WO2017009988A1 - Information processing device, data hiding method, and data hiding program - Google Patents

Information processing device, data hiding method, and data hiding program Download PDF

Info

Publication number
WO2017009988A1
WO2017009988A1 PCT/JP2015/070329 JP2015070329W WO2017009988A1 WO 2017009988 A1 WO2017009988 A1 WO 2017009988A1 JP 2015070329 W JP2015070329 W JP 2015070329W WO 2017009988 A1 WO2017009988 A1 WO 2017009988A1
Authority
WO
WIPO (PCT)
Prior art keywords
concealment
unit
user
target data
execution button
Prior art date
Application number
PCT/JP2015/070329
Other languages
French (fr)
Japanese (ja)
Inventor
楽 岳彦
康央 山田
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to JP2017528245A priority Critical patent/JPWO2017009988A1/en
Priority to PCT/JP2015/070329 priority patent/WO2017009988A1/en
Publication of WO2017009988A1 publication Critical patent/WO2017009988A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the present invention relates to an information processing apparatus, a data hiding method, and a data hiding program.
  • a user When using an application on a PC (Personal Computer) or the like, a user performs a function provided by the application by performing an operation of selecting a button, a link, or the like on an application window displayed by the application.
  • a PC Personal Computer
  • the user when using a groupware application, the user records the time of office entry on the time card by instructing the office office button on the application window.
  • the user displays and confirms the schedule of members of the same department by selecting a link to the schedule list on the application window.
  • the first confidentiality job information and the user identification information are received, the unprocessed second confidentiality job information corresponding to the user identification information is searched, and when the second confidentiality job information is present, There is a conventional technique for preventing forgetting to execute confidential job information by transmitting a message.
  • authentication processing is performed during preview display by transmitting authentication target information to the image processing apparatus and displaying the authentication result in the preview image display window.
  • the present invention aims to prevent forgetting to execute a specific function of an application.
  • an information processing apparatus disclosed in the present application is a display control that displays on a screen a window for accepting an encryption setting from a user for each target data indicating an electronic file or a folder in which the file is stored. A part.
  • the information processing apparatus displays an execution button on the screen for receiving an instruction to encrypt the target data when the window is closed in a state where the encryption of the target data is released.
  • An encryption unit is provided for encrypting the target data in response to an instruction from the execution button.
  • forgetting to execute a specific function of an application can be prevented.
  • FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment.
  • FIG. 2 is a diagram illustrating an example of the target information storage unit.
  • FIG. 3 is a diagram illustrating an example of the setting information storage unit.
  • FIG. 4 is a diagram illustrating an example of a registration screen.
  • FIG. 5 is a diagram showing a screen after registration.
  • FIG. 6 is a diagram illustrating a screen example when the user instructs a button for closing the dialog window in a state where there is a concealment target whose concealment state is “off”.
  • FIG. 7 is a diagram illustrating an example of a screen on which an execution button is displayed.
  • FIG. 8 is a diagram illustrating an instruction of an execution button by the user.
  • FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment.
  • FIG. 2 is a diagram illustrating an example of the target information storage unit.
  • FIG. 3 is a diagram illustrating an example of the setting
  • FIG. 9 is a diagram illustrating a screen when the process of the concealment unit is finished.
  • FIG. 10 is a diagram illustrating an example of a shortcut key registration screen.
  • FIG. 11 is a flowchart illustrating a processing flow by the concealment unit.
  • FIG. 12 is a flowchart illustrating a flow of setting processing by the setting unit.
  • FIG. 13 is a diagram illustrating a hardware configuration of the information processing apparatus that executes the concealment program according to the embodiment.
  • FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment.
  • the information processing apparatus 1 according to the embodiment includes a concealment unit 2 and a data storage unit 3.
  • the concealing unit 2 conceals the folder and file specified by the user so that they cannot be seen, or conversely restores the concealed folder and file to the original location. For example, the user conceals and stores folders and files that are not desired to be seen by others, and temporarily restores them only when he / she sees them.
  • the data storage unit 3 includes a non-hidden data storage unit 3a and a hidden data storage unit 3b.
  • the non-hidden data storage unit 3a stores non-hidden folder and file data together with folder hierarchy information.
  • the concealment data storage unit 3b stores the data of the folder and file designated to be concealed together with information on the location of the restoration destination.
  • the hidden data storage unit 3b may encrypt and store data based on the security level, or may encrypt and store only folder and file information without encrypting the data.
  • the data storage unit 3 is realized by using a nonvolatile storage device such as an HDD (Hard Disk Drive).
  • the concealing unit 2 includes a storage unit 2a that stores data necessary for concealing and restoring folders and files, and a control unit 2b that uses the data stored in the storage unit 2a to conceal and restore folders and files. .
  • the storage unit 2a includes a target information storage unit 2c and a setting information storage unit 2d.
  • the target information storage unit 2c stores information on folders and files to be concealed.
  • FIG. 2 is a diagram illustrating an example of the target information storage unit 2c. As illustrated in FIG. 2, the target information storage unit 2c stores an identifier, a restoration location, a type, a size, and a concealment state for each concealment target.
  • the identifier is the name of the folder or file to be hidden.
  • the restoration location is a path to a folder stored when the concealment target is restored.
  • the type indicates whether the concealment target is a folder or a file.
  • the size is the size of the folder or file to be concealed.
  • the concealment state indicates whether or not the folder or file to be concealed is in an encrypted concealed state. If the concealed state is concealed, it is “on” and the concealed state is not concealed. Is "off".
  • a hidden object whose name is Document is a folder stored under C: ⁇ Users ⁇ YAMADA03 ⁇ Desktop ⁇ MySecret when restored, and its size is 679 MB (megabytes), and is not hidden It is in.
  • the setting information storage unit 2d stores information set for the concealment unit 2.
  • FIG. 3 is a diagram illustrating an example of the setting information storage unit 2d. As shown in FIG. 3, the setting information storage unit 2d stores information including shortcut keys, security levels, and retention periods.
  • the shortcut key is a key that the user inputs instead of instructing an execution button described later.
  • the security level indicates whether or not the data is encrypted, and is “data” when the data is encrypted, and is “name” when only the name is encrypted without encrypting the data.
  • the retention period is a period for storing the concealed data.
  • the control unit 2b includes an authentication unit 21, a management unit 22, an encryption unit 23, a decryption unit 24, and a prevention unit 25.
  • the authenticating unit 21 authenticates a user who uses the function of the concealing unit 2. Only the user who is permitted by the authentication can access the concealment object using the concealment unit 2.
  • the management unit 22 displays a window for dialogue with the user on the display device, and performs dialogue with the user to perform registration and cancellation of the concealment target, setting for the concealment unit 2, and the like.
  • the management unit 22 includes a display control unit 22a, a registration unit 22b, a release unit 22c, and a setting unit 22d.
  • the display control unit 22a displays a window for interaction with the user on the display device and accepts an operation by the user.
  • the registration unit 22b registers a folder or file designated by the user as a concealment target. That is, the registration unit 22b stores information on a folder or file designated by the user in the target information storage unit 2c as a concealment target.
  • FIG. 4 is a diagram showing an example of a registration screen.
  • the display control unit 22a displays a dialog window 41 as shown in FIG.
  • the dialogue window 41 is a window for displaying a folder for concealment, and a list of folders and files already registered as a concealment target is displayed.
  • the “name” column indicates the name of the concealment target
  • the “type” column indicates whether the concealment target is a folder (file / folder) or a file
  • the “size” column indicates the concealment target.
  • the “hidden” column indicates the concealment state of the concealment target. For example, in FIG. 4, a file named Secretdoc is registered as a concealment target.
  • the dialog window 41 may be a window for displaying an encryption folder.
  • a list of folders and files already registered as encryption targets is displayed.
  • the “name” column indicates the name of the encryption target
  • the “type” column indicates whether the encryption target is a folder (file / folder) or a file
  • the “size” column indicates The size of the encryption target is shown
  • the “Hide” column shows the encryption status of the encryption target.
  • the concealment unit 2 performs encryption and restoration without concealing folders and files.
  • the user can register as a concealment target by dragging a folder or file into the dialog window 41.
  • the user can register as a concealment target by selecting a folder or file to be concealed and instructing a button 40 for instructing addition of a file / folder.
  • FIG. 4 shows a case where a folder named Document is dragged into the dialogue window 41 and registered as a concealment target.
  • FIG. 5 shows the screen after registration.
  • the registered document information is displayed in the registered data list.
  • the document concealment state is “off”
  • the document is not concealed.
  • the user can switch the concealment state from “off” to “on” or “on” to “off” by instructing the button 42 in the “hide” field to be concealed.
  • the concealment state is changed from “off” to “on”
  • the concealment object dragged to the dialog window 41 is erased from the original folder, and the icon 44 is erased from the display window 43 of the original folder.
  • an icon 44 is displayed in the display window 43 of the original folder.
  • the registration unit 22b When the user operates the concealment state from “off” to “on”, the registration unit 22b encrypts the concealment target and moves it from the non-concealed data storage unit 3a to the concealed data storage unit 3b. Also, when the concealment state is instructed from “on” to “off” by the user, the registration unit 22b decrypts the concealment target and moves it from the concealment data storage unit 3b to the original folder of the non-concealment data storage unit 3a. Transfer.
  • the release unit 22c releases the concealment of the folder or file. That is, the canceling unit 22c deletes information on the folder or file designated to be cancelled by the user from the target information storage unit 2c. In addition, when the folder or file designated to be released by the user is concealed, the canceling unit 22c decrypts the folder or file and restores the original folder of the non-hidden data storage unit 3a from the concealed data storage unit 3b. Move down.
  • the user can cancel the concealment of the folder or file by selecting the cancellation target from the dialog window 41 shown in FIG. 5 and instructing the button 45 displayed as “Registration cancellation”. Further, the user can turn on all the objects to be concealed by instructing the button 46 displayed as “Hide All”.
  • the setting unit 22d sets the concealment unit 2 based on a user instruction. Specifically, the setting unit 22d stores, in the setting information storage unit 2d, shortcut keys, security levels, retention periods, and the like designated by the user.
  • the encryption unit 23 encrypts a folder or file whose concealment state is instructed from “off” to “on” by the user.
  • the encryption unit 23 encrypts data based on the security level, or encrypts the name of the folder or file without encrypting the data.
  • the decryption unit 24 decrypts a folder or file whose concealment state is instructed from “on” to “off” by the user.
  • the decrypting unit 24 decrypts the data based on the security level, or decrypts the name of the folder or file without decrypting the data.
  • the prevention unit 25 By checking with the user, forgetting to hide is prevented.
  • the prevention unit 25 displays an execution button on the display device when the user closes the dialog window 41 while there is a concealment target whose concealment state is “off”.
  • the concealed object whose concealment state is “off” is encrypted and transferred from the non-concealed data storage unit 3a to the concealed data storage unit 3b.
  • the user sets a folder or file that is not desired to be seen by others as a concealment target, decrypts it only when the user uses it, encrypts the concealment target when the use ends, and ends the processing of the concealment unit 2. Therefore, when the user closes the dialog window 41 while there is a concealment target whose concealment state is “off”, it is highly likely that the user has forgotten to encrypt the concealment target. Therefore, the prevention unit 25 prevents the user from forgetting to hide by displaying an execution button.
  • the prevention unit 25 includes a determination unit 25a, a button display unit 25b, and an execution unit 25c.
  • the determination unit 25a determines whether or not there is a concealment target whose concealment state is “off”, and if not, ends the process of the concealment unit 2; If there is, the button display unit 25b is instructed to display an execution button.
  • the button display unit 25b displays an execution button in the lower right corner of the screen.
  • the button display unit 25b ends the process of the concealing unit 2 when a predetermined time has elapsed after the execution button is displayed.
  • the execution unit 25c encrypts the concealment target whose concealment state is “off” and moves it from the non-concealment data storage unit 3a to the concealment data storage unit 3b.
  • FIG. 6 is a diagram illustrating a screen example when the user instructs the button 47 for closing the dialog window 41 in a state where there is a concealment target whose concealment state is “off”. As shown in FIG. 6, when there is a document whose “hide” field is “off”, the user instructs the button 47 that displays “close” nearby when the cursor is placed, and displays the dialog window 41. Close.
  • FIG. 7 is a diagram showing an example of a screen on which an execution button is displayed.
  • the dialog window 41 shown in FIG. 6 is closed, and an execution button 48 displayed as “execute” is displayed in the lower right corner of the screen.
  • the execution button 48 is displayed on the screen, and accepts an input of a process of encrypting a concealment target whose concealment state is “OFF” and transferring it from the non-concealed data storage unit 3a to the concealed data storage unit 3b.
  • the execution button 48 receives an input of the processing by being designated with a mouse cursor or being touched with a finger.
  • the execution button 48 is not limited to an image including the characters “execute”.
  • the execution button 48 may be displayed on the screen as an image that does not include color, grayscale, black and white, and transparent characters.
  • an image such as a wallpaper on which the execution button 48 is superimposed is displayed in the area where the execution button 48 is arranged.
  • the execution button 48 is displayed in the lower right corner of the screen.
  • the execution button 48 may be displayed in other places such as the lower left corner of the screen, the upper right corner of the screen, and the upper left corner of the screen.
  • the display device has a touch panel. Then, the electrostatic sensor of the touch panel detects whether or not a finger (an example of an indicator) has approached from the amount of change in capacitance.
  • the execution button 48 is arranged at the corner of the screen where the approach or contact has occurred. Thereby, when the user holds the information processing apparatus 1, the execution button 48 can be arranged within the reach of the finger.
  • FIG. 8 is a diagram showing an instruction of the execution button 48 by the user.
  • the execution button 48 When the execution button 48 is instructed by the user, the concealment object whose concealment state is “off” is encrypted and transferred from the non-concealment data storage unit 3a to the concealment data storage unit 3b, and the processing of the concealment unit 2 ends.
  • the execution unit 25c determines whether the position indicated by the user's finger detected by the touch panel or the position indicated by the mouse cursor is within the area of the execution button 48. When the execution unit 25c determines that the designated position is within the area, the concealment target whose concealment state is “off” is encrypted and transferred from the non-concealment data storage unit 3a to the concealment data storage unit 3b. It is.
  • FIG. 9 is a diagram showing a screen when the process of the concealment unit 2 is completed. As shown in FIG. 9, since the document whose concealment state is “off” is encrypted and transferred from the non-concealed data storage unit 3a to the concealed data storage unit 3b, from C: ⁇ Users ⁇ YAMADA03 ⁇ Desktop ⁇ MySecret Document has been deleted.
  • FIG. 10 is a diagram illustrating an example of a shortcut key registration screen.
  • “Ctrl + Alt + T” is registered as a shortcut key.
  • FIG. 11 is a flowchart showing a flow of processing by the concealment unit 2.
  • the concealing unit 2 displays a dialog window 41 and displays a list of concealment targets (step S1).
  • the concealing unit 2 receives a user operation such as registration of the concealment target and decryption of the concealment target (step S2), and performs corresponding processing.
  • step S3 when the user instructs the button 47 for closing the dialog window 41, the concealing unit 2 closes the dialog window 41 (step S3). Then, the concealing unit 2 determines whether or not all the concealment states of the concealment target are “on” (step S4). If all the concealment states are “on”, the process ends.
  • the concealment unit 2 displays an execution button 48 (step S5). Thereafter, when the user instructs the execution button 48 or inputs a shortcut key, the concealing unit 2 receives the instruction or shortcut key of the execution button 48 (step S6).
  • the concealment unit 2 performs encryption for all the concealment objects whose concealment state is “OFF” (step S7), and moves the concealment object from the non-concealment data storage unit 3a to the concealment data storage unit 3b. And the concealment part 2 complete
  • the concealing unit 2 displays the execution button 48 when there is a concealment target whose concealment state is “off”. It is possible to prevent forgetting to hide.
  • the dialog window 41 is a window for displaying an encryption folder
  • the flow of processing by the concealment unit 2 is set to “encryption target” as “encryption target” and “concealment state” in the flowchart of FIG. It is replaced with “encrypted state”. Further, the process of moving the encryption target from the non-hidden data storage unit 3a to the hidden data storage unit 3b becomes unnecessary.
  • FIG. 12 is a flowchart showing a flow of setting processing by the setting unit 22d.
  • the setting unit 22d determines whether or not the setting operation by the user is a shortcut key setting (step S11). If the setting operation is a shortcut key setting, the shortcut key is stored as setting information. Store in the part 2d (step S12).
  • the setting unit 22d determines whether or not the setting operation by the user is a security level setting (step S13), and if it is a security level setting, the security level is set. Is stored in the setting information storage unit 2d (step S14).
  • the setting unit 22d determines whether or not the setting operation by the user is a setting of a retention period (step S15). Is stored in the setting information storage unit 2d (step S16). On the other hand, if the retention period is not set, the setting unit 22d performs another setting process corresponding to the user operation (step S17).
  • the setting unit 22d can set the concealing unit 2 by storing the setting information in the setting information storage unit 2d based on the setting operation by the user.
  • the management unit 22 displays the window 41 for dialogue with the user on the display device, and performs dialogue with the user to register and release the concealment target, set the concealment unit 2, and the like.
  • the user closes the dialog window 41 and ends the process of the concealment unit 2 in a state where there is a concealment target whose concealment state is “off” among the concealment targets displayed in the dialog window 41
  • the prevention unit 25 The execution button 48 is displayed to let the user notice that there is a concealment target whose concealment state is “off”.
  • the prevention unit 25 hides the concealment target whose concealment state is “off”. Therefore, the concealment unit 2 can prevent the user from forgetting to conceal and can prevent a highly confidential folder and file from being seen by others.
  • the prevention unit 25 displays the execution button 48 in the lower right corner of the display device, the execution button 48 can be displayed without interfering with other displays.
  • the management unit 22 displays the dialog window 41 with the user on the display device, and the user registers the object as a concealment object by dragging the folder or file into the dialog window 41. Therefore, the user can register the concealment target with a simple operation.
  • the prevention unit 25 receives an input of a shortcut key instead of an instruction of the execution button 48 by the user. Therefore, the user can perform concealment without performing an operation on the screen, and can perform concealment without being noticed by others viewing the screen.
  • FIG. 13 is a diagram illustrating a hardware configuration of the information processing apparatus 1 that executes the concealment program according to the embodiment.
  • the information processing apparatus 1 includes a main memory 51, a CPU 52, a LAN (Local Area Network) interface 53, and an HDD 54.
  • the information processing apparatus 1 includes a super IO (Input Output) 55, a DVI (Digital Visual Interface) 56, and an ODD (Optical Disk Drive) 57.
  • the main memory 51 is a memory for storing a program and a program execution result.
  • the CPU 52 is a central processing unit that reads a program from the main memory 51 and executes it.
  • the CPU 52 includes a chip set having a memory controller.
  • the LAN interface 53 is an interface for connecting the information processing apparatus 1 to another information processing apparatus via a LAN.
  • the HDD 54 is a disk device that stores programs and data
  • the super IO 55 is an interface for connecting an input device such as a mouse or a keyboard.
  • the DVI 56 is an interface for connecting a liquid crystal display device
  • the ODD 57 is a device for reading / writing a DVD.
  • the LAN interface 53 is connected to the CPU 52 by PCI Express (PCIe), and the HDD 54 and ODD 57 are connected to the CPU 52 by SATA (Serial Advanced Technology Attachment).
  • the super IO 55 is connected to the CPU 52 by LPC (Low Pin Count).
  • the concealment program executed in the information processing apparatus 1 is stored in the DVD, read from the DVD by the ODD 57, and installed in the information processing apparatus 1.
  • the concealment program is stored in a database or the like of another information processing system connected via the LAN interface 53, read from these databases, and installed in the information processing apparatus 1.
  • the installed concealment program is stored in the HDD 54, read into the main memory 51, and executed by the CPU 52.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A management unit (22) displays, on a display device, a window for dialog with a user, and performs registration and deregistration of a subject to be hidden, settings on a hiding unit (2), and other such operations through dialog with the user. When the user closes the window for dialog and terminates the processing of the hiding unit (2) while a subject to be hidden having a hiding state of "off" is present among the subjects to be hidden that are displayed on the window for dialog, a prevention unit (25) displays an execution button, making the user aware of the presence of a subject to be hidden having a hiding state of "off." Then, when the user designates the execution button, the prevention unit (25) hides the subject to be hidden having a hiding state of "off."

Description

情報処理装置、データ隠蔽方法及びデータ隠蔽プログラムInformation processing apparatus, data hiding method, and data hiding program
 本発明は、情報処理装置、データ隠蔽方法及びデータ隠蔽プログラムに関する。 The present invention relates to an information processing apparatus, a data hiding method, and a data hiding program.
 PC(Personal Computer:パソコン)等でアプリケーションを利用する場合、ユーザは、アプリケーションが表示するアプリケーションウィンドウ上でボタン、リンク等を選択する操作を行うことで、アプリケーションが提供する機能を実行する。 When using an application on a PC (Personal Computer) or the like, a user performs a function provided by the application by performing an operation of selecting a button, a link, or the like on an application window displayed by the application.
 例えば、グループウェアのアプリケーションを利用する場合、ユーザは、アプリケーションウィンドウ上の出社ボタンを指示することで、タイムカードに出社時刻を記録する。あるいは、ユーザは、アプリケーションウィンドウ上でスケジュール一覧へのリンクを選択することで、同じ部署のメンバーのスケジュールを表示して確認する。 For example, when using a groupware application, the user records the time of office entry on the time card by instructing the office office button on the application window. Alternatively, the user displays and confirms the schedule of members of the same department by selecting a link to the schedule list on the application window.
 なお、デジタル複合機が、セキュリティプリントジョブ一覧画面に含まれるソフトウェアキーの指示を検出すると、セキュリティプリントジョブ一覧を用いて選択されたセキュリティプリントジョブを実行させる従来技術がある。 Note that there is a conventional technique for executing a security print job selected using a security print job list when the digital multi-function peripheral detects a software key instruction included in the security print job list screen.
 また、第1の機密性ジョブ情報及びユーザ識別情報を受信し、ユーザ識別情報に対応する未処理の第2の機密性ジョブ情報を検索し、第2の機密性ジョブ情報が存在する場合にその旨を送信することで、機密性ジョブ情報の実行し忘れを防止する従来技術がある。 In addition, the first confidentiality job information and the user identification information are received, the unprocessed second confidentiality job information corresponding to the user identification information is searched, and when the second confidentiality job information is present, There is a conventional technique for preventing forgetting to execute confidential job information by transmitting a message.
 また、画像処理装置での画像処理後の状態を示すプレビュー画像を表示させる場合、被認証情報を画像処理装置に送信して認証結果をプレビュー画像の表示ウィンドウに表示させることでプレビュー表示時に認証処理の成功/失敗の確認を可能とする従来技術がある。 Also, when displaying a preview image indicating the state after image processing in the image processing apparatus, authentication processing is performed during preview display by transmitting authentication target information to the image processing apparatus and displaying the authentication result in the preview image display window. There is a conventional technique that enables confirmation of success / failure of the system.
特開2007-98786号公報JP 2007-98786 A 特開2005-144993号公報JP 2005-144993 A 特開2011-145907号公報JP 2011-145907 A
 PC等でアプリケーションを利用する場合、ユーザがアプリケーションの特定の機能を実行し忘れてアプリケーションウィンドウを閉じてしまうと、実行し忘れた機能によってはユーザが不利益を被るという問題がある。 When using an application on a PC or the like, if the user forgets to execute a specific function of the application and closes the application window, there is a problem that the user suffers a disadvantage depending on the function forgot to execute.
 例えば、グループウェアのアプリケーションにおいて、ユーザがアプリケーションウィンドウ上の帰社ボタンを指示し忘れてアプリケーションウィンドウを閉じると、タイムカードに帰社時刻が記録されない。このため、ユーザは、勤務時間を証明する手段を失うという不利益を被る。 For example, in a groupware application, if the user forgets to specify the return button on the application window and closes the application window, the return time is not recorded on the time card. For this reason, the user suffers the disadvantage of losing the means to prove working hours.
 本発明は、1つの側面では、アプリケーションの特定の機能の実行し忘れを防ぐことを目的とする。 In one aspect, the present invention aims to prevent forgetting to execute a specific function of an application.
 本願の開示する情報処理装置は、1つの態様において、電子的なファイル又は該ファイルが格納されるフォルダを示す対象データ毎に、暗号化の設定をユーザから受け付けるウィンドウを画面上に表示させる表示制御部を備える。また、前記情報処理装置は、前記対象データの暗号化が解除された状態で前記ウィンドウが閉じられた場合に、該対象データを暗号化する指示を受け付ける実行ボタンを前記画面上に表示させると共に、該実行ボタンの指示に応じて該対象データを暗号化する暗号化部を備える。 In one aspect, an information processing apparatus disclosed in the present application is a display control that displays on a screen a window for accepting an encryption setting from a user for each target data indicating an electronic file or a folder in which the file is stored. A part. The information processing apparatus displays an execution button on the screen for receiving an instruction to encrypt the target data when the window is closed in a state where the encryption of the target data is released. An encryption unit is provided for encrypting the target data in response to an instruction from the execution button.
 1実施態様によれば、アプリケーションの特定の機能の実行し忘れを防ぐことができる。 According to one embodiment, forgetting to execute a specific function of an application can be prevented.
図1は、実施例に係る情報処理装置の機能構成を示す図である。FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment. 図2は、対象情報記憶部の一例を示す図である。FIG. 2 is a diagram illustrating an example of the target information storage unit. 図3は、設定情報記憶部の一例を示す図である。FIG. 3 is a diagram illustrating an example of the setting information storage unit. 図4は、登録画面の一例を示す図である。FIG. 4 is a diagram illustrating an example of a registration screen. 図5は、登録後の画面を示す図である。FIG. 5 is a diagram showing a screen after registration. 図6は、隠蔽状態が「オフ」の隠蔽対象がある状態でユーザが対話用ウィンドウを閉じるためのボタンを指示する場合の画面例を示す図である。FIG. 6 is a diagram illustrating a screen example when the user instructs a button for closing the dialog window in a state where there is a concealment target whose concealment state is “off”. 図7は、実行ボタンが表示された画面例を示す図である。FIG. 7 is a diagram illustrating an example of a screen on which an execution button is displayed. 図8は、ユーザによる実行ボタンの指示を示す図である。FIG. 8 is a diagram illustrating an instruction of an execution button by the user. 図9は、隠蔽部の処理が終了したときの画面を示す図である。FIG. 9 is a diagram illustrating a screen when the process of the concealment unit is finished. 図10は、ショートカットキーの登録画面の一例を示す図である。FIG. 10 is a diagram illustrating an example of a shortcut key registration screen. 図11は、隠蔽部による処理のフローを示すフローチャートである。FIG. 11 is a flowchart illustrating a processing flow by the concealment unit. 図12は、設定部による設定処理のフローを示すフローチャートである。FIG. 12 is a flowchart illustrating a flow of setting processing by the setting unit. 図13は、実施例に係る隠蔽プログラムを実行する情報処理装置のハードウェア構成を示す図である。FIG. 13 is a diagram illustrating a hardware configuration of the information processing apparatus that executes the concealment program according to the embodiment.
 以下に、本願の開示する情報処理装置、データ隠蔽方法及びデータ隠蔽プログラムの実施例を図面に基づいて詳細に説明する。なお、この実施例は開示の技術を限定するものではない。 Hereinafter, embodiments of an information processing apparatus, a data hiding method, and a data hiding program disclosed in the present application will be described in detail with reference to the drawings. Note that this embodiment does not limit the disclosed technology.
 まず、実施例に係る情報処理装置の機能構成について説明する。図1は、実施例に係る情報処理装置の機能構成を示す図である。図1に示すように、実施例に係る情報処理装置1は、隠蔽部2と、データ記憶部3とを有する。 First, the functional configuration of the information processing apparatus according to the embodiment will be described. FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment. As illustrated in FIG. 1, the information processing apparatus 1 according to the embodiment includes a concealment unit 2 and a data storage unit 3.
 隠蔽部2は、ユーザが指定したフォルダ及びファイルを隠蔽して見えないようにしたり、逆に隠蔽したフォルダ及びファイルを復元して元の場所に戻したりする。ユーザは、例えば、他人に見られたくないフォルダ及びファイルを隠蔽して保管し、自分が見るときだけ一時的に復元する。 The concealing unit 2 conceals the folder and file specified by the user so that they cannot be seen, or conversely restores the concealed folder and file to the original location. For example, the user conceals and stores folders and files that are not desired to be seen by others, and temporarily restores them only when he / she sees them.
 データ記憶部3は、非隠蔽データ記憶部3aと隠蔽データ記憶部3bとを有する。非隠蔽データ記憶部3aは、隠蔽されていないフォルダ及びファイルのデータをフォルダの階層関係の情報と共に記憶する。 The data storage unit 3 includes a non-hidden data storage unit 3a and a hidden data storage unit 3b. The non-hidden data storage unit 3a stores non-hidden folder and file data together with folder hierarchy information.
 隠蔽データ記憶部3bは、隠蔽を指定されたフォルダ及びファイルのデータを復元先の場所の情報と共に記憶する。隠蔽データ記憶部3bは、セキュリティレベルに基づいて、データを暗号化して記憶する場合と、データは暗号化することなくフォルダ及びファイルの情報だけを暗号化して記憶する場合がある。なお、データ記憶部3は、HDD(Hard Disk Drive)等の不揮発性の記憶装置を用いて実現される。 The concealment data storage unit 3b stores the data of the folder and file designated to be concealed together with information on the location of the restoration destination. The hidden data storage unit 3b may encrypt and store data based on the security level, or may encrypt and store only folder and file information without encrypting the data. The data storage unit 3 is realized by using a nonvolatile storage device such as an HDD (Hard Disk Drive).
 隠蔽部2は、フォルダ及びファイルの隠蔽及び復元に必要なデータを記憶する記憶部2aと、記憶部2aに記憶されたデータを用いてフォルダ及びファイルの隠蔽及び復元を行う制御部2bとを有する。 The concealing unit 2 includes a storage unit 2a that stores data necessary for concealing and restoring folders and files, and a control unit 2b that uses the data stored in the storage unit 2a to conceal and restore folders and files. .
 記憶部2aは、対象情報記憶部2cと、設定情報記憶部2dとを有する。対象情報記憶部2cは、隠蔽対象のフォルダ及びファイルの情報を記憶する。図2は、対象情報記憶部2cの一例を示す図である。図2に示すように、対象情報記憶部2cは、識別子、復元場所、種類、サイズ、隠蔽状態を隠蔽対象毎に記憶する。 The storage unit 2a includes a target information storage unit 2c and a setting information storage unit 2d. The target information storage unit 2c stores information on folders and files to be concealed. FIG. 2 is a diagram illustrating an example of the target information storage unit 2c. As illustrated in FIG. 2, the target information storage unit 2c stores an identifier, a restoration location, a type, a size, and a concealment state for each concealment target.
 識別子は、隠蔽対象のフォルダ又はファイルの名前である。復元場所は、隠蔽対象が復元されたときに格納されるフォルダへのパスである。種類は、隠蔽対象がフォルダであるかファイルであるかを示す。 The identifier is the name of the folder or file to be hidden. The restoration location is a path to a folder stored when the concealment target is restored. The type indicates whether the concealment target is a folder or a file.
 サイズは、隠蔽対象のフォルダ又はファイルの大きさである。隠蔽状態は、隠蔽対象のフォルダ又はファイルが暗号化されて隠蔽された状態にあるか否かを示し、隠蔽された状態である場合には「オン」であり、隠蔽されていない状態である場合には「オフ」である。 The size is the size of the folder or file to be concealed. The concealment state indicates whether or not the folder or file to be concealed is in an encrypted concealed state. If the concealed state is concealed, it is “on” and the concealed state is not concealed. Is "off".
 例えば、名前がDocumentである隠蔽対象は、復元されるとC:\Users\YAMADA03\Desktop\MySecretの下に格納されるフォルダであり、大きさは679MB(メガバイト)であり、隠蔽されていない状態にある。 For example, a hidden object whose name is Document is a folder stored under C: \ Users \ YAMADA03 \ Desktop \ MySecret when restored, and its size is 679 MB (megabytes), and is not hidden It is in.
 設定情報記憶部2dは、隠蔽部2に対して設定された情報を記憶する。図3は、設定情報記憶部2dの一例を示す図である。図3に示すように、設定情報記憶部2dは、ショートカットキー、セキュリティレベル、保持期間を含む情報を記憶する。 The setting information storage unit 2d stores information set for the concealment unit 2. FIG. 3 is a diagram illustrating an example of the setting information storage unit 2d. As shown in FIG. 3, the setting information storage unit 2d stores information including shortcut keys, security levels, and retention periods.
 ショートカットキーは、後述する実行ボタンを指示する代わりにユーザが入力するキーである。セキュリティレベルは、データを暗号化するか否かを示し、データを暗号化する場合には「データ」であり、データを暗号化することなく名前だけを暗号化する場合には「名前」である。保持期間は、隠蔽したデータを記憶する期間である。 The shortcut key is a key that the user inputs instead of instructing an execution button described later. The security level indicates whether or not the data is encrypted, and is “data” when the data is encrypted, and is “name” when only the name is encrypted without encrypting the data. . The retention period is a period for storing the concealed data.
 図3では、ショートカットキーとして「Ctrl+Alt+T」が設定され、セキュリティレベルとして「名前」が設定され、保持期間として「1ヶ月」が設定されている。 In FIG. 3, “Ctrl + Alt + T” is set as the shortcut key, “Name” is set as the security level, and “1 month” is set as the retention period.
 制御部2bは、認証部21と、管理部22と、暗号化部23と、復号化部24と、防止部25とを有する。認証部21は、隠蔽部2の機能を利用するユーザの認証を行う。認証により許可されたユーザだけが隠蔽部2を利用して隠蔽対象にアクセスすることができる。 The control unit 2b includes an authentication unit 21, a management unit 22, an encryption unit 23, a decryption unit 24, and a prevention unit 25. The authenticating unit 21 authenticates a user who uses the function of the concealing unit 2. Only the user who is permitted by the authentication can access the concealment object using the concealment unit 2.
 管理部22は、表示装置にユーザとの対話用ウィンドウを表示し、ユーザと対話して隠蔽対象の登録及び解除、隠蔽部2に対する設定等を行う。管理部22は、表示制御部22aと、登録部22bと、解除部22cと、設定部22dとを有する。表示制御部22aは、表示装置にユーザとの対話用ウィンドウを表示し、ユーザによる操作を受け付ける。 The management unit 22 displays a window for dialogue with the user on the display device, and performs dialogue with the user to perform registration and cancellation of the concealment target, setting for the concealment unit 2, and the like. The management unit 22 includes a display control unit 22a, a registration unit 22b, a release unit 22c, and a setting unit 22d. The display control unit 22a displays a window for interaction with the user on the display device and accepts an operation by the user.
 登録部22bは、ユーザにより指定されたフォルダ又はファイルを隠蔽対象として登録する。すなわち、登録部22bは、ユーザにより指定されたフォルダ又はファイルの情報を隠蔽対象として対象情報記憶部2cに格納する。 The registration unit 22b registers a folder or file designated by the user as a concealment target. That is, the registration unit 22b stores information on a folder or file designated by the user in the target information storage unit 2c as a concealment target.
 図4は、登録画面の一例を示す図である。認証部21による認証が成功すると、表示制御部22aは、図4に示すように、対話用ウィンドウ41を表示する。対話用ウィンドウ41は、隠蔽用のフォルダを表示するウィンドウであり、既に隠蔽対象として登録されているフォルダ及びファイルが一覧表示される。図4において、「名前」の欄は隠蔽対象の名前を示し、「種類」の欄は隠蔽対象がフォルダ(ファイル・フォルダ)であるかファイルであるかを示し、「サイズ」の欄は隠蔽対象の大きさを示し、「隠す」の欄は隠蔽対象の隠蔽状態を示す。例えば、図4では、Secretdocという名前のファイルが隠蔽対象として登録されている。なお、対話用ウィンドウ41は、暗号化のフォルダを表示するウィンドウであってもよく、その場合、既に暗号化対象として登録されているフォルダ及びファイルが一覧表示される。図4において、「名前」の欄は暗号化対象の名前を示し、「種類」の欄は暗号化対象がフォルダ(ファイル・フォルダ)であるかファイルであるかを示し、「サイズ」の欄は暗号化対象の大きさを示し、「隠す」の欄は暗号化対象の暗号化状態を示す。また、隠蔽部2は、フォルダ及びファイルの隠蔽を行うことなく暗号化及び復元を行う。 FIG. 4 is a diagram showing an example of a registration screen. When the authentication by the authentication unit 21 is successful, the display control unit 22a displays a dialog window 41 as shown in FIG. The dialogue window 41 is a window for displaying a folder for concealment, and a list of folders and files already registered as a concealment target is displayed. In FIG. 4, the “name” column indicates the name of the concealment target, the “type” column indicates whether the concealment target is a folder (file / folder) or a file, and the “size” column indicates the concealment target. The “hidden” column indicates the concealment state of the concealment target. For example, in FIG. 4, a file named Secretdoc is registered as a concealment target. Note that the dialog window 41 may be a window for displaying an encryption folder. In this case, a list of folders and files already registered as encryption targets is displayed. In FIG. 4, the “name” column indicates the name of the encryption target, the “type” column indicates whether the encryption target is a folder (file / folder) or a file, and the “size” column indicates The size of the encryption target is shown, and the “Hide” column shows the encryption status of the encryption target. Further, the concealment unit 2 performs encryption and restoration without concealing folders and files.
 ユーザは、対話用ウィンドウ41内にフォルダ又はファイルをドラッグすることで隠蔽対象として登録することができる。あるいは、ユーザは、隠蔽したいフォルダ又はファイルを選択し、ファイル・フォルダの追加を指示するボタン40を指示することで隠蔽対象として登録することができる。図4は、Documentという名前のフォルダが対話用ウィンドウ41内にドラッグされ隠蔽対象として登録される場合を示す。 The user can register as a concealment target by dragging a folder or file into the dialog window 41. Alternatively, the user can register as a concealment target by selecting a folder or file to be concealed and instructing a button 40 for instructing addition of a file / folder. FIG. 4 shows a case where a folder named Document is dragged into the dialogue window 41 and registered as a concealment target.
 図5は、登録後の画面を示す図である。図5に示すように、登録されたDocumentの情報が登録データ一覧に表示される。図5では、Documentの隠蔽状態は「オフ」であるので、Documentは隠蔽されていない状態にある。ユーザは、隠蔽対象の「隠す」の欄にあるボタン42を指示することで、隠蔽状態を「オフ」から「オン」、又は「オン」から「オフ」に切り替えることができる。隠蔽状態が「オフ」から「オン」になると、対話用ウィンドウ41にドラッグされた隠蔽対象は元のフォルダから消去され、元のフォルダの表示ウィンドウ43からアイコン44が消去される。逆に、隠蔽状態が「オン」から「オフ」になると、元のフォルダの表示ウィンドウ43にアイコン44が表示される。 FIG. 5 shows the screen after registration. As shown in FIG. 5, the registered document information is displayed in the registered data list. In FIG. 5, since the document concealment state is “off”, the document is not concealed. The user can switch the concealment state from “off” to “on” or “on” to “off” by instructing the button 42 in the “hide” field to be concealed. When the concealment state is changed from “off” to “on”, the concealment object dragged to the dialog window 41 is erased from the original folder, and the icon 44 is erased from the display window 43 of the original folder. Conversely, when the concealment state changes from “on” to “off”, an icon 44 is displayed in the display window 43 of the original folder.
 登録部22bは、ユーザにより隠蔽状態が「オフ」から「オン」に操作されると、隠蔽対象を暗号化して非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移す。また、登録部22bは、ユーザにより隠蔽状態が「オン」から「オフ」に指示されると、隠蔽対象を復号化して隠蔽データ記憶部3bから非隠蔽データ記憶部3aの元のフォルダの下に移す。 When the user operates the concealment state from “off” to “on”, the registration unit 22b encrypts the concealment target and moves it from the non-concealed data storage unit 3a to the concealed data storage unit 3b. Also, when the concealment state is instructed from “on” to “off” by the user, the registration unit 22b decrypts the concealment target and moves it from the concealment data storage unit 3b to the original folder of the non-concealment data storage unit 3a. Transfer.
 図1に戻って、解除部22cは、フォルダ又はファイルの隠蔽を解除する。すなわち、解除部22cは、ユーザに解除を指定されたフォルダ又はファイルの情報を対象情報記憶部2cから削除する。また、解除部22cは、ユーザに解除を指定されたフォルダ又はファイルが隠蔽されている場合には、フォルダ又はファイルを復号化して隠蔽データ記憶部3bから非隠蔽データ記憶部3aの元のフォルダの下に移動する。 Referring back to FIG. 1, the release unit 22c releases the concealment of the folder or file. That is, the canceling unit 22c deletes information on the folder or file designated to be cancelled by the user from the target information storage unit 2c. In addition, when the folder or file designated to be released by the user is concealed, the canceling unit 22c decrypts the folder or file and restores the original folder of the non-hidden data storage unit 3a from the concealed data storage unit 3b. Move down.
 ユーザは、解除対象を図5に示した対話用ウィンドウ41から選択して「登録解除」と表示されたボタン45を指示することで、フォルダ又はファイルの隠蔽を解除することができる。また、ユーザは、「すべてを隠す」と表示されたボタン46を指示することで、すべての隠蔽対象の状態を「オン」にすることができる。 The user can cancel the concealment of the folder or file by selecting the cancellation target from the dialog window 41 shown in FIG. 5 and instructing the button 45 displayed as “Registration cancellation”. Further, the user can turn on all the objects to be concealed by instructing the button 46 displayed as “Hide All”.
 設定部22dは、ユーザの指示に基づいて隠蔽部2の設定を行う。具体的には、設定部22dは、ユーザに指示されたショートカットキー、セキュリティレベル、保持期間等を設定情報記憶部2dに格納する。 The setting unit 22d sets the concealment unit 2 based on a user instruction. Specifically, the setting unit 22d stores, in the setting information storage unit 2d, shortcut keys, security levels, retention periods, and the like designated by the user.
 暗号化部23は、ユーザにより隠蔽状態が「オフ」から「オン」に指示されたフォルダ又はファイルを暗号化する。暗号化部23は、セキュリティレベルに基づいてデータを暗号化するか、又はデータを暗号化することなくフォルダ又はファイルの名前を暗号化する。 The encryption unit 23 encrypts a folder or file whose concealment state is instructed from “off” to “on” by the user. The encryption unit 23 encrypts data based on the security level, or encrypts the name of the folder or file without encrypting the data.
 復号化部24は、ユーザにより隠蔽状態が「オン」から「オフ」に指示されたフォルダ又はファイルを復号化する。復号化部24は、セキュリティレベルに基づいてデータを復号化するか、又はデータを復号化することなくフォルダ又はファイルの名前を復号化する。 The decryption unit 24 decrypts a folder or file whose concealment state is instructed from “on” to “off” by the user. The decrypting unit 24 decrypts the data based on the security level, or decrypts the name of the folder or file without decrypting the data.
 防止部25は、対話用ウィンドウ41に表示された隠蔽対象の中に隠蔽状態が「オフ」の隠蔽対象がある状態でユーザが対話用ウィンドウ41を閉じて隠蔽部2の処理を終了した場合に、ユーザに確認することによって、隠蔽し忘れを防止する。 When the user closes the dialog window 41 and finishes the process of the concealment unit 2 in a state where there is a concealment target whose concealment state is “off” among the concealment targets displayed in the dialog window 41, the prevention unit 25 By checking with the user, forgetting to hide is prevented.
 具体的には、防止部25は、隠蔽状態が「オフ」の隠蔽対象がある状態でユーザが対話用ウィンドウ41を閉じた場合に、実行ボタンを表示装置に表示する。そして、ユーザが実行ボタンを指示すると、隠蔽状態が「オフ」の隠蔽対象を暗号化して非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移す。 Specifically, the prevention unit 25 displays an execution button on the display device when the user closes the dialog window 41 while there is a concealment target whose concealment state is “off”. When the user designates an execution button, the concealed object whose concealment state is “off” is encrypted and transferred from the non-concealed data storage unit 3a to the concealed data storage unit 3b.
 通常、ユーザは、他人に見られたくないフォルダ又はファイルを隠蔽対象とし、本人が使用するときだけ復号化し、使用が終了すると隠蔽対象を暗号化して隠蔽部2の処理を終了する。したがって、隠蔽状態が「オフ」の隠蔽対象がある状態でユーザが対話用ウィンドウ41を閉じた場合には、ユーザが隠蔽対象の暗号化を忘れた可能性が高い。そこで、防止部25は、実行ボタンを表示することによって、ユーザによる隠蔽し忘れを防止する。 Normally, the user sets a folder or file that is not desired to be seen by others as a concealment target, decrypts it only when the user uses it, encrypts the concealment target when the use ends, and ends the processing of the concealment unit 2. Therefore, when the user closes the dialog window 41 while there is a concealment target whose concealment state is “off”, it is highly likely that the user has forgotten to encrypt the concealment target. Therefore, the prevention unit 25 prevents the user from forgetting to hide by displaying an execution button.
 防止部25は、判定部25aと、ボタン表示部25bと、実行部25cとを有する。判定部25aは、ユーザにより対話用ウィンドウ41が閉じられたときに、隠蔽状態が「オフ」の隠蔽対象があるか否かを判定し、ない場合には、隠蔽部2の処理を終了し、ある場合には、ボタン表示部25bに実行ボタンの表示を指示する。 The prevention unit 25 includes a determination unit 25a, a button display unit 25b, and an execution unit 25c. When the dialog window 41 is closed by the user, the determination unit 25a determines whether or not there is a concealment target whose concealment state is “off”, and if not, ends the process of the concealment unit 2; If there is, the button display unit 25b is instructed to display an execution button.
 ボタン表示部25bは、実行ボタンを画面右下隅に表示する。ボタン表示部25bは、実行ボタンの表示後、所定の時間が経過すると、隠蔽部2の処理を終了する。実行部25cは、実行ボタンがユーザにより指示されると、隠蔽状態が「オフ」の隠蔽対象を暗号化して非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移す。 The button display unit 25b displays an execution button in the lower right corner of the screen. The button display unit 25b ends the process of the concealing unit 2 when a predetermined time has elapsed after the execution button is displayed. When the execution button is instructed by the user, the execution unit 25c encrypts the concealment target whose concealment state is “off” and moves it from the non-concealment data storage unit 3a to the concealment data storage unit 3b.
 図6は、隠蔽状態が「オフ」の隠蔽対象がある状態でユーザが対話用ウィンドウ41を閉じるためのボタン47を指示する場合の画面例を示す図である。図6に示すように、ユーザは、「隠す」の欄が「オフ」であるDocumentがある状態で、カーソルを置くと「閉じる」が近くに表示されるボタン47を指示して対話用ウィンドウ41を閉じる。 FIG. 6 is a diagram illustrating a screen example when the user instructs the button 47 for closing the dialog window 41 in a state where there is a concealment target whose concealment state is “off”. As shown in FIG. 6, when there is a document whose “hide” field is “off”, the user instructs the button 47 that displays “close” nearby when the cursor is placed, and displays the dialog window 41. Close.
 図7は、実行ボタンが表示された画面例を示す図である。図7に示すように、図6に示した対話用ウィンドウ41が閉じられ、「実行する」と表示された実行ボタン48が画面右下隅に表示される。実行ボタン48は、画面上に表示されて、隠蔽状態が「オフ」の隠蔽対象を暗号化して非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移す処理の入力を受け付ける。例えば、実行ボタン48は、マウスカーソルで指定される、又は、指でタッチされることにより当該処理の入力を受け付ける。なお、実行ボタン48は、「実行する」との文字を含む画像に限られない。実行ボタン48は、カラー、グレースケール、白黒、透明な文字を含まない画像で画面上に表示されてもよい。実行ボタン48が透明な画像である場合、実行ボタン48が配置された領域は、当該実行ボタン48が重ねられた壁紙等の画像が表示される。図7では、実行ボタン48は画面右下隅に表示される。実行ボタン48は、画面左下隅、画面右上隅、画面左上隅等の他の場所に表示されてもよい。例えば、表示装置はタッチパネルを有する。そして、タッチパネルの静電センサが、静電容量の変化量から、指(指示体の一例)が接近したか否かを検出する。さらに、ボタン表示部25bが、静電センサが画面隅での接近あるいは接触を検知した場合、当該接近あるいは接触のあった画面隅に実行ボタン48を配置する。これにより、情報処理装置1をユーザが把持している際に、実行ボタン48を指の届く範囲に配置することができる。 FIG. 7 is a diagram showing an example of a screen on which an execution button is displayed. As shown in FIG. 7, the dialog window 41 shown in FIG. 6 is closed, and an execution button 48 displayed as “execute” is displayed in the lower right corner of the screen. The execution button 48 is displayed on the screen, and accepts an input of a process of encrypting a concealment target whose concealment state is “OFF” and transferring it from the non-concealed data storage unit 3a to the concealed data storage unit 3b. For example, the execution button 48 receives an input of the processing by being designated with a mouse cursor or being touched with a finger. The execution button 48 is not limited to an image including the characters “execute”. The execution button 48 may be displayed on the screen as an image that does not include color, grayscale, black and white, and transparent characters. When the execution button 48 is a transparent image, an image such as a wallpaper on which the execution button 48 is superimposed is displayed in the area where the execution button 48 is arranged. In FIG. 7, the execution button 48 is displayed in the lower right corner of the screen. The execution button 48 may be displayed in other places such as the lower left corner of the screen, the upper right corner of the screen, and the upper left corner of the screen. For example, the display device has a touch panel. Then, the electrostatic sensor of the touch panel detects whether or not a finger (an example of an indicator) has approached from the amount of change in capacitance. Further, when the button display unit 25b detects the approach or contact at the corner of the screen, the execution button 48 is arranged at the corner of the screen where the approach or contact has occurred. Thereby, when the user holds the information processing apparatus 1, the execution button 48 can be arranged within the reach of the finger.
 図8は、ユーザによる実行ボタン48の指示を示す図である。ユーザにより実行ボタン48が指示されると、隠蔽状態が「オフ」の隠蔽対象が暗号化されて非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移されて、隠蔽部2の処理が終了する。例えば、実行部25cは、タッチパネルによって検出されたユーザの指が指示する位置、あるいは、マウスカーソルが指示する位置は、実行ボタン48の領域内にあるか否かを判定する。そして、実行部25cは、当該指示する位置が領域内にあると判定した場合に、隠蔽状態が「オフ」の隠蔽対象が暗号化されて非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移される。 FIG. 8 is a diagram showing an instruction of the execution button 48 by the user. When the execution button 48 is instructed by the user, the concealment object whose concealment state is “off” is encrypted and transferred from the non-concealment data storage unit 3a to the concealment data storage unit 3b, and the processing of the concealment unit 2 ends. . For example, the execution unit 25c determines whether the position indicated by the user's finger detected by the touch panel or the position indicated by the mouse cursor is within the area of the execution button 48. When the execution unit 25c determines that the designated position is within the area, the concealment target whose concealment state is “off” is encrypted and transferred from the non-concealment data storage unit 3a to the concealment data storage unit 3b. It is.
 図9は、隠蔽部2の処理が終了したときの画面を示す図である。図9に示すように、隠蔽状態が「オフ」であったDocumentが暗号化されて非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移されたため、C:\Users\YAMADA03\Desktop\MySecretからDocumentが削除されている。 FIG. 9 is a diagram showing a screen when the process of the concealment unit 2 is completed. As shown in FIG. 9, since the document whose concealment state is “off” is encrypted and transferred from the non-concealed data storage unit 3a to the concealed data storage unit 3b, from C: \ Users \ YAMADA03 \ Desktop \ MySecret Document has been deleted.
 なお、ユーザは、実行ボタン48を指示する代わりに、ショートカットキーを入力してもよい。図10は、ショートカットキーの登録画面の一例を示す図である。図10では、「Ctrl+Alt+T」がショートカットキーとして登録される。 Note that the user may input a shortcut key instead of instructing the execution button 48. FIG. 10 is a diagram illustrating an example of a shortcut key registration screen. In FIG. 10, “Ctrl + Alt + T” is registered as a shortcut key.
 次に、隠蔽部2による処理のフローについて説明する。図11は、隠蔽部2による処理のフローを示すフローチャートである。図11に示すように、隠蔽部2は、ユーザの認証後に、対話用ウィンドウ41を表示し、隠蔽対象の一覧を表示する(ステップS1)。そして、隠蔽部2は、隠蔽対象の登録、隠蔽対象に対する復号化等ユーザの操作を受け付け(ステップS2)、対応する処理を行う。 Next, the processing flow by the concealment unit 2 will be described. FIG. 11 is a flowchart showing a flow of processing by the concealment unit 2. As shown in FIG. 11, after the user is authenticated, the concealing unit 2 displays a dialog window 41 and displays a list of concealment targets (step S1). Then, the concealing unit 2 receives a user operation such as registration of the concealment target and decryption of the concealment target (step S2), and performs corresponding processing.
 そして、ユーザが対話用ウィンドウ41を閉じるためのボタン47を指示すると、隠蔽部2は、対話用ウィンドウ41を閉じる(ステップS3)。そして、隠蔽部2は、隠蔽対象の隠蔽状態がすべて「オン」であるか否かを判定し(ステップS4)、すべて「オン」である場合には、処理を終了する。 Then, when the user instructs the button 47 for closing the dialog window 41, the concealing unit 2 closes the dialog window 41 (step S3). Then, the concealing unit 2 determines whether or not all the concealment states of the concealment target are “on” (step S4). If all the concealment states are “on”, the process ends.
 一方、隠蔽状態が「オフ」である隠蔽対象がある場合には、隠蔽部2は、実行ボタン48を表示する(ステップS5)。その後、ユーザが実行ボタン48を指示するかショートカットキーを入力すると、隠蔽部2は、実行ボタン48の指示又はショートカットキーを受け付ける(ステップS6)。 On the other hand, when there is a concealment target whose concealment state is “off”, the concealment unit 2 displays an execution button 48 (step S5). Thereafter, when the user instructs the execution button 48 or inputs a shortcut key, the concealing unit 2 receives the instruction or shortcut key of the execution button 48 (step S6).
 そして、隠蔽部2は、隠蔽状態が「オフ」であるすべての隠蔽対象について暗号化を実行し(ステップS7)、隠蔽対象を非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移す。そして、隠蔽部2は、処理を終了する。 Then, the concealment unit 2 performs encryption for all the concealment objects whose concealment state is “OFF” (step S7), and moves the concealment object from the non-concealment data storage unit 3a to the concealment data storage unit 3b. And the concealment part 2 complete | finishes a process.
 このように、ユーザが対話用ウィンドウ41を閉じるためのボタン47を指示した場合、隠蔽部2は、隠蔽状態が「オフ」である隠蔽対象があると、実行ボタン48を表示するので、ユーザによる隠蔽し忘れを防ぐことができる。なお、対話用ウィンドウ41が暗号化のフォルダを表示するウィンドウである場合、隠蔽部2による処理のフローは、図11のフローチャートにおいて、「隠蔽対象」を「暗号化対象」、「隠蔽状態」を「暗号化状態」に置き換えたものとなる。また、暗号化対象を非隠蔽データ記憶部3aから隠蔽データ記憶部3bに移す処理は不要となる。 As described above, when the user instructs the button 47 for closing the dialog window 41, the concealing unit 2 displays the execution button 48 when there is a concealment target whose concealment state is “off”. It is possible to prevent forgetting to hide. When the dialog window 41 is a window for displaying an encryption folder, the flow of processing by the concealment unit 2 is set to “encryption target” as “encryption target” and “concealment state” in the flowchart of FIG. It is replaced with “encrypted state”. Further, the process of moving the encryption target from the non-hidden data storage unit 3a to the hidden data storage unit 3b becomes unnecessary.
 次に、設定部22dによる設定処理のフローについて説明する。図12は、設定部22dによる設定処理のフローを示すフローチャートである。図12に示すように、設定部22dは、ユーザによる設定操作がショートカットキーの設定であるか否かを判定し(ステップS11)、ショートカットキーの設定である場合には、ショートカットキーを設定情報記憶部2dに格納する(ステップS12)。 Next, the flow of setting processing by the setting unit 22d will be described. FIG. 12 is a flowchart showing a flow of setting processing by the setting unit 22d. As illustrated in FIG. 12, the setting unit 22d determines whether or not the setting operation by the user is a shortcut key setting (step S11). If the setting operation is a shortcut key setting, the shortcut key is stored as setting information. Store in the part 2d (step S12).
 一方、ショートカットキーの設定でない場合には、設定部22dは、ユーザによる設定操作がセキュリティレベルの設定であるか否かを判定し(ステップS13)、セキュリティレベルの設定である場合には、セキュリティレベルを設定情報記憶部2dに格納する(ステップS14)。 On the other hand, if it is not a shortcut key setting, the setting unit 22d determines whether or not the setting operation by the user is a security level setting (step S13), and if it is a security level setting, the security level is set. Is stored in the setting information storage unit 2d (step S14).
 一方、セキュリティレベルの設定でない場合には、設定部22dは、ユーザによる設定操作が保持期限の設定であるか否かを判定し(ステップS15)、保持期限の設定である場合には、保持期限を設定情報記憶部2dに格納する(ステップS16)。一方、保持期限の設定でない場合には、設定部22dは、ユーザの操作に対応する他の設定処理を行う(ステップS17)。 On the other hand, if the setting is not a security level, the setting unit 22d determines whether or not the setting operation by the user is a setting of a retention period (step S15). Is stored in the setting information storage unit 2d (step S16). On the other hand, if the retention period is not set, the setting unit 22d performs another setting process corresponding to the user operation (step S17).
 このように、設定部22dは、ユーザによる設定操作に基づいて設定情報を設定情報記憶部2dに格納することによって、隠蔽部2の設定を行うことができる。 Thus, the setting unit 22d can set the concealing unit 2 by storing the setting information in the setting information storage unit 2d based on the setting operation by the user.
 上述してきたように、実施例では、管理部22が、表示装置にユーザとの対話用ウィンドウ41を表示し、ユーザと対話して隠蔽対象の登録及び解除、隠蔽部2に対する設定等を行う。そして、対話用ウィンドウ41に表示された隠蔽対象の中に隠蔽状態が「オフ」の隠蔽対象がある状態でユーザが対話用ウィンドウ41を閉じて隠蔽部2の処理を終了すると、防止部25が、実行ボタン48を表示して、ユーザに隠蔽状態が「オフ」の隠蔽対象があることを気付かせる。 As described above, in the embodiment, the management unit 22 displays the window 41 for dialogue with the user on the display device, and performs dialogue with the user to register and release the concealment target, set the concealment unit 2, and the like. When the user closes the dialog window 41 and ends the process of the concealment unit 2 in a state where there is a concealment target whose concealment state is “off” among the concealment targets displayed in the dialog window 41, the prevention unit 25 The execution button 48 is displayed to let the user notice that there is a concealment target whose concealment state is “off”.
 そして、ユーザが実行ボタンを指示すると、防止部25は、隠蔽状態が「オフ」の隠蔽対象を隠蔽する。したがって、隠蔽部2は、ユーザによる隠蔽し忘れを防ぐことができ、機密性の高いフォルダ及びファイルが他人に見られることを防ぐことができる。 When the user instructs the execution button, the prevention unit 25 hides the concealment target whose concealment state is “off”. Therefore, the concealment unit 2 can prevent the user from forgetting to conceal and can prevent a highly confidential folder and file from being seen by others.
 また、実施例では、防止部25は、実行ボタン48を表示装置の画面右下隅に表示するので、他の表示を妨げることなく実行ボタン48を表示することができる。 In the embodiment, since the prevention unit 25 displays the execution button 48 in the lower right corner of the display device, the execution button 48 can be displayed without interfering with other displays.
 また、実施例では、管理部22が表示装置にユーザとの対話用ウィンドウ41を表示し、ユーザは対話用ウィンドウ41内にフォルダ又はファイルをドラッグすることで隠蔽対象として登録する。したがって、ユーザは簡単な操作で隠蔽対象を登録することができる。 Further, in the embodiment, the management unit 22 displays the dialog window 41 with the user on the display device, and the user registers the object as a concealment object by dragging the folder or file into the dialog window 41. Therefore, the user can register the concealment target with a simple operation.
 また、実施例では、防止部25は、ユーザによる実行ボタン48の指示の代わりにショートカットキーの入力を受け付ける。したがって、ユーザは、画面上での操作を行うことなく隠蔽を行うことができ、画面を見ている他人に気づかれることなく隠蔽を行うことができる。 Further, in the embodiment, the prevention unit 25 receives an input of a shortcut key instead of an instruction of the execution button 48 by the user. Therefore, the user can perform concealment without performing an operation on the screen, and can perform concealment without being noticed by others viewing the screen.
 なお、実施例では、隠蔽部2について説明したが、隠蔽部2が有する構成をソフトウェアによって実現することで、同様の機能を有する隠蔽プログラムを得ることができる。そこで、隠蔽プログラムを実行する情報処理装置1のハードウェア構成について説明する。 Although the concealment unit 2 has been described in the embodiment, a concealment program having the same function can be obtained by realizing the configuration of the concealment unit 2 by software. Therefore, the hardware configuration of the information processing apparatus 1 that executes the concealment program will be described.
 図13は、実施例に係る隠蔽プログラムを実行する情報処理装置1のハードウェア構成を示す図である。図13に示すように、情報処理装置1は、メインメモリ51と、CPU52と、LAN(Local Area Network)インタフェース53と、HDD54とを有する。また、情報処理装置1は、スーパーIO(Input Output)55と、DVI(Digital Visual Interface)56と、ODD(Optical Disk Drive)57とを有する。 FIG. 13 is a diagram illustrating a hardware configuration of the information processing apparatus 1 that executes the concealment program according to the embodiment. As illustrated in FIG. 13, the information processing apparatus 1 includes a main memory 51, a CPU 52, a LAN (Local Area Network) interface 53, and an HDD 54. The information processing apparatus 1 includes a super IO (Input Output) 55, a DVI (Digital Visual Interface) 56, and an ODD (Optical Disk Drive) 57.
 メインメモリ51は、プログラムやプログラムの実行途中結果などを記憶するメモリである。CPU52は、メインメモリ51からプログラムを読出して実行する中央処理装置である。CPU52は、メモリコントローラを有するチップセットを含む。 The main memory 51 is a memory for storing a program and a program execution result. The CPU 52 is a central processing unit that reads a program from the main memory 51 and executes it. The CPU 52 includes a chip set having a memory controller.
 LANインタフェース53は、情報処理装置1をLAN経由で他の情報処理装置に接続するためのインタフェースである。HDD54は、プログラムやデータを格納するディスク装置であり、スーパーIO55は、マウスやキーボードなどの入力装置を接続するためのインタフェースである。DVI56は、液晶表示装置を接続するインタフェースであり、ODD57は、DVDの読み書きを行う装置である。 The LAN interface 53 is an interface for connecting the information processing apparatus 1 to another information processing apparatus via a LAN. The HDD 54 is a disk device that stores programs and data, and the super IO 55 is an interface for connecting an input device such as a mouse or a keyboard. The DVI 56 is an interface for connecting a liquid crystal display device, and the ODD 57 is a device for reading / writing a DVD.
 LANインタフェース53は、PCIエクスプレス(PCIe)によりCPU52に接続され、HDD54及びODD57は、SATA(Serial Advanced Technology Attachment)によりCPU52に接続される。スーパーIO55は、LPC(Low Pin Count)によりCPU52に接続される。 The LAN interface 53 is connected to the CPU 52 by PCI Express (PCIe), and the HDD 54 and ODD 57 are connected to the CPU 52 by SATA (Serial Advanced Technology Attachment). The super IO 55 is connected to the CPU 52 by LPC (Low Pin Count).
 そして、情報処理装置1において実行される隠蔽プログラムは、DVDに記憶され、ODD57によってDVDから読出されて情報処理装置1にインストールされる。あるいは、隠蔽プログラムは、LANインタフェース53を介して接続された他の情報処理システムのデータベースなどに記憶され、これらのデータベースから読出されて情報処理装置1にインストールされる。そして、インストールされた隠蔽プログラムは、HDD54に記憶され、メインメモリ51に読み出されてCPU52によって実行される。 The concealment program executed in the information processing apparatus 1 is stored in the DVD, read from the DVD by the ODD 57, and installed in the information processing apparatus 1. Alternatively, the concealment program is stored in a database or the like of another information processing system connected via the LAN interface 53, read from these databases, and installed in the information processing apparatus 1. The installed concealment program is stored in the HDD 54, read into the main memory 51, and executed by the CPU 52.
  1  情報処理装置
  2  隠蔽部
  2a  記憶部
  2b  制御部
  2c  対象情報記憶部
  2d  設定情報記憶部
  3  データ記憶部
  3a  非隠蔽データ記憶部
  3b  隠蔽データ記憶部
 21  認証部
 22  管理部
 22a  表示制御部
 22b  登録部
 22c  解除部
 22d  設定部
 23  暗号化部
 24  復号化部
 25  防止部
 25a  判定部
 25b  ボタン表示部
 25c  実行部
 40,42,45,46,47  ボタン
 41  対話用ウィンドウ
 43  表示ウィンドウ
 44  アイコン
 48  実行ボタン
 51  メインメモリ
 52  CPU
 53  LANインタフェース
 54  HDD
 55  スーパーIO
 56  DVI
 57  ODD
DESCRIPTION OF SYMBOLS 1 Information processing apparatus 2 Concealment part 2a Storage part 2b Control part 2c Target information storage part 2d Setting information storage part 3 Data storage part 3a Non-hidden data storage part 3b Concealment data storage part 21 Authentication part 22 Management part 22a Display control part 22b Registration Unit 22c release unit 22d setting unit 23 encryption unit 24 decryption unit 25 prevention unit 25a determination unit 25b button display unit 25c execution unit 40, 42, 45, 46, 47 button 41 dialog window 43 display window 44 icon 48 execution button 51 Main memory 52 CPU
53 LAN interface 54 HDD
55 Super IO
56 DVI
57 ODD

Claims (6)

  1.  電子的なファイル又は該ファイルが格納されるフォルダを示す対象データ毎に、暗号化の設定をユーザから受け付けるウィンドウを画面上に表示させる表示制御部と、
     前記対象データの暗号化が解除された状態で前記ウィンドウが閉じられた場合に、該対象データを暗号化する指示を受け付ける実行ボタンを前記画面上に表示させると共に、該実行ボタンの指示に応じて該対象データを暗号化する暗号化部と、
     を備えることを特徴とする情報処理装置。
    A display control unit for displaying on the screen a window for accepting an encryption setting from the user for each target data indicating an electronic file or a folder in which the file is stored;
    When the window is closed in a state where the encryption of the target data is released, an execution button for receiving an instruction to encrypt the target data is displayed on the screen, and according to the instruction of the execution button An encryption unit for encrypting the target data;
    An information processing apparatus comprising:
  2.  前記暗号化部は、前記実行ボタンを表示装置の四隅のいずれかに表示することを特徴とする請求項1に記載の情報処理装置。 The information processing apparatus according to claim 1, wherein the encryption unit displays the execution button at any one of four corners of the display device.
  3.  前記ウィンドウに表示されたフォルダに前記対象データをユーザの指示により登録することで、該対象データに対して隠蔽を設定する登録部をさらに備えることを特徴とする請求項1又は2に記載の情報処理装置。 The information according to claim 1, further comprising a registration unit configured to set concealment for the target data by registering the target data in a folder displayed in the window according to a user instruction. Processing equipment.
  4.  ショートカットキーを設定する設定部をさらに有し、
     前記暗号化部は、前記実行ボタンの指示又はショートカットキーの入力に応じて前記対象データを隠蔽することを特徴とする請求項1又は2に記載の情報処理装置。
    It further has a setting part for setting shortcut keys,
    The information processing apparatus according to claim 1, wherein the encryption unit conceals the target data in response to an instruction of the execution button or an input of a shortcut key.
  5.  コンピュータが、
     電子的なファイル又は該ファイルが格納されるフォルダを示す対象データ毎に、暗号化の設定をユーザから受け付けるウィンドウを画面上に表示させ、
     前記対象データの暗号化が解除された状態で前記ウィンドウが閉じられた場合に、該対象データを隠蔽する指示を受け付ける実行ボタンを前記画面上に表示させると共に、該実行ボタンの指示に応じて該対象データを暗号化する
     処理を実行することを特徴とするデータ隠蔽方法。
    Computer
    For each target data indicating an electronic file or a folder in which the file is stored, a window for accepting an encryption setting from the user is displayed on the screen.
    When the window is closed in a state where the encryption of the target data is released, an execution button for receiving an instruction to conceal the target data is displayed on the screen, and the execution button is displayed according to the instruction of the execution button. A data hiding method characterized by executing processing for encrypting target data.
  6.  コンピュータに、
     電子的なファイル又は該ファイルが格納されるフォルダを示す対象データ毎に、暗号化の設定をユーザから受け付けるウィンドウを画面上に表示させ、
     前記対象データの暗号化が解除された状態で前記ウィンドウが閉じられた場合に、該対象データを暗号化する指示を受け付ける実行ボタンを前記画面上に表示させると共に、該実行ボタンの指示に応じて該対象データを暗号化する
     処理を実行させることを特徴とするデータ隠蔽プログラム。
    On the computer,
    For each target data indicating an electronic file or a folder in which the file is stored, a window for accepting an encryption setting from the user is displayed on the screen.
    When the window is closed in a state where the encryption of the target data is released, an execution button for receiving an instruction to encrypt the target data is displayed on the screen, and according to the instruction of the execution button A data hiding program characterized by causing a process of encrypting the target data to be executed.
PCT/JP2015/070329 2015-07-15 2015-07-15 Information processing device, data hiding method, and data hiding program WO2017009988A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2017528245A JPWO2017009988A1 (en) 2015-07-15 2015-07-15 Information processing apparatus, data hiding method, and data hiding program
PCT/JP2015/070329 WO2017009988A1 (en) 2015-07-15 2015-07-15 Information processing device, data hiding method, and data hiding program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2015/070329 WO2017009988A1 (en) 2015-07-15 2015-07-15 Information processing device, data hiding method, and data hiding program

Publications (1)

Publication Number Publication Date
WO2017009988A1 true WO2017009988A1 (en) 2017-01-19

Family

ID=57758094

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/070329 WO2017009988A1 (en) 2015-07-15 2015-07-15 Information processing device, data hiding method, and data hiding program

Country Status (2)

Country Link
JP (1) JPWO2017009988A1 (en)
WO (1) WO2017009988A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004072151A (en) * 2002-08-01 2004-03-04 Mitsubishi Electric Corp Terminal with file encryption function
JP2007012022A (en) * 2005-05-31 2007-01-18 It System Corp Security program and security system
JP2007094510A (en) * 2005-09-27 2007-04-12 Fujifilm Corp Method and program for setting mode of terminating application program
JP2013182370A (en) * 2012-03-01 2013-09-12 Fuji Xerox Co Ltd Document management device, document management system, and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004072151A (en) * 2002-08-01 2004-03-04 Mitsubishi Electric Corp Terminal with file encryption function
JP2007012022A (en) * 2005-05-31 2007-01-18 It System Corp Security program and security system
JP2007094510A (en) * 2005-09-27 2007-04-12 Fujifilm Corp Method and program for setting mode of terminating application program
JP2013182370A (en) * 2012-03-01 2013-09-12 Fuji Xerox Co Ltd Document management device, document management system, and program

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HIROSHI HAYAMA ET AL., DEKIRU DAIJITEN WINDOWS VISTA, 21 March 2007 (2007-03-21), pages 61 - 62 *
WINGS PROJECT, PROGRAM O TSUKURO! MICROSOFT VISUAL C++ 2008 EXPRESS EDITION NYUMON, 10 March 2008 (2008-03-10), pages 97 - 101 *

Also Published As

Publication number Publication date
JPWO2017009988A1 (en) 2017-12-28

Similar Documents

Publication Publication Date Title
US9780947B1 (en) Computer programs, secret management methods and systems
US10181041B2 (en) Methods, systems, and apparatuses for managing a hard drive security system
CN108140097B (en) Passive encryption of organised data
KR20110128567A (en) Method for controlling objects of user interface and apparatus of enabling the method
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
US20110040980A1 (en) File Management Safe Deposit Box
US20090222500A1 (en) Information storage device and method capable of hiding confidential files
US20120233671A1 (en) System and method for selective protection of information elements
WO2017009988A1 (en) Information processing device, data hiding method, and data hiding program
US11954308B2 (en) Methods and user interfaces for account recovery
JP6458866B2 (en) Information processing apparatus, decoding method, and decoding program
JP2009230587A (en) Data management method of electronic computer, and program therefor
JP6544431B2 (en) INFORMATION PROCESSING APPARATUS, DATA DISPLAY METHOD, AND DATA DISPLAY PROGRAM
JP2007012022A (en) Security program and security system
KR20150029251A (en) Method for securing object of electronic device and the electronic device therefor
JP2014174717A (en) Information terminal device, image display method, and program
TWI263432B (en) Data security method for storage apparatus and storage media and electronic device
JP4533244B2 (en) Authentication program and authentication method
Grothaus et al. File Management and Sharing
Marczak et al. Recipes

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15898300

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017528245

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15898300

Country of ref document: EP

Kind code of ref document: A1