KR101450463B1 - Encrypted personal information providing method using smart device - Google Patents

Encrypted personal information providing method using smart device Download PDF

Info

Publication number
KR101450463B1
KR101450463B1 KR1020130081833A KR20130081833A KR101450463B1 KR 101450463 B1 KR101450463 B1 KR 101450463B1 KR 1020130081833 A KR1020130081833 A KR 1020130081833A KR 20130081833 A KR20130081833 A KR 20130081833A KR 101450463 B1 KR101450463 B1 KR 101450463B1
Authority
KR
South Korea
Prior art keywords
personal information
decryption
code
smart device
terminal
Prior art date
Application number
KR1020130081833A
Other languages
Korean (ko)
Inventor
김익환
Original Assignee
김익환
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김익환 filed Critical 김익환
Priority to KR1020130081833A priority Critical patent/KR101450463B1/en
Application granted granted Critical
Publication of KR101450463B1 publication Critical patent/KR101450463B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a method of providing encrypted personal information using a smart device, and more particularly, to a method and system for encrypting personal information using a smart device provided with an application program for encrypting personal information, Receiving personal information and a decryption condition to be encrypted from the smart device, and storing the personal information and the decryption condition in a database; (b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device; (c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And (d) if the decryption condition is satisfied, extracting personal information corresponding to the input code from the database, and transmitting the extracted personal information to the decryption terminal.
According to the encrypted personal information providing method using the smart device proposed in the present invention, the encryption server receives and stores the personal information and the decryption condition from the smart device, generates and transmits the code, and receives the code from the decryption device. The user can input the code in place of the personal information when the personal information is required to be input both online and offline, and when the decryption condition set by the user is satisfied, Since the user can confirm the personal information, the degree of disclosure of the personal information can be set by the user, so that the user can fully protect the personal information.

Description

[0001] ENCRYPTED PERSONAL INFORMATION PROVIDING METHOD USING SMART DEVICE [0002]

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an encrypted personal information providing method, and more particularly, to a method of providing encrypted personal information using a smart device.

Generally, personal information means information that can identify the individual or the individual. This includes, for example, resident registration number, mobile phone number, credit card number, IP, ID, password, passport number, and driver's license number. Personal information is likely to be leaked through various routes in the process of use because it is necessary for the identification of individuals in the processing of financial affairs, the Internet, contracts, etc., and also for delivery or postal delivery.

Recently, the seriousness of leakage of personal information is increasing. Particularly, leakage of personal information is becoming a social problem as a result of leakage of customer information from a service provider inevitably holding personal information (for example, customer information and consumer information). In addition, personal information is leaked when using the Internet or leaked through portable terminals in which personal information is stored.

To solve such problems, various techniques for protecting personal information have been developed (Japanese Patent Laid-Open Nos. 2000-0056730, 10-0599937, 10-1021305, etc.). However, this technology is for the protection of personal information on the online, and there is a limit to the scope of protection of personal information in consideration of the life patterns of modern people who input and use personal information online or offline for processing various kinds of work. In particular, there is no clear protection for private information that is input offline and disclosed to others, and development of such information is urgently needed.

The present invention has been proposed in order to solve the above-mentioned problems of the previously proposed methods. The encryption server receives and stores personal information and decryption conditions from a smart device, generates and transmits a code, The user can input the code in place of the personal information when the personal information is required to be inputted both online and offline, and if the decryption condition set by the user is satisfied The present invention aims to provide a method for providing encrypted private information using a smart device, which enables the user to set the degree of disclosure of the personal information, so that the reader can verify the personal information. .

According to an aspect of the present invention, there is provided a method of providing encrypted personal information using a smart device,

An encryption server for providing encrypted personal information using a smart device provided with an application program for encrypting personal information,

(a) receiving personal information and a decryption condition to be encrypted from the smart device and storing the received personal information in a database;

(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;

(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And

(d) extracting personal information corresponding to the input code from the database if the decryption condition is satisfied, and transmitting the extracted personal information to the decryption terminal.

Preferably, in the step (a)

Decryption period, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time, decryption time and decryption time.

More preferably, in the step (c)

It is possible to receive the decryption information corresponding to the decryption condition from the decryption terminal and determine whether the decryption condition is satisfied.

Even more preferably,

The location information of the decryption terminal, the decryption information, and the decryption terminal information.

Preferably, in the step (d)

An alarm of the transmission status of the personal information can be transmitted to the smart device.

Preferably, in the step (d)

If the deterioration condition is unsatisfactory, the decryption device may transmit the code decryption attempt alarm to the smart device.

Preferably, in the step (d)

The personal information is controlled to be output from the decryption terminal for a predetermined time, and the output of the personal information can be stopped when the predetermined time has elapsed.

Preferably, after step (d)

The encryption server may further include discarding the code if the personal information transmission and output of step (d) are processed a predetermined number of times.

According to the encrypted personal information providing method using the smart device proposed in the present invention, the encryption server receives and stores the personal information and the decryption condition from the smart device, generates and transmits the code, and receives the code from the decryption device. The user can input the code in place of the personal information when the personal information is required to be input both online and offline, and when the decryption condition set by the user is satisfied, Since the user can confirm the personal information, the degree of disclosure of the personal information can be set by the user, so that the user can fully protect the personal information.

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a system for implementing an encrypted personal information providing method using a smart device according to an embodiment of the present invention; FIG.
BACKGROUND OF THE INVENTION 1. Field of the Invention [0002] The present invention relates to a smart device,
3 is a diagram illustrating an example of a smart device or a decryption terminal executing an application program in an encrypted personal information providing method using a smart device according to an embodiment of the present invention.
FIG. 4 illustrates an example of a smart device for inputting personal information in an encrypted personal information providing method using a smart device according to an embodiment of the present invention. FIG.
FIG. 5 illustrates a smart device for inputting a decryption condition in an encrypted personal information providing method using a smart device according to an exemplary embodiment of the present invention. FIG.
FIG. 6 is a diagram illustrating a smart device for transmitting and generating a generated code in an encrypted personal information providing method using a smart device according to an embodiment of the present invention. FIG.
FIG. 7 is a view illustrating an example of a decryption terminal for inputting code and decryption information in an encrypted personal information providing method using a smart device according to an embodiment of the present invention; FIG.
8 is a view illustrating an example of a decryption terminal for receiving and outputting personal information in an encrypted personal information providing method using a smart device according to an embodiment of the present invention.
9 is a view showing an example of a smart device to which an alarm of transmission status is output in an encrypted personal information providing method using a smart device according to an embodiment of the present invention.
10 is a view showing an example of a decryption terminal in which the output of personal information is interrupted in the encrypted personal information providing method using the smart device according to the embodiment of the present invention.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings, in order that those skilled in the art can easily carry out the present invention. In the following detailed description of the preferred embodiments of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear. In the drawings, like reference numerals are used throughout the drawings.

In addition, in the entire specification, when a part is referred to as being 'connected' to another part, it may be referred to as 'indirectly connected' not only with 'directly connected' . Also, to "include" an element means that it may include other elements, rather than excluding other elements, unless specifically stated otherwise.

1 is a block diagram of a system for implementing an encrypted personal information providing method using a smart device 200 according to an embodiment of the present invention. 1, a system for implementing an encrypted personal information providing method using a smart device 200 according to an embodiment of the present invention includes an encryption server 100, a smart device 200, (300).

That is, according to the present invention, when the encryption server 100 stores the personal information and the decryption condition, the encryption server 100 generates the code 10 corresponding to the personal information, provides the code 10 to the smart device 200, It is determined whether the decryption condition is satisfied and the personal information corresponding to the code 10 is transmitted to the decryption terminal 300 and outputted so that the personal information can be restrictedly browsed when the decryption condition is satisfied, It is possible to prevent exposure of personal information and to prevent personal information from being leaked by indirectly providing personal information by using the code 10 when personal information is required.

Hereinafter, each component constituting a system for implementing an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention will be described in detail.

The encryption server 100 may be a server that provides encrypted personal information. The encryption server 100 permits connection of the smart device 200 or the decryption terminal 300 via a network including the Internet, an intranet, a wired / wireless communication network, and a mobile communication network, and transmits / receives various signals and data. In addition, when the encryption server 100 communicates with the smart device 200 or the decryption device 300 through the network, it is possible to securely perform communication by encrypting signals or data.

On the other hand, the encryption server 100 includes a database 110, can store personal information of the user, decryption conditions, and the like, and can store and store the generated code 10 with the personal information. In addition, the personal information, the decryption condition, the code 10, and the like are stored and managed according to the account of the user who has joined the membership so that the user does not input new personal information every time, Inefficiency, information leak, and anxiety of error occurrence can be minimized.

The smart device 200 may be a terminal of a user who intends to indirectly provide personal information by using the code 10 instead of providing the personal information directly according to the encrypted personal information providing method provided by the encryption server 100 have. The user installs an application program for encrypting personal information in the smart device 200 and executes the application program in a situation where the personal information is required to use the code 10 generated in response to the personal information in place of the personal information have.

The decryption terminal 300 may be a reader terminal that obtains the code 10 used by the user instead of the personal information and confirms the personal information corresponding to the code 10. [ The decryption person can access the encryption server 100 using the decryption terminal 300 and enter the code 10 to receive the personal information corresponding to the code 10 from the encryption server 100. [ However, in order to normally receive and confirm the personal information, the decryption condition set by the smart device 200 must be satisfied, and personal information may be output for a predetermined time even if the decryption condition is satisfied.

FIG. 2 is a flowchart illustrating an encrypted private information providing method using the smart device 200 according to an embodiment of the present invention. 2, an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention includes a step of receiving and storing personal information and a decryption condition (S100) A step S 300 of receiving the code 10 from the decryption terminal 300 and determining whether the code 10 satisfies the decryption condition, (S400) of outputting the personal information corresponding to the code 10 to the decrypting terminal 300. The step S10 of receiving and inputting the login information of the user, And discarding the code 10 if the output is processed a predetermined number of times (S500).

In step S10, the encryption server 100 can input the user's login information and perform login processing. That is, when a user joins a member to continuously use the personal information providing method provided by the encryption server 100 and generates login information such as an ID and a password, the user inputs login information from the smart device 200 at step S10 You can log in to your account.

In step S100, the encryption server 100 receives the personal information to be encrypted and the decryption condition from the smart device 200, and stores the personal information and the decryption condition in the database 110. [ On the other hand, if the user who has logged in in step S10 has previously stored personal information and the like, in step S100, the selection of the object to be encrypted can be inputted among the personal information already stored. In step S100, the personal information may be information to be encrypted by the user using the code 10, and may include a resident registration number, an address, a telephone number, and the like, which are a problem when information is leaked.

3 is a diagram illustrating an example of a smart device 200 or a decryption device 300 executing an application program in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention . 3, in the encrypted personal information providing method using the smart device 200 according to the embodiment of the present invention, an application program installed in the smart device 200 is executed to select " encrypt " , It is possible to process step S100. On the other hand, by installing and executing an application program on the decryption terminal 300 or by connecting to the encryption server 100 using the decryption terminal 300 and selecting "decrypt", the user can confirm the personal information using the code 10 have.

4 is a diagram illustrating an example of a smart device 200 for inputting personal information in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention. 4, in step S100 of the encrypted personal information providing method using the smart device 200 according to the embodiment of the present invention, the encryption server 100 inputs personal information from the smart device 200 Can receive. When the user has registered and logged in, the personal information already stored in the user account is output so that the user can easily select the personal information without having to input the personal information to be encrypted and generate the code 10 You may. However, when outputting personal information that has already been stored, it may be processed so as to make it impossible to confirm some information in order to protect personal information.

On the other hand, in step S100, it is possible to receive and store the decryption condition including the decryption period, the decryption place, the setting information on at least one of the decryption device and the decryption device 300, and the like. For example, it is possible for the user to set the decoding mode so that the decoding mode can be performed only during the decoding period or only at the decoding mode, or can be decoded only by the designated decoding mode or the designated decoding mode. Therefore, it is not possible for anyone who has obtained the code 10 to confirm the personal information but to use the code 10 corresponding to the decryption period, the decryption place, the decryption device, the decryption terminal 300, By making it possible to verify personal information, it is possible to securely protect personal information and to provide personal information when necessary.

5 is a diagram illustrating an example of a smart device 200 for inputting a decryption condition in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention. 5, in step S100 of the encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention, the decryption period, the decryption place, the decryption device, the decryption device 300, At least one of the decryption conditions may be selected so that the user can input and register the decryption condition. When designating the decryption device 300, it is possible to designate the decryption device using the cell phone number or the serial number assigned to the decryption device 300 Can be specified.

In step S200, a code 10 corresponding to the personal information stored in the encryption server 100 may be generated, and the generated code 10 may be transmitted to the smart device 200. [ In step S200, the encryption server 100 may match the generated code 10 with personal information and store the code in the user account. At this time, the code 10 may be a number, a letter, a symbol, or a combination thereof. The code 10 may be generated not only as a code 10 but also as a barcode, a QR code, and the like. At this time, the decryption condition may be transmitted to the smart device 200 together with the code 10 so that the decryption condition can be accurately recognized.

6 is a diagram illustrating an example of a smart device 200 that receives and outputs a generated code 10 in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention . 6, in step S200 of the encrypted personal information providing method using the smart device 200 according to the embodiment of the present invention, the code 10 corresponding to the personal information is generated as " ABC 123 " And may be output to the display screen of the smart device 200. Further, the QR code corresponding to " ABC123 " is further transmitted to the smart device 200 and is output together with the text form code 10, so that the code 10 can be used variously according to the user's need .

For example, when creating a contract, personal information of the contracting party is written in the contract. Since the contracting party is not an acquaintance in many cases, the user may feel discomfort or anxiety about writing the personal information in the contract. Therefore, the user can execute the application program installed in the smart device 200, enter the personal information to be described in the contract, and write the generated code 10 in the contract instead of the personal information. At this time, the code 10 may be used to set the decryption condition as the decryption condition for a predetermined period or the contracting party's office, so that the non-contracting party can not view the private information. Also, The decryption terminal 300 can be set to various decryption conditions.

In step S300, the encryption server 100 receives the code 10 from the decryption terminal 300 and can determine whether the decryption condition is satisfied. In the above example, the contracting party, that is, the decryptor, can input the code 10 written in the contract instead of the personal information to the encryption server 100 to confirm the user's personal information.

In step S300, the encryption server 100 can determine whether the decryption condition is satisfied using the input code 10. For example, the encryption server 100 decrypts, using the time when the code 10 is input from the decryption terminal 300, It is possible to determine whether or not the detox period is satisfied in the condition. Further, in step S300, the decryption information corresponding to the decryption condition is received from the decryption terminal 300, and it can be determined whether the decryption condition is satisfied. That is, when it is difficult to accurately determine whether or not the decryption condition is satisfied by receiving the code 10 from the decryption terminal 300, the decryption information can be received from the decryption terminal 300 to determine whether the decryption condition is satisfied .

At this time, the decryption information is at least one of the location information of the decryption terminal 300, the decryption information and the decryption terminal 300 information, and may be information necessary for determining whether the decryption condition is satisfied. At this time, the location information of the decryption terminal 300 may be acquired by the decryption terminal 300 using the Global Positioning System (GPS) function provided in the decryption terminal 300 and may be provided to the encryption server 100 . The detoxifier information may be an ID or e-mail address of a detoxifier used by the user to designate a detoxifier, and the detoxification terminal 300 information may be a mobile phone number or a serial number assigned to the detoxification terminal 300, and the like.

7 is a diagram illustrating an example of a decryption terminal 300 for inputting a code 10 and decryption information in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention. 7, in step S300 of the encrypted personal information providing method using the smart device 200 according to an exemplary embodiment of the present invention, a decryption key for decrypting the personal information of the user using the code 10 The decryption terminal 300 can be used to input the code 10 and the decryption information to the encryption server 100. [ When the decryption information is input for the purpose of satisfying the decryption condition, the decryption terminal 300 can automatically transmit the information to the encryption server 100 only with the information gathering consent such as the location information and the decryption terminal 300 information, Information can be input directly from the reader.

In step S400, if the encryption server 100 satisfies the decryption condition, the personal information corresponding to the input code 10 can be extracted from the database 110 and transmitted to the decryption terminal 300 for output. That is, if all the decryption conditions set by the user are satisfied in step S100, the personal information corresponding to the input code 10 can be output to the decryption terminal 300. [ Of course, if the code 10 is incorrect, the personal information can not be extracted and output, and the personal information can be output to the decryption terminal 300 when the code 10 matches and the decryption conditions are all satisfied.

8 is a diagram illustrating an example of a decryption terminal 300 for receiving and outputting personal information in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention. 8, in operation S400 of the encrypted personal information providing method using the smart device 200 according to the embodiment of the present invention, the decryption terminal 300 transmits the personal information of the user to the encryption server 100, And output it. That is, in step S100, it is possible to output the received personal information to the decryption terminal 300 as shown in FIG.

On the other hand, in step S400, the alarm of the transmission status of the personal information can be transmitted to the smart device 200. [ That is, the encryption server 100 transmits personal information to the decryption terminal 300 so that the user can know that the code 10 has been decrypted and the personal information has been transmitted to the decryption terminal 300, ) In the transmission state. In step S400, when the detoxification condition is unsatisfactory, the deterrent terminal 300 can transmit an attempt to decrypt the code 10 to the smart device 200. [ In other words, an attempt to decode the alarm can be sent so that the user knows that there has been an incorrect decryption attempt.

9 is a diagram illustrating an example of a smart device 200 outputting an alarm of a transmission status in an encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention. 9, in step S400 of the encrypted personal information providing method using the smart device 200 according to the embodiment of the present invention, the encryption server 100 transmits the personal information to the smart device 200 State alarm in the form of a push message. In step S400, various alarms may be transmitted to the smart device 200 by using SMS (Short Message Service), MMS (Multi Message Service), e-mail, etc. in addition to the push message as shown in FIG.

Also, in step S400, the personal information is controlled to be output from the decoding terminal 300 for a predetermined time, and the output of the personal information can be stopped when a predetermined period of time elapses. That is, even if the code 10 is matched and the decryption condition is satisfied and private information is output to the decryption terminal 300, the decryption terminal 300 is controlled so that the decryption terminal 300 is output only for a predetermined time, The personal information of the user can be prevented from being exposed without permission. In addition, the encryption server 100 may control the decryption terminal 300 such that it is not possible to capture private information being output to the decryption terminal 300.

10 is a diagram illustrating an example of a decryption terminal 300 in which the output of personal information is interrupted in the encrypted personal information providing method using the smart device 200 according to an embodiment of the present invention. 10, in step S400 of the encrypted personal information providing method using the smart device 200 according to the embodiment of the present invention, when the predetermined time has elapsed, the decryption terminal 300 confirms the personal information And informs the user of the guidance by a push message. That is, as shown in FIG. 8, when the predetermined time of 5 minutes elapses after the personal information is outputted, the personal information can no longer be confirmed as shown in FIG. 10, thereby protecting the user's personal information .

In step S500, if the encryption server 100 has processed the personal information transmission and output of step S400 a predetermined number of times, the code 10 can be discarded. When the personal information is transmitted a predetermined number of times, the code 10 has fulfilled its function. It may be meaningless to continue using the same code 10, and an excessive number of codes 10 are associated with one personal information If there is any difficulty in protecting personal information. Thus, if the code 10 is used a predetermined number of times and personal information is transmitted, the code 10 can be discarded and can no longer be used. At this time, the predetermined number of times may be set by the user in step S10 or step S100. Further, depending on the embodiment, the code 10 may be discarded when a predetermined period elapses in step S500.

In the present invention, the smart device 200 is not limited in its form or structure as long as it satisfies the above definition, and may be existing or developed in the future. For example, it may be a smartphone or a tablet computer.
On the other hand, the decryption terminal 300 does not limit its form or structure as long as it satisfies the above definition, and may be existing or developed in the future. For example, it may be a desktop computer or a laptop computer.
Meanwhile, the encryption server 100 need not necessarily be a single server, and it is natural that the load can be distributed in two or more server groups in a distributed computing environment.
In the embodiment described above, the smart device 200 is described as inputting the personal information and the decryption condition to the encryption server 100. This is because the smart device 200 opens a communication session with the encryption server 100 It is not limited to directly inputting information, and includes a case of inputting via another network element.
Similarly, in the embodiment described above, the decryption terminal 300 is described as receiving personal information from the encryption server 100, but the decryption terminal 300 opens a communication session with the encryption server 100, The present invention is not limited to the case of receiving, but includes the case of inputting via another network element. For example, the encryption server 100 may provide personal information to the decryption terminal 300 via the cloud service.

The technical idea of the present invention has been described through several embodiments.
It will be apparent to those skilled in the art that various changes and modifications may be made to the embodiments described above from the description of the present invention. Further, although not explicitly shown or described, those skilled in the art can make various modifications including the technical idea of the present invention from the description of the present invention Which is still within the scope of the present invention. The above-described embodiments described with reference to the accompanying drawings are for the purpose of illustrating the present invention, and the scope of the present invention is not limited to these embodiments.

delete

10: Code 100: Encryption Server
110: Database 200: Smart device
300: Detective terminal
Step S10: Inputting the login information of the user and performing login processing
S100: Entering and storing personal information and decryption conditions
S200: generating a code corresponding to the personal information and transmitting it to the smart device
S300: a step of receiving a code from the decryption terminal and judging whether the decryption condition is satisfied
S400: outputting the personal information corresponding to the code to the decryption terminal if the decryption condition is satisfied
S500: Step of discarding the code when the personal information transmission and output are processed a predetermined number of times

Claims (8)

An encryption server, which provides encrypted personal information,
(a) receiving personal information and a decryption condition to be encrypted from a smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting personal information corresponding to the input code from the database and transmitting the personal information to the decryption terminal when the decryption condition is satisfied, and transmitting an alarm of the transmission status of the personal information to the smart device A method of providing encrypted personal information using a smart device.
2. The method according to claim 1, wherein in the step (a)
And a decryption condition including at least one of a decryption period, a decryption place, a decryption device, and a decryption device.
3. The method of claim 2, wherein in step (c)
And receiving the decryption information corresponding to the decryption condition from the decryption terminal, and determining whether the decryption condition is satisfied.
4. The method according to claim 3,
Wherein the at least one of the location information, the decryption information, and the decryption information of the decryption terminal is encrypted using the smart device.
delete An encryption server, which provides encrypted personal information,
(a) receiving personal information and a decryption condition to be encrypted from a smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting, from the database, personal information corresponding to the received code if the decryption condition is satisfied, and transmitting the extracted personal information to the decryption terminal, if the decryption condition is unsatisfactory, decrypting the code by the decryption terminal And transmitting an attempted alarm to the user.
An encryption server, which provides encrypted personal information,
(a) receiving personal information and a decryption condition to be encrypted from a smart device and storing the received personal information in a database;
(b) generating a code corresponding to the stored personal information, and transmitting the generated code to the smart device;
(c) receiving the code from the decryption terminal and determining whether the decryption condition is satisfied; And
(d) extracting, from the database, the personal information corresponding to the input code if the decryption condition is satisfied, and controlling the personal information to be output from the decryption terminal for a predetermined period of time, And processing the output of the personal information to be stopped when a predetermined time elapses.
2. The method of claim 1, wherein after step (d)
And discarding the code if the encryption server processes the personal information transmission and output of step (d) by a predetermined number of times.
KR1020130081833A 2013-07-11 2013-07-11 Encrypted personal information providing method using smart device KR101450463B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020130081833A KR101450463B1 (en) 2013-07-11 2013-07-11 Encrypted personal information providing method using smart device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020130081833A KR101450463B1 (en) 2013-07-11 2013-07-11 Encrypted personal information providing method using smart device

Publications (1)

Publication Number Publication Date
KR101450463B1 true KR101450463B1 (en) 2014-10-13

Family

ID=51997591

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020130081833A KR101450463B1 (en) 2013-07-11 2013-07-11 Encrypted personal information providing method using smart device

Country Status (1)

Country Link
KR (1) KR101450463B1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030003593A (en) * 2001-07-03 2003-01-10 (주) 해커스랩 Network Security System and Method for applying Security Rule for Restricted Condition
JP2006344116A (en) * 2005-06-10 2006-12-21 Koji Koda Database managing method using cellular phone and qr code
KR20080067997A (en) * 2008-06-30 2008-07-22 유시용 New idea about a method to replace rrn (resident registration number )
KR20100006309A (en) * 2008-07-09 2010-01-19 고려대학교 산학협력단 System and method of location-based information security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030003593A (en) * 2001-07-03 2003-01-10 (주) 해커스랩 Network Security System and Method for applying Security Rule for Restricted Condition
JP2006344116A (en) * 2005-06-10 2006-12-21 Koji Koda Database managing method using cellular phone and qr code
KR20080067997A (en) * 2008-06-30 2008-07-22 유시용 New idea about a method to replace rrn (resident registration number )
KR20100006309A (en) * 2008-07-09 2010-01-19 고려대학교 산학협력단 System and method of location-based information security

Similar Documents

Publication Publication Date Title
US20230245092A1 (en) Terminal for conducting electronic transactions
US20190384934A1 (en) Method and system for protecting personal information infringement using division of authentication process and biometric authentication
US20180295121A1 (en) Secure element authentication
CN104125055B (en) Encryption and decryption method and electronic equipment
JP7152765B2 (en) Communication system, communication device used therein, management device and information terminal
CN109325870A (en) The method and system of shared private data
CN104751073A (en) Privacy management for tracked devices
CN105981423A (en) Method and apparatus for transmitting and receiving encrypted message between terminals
CN105139205A (en) Payment verification method, terminal and server
KR101379711B1 (en) Method for file encryption and decryption using telephone number
Pandit et al. Privacy in time of a pandemic
US20210357946A1 (en) Method, apparatus, and system for transmitting and receiving information by using qr code
US10769285B2 (en) Privacy enabled runtime
US20200320538A1 (en) Authorizing transactions using negative pin messages
Federal Trade Commission Mobile Health App Developers: FTC Best Practices (2016)
JP4643313B2 (en) Relief method when biometric authentication is impossible for client / server system with biometric authentication function
CN106604241B (en) Method and system for transmitting information between devices and source terminal
KR101450463B1 (en) Encrypted personal information providing method using smart device
JP5670001B1 (en) Transaction system, transaction method, and information recording medium
US20190089538A1 (en) Smart login method using messenger service and apparatus thereof
CN110012149B (en) Application program management method, device, terminal and storage medium
KR101603988B1 (en) System for context-aware service
KR102224974B1 (en) Service server, and operating method thereof
CN106874793B (en) Database processing method and device
KR101511451B1 (en) Method of encryption to keyboard input information

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20171003

Year of fee payment: 4

FPAY Annual fee payment

Payment date: 20181008

Year of fee payment: 5

FPAY Annual fee payment

Payment date: 20191007

Year of fee payment: 6