Method and system for secure data access among two devices

ABSTRACT

An embodiment of the present invention provides a method for secure data access among two devices. The method comprises: retrieving unique information corresponding to a first electronic device and a storage device; generating an encryption key according to the unique information; generating a password string for secure a data file; encrypting the password string with the encryption key; and locking and storing the data file together with the encrypted password string in the storage device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority of U.S. Provisional No. 61/565,955 filed on Dec. 1, 2011.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to method and system for secure data access among two devices, and more particularly, to methods and system for secure password generation.

2. Description of the Prior Art

Currently, data security is an important topic for keeping data protected from unauthorized access in order to ensure privacy of personal or sensitive data. One simple way to protect data is to lock the data with a password. For example, a user can operate a mobile device to run a data compression application program for compressing a sensitive file and locking the sensitive file with a password determined by the user, such that the locked file can be further stored and protected in a memory card safely. However, the password could be easily cracked, or the user may forget the password if the password is too complicated. Therefore, a protection mechanism for protecting the password securely and effectively is very helpful to the user.

SUMMARY OF THE INVENTION

An embodiment of the present invention provides a method for secure data access among two devices. The method comprises: retrieving unique information corresponding to a first electronic device and a storage device; generating an encryption key according to the unique information; generating a password string for securing a data file; encrypting the password string with the encryption key; and locking and storing the data file together with the encrypted password string in the storage device.

Another embodiment of the invention provides data security system. The data security system comprises: a processing unit, configured to process a data file, the processing unit comprising: a key generator, configured to generate an encryption key according to unique information corresponding to the storage device and the processing unit; a password generator, configured to generate an encrypted password string according to the encryption key; and a storage unit, configured to store the data file and the encrypted password string.

Yet another embodiment of the invention provides a method for secure data access, comprising: receiving a request, by a processing unit, for accessing a secured data file stored in a storage unit; retrieving unique information corresponding to the processing unit and the storage unit respectively; generating a decryption key according to the unique information; decrypting the secured data file according to the decryption ; and permitting access to the secured data file according to the decryption result.

These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a diagram of secure password generation for use in an electronic device according to an embodiment of the invention

FIG. 2 illustrates an embodiment of the invention for secure password generation.

FIG. 3 illustrates another embodiment of the invention for secure password generation.

FIG. 4 illustrates a diagram of a method for secure data access according to an embodiment of the invention.

FIG. 5 illustrates a diagram of a method for secure password generation according to an embodiment of the invention.

FIG. 6 illustrates an embodiment of the invention for password retrieval from the encrypted password string.

FIG. 7 illustrates a diagram of a method for secure data access according to another embodiment of the invention.

DETAILED DESCRIPTION

The invention discloses system and method for secure data access among two devices according to unique information of the two devices. To protect a data file, a password maybe generated in random and further encrypted by a key. The key is derived from the unique information of the two devices, and thus it avoids the password from being decrypted by unauthorized devices. The data file will be locked by the password and may be stored together with the encrypted password. In order to access the locked data file, the encrypted password must be decrypted first so as to provide protection.

Please refer to FIG. 1, which depicts a diagram of secure password generation for use in an electronic device according to an embodiment of the invention. In this embodiment, the electronic device 100 comprises, among other components/units, a processing unit 110 and a storage unit 120. The processing unit 110 is configured to process a data file 130 and comprises at least a key generator 112 and a password generator 113. The processing unit 110 is configured to process the data file 130 by protecting the data file 130 with secure password prior to transmitting and/or storing the data file 130 into the storage unit 120 or other storage device. The key generator 112 of the processing unit 110 is configured to produce a key for encrypting a password according to some unique data of the processing unit 110 and/or the storage device 120 wherein the data file 130 is going to be stored, for example the storage unit 120 in this embodiment. The password generator 113 receives the key generated by the key generator 112 and is configured to generate a secure password 140 associated with the data file 130 according to the key. The secure password 140 together with the data file 130 that is locked by the password are then transmitted and stored into the storage unit 120. In one embodiment of the invention, the data file 130 may be further compressed for storage. The processing unit 110 may further comprises a data access interface unit (not shown) configured to receive a request for accessing the data file.

The processing unit 110 may be a central processing unit, application processor, dedicated processor, and/or other similar devices. The storage unit 120 may be an internal storage unit such as embedded multimedia card (eMMC),SATA hard disk, PCIE hard disk, flash memory and/or others. The storage unit 120 may also be a storage unit external to the electronic device 100, such as SD card, Micro SD card, USB memory, ROM, or any suitable type of external memory. Furthermore, the storage unit 120 may support hot-plug to the electronic device 100. In order to access the data file 130 from the storage unit 120, the secure password 140 has to be verified first.

Next please refer to FIG. 2 and FIG. 3, in which illustrate embodiments of the invention for secure password generation. Prior to transmitting the locked data file 130 to the storage unit 120, the processing unit 110 generates a secure password according to unique information corresponding to the processing unit 110 and the storage unit 120. As shown in the embodiment of FIG. 2, the unique information is identification data 114, 124 of the processing unit 110 and the storage unit 120 respectively. The identification data can be, for example, device serial number, IMEI number, MAC address, and/or other similar information. The processing unit 110 may retrieve and/or store the second identification data 124 corresponding to the storage unit 120. Then the first identification data 114 of the processing unit 110 is processed together with the second identification data 124 for generating a key 142 according to a predefined algorithm. The key 142 may be generated by string combination and/or hash calculation. In one embodiment of the invention, the predefined algorithm may be a logic operation, such as an XOR operation. Result of the logic operation may further undergo a hash calculation to generate the key 142, such as SHA256. The processes of FIG. 2 may be performed by the key generator 112 of FIG. 1.

After the key 142 is generated, it can be further used to generate a secure password, for example an encrypted password string. Referring to FIG. 3, a password 144 may be generated in random by a hardware or software generator. The password 144 is then processed together with a data string 146 so as to generate a password string 148 according to a first algorithm. The data string may also be generated in random by a hardware or software generator. To provide better protection, the password 144 is scattered within the data string 146 so that the password 144 may be hidden. In one embodiment of the invention, the length (number of bits) of the data string 146 is longer than the password 144, for example 32 bytes of password 144 and 1024 bytes of data string 146. In one embodiment of the invention, the password string 148 may be generated by mixing the password 144 and the data string 146. For example, each bit or byte of the password 144 may be scattered into the data string 146 every predefined bit/byte interval. For example, insert the first byte of the password 144 in between the 32^(nd) and 33^(rd) bytes of the data string 146, insert the second byte of the password 144 in between the 64^(th) and 65^(th) bytes of the data string 146, and so on. In another embodiment of the invention, the password string 148 may be generated by replacing certain bit/byte of the data string 146 with individual bit/byte of the password 144 in a predefined order. For example, replace the first byte of the data string 146 with the first byte of the password 144, replace the 33^(rd) byte of the data string 146 with the second byte of the password 144, and so on. The password string 148 is then encrypted with the key 142 according to a second algorithm to generate an encrypted password string 140. The second algorithm may be any suitable encryption algorithm, such as SHA 265.

Having described above embodiments, FIG. 4 illustrates a diagram of a method for secure data access according to an embodiment of the invention. To protect data file to be stored or had been stored in a storage device, a secure password may be generated according to some secure information that can only be obtained by designated devices, and the data file may be locked by the password. The unique information may be identity information such as device serial number, IMEI number and/or MAC address, etc. In this method, unique information corresponding to an electronic device configured to process the data file and a storage device configured to store the data file is retrieved in step S410. An encryption key is generated according to the unique information in step S420, meanwhile a password string for secure the data file is generated in step S430. The password string may be generated in random and/or further processed by a predetermined algorithm. Step S440 encrypts the password string with the encryption key according to another predetermined algorithm. Then the data file is locked and stored in the storage device together with the encrypted password (S450). The storage device may be internal or external to the electronic device. Then in response to a request for accessing the data file by a requesting device, unlock the data file by decrypting the encrypted password. If the encrypted password can be successfully decrypted, the requesting device may access or unlock the data file. If not, the requesting device cannot access or unlock the data file. In another embodiment of the invention, the data file may further be decompressed if it is compressed when being stored in the storage device.

FIG. 5 illustrates a diagram of a method for secure password generation according to an embodiment of the invention. The method can be applied in an electronic device such as the electronic device 100 shown in FIG. 1. The electronic device comprises among others, a processing unit, and is electrically connected to a storage unit. The storage unit may be internal or external to the electronic device. The processing unit is configured to access data with the storage unit. In step S510, identity information corresponding to the processing unit and the storage unit is retrieved by the processing unit . The identity information is used to generate an encryption key in step S520. The encryption key can be generated by a predetermined algorithm, such as SHA. Then the processing unit randomly generates a password and a data string in step S530 and S540 respectively. The password and the data string maybe generated by hardware or software generator. Furthermore, length of the data string maybe longer than the password. In one embodiment of the invention, the data string may be N-time longer than the password, wherein N is an integer. In step S550, scatter the password into the data string to produce a password string. Bits/bytes of the password may replace certain bits/bytes of the data string in a predetermined order. For example, replacing every M/Nth bit (byte) of the data string with Nth bit (byte) of the password, in which M is the length of the data string and N is the length of the password. The password string is encrypted with the encryption key in S560 to generate an encrypted password for protecting data file accessed by the processing unit and stored in the storage unit. The password string may be encrypted by predetermined encryption algorithm known in the art.

Please refer to FIG. 6 with reference to FIG. 1, the data file 130 and the encrypted password 140 are stored together in the storage unit 120. In response to a request for accessing the data file 130, the encrypted password 140 needs to be decrypted to unlock the data file 130. Otherwise, the data file 130 cannot be accessed. FIG. 6 illustrates a process for decrypting the encrypted password 240 according to an embodiment of the invention. The encrypted password 240 is decrypted by a key 242 according to the third algorithm. As described above, the encrypted password 240 is generated according to the unique information corresponding to the processing unit that processes the data file 130 and the storage unit. In the embodiment of FIG. 1, the encrypted password is generated according to identification data of the processing unit 110 and the storage unit 120. Therefore, the key used to decrypt the encrypted password 240 must be paired with the key used to encrypt the encrypted password 240, which means only processing units that hold the identity information 114 and 124 can generate the key 242. Similarly, the third algorithm used to decrypt the encrypted password is paired with the second algorithm used to encrypt the encrypted password, and thus is hold by authorized processing units.

To derive the password 244, the encrypted password 240 is processed with the key 242 according to the third algorithm to generate a password string 248. The password string 248 is further processed by a fourth algorithm to produce the final password 244. Similarly, the fourth algorithm is paired with the first algorithm. In one embodiment of the invention, these identity information and encryption/decryption algorithms are hold only by the processing unit 110 that processes the data file 130. In this case, no other processing unit or device can unlock the data file 130 since identity information of other unit/device would not match to the first identification data 114 of the first processing unit 110. If the decrypted password 244 matches the password 144 of FIG. 3, the data file 130 can be successfully unlocked. If not, that means the device attempting to access the data file 130 is not the electronic device 100, therefore the data file 130 would remain locked. For example, the electronic device 100 is a phone, the processing unit 110 is an application processor, and the storage unit 120 is a SD card. Data file 130 that is locked by the password 144 generated by the application processor and stored in the SD card cannot be accessed by other phones. As a result, even the SD card is lost, the owner of the phone needs not worry the data file would be accessed by others since it can only be unlocked by the original phone.

FIG. 7 illustrates a diagram of a method for secure data access according to another embodiment of the invention. In step S710, a processing unit receives a request for accessing a secured data file stored in a storage unit . The secured data file is secured by a password that is also secured by encryption. To unlock the secured data file, step S720 retrieves unique information corresponding to the processing unit and the storage unit respectively. The unique information may be identification data, such as device serial number, IMEI number, MAC address, and/or other suitable information. Then a decryption key is generated according to the unique information in step S730. The decryption key may be generated by processing the identification data by a predetermined algorithm. In one embodiment of the invention, the decryption key maybe generated by the process of FIG. 2. In step S740, the secured data file is unlocked according to the decryption key. In one embodiment of the invention, the encrypted password can be decrypted by the process of FIG. 6, and the decrypted password 244 could be used to unlock the secured data file. Then it maybe determined whether to permit access to the secured data file according to the unlock result in step S750. In response to the unlocking failure, the secured data file would remain locked from access.

In contrast to the prior art, the present invention provides a method for protecting a password. The password is randomly generated and further hidden in the encrypted random data string, such that the password cannot be easily hacked. Moreover, the password can be automatically obtained only when the storage unit is connected to the original electronic device, and the secured data file, i.e. the locked data file, will not be accessed when the storage unit is connected to other electronic devices.

Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims. 

What is claimed is:
 1. A method for secure data access among two devices, comprising: retrieving unique information corresponding to a first electronic device and a storage device; generating an encryption key according to the unique information; generating a password for securing a data file; encrypting the password string with the encryption key; and locking and storing the data file together with the encrypted password string in the storage device.
 2. The method of claim 1, further comprising performing the steps of retrieving, generating and encrypting within the first electronic device.
 3. The method of claim 1, further comprising: unlocking the data file secured with the password in response to a request for accessing the data file by a requesting device.
 4. The method of claim 3, wherein the unlocking further comprises: generating a decryption key according to the unique information corresponding to a requesting device and the storage device; decrypting the encrypted password string to obtain a decrypted password by the decryption key; and unlocking the data file by verifying the decrypted password.
 5. The method of claim 1, wherein the step of encrypting the password string further comprises: randomly generating a data string; and scattering the password and the data string into the password string according to a predetermined algorithm.
 6. The method of claim 1, further comprising: compressing the data file with at least partial bits of the password string.
 7. A data security system, comprising: a processing unit, configured to process a data file, the processing unit comprising: a key generator, configured to generate an encryption key according to unique information corresponding to the storage device and the processing unit; a password generator, configured to generate an encrypted password string according to the encryption key; and a storage unit, configured to store the data file and the encrypted password string.
 8. The data security system of claim 7, wherein the password generator is further configured to generate a password string and encrypt the password string with the encryption key to generate the encrypted password string.
 9. The data security system of claim 8, wherein the password string is generated from a password and a data string according to a predefine algorithm.
 10. The data security system of claim 9, wherein the password and the data string are generated in random, and the predefined algorithm is a scatter algorithm.
 11. The data security system of claim 7, wherein the processing unit is a mobile device, and the storage unit is one of the following: internal storage of the mobile device, external storage device connected to the mobile device, SD memory card, micro SD memory card; and wherein the unique information is selected from one of the following: ID number, serial number, IMEI number, MAC address.
 12. The data security system of claim 7, wherein the key generator and the password generator are executed in a secure domain within the processing unit.
 13. The data security system of claim 7, wherein the processing unit is further configured to compress the data file prior to storing in the storage unit.
 14. The data security system of claim 7, wherein the processing unit further comprises a data access interface unit configured to receive a request for accessing the data file.
 15. The data security system of claim 14, wherein the processing unit is further configured to decrypt the encrypted password string according to the unique information corresponding to the storage device and the processing unit.
 16. A method for secure data access, comprising: receiving a request, by a processing unit, for accessing a secured data file stored in a storage unit; retrieving unique information corresponding to the processing unit and the storage unit respectively; generating a decryption key according to the unique information; unlocking the secured data file according to the decryption key; and permitting access to the secured data file according to the unlock result.
 17. The method of claim 16, wherein the step of unlocking the secured data file further comprises decompressing the secured data file.
 18. The method of claim 16, wherein the step of unlocking the secured data file further comprises: decrypting a password string stored together with the secured data file by the decryption key; and generating a password from the decrypted password string according to a predetermined algorithm; verifying the password for access the secured data file.
 19. The method of claim 18, wherein in response to the password being verified as successful, permitting the processing unit to access the secured data file.
 20. The method of claim 16, wherein in response to the password being verified as failed, locking the secured data file from accessing. 