The invention is directed to a data protection method and an electronic device using the same, the risk of data being stolen may be reduced.
According to one embodiment of the invention, a data protection method is provided. The data protection method includes the following steps. Response to a setting for a first hot key, storing the first hot key and establishing a first virtual storing unit in a storing element; and response to a first-time input for the first hot key, displaying a frame of the first virtual storing unit.
According to another embodiment of the invention, an electronic device is provided. The electronic device includes a display unit, a storing unit, an input unit and a processor. The storing unit is for storing data. The input unit is for receiving a setting for a first hot key. The processor is for operating in: response to the setting for the first hot key, storing the first hot key and establishing a first virtual storing unit in the storing element; and response to a first-time input for the first hot key, displaying a frame of the first virtual storing unit.
The above and other aspects of the invention will become better understood with regard to the following detailed description of the preferred but non-limiting embodiment(s). The following description is made with reference to the accompanying drawings.
In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed embodiments. It will be apparent, however, that one or more embodiments may be practiced without these specific details. In other instances, well-known structures and devices are schematically shown in order to simplify the drawing.
Referring to
In step S110, the electronic device 100 is provided, wherein the electronic device 100 includes a processor 110, a display unit 120 and an input unit 130. The electronic device 100 is, for example, a desktop computer, notebook, a tablet computer, a cell phone, etc. The input unit 130 is, for example, a physical keyboard, a virtual keyboard, a physical key, a virtual key or other apparatus capable of receiving an instruction. The electronic device 100 further includes a storing unit 140 for storing data. The storing unit 140 may be conventional hard disk, solid state disk (SSD), memory, etc.
In step S120, after the processor 110 loads a data protection program C1, the first user may input a first hot key H1 through the input unit 130 for establishing a first virtual storing unit 141 and storing the first hot key H1. Examples of the storing unit 140 being a conventional hard disk, the first virtual storing unit 141 is a first virtual disk 141, and a size of magnetic region of the first virtual disk 141 may be determined by user. The first hot key H1 may serve as a hot key for displaying or closing a frame of the first virtual disk 141 in the display unit 120. A displayed frame of the first virtual disk 141 is shown in
In detail, the processor 110 distributes a magnetic region of the storing unit 140 as the first virtual disk 141 for storing various data. In this step, the relationship between the first virtual disk 141 and the first hot key H1 is completed.
Since the data stored in the magnetic region of the virtual disk is package into a mirror file by binary form, it is not easy to obtain the data stored in the magnetic region of the virtual disk by searching or other decoding way. As a result, an effect on security can be reached.
Then, the first user may trigger the first hot key H1 to display the disk format of the magnetic region of the first virtual disk 141, as described below.
In step S130, referring to
In step S130, the processor 110 records the number of the trigger times as once response to the first-time trigger for the first hot key H1.
The first user may trigger the first hot key H1 again for closing the frame of the first virtual disk 141. As a result, the data which is intended to be protected may be hidden, and thus the risk of data being stolen may be reduced. As described in S140 below.
In step S140, the first user may trigger the first hot key H1 again. The processor 110 controls the display unit 120 to close the frame of the first virtual disk 141 response to the second-time trigger for the first hot key H1. That is, when the first hot key H1 is triggered twice, the processor 110 controls the display unit 120 to close the frame of the first virtual disk 141. As a result, the data which is intended to be protected may be prevented from being displayed in the file management program, and the risk of data being stolen may be reduced. In addition, when the number of the trigger times of the first hot key H1 is two, the number of the trigger times of the first hot key H1 will be recalculated (that is, returns to zero). After returning to zero, the next-time input for the first hot key is redefined as the first-time input. If user inputs the first hot key again, the file management program displays the frame of the first virtual disk 141.
In step S210, after the processor 110 loads the data protection program C1, the second user may input a second hot key H2 through the input unit 130 to establish a second virtual disk 142. The second hot key H2 may serve as the hot key capable of displaying or closing the second virtual disk 142.
In step S210, the processor 110 establishes a magnetic region of the second virtual disk 142. In detail, the processor 110 distributes a magnetic region of the storing unit 140 as the second virtual disk 142 for storing various data. In this step, the relationship between the second virtual disk 142 and the second hot key H2 is completed.
Then, the second user may trigger the second hot key H2 to display the disk format of the magnetic region of the second virtual disk 142, as described below.
In step S220, after the second user triggers the second hot key H2, the processor 110 determines whether the number of the trigger times of the first hot key H1 is zero; if the number of the trigger times of the first hot key H1 is zero, it means that the frame of the first virtual disk 141 has been closed, and the processor 110 controls the display unit 120 to directly display the frame of the second virtual disk 142 (in step S230); if the number of the trigger times of the first hot key H1 is not zero, it means that the frame of the first virtual disk 141 has not been closed yet, and the processor 110 controls the display unit 120 to close the frame of the first virtual disk 141 (in step S240) and then to display the frame of the second virtual disk 142 (in step S250).
In the present embodiment, under the circumstance of the several virtual disks and the corresponding hot keys, before the frame of the virtual disk is displayed response to the currently input hot key, whether other virtual disk is closed is determined. As a result, since the frame of the first virtual disk 141 is closed before the second virtual disk 142 is displayed, the displayed data of the first virtual disk 141 is prevented from being observed or seen by other user and thus the risk of data being stolen can be reduced.
To summarize, in the data protection method disclosed in above embodiments of the invention, the data which is intended to be protected is stored in the storing unit. As a result, it is not easy to obtain data which is intended to be protected by searching. In addition, since the frame of the virtual disk may be displayed or closed by using hot key, the security of the data and speed of displaying the virtual disk can be increased.
It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed embodiments. It is intended that the specification and examples be considered as exemplary only, with a true scope of the disclosure being indicated by the following claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
201510017604.1 | Jan 2015 | CN | national |