KR20080104204A - Method to protect privacy of computer user - Google Patents
Method to protect privacy of computer user Download PDFInfo
- Publication number
- KR20080104204A KR20080104204A KR1020070011055A KR20070011055A KR20080104204A KR 20080104204 A KR20080104204 A KR 20080104204A KR 1020070011055 A KR1020070011055 A KR 1020070011055A KR 20070011055 A KR20070011055 A KR 20070011055A KR 20080104204 A KR20080104204 A KR 20080104204A
- Authority
- KR
- South Korea
- Prior art keywords
- computer
- user
- privacy
- remove
- information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The present invention can search for, remove or edit (add / modify / delete) items that match a predefined rule among various information recorded while using the computer, or automatically remove the matching items in real time, thereby hacking or virus It aims to block the leakage of personal information caused by malware or other causes.
Description
1 is a flowchart illustrating a process of inspecting information recorded in a computer according to a predefined rule according to the present invention;
2 is a flowchart illustrating a process of monitoring and removing information recorded in a computer in real time according to a predefined rule according to the present invention.
<Description of Major Symbols in Drawing>
The present invention relates to a method of protecting personal privacy information that allows a user to selectively or collectively remove or edit information recorded when using the Internet or when using various computer programs by using predefined rules. While the conventional technology only provides a function of deleting a temporary file or a folder or a file containing a history of use when using the Internet, the present invention examines harmful information on the user's privacy among these history information by using a predefined rule. In addition, the purpose of protecting personal privacy in the event of hacking or in the common computer use environment is to enable the user to remove or edit only the desired information such as elements that invade privacy by inspecting by user-specified rules.
The present invention has been made to improve the conventional problems as described above, the analysis of the format of various information recorded in the process of searching only the privacy infringement elements of various information recorded on the computer, analysis of the recording method of various programs, etc. In addition to the manual inspection method of privacy infringement through the method to remove the privacy infringement in real time to protect the user's privacy to ensure safe computer use.
The configuration for achieving the above object is as follows.
Example 1 When a User Surfs Multiple Sites Using a Web Browser
Records such as sites visited by web browsers, inputs, and searches are left on the computer. The program searches for and displays harmful records of the user's privacy. For example, if a user visits 'www.daum.net', 'www.sexkorea.co.kr' or enters a search term such as 'busy' in a search engine, the record will remain on the computer. If a computer is leaked to an Internet bulletin board due to hacking, or known to others on a shared computer, the user's privacy will be seriously damaged. In such a case, if the program is scanned, only the records of www.sexkorea.co.kr and 'night' which are harmful to the user's privacy in the web browser record can be retrieved and displayed to the user for removal or editing. Do not leave information on your computer.
[Example 2] When a user viewed an obscene video using a video viewing program
If you watched the first steps of stock investment.avi and sex girls.avi with Windows Media Player, anyone can easily see it in the recently played list of Windows Media Player, and if such records were leaked due to hacking, etc. The privacy of the user will be catastrophically damaged. In this case, when searching with this program, only the record of 'sex girl.avi' that is harmful to the user's privacy is searched and displayed to the user so that it can be removed or edited. Do not remain.
[Example 3] When a user viewed an important document containing company secrets using a document editing program
If you have edited general documents such as 'year-end party schedule.hwp' and confidential documents in the company such as 'product blueprint.doc' with Hae-ha Hangul or MS Office, etc. If you sneak around it, you can easily get confidential documents stolen. In this case, when inspected by the program, only the 'product blueprint.doc' corresponding to the company's confidentiality can be retrieved and displayed to the user for removal or editing, thereby making it difficult to leak confidential documents within the company.
In addition to the above embodiments, various records of the computer can be added / removed / edited by searching for words, time, etc. based on various rules, for various purposes such as organizing or optimizing various information recorded in the computer in addition to privacy protection. Could be done. Alternatively, it is possible to display the record information without inspection process and to edit the data such as addition / deletion / modification by the user directly judging the privacy infringement factor.
In addition to installing and running directly on the computer, it can be executed automatically when connected to the Internet without any installation using technology such as ActiveX / Ajax / Java Applet or stored on the media of the USB drive and automatically executed when connecting to the USB drive. It may be driven in various ways.
As described above, the present invention, by searching the various information recorded on the computer according to the predefined privacy rules, and shows the result, it is possible to remove or edit this information, resulting from hacking or other people's computer use It is possible to prevent the exposure of important personal information of the individual.
On the other hand, the present invention is not limited to the above-described specific preferred embodiments, anyone of ordinary skill in the art belonging to the present invention without departing from the gist of the invention claimed in the claims may be variously modified. will be.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070011055A KR20080104204A (en) | 2007-02-02 | 2007-02-02 | Method to protect privacy of computer user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070011055A KR20080104204A (en) | 2007-02-02 | 2007-02-02 | Method to protect privacy of computer user |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20080104204A true KR20080104204A (en) | 2008-12-02 |
Family
ID=40365971
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020070011055A KR20080104204A (en) | 2007-02-02 | 2007-02-02 | Method to protect privacy of computer user |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20080104204A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101033511B1 (en) * | 2008-09-12 | 2011-05-09 | (주)소만사 | Method for protecting private information and computer readable recording medium therefor |
-
2007
- 2007-02-02 KR KR1020070011055A patent/KR20080104204A/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101033511B1 (en) * | 2008-09-12 | 2011-05-09 | (주)소만사 | Method for protecting private information and computer readable recording medium therefor |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Javed et al. | A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions | |
Hargreaves et al. | An automated timeline reconstruction approach for digital forensic investigations | |
Kolla | A Comparative Analysis of OS Forensics Tools | |
KR101410442B1 (en) | A Digital Forensic Audit System for Analyzing User’s Behaviors | |
ATE497303T1 (en) | ATTACK DATABASE STRUCTURE | |
Rochmadi et al. | Live forensics for anti-forensics analysis on private portable web browser | |
Lovanshi et al. | Comparative study of digital forensic tools | |
Rasool et al. | A review of web browser forensic analysis tools and techniques | |
Prasanthi et al. | Cyber forensic science to diagnose digital crimes-a study | |
JP2006350708A (en) | Security design support method and support device | |
Kävrestad | Guide to digital forensics: a concise and practical introduction | |
Elmas et al. | Misleading repurposing on twitter | |
Suryadevara | Forensic Foresight: A Comparative Study of Operating System Forensics Tools | |
JP2011022903A (en) | Analyzing device, analysis method, and program | |
Ohana et al. | Do Private and Portable Web Browsers Leave Incriminating Evidence? | |
KR20080104204A (en) | Method to protect privacy of computer user | |
CN116389148B (en) | Network security situation prediction system based on artificial intelligence | |
Mabuto et al. | State of the Art of Digital Forensic Techniques. | |
JP5423470B2 (en) | Name identification check support device, name identification check support program, and name identification check support method | |
Duan et al. | Research on computer forensics technology based on data recovery | |
CN116579008A (en) | Identification-based data tracking and tracing method | |
Anuradha et al. | Recovering deleted browsing artifacts from web browser log files in Linux environment | |
Mendelman | Fingerprinting an Organization Using Metadata of Public Documents | |
Joo et al. | A reference database of Windows artifacts for file‐wiping tool execution analysis | |
KR101100482B1 (en) | Method for search and deletion of private-information in internet system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application | ||
E601 | Decision to refuse application |