WO2009125933A2 - Method for managing e-mails and remote files in local and remote regions - Google Patents

Method for managing e-mails and remote files in local and remote regions Download PDF

Info

Publication number
WO2009125933A2
WO2009125933A2 PCT/KR2009/001527 KR2009001527W WO2009125933A2 WO 2009125933 A2 WO2009125933 A2 WO 2009125933A2 KR 2009001527 W KR2009001527 W KR 2009001527W WO 2009125933 A2 WO2009125933 A2 WO 2009125933A2
Authority
WO
WIPO (PCT)
Prior art keywords
mail
processing means
operation processing
file
delete
Prior art date
Application number
PCT/KR2009/001527
Other languages
French (fr)
Other versions
WO2009125933A3 (en
Inventor
Jin Guk Koo
Ik Ho Jeong
Seung Ho Lee
Original Assignee
Any Companion
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Any Companion filed Critical Any Companion
Publication of WO2009125933A2 publication Critical patent/WO2009125933A2/en
Publication of WO2009125933A3 publication Critical patent/WO2009125933A3/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/60Business processes related to postal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]

Definitions

  • the present invention relates to a method for managing e-mails and remote files in local and remote regions, and more particularly, to a method for managing and completely deleting an e-mail message, and software, a remote region server and storage medium for managing the same, i.e., a method for managing e-mails and remote files in local and remote regions, which searches and completely deletes the files managed in or deleted from the e-mail not to be recovered in order to secure the transmitted/received files managed in an e-mail system.
  • files or e-mails stored in a storage medium are deleted by a user, data may remain in an operating system for managing a recording medium or the recording medium itself, or exist in a state, which is impossible to be recovered. Accordingly, there is a possibility that personal information is disclosed in some cases.
  • data are stored in hard disk as values of file data and Meta data, i.e., header.
  • Meta data i.e., header.
  • the operating system executes a command such as “Delete” or “Format”, the operating system does not use a method of deleting an actual file data value but uses a method of deleting only a part of the header value such as location information and a creation time of the file data, i.e., a file name, a link and a file table.
  • These methods are used as a basis method for managing the file systems of the entire operating system.
  • the same method is also used in managing e-mails in an e-mail server or personal computer (PC).
  • Japanese Patent Laid-open No. 2004-126909 discloses a file management apparatus including a memory means for memorizing actual data of a data file and manage information showing a location where the actual data are stored, and a control means for deleting a data file after selecting whether management information is deleted after remaining actual data under a user’s direction or whether management information is deleted after overwriting data with a selected code.
  • Japanese Patent Laid-open No. 2008-003892 discloses a method for deleting a data file from a file system by deleting file management information of the data file to be deleted which includes the step of a) specifying a data file to be deleted; b) overwriting a random number with a plurality of selective locations of the data; c) overwriting file size information included in the file management information of the data file with 0 and varying the file size of the data file; and d) recording delete information on the file management information of the data file and deleting the data file from the file system.
  • the references 1 and 2 relate to the methods for completely deleting general files in order to raise security stability such that a file is not recovered after deletion.
  • Fig. 19 shows a format that general files are stored. As shown in Fig. 19, the files are stored in an independently dividable format. Accordingly, in order to delete the general files, it is required to simply select a file and completely delete the file according to the methods such as the references 1 and 2.
  • An e-mail storing method of Outlook Express which is a generally used e-mail program, is different from a general file storing method.
  • Fig. 20 shows a tree format of an e-mail box in Outlook Express and an actual format of stored files.
  • Outlook Express does not store files according to each e-mail, but adopts a method for storing the e-mail box including many e-mails in one file format of .dbx as shown in Fig. 21. That is, the e-mail box file is a file gathering individual files and this kind of files are e-mail management files.
  • Each e-mail may be stored in an individual file format of .eml.
  • the e-mails are stored basically in the format of .dbx, the user is required to perform a command of [Storing as another name] after selecting an e-mail to be manually stored in order to store an independent e-mail file.
  • a command of [Storing as another name] after selecting an e-mail to be manually stored in order to store an independent e-mail file.
  • an error may occur since there is no e-mail box file corresponding to the e-mail box to be linked on Outlook Express.
  • An object of the present invention is to provide a method for managing e-mails and remote files in local and remote regions which completely deletes e-mail management files of e-mail software used in an operating system in full operation or e-mail messages such as a management directory, attached files included in the e-mails, and contents related to a lot of personal information such as contact numbers and a schedule from a storage medium, e.g., a disc, without an additional process.
  • the present invention provides a method for managing e-mails and remote files in local and remote regions which are operated by an operation processing means including a personal computer (PC), an e-mail server, and a remote fileserver server, wherein when a delete request on the e-mail is detected by the operation processing means, the e-mail is deleted by searching a storing location of a single file of the e-mail or a storing location of the e-mails selected in the inside of a management file managed as a single file or a plurality of files and overwriting a string of a specific pattern on the location.
  • an operation processing means including a personal computer (PC), an e-mail server, and a remote fileserver server
  • the file management method in the local and remote regions is realized in a plug-in format of any one e-mail management program selected from common, free and share e-mail management programs including Outlook or Eudora and operates a selective menu of the e-mail management program by the operation processing means.
  • the file management method in the local and remote regions includes: detecting that e-mails are selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; accessing to e-mail storage and sequentially fetching an e-mail region and an attached file region of the selected e-mail in the operation processing means; locating the fetched e-mail and attached file in the operation processing means; forming an overwrite pattern according to the set up delete option and method in the operation processing means; overwriting a completely created pattern string on the entire region of the e-mail and attached file located on a memory in the operation processing means; storing the overwritten e-mail and attached file in e-mail storage in the operation processing means; and deleting a header of the selected e-mail and removing the e-mail from the e-mail management file in the operation processing means.
  • the file management method in the local and remote regions includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; analyzing an e-mail management file and tracing a selected e-mail region in the operation processing means; forming an overwrite pattern according to the set up the delete option or method in the operation processing means; overwriting a completely created pattern string on the traced e-mail region in the operation processing means; and resetting a link of the e-mail management file and reloading the e-mail management file in the operation processing means.
  • the file management method in the local and remote regions includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; creating a duplicate copy of the e-mail management file in the operation processing means; forming an overwrite pattern according to a delete option or method in the operation processing means; overwriting a completely created pattern string on an original copy of the e-mail management file in the operation processing means; analyzing the e-mail management file copy and tracing the selected e-mail region in the operation processing means; overwriting the original copy of the e-mail management file with the e-mail management file copy except the selected e-mail region in the operation processing means; reforming the original copy of the e-mail management file overwritten by the duplicate copy in the operation processing means; and deleting the duplicate copy and reloading the e-mail management file in the operation processing means.
  • the plug-in is installed by accessing to a server for distributing the plug-in and downloading the plug-in in the operation processing means and the plug-in is updated regularly or irregularly by the operation processing means.
  • the file management method in the local and remote regions is realized as an e-mail management program independent from another e-mail management program and operated by the operation processing means.
  • the file management method in the local and remote regions includes: detecting a search request command of a user in the operation processing means; detecting a drive selection command of the user in the operation processing means; sequentially performing drive scan and file and directory scan in the operation processing means; analyzing the file and checking a format of the e-mail file stored in the selected drive in the operation processing means; analyzing an e-mail management file when existence of the e-mail file is checked in the operation processing means; and detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail in the operation processing means.
  • said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; accessing to e-mail storage and sequentially fetching an e-mail region and an attached file region of the selected e-mail in the operation processing means; locating the fetched e-mail and attached file in the operation processing means; forming an overwrite pattern according to the set up delete option and method in the operation processing means; overwriting a completely created pattern string on the entire region of the e-mail and attached file located on a memory in the operation processing means; storing the overwritten e-mail and attached file in e-mail storage in the operation processing means; and deleting a header of the selected e-mail and removing the e-mail from the e-mail management file in the operation processing means.
  • said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; analyzing an e-mail management file and tracing a selected e-mail region in the operation processing means; forming an overwrite pattern according to the set up the delete option or method in the operation processing means; overwriting a completely created pattern string on the traced e-mail region in the operation processing means; and resetting a link of the e-mail management file and reloading the e-mail management file in the operation processing means.
  • said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; creating a duplicate copy of the e-mail management file in the operation processing means; forming an overwrite pattern according to a delete option or method in the operation processing means; overwriting a completely created pattern string on an original copy of the e-mail management file in the operation processing means; analyzing the e-mail management file copy and tracing the selected e-mail region in the operation processing means; overwriting the original copy of the e-mail management file with the e-mail management file copy except the selected e-mail region in the operation processing means; reforming the original copy of the e-mail management file overwritten by the duplicate copy in the operation processing means; and deleting the duplicate copy and reloading the e-mail management file in the operation
  • the file management method in the local and remote regions includes: detecting a contents reception command in a first operation processing means realized as a client computer; transmitting the contents reception command to a second operation processing means realized as a server computer through a network according to a contents fetch protocol in the first operation processing means; when the contents reception command is received from the first operation processing means in the second operation processing means, searching server storage in the second operation processing means and transmitting relevant original contents to the first operation processing means; when the delete command on the transmitted original contents is detected in the second operation processing means, performing pattern overwrite on the original contents; deleting the transmitted original contents in the second operation processing means; transmitting delete result contents describing that the transmitted original contents are completely deleted in the second operation processing means; receiving the transmitted original contents and delete result contents through Internet in the first operation processing means; and adding the received contents to the management file in the first operation processing means.
  • the present invention has an effect that outflow of personal or confidential information by hacking is thoroughly prevented by completely and physically deleting e-mail messages and attached files from a personal computer (PC) or an e-mail server according to user’s selection. That is, the present invention provides a function of complete delete in order to prevent recovery of deleted e-mail messages and attached files by analyzing a file recording medium of a file system, to thereby basically prevent outflow of information due to hacking or recovery of deleted e-mail messages, attached files or storage files of a file storage server when the user does not manage the security of the deleted files after deletion. Also, the present invention basically prevents outflow of important personal and business information which is not completely deleted and remains in the e-mail server although the user deletes the files.
  • the present invention transmits a complete delete result such as a deletion date and a user e-mail region to be used as evidence data through the e-mail, to thereby fortify the security and improve convenience of the user at the same time.
  • the present invention is able to be realized in a plug-in format of an e-mail management program such as Outlook, the user can easily access. Accordingly, the user easily and intuitively understands usage. Since a work process of arranging e-mails, i.e., a work process of selecting and completely deleting the selected e-mails, is very simple, working hours and mistakes of the user are reduced, to thereby maximize user’s convenience. That is, since the program for managing and completely deleting e-mail according to the present invention can manage e-mail files as one program or plug-in software, it is possible to prevent outflow of user’s personal information and information of companies and public institutions without an additional procedure, to thereby improve user’s convenience remarkably.
  • Fig. 1 shows an operation of a mail server and client.
  • Fig. 2 is a screen showing an e-mail region stored at present in Outlook.
  • Fig. 3 is a screen showing that deleted e-mails are recovered through an e-mail recovery program.
  • Fig. 4 shows a file format of Outlook’s Personal Store (PST).
  • Fig. 5 shows a screen for checking information on the selected e-mail.
  • Fig. 6 is a block diagram showing an overwriting method in accordance with an embodiment of the present invention.
  • Fig. 7 is a screen showing that an e-mail complete delete menu is installed and used in a plug-in format in Outlook, which is a conventional e-mail management program.
  • Fig. 8 shows original e-mail information.
  • Fig. 9 shows e-mail information after overwriting of the complete delete pattern, i.e., ‘0’ pattern, is performed on the original e-mail.
  • Fig. 10 is a screen showing that e-mail files deleted from the recording medium are searched by using a program for recovering the deleted e-mails after pattern overwrite.
  • Fig. 11 is a flowchart showing a method in accordance with a first embodiment of the present invention.
  • Fig. 12 is a flowchart showing a method in accordance with a second embodiment of the present invention.
  • Fig. 13 is a flowchart showing a method in accordance with the third embodiment of the present invention.
  • Fig. 14 is a flowchart showing a method in accordance with a fourth embodiment of the present invention.
  • Figs. 15 to 17 show three realizing methods in accordance with the fourth embodiment of the present invention.
  • Fig. 18 is a flowchart showing a method in accordance with a fifth embodiment of the present invention.
  • Figs. 19, 20 and 21 shows an exemplary difference in the storing methods of a general file and the e-mail file.
  • Fig. 1 is a block diagram showing a general operation of an e-mail server and a client.
  • General e-mail management programs using e-mail protocols such as a post office protocol 3 (POP3), an internet message access protocol (IMAP), and a simple e-mail transfer protocol (SMTP) access to an external e-mail server through a network protocol, brings the e-mails stored in the server to a Personal Computer (PC) and stores the e-mail files in the PC.
  • the e-mail files stored in the PC have a specific file format which is manageable by the e-mail management program.
  • a lot of personal information such as an attached file, schedule and contact numbers as well as the e-mail messages received from the e-mail server are stored in the file.
  • the e-mail management program manages the received or transmitted e-mails and the e-mails are deleted according to input of the user. According to an e-mail deleting method, the file is deleted by removing only e-mail information such as header and link information.
  • Outlook as one of generally used e-mail management programs is suggested as a detailed embodiment.
  • Fig. 2 is a screen showing an e-mail region stored at present in Outlook
  • Fig. 3 is a screen showing that the deleted e-mails are recovered through an e-mail recovery program.
  • the e-mails deleted by the users may be recovered since only header information is deleted and actual information remains in a disk region.
  • the e-mail server deletes an e-mail message of the user from a file system of the server according to a delete command of the user, actual information remains in a recording medium in the same manner. That is, although the e-mail files are deleted from the PC or the e-mail server, the e-mail files are recovered by recovery software. Accordingly, personal information may be illegally misused since there is a possibility that the personal information deleted by the user is recovered from the region where the information is not deleted.
  • a conventional method for completely deleting e-mail files is a method operated by an external program. To be specific, it is the method for removing the entire e-mail management file from a file system managed by an operating system.
  • a difference in the storing method of a general file and the e-mail file as shown in Figs. 19, 20 and 21 causes a problem that even e-mail files to be stored are deleted when the entire e-mail management file is deleted.
  • the user selects each e-mail to be remained, backs up the selected files as other e-mail management files, completely deletes the original e-mail files through an external program, forms an e-mail again based on the backup files, and deletes the copy through an individual program for complete delete.
  • the user feels uncomfortable and may make mistakes due to a lot of procedures.
  • the present invention replaces an existing deletion command of e-mail management software with a complete delete command or forms an additional command such that it is convenient for the user to completely delete the partial or entire important e-mail message from the recording medium.
  • the e-mail server using the method of the present invention has a client transmit a complete delete command to an e-mail server.
  • An e-mail server in a remote region receives the command and completely deletes the personal message remaining in the server from the recording medium. Accordingly, even if the recording medium is disclosed, outflow of the e-mail deleted from the server may be prevented.
  • the message of the e-mail server may be automatically deleted through a network protocol in a client PC when the e-mail is transferred to the client storage medium.
  • the server calls an automatic complete delete module in the storage medium of the server to completely delete the partially deleted message such that the delete information may not be used by hacking.
  • the remote region storage server such as a remote file server as well as the e-mail server
  • stored contents may be recovered by a recovery solution or through analysis of the recording medium although a user’s space is deleted.
  • the managed storage medium is disclosed or hacked, the entire information on user’s files is disclosed.
  • important personal and business data may be misused by another person. Accordingly, a personal region of the storage server in the remote region such as a remote file server needs to be completely deleted such that the information deleted from the storage medium cannot be hacked.
  • the overwriting process includes the steps of reading a disk file record, searching a header and an extension of each file, checking whether the file is an e-mail management file, and overwriting the file selected by the user in searched lists to completely delete the file. In order to completely delete the files as described above, it is required to figure out the e-mail location selected by the user in the e-mail management file. There are several methods for recognizing the location of the selected e-mail performing the work by accessing to the location.
  • a first method is a method for tracing an actual e-mail management file with reference to a header of selected e-mail, analyzing location information and overwriting the location information on the recording medium.
  • Fig. 4 shows a file format of Outlook’s Personal Store (PST) where meta information and actual information are stored in a header region and a data region, respectively. The location information of the e-mail is acquired based on the meta information stored in the header region.
  • PST Personal Store
  • each mail management program may have a different method of the management file, works such as tracing of an e-mail location and resetting of a link on each e-mail management file are performed to delete a corresponding part.
  • a second method is as follows.
  • Most client e-mail management programs support the plug-in method, i.e., an Add-in method, and the user easily accesses to the selected e-mail location in the plug-in software.
  • the client e-mail management programs provide functions which are accessible to e-mails or diverse management information. Accordingly, when the method of the present invention is realized as the plug-in method of the conventional e-mail management program, i.e., the program such as Outlook, the complete delete process may be performed by setup of memory regions, functions and overwrite algorithm.
  • a screen for checking information on the e-mail is outputted as shown in Fig. 5. It is a function showing the e-mail selected by the user and the screen shows entire data from the header of the received e-mail to actual data.
  • Fig. 6 is a block diagram showing an overwriting method in accordance with an embodiment of the present invention
  • Fig. 7 is a screen showing that an e-mail complete delete menu is installed and used in a plug-in format in Outlook, which is a conventional e-mail management program.
  • the e-mail selected by the method of the present invention is completely deleted, the e-mail is brought from the recording medium through a routine shown in Fig. 6 and put on the memory region in use.
  • the e-mail put on the memory is divided into a header region and a data region of the actual e-mail and the stored location of the attached file is brought.
  • the header is overwritten as large as the header region and the data region is overwritten as large as the e-mail data region according to the overwrite pattern selected by the user or an automatically created random pattern.
  • the entire region of the e-mail selected from the recording medium may not be recovered.
  • the e-mail is automatically removed from the e-mail management file and the recording medium by reading the selected e-mail, overwriting the region, storing the entire overwritten e-mail region, and calling the existing e-mail delete routine.
  • This is a remarkably efficient and fast method since it does not require to determine the type of the e-mail file and analyze the e-mail management file through the determination result.
  • the partial region of the e-mail goes into the unrecoverable state according to the above efficient and fast method.
  • the e-mail file overwritten in the specific pattern may be recovered. Since a receiver, a transmitter and an attached file included in the e-mail as well as contents of the e-mail are all overwritten with a specific pattern, any information may not be recovered.
  • overwriting is allowed several times with diverse overwrite patterns such as Gutmann and DOD 5220, recovery by the recording medium recovering method based on hardware as well as software is not possible.
  • the DOD 5220 method is a standard of the Pentagon used when data are completely deleted from digital media such as a hard disk.
  • overwriting is performed 7 times according to the DOD 5220 method
  • magnetic traces of the original file are removed.
  • Overwriting is performed 35 times in the Gutmann method.
  • the above methods such as Gutmann and DOD 5220 are not the method that randomly formed patterns are simply overwritten several times.
  • the methods include an algorithm where the patterns for overwrite are sequentially created.
  • Fig. 8 shows original e-mail information
  • Fig. 9 shows e-mail information after overwriting of the complete delete pattern, i.e., ‘0’ pattern, is performed on the original e-mail.
  • the entire information included in the original e-mail is removed by overwriting the entire regions such as SENDER and SUBJECT, which are constituent elements of the e-mail, a BODY region of e-mails, and attached files, with the complete delete pattern, i.e., a ‘0’ pattern.
  • Fig. 9 shows a screen showing a case that the ‘0’ pattern is used.
  • random patterns or patterns set up by the user may be used as the overwrite pattern.
  • Fig. 10 is a screen showing that e-mail files deleted from the recording medium are searched by using a program for recovering the deleted e-mails after pattern overwrite. Since the e-mail contents deleted after pattern overwrite is completely overwritten with the complete delete pattern, i.e., the ‘0’ pattern, the contents stored in the existing e-mail may not be checked although the contents are recovered.
  • the above complete delete method is easily formed based on Plug-In information, i.e., Add-in information, of the e-mail management client software. Also, the e-mail contents may be completely deleted from the recording medium by quickly accessing to the e-mails stored in the storage medium without accessing to the entire management file of the e-mail.
  • the e-mail file management method of the present invention will be described in detail hereinafter.
  • the method for managing and deleting e-mail messages from the storage medium in order to realize the object of the present invention may be realized as 5 embodiments as follows.
  • a subject of the entire operation is an operation processing means such as a PC, an e-mail server, and a remote file server and it is a well-known fact that the entire operation is programmed and automatically performed.
  • the method by the first embodiment is a plug-in method of the e-mail management program which provides a setup menu on complete delete of the e-mail message to each e-mail and schedule management software. That is, the first embodiment provides a service by adding a complete delete menu in a plug-in format on the menu of the conventional e-mail management program such as Outlook as shown in Fig. 7, sets up a delete method through the setup menu and creates a pattern for complete delete.
  • Fig. 11 is a flowchart showing a method in accordance with the first embodiment of the present invention.
  • the e-mail when the complete delete menu is called by the user, the e-mail is analyzed and divided into a header region and a data region. The location of the e-mail is searched in the e-mail management file. When the location of the e-mail is extracted, overwrite is performed on the location based on the complete delete pattern or random pattern selected by the user. When overwrite is completed, the e-mail region is removed from the file and the work is completed.
  • the operation processing means detects at step S101 that a complete delete command is issued to the e-mail selected by the user, the operation processing means provides a delete option for user’s selection or applies a selected method at step S102.
  • the delete option includes options including whether the user directly inputs the overwrite pattern or whether the random pattern is adopted.
  • the overwrite method indicates any one of the pattern creation methods for overwrite, which is used in complete delete algorithms such as Gutmann and DOD 5220.
  • the operation processing means accesses to the message storage at step S104, sequentially brings an e-mail region and an attached file region at steps S104 and S105, sets up an e-mail location at step S106, and creates and forms a random pattern or a user pattern at step S107 according to the method set up at the S102.
  • the operation processing means overwrites the set up e-mail region and attached file region with the formed pattern at step S108 such that original contents such as message contents and attached files are completely substituted.
  • the e-mail selected for complete delete is completely overwritten with the random pattern or the user pattern and stored in the original e-mail location at step S109.
  • the complete delete process is completed by calling an original delete routine at step S110 and deleting the e-mail selected in the e-mail management file.
  • the conventional delete method only the header of the e-mail is deleted as indicated in dotted arrow in Fig. 11.
  • the complete delete method of the present invention since the header is deleted after searching the location of the e-mail message and the attached file and overwriting the e-mail to be deleted with a specific pattern, i.e., a random pattern or a user pattern, only the overwritten e-mail in the deleted e-mail file may be recovered. Accordingly, a possibility that e-mail contents, attached file contents, and personal information are disclosed from the original copy of the e-mail is essentially eliminated.
  • the method according to the second embodiment is a method for providing a complete delete command alternately or additionally to the existing delete command in the e-mail and schedule management program.
  • Fig. 12 is a flowchart showing the method according to the second embodiment.
  • the method according to the second embodiment is a plug-in method same as the first embodiment by the procedure of calling the menu.
  • the procedures of performing overwrite and removing the contents from the e-mail management file are different.
  • the region is overwritten by directly accessing to the e-mail management file and analyzing and tracing the location of the selected e-mail. Subsequently, the region is removed from the e-mail management file.
  • the second embodiment will be described in detail with reference to Fig. 12.
  • the steps S201 and S202 of the second embodiment correspond to the steps S101 and S102 of the first embodiment, respectively. Since the operations performed in the corresponding steps are the same, description on the same operations will not be provided here.
  • the stored region of the e-mail selected to be completely deleted is traced at step S204 by directly accessing to the e-mail management file and performing analysis at step S203.
  • the set up pattern is formed on the region at step S205 and the selected region is overwritten at step S206.
  • a link on the region is reset in the e-mail management file at step S207.
  • the selected e-mail is processed as a deleted file.
  • a logic flow goes to the end after reloading the e-mail management file at step S208.
  • the method of the second embodiment is the same as that of the first embodiment in that recovery of the original copy may be essentially prevented by overwriting a specific pattern on the e-mail to be completely deleted.
  • the first embodiment has procedures of locating the e-mail to be completely deleted to a surplus memory region, overwriting and relocating the e-mail to the original region, and storing the e-mail.
  • the second embodiment as soon as the e-mail to be completely deleted is found, the e-mail is directly overwritten in the location.
  • the third embodiment is similar to the first and second embodiments but adopts a method using a duplicate copy in a part to be overwritten.
  • Fig. 13 is a flowchart showing the method according to the third embodiment.
  • the method according to the third embodiment is similar to the methods according to the first and second embodiments but adopts the method using a duplicate copy in a part to be overwritten.
  • a duplicate copy is made in a specific location and the entire original copy is deleted according to the delete pattern.
  • a new e-mail file is formed from the duplicate copy in the original file location.
  • the duplicate copy location is completely deleted by overwriting the duplicate copy.
  • Steps S301 and S302 of the third embodiment correspond to the steps S101 and S102 of the first embodiment or the steps S201 and S202 of the second embodiment, respectively. Since the operations of the corresponding steps are the same, description will not be provided here.
  • a duplicate copy of the e-mail management file is formed at step S303.
  • An overwritten pattern is formed according to the set up method at step S304 and the entire original copy of the e-mail management file is overwritten with the formed pattern at step S305.
  • an original file is formed at step S308. That is, the duplicate copy is the same as the initial original copy and the original copy is entirely overwritten with a specific pattern. Accordingly, when the original copy is overwritten with the duplicate copy except the selected e-mail, the selected e-mail region remains in a specific pattern and the contents of the residual region become the same as the original copy. In the step of forming the original file, the selected e-mail is treated to be deleted.
  • the logic flow goes to the end after forming the original copy of the e-mail management file, completely deleting the copy at step S309, and reloading the original copy of the newly formed e-mail management file at step S310.
  • Completely deleting the copy of the step S309 may be performed according to the conventional methods such as Gutmann and DOD 5220.
  • a method according to a fourth embodiment will be described.
  • the methods according to the first to third embodiments adopt a method for an operation in the plug-in format of the conventional e-mail management program, e.g., Outlook and Eudora.
  • the method according to the fourth embodiment is a method for an operation as a program, which is independent from the e-mail program and
  • Fig. 13 is a flowchart showing the method according to the fourth embodiment.
  • the fourth embodiment is used in an e-mail management program operating as an independent processor and adopts a method for completely deleting own e-mail management file or other e-mail management files selected by the user.
  • the e-mail management file is searched by the user and a specific e-mail management file is selected, the selected e-mail management file is analyzed according to a protocol used in each e-mail management program.
  • contents of the e-mail file are listed to the user through the analyzed contents.
  • an e-mail delete command of the user on the selected e-mail is called, i.e., when a command for partially or entirely deleting the e-mail is called, the region is deleted according to the setup pattern or the entire e-mail management file is deleted.
  • the e-mail management file is completely removed from a file table managed by the operating system.
  • the first to third embodiments may adopt any one of the applied e-mail management methods.
  • a user A uses Outlook and a user B uses Eudora in one computer shared by the users A and B
  • the users A and B need to install plug-in for Outlook and plug-in for Eudora, respectively, according to the method of the first to third embodiments.
  • only one program realized by the fourth embodiment is required to be installed.
  • the operation processing means recognizes at step S402 that a drive is selected by user input and sequentially performs scan of the selected drive at step S403 and scan of file and directory at step S404.
  • the operation processing means determines the type of the files at step S405 by analyzing the searched file. To be specific, an e-mail file format used in the e-mail management program used by the user is checked at the step S405 whether the e-mail file is for Outlook or Eudora. When the e-mail file is not searched by the operation processing means at step S406-No, the logic flow goes to the end. When the e-mail file is searched at step S406-Yes, the e-mail management file is analyzed according to the type of the e-mail file at step S407.
  • any one embodiment selected from the first to third embodiments is performed in the same manner at step S408. That is, when the e-mail to be completely deleted is selected by the user and a complete delete command is issued, the selected e-mail is moved to the surplus memory region like the first embodiment, pattern overwrite is performed on the e-mail region. After storing the e-mail, the complete delete process finishes by removing the header according to the delete routine (see Fig. 15). Otherwise, the complete delete process finishes by directly accessing to the e-mail management file, tracing the e-mail region, overwriting the region and resetting the management file link like the second embodiment (Fig. 16).
  • the method according to the fifth embodiment is a method that the user completely deletes own e-mail information directly, by scheduling or automatically according to the user command or setup on the files such as an e-mail or a remote fileserver stored in the remote region by the server.
  • Fig. 18 is a flowchart showing a method according to the fifth embodiment.
  • the method according to the fifth embodiment is a method for calling a module for overwriting an e-mail location with a specific pattern in a part where the file stored in the e-mail server is deleted, a part deleted by the user’s command, and an automatically deleted part after finishing transmission when an e-mail stored in an e-mail hosting server is transmitted to the PC through a network protocol.
  • the first to fourth embodiments are the methods for managing the e-mail file stored in own PC by the user and the fifth embodiment is an e-mail file management method in the e-mail server.
  • a subject of each operation is an operation processing means realized as PC.
  • an operation by the operation processing means realized as PC and an operation by the operation processing means realized as an e-mail server should be divided.
  • the operation processing means realized as the PC i.e., a client computer
  • the operation processing means realized as the e-mail server is called a second operation processing means, i.e., a server computer.
  • the fifth embodiment will be described in detail with reference to Fig. 18. These contents are applicable to the e-mail, i.e., a mail server, and the file, i.e., a remote fileserver server.
  • the first operation processing means performs contents reception of the user by using the embedded e-mail management program or remote fileserver management program at step S501, fetch is performed according to a contents fetch protocol at step S502 and a command requesting contents reception through a network is transmitted at step S503.
  • the contents reception request message transmitted from the first operation processing means is transmitted to the second operation processing means, i.e., the server, at step S504.
  • the second operation processing means searches server storage at step S505 and transmits the contents to the first operation processing means at step S506.
  • a delete command is issued to the contents by the second operation processing means at step S507.
  • servers such as POP3 and IMAP, i.e., the second operation processing means in the fifth embodiment, transmits the e-mail to the client, i.e., the first operation processing means in the fifth embodiment, and the server is set up to automatically delete the e-mail.
  • the contents are deleted after complete transmission of the contents, deleted after issuing of user’s delete command, or automatically deleted.
  • the contents are deleted by the conventional delete method, i.e., the method for removing only the header, of the delete methods, there is a problem that information is disclosed due to residual data.
  • the second operation processing means performs pattern overwrite on the original contents at step S508 and deletes the original contents at step S509. Accordingly, although data are recovered by hacking into the server, the original e-mail overwritten with the pattern is recovered, to thereby essentially prevent disclose of personal information or confidential matters.
  • the second operation processing means prepares a delete result including contents that the original e-mail is completely deleted and transmits the delete result to the user at step S510.
  • the first operation processing means receives the contents through a network based on the embedded e-mail management program or remote fileserver management program at step S511, adds the contents to the management file at step S512, and notifies to the user at step S513 that the contents arrive.
  • the second operation processing means is a web e-mail server or a remote fileserver server, the operation for notification to the user may not be performed.
  • the message is deleted according to a delete command by the user and an automatic delete command in the server after transmitting the e-mail to the user client in the e-mail server.
  • outflow of user’s personal information or confidential information may be essentially prevented by completely deleting the e-mail in the server through the steps S508 to S510.
  • relevant e-mails are selected as an e-mail to be completely deleted and completely deleted through the steps S508 to S510 and a delete result is transmitted to the user.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

Provided is a method for managing e-mails and remote files in local and remote regions which are operated by an operation processing means including a personal computer (PC), an e-mail server, and a remote fileserver server, wherein when a delete request on the e-mail is detected by the operation processing means, the e-mail is deleted by searching a storing location of a single file of the e-mail or a storing location of the e-mails selected in the inside of a management file managed as a single file or a plurality of files and overwriting a string of a specific pattern on the location.

Description

METHOD FOR MANAGING E-MAILS AND REMOTE FILES IN LOCAL AND REMOTE REGIONS
The present invention relates to a method for managing e-mails and remote files in local and remote regions, and more particularly, to a method for managing and completely deleting an e-mail message, and software, a remote region server and storage medium for managing the same, i.e., a method for managing e-mails and remote files in local and remote regions, which searches and completely deletes the files managed in or deleted from the e-mail not to be recovered in order to secure the transmitted/received files managed in an e-mail system.
Although files or e-mails stored in a storage medium are deleted by a user, data may remain in an operating system for managing a recording medium or the recording medium itself, or exist in a state, which is impossible to be recovered. Accordingly, there is a possibility that personal information is disclosed in some cases.
In case of a general file system used in diverse operating systems such as Windows or Linux, data are stored in hard disk as values of file data and Meta data, i.e., header. When the operating system executes a command such as “Delete” or “Format”, the operating system does not use a method of deleting an actual file data value but uses a method of deleting only a part of the header value such as location information and a creation time of the file data, i.e., a file name, a link and a file table. These methods are used as a basis method for managing the file systems of the entire operating system. The same method is also used in managing e-mails in an e-mail server or personal computer (PC).
Accordingly, when a file or an e-mail is deleted in the e-mail server and PC, existing data are not completely deleted in a storage device and the residual data cause a security problem. For example, it is checked in a part marked as “space” in the file system of the operating system that contents of the existing files remain in the deleted region. Accordingly, although the user deletes an important e-mail message according to a normal method after transmission or reception, information may be disclosed unintentionally by outflow or hacking of a recording medium. Also, since the information on the e-mail deleted from the server remains in the file system, personal information may be disclosed from the deleted information in case that the server is hacked.
At the present age as information age, since outflow of the personal information may cause diverse crimes or a violation of privacy, it is well-known that many personal users sensitively respond to this problem. In addition, in case of a group such as a company, the importance of managing security on the important information such as business secretes cannot be overemphasized. Still, as described above, there is a problem that an e-mail management system used in general PCs and e-mail servers is exposed to a hacking risk due to remaining e-mail messages and attached files.
Regarding the conventional e-mail management which is weak on security, there are continuous requests for solving the problem that information is frequently disclosed by hacking when the messages and attached files of the e-mail deleted from the recording medium are not completely deleted.
Diverse conventional technologies for preventing outflow of personal and confidential information by hacking are disclosed.
Japanese Patent Laid-open No. 2004-126909 (reference 1) discloses a file management apparatus including a memory means for memorizing actual data of a data file and manage information showing a location where the actual data are stored, and a control means for deleting a data file after selecting whether management information is deleted after remaining actual data under a user’s direction or whether management information is deleted after overwriting data with a selected code.
Also, Japanese Patent Laid-open No. 2008-003892 (reference 2) discloses a method for deleting a data file from a file system by deleting file management information of the data file to be deleted which includes the step of a) specifying a data file to be deleted; b) overwriting a random number with a plurality of selective locations of the data; c) overwriting file size information included in the file management information of the data file with 0 and varying the file size of the data file; and d) recording delete information on the file management information of the data file and deleting the data file from the file system.
The references 1 and 2 relate to the methods for completely deleting general files in order to raise security stability such that a file is not recovered after deletion. However, it is well known that it is very inconvenient to manage e-mails by the references 1 and 2. It will be described in detail hereinafter. Fig. 19 shows a format that general files are stored. As shown in Fig. 19, the files are stored in an independently dividable format. Accordingly, in order to delete the general files, it is required to simply select a file and completely delete the file according to the methods such as the references 1 and 2.
An e-mail storing method of Outlook Express, which is a generally used e-mail program, is different from a general file storing method. Fig. 20 shows a tree format of an e-mail box in Outlook Express and an actual format of stored files. As shown in the drawing, Outlook Express does not store files according to each e-mail, but adopts a method for storing the e-mail box including many e-mails in one file format of .dbx as shown in Fig. 21. That is, the e-mail box file is a file gathering individual files and this kind of files are e-mail management files. Each e-mail may be stored in an individual file format of .eml. However, since the e-mails are stored basically in the format of .dbx, the user is required to perform a command of [Storing as another name] after selecting an e-mail to be manually stored in order to store an independent e-mail file. In this case, when the e-mail box is completely deleted for security according to the method such as the prior art, an error may occur since there is no e-mail box file corresponding to the e-mail box to be linked on Outlook Express. In addition, for example, when e-mails to be completely deleted and e-mails to be necessarily remained are mixed in one e-mail box, it is required to perform a very complicated process of storing each of the e-mails to be necessarily remained in an e-mail file format of .eml, completely deleting the e-mail box files of the file format of .dbx, and creating an e-mail box file of the same name. This process is a work that a general user who is not good at this computer work is usually unable to perform. Also, although the user is very good at the computer work, it is difficult to usually perform this process since the work consumes a long time.
As described above, conventional technologies for completely deleting the general files are disclosed but there is a difficulty in applying the conventional methods to the e-mails. Accordingly, there are continuous requests for an efficient and easy method for completely deleting individual e-mails.
An object of the present invention is to provide a method for managing e-mails and remote files in local and remote regions which completely deletes e-mail management files of e-mail software used in an operating system in full operation or e-mail messages such as a management directory, attached files included in the e-mails, and contents related to a lot of personal information such as contact numbers and a schedule from a storage medium, e.g., a disc, without an additional process.
To achieve the object of the present invention, the present invention provides a method for managing e-mails and remote files in local and remote regions which are operated by an operation processing means including a personal computer (PC), an e-mail server, and a remote fileserver server, wherein when a delete request on the e-mail is detected by the operation processing means, the e-mail is deleted by searching a storing location of a single file of the e-mail or a storing location of the e-mails selected in the inside of a management file managed as a single file or a plurality of files and overwriting a string of a specific pattern on the location.
Preferably, the file management method in the local and remote regions is realized in a plug-in format of any one e-mail management program selected from common, free and share e-mail management programs including Outlook or Eudora and operates a selective menu of the e-mail management program by the operation processing means.
Preferably, the file management method in the local and remote regions includes: detecting that e-mails are selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; accessing to e-mail storage and sequentially fetching an e-mail region and an attached file region of the selected e-mail in the operation processing means; locating the fetched e-mail and attached file in the operation processing means; forming an overwrite pattern according to the set up delete option and method in the operation processing means; overwriting a completely created pattern string on the entire region of the e-mail and attached file located on a memory in the operation processing means; storing the overwritten e-mail and attached file in e-mail storage in the operation processing means; and deleting a header of the selected e-mail and removing the e-mail from the e-mail management file in the operation processing means.
Preferably, the file management method in the local and remote regions includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; analyzing an e-mail management file and tracing a selected e-mail region in the operation processing means; forming an overwrite pattern according to the set up the delete option or method in the operation processing means; overwriting a completely created pattern string on the traced e-mail region in the operation processing means; and resetting a link of the e-mail management file and reloading the e-mail management file in the operation processing means.
Preferably, the file management method in the local and remote regions includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; creating a duplicate copy of the e-mail management file in the operation processing means; forming an overwrite pattern according to a delete option or method in the operation processing means; overwriting a completely created pattern string on an original copy of the e-mail management file in the operation processing means; analyzing the e-mail management file copy and tracing the selected e-mail region in the operation processing means; overwriting the original copy of the e-mail management file with the e-mail management file copy except the selected e-mail region in the operation processing means; reforming the original copy of the e-mail management file overwritten by the duplicate copy in the operation processing means; and deleting the duplicate copy and reloading the e-mail management file in the operation processing means.
Preferably, the plug-in is installed by accessing to a server for distributing the plug-in and downloading the plug-in in the operation processing means and the plug-in is updated regularly or irregularly by the operation processing means.
Preferably, the file management method in the local and remote regions is realized as an e-mail management program independent from another e-mail management program and operated by the operation processing means.
Preferably, the file management method in the local and remote regions includes: detecting a search request command of a user in the operation processing means; detecting a drive selection command of the user in the operation processing means; sequentially performing drive scan and file and directory scan in the operation processing means; analyzing the file and checking a format of the e-mail file stored in the selected drive in the operation processing means; analyzing an e-mail management file when existence of the e-mail file is checked in the operation processing means; and detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail in the operation processing means.
Preferably, said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; accessing to e-mail storage and sequentially fetching an e-mail region and an attached file region of the selected e-mail in the operation processing means; locating the fetched e-mail and attached file in the operation processing means; forming an overwrite pattern according to the set up delete option and method in the operation processing means; overwriting a completely created pattern string on the entire region of the e-mail and attached file located on a memory in the operation processing means; storing the overwritten e-mail and attached file in e-mail storage in the operation processing means; and deleting a header of the selected e-mail and removing the e-mail from the e-mail management file in the operation processing means.
Preferably, said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; analyzing an e-mail management file and tracing a selected e-mail region in the operation processing means; forming an overwrite pattern according to the set up the delete option or method in the operation processing means; overwriting a completely created pattern string on the traced e-mail region in the operation processing means; and resetting a link of the e-mail management file and reloading the e-mail management file in the operation processing means.
Preferably, said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes: detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means; detecting that a delete option and a delete method are selected in the operation processing means; creating a duplicate copy of the e-mail management file in the operation processing means; forming an overwrite pattern according to a delete option or method in the operation processing means; overwriting a completely created pattern string on an original copy of the e-mail management file in the operation processing means; analyzing the e-mail management file copy and tracing the selected e-mail region in the operation processing means; overwriting the original copy of the e-mail management file with the e-mail management file copy except the selected e-mail region in the operation processing means; reforming the original copy of the e-mail management file overwritten by the duplicate copy in the operation processing means; and deleting the duplicate copy and reloading the e-mail management file in the operation processing means.
Preferably, the file management method in the local and remote regions includes: detecting a contents reception command in a first operation processing means realized as a client computer; transmitting the contents reception command to a second operation processing means realized as a server computer through a network according to a contents fetch protocol in the first operation processing means; when the contents reception command is received from the first operation processing means in the second operation processing means, searching server storage in the second operation processing means and transmitting relevant original contents to the first operation processing means; when the delete command on the transmitted original contents is detected in the second operation processing means, performing pattern overwrite on the original contents; deleting the transmitted original contents in the second operation processing means; transmitting delete result contents describing that the transmitted original contents are completely deleted in the second operation processing means; receiving the transmitted original contents and delete result contents through Internet in the first operation processing means; and adding the received contents to the management file in the first operation processing means.
The present invention has an effect that outflow of personal or confidential information by hacking is thoroughly prevented by completely and physically deleting e-mail messages and attached files from a personal computer (PC) or an e-mail server according to user’s selection. That is, the present invention provides a function of complete delete in order to prevent recovery of deleted e-mail messages and attached files by analyzing a file recording medium of a file system, to thereby basically prevent outflow of information due to hacking or recovery of deleted e-mail messages, attached files or storage files of a file storage server when the user does not manage the security of the deleted files after deletion. Also, the present invention basically prevents outflow of important personal and business information which is not completely deleted and remains in the e-mail server although the user deletes the files. In particular, when the files are completely deleted from the server and the user as a client does not know the fact, the present invention transmits a complete delete result such as a deletion date and a user e-mail region to be used as evidence data through the e-mail, to thereby fortify the security and improve convenience of the user at the same time.
In particular, since the present invention is able to be realized in a plug-in format of an e-mail management program such as Outlook, the user can easily access. Accordingly, the user easily and intuitively understands usage. Since a work process of arranging e-mails, i.e., a work process of selecting and completely deleting the selected e-mails, is very simple, working hours and mistakes of the user are reduced, to thereby maximize user’s convenience. That is, since the program for managing and completely deleting e-mail according to the present invention can manage e-mail files as one program or plug-in software, it is possible to prevent outflow of user’s personal information and information of companies and public institutions without an additional procedure, to thereby improve user’s convenience remarkably.
In addition, since risk of hacking on residual personal information, which is not completely deleted from the recording medium of the e-mail server due to careless management, is removed and e-mail files are managed in a state that the user recognizes the fact, the user has a sense of stability.
The above and other objects, features and advantages of the present invention will become apparent from the following description of preferred embodiments given in conjunction with the accompanying drawings, in which:
Fig. 1 shows an operation of a mail server and client.
Fig. 2 is a screen showing an e-mail region stored at present in Outlook.
Fig. 3 is a screen showing that deleted e-mails are recovered through an e-mail recovery program.
Fig. 4 shows a file format of Outlook’s Personal Store (PST).
Fig. 5 shows a screen for checking information on the selected e-mail.
Fig. 6 is a block diagram showing an overwriting method in accordance with an embodiment of the present invention.
Fig. 7 is a screen showing that an e-mail complete delete menu is installed and used in a plug-in format in Outlook, which is a conventional e-mail management program.
Fig. 8 shows original e-mail information.
Fig. 9 shows e-mail information after overwriting of the complete delete pattern, i.e., ‘0’ pattern, is performed on the original e-mail.
Fig. 10 is a screen showing that e-mail files deleted from the recording medium are searched by using a program for recovering the deleted e-mails after pattern overwrite.
Fig. 11 is a flowchart showing a method in accordance with a first embodiment of the present invention.
Fig. 12 is a flowchart showing a method in accordance with a second embodiment of the present invention.
Fig. 13 is a flowchart showing a method in accordance with the third embodiment of the present invention.
Fig. 14 is a flowchart showing a method in accordance with a fourth embodiment of the present invention.
Figs. 15 to 17 show three realizing methods in accordance with the fourth embodiment of the present invention.
Fig. 18 is a flowchart showing a method in accordance with a fifth embodiment of the present invention.
Figs. 19, 20 and 21 shows an exemplary difference in the storing methods of a general file and the e-mail file.
Hereinafter, the embodiments of the present invention will be described in detail with reference to accompanying drawings.
Fig. 1 is a block diagram showing a general operation of an e-mail server and a client. General e-mail management programs using e-mail protocols such as a post office protocol 3 (POP3), an internet message access protocol (IMAP), and a simple e-mail transfer protocol (SMTP) access to an external e-mail server through a network protocol, brings the e-mails stored in the server to a Personal Computer (PC) and stores the e-mail files in the PC. The e-mail files stored in the PC have a specific file format which is manageable by the e-mail management program. A lot of personal information such as an attached file, schedule and contact numbers as well as the e-mail messages received from the e-mail server are stored in the file. The e-mail management program manages the received or transmitted e-mails and the e-mails are deleted according to input of the user. According to an e-mail deleting method, the file is deleted by removing only e-mail information such as header and link information.
Outlook as one of generally used e-mail management programs is suggested as a detailed embodiment. Fig. 2 is a screen showing an e-mail region stored at present in Outlook and Fig. 3 is a screen showing that the deleted e-mails are recovered through an e-mail recovery program. As shown in Fig. 3, the e-mails deleted by the users may be recovered since only header information is deleted and actual information remains in a disk region. When the e-mail server deletes an e-mail message of the user from a file system of the server according to a delete command of the user, actual information remains in a recording medium in the same manner. That is, although the e-mail files are deleted from the PC or the e-mail server, the e-mail files are recovered by recovery software. Accordingly, personal information may be illegally misused since there is a possibility that the personal information deleted by the user is recovered from the region where the information is not deleted.
A conventional method for completely deleting e-mail files is a method operated by an external program. To be specific, it is the method for removing the entire e-mail management file from a file system managed by an operating system. A difference in the storing method of a general file and the e-mail file as shown in Figs. 19, 20 and 21 causes a problem that even e-mail files to be stored are deleted when the entire e-mail management file is deleted. In order not to delete the entire management file such that the e-mail files are selectively remained, the user selects each e-mail to be remained, backs up the selected files as other e-mail management files, completely deletes the original e-mail files through an external program, forms an e-mail again based on the backup files, and deletes the copy through an individual program for complete delete. According to the above method for managing the e-mails, the user feels uncomfortable and may make mistakes due to a lot of procedures. In addition, since long working hours of several minutes to several ten minutes are required, there is a problem that the method is very inefficient. In order to solve the problem, the present invention replaces an existing deletion command of e-mail management software with a complete delete command or forms an additional command such that it is convenient for the user to completely delete the partial or entire important e-mail message from the recording medium.
The e-mail server using the method of the present invention has a client transmit a complete delete command to an e-mail server. An e-mail server in a remote region receives the command and completely deletes the personal message remaining in the server from the recording medium. Accordingly, even if the recording medium is disclosed, outflow of the e-mail deleted from the server may be prevented.
The message of the e-mail server may be automatically deleted through a network protocol in a client PC when the e-mail is transferred to the client storage medium. At this time, the server calls an automatic complete delete module in the storage medium of the server to completely delete the partially deleted message such that the delete information may not be used by hacking.
In addition, when the remote region storage server such as a remote file server as well as the e-mail server is used, stored contents may be recovered by a recovery solution or through analysis of the recording medium although a user’s space is deleted. When the managed storage medium is disclosed or hacked, the entire information on user’s files is disclosed. In this case, important personal and business data may be misused by another person. Accordingly, a personal region of the storage server in the remote region such as a remote file server needs to be completely deleted such that the information deleted from the storage medium cannot be hacked.
When header information of the e-mail selected by the user is read and a location, in which the e-mail is stored, is read in the comprehensively managed e-mail file or directory, a header of the location and an actual data region are overwritten with a specific string. After overwriting, it is impossible to recover the deleted e-mail files. The overwriting process includes the steps of reading a disk file record, searching a header and an extension of each file, checking whether the file is an e-mail management file, and overwriting the file selected by the user in searched lists to completely delete the file. In order to completely delete the files as described above, it is required to figure out the e-mail location selected by the user in the e-mail management file. There are several methods for recognizing the location of the selected e-mail performing the work by accessing to the location.
A first method is a method for tracing an actual e-mail management file with reference to a header of selected e-mail, analyzing location information and overwriting the location information on the recording medium. Fig. 4 shows a file format of Outlook’s Personal Store (PST) where meta information and actual information are stored in a header region and a data region, respectively. The location information of the e-mail is acquired based on the meta information stored in the header region. When this method is adopted, it is required to understand characteristics of each e-mail file and compare and search header information of the e-mail from actual RAW Data.
Since each mail management program may have a different method of the management file, works such as tracing of an e-mail location and resetting of a link on each e-mail management file are performed to delete a corresponding part.
A second method is as follows. Most client e-mail management programs support the plug-in method, i.e., an Add-in method, and the user easily accesses to the selected e-mail location in the plug-in software. Also, the client e-mail management programs provide functions which are accessible to e-mails or diverse management information. Accordingly, when the method of the present invention is realized as the plug-in method of the conventional e-mail management program, i.e., the program such as Outlook, the complete delete process may be performed by setup of memory regions, functions and overwrite algorithm.
When a specific e-mail is selected and clicked in the mail management program, a screen for checking information on the e-mail is outputted as shown in Fig. 5. It is a function showing the e-mail selected by the user and the screen shows entire data from the header of the received e-mail to actual data.
Fig. 6 is a block diagram showing an overwriting method in accordance with an embodiment of the present invention and Fig. 7 is a screen showing that an e-mail complete delete menu is installed and used in a plug-in format in Outlook, which is a conventional e-mail management program.
That is, when the e-mail selected by the method of the present invention is completely deleted, the e-mail is brought from the recording medium through a routine shown in Fig. 6 and put on the memory region in use. The e-mail put on the memory is divided into a header region and a data region of the actual e-mail and the stored location of the attached file is brought. In the brought information, the header is overwritten as large as the header region and the data region is overwritten as large as the e-mail data region according to the overwrite pattern selected by the user or an automatically created random pattern.
In case of attached files, when the attached file region is overwritten as large as the attached file, the entire region of the e-mail selected from the recording medium may not be recovered. The e-mail is automatically removed from the e-mail management file and the recording medium by reading the selected e-mail, overwriting the region, storing the entire overwritten e-mail region, and calling the existing e-mail delete routine. This is a remarkably efficient and fast method since it does not require to determine the type of the e-mail file and analyze the e-mail management file through the determination result. The partial region of the e-mail goes into the unrecoverable state according to the above efficient and fast method.
According to the method of the present invention described above, when a specific pattern is overwritten on the location based on the contents and size of the e-mail, only the e-mail file overwritten in the specific pattern may be recovered. Since a receiver, a transmitter and an attached file included in the e-mail as well as contents of the e-mail are all overwritten with a specific pattern, any information may not be recovered. When overwriting is allowed several times with diverse overwrite patterns such as Gutmann and DOD 5220, recovery by the recording medium recovering method based on hardware as well as software is not possible. The DOD 5220 method is a standard of the Pentagon used when data are completely deleted from digital media such as a hard disk. When overwriting is performed 7 times according to the DOD 5220 method, magnetic traces of the original file are removed. Overwriting is performed 35 times in the Gutmann method. The above methods such as Gutmann and DOD 5220 are not the method that randomly formed patterns are simply overwritten several times. The methods include an algorithm where the patterns for overwrite are sequentially created.
Fig. 8 shows original e-mail information and Fig. 9 shows e-mail information after overwriting of the complete delete pattern, i.e., ‘0’ pattern, is performed on the original e-mail. As shown in Fig. 9, the entire information included in the original e-mail is removed by overwriting the entire regions such as SENDER and SUBJECT, which are constituent elements of the e-mail, a BODY region of e-mails, and attached files, with the complete delete pattern, i.e., a ‘0’ pattern.
For the sake of convenience in explanation, Fig. 9 shows a screen showing a case that the ‘0’ pattern is used. However, random patterns or patterns set up by the user may be used as the overwrite pattern.
Fig. 10 is a screen showing that e-mail files deleted from the recording medium are searched by using a program for recovering the deleted e-mails after pattern overwrite. Since the e-mail contents deleted after pattern overwrite is completely overwritten with the complete delete pattern, i.e., the ‘0’ pattern, the contents stored in the existing e-mail may not be checked although the contents are recovered. The above complete delete method is easily formed based on Plug-In information, i.e., Add-in information, of the e-mail management client software. Also, the e-mail contents may be completely deleted from the recording medium by quickly accessing to the e-mails stored in the storage medium without accessing to the entire management file of the e-mail.
The e-mail file management method of the present invention will be described in detail hereinafter. The method for managing and deleting e-mail messages from the storage medium in order to realize the object of the present invention may be realized as 5 embodiments as follows. Hereinafter, a subject of the entire operation is an operation processing means such as a PC, an e-mail server, and a remote file server and it is a well-known fact that the entire operation is programmed and automatically performed.
A method by a first embodiment will be described below. The method by the first embodiment is a plug-in method of the e-mail management program which provides a setup menu on complete delete of the e-mail message to each e-mail and schedule management software. That is, the first embodiment provides a service by adding a complete delete menu in a plug-in format on the menu of the conventional e-mail management program such as Outlook as shown in Fig. 7, sets up a delete method through the setup menu and creates a pattern for complete delete. Fig. 11 is a flowchart showing a method in accordance with the first embodiment of the present invention.
In brief, according to the method of the first embodiment, when the complete delete menu is called by the user, the e-mail is analyzed and divided into a header region and a data region. The location of the e-mail is searched in the e-mail management file. When the location of the e-mail is extracted, overwrite is performed on the location based on the complete delete pattern or random pattern selected by the user. When overwrite is completed, the e-mail region is removed from the file and the work is completed.
The first embodiment will be described in detail with reference to Fig. 11. When the operation processing means detects at step S101 that a complete delete command is issued to the e-mail selected by the user, the operation processing means provides a delete option for user’s selection or applies a selected method at step S102. The delete option includes options including whether the user directly inputs the overwrite pattern or whether the random pattern is adopted. Also, the overwrite method indicates any one of the pattern creation methods for overwrite, which is used in complete delete algorithms such as Gutmann and DOD 5220.
The operation processing means accesses to the message storage at step S104, sequentially brings an e-mail region and an attached file region at steps S104 and S105, sets up an e-mail location at step S106, and creates and forms a random pattern or a user pattern at step S107 according to the method set up at the S102. The operation processing means overwrites the set up e-mail region and attached file region with the formed pattern at step S108 such that original contents such as message contents and attached files are completely substituted. As described above, the e-mail selected for complete delete is completely overwritten with the random pattern or the user pattern and stored in the original e-mail location at step S109. The complete delete process is completed by calling an original delete routine at step S110 and deleting the e-mail selected in the e-mail management file.
According to the conventional delete method, only the header of the e-mail is deleted as indicated in dotted arrow in Fig. 11. However, according to the complete delete method of the present invention, since the header is deleted after searching the location of the e-mail message and the attached file and overwriting the e-mail to be deleted with a specific pattern, i.e., a random pattern or a user pattern, only the overwritten e-mail in the deleted e-mail file may be recovered. Accordingly, a possibility that e-mail contents, attached file contents, and personal information are disclosed from the original copy of the e-mail is essentially eliminated.
A method according to the second embodiment will be described below. The method according to the second embodiment is a method for providing a complete delete command alternately or additionally to the existing delete command in the e-mail and schedule management program. Fig. 12 is a flowchart showing the method according to the second embodiment.
In brief, the method according to the second embodiment is a plug-in method same as the first embodiment by the procedure of calling the menu. However, there is a difference in the procedures of performing overwrite and removing the contents from the e-mail management file. When the contents are selected, the region is overwritten by directly accessing to the e-mail management file and analyzing and tracing the location of the selected e-mail. Subsequently, the region is removed from the e-mail management file.
The second embodiment will be described in detail with reference to Fig. 12. The steps S201 and S202 of the second embodiment correspond to the steps S101 and S102 of the first embodiment, respectively. Since the operations performed in the corresponding steps are the same, description on the same operations will not be provided here. After performing the same operations, the stored region of the e-mail selected to be completely deleted is traced at step S204 by directly accessing to the e-mail management file and performing analysis at step S203. When the selected e-mail region is traced, the set up pattern is formed on the region at step S205 and the selected region is overwritten at step S206. A link on the region is reset in the e-mail management file at step S207. In the process of resetting the e-mail management file, the selected e-mail is processed as a deleted file. A logic flow goes to the end after reloading the e-mail management file at step S208.
That is, the method of the second embodiment is the same as that of the first embodiment in that recovery of the original copy may be essentially prevented by overwriting a specific pattern on the e-mail to be completely deleted. The first embodiment has procedures of locating the e-mail to be completely deleted to a surplus memory region, overwriting and relocating the e-mail to the original region, and storing the e-mail. On the other hand, in the second embodiment, as soon as the e-mail to be completely deleted is found, the e-mail is directly overwritten in the location.
The method according to the third embodiment will be described hereinafter.
The third embodiment is similar to the first and second embodiments but adopts a method using a duplicate copy in a part to be overwritten. Fig. 13 is a flowchart showing the method according to the third embodiment.
In brief, the method according to the third embodiment is similar to the methods according to the first and second embodiments but adopts the method using a duplicate copy in a part to be overwritten. A duplicate copy is made in a specific location and the entire original copy is deleted according to the delete pattern. Subsequently, a new e-mail file is formed from the duplicate copy in the original file location. When the formation is completed, the duplicate copy location is completely deleted by overwriting the duplicate copy.
The third embodiment will be described in detail with reference to Fig. 13. Steps S301 and S302 of the third embodiment correspond to the steps S101 and S102 of the first embodiment or the steps S201 and S202 of the second embodiment, respectively. Since the operations of the corresponding steps are the same, description will not be provided here. After performing the operations of the steps S301 and S302, a duplicate copy of the e-mail management file is formed at step S303. An overwritten pattern is formed according to the set up method at step S304 and the entire original copy of the e-mail management file is overwritten with the formed pattern at step S305. After procedures of analyzing and tracing the duplicate copy at step S306, recognizing an e-mail region selected to be completely deleted, and overwriting the region except the selected region with the original copy at step S307, an original file is formed at step S308. That is, the duplicate copy is the same as the initial original copy and the original copy is entirely overwritten with a specific pattern. Accordingly, when the original copy is overwritten with the duplicate copy except the selected e-mail, the selected e-mail region remains in a specific pattern and the contents of the residual region become the same as the original copy. In the step of forming the original file, the selected e-mail is treated to be deleted. The logic flow goes to the end after forming the original copy of the e-mail management file, completely deleting the copy at step S309, and reloading the original copy of the newly formed e-mail management file at step S310. Completely deleting the copy of the step S309 may be performed according to the conventional methods such as Gutmann and DOD 5220.
A method according to a fourth embodiment will be described. The methods according to the first to third embodiments adopt a method for an operation in the plug-in format of the conventional e-mail management program, e.g., Outlook and Eudora. However, the method according to the fourth embodiment is a method for an operation as a program, which is independent from the e-mail program and Fig. 13 is a flowchart showing the method according to the fourth embodiment.
In brief, the fourth embodiment is used in an e-mail management program operating as an independent processor and adopts a method for completely deleting own e-mail management file or other e-mail management files selected by the user. When the e-mail management file is searched by the user and a specific e-mail management file is selected, the selected e-mail management file is analyzed according to a protocol used in each e-mail management program. When the analysis is completed, contents of the e-mail file are listed to the user through the analyzed contents. When an e-mail delete command of the user on the selected e-mail is called, i.e., when a command for partially or entirely deleting the e-mail is called, the region is deleted according to the setup pattern or the entire e-mail management file is deleted. When the entire e-mail file is deleted, the e-mail management file is completely removed from a file table managed by the operating system.
Since the method according to the fourth embodiment operates as the program, which is independent from the e-mail program, the first to third embodiments may adopt any one of the applied e-mail management methods. For example, when a user A uses Outlook and a user B uses Eudora in one computer shared by the users A and B, the users A and B need to install plug-in for Outlook and plug-in for Eudora, respectively, according to the method of the first to third embodiments. However, in case of the fourth embodiment, only one program realized by the fourth embodiment is required to be installed.
The fourth embodiment will be described in detail with reference to Fig. 14. When a search command by the user is detected by an operation processing means at step S401, the operation processing means recognizes at step S402 that a drive is selected by user input and sequentially performs scan of the selected drive at step S403 and scan of file and directory at step S404. The operation processing means determines the type of the files at step S405 by analyzing the searched file. To be specific, an e-mail file format used in the e-mail management program used by the user is checked at the step S405 whether the e-mail file is for Outlook or Eudora. When the e-mail file is not searched by the operation processing means at step S406-No, the logic flow goes to the end. When the e-mail file is searched at step S406-Yes, the e-mail management file is analyzed according to the type of the e-mail file at step S407.
Any one embodiment selected from the first to third embodiments is performed in the same manner at step S408. That is, when the e-mail to be completely deleted is selected by the user and a complete delete command is issued, the selected e-mail is moved to the surplus memory region like the first embodiment, pattern overwrite is performed on the e-mail region. After storing the e-mail, the complete delete process finishes by removing the header according to the delete routine (see Fig. 15). Otherwise, the complete delete process finishes by directly accessing to the e-mail management file, tracing the e-mail region, overwriting the region and resetting the management file link like the second embodiment (Fig. 16). It is also possible to finish the complete delete process by copying the e-mail management file, performing pattern overwrite on the original copy, re-overwriting the duplicate copy on the original copy after removing selected e-mail region, and completely deleting the duplicate copy (see Fig. 17) like the third embodiment.
The method according to the fifth embodiment will be described hereinafter. The method according to the fifth embodiment is a method that the user completely deletes own e-mail information directly, by scheduling or automatically according to the user command or setup on the files such as an e-mail or a remote fileserver stored in the remote region by the server. Fig. 18 is a flowchart showing a method according to the fifth embodiment.
In brief, the method according to the fifth embodiment is a method for calling a module for overwriting an e-mail location with a specific pattern in a part where the file stored in the e-mail server is deleted, a part deleted by the user’s command, and an automatically deleted part after finishing transmission when an e-mail stored in an e-mail hosting server is transmitted to the PC through a network protocol.
That is, the first to fourth embodiments are the methods for managing the e-mail file stored in own PC by the user and the fifth embodiment is an e-mail file management method in the e-mail server. Accordingly, in the first to fourth embodiments, a subject of each operation is an operation processing means realized as PC. In the fifth embodiment, an operation by the operation processing means realized as PC and an operation by the operation processing means realized as an e-mail server should be divided. The operation processing means realized as the PC, i.e., a client computer, is called a first operation processing means and the operation processing means realized as the e-mail server is called a second operation processing means, i.e., a server computer.
The fifth embodiment will be described in detail with reference to Fig. 18. These contents are applicable to the e-mail, i.e., a mail server, and the file, i.e., a remote fileserver server. When the first operation processing means performs contents reception of the user by using the embedded e-mail management program or remote fileserver management program at step S501, fetch is performed according to a contents fetch protocol at step S502 and a command requesting contents reception through a network is transmitted at step S503. The contents reception request message transmitted from the first operation processing means is transmitted to the second operation processing means, i.e., the server, at step S504. The second operation processing means searches server storage at step S505 and transmits the contents to the first operation processing means at step S506. A delete command is issued to the contents by the second operation processing means at step S507. Generally, servers such as POP3 and IMAP, i.e., the second operation processing means in the fifth embodiment, transmits the e-mail to the client, i.e., the first operation processing means in the fifth embodiment, and the server is set up to automatically delete the e-mail. As described above, the contents are deleted after complete transmission of the contents, deleted after issuing of user’s delete command, or automatically deleted. In case that the contents are deleted by the conventional delete method, i.e., the method for removing only the header, of the delete methods, there is a problem that information is disclosed due to residual data. In the present invention, the second operation processing means performs pattern overwrite on the original contents at step S508 and deletes the original contents at step S509. Accordingly, although data are recovered by hacking into the server, the original e-mail overwritten with the pattern is recovered, to thereby essentially prevent disclose of personal information or confidential matters.
The second operation processing means prepares a delete result including contents that the original e-mail is completely deleted and transmits the delete result to the user at step S510. The first operation processing means receives the contents through a network based on the embedded e-mail management program or remote fileserver management program at step S511, adds the contents to the management file at step S512, and notifies to the user at step S513 that the contents arrive. When the second operation processing means is a web e-mail server or a remote fileserver server, the operation for notification to the user may not be performed.
As described above, the message is deleted according to a delete command by the user and an automatic delete command in the server after transmitting the e-mail to the user client in the e-mail server. According to the present invention, outflow of user’s personal information or confidential information may be essentially prevented by completely deleting the e-mail in the server through the steps S508 to S510. With no regard to user’s request, when spam e-mails or e-mails having a virus are searched by automatically examining the server, relevant e-mails are selected as an e-mail to be completely deleted and completely deleted through the steps S508 to S510 and a delete result is transmitted to the user.
The present application contains subject matter related to Korean Patent Application No. 2008-0064328, filed in the Korean Intellectual Property Office on July 03, 2008, the entire contents of which is incorporated herein by reference.
While the present invention has been described with respect to the specific embodiments, it will be apparent to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the following claims.

Claims (12)

  1. A method for managing e-mails and remote files in local and remote regions which are operated by an operation processing means including a personal computer (PC), an e-mail server, and a remote fileserver server,
    wherein when a delete request on the e-mail is detected by the operation processing means, the e-mail is deleted by searching a storing location of a single file of the e-mail or a storing location of the e-mails selected in the inside of a management file managed as a single file or a plurality of files and overwriting a string of a specific pattern on the location.
  2. The method of claim 1, wherein the file management method in the local and remote regions is realized in a plug-in format of any one e-mail management program selected from common, free and share e-mail management programs including Outlook or Eudora and operates a selective menu of the e-mail management program by the operation processing means.
  3. The method of claim 2, wherein the file management method in the local and remote regions includes:
    detecting that e-mails are selected and detecting a complete delete request on the selected e-mail in the operation processing means;
    detecting that a delete option and a delete method are selected in the operation processing means;
    accessing to e-mail storage and sequentially fetching an e-mail region and an attached file region of the selected e-mail in the operation processing means;
    locating the fetched e-mail and attached file in the operation processing means;
    forming an overwrite pattern according to the set up delete option and method in the operation processing means;
    overwriting a completely created pattern string on the entire region of the e-mail and attached file located on a memory in the operation processing means;
    storing the overwritten e-mail and attached file in e-mail storage in the operation processing means; and
    deleting a header of the selected e-mail and removing the e-mail from the e-mail management file in the operation processing means.
  4. The method of claim 2, wherein the file management method in the local and remote regions includes:
    detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means;
    detecting that a delete option and a delete method are selected in the operation processing means;
    analyzing an e-mail management file and tracing a selected e-mail region in the operation processing means;
    forming an overwrite pattern according to the set up the delete option or method in the operation processing means;
    overwriting a completely created pattern string on the traced e-mail region in the operation processing means; and
    resetting a link of the e-mail management file and reloading the e-mail management file in the operation processing means.
  5. The method of claim 2, wherein the file management method in the local and remote regions includes:
    detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means;
    detecting that a delete option and a delete method are selected in the operation processing means;
    creating a duplicate copy of the e-mail management file in the operation processing means;
    forming an overwrite pattern according to a delete option or method in the operation processing means;
    overwriting a completely created pattern string on an original copy of the e-mail management file in the operation processing means;
    analyzing the e-mail management file copy and tracing the selected e-mail region in the operation processing means;
    overwriting the original copy of the e-mail management file with the e-mail management file copy except the selected e-mail region in the operation processing means;
    reforming the original copy of the e-mail management file overwritten by the duplicate copy in the operation processing means; and
    deleting the duplicate copy and reloading the e-mail management file in the operation processing means.
  6. The method of claim 2, wherein the plug-in is installed by accessing to a server for distributing the plug-in and downloading the plug-in in the operation processing means and the plug-in is updated regularly or irregularly by the operation processing means.
  7. The method of claim 1, wherein the file management method in the local and remote regions is realized as an e-mail management program independent from another e-mail management program and operated by the operation processing means.
  8. The method of claim 7, wherein the file management method in the local and remote regions includes:
    detecting a search request command of a user in the operation processing means;
    detecting a drive selection command of the user in the operation processing means;
    sequentially performing drive scan and file and directory scan in the operation processing means;
    analyzing the file and checking a format of the e-mail file stored in the selected drive in the operation processing means;
    analyzing an e-mail management file when existence of the e-mail file is checked in the operation processing means; and
    detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail in the operation processing means.
  9. The method of claim 8, wherein said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes:
    detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means;
    detecting that a delete option and a delete method are selected in the operation processing means;
    accessing to e-mail storage and sequentially fetching an e-mail region and an attached file region of the selected e-mail in the operation processing means;
    locating the fetched e-mail and attached file in the operation processing means;
    forming an overwrite pattern according to the set up delete option and method in the operation processing means;
    overwriting a completely created pattern string on the entire region of the e-mail and attached file located on a memory in the operation processing means;
    storing the overwritten e-mail and attached file in e-mail storage in the operation processing means; and
    deleting a header of the selected e-mail and removing the e-mail from the e-mail management file in the operation processing means.
  10. The method of claim 8, wherein said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes:
    detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means;
    detecting that a delete option and a delete method are selected in the operation processing means;
    analyzing an e-mail management file and tracing a selected e-mail region in the operation processing means;
    forming an overwrite pattern according to the set up the delete option or method in the operation processing means;
    overwriting a completely created pattern string on the traced e-mail region in the operation processing means; and
    resetting a link of the e-mail management file and reloading the e-mail management file in the operation processing means.
  11. The method of claim 8, wherein said detecting that the e-mail to be completely deleted is selected and completely deleting the e-mail includes:
    detecting that an e-mail is selected and detecting a complete delete request on the selected e-mail in the operation processing means;
    detecting that a delete option and a delete method are selected in the operation processing means;
    creating a duplicate copy of the e-mail management file in the operation processing means;
    forming an overwrite pattern according to a delete option or method in the operation processing means;
    overwriting a completely created pattern string on an original copy of the e-mail management file in the operation processing means;
    analyzing the e-mail management file copy and tracing the selected e-mail region in the operation processing means;
    overwriting the original copy of the e-mail management file with the e-mail management file copy except the selected e-mail region in the operation processing means;
    reforming the original copy of the e-mail management file overwritten by the duplicate copy in the operation processing means; and
    deleting the duplicate copy and reloading the e-mail management file in the operation processing means.
  12. The method of claim 1, wherein the file management method in the local and remote regions includes:
    detecting a contents reception command in a first operation processing means realized as a client computer;
    transmitting the contents reception command to a second operation processing means realized as a server computer through a network according to a contents fetch protocol in the first operation processing means;
    when the contents reception command is received from the first operation processing means in the second operation processing means, searching server storage in the second operation processing means and transmitting relevant original contents to the first operation processing means;
    when the delete command on the transmitted original contents is detected in the second operation processing means, performing pattern overwrite on the original contents;
    deleting the transmitted original contents in the second operation processing means;
    transmitting delete result contents describing that the transmitted original contents are completely deleted in the second operation processing means;
    receiving the transmitted original contents and delete result contents through Internet in the first operation processing means; and
    adding the received contents to the management file in the first operation processing means.
PCT/KR2009/001527 2008-04-11 2009-03-25 Method for managing e-mails and remote files in local and remote regions WO2009125933A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2008-0033428 2008-04-11
KR20080033428 2008-04-11
KR10-2008-0064328 2008-07-03
KR1020080064328A KR100883837B1 (en) 2008-04-11 2008-07-03 A local and remote file management method for e-mails and remote files

Publications (2)

Publication Number Publication Date
WO2009125933A2 true WO2009125933A2 (en) 2009-10-15
WO2009125933A3 WO2009125933A3 (en) 2009-12-30

Family

ID=40681682

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2009/001527 WO2009125933A2 (en) 2008-04-11 2009-03-25 Method for managing e-mails and remote files in local and remote regions

Country Status (2)

Country Link
KR (1) KR100883837B1 (en)
WO (1) WO2009125933A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101583009B1 (en) * 2013-12-30 2016-01-11 김철기 Method for deleting file on social network system and system for operating thereof

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1229489A (en) * 1997-06-17 1999-09-22 珀杜法尔玛Lp公司 Self-destructing document and E-mail messaging system
KR100380824B1 (en) * 2000-06-13 2003-04-18 주식회사 하우리 Method for Eternal Deletion of Saved file out of saving device in Computer and Record media recording said Method
US7818680B2 (en) * 2003-12-29 2010-10-19 International Business Machines Corporation Method for deleting related messages
KR20050112463A (en) * 2004-05-25 2005-11-30 정의석 Perpetual data deleting method for hard-disk
KR20070111076A (en) * 2006-05-16 2007-11-21 주식회사 더다인 The way how to delete hard disk data perfectly

Also Published As

Publication number Publication date
KR100883837B1 (en) 2009-02-17
WO2009125933A3 (en) 2009-12-30

Similar Documents

Publication Publication Date Title
JP4740502B2 (en) Method and system for managing information retention
CN1096166C (en) Configurable password integrity servers for use in shared resource environment
JP3969467B2 (en) Network system, transmission / reception method, transmission device, reception device, and recording medium
US7519984B2 (en) Method and apparatus for handling files containing confidential or sensitive information
CN1110166C (en) Propagating plain code word for multiple external registrations from one main registration
CN1756147B (en) Enforcing rights management through edge email servers
CN112262388A (en) Protecting Personal Identity Information (PII) using tagging and persistence of PII
EP2043073A1 (en) Method for encrypting and decrypting shared encrypted files
CN101211393A (en) Information processing apparatus and method for controlling resource access by application program
WO2018097521A1 (en) Method for duplexing database
WO2013145125A1 (en) Computer system and security management method
RU2759210C1 (en) System and method for protecting electronic documents containing confidential information from unauthorised access
WO2015034176A1 (en) Integrated document management system
CN112583918A (en) Intranet and extranet document interaction system, method and storage medium
JP4850159B2 (en) External device management system
JP2009026294A (en) Data security control system
WO2014084603A1 (en) Method for managing se applet in connection with application deletion, and mobile device and service management server using same
WO2009125933A2 (en) Method for managing e-mails and remote files in local and remote regions
US7949939B2 (en) Document processing and managing system, document processing-managing apparatus, document processing apparatus, document processing-managing method, document processing method and computer readable medium
JPH10111855A (en) Method and device for auditing communication data
JP2005165900A (en) Information leak prevention system
JP4087434B1 (en) Data security control system
JP4607023B2 (en) Log collection system and log collection method
JP2008234539A (en) Information processing apparatus, file processing method and program
JP4962050B2 (en) Information passing device, method, program, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09731376

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04/05/2011)

122 Ep: pct application non-entry in european phase

Ref document number: 09731376

Country of ref document: EP

Kind code of ref document: A2