1. Field of the Invention
The present invention relates to method and system for secure data access among two devices, and more particularly, to methods and system for secure password generation.
2. Description of the Prior Art
Currently, data security is an important topic for keeping data protected from unauthorized access in order to ensure privacy of personal or sensitive data. One simple way to protect data is to lock the data with a password. For example, a user can operate a mobile device to run a data compression application program for compressing a sensitive file and locking the sensitive file with a password determined by the user, such that the locked file can be further stored and protected in a memory card safely. However, the password could be easily cracked, or the user may forget the password if the password is too complicated. Therefore, a protection mechanism for protecting the password securely and effectively is very helpful to the user.
An embodiment of the present invention provides a method for secure data access among two devices. The method comprises: retrieving unique information corresponding to a first electronic device and a storage device; generating an encryption key according to the unique information; generating a password string for securing a data file; encrypting the password string with the encryption key; and locking and storing the data file together with the encrypted password string in the storage device.
Another embodiment of the invention provides data security system. The data security system comprises: a processing unit, configured to process a data file, the processing unit comprising: a key generator, configured to generate an encryption key according to unique information corresponding to the storage device and the processing unit; a password generator, configured to generate an encrypted password string according to the encryption key; and a storage unit, configured to store the data file and the encrypted password string.
Yet another embodiment of the invention provides a method for secure data access, comprising: receiving a request, by a processing unit, for accessing a secured data file stored in a storage unit; retrieving unique information corresponding to the processing unit and the storage unit respectively; generating a decryption key according to the unique information; decrypting the secured data file according to the decryption; and permitting access to the secured data file according to the decryption result.
These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
The invention discloses system and method for secure data access among two devices according to unique information of the two devices. To protect a data file, a password may be generated in random and further encrypted by a key. The key is derived from the unique information of the two devices, and thus it avoids the password from being decrypted by unauthorized devices. The data file will be locked by the password and may be stored together with the encrypted password. In order to access the locked data file, the encrypted password must be decrypted first so as to provide protection.
Please refer to
The processing unit 110 may be a central processing unit, application processor, dedicated processor, and/or other similar devices. The storage unit 120 may be an internal storage unit such as embedded multimedia card (eMMC), SATA hard disk, PCIE hard disk, flash memory and/or others. The storage unit 120 may also be a storage unit external to the electronic device 100, such as SD card, Micro SD card, USB memory, ROM, or any suitable type of external memory. Furthermore, the storage unit 120 may support hot-plug to the electronic device 100. In order to access the data file 130 from the storage unit 120, the secure password 140 has to be verified first.
Next please refer to
After the key 142 is generated, it can be further used to generate a secure password, for example an encrypted password string. Referring to
Having described above embodiments,
Please refer to
To derive the password 244, the encrypted password 240 is processed with the key 242 according to the third algorithm to generate a password string 248. The password string 248 is further processed by a fourth algorithm to produce the final password 244. Similarly, the fourth algorithm is paired with the first algorithm. In one embodiment of the invention, these identity information and encryption/decryption algorithms are hold only by the processing unit 110 that processes the data file 130. In this case, no other processing unit or device can unlock the data file 130 since identity information of other unit/device would not match to the first identification data 114 of the first processing unit 110. If the decrypted password 244 matches the password 144 of
In contrast to the prior art, the present invention provides a method for protecting a password. The password is randomly generated and further hidden in the encrypted random data string, such that the password cannot be easily hacked. Moreover, the password can be automatically obtained only when the storage unit is connected to the original electronic device, and the secured data file, i.e. the locked data file, will not be accessed when the storage unit is connected to other electronic devices.
Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.
This application claims priority of U.S. Provisional No. 61/565,955 filed on Dec. 1, 2011.
Number | Name | Date | Kind |
---|---|---|---|
6799197 | Shetty | Sep 2004 | B1 |
6975727 | Vandergeest | Dec 2005 | B1 |
7051206 | Giest | May 2006 | B1 |
7428750 | Dunn | Sep 2008 | B1 |
7552333 | Wheeler | Jun 2009 | B2 |
7681048 | Starr | Mar 2010 | B2 |
8165303 | Steele | Apr 2012 | B1 |
8301884 | Choi | Oct 2012 | B2 |
8393001 | Libenzi | Mar 2013 | B1 |
8452969 | Iyer | May 2013 | B2 |
8527618 | Wiese | Sep 2013 | B1 |
20020073306 | Aluzzo | Jun 2002 | A1 |
20020112161 | Thomas | Aug 2002 | A1 |
20040111331 | Yano | Jun 2004 | A1 |
20040123109 | Choi | Jun 2004 | A1 |
20050097316 | Kim | May 2005 | A1 |
20070214370 | Sato | Sep 2007 | A1 |
20070269042 | Tanaka | Nov 2007 | A1 |
20080028209 | Dare | Jan 2008 | A1 |
20080082813 | Chow | Apr 2008 | A1 |
20080184218 | Largman | Jul 2008 | A1 |
20080189550 | Roundtree | Aug 2008 | A1 |
20080244271 | Yu | Oct 2008 | A1 |
20100005304 | Maruyama | Jan 2010 | A1 |
20100031034 | Kim | Feb 2010 | A1 |
20100050241 | Yan | Feb 2010 | A1 |
20100250925 | Hiraide | Sep 2010 | A1 |
20100290076 | Itoh | Nov 2010 | A1 |
20100332820 | Matsushima | Dec 2010 | A1 |
20110002462 | Stewart | Jan 2011 | A1 |
20110021181 | Weiner | Jan 2011 | A1 |
20110066859 | Iyer | Mar 2011 | A1 |
20110093714 | Schaecher | Apr 2011 | A1 |
20110274273 | Fiske | Nov 2011 | A1 |
20110296174 | Nakayama | Dec 2011 | A1 |
20120087493 | Chidambaram | Apr 2012 | A1 |
20120240211 | Counterman | Sep 2012 | A1 |
20120294445 | Radutskiy | Nov 2012 | A1 |
20130117564 | Chang | May 2013 | A1 |
Number | Date | Country |
---|---|---|
1731726 | Feb 2006 | CN |
101379506 | Mar 2009 | CN |
101398764 | Apr 2009 | CN |
102007505 | Apr 2011 | CN |
0 725 512 | Aug 1996 | EP |
200539706 | Dec 2005 | TW |
200629085 | Aug 2006 | TW |
200841187 | Oct 2008 | TW |
200915183 | Apr 2009 | TW |
200951848 | Dec 2009 | TW |
201021500 | Jun 2010 | TW |
201108699 | Mar 2011 | TW |
201110653 | Mar 2011 | TW |
201137659 | Nov 2011 | TW |
201141125 | Nov 2011 | TW |
Entry |
---|
Yandji et al, “Research on a Normal File Encryption and Decryption,” Computer and Management (CAMAN), 2011 International Conference on Year: 2011, pp. 1-4. |
Zugenmaier et al., “Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use,” Computer Security Applications Conference, 2009. ACSAC '09. Annual Year: 2009 pp. 333-339. |
Office action mailed on Jun. 16, 2014 for the Taiwan application No. 101144442, filing date Nov. 28, 2012, p. 1-9. |
Office action mailed on Dec. 29, 2014 for the Taiwan application No. 101144444, filing date Nov. 28, 2012, p. 1-9. |
Office action mailed on Mar. 2, 2015 for U.S. Appl. No. 13/682,752, filed Nov. 21, 2012, p. 1-25. |
Office action mailed on Sep. 24, 2014 for U.S. Appl. No. 13/674,068, filed Nov. 11, 2012, p. 1-17. |
Office action mailed on Feb. 2, 2015 for the China application No. 201210510215.9, filing date Dec. 3, 2012, p. 1-13. |
Notice of Allowance mailed on Jan. 28,2015 for the Taiwan application No. 101144442, filing date: Nov. 28, 2012, p. 1-5. |
Office action mailed on Jul. 27, 2015 for U.S. Appl. No. 13/682,752, filed Nov. 21, 2012, p. 1-16. |
Office action mailed on May. 29, 2015 for the China application No. 201210511241.3, filing date Dec. 3, 2012, p. 1-6. |
Notice of Allowance mailed on Nov. 16, 2015 for the U.S. Appl. No. 14/686,752, filed Apr. 14, 2015, p. 1-20. |
Number | Date | Country | |
---|---|---|---|
20130145171 A1 | Jun 2013 | US |
Number | Date | Country | |
---|---|---|---|
61565955 | Dec 2011 | US |