TWI644204B - Method for partitioning memory area of non-volatile memory - Google Patents
Method for partitioning memory area of non-volatile memory Download PDFInfo
- Publication number
- TWI644204B TWI644204B TW106125911A TW106125911A TWI644204B TW I644204 B TWI644204 B TW I644204B TW 106125911 A TW106125911 A TW 106125911A TW 106125911 A TW106125911 A TW 106125911A TW I644204 B TWI644204 B TW I644204B
- Authority
- TW
- Taiwan
- Prior art keywords
- data
- space
- area
- backup
- backup space
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
一種非揮發性記憶體磁區規劃方法包含步驟如下。將一卸除式記憶體裝置之原有資料全部移至卸除式記憶體裝置之外的一備份空間;對卸除式記憶體裝置之一儲存空間進行磁區規劃;以及,在完成對儲存空間進行磁區規劃之後,將備份空間內之原有資料全部移回儲存空間內。A non-volatile memory magnetic zone planning method includes the following steps. Moving all the original data of a removable memory device to a backup space outside the removable memory device; performing magnetic zone planning on a storage space of the removable memory device; and, after completing the storage After the space is planned for the magnetic zone, all the original data in the backup space is moved back into the storage space.
Description
本發明有關於一種磁區規劃方法,尤指一種非揮發性記憶體之磁區規劃方法。The invention relates to a magnetic zone planning method, in particular to a magnetic zone planning method of non-volatile memory.
一般而言,因為通用串列匯流排(Universal Serial Bus,USB)之卸除式記憶體符合資料之儲存與搬運的需求,故,USB卸除式記憶體逐漸成為資料存取的方便工具。為了避免USB卸除式記憶體內之所有檔案於外借他人時被一覽無遺,可以將機密檔案放置於USB卸除式記憶體內之一加密區,以降低機密檔案被竊取的機會。In general, because the Universal Serial Bus (USB) removable memory meets the requirements of data storage and handling, USB removable memory is becoming a convenient tool for data access. In order to prevent all files in the USB removable memory from being viewed when borrowing others, the confidential file can be placed in an encryption area of the USB removable memory to reduce the chance of the confidential file being stolen.
然而,對USB卸除式記憶體上設置加密區之同時,將導致USB卸除式記憶體內之原有資料全部遺失,進而降低使用者的使用意願。However, when the encryption area is set on the USB removable memory, all the original data in the USB removable memory will be lost, thereby reducing the user's willingness to use.
故,如何研發出一種解決方案以改善上述所帶來的缺失及不便,實乃相關業者目前刻不容緩之一重要課題。Therefore, how to develop a solution to improve the above-mentioned lacks and inconveniences is an important issue that the relevant industry is currently unable to delay.
本發明之一實施例提供了一種非揮發性記憶體磁區規劃方法,包含步驟如下。將一卸除式記憶體裝置之原有資料全部移至卸除式記憶體裝置之外的一備份空間;對卸除式記憶體裝置之一儲存空間進行磁區規劃;以及在完成對儲存空間進行磁區規劃之後,將備份空間內之原有資料全部移回儲存空間內。One embodiment of the present invention provides a non-volatile memory magnetic zone planning method, including the following steps. Moving all the original data of a removable memory device to a backup space outside the removable memory device; performing magnetic zone planning on a storage space of the removable memory device; and completing the storage space After the magnetic zone planning, all the original data in the backup space is moved back into the storage space.
在本發明一或複數個實施例中,對儲存空間進行磁區規劃之步驟前,卸除式記憶體裝置具有一加密區與一非加密區。加密區之容量與非加密區之容量具有一容量比例。每當接收到一欲改變容量比例之要求時,判斷原有資料之大小是否不大於已改變之容量比例中的非加密區之容量。In one or more embodiments of the present invention, prior to the step of magnetic zone planning of the storage space, the removable memory device has an encryption zone and an unencrypted zone. The capacity of the encryption zone has a capacity ratio to the capacity of the non-encrypted zone. Whenever a request to change the capacity ratio is received, it is judged whether the size of the original data is not greater than the capacity of the non-encrypted area in the changed capacity ratio.
在本發明一或複數個實施例中,對儲存空間進行磁區規劃之步驟更包含步驟如下。依據已改變之容量比例重新調整卸除式記憶體裝置之加密區與非加密區。In one or more embodiments of the present invention, the step of performing magnetic zone planning on the storage space further includes the following steps. The encrypted area and the non-encrypted area of the removable memory device are re-adjusted according to the changed capacity ratio.
在本發明一或複數個實施例中,對儲存空間進行磁區規劃之步驟,更包含步驟如下。將儲存空間區分為一加密區與一非加密區,加密區只能透過一金鑰密碼被開啟。In one or more embodiments of the present invention, the step of performing magnetic zone planning on the storage space further includes the following steps. The storage space is divided into an encryption area and an unencrypted area, and the encryption area can only be opened by a key password.
在本發明一或複數個實施例中,將備份空間內之原有資料全部移回儲存空間內之步驟更包含步驟如下。將備份空間內之原有資料分別移至加密區與非加密區。In one or more embodiments of the present invention, the step of moving all the original data in the backup space back into the storage space further includes the following steps. Move the original data in the backup space to the encrypted area and the non-encrypted area.
在本發明一或複數個實施例中,對儲存空間進行磁區規劃之步驟前更包含步驟如下。判斷原有資料之大小是否不大於備份空間之容量;當判斷出原有資料之大小不大於備份空間之容量時,判斷原有資料之大小是否不大於非加密區之容量;以及當判斷出原有資料之大小不大於非加密區之容量時,將原有資料全部移至備份空間。In one or more embodiments of the present invention, the steps of magnetic zone planning for the storage space further include the following steps. Determining whether the size of the original data is not greater than the capacity of the backup space; when judging that the size of the original data is not greater than the capacity of the backup space, determining whether the size of the original data is not greater than the capacity of the non-encrypted area; When the size of the data is not greater than the capacity of the non-encrypted area, all the original data is moved to the backup space.
在本發明一或複數個實施例中,將原有資料全部移至備份空間之步驟前,更包含對備份空間內之原有資料進行加密。將原有資料全部移回儲存空間內之步驟前,更包含對備份空間內之原有資料進行解密,以取得原有資料。In one or more embodiments of the present invention, before the step of moving the original data to the backup space, the original data in the backup space is encrypted. Before the steps of moving the original data back into the storage space, the original data in the backup space is decrypted to obtain the original data.
在本發明一或複數個實施例中,在完成將原有資料全部移至備份空間之步驟後更包含步驟如下。隱藏備份空間之存取路徑。In one or more embodiments of the present invention, the steps are further included as follows after the step of completely moving the original data to the backup space. Hide the access path of the backup space.
在本發明一或複數個實施例中,對儲存空間進行磁區規劃之步驟,包含步驟如下。將儲存空間規劃為一加密區或一非加密區,加密區只能透過一金鑰密碼被開啟。In one or more embodiments of the present invention, the steps of magnetic zone planning for the storage space include the following steps. The storage space is planned to be an encrypted area or an unencrypted area, and the encrypted area can only be opened by a key password.
在本發明一或複數個實施例中,將原有資料全部移至備份空間之步驟前,儲存空間至少具有一原加密區。原加密區只能透過一金鑰密碼被開啟。In one or more embodiments of the present invention, the storage space has at least one original encryption area before the step of moving the original data to the backup space. The original encryption area can only be opened with a key password.
本發明之另一實施例提供了一種非揮發性記憶體磁區規劃方法,包含步驟如下。將一卸除式記憶體裝置連接至一電腦裝置。卸除式記憶體裝置具有一第一加密區與一第一非加密區,第一加密區之容量與第一非加密區之容量具有一第一容量比例。每當接收到一將第一容量比例改變為一第二容量比例之要求時,將第一非加密區內之一第一資料全部移至電腦裝置內的一第一備份空間,以及第一加密區內之一第二資料全部移至電腦裝置內的一第二備份空間。依據第二容量比例重新調整卸除式記憶體裝置,使得卸除式記憶體裝置分為一第二加密區與一第二非加密區。將第一備份空間內之第一資料全部移至第二非加密區內,以及第二備份空間內之第二資料全部移至第二加密區內。Another embodiment of the present invention provides a non-volatile memory magnetic zone planning method, including the following steps. A removable memory device is coupled to a computer device. The removable memory device has a first encryption area and a first non-encrypted area, and the capacity of the first encryption area has a first capacity ratio to the capacity of the first non-encrypted area. Whenever a requirement to change the first capacity ratio to a second capacity ratio is received, all of the first data in the first non-encrypted area is moved to a first backup space in the computer device, and the first encryption One of the second data in the area is all moved to a second backup space in the computer device. The removable memory device is re-adjusted according to the second capacity ratio, so that the removable memory device is divided into a second encrypted area and a second unencrypted area. All the first data in the first backup space is moved to the second non-encrypted area, and the second data in the second backup space is all moved to the second encrypted area.
在本發明一或複數個實施例中,每當接收到要求時更包含步驟如下。判斷第一資料之大小是否不大於第二非加密區之容量;以及當判斷出第一資料之大小不大於第二非加密區之容量時,將第一資料全部移至第一備份空間。In one or more embodiments of the invention, the steps are further included as follows when a request is received. Determining whether the size of the first data is not greater than the capacity of the second unencrypted area; and when determining that the size of the first data is not greater than the capacity of the second unencrypted area, moving the first data to the first backup space.
在本發明一或複數個實施例中,每當接收到要求時,更包含步驟如下。判斷第二資料之大小是否不大於第二加密區之容量;以及當判斷出第二資料之大小不大於第二加密區之容量時,透過一金鑰密碼開啟第一加密區,且將第一加密區內之第二資料全部移至第二備份空間。In one or more embodiments of the present invention, each time a request is received, the steps are further included as follows. Determining whether the size of the second data is not greater than the capacity of the second encryption area; and when determining that the size of the second data is not greater than the capacity of the second encryption area, opening the first encryption area by using a key password, and The second data in the encryption area is all moved to the second backup space.
在本發明一或複數個實施例中,在完成將第一資料全部移至第一備份空間之步驟後,更包含步驟如下。隱藏電腦裝置內的第一備份空間之存取路徑。In one or more embodiments of the present invention, after the step of moving all of the first data to the first backup space is completed, the steps are further included as follows. The access path of the first backup space in the computer device is hidden.
在本發明一或複數個實施例中,在完成將第二資料全部移至第二備份空間之步驟後更包含步驟如下。隱藏電腦裝置內的第二備份空間之存取路徑。In one or more embodiments of the present invention, the steps are further included as follows after the step of completely moving the second material to the second backup space. The access path of the second backup space in the computer device is hidden.
在本發明一或複數個實施例中,在完成將第一資料全部移至第一備份空間之步驟後更包含步驟如下。對第一備份空間內之第一資料進行加密。在將第一資料全部移至第二非加密區內之步驟前,更包含步驟如下。對第一備份空間內之第一資料進行解密,以從第一備份空間內取出第一資料。In one or more embodiments of the present invention, the steps are further included as follows after the step of completely moving the first data to the first backup space. Encrypting the first data in the first backup space. Before the step of moving all the first data into the second non-encrypted area, the steps are further included as follows. Decrypting the first data in the first backup space to retrieve the first data from the first backup space.
在本發明一或複數個實施例中,在完成將第二資料全部移至第二備份空間之步驟後,更包含步驟如下。對第二備份空間內之第二資料進行加密;以及在將第二資料全部移至第二加密區內之步驟前,更包含步驟如下。對第二備份空間內之第二資料進行解密,以從第二備份空間內取出第二資料。In one or more embodiments of the present invention, after the step of moving all of the second material to the second backup space is completed, the steps are further included as follows. Encrypting the second data in the second backup space; and before the step of moving the second data to the second encryption area, the steps further include the following steps. Decrypting the second data in the second backup space to retrieve the second data from the second backup space.
如此,即便卸除式記憶體裝置在磁區規劃前已有資料,藉由以上實施例所述之非揮發性記憶體磁區規劃方法,卸除式記憶體裝置內之原有資料仍不致遺失,進而提高使用者的使用意願。Thus, even if the removable memory device has data before the magnetic zone planning, the original data in the removable memory device is not lost by the non-volatile memory magnetic zone planning method described in the above embodiment. , thereby increasing the user's willingness to use.
以上所述僅係用以闡述本發明所欲解決的問題、解決問題的技術手段、及其產生的功效等等,本發明之具體細節將在下文的實施例及相關圖式中詳細介紹。The above description is only for explaining the problems to be solved by the present invention, the technical means for solving the problems, the effects thereof, and the like, and the specific details of the present invention will be described in detail in the following embodiments and related drawings.
以下將以圖式揭露本發明之複數個實施例,為明確說明起見,許多實務上的細節將在以下敘述中一併說明。然而,應瞭解到,這些實務上的細節不應用以限制本發明。也就是說,在本發明中空體實施例中,這些實務上的細節是非必要的。此外,為簡化圖式起見,一些習知慣用的結構與元件在圖式中將以簡單示意的方式繪示之。The embodiments of the present invention are disclosed in the following drawings, and for the purpose of illustration However, it should be understood that these practical details are not intended to limit the invention. That is to say, in the hollow body embodiment of the present invention, these practical details are not necessary. In addition, some of the conventional structures and elements are shown in the drawings in a simplified schematic manner in order to simplify the drawings.
第1圖繪示本發明一實施例之非揮發性記憶體磁區規劃方法之流程圖。如第1圖所示,本實施例之非揮發性記憶體磁區規劃方法如以下步驟21~步驟23所示。在步驟21中,將一卸除式記憶體裝置之原有資料全部移至此卸除式記憶體裝置之外的備份空間。在步驟22中,對此卸除式記憶體裝置之儲存空間進行磁區規劃。在步驟23中,在完成對此儲存空間進行磁區規劃之後,將所述備份空間內之原有資料全部移回此卸除式記憶體裝置之儲存空間內。FIG. 1 is a flow chart showing a method for planning a magnetic domain of a non-volatile memory according to an embodiment of the present invention. As shown in FIG. 1, the non-volatile memory magnetic zone planning method of this embodiment is as shown in the following steps 21 to 23. In step 21, all the original data of the removable memory device are moved to the backup space outside the removable memory device. In step 22, the magnetic storage area is planned for the storage space of the removable memory device. In step 23, after the magnetic zone planning for the storage space is completed, all the original data in the backup space is moved back into the storage space of the removable memory device.
如此,即便卸除式記憶體裝置在磁區規劃前已存有資料,藉由以上實施例所述之非揮發性記憶體磁區規劃方法,卸除式記憶體裝置內之原有資料仍不致遺失,進而提高使用者的使用意願。In this way, even if the removable memory device has data stored before the magnetic zone planning, the original data in the removable memory device cannot be obtained by the non-volatile memory magnetic zone planning method described in the above embodiment. Lost, thereby increasing the user's willingness to use.
第2圖繪示本發明一實施例之電腦系統10的電子方塊圖。如第2圖所示,在本實施例中,電腦系統10包含一電腦裝置100與一卸除式記憶體裝置200。電腦裝置100包含一處理單元110、一顯示單元120、一第一連接介面130與一儲存單元140。處理單元110電連接顯示單元120、第一連接介面130與儲存單元140。儲存單元140具有一備份空間141與一磁區規畫模組144。然而,本發明不限於此,備份空間也可能不位於電腦裝置100中,而是此卸除式記憶體裝置之外的位置。卸除式記憶體裝置200具有一第二連接介面210與一非揮發性記憶體單元220。非揮發性記憶體單元220內可以存放資料(後稱原有資料240)。第二連接介面210電連接非揮發性記憶體單元220。卸除式記憶體裝置200可插拔地連接電腦裝置100,更具體地,透過第二連接介面210可插拔地連接第一連接介面130,卸除式記憶體裝置200電連接電腦裝置100。磁區規畫模組144用以對任何非揮發性記憶體單元進行磁區規劃,使得非揮發性記憶體單元得以被規劃為僅有加密區、僅有非加密區,或者任意比例之加密區與非加密區,其中加密區需透過金鑰密碼才能被開啟,意即,透過此金鑰密碼,才有權限使用加密區內之資料。2 is a block diagram of an electronic system of a computer system 10 in accordance with an embodiment of the present invention. As shown in FIG. 2, in the present embodiment, the computer system 10 includes a computer device 100 and a removable memory device 200. The computer device 100 includes a processing unit 110, a display unit 120, a first connection interface 130, and a storage unit 140. The processing unit 110 electrically connects the display unit 120, the first connection interface 130 and the storage unit 140. The storage unit 140 has a backup space 141 and a magnetic zone planning module 144. However, the present invention is not limited thereto, and the backup space may not be located in the computer device 100, but is a location other than the removable memory device. The removable memory device 200 has a second connection interface 210 and a non-volatile memory unit 220. The non-volatile memory unit 220 can store data (hereinafter referred to as the original data 240). The second connection interface 210 is electrically connected to the non-volatile memory unit 220. The removable memory device 200 is detachably connected to the computer device 100, and more specifically, the first connection interface 130 is pluggably connected through the second connection interface 210, and the removable memory device 200 is electrically connected to the computer device 100. The magnetic zone planning module 144 is used for magnetic zone planning of any non-volatile memory unit, so that the non-volatile memory unit can be planned to have only an encrypted area, only a non-encrypted area, or an encryption area of any ratio. And the non-encrypted area, wherein the encrypted area needs to be opened by the key password, that is, the key password is used to use the data in the encrypted area.
須了解到,卸除式記憶體裝置200之非揮發性記憶體單元220內之原有資料240例如為包含任何格式之所有檔案。另外,在本發明中,磁區規畫模組144在電腦裝置100中不限為硬體、韌體或軟體。It should be understood that the original data 240 in the non-volatile memory unit 220 of the removable memory device 200 is, for example, all files in any format. In addition, in the present invention, the magnetic zone planning module 144 is not limited to hardware, firmware or software in the computer device 100.
第3圖繪示此實施例之非揮發性記憶體磁區規劃方法之細部流程圖。如第2圖與第3圖所示,在此實施例中,非揮發性記憶體單元220內已具有所述原有資料240,卸除式記憶體裝置200之非揮發性記憶體單元220之儲存空間221尚不具任何加密區與非加密區。故,當卸除式記憶體裝置200熱插拔至電腦裝置100,且處理單元110收到指令以執行磁區規畫模組144時,處理單元110進行如下步驟301~步驟308。FIG. 3 is a detailed flow chart of the non-volatile memory magnetic zone planning method of the embodiment. As shown in FIG. 2 and FIG. 3, in this embodiment, the non-volatile memory unit 220 already has the original data 240, and the non-volatile memory unit 220 of the removable memory device 200 The storage space 221 does not yet have any encrypted area and non-encrypted area. Therefore, when the removable memory device 200 is hot-plugged to the computer device 100, and the processing unit 110 receives an instruction to execute the magnetic zone planning module 144, the processing unit 110 performs the following steps 301 to 308.
在步驟301中,判斷是否接收到欲設定加密區與非加密區的要求 ,若是,進行步驟302,否則回步驟301。在步驟302中,偵測非揮發性記憶體單元220內之儲存空間221之原有資料240之大小,且判斷此原有資料240之大小是否不大於備份空間141之容量,若是,進行步驟303,否則進行步驟308。在步驟303中,計算出上述欲設定之非加密區之容量 ,且判斷此原有資料240之大小是否不大於上述欲設定之非加密區之容量,若是,進行步驟304,否則進行步驟308。 在步驟304中,將非揮發性記憶體單元220內之原有資料240全部複製到備份空間141內。在步驟305中,依據欲設定之加密區與非加密區之容量調整非揮發性記憶體單元220內之儲存空間221。在步驟306中,在加密區與非加密區之劃分完成後,將備份空間141內之原有資料240全部複製到非加密區內。在步驟307中,刪除備份空間141內之原有資料240。在步驟308中,從顯示單元120提出對應之警示訊息。 In step 301, it is determined whether a request to set an encrypted area and an unencrypted area is received , and if so, step 302 is performed, otherwise step 301 is returned. In step 302, the size of the original data 240 of the storage space 221 in the non-volatile memory unit 220 is detected, and it is determined whether the size of the original data 240 is not greater than the capacity of the backup space 141. If yes, proceed to step 303. Otherwise, step 308 is performed. In step 303, the capacity of the unencrypted area to be set is calculated , and it is determined whether the size of the original data 240 is not greater than the capacity of the non-encrypted area to be set. If yes, proceed to step 304, otherwise proceed to step 308. In step 304, all of the original data 240 in the non-volatile memory unit 220 is copied into the backup space 141. In step 305, the storage space 221 in the non-volatile memory unit 220 is adjusted according to the capacity of the encrypted area and the non-encrypted area to be set. In step 306, after the division of the encrypted area and the non-encrypted area is completed, all the original data 240 in the backup space 141 is copied into the non-encrypted area. In step 307, the original data 240 in the backup space 141 is deleted. In step 308, a corresponding alert message is presented from the display unit 120.
更具體地,在步驟302中,當接收到欲設定加密區與非加密區的要求,更進一步包含欲設定加密區與非加密區各別的容量大小。More specifically, in step 302, when the request to set the encrypted area and the non-encrypted area is received, the capacity size of each of the encrypted area and the non-encrypted area is further included.
在步驟304中,在將原有資料240全部複製到備份空間141內之後,更包含對備份空間141內之原有資料240進行加密,使得外人無法透過解析電腦裝置100而直接取得備份空間141內之原有資料240。此外,其他實施例中,在將原有資料240全部複製到備份空間141內之後,步驟304更包含隱藏備份空間141在儲存單元140內之存取路徑,使得外人無法透過解析電腦裝置100而直接取得備份空間141內之原有資料240。In step 304, after the original data 240 is completely copied into the backup space 141, the original data 240 in the backup space 141 is further encrypted, so that the outsider cannot directly obtain the backup space 141 by analyzing the computer device 100. The original information 240. In addition, in other embodiments, after the original data 240 is completely copied into the backup space 141, the step 304 further includes hiding the access path of the backup space 141 in the storage unit 140, so that the outsider cannot directly analyze the computer device 100. The original data 240 in the backup space 141 is obtained.
在步驟305中,更具體地,在將非揮發性記憶體單元220內之儲存空間221分割為特定比例之加密區與非加密區之前,更包含對非揮發性記憶體單元220內之儲存空間221進行格式化。In step 305, more specifically, before the storage space 221 in the non-volatile memory unit 220 is divided into a specific ratio of the encrypted area and the non-encrypted area, the storage space in the non-volatile memory unit 220 is further included. 221 to format.
在步驟306~步驟307中,更具體地,在將備份空間141內之原有資料240全部複製到非加密區內之前,更包含對備份空間141內之原有資料240進行解密,以取得原有資料240。舉例來說,透過一金鑰密碼進行解密,以便有權限將原有資料240從備份空間141複製到非加密區,且將備份空間141內之原有資料240刪除。In step 306 to step 307, more specifically, before copying the original data 240 in the backup space 141 into the non-encrypted area, the original data 240 in the backup space 141 is further decrypted to obtain the original. There is information 240. For example, the decryption is performed by a key cipher so that the original data 240 is authorized to be copied from the backup space 141 to the non-encrypted area, and the original data 240 in the backup space 141 is deleted.
須了解到, 若備份空間141夠大,本實施例之方法也可能省略步驟302,意即,不須顧慮原有資料240大於備份空間141之容量。It should be understood that, if the backup space 141 is large enough, the method in this embodiment may also omit step 302, that is, it is not necessary to worry that the original data 240 is larger than the capacity of the backup space 141.
第4圖繪示本發明一實施例之操作介面模組250之示意圖。如第2圖與第4圖所示,在步驟301中,更具體地,當處理單元110收到指令以執行磁區規畫模組144時,處理單元110透過顯示單元120提供一操作介面模組250。操作介面模組250具有一調整部251與一框狀元件252。透過在框狀元件252內移動調整部251,並按下執行鍵253,處理單元110得以調整卸除式記憶體裝置200中加密區與非加密區之容量比例。換句話說,當使用者朝左方移動調整部251時,則可產生欲縮小加密區之容量及增大非加密區之容量的要求;反之,當使用者朝右方移動調整部251時,則可產生欲縮小非加密區之容量及增大加密區之容量的要求。FIG. 4 is a schematic diagram of the operation interface module 250 according to an embodiment of the invention. As shown in FIGS. 2 and 4, in step 301, more specifically, when the processing unit 110 receives an instruction to execute the magnetic zone planning module 144, the processing unit 110 provides an operation interface module through the display unit 120. Group 250. The operation interface module 250 has an adjustment portion 251 and a frame member 252. By moving the adjustment unit 251 in the frame member 252 and pressing the execution button 253, the processing unit 110 can adjust the capacity ratio of the encrypted area to the non-encrypted area in the removable memory device 200. In other words, when the user moves the adjustment unit 251 to the left, a request is made to reduce the capacity of the encryption area and increase the capacity of the non-encrypted area; conversely, when the user moves the adjustment unit 251 to the right, There is a requirement to reduce the capacity of the non-encrypted area and increase the capacity of the encrypted area.
如此,當接收到執行鍵253已被按下時,即送出上述要求至處理單元110。處理單元110則判斷出已接收到欲設定加密區與非加密區的要求,故,使用者得以動態地調整加密區與非加密區之容量比例。Thus, when it is received that the execution key 253 has been pressed, the above request is sent to the processing unit 110. The processing unit 110 determines that the request to set the encrypted area and the non-encrypted area has been received, so that the user can dynamically adjust the capacity ratio of the encrypted area and the non-encrypted area.
此外,透過將調整部251移動至最右邊或最左邊時,使用者亦可選擇將非揮發性記憶體單元220內之整個儲存空間221全部地規劃為單個加密區或非加密區。In addition, by moving the adjustment unit 251 to the rightmost or leftmost side, the user may also choose to entirely plan the entire storage space 221 in the non-volatile memory unit 220 as a single encrypted area or a non-encrypted area.
第5圖繪示本發明一實施例之電腦系統11的電子方塊圖。如第2圖與第5圖所示,第5圖之電腦系統11與第2圖之電腦系統10大致相同,其差異為,儲存單元140具有一第一備份空間142與一第二備份空間143,且卸除式記憶體裝置200之非揮發性記憶體單元220之儲存空間221已預先規畫有第一加密區231與第一非加密區232,第一加密區231與第一非加密區232彼此呈反比關係,且具有一第一容量比例(或反比比值),且第一非加密區232內已存有第一資料241,第一加密區231內已存有第二資料242。FIG. 5 is an electronic block diagram of a computer system 11 according to an embodiment of the present invention. As shown in FIG. 2 and FIG. 5, the computer system 11 of FIG. 5 is substantially the same as the computer system 10 of FIG. 2, with the difference that the storage unit 140 has a first backup space 142 and a second backup space 143. The storage space 221 of the non-volatile memory unit 220 of the removable memory device 200 has been pre-patterned with a first encryption area 231 and a first non-encrypted area 232, a first encryption area 231 and a first non-encrypted area. 232 is inversely proportional to each other and has a first capacity ratio (or inverse ratio), and the first data 241 is already stored in the first unencrypted area 232, and the second data 242 is already stored in the first encryption area 231.
第6圖繪示本發明一實施例之非揮發性記憶體磁區規劃方法之細部流程圖,如第5圖與第6圖所示,在此實施例中,當卸除式記憶體裝置200熱插拔電腦裝置100,且處理單元110收到指令以執行磁區規畫模組144時,處理單元110依據步驟601~步驟610進行如下。6 is a detailed flow chart of a non-volatile memory magnetic zone planning method according to an embodiment of the present invention, as shown in FIGS. 5 and 6, in this embodiment, when the removable memory device 200 is provided. When the computer device 100 is hot-swapped, and the processing unit 110 receives an instruction to execute the magnetic zone planning module 144, the processing unit 110 performs the following steps according to steps 601 to 610.
在步驟601中,判斷是否接收到欲改變第一容量比例為一第二容量比例之要求,以便將非揮發性記憶體單元220之儲存空間221改規劃為第二加密區(圖中未示)與第二非加密區(圖中未示),若是,進行步驟602,否則回步驟601。在步驟602中,偵測第一資料241之大小,且判斷此第一資料241之大小是否不大於儲存單元140之第一備份空間142之容量,若是,進行步驟603,否則進行步驟610。在步驟603中,根據第二容量比例,計算出第二非加密區的容量 ,且判斷此第一資料241之大小是否不大於第二非加密區的容量,若是,進行步驟604,否則進行步驟610。在步驟604中,偵測第二資料242之大小,且判斷此第二資料242之大小是否不大於儲存單元140之第二備份空間143之容量,若是,進行步驟605,否則進行步驟610。在步驟605中,根據第二容量比例,計算出第二加密區的容量 ,且判斷此第二資料242之大小是否不大於第二加密區的容量,若是,進行步驟606,否則進行步驟610。在步驟606中,將儲存空間221之第一資料241全部複製到第一備份空間142內,以及將儲存空間221之第二資料242全部複製到第二備份空間143內。在步驟607中,依據第二容量比例重新調整非揮發性記憶體單元220內之儲存空間221,使得非揮發性記憶體單元220內之儲存空間221分為第二加密區與第二非加密區。在步驟608中,在第二加密區與第二非加密區之劃分完成後,將第一備份空間142內之第一資料241全部複製到第二非加密區內,以及將第二備份空間143內之第二資料242全部複製到第二加密區內。在步驟609中,刪除第一備份空間142內之第一資料241以及第二備份空間143內之第二資料242。在步驟610中,從顯示單元120提出對應之警示訊息。 In step 601, it is determined whether a requirement to change the first capacity ratio to a second capacity ratio is received, so as to plan the storage space 221 of the non-volatile memory unit 220 to be the second encryption area (not shown). And the second unencrypted area (not shown), if yes, proceed to step 602, otherwise return to step 601. In step 602, the size of the first data 241 is detected, and it is determined whether the size of the first data 241 is not greater than the capacity of the first backup space 142 of the storage unit 140. If yes, proceed to step 603; otherwise, proceed to step 610. In step 603, the capacity ratio according to the second calculated capacity of the second non-encrypted area, and this determines the size of the first data 241 is not greater than the capacity of the second non-encrypted area, and if so, proceeds to step 604, otherwise proceeds to step 610. In step 604, the size of the second data 242 is detected, and it is determined whether the size of the second data 242 is not greater than the capacity of the second backup space 143 of the storage unit 140. If yes, proceed to step 605; otherwise, proceed to step 610. In step 605, the capacity ratio according to the second calculated capacity of the second encryption area, and size information 242 of this second determination is not greater than the capacity of the second encryption area, and if so, proceeds to step 606, otherwise proceeds to step 610. In step 606, all the first data 241 of the storage space 221 are copied into the first backup space 142, and the second data 242 of the storage space 221 is all copied into the second backup space 143. In step 607, the storage space 221 in the non-volatile memory unit 220 is readjusted according to the second capacity ratio, so that the storage space 221 in the non-volatile memory unit 220 is divided into the second encrypted area and the second unencrypted area. . In step 608, after the division of the second encryption zone and the second non-encryption zone is completed, the first data 241 in the first backup space 142 is all copied into the second non-encryption zone, and the second backup space 143 is The second data 242 is copied to the second encryption area. In step 609, the first data 241 in the first backup space 142 and the second data 242 in the second backup space 143 are deleted. In step 610, a corresponding alert message is presented from the display unit 120.
具體來說,在步驟601中,亦可透過第4圖之操作介面模組250發出改變第一容量比例之要求,以便動態地調整加密區與非加密區之容量比例。詳細如上文所示,在此不再加以贅述。Specifically, in step 601, the requirement of changing the first capacity ratio may be sent through the operation interface module 250 of FIG. 4 to dynamically adjust the capacity ratio of the encrypted area to the non-encrypted area. The details are as shown above and will not be described here.
在步驟606中,在完成將第一資料241全部移至第一備份空間142之後,更包含對第一備份空間142內之第一資料241進行加密,使得外人無法透過解析電腦裝置100而直接取得第一備份空間142內之第一資料241。此外,其他實施例中,在完成將第一資料241全部移至第一備份空間142之後,步驟606更包含隱藏第一備份空間142在儲存單元140內之存取路徑,使得外人無法透過解析電腦裝置100而直接取得第一備份空間142內之第一資料241。In step 606, after the first data 241 is completely moved to the first backup space 142, the first data 241 in the first backup space 142 is further encrypted, so that the outsider cannot directly obtain the computer device 100. The first data 241 in the first backup space 142. In addition, in other embodiments, after the first data 241 is completely moved to the first backup space 142, the step 606 further includes hiding the access path of the first backup space 142 in the storage unit 140, so that the outsider cannot analyze the computer. The device 100 directly obtains the first data 241 in the first backup space 142.
在步驟606中,當判斷出第二資料242之大小不大於第二加密區之容量時,更包含透過一金鑰密碼開啟第一加密區231,以便有權限將第一加密區231內之第二資料242全部複製第二備份空間143。第一加密區231的金鑰密碼是透過使用者之輸入才能取得第二資料242。In step 606, when it is determined that the size of the second data 242 is not greater than the capacity of the second encryption area, the first encryption area 231 is further opened by using a key password, so that the first encryption area 231 is authorized. The second data 242 all copies the second backup space 143. The key cipher of the first encryption area 231 is obtained through the input of the user to obtain the second data 242.
另外,在完成將第二資料242全部移至第二備份空間143之後,更包含對第二備份空間143內之第二資料242進行加密,使得外人無法透過解析電腦裝置100而直接取得第二備份空間143內之第二資料242。此外,其他實施例中,在完成將第二資料242全部移至第二備份空間143之後,步驟606更包含隱藏第二備份空間143在儲存單元140內之存取路徑,使得外人無法透過解析電腦裝置100而直接取得第二備份空間143內之第二資料242。In addition, after the second data 242 is completely moved to the second backup space 143, the second data 242 in the second backup space 143 is further encrypted, so that the external person cannot directly obtain the second backup by analyzing the computer device 100. The second material 242 in the space 143. In addition, in other embodiments, after the second data 242 is completely moved to the second backup space 143, the step 606 further includes hiding the access path of the second backup space 143 in the storage unit 140, so that the outsider cannot analyze the computer. The device 100 directly acquires the second material 242 in the second backup space 143.
在步驟607中,更具體地,在將非揮發性記憶體單元220內之儲存空間221分割為第二加密區與第二非加密區之前,更包含對非揮發性記憶體單元220內之儲存空間221進行格式化。In step 607, more specifically, before the storage space 221 in the non-volatile memory unit 220 is divided into the second encrypted area and the second unencrypted area, the storage in the non-volatile memory unit 220 is further included. The space 221 is formatted.
在步驟608~步驟609中,更具體地,在將第一備份空間142內之第一資料241全部複製到第二非加密區內之前,更包含對第一備份空間142內之第一資料241進行解密,以取得第一資料241。舉例來說,透過一金鑰密碼進行解密,才能將第一資料241從第一備份空間142複製到第二非加密區,且刪除第一備份空間142內之第一資料241。同樣地,在將第二備份空間143內之第二資料242全部複製到第二加密區內之前,更包含對第二備份空間143內之第二資料242進行解密,以取得第二資料242。舉例來說,透過一金鑰密碼進行解密,才能將第二資料242從第二備份空間143複製到第二加密區,且刪除第二備份空間143內之第二資料242。在步驟608中,更具體地,將第二備份空間143內之第二資料242全部複製到第二加密區內之前,更包含透過一金鑰密碼進行解密,才能將第二備份空間143內之第二資料242全部複製到第二加密區內。In step 608 to step 609, more specifically, before copying the first data 241 in the first backup space 142 to the second non-encrypted area, the first data 241 in the first backup space 142 is further included. Decryption is performed to obtain the first data 241. For example, the first data 241 can be copied from the first backup space 142 to the second unencrypted area by decrypting through a key password, and the first data 241 in the first backup space 142 is deleted. Similarly, before copying the second data 242 in the second backup space 143 to the second encryption area, the second data 242 in the second backup space 143 is further decrypted to obtain the second data 242. For example, the second data 242 can be copied from the second backup space 143 to the second encryption area by decrypting through a key password, and the second data 242 in the second backup space 143 is deleted. In step 608, more specifically, before copying the second data 242 in the second backup space 143 to the second encryption area, and further including decrypting through a key password, the second backup space 143 can be The second data 242 is all copied into the second encryption zone.
須了解到,在另一實施例中,本發明也不限步驟602至步驟605之順序;或者,其他實施例中,若第一備份空間142與第二備份空間143夠大,本實施例之方法也可能省略步驟602與步驟604 。It should be understood that, in another embodiment, the present invention is not limited to the sequence of steps 602 to 605; or, in other embodiments, if the first backup space 142 is sufficiently large with the second backup space 143, the embodiment is The method may also omit step 602 and step 604.
上述各實施例中,舉例來說但不以此為限,卸除式記憶體裝置200例如為一USB卸除式記憶體裝置、智慧型電子裝置、記憶卡、外接硬碟或類似種類,其中智慧型電子裝置可以例如為智慧型手機或平板電腦;處理單元110例如為一中央處理單元或類似種類;第一連接介面130與第二連接介面210例如為USB連接介面或類似種類;儲存單元140例如為硬碟裝置或類似種類;非揮發性記憶體單元220例如為快閃記憶體或類似種類。For example, but not limited to, the removable memory device 200 is, for example, a USB removable memory device, a smart electronic device, a memory card, an external hard disk, or the like, wherein The smart device can be, for example, a smart phone or a tablet; the processing unit 110 is, for example, a central processing unit or the like; the first connection interface 130 and the second connection interface 210 are, for example, a USB connection interface or the like; the storage unit 140 For example, a hard disk device or the like; the non-volatile memory unit 220 is, for example, a flash memory or the like.
最後,上述所揭露之各實施例中,並非用以限定本發明,任何熟習此技藝者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾,皆可被保護於本發明中。因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Finally, the various embodiments disclosed above are not intended to limit the invention, and those skilled in the art can be protected in various modifications and refinements without departing from the spirit and scope of the invention. In the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.
10、11‧‧‧電腦系統10, 11‧‧‧ computer system
21~23‧‧‧步驟21~23‧‧‧Steps
100‧‧‧電腦裝置100‧‧‧ computer equipment
110‧‧‧處理單元110‧‧‧Processing unit
120‧‧‧顯示單元120‧‧‧Display unit
130‧‧‧第一連接介面130‧‧‧First connection interface
140‧‧‧儲存單元140‧‧‧ storage unit
141‧‧‧備份空間141‧‧‧Backup space
142‧‧‧第一備份空間142‧‧‧First backup space
143‧‧‧第二備份空間143‧‧‧Second backup space
144‧‧‧磁區規畫模組144‧‧‧Magnetic area planning module
200‧‧‧卸除式記憶體裝置200‧‧‧Removable memory device
210‧‧‧第二連接介面210‧‧‧Second connection interface
220‧‧‧非揮發性記憶體單元220‧‧‧Non-volatile memory unit
221‧‧‧儲存空間221‧‧‧ storage space
231‧‧‧第一加密區231‧‧‧First encryption zone
232‧‧‧第一非加密區232‧‧‧First unencrypted area
240‧‧‧原有資料240‧‧‧ original information
241‧‧‧第一資料241‧‧‧First Information
242‧‧‧第二資料242‧‧‧Second information
250‧‧‧操作介面模組250‧‧‧Operation interface module
251‧‧‧調整部251‧‧‧Adjustment Department
252‧‧‧框狀元件252‧‧‧Frame components
253‧‧‧執行鍵253‧‧‧Execution key
301~308‧‧‧步驟301~308‧‧‧Steps
601~610‧‧‧步驟601~610‧‧‧Steps
為讓本發明之上述和其他目的、特徵、優點與實施例能更明顯易懂,所附圖式之說明如下: 第1圖繪示本發明一實施例之非揮發性記憶體磁區規劃方法之流程圖; 第2圖繪示本發明一實施例之電腦系統的電子方塊圖; 第3圖繪示此實施例之非揮發性記憶體磁區規劃方法之細部流程圖; 第4圖繪示此實施例之磁區規畫模組之操作介面模組示意圖; 第5圖繪示本發明一實施例之電腦系統的電子方塊圖;以及 第6圖繪示本發明一實施例之非揮發性記憶體磁區規劃方法之細部流程圖。The above and other objects, features, advantages and embodiments of the present invention will become more apparent and understood. The description of the drawings is as follows: FIG. 1 is a diagram showing a non-volatile memory magnetic zone planning method according to an embodiment of the present invention. FIG. 2 is a block diagram showing an electronic block diagram of a computer system according to an embodiment of the present invention; FIG. 3 is a detailed flow chart showing a non-volatile memory magnetic zone planning method according to the embodiment; FIG. 5 is an electronic block diagram of a computer system according to an embodiment of the present invention; and FIG. 6 is a non-volatile embodiment of the present invention. A detailed flow chart of the memory magnetic zone planning method.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106125911A TWI644204B (en) | 2017-08-01 | 2017-08-01 | Method for partitioning memory area of non-volatile memory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106125911A TWI644204B (en) | 2017-08-01 | 2017-08-01 | Method for partitioning memory area of non-volatile memory |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI644204B true TWI644204B (en) | 2018-12-11 |
TW201911046A TW201911046A (en) | 2019-03-16 |
Family
ID=65432102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW106125911A TWI644204B (en) | 2017-08-01 | 2017-08-01 | Method for partitioning memory area of non-volatile memory |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI644204B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080184035A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access |
TW201013398A (en) * | 2008-09-25 | 2010-04-01 | Walton Advanced Eng Inc | Method for applying USB record carriers and module assembled for the method |
US20120079583A1 (en) * | 2010-09-23 | 2012-03-29 | Microsoft Corporation | Offload reads and writes |
TWI382316B (en) * | 2009-07-30 | 2013-01-11 | Mao Ting Chang | Serial-connected combination structure of flash disks to create security function |
-
2017
- 2017-08-01 TW TW106125911A patent/TWI644204B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080184035A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access |
TW201013398A (en) * | 2008-09-25 | 2010-04-01 | Walton Advanced Eng Inc | Method for applying USB record carriers and module assembled for the method |
TWI382316B (en) * | 2009-07-30 | 2013-01-11 | Mao Ting Chang | Serial-connected combination structure of flash disks to create security function |
US20120079583A1 (en) * | 2010-09-23 | 2012-03-29 | Microsoft Corporation | Offload reads and writes |
Also Published As
Publication number | Publication date |
---|---|
TW201911046A (en) | 2019-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108932297B (en) | Data query method, data sharing method, device and equipment | |
AU2006205315B2 (en) | Method and portable storage device for allocating secure area in insecure area | |
US11809584B2 (en) | File system metadata protection | |
KR100678927B1 (en) | Method and portable storage device for allocating secure area in insecure area | |
CN112818380A (en) | Method, device, equipment and system for backtracking processing of business behaviors | |
JP4851200B2 (en) | Method and computer-readable medium for generating usage rights for an item based on access rights | |
US20170206174A1 (en) | Secure memory storage | |
EP3355221B1 (en) | Mobile device with built-in access control functionality | |
JP2009537092A (en) | Method of moving rights object and electronic device | |
CN115277143B (en) | Data security transmission method, device, equipment and storage medium | |
US8438112B2 (en) | Host device, portable storage device, and method for updating meta information regarding right objects stored in portable storage device | |
WO2015176531A1 (en) | Terminal data writing and reading methods and devices | |
KR102417814B1 (en) | Electronic document management server that supports security settings for some content embedded in electronic documents based on member identification information and operating method thereof | |
US8086873B2 (en) | Method for controlling file access on computer systems | |
JP5511925B2 (en) | Encryption device with access right, encryption system with access right, encryption method with access right, and encryption program with access right | |
US9819663B1 (en) | Data protection file system | |
TWI553473B (en) | Secure data storage and transfer for portable data storage devices | |
TWI644204B (en) | Method for partitioning memory area of non-volatile memory | |
CN110032529B (en) | Memory management method and related device | |
US10324649B2 (en) | Method for partitioning memory area of non-volatile memory | |
CN107688729B (en) | Application program protection system and method based on trusted host | |
CN113591107A (en) | System and method for realizing file redirection encryption and decryption | |
US9152636B2 (en) | Content protection system in storage media and method of the same | |
GB2434887A (en) | Access control by encrypting stored data with a key based on a "fingerprint" of the device storing the data | |
US20230252175A1 (en) | Computer readable medium, user apparatus, access control method, and access control system |