TWI222304B - Personal data encryption technology - Google Patents

Personal data encryption technology Download PDF

Info

Publication number
TWI222304B
TWI222304B TW90127322A TW90127322A TWI222304B TW I222304 B TWI222304 B TW I222304B TW 90127322 A TW90127322 A TW 90127322A TW 90127322 A TW90127322 A TW 90127322A TW I222304 B TWI222304 B TW I222304B
Authority
TW
Taiwan
Prior art keywords
question
answer
personal
patent application
private
Prior art date
Application number
TW90127322A
Other languages
Chinese (zh)
Inventor
Han-Chao Lee
Hsin-Te Shih
Original Assignee
Inst Information Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inst Information Industry filed Critical Inst Information Industry
Priority to TW90127322A priority Critical patent/TWI222304B/en
Application granted granted Critical
Publication of TWI222304B publication Critical patent/TWI222304B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a personal data encryption technology, which encrypts the personal private data using the answers of multiple problem combinations as the encryption key, and stores the encrypted private data on the portable personal private storage device, and discards the answers for encryption. Moreover, during decryption, it has to enter the answers of the multiple problem questions as the decryption key, so as to decrypt the private data after encryption stored on the portable personal private storage device, and then discarding the answers for decryption.

Description

!2223〇4 五 發明說明(l) 本發明係有關於一種個人 於-種可以依據多重問題組合來進保J技*,且特別有關 可以將個人私密資料儲存於; 仃資料加密或解密,且 到資料保密之個人資料保密技彳^ =儲存媒體中,以徹底達 在習知的資料保密方式中^ 體,如伺服器主機之資料庫來可或缺地需要一個儲存 供曰後當使用者欲存取時來比$農=同使用者的密碼,以 否為相應之使用者,進而給對瘫^ =之密碼,以檢查是 在習知的資料保密方式令子取權力。 :單一密碼,即僅以一密碼來做身密石馬通常是屬於 單一密碼的保密方式除了 # h 欢一之用,然而,此 有心人士以嘗試錯=了Λ用dt容易遺忘之外,也容易被 外,當儲存體中儲存此單?;d 密的資料也會被解開,⑼:害=2破解時’則被保 另一方面’習知的資料保密方 ^密)且可以讓使用者讀懂的楷案格儲貝存以明文^未 女全的危險之外,亦有可沪合妯丁* :了上述破壞貝訊 當竊取使用者的私密資料。 的系統官理人員來不 有鑑於此’本發明之主要目的為 :問題組合來進行資料加密=為 =存於使用者個人之可攜式儲存媒體中,而不命^ 2個人私密資料儲存於系統主機之中,以徹底而^铯碼 费之個人資料保密技術。 - 4賢! 2223〇4 Description of the five inventions (l) The present invention relates to an individual who can secure J techniques based on multiple problem combinations *, and is particularly concerned with the storage of personal private information; 仃 data encryption or decryption, and Personal data confidentiality technology for data confidentiality ^ = storage media, in order to thoroughly reach the conventional data confidentiality methods ^ body, such as the database of the server host may or may not need a storage for later users If you want to access it, please compare the password of the same user, whether it is the corresponding user, and then give the password of the paralyzed ^ = to check the authority in order to check that the information is kept in the conventional way. : Single password, that is, only one password to be used as a secret stone. It is usually a secret method that belongs to a single password. In addition to # h 欢 一 用, however, this interested person tries to make mistakes = Λ is easy to forget with dt, but also Easy to get outside when storing this order in storage? D secret data will also be unlocked, ⑼: harmful = 2 when cracked 'is protected on the other hand' knowledge of the confidentiality of the data ^ secret) and can be read by the user to save the case. In addition to the dangers of the plain text ^ Wei Nianquan, there are also some people who can join together: the above-mentioned destruction of Beixun when stealing users' private information. In view of this, the main purpose of the system's official staff is: the main purpose of the present invention is to encrypt the data in a problem combination = as = stored in the user's personal portable storage medium, and not ordered ^ 2 personal private information is stored in In the system host, the personal data security technology with a complete and cesium code fee. -4 wise

Ϊ222304 五、發明說明(2) 為了達 低1人資料保 人私密儲存 收相應此多 收一個人私 然後, 加密鑰匙, 密資料,並 可攜式個人 此外, 由可攜式個 後’接收相 案。 接著, 一解密鑰匙 私密資料進 在實施 題組合答案 私密儲存體 儲存體可以 媒體。 圖式簡單說 為使本 下文特舉實 成本發 密技術 體時, 重問題 密資料 依據一 將個人 將此多 私密儲 當進行 人私密 應此多 依據一 ,將儲 行解密 例中, 丟棄, 之中。 是IC卡 明 發明之 施例, 明之上述目 來達成。在 首先,設定 組合提示之 〇 加解密規則 私密資料進 4問題組合 存體中。 可攜式個人 儲存體中讀 重問題組合 加解密規則 存於可攜式 ,從而得到 更包括將進 而不需紀錄 另外’本發 、磁碟片、 的 可藉 本發明中 一多重問 一多重問 ,以多重 行加密, 提示與密 私密儲存 取一多重 提示之一 ,以此多 個人私密 一個人私 行加密與 於系統主 明實施例 或是其他 由本 ,當 題組 題組 問題 從而 文私 體解 問題 多重 重問 儲存 密資 解密 機或 之可 可以 發明所提供之 製作可攜式個 合提示,且接 合答案,並接 組合答案為— 得到一密文私 密資料儲存至 密時,首先, 組合提示,然 問題組合答 題組合答案為 體中之—密文 料。 之用的多重問 是可攜式個人 攜式個人私密 攜帶式之儲存 上述目的、 並配合所附 特徵和優圖示,作 點能 祥細 更明顯易 說明如下Ϊ222304 V. Description of the invention (2) In order to reduce the personal storage of one person, the data keeper shall receive one additional person ’s private information, and then encrypt the key, the confidential information, and the portable individual. In addition, the portable personal computer will receive the case. . Next, a decryption key is entered into the combination of answers to the questions in the private storage. The storage can be media. The diagram simply states that in order to make the following specific cost-encryption technology, the basis for the problem of confidential information is to treat individuals with this much privacy as the person ’s privacy should be based on this. The bank ’s decryption example is discarded. In. It is an embodiment of the invention of the IC card, which achieves the above purpose. First, set the encryption and decryption rules of the combination prompt. Private information is stored in the 4 question combination memory. The combination of the weighting problem combination encryption and decryption rules in the portable personal storage is stored in the portable type, so that it can be included without further recording. Re-question, multiple lines of encryption, prompts and secret storage take one of multiple reminders, so that multiple people are private and one person is privately encrypted with the system's main embodiment or other texts, when the group of questions The private solution to the problem is to repeatedly ask the storage secret decryptor or cocoa invention to provide a portable personal reminder, and combine the answers, and the combined answer is-when you get a ciphertext private data stored in the secret, first The combination prompts, but the combination of questions and answers is the body of the body-cipher text. The multiple questions of use are portable personal, portable personal privacy, portable storage, and the above purpose, combined with the attached features and excellent icons, make it more detailed and easier to explain as follows

0213-6735TW;yianhou.ptd 第5頁 12223040213-6735TW; yianhou.ptd Page 5 1222304

第1圖係顯示依據本發明實施例之多重問題组 人資料加密方法的流程圖。 ® 第2圖係顯示依據本發明實施例之多重問題組 人資料解密方法的流程圖。 第3圖係顯示依據本發明實施例之製作可 密儲存體方法的流程圖。 I Λ 第4圖係顯示依據本發明實施例之可攜式 存體之示意圖。 、似人私雄、儲 第5圖係顯不依據本發明實施例之可攜式 存體解密的流程圖。 弄狯儲 符號說明 S100、S110、…、S160〜操作步驟; S20 0 ' S210.....S270〜操作步驟; 1 〇 〇 〇〜可攜式個人私密儲存體; 1100〜明文資料; 1200〜密文資料。 實施例 接下來,參考伴隨圖示,本發明實施例 組成之個人資料保密技術、製作可攜式:題 以及可攜式個人私密儲存體解密部分分在儲存體、 下。 疋订砰細說明於 〈多重問題組成之個人資料保密技術〉 第1圖係顯示依據本發明實施例之多重 人資料加密方法的流程SI,參考第1圖,說明多2:固FIG. 1 is a flowchart showing a method for encrypting a multiple-person problem data according to an embodiment of the present invention. Fig. 2 is a flowchart showing a method for decrypting a multi-issue group data according to an embodiment of the present invention. FIG. 3 is a flowchart showing a method for manufacturing a dense storage body according to an embodiment of the present invention. I Λ FIG. 4 is a schematic diagram showing a portable memory device according to an embodiment of the present invention. Figure 5 is a flowchart showing the decryption of a portable memory according to an embodiment of the present invention. The storage symbol descriptions S100, S110, ..., S160 ~ operation steps; S20 0 'S210 ..... S270 ~ operation steps; 1 00 ~~ portable personal private storage; 1100 ~ plain text data; 1200 ~ Cryptographic information. Embodiment Next, referring to the accompanying drawings, the personal data confidentiality technology composed in the embodiment of the present invention, the production of portable: title, and the decryption part of the portable personal private storage are divided into storage and storage. The detailed description is given in "Personal Data Confidentiality Technology Composed of Multiple Issues". Figure 1 shows the process SI of a multiple personal data encryption method according to an embodiment of the present invention. Refer to Figure 1 to explain more 2: solid

1222304 五、發明說明(4) ---—---- 成之個人資料的加密處理方法。 首先,步驟S1 00,設定一第一問題提示盥一 提示,並如步驟S11 0,接收分別相應此第一 ^ θ = 一問題 二問題提示之一第一問題答案與一第二問題答^提示與第 舉例來說,此第一問題提示與第二問θ自二1' ° 日、暱稱、寵物名稱、結婚紀念日等等的問題 」Μ疋生 第一問題提示與第二問題提示分別為暱稱與=:假設 其相對應之第一問題答案與第二問題答案可以八 2,則 ’· honey,,與"rnimi,,。 刀 :、'、 然後,如步驟S120,將此第一問題答案與第二問題欠 案組合成一加密鑰匙,舉例來說,延續上述例子, 二 进餘武為1’honeyiniinin。 、最後,步驟S1 30,依據此組合成之加密鑰匙將個人資 料進行加密,從而得到一密文個人資料。 、 此外,本實施例當將個人資料加密之後,則將第一問 題答Ϊ與Ϊ二問題答案與其所組合成之加密鑰匙丟棄。同 時注意的是’步驟s丨2 〇中組合第一問題答案與第二問題答 案的方式可以依照不同的規則而變化,而非僅限於上述所 舉之例子。1222304 V. Description of the invention (4) ----------- Encryption processing method of Cheng's personal data. First, in step S100, a first question prompt is set and a prompt is received, and in step S110, a first answer corresponding to the first ^ θ = one question and two question prompts is received, respectively. As an example, this first question prompt and the second question θ since 2 '° day, nickname, pet name, wedding anniversary, etc. "The first question prompt and the second question prompt are: Nickname and =: Assuming that the answer to the first question and the answer to the second question can be eight two, then "· honey," and "rnimi,". Knife :, ', Then, according to step S120, the first question answer and the second question answer are combined into a cryptographic key. For example, continuing the above example, the binary Yuwu is 1'honeyiniinin. Finally, in step S1 30, the personal data is encrypted according to the combined encryption key to obtain a cipher text personal data. In addition, in this embodiment, after the personal data is encrypted, the answer to the first question and the answer to the second question and the encryption key formed by the combination are discarded. At the same time, it is noted that the method of combining the first question answer and the second question answer in step s20 can be changed according to different rules, and is not limited to the above-mentioned examples.

接下來’第2圖係顯示依據本發明實施例之多重問題 組成之個人資料解密方法的流程圖,參考第2圖,說明多 重問通組成之個人資料的解密處理方法。 首先’當欲進行解密處理時,系統可將之前所設定之 第一問題提示與第二問題提示進行顯示(圖中未顯示),以Next, FIG. 2 is a flowchart showing a method for decrypting personal data composed of multiple problems according to an embodiment of the present invention. Referring to FIG. 2, a method for decrypting personal data composed of multiple questions will be described. First, when the decryption process is to be performed, the system may display the previously set first question prompt and second question prompt (not shown in the figure) to

0213-6735TWF;yianhou.ptd 第7頁 1222304 五、發明說明(5) 別5 ί : ΐ輪入相應之資料,之後,如步驟S140,接收分 盥一;四3 —問題提示與第〕問題提示之-第三問題答案 ,、 弟四問題答案。 組人^ ^ 4步驟S 1 5 〇、’將此第三問題答案與第四問題答案 鑰i將本令密鑰匙’丄並如步驟S160 ’依據此組合成之解密 鐳咗將饴文個人資料進行解密。 φ 第安本ΐ施例當將密文個人資料解密之後,則將 與第四問題答案與其所組合成之解密鑰匙丟 問題答荦的筏 昂一問通答案與第四 ::的方式則係依據加密過程中之相同的組合規則。 宰鱼使用去當操作者所輸入之第三問題答案與第四問題答 王相同時(即解密鑰匙與加密鑰匙相同) 密過之密文個人資料還原為明文之個人資了 =將加 操作者所輸入之第二門1笈垒你# 貝针,相反地,若 二 铷八之第一問碭答案與第四問題答案盥 月所設定之第一問題答荦盥第- 使用者之 密銓叩彻^jσ系興弟一問遞答案不相同時(即觫 β鑰畦與加役鑰匙不同),便無法將密文個人 Ρ解 原先設定之個人資料。 、;還原為 〈製作可攜式個人私密儲存體〉 i 一 首先,步驟S20 0,使用者可以設定一多重 不(與之别於多重問題組成之個人資料保密技術7逼、、且合提 Υ所述相0213-6735TWF; yianhou.ptd Page 7 1222304 V. Description of the invention (5) Other 5 ί: After entering the corresponding information, then, as in step S140, receive points 1; 4 3—prompt and question] The answer to the third question, the answer to the fourth question. Group ^ ^ 4 Step S 1 5 〇, 'This answer to the third question and the answer to the fourth question key i will be the secret key of the order' and then step S160 'According to the combined decryption ra Decrypt. φ Example: After decrypting the ciphertext personal data, the answer to the fourth question and the decryption key formed by the combination of the decryption key and the missing question is to answer the question and the fourth :: method is According to the same combination rules in the encryption process. Jieyu uses it when the third question entered by the operator is the same as the answer to the fourth question (that is, the decryption key is the same as the encryption key). The encrypted cipher text personal data is restored to the plain text personal capital = the operator is added. The input of the second door 1 笈 LER you # 针 针, on the contrary, if the first question answer and the fourth question answer of the 28th question set the first question answer set by the month-user's secret When ^ jσ is Xingdi's question, the answer is not the same (that is, the β key is different from the service key), it is not possible to resolve the ciphertext personal P to the original personal information. ,; Restore to "Making Portable Personal Private Storage" i First, step S20 0, the user can set a multiple (not different from multiple issues of personal data security technology composed of multiple, and combined mention Υmentioned phase

02l3_6735TW;yianh〇u.ptd 第3圖係顯示依據本發明實施例之製 密儲存體方法的流程圖,參考第3圖,本發明者二固人私 作可攜式個人私密儲存體的方法將說明如下。只也例中製 1222304 五、發明說明(6) 同)’並如步驟S2 1 0,使用者設定相應此多重問題組合提 示之一多重問題組合答案。此外,系統亦如步驟S220,接 收使用者欲進行加密保護之一個人私密資料。 0接著,步驟S230,將此多重問題組合答案做為一加密 鑰4 並依據此加密鑰匙,將使用者欲進行加密保護之個 人私在資料進行加密,從而得到一密文私密資料。最後, 步驟S240,將此多重問題組合提示與密文私密資料儲存至 可搞式個人私密儲存體中。 相同地’本實施例當將個人私密資料加密之後,則將 此用以加密用之多重問題組合答案丟棄。 、 户骑圖係-顯示依據本發明實施例之可攜式個人私密儲 ^兩種划ί不忍圖。其中,可攜式個人私密儲存體1 000儲 先設定之資料,一為明文資料1100,即指使用者所事 去重問題組合提示,另一為密文資料12〇0,即指 私密資料欲:密保護之個人私密資料經過加密之後的密文 :可ΐ式個人私密儲存體可以是1C卡、磁碟 可以攜帶式之儲存媒體。 可攜式個人私密儲存體解密〉 人私體Γ密圖:流顯程示:據= 中可攜式個人私第5圖,本發明實施例 昔 子體之解岔處理將說明如下。 -多重問題組合提示,並;c人私密儲存體中讀取 (圖中未顯示)。然後,士 2夕重問題組合提示進行顯示 、 如步驟S260,接收使用者所輸入之 1222304 五、發明說明(7) ^之 相應此多重問題組合提$此 接者’步驟S 2 7 0 、 錄匙,並依據此解密鑛行 體中之一密文私密資科進攸 f將 相同地,本實施例Θ 此用以解密用之多重問趙組 入之多重問題組合答案與使 同時,則可以將密文私密資 之,便無法將密文私密資料 在上述實施例中,製作 儲存體可以藉由使用一可以 個人電腦,以及配合一可攜 置,如讀卡機、1C卡燒錄機 因此,藉由本發明所提 依據夕重問題組合來進行資 私密資料儲存於使用者個人 將密碼與個人私密資料储t 人私密資料的安全性與保 優點: Μ 第一、利用使用者的 讓使用者便於記憶,此外, 因此不容易被嘗試錯誤的方 第二、加解密鑰匙可 個固定儲存體中,可以近二 密之後 當使用 之答案 個人資 之個人 攜式個 處理單 體的讀 ν> 木疋成 密技術 且可以 體中, ,以更 明亦具 夕重問題組合 多重問題組合答 將儲存於可攜式 解密。 密文私S資料解 合答案丟棄。而 用者之前所設定 料解密為明文之 還原為原先設定 與讀取(解密)可 處理基本運算之 式個人私密儲存 、或磁碟機等等 出之個人資料保 料加密或解密, 之可攜式儲存媒 於糸統主機之中 需求。同時本發 密問題作為加解 因為鑰匙的資料 法破解; 用完就丟棄,不 步增加個人私密 答案。 案做為一解密 個人私密儲存 ’則將 者所輸 完全相 料;反 資料。 人私密 元’如 寫裝 〇 ’可以 將個人 而不需 強化個 有下述 密输匙,可以 長度不固定, 需要儲存於某 資料的安全02l3_6735TW; yianh〇u.ptd FIG. 3 is a flowchart showing a method for making a dense storage body according to an embodiment of the present invention. Referring to FIG. 3, the inventor's method for making a portable personal private storage by Erguren will be described as follows. Only the example of system 1222304 is used. V. Description of the invention (6) Same) 'and as in step S2 1 0, the user sets a multiple question combination answer corresponding to one of the multiple question combination prompts. In addition, the system also proceeds to step S220 to receive one of the user's private data that the user wishes to encrypt and protect. 0 Next, in step S230, the multiple question combination answer is used as an encryption key 4 and according to the encryption key, the personal data of the user who wants to be encrypted is encrypted to obtain a ciphertext private data. Finally, in step S240, the multiple question combination prompts and the ciphertext private data are stored in a personal privacy storage that can be used. Similarly, in this embodiment, after the personal private information is encrypted, the multiple question combination answers used for encryption are discarded. , Household riding diagrams-shows the portable personal private storage according to the embodiment of the present invention. Among them, the portable personal private storage 1 000 sets of pre-set data, one is the plain text data 1100, which refers to the combination of the user's deduplication questions, and the other is the cipher text data 1200, which refers to the private data. : Encrypted ciphertext of personally protected personal data: Portable personal privacy storage can be 1C card, magnetic disk can be portable storage media. Decryption of Portable Personal Private Storage> Personal Private Γ Dense Map: Stream Display Process: According to Figure 5 of the Portable Personal Private Data, the embodiment of the present invention will explain the processing of the fork as follows. -Multiple question combination tips, and; c read in private storage (not shown). Then, the prompt question combination prompt is displayed, as shown in step S260, receiving 1222304 input by the user. V. Description of the invention (7) ^ Corresponding to this multiple question combination, the user is provided with the step S 2 7 0. Key, and according to the decryption of one of the ciphertext private information departments in the mining industry, similarly, in this embodiment Θ this multiple questions used to decrypt the multiple questions Zhao combined into answer and use simultaneously, you can If the ciphertext is privately owned, the ciphertext private information cannot be used in the above embodiment. The storage can be made by using a personal computer and a portable device such as a card reader and a 1C card burner. By using the combination of problems described in the present invention, the private data is stored in the user's personal password and personal private data. The security and security advantages of the private data are as follows: Μ First, the user is allowed to use the user Easy to remember, in addition, it is not easy to be tried and error. Second, the encryption and decryption keys can be stored in a fixed storage, and can be used after nearly two secrets. The reading of a single processing unit is ν > wood encryption technology, which can be used in the body, with a clearer and more complex problem set. Multiple question set answers will be stored in a portable decryption. The ciphertext private S data solution answer is discarded. The user's previously set material is decrypted into plain text and restored to the original setting and read (decrypted) to handle basic operations. Personal private storage, or personal data from disk drives, etc. is guaranteed to be encrypted or decrypted. Storage media is required in the system host. At the same time, this secret question is used as a solution because the key data method is used to break it; discard it after use, and the personal private answer will not be added. As a decryption of personal private storage, it ’s exactly what the user entered; anti-data. Personal secrets ’such as writing 〇’ can be used to strengthen the individual without the need to strengthen the following key entry, the length is not fixed, need to be stored in the security of certain data

0213-6735TW;yianhou.ptd 第10頁 122304 五、發明說明(8) 性;以及 進;r f:、所ί的個人私密資料都必須利用加解密鑰匙先 邊订加选’並存放於传用 m , 、 用者自行攜帶之可攜式儲存體,如 卡中,因此也不容易讀么 卜 ^ 雜妙士八nn 约選系統管理人員竊取資料。 雖然本發明已以較隹银 限定本發a月,任何熟悉心上,然其並非用以 神和範圍"可做些許】;支;:飾在不脫離本發明之精 範圍當視後附之申請專= =者=本發明之保護 0213-6735TWF;yianhou.ptd 第11頁0213-6735TW; yianhou.ptd Page 10 122304 V. Description of the invention (8); and advance; rf :, all personal private information must be ordered and selected using encryption and decryption keys first, and stored in the transfer m The portable storage that the user brings with him or herself, such as a card, is not easy to read. ^ Miscellaneous october nn Appoints the system administrator to steal information. Although the present invention has limited the month of the hair with the silver, any familiarity, but it is not used in the spirit and scope " can do a little bit; support ;: decorated without departing from the scope of the present invention as attached Application == = = Protection of the invention 0213-6735TWF; yianhou.ptd Page 11

Claims (1)

、申請專利範園 種製作可攜式個人私密儲存體方法 广列步騍: Θ方法包括 叹定一多重問題組合提爪’胃一 案;接收相應該多重問題,組合提示之-多重問題組合答 接收一個人私密資科,、 ,據該多重問題組舍答案2 -加密鑰% 貝料進行加密,從而得到〆岔文私密資也丨5亥個人私 料; 可 攜气:該多重問題組合提系與該密文私密資料儲存至, 構式個人私密儲存體中。 至该 2. 如申請專利第丨頊所述之方法,更包括將該 碭組合答案丟棄。 重問 3. 如申請專利第1項所述之方法,其中該可攜式個 私密儲存體為一Ic卡。 固人 私密4儲Ϊ I ΐ專利第1項所述之方法,其中該可攜式個人 必诚仔體為一磁片。 下列5步;種可攜式個人私密儲存體解密方法,該方法包括 示;由該可攜式個人私密儲存體中讀取一多重問題组合提 接收相應該多重問 案;以及 里Π ^組合&不之一多重問題組合答 依據該多重問Bg 4 A 可攜式個人私密』答案為-解密鑰㉟,將儲存於該 體中之一密文私密資料進行解密。The patent application method for making a portable personal private storage method is extensively listed: The Θ method includes determining a multiple question combination to raise the claw's stomach case; receiving the corresponding multiple questions and combining tips-multiple question combinations Answer to receive a person's private information section, according to the multiple question group answer 2-add the key %% to encrypt the material, so as to get the private information of Wuchawen 丨 5 Hai personal information; portable gas: the multiple questions combination provided The private data is stored with the cipher text in a personal private storage structure. To the 2. The method as described in the patent application No. 丨, further includes discarding the combined answer. Re-Question 3. The method described in the first item of the patent application, wherein the portable personal storage is an Ic card. The method described in Item 1 of Guren Private 4 Storage Ϊ I ΐ, where the portable individual must be a magnetic disk. The following 5 steps; a method for decrypting a portable personal private storage, the method includes: reading a multiple question combination from the portable personal private storage, and receiving and receiving the multiple multiple questions; and & No. One multiple question combination answer is based on the multiple question Bg 4 A portable personal privacy. The answer is-decryption key, and one of the ciphertext private data stored in the body is decrypted. ^2304 六、申請專利範園 6 ·如申請專利第5項戶斤述之方法,更包括將該多重問 續叙合提示進行顯示。 、 7·如申請專利第5項所述!方法,更包括將該多重問 缚組合答案丟棄。 1 8·如申請專利第5項所述之方法,其令該可攜式個人 私密儲存體為_IC卡。 人 9·如申請專利第5項所述之方法,其中該可攜式伽λ 私密儲存體為一磁片。 一 1固人 1〇· 一種多重問題組成之個人資料保密方法,該方 包括下列步驟·· 万法 設定一第一問題提示與/第二問題提示; 接收分別相應該第一問題提示與該第二問題提 第一問題答案與一第二問題答案; 一 Β將該第一問題答案與該第二問題答案組合成一卢 匙;以及 ϋ费輪 密文個人資料 11 ·如申請專利第1 〇項所述之方法, 問題答案與該第二問題答案丟棄。 12·如申請專利第1〇或丨丨項所 步驟: < 方法,更包括下列 接收一第三問題答案與一第四問 將6亥第二問題答案與該第四問0自Y 13 /、, 匙;以及 善案組合成一解密鑰 依據該加密鑰匙將該個人資料進行加密, 徊Α这企丨 攸于到一 更包括將該第— 0213-6735TWF;yianhou.ptd 第13頁 1222304 六、申請專利範圍 依據該解密鑰匙將該密文個人資料進行解密。 1 3 ·如申請專利第1 2項所述之方法,更包括將該第一 問題提示與該第二問題提示進行顯示。 1 4.如申請專利第1 2項所述之方法,更包括將該第三 問題答案與該第四問題答案丟棄。 I i II^ 2304 VI. Patent Application Fan Garden 6 · If the method described in the fifth item of the patent application, the method further includes displaying the multiple questionnaire and reminder. 7, 7 As described in the fifth item of the patent application! The method further includes discarding the multiple-binding combination answer. 1 8. The method as described in item 5 of the patent application, which makes the portable personal private storage _IC card. Person 9. The method according to item 5 of the patent application, wherein the portable Gamma private storage is a magnetic disk. One solid person 10. A method of confidentiality of personal data consisting of multiple questions, the party includes the following steps: · Wanfa sets a first question prompt and / or a second question prompt; receives the first question prompt and the second question prompt, respectively. The second question raises the first question answer and the second question answer; one B combines the first question answer with the second question answer into one key; and the fee round cipher text personal information 11 · If the patent application item 10 In the method, the answer to the question and the answer to the second question are discarded. 12. The steps as claimed in the application No. 10 or 丨 丨: < The method further includes the following: receiving a third question answer and a fourth question; 6 Hai second question answer and the fourth question 0 from Y 13 / ,, key; and a good case combination into a decryption key to encrypt the personal data based on the encryption key, this company will benefit from a number of 0213-6735TWF; yianhou.ptd page 13 1222304 six, The scope of the patent application decrypts the ciphertext personal data based on the decryption key. 1 3 · The method according to item 12 of the patent application, further comprising displaying the first question prompt and the second question prompt. 14. The method according to item 12 of the patent application, further comprising discarding the answer to the third question and the answer to the fourth question. I i II 0213-6735TWF;yianhou.ptd 第14頁0213-6735TWF; yianhou.ptd p. 14
TW90127322A 2001-11-02 2001-11-02 Personal data encryption technology TWI222304B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW90127322A TWI222304B (en) 2001-11-02 2001-11-02 Personal data encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW90127322A TWI222304B (en) 2001-11-02 2001-11-02 Personal data encryption technology

Publications (1)

Publication Number Publication Date
TWI222304B true TWI222304B (en) 2004-10-11

Family

ID=34432863

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90127322A TWI222304B (en) 2001-11-02 2001-11-02 Personal data encryption technology

Country Status (1)

Country Link
TW (1) TWI222304B (en)

Similar Documents

Publication Publication Date Title
US20210067320A1 (en) System and method to protect sensitive information via distributed trust
US9781108B2 (en) System and method of secure encryption for electronic data transfer
US20060156026A1 (en) Password encryption key
US6941454B1 (en) System and method of sending and receiving secure data with a shared key
JPH1195659A (en) Method of recovering ciphered session key and device therefor
TW201223225A (en) Method for personal identity authentication utilizing a personal cryptographic device
CA2312967C (en) System and method of sending and receiving secure data with a shared key
Sujithra et al. ID based adaptive-key signcryption for data security in cloud environment
JP2009515393A (en) Method for securely depositing digital data, method for restoring related digital data, related apparatus for implementing these methods, and system comprising said apparatus
WO2010038763A1 (en) Information management system, terminal unit, server device and program
JP2008098696A (en) Encryption key management apparatus and encryption key management method
US20070208867A1 (en) Portable voiceprint-lock remote transmitting system and operation method thereof
US7715560B2 (en) Systems and methods for hiding a data group
JP2006524352A (en) Identity-based encryption method and apparatus based on biometrics
TWI222304B (en) Personal data encryption technology
JPH11161167A (en) Device and method for ciphering and recording medium which records ciphering program
JPS62134679A (en) Encryption document generator/reader
US20050044388A1 (en) Reprise encryption system for digital data
Wiseman Encryption, forced decryption, and the constitution
TWI255121B (en) Method for protecting digital secrecy
US20230388115A1 (en) Non-Custodial Backup and Recovery
JPH0198032A (en) Protection method for coding shared information
JPH09205419A (en) Method for storing and managing secret key
JPS6262639A (en) Communication method for privacy information
Kreindler Email security in clinical practice: ensuring patient confidentiality

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees