KR20080104204A - Method to protect privacy of computer user - Google Patents

Method to protect privacy of computer user Download PDF

Info

Publication number
KR20080104204A
KR20080104204A KR1020070011055A KR20070011055A KR20080104204A KR 20080104204 A KR20080104204 A KR 20080104204A KR 1020070011055 A KR1020070011055 A KR 1020070011055A KR 20070011055 A KR20070011055 A KR 20070011055A KR 20080104204 A KR20080104204 A KR 20080104204A
Authority
KR
South Korea
Prior art keywords
computer
user
privacy
remove
information
Prior art date
Application number
KR1020070011055A
Other languages
Korean (ko)
Inventor
임형택
Original Assignee
(주) 에브리존
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주) 에브리존 filed Critical (주) 에브리존
Priority to KR1020070011055A priority Critical patent/KR20080104204A/en
Publication of KR20080104204A publication Critical patent/KR20080104204A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention can search for, remove or edit (add / modify / delete) items that match a predefined rule among various information recorded while using the computer, or automatically remove the matching items in real time, thereby hacking or virus It aims to block the leakage of personal information caused by malware or other causes.

Description

How to protect your computer user's privacy {Method to protect privacy of computer user}

1 is a flowchart illustrating a process of inspecting information recorded in a computer according to a predefined rule according to the present invention;

2 is a flowchart illustrating a process of monitoring and removing information recorded in a computer in real time according to a predefined rule according to the present invention.

<Description of Major Symbols in Drawing>

The present invention relates to a method of protecting personal privacy information that allows a user to selectively or collectively remove or edit information recorded when using the Internet or when using various computer programs by using predefined rules. While the conventional technology only provides a function of deleting a temporary file or a folder or a file containing a history of use when using the Internet, the present invention examines harmful information on the user's privacy among these history information by using a predefined rule. In addition, the purpose of protecting personal privacy in the event of hacking or in the common computer use environment is to enable the user to remove or edit only the desired information such as elements that invade privacy by inspecting by user-specified rules.

The present invention has been made to improve the conventional problems as described above, the analysis of the format of various information recorded in the process of searching only the privacy infringement elements of various information recorded on the computer, analysis of the recording method of various programs, etc. In addition to the manual inspection method of privacy infringement through the method to remove the privacy infringement in real time to protect the user's privacy to ensure safe computer use.

The configuration for achieving the above object is as follows.

Example 1 When a User Surfs Multiple Sites Using a Web Browser

Records such as sites visited by web browsers, inputs, and searches are left on the computer. The program searches for and displays harmful records of the user's privacy. For example, if a user visits 'www.daum.net', 'www.sexkorea.co.kr' or enters a search term such as 'busy' in a search engine, the record will remain on the computer. If a computer is leaked to an Internet bulletin board due to hacking, or known to others on a shared computer, the user's privacy will be seriously damaged. In such a case, if the program is scanned, only the records of www.sexkorea.co.kr and 'night' which are harmful to the user's privacy in the web browser record can be retrieved and displayed to the user for removal or editing. Do not leave information on your computer.

[Example 2] When a user viewed an obscene video using a video viewing program

If you watched the first steps of stock investment.avi and sex girls.avi with Windows Media Player, anyone can easily see it in the recently played list of Windows Media Player, and if such records were leaked due to hacking, etc. The privacy of the user will be catastrophically damaged. In this case, when searching with this program, only the record of 'sex girl.avi' that is harmful to the user's privacy is searched and displayed to the user so that it can be removed or edited. Do not remain.

[Example 3] When a user viewed an important document containing company secrets using a document editing program

If you have edited general documents such as 'year-end party schedule.hwp' and confidential documents in the company such as 'product blueprint.doc' with Hae-ha Hangul or MS Office, etc. If you sneak around it, you can easily get confidential documents stolen. In this case, when inspected by the program, only the 'product blueprint.doc' corresponding to the company's confidentiality can be retrieved and displayed to the user for removal or editing, thereby making it difficult to leak confidential documents within the company.

In addition to the above embodiments, various records of the computer can be added / removed / edited by searching for words, time, etc. based on various rules, for various purposes such as organizing or optimizing various information recorded in the computer in addition to privacy protection. Could be done. Alternatively, it is possible to display the record information without inspection process and to edit the data such as addition / deletion / modification by the user directly judging the privacy infringement factor.

In addition to installing and running directly on the computer, it can be executed automatically when connected to the Internet without any installation using technology such as ActiveX / Ajax / Java Applet or stored on the media of the USB drive and automatically executed when connecting to the USB drive. It may be driven in various ways.

As described above, the present invention, by searching the various information recorded on the computer according to the predefined privacy rules, and shows the result, it is possible to remove or edit this information, resulting from hacking or other people's computer use It is possible to prevent the exposure of important personal information of the individual.

On the other hand, the present invention is not limited to the above-described specific preferred embodiments, anyone of ordinary skill in the art belonging to the present invention without departing from the gist of the invention claimed in the claims may be variously modified. will be.

Claims (2)

Compares the information recorded while using the computer with the patterns defined in the pre-created rules file to check and inform the records with the same pattern, and to remove or edit these records selectively or collectively. The method of claim 1 is a passive method of retrieving the record information afterwards, so that it is cumbersome to inspect each time. Thus, the same pattern is obtained by comparing the recorded information with the patterns in the same manner as in claim 1 in real time. If there is, the real-time processing method of claim 1 to block or remove the record in real time as soon as it is recorded.
KR1020070011055A 2007-02-02 2007-02-02 Method to protect privacy of computer user KR20080104204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020070011055A KR20080104204A (en) 2007-02-02 2007-02-02 Method to protect privacy of computer user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020070011055A KR20080104204A (en) 2007-02-02 2007-02-02 Method to protect privacy of computer user

Publications (1)

Publication Number Publication Date
KR20080104204A true KR20080104204A (en) 2008-12-02

Family

ID=40365971

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020070011055A KR20080104204A (en) 2007-02-02 2007-02-02 Method to protect privacy of computer user

Country Status (1)

Country Link
KR (1) KR20080104204A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101033511B1 (en) * 2008-09-12 2011-05-09 (주)소만사 Method for protecting private information and computer readable recording medium therefor

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101033511B1 (en) * 2008-09-12 2011-05-09 (주)소만사 Method for protecting private information and computer readable recording medium therefor

Similar Documents

Publication Publication Date Title
Javed et al. A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions
Hargreaves et al. An automated timeline reconstruction approach for digital forensic investigations
Kolla A Comparative Analysis of OS Forensics Tools
KR101410442B1 (en) A Digital Forensic Audit System for Analyzing User’s Behaviors
ATE497303T1 (en) ATTACK DATABASE STRUCTURE
Rochmadi et al. Live forensics for anti-forensics analysis on private portable web browser
Lovanshi et al. Comparative study of digital forensic tools
Rasool et al. A review of web browser forensic analysis tools and techniques
Prasanthi et al. Cyber forensic science to diagnose digital crimes-a study
JP2006350708A (en) Security design support method and support device
Kävrestad Guide to digital forensics: a concise and practical introduction
Elmas et al. Misleading repurposing on twitter
Suryadevara Forensic Foresight: A Comparative Study of Operating System Forensics Tools
JP2011022903A (en) Analyzing device, analysis method, and program
Ohana et al. Do Private and Portable Web Browsers Leave Incriminating Evidence?
KR20080104204A (en) Method to protect privacy of computer user
CN116389148B (en) Network security situation prediction system based on artificial intelligence
Mabuto et al. State of the Art of Digital Forensic Techniques.
JP5423470B2 (en) Name identification check support device, name identification check support program, and name identification check support method
Duan et al. Research on computer forensics technology based on data recovery
CN116579008A (en) Identification-based data tracking and tracing method
Anuradha et al. Recovering deleted browsing artifacts from web browser log files in Linux environment
Mendelman Fingerprinting an Organization Using Metadata of Public Documents
Joo et al. A reference database of Windows artifacts for file‐wiping tool execution analysis
KR101100482B1 (en) Method for search and deletion of private-information in internet system

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application
E601 Decision to refuse application