WO2006065029A1 - Security service method of data - Google Patents

Security service method of data Download PDF

Info

Publication number
WO2006065029A1
WO2006065029A1 PCT/KR2005/004110 KR2005004110W WO2006065029A1 WO 2006065029 A1 WO2006065029 A1 WO 2006065029A1 KR 2005004110 W KR2005004110 W KR 2005004110W WO 2006065029 A1 WO2006065029 A1 WO 2006065029A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
data
access
report
management object
Prior art date
Application number
PCT/KR2005/004110
Other languages
French (fr)
Inventor
Du-Jin Hwang
Original Assignee
Onsoftel. Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Onsoftel. Co., Ltd. filed Critical Onsoftel. Co., Ltd.
Publication of WO2006065029A1 publication Critical patent/WO2006065029A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Definitions

  • the present invention relates to a security service method of a data, and in particular to a security service method of a data implemented through an event alarm in which when a certain access is attempted to a file, a folder or a drive including a specific data (security data) set by a security manager, the access is reported to the security manager, so that an authentication is performed with respect to the access in real time.
  • a security service is referred to a service for guaranteeing a stable security of a data stored in a computer with respect to a non-authenticated access by others.
  • the security service is basically designed to check whether a data stored in a computer is illegally used or damaged and to prevent a computer access from a non-authenticated user.
  • a security service method of a data comprising a report means setting step in which a security data of a corresponding management object computer set by a security manager is stored together with a report means data; an access detection step in which the security server detects whether an access is attempted to a security data stored in each management object computer; a report step in which when the access is detected, the security server reports the security data access to the security manager terminal using the report means data; and a measurement step in which when an accident occurrence report with respect to the security data access is received from the security manager terminal, the access of a corresponding management object computer is processed.
  • the security service method of a data according to the present invention has the following effects.
  • the access with respect to a certain data is reported to a security manager through a short message service, an e-mail service, a messenger, a telephone call, etc.
  • Figure 1 is a view illustrating the construction of a system for implementing a security service method of a data according to an embodiment of the present invention
  • Figure 2 is a schematic flow chart of a security service method of a data according to an embodiment of the present invention.
  • Figure 3 is a detailed flow chart of a report means setting step of Figure 2;
  • Figure 4 is a detailed flow chart of a report and authentication step of Figure 2;
  • Figure 5 is a detailed flow chart of a measurement step of Figure 2.
  • Figures 6 and 7 are screen example views of the steps of Figure 3.
  • the security service method of a data comprises a report means setting step in which a security data of a corresponding management object computer set by a security manager is stored together with a report means data; an access detection step in which the security server detects whether an access is attempted to a security data stored in each management object computer; a report step in which when the access is detected, the security server reports the security data access to the security manager terminal using the report means data; and a measurement step in which when an accident occurrence report with respect to the security data access is received from the security manager terminal, the access of a corresponding management object computer is processed.
  • Figure 1 is a view illustrating the construction of a system for implementing a security service method of a data according to an embodiment of the present invention.
  • the system according to the present invention includes a security manager terminal 10, a security server 30, networks 20, 22 and 24 for connecting the security server and the security manager terminal, a management object computer 50, an external computer 60, and various servers 32, 34, 36 and 38 for reporting an access to a security data to the security manager.
  • the security manager terminal 10 receives a report of a security data access from the security server 30 and transmits an accident occurrence report with respect to the access to the security data to the security server 30.
  • the security manager terminal 10 may be a common telephone set 12 which receives a security data access report from the security server 30 through a public telephone network 24, a cellular phone 14 and a PDA (personal data adaptor) (wireless terminal) 16 which receive a security data access report from the security server through a mobile communication network 20, and a computer 18 which receives a security data access report from the security server through an internet network 22.
  • a public telephone network 24
  • a cellular phone 14 and a PDA (personal data adaptor) (wireless terminal) 16
  • PDA personal data adaptor
  • wireless terminal wireless terminal
  • the external terminal 60 may be a computer which may access a management object computer 50 through the internet network 22 as a terminal of a person who accesses the management object computer 50 storing a security data.
  • the security server 30 is provided with a database 30a formed of a security manager data, a report means data and a security data which needs a security.
  • the security server 30 may be a separate server which has a security service function according to a preferred embodiment of the present invention or may be a server configured by providing a commercial server with the security service function according to an embodiment of the present invention, with the commercial server being conventionally provided at an internet portal site, a bank, a company, an internet game company, etc. which are connected through the internet.
  • the mail server 32 is a server operating together with the security server 30 for transmitting an access message with respect to the security data created by the security server 30 to an e-mail address of the security manager through the internet network 22.
  • the short message service server 38 is a server operating together with the security server 30 for transmitting a short message service on an access with respect to the security data created by the security server to a telephone number of the security manager through the mobile communication network 20.
  • the ARS server 36 is a server operating together with the security server 30 for reporting an access voice message with respect to the security data created by the security server 30 to a telephone number of the security manager through the public telephone network 24 or the mobile communication network 20 based on a telephone call voice.
  • the messenger server 34 is a server operating together with the security server 30 for transmitting an access message with respect to the security data created by the security server 30 to an internet protocol (IP) connected with a messenger e-mail address of the security manager through the internet network 22.
  • IP internet protocol
  • the security manager data stored in the database 30a may be formed of a security manager name, a security manager working department, a telephone number and an internet protocol.
  • the report means data may be formed of at least one among a cellular phone number, a telephone number of a PDA, an e-mail address used for a messenger, an e-mail address, and a telephone number of a common telephone.
  • the security data may be formed of an IP of a management object computer, a file, a folder or a disk drive which stores a security data, an encoded password, and an IP which may access the management object computer.
  • a report means for reporting an access of the security data such as a wireless terminal of a cellular phone, a PDA, etc., an e-mail, a messenger, a voice telephone, etc.
  • a data with respect to each report means for example a telephone number such as 010-111-1111 in the case of a wireless terminal, an e-mail address such as xxxxxx@hotmail.com used for a messenger in the case of the messenger, an e-mail address such as xxxxxx@onsoftel.com in the case of the e-mail, and a telephone number of a common telephone or a cellular phone may be further set.
  • the management object computer 50 may be the computer connected through the network such as Ethernet in a certain region and may be the objects of the security management managed by the security server 30.
  • the management object computers 50 have their inherent IPs.
  • Figure 2 is a schematic flow chart of a security service method according to an embodiment of the present invention.
  • the security service method includes a report means setting step SlOO, an access detection step S200, a report and authentication step S300, and a measurement step S400.
  • a security data of a corresponding object computer (for example, 50a) set by a security manager is stored in the database 30a of the security server 30 together with the report means data.
  • the security manager accesses the management object computer 50a, registers a security manager data, sets a data related with a security service transmission of the security data such as a report means data, and a security data according to an embodiment of the present invention, transmits the data related thereto to the security server 30 and stores in the database 30a.
  • Figure 3 is a detailed flow chart of a report means setting step of Figure 2.
  • the security manager accesses a corresponding management object computer 50a and sets a report means using a key pad based on a security manager interface provided in the security server or a security manager interface provided with a built-in application program.
  • a folder, a file or a corresponding disk drive which stores a specific data which needs a security is selected on the initial screen of the security manager interface, and an encryption is performed by inputting the password so that an authentication can be performed when a certain access is attempted to the selected folder, file or disk drive in a step SI lO.
  • OS so that it is possible to freely select a folder, a file or a disk drive.
  • connection or disconnection to/from the management object computer 50a may be selected with respect to each security manager.
  • the data of the security manager may be formed of a name of a security manager, a security manager working department and telephone number, and a security manager computer IP.
  • a telephone number may be used in the case that the security manager terminal 10 is the wireless terminal 14, 16, and an e-mail address may be used in the case that it is the messenger, and the telephone number of the common telephone 12 or the cellular phone 14 may be used in the case that it is an e-mail address and a voice telephone.
  • step S200 it is judged whether the security server 30 detects the access to the folder, the file or the disk drive which stores the security data of each management object computer 50 or not after the report means setting data are stored in the database 30a of the security server 30.
  • the security server 30 does not allow the above access for thereby previously preventing the access to the security data.
  • the security server 30 In the case that the security server 30 is disconnected from the management object computer 50, when the management object computer 50 is accessed, the authentication is not performed in the security server for thereby preventing the access, so that it is impossible to access a corresponding folder or file. [72] In the report and authentication step S300, when an access to the security data is detected, the security server 30 reports the above access to the security manager and asks the access to input a password, so that the inputted password is compared with the password stored in the database.
  • Figure 4 is a detailed flow chart of the report and authentication step of Figure 2.
  • the report and authentication step S300 is formed of a report step and an authentication step.
  • the report step may be formed of a report means determination step
  • the authentication step may be formed of a password input step S352, and a password judgment step S354.
  • the report means determination step S312 determines a report means with respect to the access to the security data with reference to the database 30a in the security server 30. [77] In the case that the report means are set in multiple numbers in the report means setting step SlOO, multiple report means are determined. [78] In the preferred embodiments of the present invention, as the report means, it is assumed that one cellular phone 14 having a telephone number of 010-111-1111 is set. [79] In the message creation step S322, S332, S342, the message for reporting the access to the set security data is created.
  • the report means in the embodiment of the present invention is the cellular phone 14, it is preferred that the message for reporting the access of the security data is created in the form of the short message.
  • the report means is an e-mail
  • the message is created in the form of the e-mail
  • the security data is created in the form of the messenger message.
  • the created message is reported to the security manager through the report means determined in the report means determination step S312.
  • the report means is the cellular phone 14 having a telephone number of 101-111-1111, the short message is transmitted to the cellular phone 14 of 010-111-1111.
  • the short message may be transmitted to the security manager using the short message server 38 operating together with the security server 70 through the mobile communication network 20.
  • the report means id an e-mail
  • the e-mail may be transmitted to the security manager through the internet network 22 using the mail server 32 operating together with the security server 30.
  • the report means is a messenger
  • the messenger message may be transmitted to the security manager through the internet network 22 using the messenger server 34 operating together with the security server 30.
  • the report means is formed of a voice telephone
  • the report means is determined to be the voice telephone in the report means determination step S312
  • a voice message is created in the message creation step, and in the message creation step, a telephone call is made to the cellular phone 14 or the common telephone 12 using the
  • the ARS server 36 for thereby transmitting a voice message.
  • the voice message may be transmitted to the security manager through the public telephone network 24 and the mobile communication network 10 using the ARS server 36 operating together with the security server 30.
  • the password input step S352 of the authentication step the terminal of the accessing IP of the security data is asked to input the password in the security server
  • the password judgment step S354 it is judged whether the password transmitted from the security server 30 is matched with the password stored in the database 30a.
  • the measurement step S400 of Figure 2 it is judged whether the access to the security data is authenticated or not, and a certain measurement is performed as a result of the authentication.
  • Figure 5 is a detailed flow chart of the measurement step of Figure 2.
  • the measurement step S400 may be formed of a report measurement step and an authentication step.
  • the report measurement step includes an accident occurrence judgment step S412, an accident occurrence report step S414, and a computer end step
  • the authentication step includes an approval judgment step S422, an access permission step S424, and an access blockage step S426.
  • the accident occurrence judgment step S412 it is judged whether the security manager, who received the message from the security server 30, is attempting an access or not.
  • the access is judged to be a non- authenticated access, so that an accident occurrence report may be performed to the security server 30 using the security manager terminal 10 which received the message in a step S424.
  • the security server 30, which received the accident occurrence turns off by force the management object computer 50 to which a non- authenticated access is attempted in a step S426, so that the access except for the security manager is blocked.
  • the access to the security data is permitted, so that it is possible to open the security data in a step S424.
  • the access to the security data is blocked, so that it is impossible to open the security data in a step S426.
  • the measurement step S400 may further include a step for collecting and tracing the data of illegal users, and a step for reporting the illegal users to a government organ such as a cyber terror response center or requesting an investigation.
  • the access when an access is attempted to a certain data set by a security manager, the access is reported to the security manager, so that the access is judged to be authenticated or not in real time.
  • the access with respect to a certain data is reported to a security manager through a short message service, an e-mail service, a messenger, a telephone call, etc.
  • a corresponding computer having the data is turned off by force for thereby stably protecting the data.
  • a connection of a security service connected through a computer network is disconnected, when an authentication is not obtained from a security server, an access to a specific data is substantially blocked.
  • security manager terminal common telephone, cellular phone, PDA, computer, mobile communication network, internet network, public telephone network

Abstract

A security service method of a data is disclosed, which method comprises a report means setting step in which a security data of a corresponding management object computer set by a security manager is stored together with a report means data; an access detection step in which the security server detects whether an access is attempted to a security data stored in each management object computer; a report step in which when the access is detected, the security server reports the security data access to the security manager terminal using the report means data; and a measurement step in which when an accident occurrence report with respect to the security data access is received from the security manager terminal, the access of a corresponding management object computer is processed.

Description

Description SECURITY SERVICE METHOD OF DATA
Technical Field
[1] The present invention relates to a security service method of a data, and in particular to a security service method of a data implemented through an event alarm in which when a certain access is attempted to a file, a folder or a drive including a specific data (security data) set by a security manager, the access is reported to the security manager, so that an authentication is performed with respect to the access in real time.
[2]
Background Art
[3] Generally, a security service is referred to a service for guaranteeing a stable security of a data stored in a computer with respect to a non-authenticated access by others. The security service is basically designed to check whether a data stored in a computer is illegally used or damaged and to prevent a computer access from a non- authenticated user.
[4] As an internet and a wired or wireless communication device, which connect computers, develops, various services such as a data search service, a data exchange service, an electronic commerce service, etc. haven been conveniently used in life.
[5] With the above trends, illegal behaviors may increase for thereby damaging the data stored in computers and worsening the stable services provided on the internet by hackings, computer viruses, etc. So, various technologies for preventing the above security accidents are urgently needed.
[6] However, only after a certain data, which needs a security, is hacked by other's illegal behaviors or a user's carelessness, the accidents are reported to the security manager, so that the damages of the stored data increase.
[7]
Disclosure of Invention
Technical Problem
[8] Accordingly, it is an object of the present invention to provide a security service method of a data which overcomes the problems encountered in the conventional art. In addition, when a certain access is attempted to a file, a folder or a disk drive including a specific data (security data) set by a security manager, the access is reported to the security manager, so that the access is authenticated or not in real time.
[9] It is another object of the present invention to provide a security service method of a data in which an access to a security data is reported to a security manager through a short message service, an e-mail service, a messenger, a telephone voice, etc.
[10] It is further another object of the present invention to provide a security service method of a data in which when it is judged that an access to a security data by others is non- authenticated, a corresponding computer having the security data is turned off by force.
[11] It is still further another object of the present invention to provide a security service method of a data in which when a security server connected with a management object computer through a network is disconnected, an access with respect to a security data is basically blocked as an authentication is not performed from the security server.
[12] The objects and advantages of the present invention will be described in the followings and will be well understood by the embodiments of the present invention. It is obvious that the objects and advantages of the present invention may be implemented by means of the cited claims and combinations of the same.
[13]
Technical Solution
[14] To achieve the above objects, in a system formed of a security manager terminal, a plurality of management object computers, and a security server, there is provided a security service method of a data, comprising a report means setting step in which a security data of a corresponding management object computer set by a security manager is stored together with a report means data; an access detection step in which the security server detects whether an access is attempted to a security data stored in each management object computer; a report step in which when the access is detected, the security server reports the security data access to the security manager terminal using the report means data; and a measurement step in which when an accident occurrence report with respect to the security data access is received from the security manager terminal, the access of a corresponding management object computer is processed.
[15]
Advantageous Effects
[16] The security service method of a data according to the present invention has the following effects.
[17] First, when an access is attempted to a certain data set by a security manager, the access is reported to the security manager, so that the access is judged to be authenticated or not in real time.
[18] Second, the access with respect to a certain data is reported to a security manager through a short message service, an e-mail service, a messenger, a telephone call, etc.
[19] Third, when it is judged that others attempt to access a certain data, a cor- responding computer having the data is turned off by force for thereby stably protecting the data.
[20] Fourth, as a connection of a security service connected through a computer network is disconnected, when an authentication is not obtained from a security server, an access to a specific data is substantially blocked.
[21]
Brief Description of the Drawings
[22] Figure 1 is a view illustrating the construction of a system for implementing a security service method of a data according to an embodiment of the present invention;
[23] Figure 2 is a schematic flow chart of a security service method of a data according to an embodiment of the present invention;
[24] Figure 3 is a detailed flow chart of a report means setting step of Figure 2;
[25] Figure 4 is a detailed flow chart of a report and authentication step of Figure 2;
[26] Figure 5 is a detailed flow chart of a measurement step of Figure 2; and
[27] Figures 6 and 7 are screen example views of the steps of Figure 3.
[28]
Best Mode for Carrying Out the Invention
[29] In a system formed of a security manager terminal, a plurality of management object computers, and a security server, the security service method of a data according to the present invention comprises a report means setting step in which a security data of a corresponding management object computer set by a security manager is stored together with a report means data; an access detection step in which the security server detects whether an access is attempted to a security data stored in each management object computer; a report step in which when the access is detected, the security server reports the security data access to the security manager terminal using the report means data; and a measurement step in which when an accident occurrence report with respect to the security data access is received from the security manager terminal, the access of a corresponding management object computer is processed.
[30] The preferred embodiments of the present invention will be described with reference to the accompanying drawings.
[31] The terminologies and words used throughout the specification and claims are not limited to their dictionary interpretations, but are interpreted based on technical meanings and concepts of the present invention in principle that the inventor of the present invention can properly define the concepts of the terminologies in the most preferred methods.
[32] Therefore, the embodiments described throughout the specification and constructions of the drawings of the present invention are provided only for illustrative purposes of the invention. Namely, they don't comprehensively represent the technical concepts of the present invention, so that it should be understood that various equivalents and modifications may be provided at the time when the present invention is made.
[33] Figure 1 is a view illustrating the construction of a system for implementing a security service method of a data according to an embodiment of the present invention.
[34] As shown therein, the system according to the present invention includes a security manager terminal 10, a security server 30, networks 20, 22 and 24 for connecting the security server and the security manager terminal, a management object computer 50, an external computer 60, and various servers 32, 34, 36 and 38 for reporting an access to a security data to the security manager.
[35] When a certain access to the data (security data) set by a security manager is attempted, the security manager terminal 10 receives a report of a security data access from the security server 30 and transmits an accident occurrence report with respect to the access to the security data to the security server 30.
[36] Here, the security manager terminal 10 may be a common telephone set 12 which receives a security data access report from the security server 30 through a public telephone network 24, a cellular phone 14 and a PDA (personal data adaptor) (wireless terminal) 16 which receive a security data access report from the security server through a mobile communication network 20, and a computer 18 which receives a security data access report from the security server through an internet network 22.
[37] The external terminal 60 may be a computer which may access a management object computer 50 through the internet network 22 as a terminal of a person who accesses the management object computer 50 storing a security data.
[38] The security server 30 is provided with a database 30a formed of a security manager data, a report means data and a security data which needs a security.
[39] When an access to a security data set by a security manager is detected, the access is reported to the security manager through the internet network 22, the mobile communication network 20 or the public telephone network 24. When an accident occurrence report is received from the security manager, a corresponding object computer 50, which received the accident occurrence report, is turned off by force in an accident process step.
[40] When an access to a security data set by a security manager is detected, an input of a password (authentication code) authenticated for an access is asked. If the inputted password is not matched with the security data stored in the database 30a, the access to the security data is not allowed.
[41] The security server 30 may be a separate server which has a security service function according to a preferred embodiment of the present invention or may be a server configured by providing a commercial server with the security service function according to an embodiment of the present invention, with the commercial server being conventionally provided at an internet portal site, a bank, a company, an internet game company, etc. which are connected through the internet.
[42] The mail server 32 is a server operating together with the security server 30 for transmitting an access message with respect to the security data created by the security server 30 to an e-mail address of the security manager through the internet network 22.
[43] The short message service server 38 is a server operating together with the security server 30 for transmitting a short message service on an access with respect to the security data created by the security server to a telephone number of the security manager through the mobile communication network 20.
[44] The ARS server 36 is a server operating together with the security server 30 for reporting an access voice message with respect to the security data created by the security server 30 to a telephone number of the security manager through the public telephone network 24 or the mobile communication network 20 based on a telephone call voice.
[45] The messenger server 34 is a server operating together with the security server 30 for transmitting an access message with respect to the security data created by the security server 30 to an internet protocol (IP) connected with a messenger e-mail address of the security manager through the internet network 22.
[46] Here, the security manager data stored in the database 30a may be formed of a security manager name, a security manager working department, a telephone number and an internet protocol. The report means data may be formed of at least one among a cellular phone number, a telephone number of a PDA, an e-mail address used for a messenger, an e-mail address, and a telephone number of a common telephone. The security data may be formed of an IP of a management object computer, a file, a folder or a disk drive which stores a security data, an encoded password, and an IP which may access the management object computer.
[47] The following table 1 shows the report means data.
[48]
[49] Table 1
Figure imgf000007_0001
Figure imgf000008_0001
[50]
[51] In the report means data, a report means for reporting an access of the security data such as a wireless terminal of a cellular phone, a PDA, etc., an e-mail, a messenger, a voice telephone, etc. is set. A data with respect to each report means for example a telephone number such as 010-111-1111 in the case of a wireless terminal, an e-mail address such as xxxxxx@hotmail.com used for a messenger in the case of the messenger, an e-mail address such as xxxxxx@onsoftel.com in the case of the e-mail, and a telephone number of a common telephone or a cellular phone may be further set.
[52] The management object computer 50 may be the computer connected through the network such as Ethernet in a certain region and may be the objects of the security management managed by the security server 30. The management object computers 50 have their inherent IPs.
[53] Figure 2 is a schematic flow chart of a security service method according to an embodiment of the present invention.
[54] As shown therein, the security service method according to the present invention includes a report means setting step SlOO, an access detection step S200, a report and authentication step S300, and a measurement step S400.
[55] In the report means setting step SlOO, a security data of a corresponding object computer (for example, 50a) set by a security manager is stored in the database 30a of the security server 30 together with the report means data.
[56] The security manager accesses the management object computer 50a, registers a security manager data, sets a data related with a security service transmission of the security data such as a report means data, and a security data according to an embodiment of the present invention, transmits the data related thereto to the security server 30 and stores in the database 30a.
[57] The report means setting step set by the security manager in the security service method of a security data according to the present invention will be described in more detail.
[58] Figure 3 is a detailed flow chart of a report means setting step of Figure 2.
[59] As shown therein, the security manager accesses a corresponding management object computer 50a and sets a report means using a key pad based on a security manager interface provided in the security server or a security manager interface provided with a built-in application program.
[60] First, a folder, a file or a corresponding disk drive which stores a specific data which needs a security is selected on the initial screen of the security manager interface, and an encryption is performed by inputting the password so that an authentication can be performed when a certain access is attempted to the selected folder, file or disk drive in a step SI lO.
[61] Here, a security solution program is fabricated like a windows operating system
(OS), so that it is possible to freely select a folder, a file or a disk drive.
[62] Next, the IP of the management object computer 50a having the selected folder, file or disk drive is inputted, and the number of the security managers of a corresponding management object computer 50b is set, and the name and IP of each security manager are inputted in a step S 120 as shown in Figure 6.
[63] Multiple security managers may be selected by one management object computer
50a, and the connection or disconnection to/from the management object computer 50a may be selected with respect to each security manager.
[64] The data and report means with respect to the following each security manager are determined in a step S 130 as shown in Figure 7.
[65] Here, the data of the security manager may be formed of a name of a security manager, a security manager working department and telephone number, and a security manager computer IP.
[66] As a report means, a telephone number may be used in the case that the security manager terminal 10 is the wireless terminal 14, 16, and an e-mail address may be used in the case that it is the messenger, and the telephone number of the common telephone 12 or the cellular phone 14 may be used in the case that it is an e-mail address and a voice telephone.
[67] The data created by the management object computer 50a through the above steps are transmitted to the security server 30 connected through the network, and the security server 30 stores the report means setting data in the database 30a managed by the security server 30 in a step S 140.
[68] The report means with respect to the security data access is set through the above steps with respect to the remaining management object computers 50b, ..., 50n.
[69] As shown in Figure 2, in the access detections step S200, it is judged whether the security server 30 detects the access to the folder, the file or the disk drive which stores the security data of each management object computer 50 or not after the report means setting data are stored in the database 30a of the security server 30.
[70] When an IP, which does not have an authentication, attempts an access to the management object computer 50, the security server 30 does not allow the above access for thereby previously preventing the access to the security data.
[71] In the case that the security server 30 is disconnected from the management object computer 50, when the management object computer 50 is accessed, the authentication is not performed in the security server for thereby preventing the access, so that it is impossible to access a corresponding folder or file. [72] In the report and authentication step S300, when an access to the security data is detected, the security server 30 reports the above access to the security manager and asks the access to input a password, so that the inputted password is compared with the password stored in the database.
[73] Figure 4 is a detailed flow chart of the report and authentication step of Figure 2.
[74] Here, the report and authentication step S300 is formed of a report step and an authentication step. The report step may be formed of a report means determination step
S312, a message creation step S322, S332, S342, and a message transmission step
S324, S334, S344. [75] The authentication step may be formed of a password input step S352, and a password judgment step S354. [76] The report means determination step S312 determines a report means with respect to the access to the security data with reference to the database 30a in the security server 30. [77] In the case that the report means are set in multiple numbers in the report means setting step SlOO, multiple report means are determined. [78] In the preferred embodiments of the present invention, as the report means, it is assumed that one cellular phone 14 having a telephone number of 010-111-1111 is set. [79] In the message creation step S322, S332, S342, the message for reporting the access to the set security data is created. [80] Since the report means in the embodiment of the present invention is the cellular phone 14, it is preferred that the message for reporting the access of the security data is created in the form of the short message. [81] In the case that the report means is an e-mail, the message is created in the form of the e-mail, and in the case that the report means is the messenger, the security data is created in the form of the messenger message. [82] In the message transmission step S423, S334, S344, the created message is reported to the security manager through the report means determined in the report means determination step S312. [83] In the preferred embodiment of the present invention, since the report means is the cellular phone 14 having a telephone number of 101-111-1111, the short message is transmitted to the cellular phone 14 of 010-111-1111. [84] The short message may be transmitted to the security manager using the short message server 38 operating together with the security server 70 through the mobile communication network 20. [85] In the case that the report means id an e-mail, the e-mail may be transmitted to the security manager through the internet network 22 using the mail server 32 operating together with the security server 30. [86] In the case that the report means is a messenger, the messenger message may be transmitted to the security manager through the internet network 22 using the messenger server 34 operating together with the security server 30. [87] As the report means is formed of a voice telephone, when the report means is determined to be the voice telephone in the report means determination step S312, a voice message is created in the message creation step, and in the message creation step, a telephone call is made to the cellular phone 14 or the common telephone 12 using the
ARS server 36 for thereby transmitting a voice message. [88] Namely, in the case that the report means is a voice telephone, the voice message may be transmitted to the security manager through the public telephone network 24 and the mobile communication network 10 using the ARS server 36 operating together with the security server 30. [89] Here, in the password input step S352 of the authentication step, the terminal of the accessing IP of the security data is asked to input the password in the security server
30, and the password is inputted. [90] In the password judgment step S354, it is judged whether the password transmitted from the security server 30 is matched with the password stored in the database 30a. [91] In the measurement step S400 of Figure 2, it is judged whether the access to the security data is authenticated or not, and a certain measurement is performed as a result of the authentication.
[92] Figure 5 is a detailed flow chart of the measurement step of Figure 2.
[93] Here, the measurement step S400 may be formed of a report measurement step and an authentication step. The report measurement step includes an accident occurrence judgment step S412, an accident occurrence report step S414, and a computer end step
S416. [94] The authentication step includes an approval judgment step S422, an access permission step S424, and an access blockage step S426. [95] In the accident occurrence judgment step S412, it is judged whether the security manager, who received the message from the security server 30, is attempting an access or not. [96] If the security manager is not attempting the access, the access is judged to be a non- authenticated access, so that an accident occurrence report may be performed to the security server 30 using the security manager terminal 10 which received the message in a step S424. [97] The security server 30, which received the accident occurrence, turns off by force the management object computer 50 to which a non- authenticated access is attempted in a step S426, so that the access except for the security manager is blocked. [98] In the authentication judgment step S422 in the authentication measurement step, when the inputted password is matched with the stored password as a result of the judgment in the password judgment step S354, the access is permitted. If the inputted password is not matched with the stored password, the access is not permitted.
[99] If the authentication is performed, the access to the security data is permitted, so that it is possible to open the security data in a step S424. In the case that the authentication is not allowed, the access to the security data is blocked, so that it is impossible to open the security data in a step S426.
[100] The measurement step S400 may further include a step for collecting and tracing the data of illegal users, and a step for reporting the illegal users to a government organ such as a cyber terror response center or requesting an investigation.
[101]
Industrial Applicability
[102] As described above, in the present invention, when an access is attempted to a certain data set by a security manager, the access is reported to the security manager, so that the access is judged to be authenticated or not in real time. In addition, the access with respect to a certain data is reported to a security manager through a short message service, an e-mail service, a messenger, a telephone call, etc. When it is judged that others attempt to access a certain data, a corresponding computer having the data is turned off by force for thereby stably protecting the data. Furthermore, as a connection of a security service connected through a computer network is disconnected, when an authentication is not obtained from a security server, an access to a specific data is substantially blocked.
[103]
Sequence Listing
[104] security manager terminal, common telephone, cellular phone, PDA, computer, mobile communication network, internet network, public telephone network
[105]
[106]

Claims

Claims
[1] In a system formed of a security manager terminal, a plurality of management object computers, and a security server, a security service method of a data, comprising: a report means setting step in which a security data of a corresponding management object computer set by a security manager is stored together with a report means data; an access detection step in which the security server detects whether an access is attempted to a security data stored in each management object computer; a report step in which when the access is detected, the security server reports the security data access to the security manager terminal using the report means data; and a measurement step in which when an accident occurrence report with respect to the security data access is received from the security manager terminal, the access of a corresponding management object computer is processed.
[2] The method of claim 1, wherein said report means setting step includes a step in which a password is inputted and is encrypted so that a security data is selected, and an authentication is performed with respect to the security data selected, a step in which the IP (Internet Protocol) of the management object computer having the security data and a security manager of the management object computer are set, a step in which the data with respect to the security manager and the report means with respect to the security manager are set, and a step in which the data created by performing the above steps are stored in the security server.
[3] The method of claim 1, wherein a plurality of security managers are set in one management object computer, and a connection or disconnection to/from the management object computer with respect to each security manager is set.
[4] The method of claim 1, wherein when the security data is selected, at least one among a file, a folder and a disk drive, which store the security data, is selected.
[5] The method of either claim 1 or claim 2, wherein said report means is set as at least one among a wireless terminal, an e-mail, a messenger and a voice telephone and includes a data with respect to the set report means.
[6] The method of claim 1, wherein in said access detection step, the access to the security data is made to at least one among a file, a folder and a disk driver which store the security data.
[7] The method of claim 1, wherein in said access detection step, when a non- authenticated IP (Internet Protocol) accesses a corresponding management object computer, the security server disconnects the access.
[8] The method of claim 1, wherein said report step includes a report means determination step in which the security server determines a report means with respect to an access to a security data with reference to the report means data, a message creation step in which a message with respect to the access to the security data is created, and a message transmission step in which the created message is reported to the security manager through the report means determined in the report means determination step.
[9] The method of claim 1, wherein said report step includes an authentication step in which the security server asks an input of the password to the terminal of the internet protocol (IP) which accesses the security data, and it is compared whether the inputted password is matched with the password of the stored security data or not.
[10] The method of claim 9, wherein said measurement step includes a step in which when the inputted password is matched with the stored password, the access is permitted, and when the inputted password is not matched with the stored password, the access is not permitted, and a step in which when the access is not authenticated, the access to the security data is blocked.
[11] The method of claim 1, wherein said measurement step includes a step in which the security manager who received a message from the security server judges whether the access to the security data is authenticated or not, a step in which when the access to the security data is not authenticated, an accident occurrence is reported to the security server using the security manager terminal, and a step in which the security server turns off by force the management object computer to which a non- authenticated access is attempted to the security data.
[12] The method of claim 1, wherein in the case that a network connection between the security server and the management object computer is disconnected, when a certain access is attempted to the security data of the management object computer, an authentication is not performed in the security server, so that the access is basically blocked.
PCT/KR2005/004110 2004-12-14 2005-12-03 Security service method of data WO2006065029A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020040105688A KR100708453B1 (en) 2004-12-14 2004-12-14 security service method of data
KR10-2004-0105688 2004-12-14

Publications (1)

Publication Number Publication Date
WO2006065029A1 true WO2006065029A1 (en) 2006-06-22

Family

ID=36588053

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2005/004110 WO2006065029A1 (en) 2004-12-14 2005-12-03 Security service method of data

Country Status (2)

Country Link
KR (1) KR100708453B1 (en)
WO (1) WO2006065029A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100981301B1 (en) * 2007-12-18 2010-09-10 한국전자통신연구원 Method and Apparatus Useful for Preventing Sensitive Information from Flowing Out in Personal Computer
KR100985857B1 (en) 2007-12-24 2010-10-08 한국전자통신연구원 Device and method for detecting and preventing sensitive information leakage in portable terminal
KR101482903B1 (en) * 2014-02-06 2015-01-15 (주)누스코 Method for preventing data loss, server apparatus, client apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers
EP0999490A2 (en) * 1998-11-05 2000-05-10 Fujitsu Limited Security monitoring apparatus based on access log and method thereof
US20030061166A1 (en) * 2001-09-26 2003-03-27 Masahiro Saito Security management apparatus, security management method, and security management program
JP2003242109A (en) * 2002-02-15 2003-08-29 Nippon Telegr & Teleph Corp <Ntt> Certification access control server device, gateway device, certification access control method, gateway control method, certification access control program and recording medium with the program recorded thereon, and gateway control program and recording medium with the program recorded thereon

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100320119B1 (en) * 1999-09-30 2002-01-10 김형태 System and method for monitoring fraudulent use of id and media for storing program source thereof
KR100286904B1 (en) * 1999-10-20 2001-04-16 남궁종 System and method for security management on distributed PC
KR20010078840A (en) * 2001-04-17 2001-08-22 유성경 Security System detecting the leak of information using computer storage device
JP2003030008A (en) 2001-07-13 2003-01-31 Net Seeds Corp Network security system
KR20030043900A (en) * 2003-05-16 2003-06-02 정구집 A method detecting illegal accesses by access information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers
EP0999490A2 (en) * 1998-11-05 2000-05-10 Fujitsu Limited Security monitoring apparatus based on access log and method thereof
US20030061166A1 (en) * 2001-09-26 2003-03-27 Masahiro Saito Security management apparatus, security management method, and security management program
JP2003242109A (en) * 2002-02-15 2003-08-29 Nippon Telegr & Teleph Corp <Ntt> Certification access control server device, gateway device, certification access control method, gateway control method, certification access control program and recording medium with the program recorded thereon, and gateway control program and recording medium with the program recorded thereon

Also Published As

Publication number Publication date
KR20060067179A (en) 2006-06-19
KR100708453B1 (en) 2007-04-18

Similar Documents

Publication Publication Date Title
KR20070036125A (en) Network security and fraud detection system and method
CN103516718A (en) Identity risk score generation and implementation
US9832184B2 (en) Controls and administration of privileged accounts system
CN101473331B (en) User authenticating method, user authenticating system, user authenticating device
TWI474668B (en) Method for distinguishing and blocking off network node
JP3902574B2 (en) Personal information management system, personal information management method and program thereof
WO2006120972A1 (en) Communication terminal, security device, and integrated circuit
CN102299910A (en) Anti-hacking system through telephone authentication
CN109981677A (en) A kind of credit management method and device
WO2006065029A1 (en) Security service method of data
KR20080085648A (en) Account fraud protection system having communication mechanism
CN106295423A (en) A kind of method for exhibiting data and client
EP1986151A1 (en) A data processing system, method and computer program product for providing a service to a service requester
Chen et al. Security and usability
Bhatt et al. Study of Indian Banks Websites for Cyber Crime Safety Mechanism
JP2012515977A (en) Cybercrime detection prevention method and system established by telephone number code, authorization code and source identification code
CN107426163A (en) A kind of method and device of encryption
KR100447806B1 (en) security service method with notifying event
CN107113308A (en) Method for authenticating and access device
CN101145916A (en) Network secure authentication system
Nair et al. Intrusion detection in Bluetooth enabled mobile phones
JP2001211479A (en) Data communication system
CN101753314A (en) Another circuit security system and method operated by adopting account in telephone limiting server
KR100639375B1 (en) Internet accounts access information informing system using mobile communication terminal and the method thereof
CN105897768A (en) Method and device for associating user and intelligent hardware and method and device for disassociating user and intelligent hardware

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS (EPO FORM 1205A DATED 03.09.2007)

122 Ep: pct application non-entry in european phase

Ref document number: 05821336

Country of ref document: EP

Kind code of ref document: A1