KR101399353B1 - Information spill prevention method using remote control between terminals - Google Patents

Information spill prevention method using remote control between terminals Download PDF

Info

Publication number
KR101399353B1
KR101399353B1 KR1020120111512A KR20120111512A KR101399353B1 KR 101399353 B1 KR101399353 B1 KR 101399353B1 KR 1020120111512 A KR1020120111512 A KR 1020120111512A KR 20120111512 A KR20120111512 A KR 20120111512A KR 101399353 B1 KR101399353 B1 KR 101399353B1
Authority
KR
South Korea
Prior art keywords
terminal
information
user
personal information
remote control
Prior art date
Application number
KR1020120111512A
Other languages
Korean (ko)
Other versions
KR20140045231A (en
Inventor
안순신
김동완
Original Assignee
고려대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 고려대학교 산학협력단 filed Critical 고려대학교 산학협력단
Priority to KR1020120111512A priority Critical patent/KR101399353B1/en
Publication of KR20140045231A publication Critical patent/KR20140045231A/en
Application granted granted Critical
Publication of KR101399353B1 publication Critical patent/KR101399353B1/en

Links

Images

Abstract

The present invention relates to a method for preventing leakage of personal information using remote control between terminals, and more particularly, to a method for preventing personal information leakage by transmitting and receiving call connection information between a plurality of terminals for remote control of the terminal. Acquiring sensing information on an external environmental condition through the intra-terminal sensor node; Determining whether the acquired sensing information deviates from a normal range according to a predetermined user-defined policy; And controlling the personal information of the user stored in the terminal to be differentially deleted according to the degree of deviation from the normal range when the sensing information is determined to have deviated from the normal range according to the user defined policy.
A method for preventing personal information leakage using remote control between terminals according to the present invention includes transmitting call connection information including remote control trigger information for performing remote control to remote terminals, There is an effect that can be performed.

Description

[0001] The present invention relates to a method for preventing personal information leakage using remote control between terminals,

The present invention relates to a method of preventing personal information leakage by using remote control between terminals, and more particularly, to a method of preventing personal information from being leaked by deleting user's personal information stored in the terminal, And more particularly, to a method for preventing leakage of personal information using remote control between terminals.

With the development of IT technology, mobile terminals capable of transmitting and receiving data on the move have appeared. Although such a mobile terminal is used by many people due to its convenience, there is a problem that security against personal information of a user using the mobile terminal is weak, despite such advantages.

As described above, the prior art of the personal information leakage prevention method using the remote control between the terminals will be described as follows.

Prior Art 1 is Korean Patent Laid-Open No. 10-2006-0106992 (Oct. 13, 2006), which relates to a mobile communication remote control method using a relay server and its apparatus. The prior art 1 relates to an apparatus and a control method for controlling an automation device in a customer such as a home or a workplace using a short message service (SMS) of a general mobile communication terminal, Receives a control command from a user and transmits a series of job signals for performing a control command to the automation equipment control server and notifies the control server of the control command by using a mobile communication network And sending the SMS to the server so that desired control can be performed.

Prior Art 2 is Korean Patent Registration No. 10-0533570 (2005.12.06), which relates to a remote computer control method using a mobile communication terminal and a system thereof. The prior art 2 is a method for synchronizing the IP address and the remote control menu information of the PC with the hardware information and the personal information of the mobile communication terminal by connecting the remote control target PC and the mobile communication terminal, Causing a remote control target PC and a mobile communication terminal to be connected to an outgoing IP address from a mobile communication terminal connected to the wireless Internet; A user authentication step of confirming a use right of the mobile communication terminal for remote control of the PC; Transmitting the selected remote control service menu information on the display of the mobile communication terminal through the wireless communication network and executing the corresponding service menu after authenticating the right of using the PC remote control using the mobile communication terminal; And executing a remote control command selected from the mobile communication terminal and transmitting the execution result of the command to the mobile communication terminal through the wireless communication network.

In order to solve the problems of the related art as described above, the present invention measures an external environment condition of the terminal through a sensor node built in a terminal to be remotely controlled, The present invention provides a method for preventing leakage of personal information using inter-terminal remote control that can prevent personal information of a user stored in the terminal from being leaked to the outside by differentially deleting the information.

According to an aspect of the present invention, there is provided a method for preventing personal information leakage using remote control between terminals, the method comprising: transmitting and receiving call connection information between a plurality of terminals for remote control of the terminal; Acquiring sensing information on an external environmental condition through the intra-terminal sensor node; Determining whether the acquired sensing information deviates from a normal range according to a predetermined user-defined policy; And controlling the personal information of the user stored in the terminal to be differentially deleted according to the degree of deviation from the normal range when the sensing information is determined to have deviated from the normal range according to the user defined policy.

Transmitting the call connection information including predefined remote control trigger information to the receiving terminal of the plurality of terminals to be remotely controlled by one transmitting terminal of the plurality of terminals; Receiving the call connection information from the transmitting terminal and determining whether the remote control trigger information included in the received call connection information is valid; And converting the remote control trigger information received by the receiving terminal into a remote control mode when it is determined that the received remote control trigger information is valid.

Particularly, it may include acquiring sensing information for acquiring sensing information on an external temperature or humidity of the terminal.

Comparing the sensing information with a normal range according to a predetermined user-defined policy; And determining whether the sensing information is out of the normal range according to the user-defined policy, determining whether the sensing information is abnormal with respect to the external environment of the user terminal, Step < / RTI >

In particular, when it is determined that the sensing information has deviated from the normal range according to the user-defined policy, the personal information of the user stored in the terminal, which differentially deletes the personal information of the user stored in the terminal, .

More preferably, the first deletion process deletes the personal information input from the user. A second deleting step of deleting the personal information and the system file information of the terminal; And a third deletion process of deleting the personal information and the system file information of the terminal and destroying the hardware of the terminal according to a departure state of a normal range according to a user definition policy of the sensing information, And deleting the stored user's personal information.

More preferably, the terminal outputs at least one of a message, an image, and a warning sound indicating a hardware destruction schedule. And deleting the personal information, the system file information of the terminal, and the hardware of the terminal after a predetermined time has elapsed from the terminal.

In particular, it may include personal information including at least one of a phone book, a call log, a text message, and a photograph.

In particular, before deleting the personal information of the user stored in the terminal, the step of deleting the personal information of the user stored in the terminal performing the process of transmitting the personal information of the user to the data backup server connected to the communication network and backing up . ≪ / RTI >

More preferably, the transmitting end of the plurality of terminals transmits the call connection information including the remote control cancellation information to the receiving end, and the remote control mode is terminated by confirming the remote control cancellation information in the call connection information received by the receiving end ; ≪ / RTI >

According to another aspect of the present invention, there is provided a method for preventing personal information leakage using remote control between terminals, including a call admission control server for storing a user-defined policy for a remote terminal, Transmitting information; Acquiring sensing information on an external environmental condition through the sensor node in the receiving terminal; Determining whether the acquired sensing information deviates from a normal range according to a predetermined user-defined policy; And controlling the personal information of the user stored in the terminal to be differentially deleted according to the degree of deviation from the normal range when the sensing information is determined to have deviated from the normal range according to the user defined policy.

A method for preventing personal information leakage using remote control between terminals according to the present invention includes transmitting call connection information including remote control trigger information for performing remote control to remote terminals, There is an effect that can be performed.

According to another aspect of the present invention, there is provided a method for preventing leakage of personal information using remote control between terminals, the method comprising: measuring an external environment condition of a remote terminal and, when the measured external environment condition deviates from a predetermined threshold value, The personal information of the user stored in the terminal is differentially deleted, thereby preventing the user's personal information from being leaked to the outside.

According to another aspect of the present invention, there is provided a method for preventing personal information leakage using remote control between terminals, the method comprising: transmitting personal information of a user stored in the terminal to a data backup server before deleting personal information of a user stored in the terminal; Even if the information is inevitably deleted from the terminal, if the personal information is required, personal information of the backed-up user can be easily acquired by connecting to the data backup server.

1 is a block diagram of a wireless network system for implementing a method for preventing personal information leakage using remote control between terminals according to an embodiment of the present invention.
2 is a flowchart illustrating a method for preventing personal information leakage using remote control between terminals according to another embodiment of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Hereinafter, the present invention will be described in detail with reference to preferred embodiments and accompanying drawings, which will be easily understood by those skilled in the art. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.

Hereinafter, with reference to FIG. 1, a wireless network system implementing a method for preventing leakage of personal information using an inter-terminal remote control according to an embodiment of the present invention will be briefly described.

1 is a block diagram of a wireless network system for implementing a method for preventing personal information leakage using remote control between terminals according to an embodiment of the present invention.

1, the wireless network system 100 of the present invention includes call connection information for a specific terminal (hereinafter referred to as a receiving terminal) to be controlled by the transmitting terminal 110 among a plurality of mobile terminals The call admission control server 130 receives the call connection information from the base station 120 to the gateway 140 connected to the terminal corresponding to the call connection information received from the call admission control server 130 And transmits the received signal to the receiving terminal 150 constituting the sensor network with the gateway 140 so that the receiving terminal 150 converts the signal into the remote control mode, Can remotely control the receiving terminal 150 at a remote location. At this time, the wireless network system includes a communication network such as GSM, W-CDMA, WiMAX, LTE, and the like.

In particular, the transmitting terminal and the receiving terminal are terminals designed to use voice and data communication services, for example, a smart phone, a mobile phone, a PDA, or the like.

Also, the base station 120 is a mobile communication network terminal device directly connected to a mobile terminal by performing baseband signal processing, wired / wireless conversion, and wireless signal transmission / reception.

2 is a flowchart illustrating a method for preventing personal information leakage using remote control between terminals according to another embodiment of the present invention.

As shown in FIG. 2, in the personal information leakage preventing method using the inter-terminal remote control of the present invention, a transmitting terminal to be remotely controlled among a plurality of mobile terminals is a communication terminal The call connection information for connection is transmitted through the wireless network system described above with reference to FIG. 1 (S210).

The call connection information is information indicating a call connection procedure for performing a call service and a data service. In particular, when a call connection is connected including remote control trigger information set in advance for the reception terminal, Mode.

That is, one transmitting end of a plurality of terminals transmits call connection information including predefined remote control trigger information to the receiving terminal from a receiving terminal of the plurality of terminals to be controlled remotely, Wherein the receiving terminal receives the call connection information, determines whether the received call connection information is valid, and, if there is remote control trigger information in the call connection information after making call connection connection, Mode.

As described above, the receiving terminal, which is remote-controlled by the transmitting terminal, obtains sensing information on the external environmental conditions through the sensor node provided therein (S220). At this time, the sensor node includes at least one of a thermal sensor and a humidity sensor. The sensor node is attached to the receiving terminal and senses an external environmental condition of the receiving terminal, for example, external temperature, humidity, Can be obtained.

In operation S230, it is determined whether the sensing information about the external environmental condition acquired by the receiving terminal through the sensor node has deviated from a normal range according to a predetermined user-defined policy. Here, the user-defined policy may be defined and changed by the user as reference information for determining whether the sensing information sensed for the external environment condition of the receiving terminal is normal or not. For example, when the measured temperature is less than 60 degrees, the user-defined policy determines that the external temperature state of the receiving terminal is normal, or if the measured humidity is less than 30%, the external humidity state of the receiving terminal is normal It can be judged.

If it is determined that the sensing information measured by the receiving terminal exceeds a normal range according to a user-defined policy, for example, the temperature is 60 degrees or the humidity exceeds 30% (S240).

If the sensing information deviates from the normal range according to the predetermined user-defined policy, the degree of the detachment is determined (S250).

For example, when the sensing information is measured by the thermal sensor for 60 minutes at a temperature of 5 minutes, it is determined that the degree of deviation corresponds to a level 1 preset by the user-defined policy. This level 1 deletes the personal information input by the user at the receiving end. At this time, the personal information is information input by a user and represents at least one of a phone book, a call log, a text message, and a photograph.

Or if the sensing information is measured by a thermal sensor for a temperature of 60 degrees for 10 minutes, it is determined that the degree of deviation corresponds to a level 2 preset by a user-defined policy. The level 2 deletes the personal information inputted from the user corresponding to the level 1 and the system file information of the receiving terminal in addition.

Or if the sensing information is measured by a thermal sensor for a temperature of 70 degrees for 10 minutes, it is determined that the degree of deviation corresponds to a preset level 3 by a user-defined policy. The level 3 indicates at least one of a message, an image, and a warning sound for the content indicating the destruction of the hardware of the receiving terminal to the outside of the receiving terminal to inform the user.

Thereafter, if there is no input from the user within the predetermined time, the receiving terminal deletes the personal information inputted from the user corresponding to the level 2 and the system file information of the receiving terminal, and destroys the hardware of the receiving terminal (S253). In the case of the level 3, it is determined that the external environment condition of the receiving terminal is a serious condition that can not be recovered. Therefore, in order to destroy the hardware of the reception terminal, a switch circuit is additionally provided in a power supply section to which power is supplied to the CPU and the ROM of the reception terminal, and when a command corresponding to the level 3 occurs, The hardware of the receiving terminal can be physically destroyed by reversing the polarity of the power supplied to the CPU and the ROM.

In particular, prior to deleting the personal information of the user previously stored in the receiving terminal, the receiving terminal transmits the user's personal information to the data backup server connected to the communication network, thereby backing up the personal information of the user.

In order to cancel the remote control mode for the receiving terminal, the remote control mode for the receiving terminal can be canceled only when the transmitting terminal transmits the call connection information including the remote control revocation information to the receiving terminal, The horse can not perform the remote control mode cancellation by itself.

In addition to the above-described embodiment, in place of the step of transmitting and receiving the inter-terminal call connection information, it is also possible that, instead of transmitting the call connection information including the remote control trigger information directly to the receiver terminal, A user-defined policy preset in the control server is stored in advance, and the call terminal transmits call connection information to the pre-stored call admission control server.

Thereafter, a predetermined user-defined policy is stored in the call admission control server in advance so that the sensing information measured by the receiving terminal does not fall outside the normal range according to the user-defined policy, The remote control of the receiving terminal can be performed by the user defined policy stored in the call admission control server.

In addition, the present invention can be stored in a computer-readable recording medium on which a program for execution by a computer is recorded. At this time, the computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored. Examples of the computer readable recording medium include ROM, RAM, CD-ROM, DVD 占 ROM, DVD-RAM, magnetic tape, floppy disk, hard disk, optical data storage, and the like. In addition, the computer-readable recording medium may be distributed to network-connected computer devices so that computer-readable codes can be stored and executed in a distributed manner.

A method for preventing personal information leakage using remote control between terminals according to the present invention includes transmitting call connection information including remote control trigger information for performing remote control to remote terminals, There is an effect that can be performed.

According to another aspect of the present invention, there is provided a method for preventing leakage of personal information using remote control between terminals, the method comprising: measuring an external environment condition of a remote terminal and, when the measured external environment condition deviates from a predetermined threshold value, The personal information of the user stored in the terminal is differentially deleted, thereby preventing the user's personal information from being leaked to the outside.

According to another aspect of the present invention, there is provided a method for preventing personal information leakage using remote control between terminals, the method comprising: transmitting personal information of a user stored in the terminal to a data backup server before deleting personal information of a user stored in the terminal; Even if the information is inevitably deleted from the terminal, if the personal information is required, personal information of the backed-up user can be easily acquired by connecting to the data backup server.

While the present invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, Do.

S210: Transmits and receives call connection information between a plurality of terminals
S220: Obtaining sensing information on the external environment condition of the terminal
S230: It is judged whether or not the obtained sensing information deviates from the normal range according to the predetermined user-defined policy
S240: Compares whether the sensing information deviates from the normal range according to the user-defined policy
S250: Determine the deviation from the normal range according to the user-defined policy of the sensing information

Claims (12)

  1. Transmitting and receiving call connection information between a plurality of terminals for remote control of the terminal;
    Acquiring sensing information on an external environmental condition through the intra-terminal sensor node;
    Determining whether the acquired sensing information deviates from a normal range according to a predetermined user-defined policy; And
    Controlling the personal information of the user stored in the terminal to be differentially deleted according to the degree of deviation from the normal range when the sensing information is determined to have deviated from the normal range according to the user defined policy;
    , & Lt ; / RTI & gt ;
    The step of deleting the personal information of the user stored in the terminal
    A first deleting step of deleting the personal information inputted from the user;
    A second deleting step of deleting the personal information and the system file information of the terminal; And
    A third deleting step of deleting the personal information, the system file information of the terminal, and destroying the hardware of the terminal;
    Is selected according to a departure state of a normal range according to a user-defined policy of the sensing information, and is performed .
  2. The method according to claim 1,
    The step of transmitting and receiving the call connection information between the plurality of terminals
    Transmitting call connection information including predefined remote control trigger information to a receiving terminal of a plurality of terminals to be remotely controlled by one transmitting terminal of the plurality of terminals;
    Receiving the call connection information from the transmitting terminal and determining whether the remote control trigger information included in the received call connection information is valid; And
    A step of converting the remote control trigger information received by the receiving terminal into a remote control mode;
    The method comprising the steps of: (a) receiving the personal information from the terminal;
  3. The method according to claim 1,
    The step of acquiring the sensing information
    And acquiring sensing information on an external temperature or humidity of the terminal.
  4. The method according to claim 1,
    The step of determining whether the sensing information is deviated from the normal range according to the user-defined policy
    Comparing the sensing information with a normal range according to a predetermined user-defined policy; And
    Determining an abnormal state for an external environment of the terminal when the sensing information is out of a normal range according to the user defined policy;
    The method comprising the steps of: (a) receiving the personal information from the terminal;
  5. delete
  6. delete
  7. The method according to claim 1,
    The third deletion process
    Outputting at least one of a message, an image, and a warning sound indicating that the terminal is scheduled to be destroyed by hardware;
    The terminal deletes the personal information and the system file information of the terminal after a predetermined time elapses, and destroys the hardware of the terminal;
    The method comprising the steps of: (a) receiving the personal information from the terminal;
  8. The method according to claim 1,
    The personal information
    A phone number, a phone number, a call log, a text message, and a photograph.
  9. The method according to claim 1,
    The step of deleting the personal information of the user stored in the terminal
    The method comprising: transmitting personal information of a user to a data backup server connected to a communication network and backing up personal information of the user stored in the terminal before deleting personal information of the user stored in the terminal; Way.
  10. The method according to claim 1,
    Transmitting the call connection information including the remote control cancellation information to the transmitting end of the plurality of terminals and ending the remote control mode by confirming the remote control cancellation information in the call connection information received by the receiving end;
    Further comprising the steps of: receiving the personal information from the terminal;
  11. Transmitting call connection information to a call admission control server having a user-defined policy for the remote terminal;
    Acquiring sensing information on an external environmental condition through the sensor node in the receiving terminal;
    Determining whether the acquired sensing information deviates from a normal range according to a predetermined user-defined policy; And
    Controlling the personal information of the user stored in the terminal to be differentially deleted according to the degree of deviation from the normal range when the sensing information is determined to have deviated from the normal range according to the user defined policy;
    , ≪ / RTI &
    The step of deleting the personal information of the user stored in the terminal
    A first deleting step of deleting the personal information inputted from the user;
    A second deleting step of deleting the personal information and the system file information of the terminal; And
    A third deleting step of deleting the personal information, the system file information of the terminal, and destroying the hardware of the terminal;
    Is selected and executed according to a departure state of a normal range according to a user defined policy of the sensing information.
  12. A computer-readable recording medium on which a program for executing a method according to any one of claims 1 to 4 and 11 to 15 is recorded.
KR1020120111512A 2012-10-08 2012-10-08 Information spill prevention method using remote control between terminals KR101399353B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020120111512A KR101399353B1 (en) 2012-10-08 2012-10-08 Information spill prevention method using remote control between terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020120111512A KR101399353B1 (en) 2012-10-08 2012-10-08 Information spill prevention method using remote control between terminals

Publications (2)

Publication Number Publication Date
KR20140045231A KR20140045231A (en) 2014-04-16
KR101399353B1 true KR101399353B1 (en) 2014-05-27

Family

ID=50652857

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020120111512A KR101399353B1 (en) 2012-10-08 2012-10-08 Information spill prevention method using remote control between terminals

Country Status (1)

Country Link
KR (1) KR101399353B1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010044083A (en) * 2000-08-18 2001-06-05 강민구 Private information protect method for a lost mobile terminal
KR100748699B1 (en) * 2006-04-13 2007-08-06 삼성전자주식회사 Apparatus and method of detecting error data in sensor network
KR20070122457A (en) * 2005-02-08 2007-12-31 싸이그니피컨트 서비시즈 리미티드 Call notification controlled by call originating system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010044083A (en) * 2000-08-18 2001-06-05 강민구 Private information protect method for a lost mobile terminal
KR20070122457A (en) * 2005-02-08 2007-12-31 싸이그니피컨트 서비시즈 리미티드 Call notification controlled by call originating system
KR100748699B1 (en) * 2006-04-13 2007-08-06 삼성전자주식회사 Apparatus and method of detecting error data in sensor network

Also Published As

Publication number Publication date
KR20140045231A (en) 2014-04-16

Similar Documents

Publication Publication Date Title
JP4027360B2 (en) Authentication method and system, information processing method and apparatus
US9576157B2 (en) Method for mitigating the unauthorized use of a device
EP2266070B1 (en) System for mitigating the unauthorized use of a device
US9979776B2 (en) Remotely locating and commanding a mobile device
US9569643B2 (en) Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer
US20100279673A1 (en) Remotely Locating and Commanding a Mobile Device
CA2760327C (en) Remotely locating and commanding a mobile device
US20140329500A1 (en) Anti-Theft Protection Method And Device For Cellular Phone
US10419936B2 (en) Methods and systems for causing mobile communications devices to emit sounds with encoded information
US20180234852A1 (en) Systems and methods for dynamically assessing and mitigating risk of an insured entity
CA2757487A1 (en) System for monitoring the unauthorized use of a device
CA2757495A1 (en) Method for monitoring the unauthorized use of a device
CN105791555A (en) Method and apparatus for alert control
US20080030588A1 (en) Disablement of Camera Functionality For a Portable Device
US8806567B1 (en) Using encoded identifiers to provide rapid configuration for network access
EP2562667A1 (en) Apparatus and method for providing security information on background process
CN104539617A (en) Network connection control method
KR20140048271A (en) Method and apparatus for detecting and dealing with a lost electronics device
CN101061739A (en) Method and apparatus for indicating proximity co-presence
JP4602432B2 (en) Base station
US20130137376A1 (en) Systems and methods for recovering low power devices
CN101141721A (en) Safety mobile telephone based communication custom
JP2007081890A (en) Method for setting network
US8185644B2 (en) Method and apparatus for using SMS short code messaging to facilitate the transmission of a status update for a security system
US9066326B2 (en) Automatic user notification, with quick response (QR) code generation following failed NFC device pairing

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20170328

Year of fee payment: 4

FPAY Annual fee payment

Payment date: 20180406

Year of fee payment: 5

FPAY Annual fee payment

Payment date: 20190411

Year of fee payment: 6