KR101450463B1 - Encrypted personal information providing method using smart device - Google Patents
Encrypted personal information providing method using smart device Download PDFInfo
- Publication number
- KR101450463B1 KR101450463B1 KR1020130081833A KR20130081833A KR101450463B1 KR 101450463 B1 KR101450463 B1 KR 101450463B1 KR 1020130081833 A KR1020130081833 A KR 1020130081833A KR 20130081833 A KR20130081833 A KR 20130081833A KR 101450463 B1 KR101450463 B1 KR 101450463B1
- Authority
- KR
- South Korea
- Prior art keywords
- personal information
- decryption
- code
- smart device
- terminal
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a method of providing encrypted personal information using a smart device, and more particularly, to a method and system for encrypting personal information using a smart device provided with an application program for encrypting personal information, Receiving personal information and a decryption condition to be encrypted from the smart device, and storing the personal information and the decryption condition in a database; (b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device; (c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And (d) if the decryption condition is satisfied, extracting personal information corresponding to the input code from the database, and transmitting the extracted personal information to the decryption terminal.
According to the encrypted personal information providing method using the smart device proposed in the present invention, the encryption server receives and stores the personal information and the decryption condition from the smart device, generates and transmits the code, and receives the code from the decryption device. The user can input the code in place of the personal information when the personal information is required to be input both online and offline, and when the decryption condition set by the user is satisfied, Since the user can confirm the personal information, the degree of disclosure of the personal information can be set by the user, so that the user can fully protect the personal information.
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an encrypted personal information providing method, and more particularly, to a method of providing encrypted personal information using a smart device.
Generally, personal information means information that can identify the individual or the individual. This includes, for example, resident registration number, mobile phone number, credit card number, IP, ID, password, passport number, and driver's license number. Personal information is likely to be leaked through various routes in the process of use because it is necessary for the identification of individuals in the processing of financial affairs, the Internet, contracts, etc., and also for delivery or postal delivery.
Recently, the seriousness of leakage of personal information is increasing. Particularly, leakage of personal information is becoming a social problem as a result of leakage of customer information from a service provider inevitably holding personal information (for example, customer information and consumer information). In addition, personal information is leaked when using the Internet or leaked through portable terminals in which personal information is stored.
To solve such problems, various techniques for protecting personal information have been developed (Japanese Patent Laid-Open Nos. 2000-0056730, 10-0599937, 10-1021305, etc.). However, this technology is for the protection of personal information on the online, and there is a limit to the scope of protection of personal information in consideration of the life patterns of modern people who input and use personal information online or offline for processing various kinds of work. In particular, there is no clear protection for private information that is input offline and disclosed to others, and development of such information is urgently needed.
The present invention has been proposed in order to solve the above-mentioned problems of the previously proposed methods. The encryption server receives and stores personal information and decryption conditions from a smart device, generates and transmits a code, The user can input the code in place of the personal information when the personal information is required to be inputted both online and offline, and if the decryption condition set by the user is satisfied The present invention aims to provide a method for providing encrypted private information using a smart device, which enables the user to set the degree of disclosure of the personal information, so that the reader can verify the personal information. .
According to an aspect of the present invention, there is provided a method of providing encrypted personal information using a smart device,
An encryption server for providing encrypted personal information using a smart device provided with an application program for encrypting personal information,
(a) receiving personal information and a decryption condition to be encrypted from the smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting personal information corresponding to the input code from the database if the decryption condition is satisfied, and transmitting the extracted personal information to the decryption terminal.
Preferably, in the step (a)
Decryption period, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time and decryption time.
More preferably, in the step (c)
It is possible to receive the decryption information corresponding to the decryption condition from the decryption terminal and determine whether the decryption condition is satisfied.
Even more preferably,
The location information of the decryption terminal, the decryption information, and the decryption terminal information.
Preferably, in the step (d)
An alarm of the transmission status of the personal information can be transmitted to the smart device.
Preferably, in the step (d)
If the deterioration condition is unsatisfactory, the decryption device may transmit the code decryption attempt alarm to the smart device.
Preferably, in the step (d)
The personal information is controlled to be output from the decryption terminal for a predetermined time, and the output of the personal information can be stopped when the predetermined time has elapsed.
Preferably, after step (d)
The encryption server may further include discarding the code if the personal information transmission and output of step (d) are processed a predetermined number of times.
According to the encrypted personal information providing method using the smart device proposed in the present invention, the encryption server receives and stores the personal information and the decryption condition from the smart device, generates and transmits the code, and receives the code from the decryption device. The user can input the code in place of the personal information when the personal information is required to be input both online and offline, and when the decryption condition set by the user is satisfied, Since the user can confirm the personal information, the degree of disclosure of the personal information can be set by the user, so that the user can fully protect the personal information.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a system for implementing an encrypted personal information providing method using a smart device according to an embodiment of the present invention; FIG.
BACKGROUND OF THE INVENTION 1. Field of the Invention [0002] The present invention relates to a smart device,
3 is a diagram illustrating an example of a smart device or a decryption terminal executing an application program in an encrypted personal information providing method using a smart device according to an embodiment of the present invention.
FIG. 4 illustrates an example of a smart device for inputting personal information in an encrypted personal information providing method using a smart device according to an embodiment of the present invention. FIG.
FIG. 5 illustrates a smart device for inputting a decryption condition in an encrypted personal information providing method using a smart device according to an exemplary embodiment of the present invention. FIG.
FIG. 6 is a diagram illustrating a smart device for transmitting and generating a generated code in an encrypted personal information providing method using a smart device according to an embodiment of the present invention. FIG.
FIG. 7 is a view illustrating an example of a decryption terminal for inputting code and decryption information in an encrypted personal information providing method using a smart device according to an embodiment of the present invention; FIG.
8 is a view illustrating an example of a decryption terminal for receiving and outputting personal information in an encrypted personal information providing method using a smart device according to an embodiment of the present invention.
9 is a view showing an example of a smart device to which an alarm of transmission status is output in an encrypted personal information providing method using a smart device according to an embodiment of the present invention.
10 is a view showing an example of a decryption terminal in which the output of personal information is interrupted in the encrypted personal information providing method using the smart device according to the embodiment of the present invention.
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings, in order that those skilled in the art can easily carry out the present invention. In the following detailed description of the preferred embodiments of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear. In the drawings, like reference numerals are used throughout the drawings.
In addition, in the entire specification, when a part is referred to as being 'connected' to another part, it may be referred to as 'indirectly connected' not only with 'directly connected' . Also, to "include" an element means that it may include other elements, rather than excluding other elements, unless specifically stated otherwise.
1 is a block diagram of a system for implementing an encrypted personal information providing method using a
That is, according to the present invention, when the
Hereinafter, each component constituting a system for implementing an encrypted personal information providing method using the
The
On the other hand, the
The
The
FIG. 2 is a flowchart illustrating an encrypted private information providing method using the
In step S10, the
In step S100, the
3 is a diagram illustrating an example of a
4 is a diagram illustrating an example of a
On the other hand, in step S100, it is possible to receive and store the decryption condition including the decryption period, the decryption place, the setting information on at least one of the decryption device and the
5 is a diagram illustrating an example of a
In step S200, a
6 is a diagram illustrating an example of a
For example, when creating a contract, personal information of the contracting party is written in the contract. Since the contracting party is not an acquaintance in many cases, the user may feel discomfort or anxiety about writing the personal information in the contract. Therefore, the user can execute the application program installed in the
In step S300, the
In step S300, the
At this time, the decryption information is at least one of the location information of the
7 is a diagram illustrating an example of a
In step S400, if the
8 is a diagram illustrating an example of a
On the other hand, in step S400, the alarm of the transmission status of the personal information can be transmitted to the
9 is a diagram illustrating an example of a
Also, in step S400, the personal information is controlled to be output from the
10 is a diagram illustrating an example of a
In step S500, if the
In the present invention, the
On the other hand, the
Meanwhile, the
In the embodiment described above, the
Similarly, in the embodiment described above, the
The technical idea of the present invention has been described through several embodiments.
It will be apparent to those skilled in the art that various changes and modifications may be made to the embodiments described above from the description of the present invention. Further, although not explicitly shown or described, those skilled in the art can make various modifications including the technical idea of the present invention from the description of the present invention Which is still within the scope of the present invention. The above-described embodiments described with reference to the accompanying drawings are for the purpose of illustrating the present invention, and the scope of the present invention is not limited to these embodiments.
delete
10: Code 100: Encryption Server
110: Database 200: Smart device
300: Detective terminal
Step S10: Inputting the login information of the user and performing login processing
S100: Entering and storing personal information and decryption conditions
S200: generating a code corresponding to the personal information and transmitting it to the smart device
S300: a step of receiving a code from the decryption terminal and judging whether the decryption condition is satisfied
S400: outputting the personal information corresponding to the code to the decryption terminal if the decryption condition is satisfied
S500: Step of discarding the code when the personal information transmission and output are processed a predetermined number of times
Claims (8)
(a) receiving personal information and a decryption condition to be encrypted from a smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting personal information corresponding to the input code from the database and transmitting the personal information to the decryption terminal when the decryption condition is satisfied, and transmitting an alarm of the transmission status of the personal information to the smart device A method of providing encrypted personal information using a smart device.
And a decryption condition including at least one of a decryption period, a decryption place, a decryption device, and a decryption device.
And receiving the decryption information corresponding to the decryption condition from the decryption terminal, and determining whether the decryption condition is satisfied.
Wherein the at least one of the location information, the decryption information, and the decryption information of the decryption terminal is encrypted using the smart device.
(a) receiving personal information and a decryption condition to be encrypted from a smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting, from the database, personal information corresponding to the received code if the decryption condition is satisfied, and transmitting the extracted personal information to the decryption terminal, if the decryption condition is unsatisfactory, decrypting the code by the decryption terminal And transmitting an attempted alarm to the user.
(a) receiving personal information and a decryption condition to be encrypted from a smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting, from the database, the personal information corresponding to the input code if the decryption condition is satisfied, and controlling the personal information to be output from the decryption terminal for a predetermined period of time, And processing the output of the personal information to be stopped when a predetermined time elapses.
And discarding the code if the encryption server processes the personal information transmission and output of step (d) by a predetermined number of times.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130081833A KR101450463B1 (en) | 2013-07-11 | 2013-07-11 | Encrypted personal information providing method using smart device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130081833A KR101450463B1 (en) | 2013-07-11 | 2013-07-11 | Encrypted personal information providing method using smart device |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101450463B1 true KR101450463B1 (en) | 2014-10-13 |
Family
ID=51997591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020130081833A KR101450463B1 (en) | 2013-07-11 | 2013-07-11 | Encrypted personal information providing method using smart device |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101450463B1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030003593A (en) * | 2001-07-03 | 2003-01-10 | (주) 해커스랩 | Network Security System and Method for applying Security Rule for Restricted Condition |
JP2006344116A (en) * | 2005-06-10 | 2006-12-21 | Koji Koda | Database managing method using cellular phone and qr code |
KR20080067997A (en) * | 2008-06-30 | 2008-07-22 | 유시용 | New idea about a method to replace rrn (resident registration number ) |
KR20100006309A (en) * | 2008-07-09 | 2010-01-19 | 고려대학교 산학협력단 | System and method of location-based information security |
-
2013
- 2013-07-11 KR KR1020130081833A patent/KR101450463B1/en active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030003593A (en) * | 2001-07-03 | 2003-01-10 | (주) 해커스랩 | Network Security System and Method for applying Security Rule for Restricted Condition |
JP2006344116A (en) * | 2005-06-10 | 2006-12-21 | Koji Koda | Database managing method using cellular phone and qr code |
KR20080067997A (en) * | 2008-06-30 | 2008-07-22 | 유시용 | New idea about a method to replace rrn (resident registration number ) |
KR20100006309A (en) * | 2008-07-09 | 2010-01-19 | 고려대학교 산학협력단 | System and method of location-based information security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230245092A1 (en) | Terminal for conducting electronic transactions | |
US20190384934A1 (en) | Method and system for protecting personal information infringement using division of authentication process and biometric authentication | |
US20180295121A1 (en) | Secure element authentication | |
CN104125055B (en) | Encryption and decryption method and electronic equipment | |
JP7152765B2 (en) | Communication system, communication device used therein, management device and information terminal | |
CN109325870A (en) | The method and system of shared private data | |
CN104751073A (en) | Privacy management for tracked devices | |
CN105981423A (en) | Method and apparatus for transmitting and receiving encrypted message between terminals | |
CN105139205A (en) | Payment verification method, terminal and server | |
KR101379711B1 (en) | Method for file encryption and decryption using telephone number | |
Pandit et al. | Privacy in time of a pandemic | |
US20210357946A1 (en) | Method, apparatus, and system for transmitting and receiving information by using qr code | |
US10769285B2 (en) | Privacy enabled runtime | |
US20200320538A1 (en) | Authorizing transactions using negative pin messages | |
Federal Trade Commission | Mobile Health App Developers: FTC Best Practices (2016) | |
JP4643313B2 (en) | Relief method when biometric authentication is impossible for client / server system with biometric authentication function | |
CN106604241B (en) | Method and system for transmitting information between devices and source terminal | |
KR101450463B1 (en) | Encrypted personal information providing method using smart device | |
JP5670001B1 (en) | Transaction system, transaction method, and information recording medium | |
US20190089538A1 (en) | Smart login method using messenger service and apparatus thereof | |
CN110012149B (en) | Application program management method, device, terminal and storage medium | |
KR101603988B1 (en) | System for context-aware service | |
KR102224974B1 (en) | Service server, and operating method thereof | |
CN106874793B (en) | Database processing method and device | |
KR101511451B1 (en) | Method of encryption to keyboard input information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20171003 Year of fee payment: 4 |
|
FPAY | Annual fee payment |
Payment date: 20181008 Year of fee payment: 5 |
|
FPAY | Annual fee payment |
Payment date: 20191007 Year of fee payment: 6 |