The present invention relates to a data protection systems and methods thereof, and specifically, to an image protection system and method of a digital product.
With ongoing developments in digital science technology, new digital products such as digital cameras and mobile phones with camera function have become popular in daily life. Pictures can be stored by the digital products and transmitted over hardwired/wireless networks. However, regarding transmitting image files of these pictures, it is important to ensure that data (like image files) is safely kept and access to it suitably controlled. Therefore, a data protection method can help to ensure data privacy and data protection.
A conventional data protection method for image files is introduced. The protection method separates an image file into a first part and a second part. The protection method encrypts the second part and replaces the first part with substitute data to protect the data. To access the data, the protection system has to find the second part first, decipher the second part first, and then restore the first part after the second part is deciphered. Generally, the conventional protection method involves complex processes and therefore consumes time and memory of computers.
Therefore, it is desired to provide a simple and faster data protection method and system.
In accordance with a present embodiment, a data protection system is provided. The data protection system includes a storage module, an input module, and a logistic module. The storage module is configured for storing data and a preset password. The input module is configured for inputting a password. The logistic module is configured for comparing the input password with the preset password. If the input password is not identical to the preset password, the storage module is blocked from accessing data.
Other novel features and advantages will be drawn from the following detailed description of at least one preferred embodiment, when considered in conjunction with the attached drawings.
Many aspects of the present data protection system and method can be better understood with reference to the following drawings. The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present data protection system and method. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
Embodiments of the present data protection system and method will now be described in detail below and with reference to the drawings.
Referring to
The storage module 10 is configured for storing data (for example, image files taken by the digital camera), a preset password, and a flag setting. In this present embodiment, the storage module 10 includes at least, as shown in
The flag setting can be a first value or a second value. When the flag setting is the first value, access to the first storage unit 1001 is blocked. When the flag setting is the second value, the first storage unit 1001 is accessible.
The preset password is a predetermined password of the data protection system 1. The preset password is configured for ensuring privacy and protecting the first storage unit 1001 of the storage module 10 from unauthorized access.
The input module 11 is configured for inputting a password. When the input password is identical to the preset password, the data stored in the first storage unit 1001 of the storage module 10 becomes accessible.
The logistic module 12 is configured for comparing the input password with the preset password. If the input password is identical to the preset password, then the flag setting is changed to the second value and the data stored in the first storage unit 1001 is capable of being accessed. After operations of accessing the data stored in the first storage unit 1001 are finished, the flag setting is changed to the first value. If the input password is not identical to the preset password, then the flag setting is set to the first value and the first storage unit 1001 is blocked.
Operations of accessing the data stored in the first storage unit 1001 include, for example, opening, copying, printing, and transferring, and editing operations.
The password module 13 is configured for determining the preset password, which is stored in the second storage unit 1002.
Referring to
Referring to
It will be understood that the above particular embodiments are described and shown in the drawings by way of illustration only. The principles and features of the present invention may be employed in various and numerous embodiments thereof without departing from the scope of the invention as claimed. The above-described embodiments illustrate the scope of the invention but do not restrict the scope of the invention.
| Number | Date | Country | Kind |
|---|---|---|---|
| 200710201523.2 | Aug 2007 | CN | national |