KR100980733B1 - Portable storage and method of security therefor - Google Patents
Portable storage and method of security therefor Download PDFInfo
- Publication number
- KR100980733B1 KR100980733B1 KR1020090091314A KR20090091314A KR100980733B1 KR 100980733 B1 KR100980733 B1 KR 100980733B1 KR 1020090091314 A KR1020090091314 A KR 1020090091314A KR 20090091314 A KR20090091314 A KR 20090091314A KR 100980733 B1 KR100980733 B1 KR 100980733B1
- Authority
- KR
- South Korea
- Prior art keywords
- storage device
- file
- removable storage
- authentication
- office
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/14—Handling requests for interconnection or transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Security method of a removable storage device according to the present invention, when the removable storage device is connected to a mobile storage device management program stored in the removable storage device is executed, guiding the input of authentication information consisting of mouse pattern information; When the authentication information is input, performing the authentication by comparing the authentication information with the authentication information stored in the mobile storage device by the mobile storage device management program; Connecting the removable disk provided in the removable storage device to a hard disk drive if the authentication is successful; And disconnecting the removable disk from the hard disk drive when the removable storage device is disconnected.
Description
The present invention relates to a removable storage device, and more particularly, to a security method of a removable storage device for performing security for a user's work file, work trace, certificate, etc. through the removable storage device and a removable storage device.
With the development of technology, removable storage devices are widely used to store data recorded on computer terminals. Such removable storage devices are typically USB memory devices.
In general, the computer terminal loads a device driver corresponding to the USB memory device into an operating system to recognize the USB memory device as one internal memory device and then communicates with the computer terminal.
Removable storage devices including such USB memory devices are also used for backup of important documents such as certificates. Accordingly, when the security of the removable storage device is not achieved, there is a problem that important documents may be leaked by a malicious user.
The present invention drives a removable storage device security program that is executed at the same time as a removable storage device is inserted to enable access to a removable disk stored in the removable storage device when authentication through the removable storage device security program is successful. It is an object of the present invention to provide a security method and a removable storage device of the removable storage device.
In addition, another object of the present invention is to encrypt and store one or more office files that were being worked by the user when the office file backup is requested through the removable storage device security program and to store the coordinate information of the window of the one or more office files Later, the office file is completely deleted from the computer terminal, and when the office file restoration is requested through the removable storage device security program, the stored one or more office files are output to a window according to the coordinate information, and the office worked by the user. The present invention provides a security method of a removable storage device and a removable storage device according to which a trace of a file is not left in a computer terminal and a work environment can be maintained even when a user uses another computer terminal.
In addition, another object of the present invention is to add a file move and completely delete items to the context menu through the removable storage security program, and to move the selected file to the removable storage device when requested to perform the function according to the item and the computer terminal The present invention provides a security method of a removable storage device for completely deleting or completely deleting a selected file from a computer terminal, and a removable storage device accordingly.
Security method of a mobile storage device according to the present invention for achieving the above object, when the mobile storage device is connected, the mobile storage device management program stored in the mobile storage device is executed, the input of authentication information consisting of mouse pattern information Guiding the; When the authentication information is input, performing the authentication by comparing the authentication information with the authentication information stored in the mobile storage device by the mobile storage device management program; Connecting the removable disk provided in the removable storage device to a hard disk drive if the authentication is successful; And disconnecting the removable disk from the hard disk drive when the removable storage device is disconnected.
As described above, the present invention executes the removable storage device security program at the same time as the removable storage device is inserted, thereby enabling access to the removable disk stored in the removable storage device when authentication through the removable storage device security program is successful. If the authentication is unsuccessful, it is impossible to identify the existence of a plurality of files included in each removable storage device as well as one or more disks provided in the removable storage device. There is an effect that can be blocked.
In addition, when the backup of the office file is requested through a removable storage security program, the present invention encrypts and stores one or more office files that were being worked on by the user, and also stores the coordinate information of the windows of the one or more office files. When the file is completely deleted from the computer terminal and the office file restoration is requested through the removable storage device security program, the stored one or more office files are output to a window according to the corresponding coordinate information, and the office files worked by the user are stored. The traces do not remain in the computer terminal at the same time, and even if the user uses the other computer terminal to maintain the work environment as it is, there is an effect that can maximize the ease of use.
In addition, the present invention adds a file move and a complete deletion item to the context menu through the removable storage security program, and when the execution of the function according to the item is requested, the selected file is moved to the removable storage device and completely deleted from the computer terminal. By completely deleting the selected file from the computer terminal, there is an effect that can maximize the ease of use.
The configuration of a computer terminal to which the present invention is applicable will be described with reference to FIG.
The computer terminal includes a
The
The
The input /
The
The external
The removable storage management program includes an
An operation according to a removable storage security program according to a preferred embodiment of the present invention that can be executed through the computer terminal will be described with reference to the drawings.
<Overall Processing>
Figure 3 shows an overall flow diagram of a removable storage security program according to a preferred embodiment of the present invention.
When the
In addition, the
<Authentication process>
The operation of the
When authentication information registration from the user is requested, the
When the user requests configuration of authentication information through a virtual mouse, the
When the user requests the configuration of the authentication information through the virtual mouse and the virtual keyboard, the
In addition, if the
The authentication is performed by comparing the mouse pattern information or the mouse pattern information and key input information with the stored authentication information (step 416).
As described above, the present invention configures authentication information through a virtual mouse, thereby protecting authentication information from hacking programs such as keyboard message hooking. In addition, authentication information can be input only by mouse operation, so that the user does not operate the mouse and keyboard alternately, increasing convenience, and not directly inputting the keyboard keys, so that it is not exposed to others when inputting authentication information. Can be.
Also, in the above example, the mouse pattern only illustrates a left button input and a pointer move up, down, left, and right while the shift key is input, but drawing a triangle or a rectangle with a pointer or performing a SIGN, It is apparent from the present invention that the buttons or the combination of the control key, the shift key, and the alt key can be variously configured together with the figure or the sign.
<Register context menu>
The operation of the context
When the
FIG. 7 illustrates a context menu in which a menu item for automatically saving to the USB and completely deleting a file is registered. In the context menu shown in FIG. 7, a menu item (A) for automatically saving to USB and completely deleting a file is displayed according to the present invention. Make it easy to command.
When the automatic save is requested to the USB through the context menu (step 506), the context
If a complete file deletion is requested through the context menu (step 510), the context
In addition, when the connection with the
<Process Office File>
The operation of the office
If the office
The office
The office
Thereafter, the office
<Certificate Management>
The operation of the
When the
When accessing the preset website, the
As such, the present invention activates the certificate virtual disk only in the state where authentication is performed, so that even if the
<Virtual Disk Management>
The operation of the virtual
When the virtual
Thereafter, as shown in FIG. 14C, when a connection request is made by selecting any one of the created virtual disks through the user interface screen, the virtual
In addition, as shown in (e) of FIG. 14, if one of the created virtual disks is selected and requested to be deleted through the user interface screen (step 808), the virtual
As described above, the present invention enables not only to create / delete a virtual disk for recording information that the user wants to maintain in a secure state, but also to selectively connect / disconnect to the created virtual disk. Enables you to provide high quality security services.
<File security>
The operation of the
As shown in FIG. 17A, when file encryption / decryption is requested through the user interface screen of the removable storage device security program, the
In addition, if a complete deletion is requested through the user interface screen as shown in FIG. 17B, the
In addition, as shown in (c) of FIG. 17, when a trace erase is requested through the user interface screen, the
<System Cleanup>
The operation of the
When a system cleanup is requested through the UI screen of the removable storage device security program as illustrated in FIG. 19, the
1 is a configuration diagram of a computer terminal.
2 is a block diagram of a removable storage security program according to an embodiment of the present invention.
3, 5, 6, 8, 10, 12, 13, 16, and 18 are flowcharts illustrating a removable storage security program according to a preferred embodiment of the present invention.
4, 7, 9, 11, 14, 15, 17, and 19 illustrate a processing screen of a removable storage security program according to an exemplary embodiment of the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090091314A KR100980733B1 (en) | 2009-09-25 | 2009-09-25 | Portable storage and method of security therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090091314A KR100980733B1 (en) | 2009-09-25 | 2009-09-25 | Portable storage and method of security therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
KR100980733B1 true KR100980733B1 (en) | 2010-09-07 |
Family
ID=43009834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020090091314A KR100980733B1 (en) | 2009-09-25 | 2009-09-25 | Portable storage and method of security therefor |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR100980733B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180020088A (en) * | 2016-08-17 | 2018-02-27 | 김성남 | Backup solution module, system for data protection and method of driving the same |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010044717A (en) * | 2001-03-20 | 2001-06-05 | 이헌종 | Signature Authentication through mouse pattern recognition |
KR20050034506A (en) * | 2003-10-09 | 2005-04-14 | 서상훈 | Stand alone usb storage device using finger printing cognition |
KR20070015853A (en) * | 2005-08-01 | 2007-02-06 | 민정홍 | Security system operatable on the portable storage device by usb interface |
KR20090072544A (en) * | 2007-12-28 | 2009-07-02 | 주식회사 휴턴 | Time management device recognitional password pattern |
-
2009
- 2009-09-25 KR KR1020090091314A patent/KR100980733B1/en not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010044717A (en) * | 2001-03-20 | 2001-06-05 | 이헌종 | Signature Authentication through mouse pattern recognition |
KR20050034506A (en) * | 2003-10-09 | 2005-04-14 | 서상훈 | Stand alone usb storage device using finger printing cognition |
KR20070015853A (en) * | 2005-08-01 | 2007-02-06 | 민정홍 | Security system operatable on the portable storage device by usb interface |
KR20090072544A (en) * | 2007-12-28 | 2009-07-02 | 주식회사 휴턴 | Time management device recognitional password pattern |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180020088A (en) * | 2016-08-17 | 2018-02-27 | 김성남 | Backup solution module, system for data protection and method of driving the same |
KR101968262B1 (en) * | 2016-08-17 | 2019-04-11 | 김성남 | Backup solution module, system for data protection and method of driving the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9780947B1 (en) | Computer programs, secret management methods and systems | |
US8392706B2 (en) | Method and system for searching for, and collecting, electronically-stored information | |
Mahalik et al. | Practical mobile forensics | |
Tamma et al. | Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices | |
CN100447765C (en) | Mapping method for mobile memory device | |
JP4893167B2 (en) | Authentication method | |
JP2001051987A (en) | System and method for managing electronic document | |
JP2006252142A (en) | Information management device, information management method, program making computer execute this method, and recording medium | |
US9317707B2 (en) | Method and system for protecting a driver | |
JP4895990B2 (en) | Image processing apparatus and data erasing method | |
Carbone | Computer forensics with FTK | |
JP5041516B2 (en) | USB memory for computer screen monitoring | |
JP2005174211A (en) | Information processing apparatus and information processing method | |
KR100980733B1 (en) | Portable storage and method of security therefor | |
EP1521162A2 (en) | Method of managing file structure in memory card | |
CN103516722A (en) | Subscriber stage file automatic encryption and decryption method and device | |
CN107609422B (en) | A kind of file management method and mobile terminal | |
CN102402598A (en) | Application file system access | |
JP2007200047A (en) | Access log-displaying system and method | |
CN112214778A (en) | Method and system for realizing discrete encryption of local file through virtual file | |
JP2002099456A (en) | Encryption apparatus, encryption method and record medium recorded program for the apparatus | |
JP2006339732A (en) | Electronic information encryption system, electronic information encryption method thereof, storage medium thereof, and program thereof | |
JP2014174636A (en) | Information browsing system and information browsing method | |
CN108197489A (en) | A kind of processing method and processing unit for intelligent terminal secret file | |
KR101314372B1 (en) | Authentication system of using security sd card and drive method of the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
A302 | Request for accelerated examination | ||
E902 | Notification of reason for refusal | ||
E90F | Notification of reason for final refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20130830 Year of fee payment: 4 |
|
FPAY | Annual fee payment |
Payment date: 20150303 Year of fee payment: 5 |
|
LAPS | Lapse due to unpaid annual fee |