Data retention method

11036893 ยท 2021-06-15

Assignee

Inventors

Cpc classification

International classification

Abstract

The present disclosure relates to a data retention method which ensures security of classified information in design. The data retention method comprises steps as follows: a data plug of a dedicated storage module is inserted into a data socket of an encryption module and a locking element of a lock fastener module is fixed at a locking hole on the dedicated storage module; the encryption module and the dedicated storage module are electrically connected to each other through the data socket; an external component of the encryption module is electrically connected to an external device such that classified information (saved or to be saved) is encrypted or decrypted between the external device and a storage element of the dedicated storage module by an encryption component of the encryption module during data exchanges.

Claims

1. A data retention method, comprising steps as follows: step 1: a data plug of a dedicated storage module is inserted into a data socket of an encryption module and a locking element of a lock fastener module is fixed at a locking hole on the dedicated storage module; step 2: the encryption module and the dedicated storage module are electrically connected to each other through the data socket; step 3: an external component of the encryption module is electrically connected to an external device such that classified information is encrypted or decrypted between the external device and a storage element of the dedicated storage module by an encryption component of the encryption module during data exchanges.

2. The data retention method as claimed in claim 1 wherein a power source component is activated by a fingerprint switch before step 1.

3. The data retention method as claimed in claim 2 wherein classified information is encrypted or decrypted in the external device once by the encryption component of the encryption module during data exchanges and saved in an ordinary storage device after the external component of the encryption module is electrically connected to the external device.

4. The data retention method as claimed in claim 1 wherein a power receiving port in the locking hole and a power supply pot in the locking element are electrically connected to each other after step 1.

5. The data retention method as claimed in claim 1 wherein an indicator for the encryption module can display corresponding operation status.

6. The data retention method as claimed in claim 1 wherein a key which has been encrypted by the encryption component can be redefined through the fingerprint switch in step 3.

7. The data retention method as claimed in claim 1 wherein the locking element of the lock fastener module is released from the locking hole of the dedicated storage module and the data plug of the dedicated storage module is separated from the data socket of the encryption module after step 3.

8. The data retention method as claimed in claim 7 wherein a key which has been redefined by the fingerprint switch is available in step 3 when the classified information is accessed after step 1 again.

Description

BRIEF DESCRIPTIONS OF THE DRAWINGS

(1) FIG. 1 is the first flowchart for a data retention method in a preferred embodiment.

(2) FIG. 2 is the second flowchart for a data retention method in a preferred embodiment.

(3) FIG. 3 is the third flowchart for a data retention method in a preferred embodiment.

(4) FIG. 4a is the fourth flowchart for a data retention method in a preferred embodiment.

(5) FIG. 4b is the fifth flowchart for a data retention method in a preferred embodiment.

(6) FIG. 5a is a side view of a dedicated storage module used in a data retention method in a preferred embodiment.

(7) FIG. 5b is a side view for entire appearance of a data retention device used in a data retention method in a preferred embodiment.

(8) FIG. 6a is an exploded view of a data retention device in a preferred embodiment.

(9) FIG. 6b is the first schematic view of using a dedicated storage module in a data retention method in a preferred embodiment.

(10) FIG. 6c is the second schematic view of using a dedicated storage module in a data retention method in a preferred embodiment.

(11) FIG. 6d is the third schematic view of using a dedicated storage module in a data retention method in a preferred embodiment.

(12) FIG. 6e is the fourth schematic view of using a dedicated storage module in a data retention method in a preferred embodiment.

(13) FIG. 7a is a schematic view of a dedicated storage module used in a data retention method in a preferred embodiment.

(14) FIG. 7b is a schematic view of an encryption module used in a data retention method in a preferred embodiment.

(15) FIG. 7c is a schematic view which illustrates classified information is exchanged between an external device and an external component in a data retention method in a preferred embodiment.

(16) FIG. 7d is a schematic view which illustrates minor classified information is exchanged between an external device and an external component in a data retention method in a preferred embodiment.

DETAILED DESCRIPTIONS OF THE PREFERRED EMBODIMENTS

(17) A data retention method is further illustrated in the preferred embodiment for clear understanding of purposes, characteristics and effects of the present disclosure.

(18) Referring to FIG. 1, which illustrates a data retention method comprising a step 1 (1), a step 2 (2) and a step 3 (3).

(19) As shown in FIG. 1, the step 1 (1) is to insert a data plug (11) of a dedicated storage module (10) into a data socket (21) of an encryption module (20) and fix a locking element (31) of a lock fastener module (30) at a locking hole (12) on the dedicated storage module (10).

(20) As shown in FIG. 1, the step 2 (2) is to electrically connect the encryption module (20) and the dedicated storage module (10) through the data socket (21).

(21) As shown in FIG. 1, the step 3 (3) is to electrically connect an external component (22) of the encryption module (20) and an external device (40) such that classified information (41) is encrypted or decrypted between the external device (40) and a storage element (14) of the dedicated storage module (10) by an encryption component (23) of the encryption module (20) during data exchanges.

(22) In each step of a data retention method, an indicator (26) for the encryption module (20) can display corresponding operation status.

(23) Referring to FIGS. 5a and 7a from which detailed conditions of the dedicated storage module (10) are clearly explained: the dedicated storage module (10) comprises a data plug (11), a locking hole (12), a control element (13), a storage element (14) and a substrate (15) which is electrically connected to all components in the dedicated storage module (10).

(24) Specifically, the data plug (11) which presents as a plug with an electric-contact end for specially defined physical specifications (FIG. 5a) rather than universal specifications and no electric contacts beyond designs; the locking hole (12) designed at one side of the dedicated storage module (10) (FIG. 5a) and used to fix the dedicated storage module (10) at a designated position is conductive to stability between the data plug (11) and the data socket (21); the control element (13) is a logic machine with which a complicated computer program is executed; the storage element (14) means non-volatile memories (NVRAM) in which configurations and/or data are saved but not erased after disconnection of power; the substrate (15) is a circuit board usually, for example, a single-layered or multi-layered printed circuit board, a lead frame, a polyimide, a BT circuit board or a flip chip substrate, and comprises circuits interiorly (not shown in figures) as an interface for electric transmission.

(25) Referring to FIGS. 6a and 7b from which detailed conditions of the encryption module (20) are clearly explained: the encryption module (20) comprises a data socket (21), an external component (22), an encryption component (23), a power source component (24) and a printed circuit board (25) which is electrically connected to all component in the encryption module (20).

(26) Specifically, the data socket (21) which presents as a socket with an electric-contact end for specially defined physical specifications (FIG. 6c) rather than universal specifications and no electric contacts beyond designs; the external component (22) is an assembly providing a function to connect the internet, for example, network interface controller (NIC) that is wired or wireless hardware as an interface of data exchanges locally or remotely for network-based communications among different devices; the encryption component (23) in which symmetric or asymmetric algorithms are integrated internally for the high security level is also known as a security chip that prevents secret keys or data saved internally from being accessed or tampered illegally and provides the encryption module (20) with ciphered texts encrypted from plain texts and difficulty read wherein the ciphered texts should be deciphered and returned to normal readable plain texts by an authorized administrator owing a decryption key during a deciphering process; the power source component (24) which is connected to an external power source for running provides electric power to the dedicated storage module (10), the encryption module (20) and the lock fastener module (30); the printed circuit board (25) is a circuit board usually, for example, a single-layered or multi-layered printed circuit board, a lead frame, a polyimide, a BT circuit board or a flip chip substrate, and comprises circuits interiorly (not shown in figures) as an interface for electric transmission.

(27) Referring to FIGS. 6a and 7b from which detailed conditions of the lock fastener module (30) are clearly explained: the lock fastener module (30) comprises a locking element (31) and a power element (32) wherein the locking element (31) is driven and shifted to another position by the power element (32) energized from the power source component (24).

(28) In detail, the locking element (31) designed at one side of the dedicated storage module (10) (FIG. 2b) and used to fix the dedicated storage module (10) at a designated position is conductive to stability between the data plug (11) and the data socket (21); the power element (32) functioning as an electric motor is an electric device transforming electric energy to mechanical energy and further kinetic energy driving an external component or the dedicated storage module (10).

(29) Preferably, a data retention method further comprises a step 1a (1a) and a step 1b (1b), as shown in FIG. 2.

(30) A data retention method comprises a step 1a (1a) before the step 1 (1) wherein the step 1a (1a) is to activate a power source component (24) by a fingerprint switch (33) installed inside the lock fastener module (30); the fingerprint switch (33) with the dual function of fingerprint recognition and power switch extracts an fingerprint image, ensuring connection of power with the power source component (24) activated by a fingerprint.

(31) A data retention method comprises a step 1b (1b) after the step 1 (1) wherein the step 1b (1b) is to electrically connect a power receiving port in the locking hole (12) and a power supply port in the locking element (31); the power receiving port (not shown in figures) in the locking hole (12) and the power supply port (not shown in figures) in the locking element (31) are electrically connected to each other for supply of electric power to the dedicated storage module (10) which is uneasily energized by itself.

(32) Preferably, a data retention method further comprises a step 1c (1c) as shown in FIG. 3.

(33) The step 1c (1c) after the step 1a (1a) is to electrically connect the external component (22) of the encryption module (20) and the external device (40) such that classified information (41) is encrypted or decrypted in the external device (40) once by the encryption component (23) of the encryption module (20) during data exchanges and saved in an ordinary storage device (50); the ordinary storage device (50) is electrically connected to the encryption module (20) for secondary security of files.

(34) Preferably, a data retention method further comprises a step 3a (3a), a step 3b (3b) and a step 4 (4) as shown in FIGS. 4a and 4b.

(35) A data retention method further comprises a step 3a (3a) accompanied with the step 3 (3) such that a key which has been encrypted by the encryption component (23) is redefined through the fingerprint switch (33) for no classified information accessed from the dedicated storage module (10) without a corresponding fingerprint. Moreover, a step 4 (4) added after the step 3 (3) is to release the locking element (31) of the lock fastener module (30) from the locking hole (12) on the dedicated storage module (10) and to remove the data plug (11) of the dedicated storage module (10) from the data socket (21) of the encryption module (20); a step 3b (3b) accompanied with step 3 (3) is to use a key redefined by the fingerprint switch (33) before the classified information (41) is accessed after the step 1 (1).

(36) Referring to FIGS. 6b and 6c, which illustrate changes in use between the dedicated storage module (10) and the encryption module (20): the dedicated storage module (10) is plugged into the encryption module (20) such that both the data plug (11) and the data socket (21) are shifted synchronously; the data plug (11) and the data socket (21) contact each other (not shown in figures), enabling the locking element (31) to be fixed in the locking hole (12) for stability between the data plug (11) and the data socket (21); a user triggers the locking element (31) to be released from the locking hole (12), detaching the dedicated storage module (10) by the power element (32) for separation between the data plug (11) and data socket (21) and removal of the dedicated storage module (10).

(37) A detailed process for a data retention method in the present disclosure is explained in the preferred embodiment as follows.

(38) Referring to FIGS. 5b and 6a. With power connected to the power source component (24) from an external power supply, the power source component (24) is activated through the fingerprint switch (33) such that the dedicated storage module (10), the encryption module (20) and the lock fastener module (30) are energized, as shown in the indicator (26) for running status.

(39) As shown in FIG. 7d, the external component (22) of the encryption module (20) is electrically connected to the external device (40) such that classified information (41) is encrypted or decrypted in the external device (40) once by the encryption component (23) of the encryption module (20) during data exchanges and saved in the ordinary storage device (50).

(40) When the data plug (11) is inserted into the data socket (21), both the data plug (11) and the data socket (21) are shifted synchronously, as shown in FIGS. 5b, 6b and 6c.

(41) Moreover, the data plug (11) and the data socket (21) contacting each other (not shown in figures) activate the locking element (31) to be fixed inside the locking hole (12) for stability between the data plug (11) and the data socket (21); a power receiving port (not shown in figures) in the locking hole (12) and a power supply port (not shown in figures) in the locking element (31) are electrically connected to each other for supply of electric power to the dedicated storage module (10), as shown in the indicator (26) for running status.

(42) Furthermore, as shown in FIG. 7c, the encryption module (20) is electrically connected to the dedicated storage module (10) through the data socket (21) and the external component (22) of the encryption module (20) is also electrically connected to the external device (40) for accessing classified information (41) that will be enciphered based on a key, which has been encrypted by the encryption component (23) and redefined through the fingerprint switch (33), and saved in the storage element (14), as shown in the indicator (26) for running status.

(43) Referring to FIGS. 6b and 6c, which illustrate a user triggers the locking element (31) to be released from the locking hole (12), detaching the dedicated storage module (10) by the power element (32) for separation between the data plug (11) and data socket (21) and removal of the dedicated storage module (10), as shown in FIGS. 6c and 6d.

(44) To decrypt and access classified information (41) encrypted and saved in the storage element (14), a user should repeat steps to activate the dedicated storage module (10) and use an encrypted key which has been redefined by the fingerprint switch (33).

(45) Accordingly, a data detention method which is different from an ordinary data storage method and referred to as creative work in applications of private cloud meets patentability and is applied for the patent.

(46) It should be reiterated that the above descriptions present the preferred embodiment, and any equivalent change in specifications, claims or drawings still belongs to the technical field within the present disclosure with reference to claims hereinafter.