KR20150069863A - Apparatus for data security - Google Patents
Apparatus for data security Download PDFInfo
- Publication number
- KR20150069863A KR20150069863A KR1020130156516A KR20130156516A KR20150069863A KR 20150069863 A KR20150069863 A KR 20150069863A KR 1020130156516 A KR1020130156516 A KR 1020130156516A KR 20130156516 A KR20130156516 A KR 20130156516A KR 20150069863 A KR20150069863 A KR 20150069863A
- Authority
- KR
- South Korea
- Prior art keywords
- data
- security
- key
- original text
- unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
And a detuned portion for detuning the first data including the tokenized security target field into original data, wherein the detuning portion performs the detuning if the integrity of the authority for requesting the detuning is confirmed Security device.
Description
The present invention relates to a security device, and more particularly, to a security device capable of managing various personal information with reliable security.
Data encryption alone can not prevent unauthorized access to data, so there is a problem in that reliable security can not be guaranteed by a method that relies solely on data encryption. The database is a mandatory component in charge of information input / output in various fields in the Internet age. Especially, since information on business secrets of companies as well as personal information such as resident registration numbers is sensitive to security, .
Korean Patent Registration No. 1098947 discloses a storage medium having a general storage area for storing file data; An operating system unit for storing new file data in the general storage area according to a user input or outputting an output command for storing changed file data different from stored file data to the storage medium; And a data security unit for storing the new file data or the changed file data or for backing up the stored file data by setting a part of the area as a security area. However, the solution to the above problem is insufficient.
The present invention is intended to provide a security device capable of managing various personal information with reliable security.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not intended to limit the invention to the precise forms disclosed. Other objects, which will be apparent to those skilled in the art, It will be possible.
The security device of the present invention may include a storage unit in which second data encrypted with the security object field and first data are stored together.
The security device of the present invention includes a detoken part for detonating first data including a tokenized security object field into original text data, Tokenization can be performed.
The security device of the present invention includes a tokenizing unit for performing a tokenizing of first data including a tokenized security object field into original text data, the first tokenizing unit storing the first data, It is possible to perform the demodulation by decoding the second data.
The security device of the present invention can enhance the security of the original text data by storing the first data obtained by tokenizing the security target field of the original text data and the second data obtained by encrypting the original text data.
That is, by storing the first data and the second data instead of storing the original data, it is possible to prevent the problem that the original data is exposed to the unauthorized person.
Also, the security device of the present invention can prevent the phenomenon that the first data is deconnected by the unauthorized person by performing the deconnection only when the integrity of the authority that requested the deconnection of the first data is confirmed.
In addition, the security apparatus of the present invention does not need to store the original text data in the storage unit by decrypting and returning the second data obtained by encrypting the original text data when the first data is to be deconnected. Thus, the security of the original text data can be enhanced.
1 is a block diagram showing a security device of the present invention.
2 is a schematic view showing an interface displayed by a setting unit;
3 is a schematic diagram showing data stored in the security device of the present invention.
4 is a schematic diagram showing a security system to which the security device of the present invention is applied.
5 is a flowchart illustrating the operation of the security device of the present invention.
1 is a block diagram showing a security device of the present invention.
The security apparatus shown in FIG. 1 may be a so-called
At this time, the
The security target field of the original text data means a field of the original text data requiring security. The security target field may be a part or whole of the original text data. For example, if the original data is a telephone number such as '1234-5678', the security target field may be the entire telephone number. In addition, the security target field may be some field of the original text data such as '5678' which is the last four digits of the telephone number.
In addition, the security target field does not have to be contiguous. For example, the security target field may consist of a '3' digit and a '6' digit separated from each other at a telephone number '1234-5678'.
Syntax separators such as '-' in the security target field can be excluded. For example, the security target field for the telephone number '1234-5678' may be configured to exclude the '-' digit.
The
Also, the
The determination of the security target field according to the type of the original text data is performed so that indexes or statistics are made through the first data. In the case of the above resident registration number, it is possible to index or calculate statistics using the original field "345678-1" instead of the security target field.
The first data is data obtained by tokenizing the security target field of the original text data. According to the definition of the tokenization described above, for example, when the security target field of the telephone number '1234-5678' is '5678', the original text data '5678' can be tokenized as 'ABCD'.
The first data is configured to include a security objective field in which the tokenization is made.
Therefore, the first data may be composed of only the security target field. In this case, the first data may be composed of 'ABCD'.
In addition, the first data may be composed of at least some of the original text field and the security target field excluding the security target field in the original text data. According to this, the first data may be composed of '1234-ABCD', '34 -ABCD ', and the like. In this case, the syntax identifier '-' can be excluded.
The first data described above is stored in a storage unit 130 (so-called database) shown in FIG. 1. The
Accordingly, the
The security device of the present invention may include an
The
The
The encryption algorithm may be, for example, 3-Way, AES, AES-128, AES-256, Akelarre, Anubis, Aria, Blowfish, Camellia, CAST-128, CAST-256, CMEA, CS- MUSIC, MAGENTA, MARS, MISTY1, MMB, MACHUFFIN, Madryga, MUSIC, MACHUFFIN, Madryga, MUSIC, , NewDES, Noekeon, RC2, RC5, RC6, REDOC, RedPike, S-1, SAFER, SEED, Serpent, SHACAL, SHARK, Skipjack, Square, TEA, Triple DES, Twofish, XTEA .
Meanwhile, the security device of the present invention may include a
Fig. 2 is a schematic diagram showing an interface displayed by the
The interface shown in FIG. 2 is provided with a 'Key Usage' menu for selecting the type of original data ACC, CCN, PII and SSN and an 'Algorithm' menu for selecting Triple DES, AES-128 and AES-256 encryption algorithms do.
Here, ACC (accounts) represents a bank account number, and CCN (payment cards) represents a credit card number. PII (personal information) represents general information, and SSN represents a personal identification number such as so-called resident registration number.
If 'Creat New Key' is selected after selecting the type of the original text data and the encryption algorithm, the result is reflected in the policy table 120.
In the policy table 120, types of original text data, encryption algorithms, key IDs such as AAC and AAD are recorded, and recording time is recorded in some cases.
The key ID may be input by the user or automatically generated by the
The recording date indicates the type of the original text data and the time at which the encryption algorithm is recorded and the key ID is generated. The algorithm applied due to the recording date can be updated.
For example, referring to FIG. 2, the AES-128 encryption algorithm is set to apply to the
The types of original text data and the selection of encryption algorithms are important for the security of original text data and for later detonation. Therefore, it is necessary to allow the setting only to the party author.
Accordingly, the
Meanwhile, the security apparatus may store the third data and the first data obtained by performing the hash processing on the first data. According to this, the security device may store the first data, the second data, and the third data together, and these examples are shown in Table 1 and FIG. For reference, the third data may be generated by the
3 is a schematic diagram showing data stored in the security device of the present invention.
In Table 1 and FIG. 3, the back six digits of the resident registration number 710101-1234567 corresponding to the original text data are the security target fields, and only the first data, the second data, and the third data are the security target fields.
710101-1234567, the
The first data, the second data, and the third data thus generated are stored in the
After the tokenization is performed, even if the integrity of the authority is confirmed, only the 710101-1ABCDEF in which the original text field 710101-1 and the first data ABCDEF are mixed can be obtained. To obtain 710101-1234567, a de-tokenization needs to be performed. The first data, ABCDEF, when performing the de-tokenization, can function as a so-called index. At this time, third data may be used to prevent an index error or a storage error of the first data.
The third data is the hash of the first data, and it is possible to convert from the first data to the third data, but the inverse conversion is impossible. Accordingly, the security of the first data due to the additional storage of the third data is not a problem. The third data increases the number of digits as compared with the first data in accordance with the hash process, and thus functions more reliably as an indexer.
Accordingly, it is possible to retrieve the target first data by searching / extracting the result of the hash processing of the first data requested to be decrypted in the de-tokenizing, from the third data stored in the
Hereinafter, a method of demodulating the first data into original data will be described.
As shown in FIG. 1, the security device of the present invention may include a
At this time, the DTO
De-tokenizing the first data into the original data is a very important issue because it restores the data that requires security. Therefore, in order to prevent the de-tokenization by the unauthorized person, the
The authority at this time may include at least one of an identification number, an Internet Protocol (IP) address, and a request time. When the integrity of the connection ID, the connection IP address, and the request time is confirmed, the
The de-tokenization in the D-
It is noted that the first data and the second data are stored in the
Accordingly, the
Since the second data is encrypted by applying an encryption algorithm to the original text data, decrypting the second data may be a reverse application of the encryption algorithm to the second data.
To do this, the detoken part needs to know the encryption algorithm used to generate the second data. In addition, since the encryption algorithm can be selected differently according to the type of the first data, it is necessary to grasp the type of the first data.
To this end, the D
The policy table 120 is mentioned in the description of the
When the policy table 120 is stored in both the node of the connection IP address and the security device, the
When the key ID is received from the node, the DTO
If the key ID received from the node does not match the key ID of the pre-stored policy table 120, the
Meanwhile, the security device may include a
The
4 is a schematic diagram showing a security system to which the security device of the present invention is applied.
When the original data is input from the node, the ERP server receives the original data and transmits it to the
The
After that, when the decryption non-authorizer at the predetermined node requests the decryption of the first data, the
If the integrity of the authority is confirmed, the original text data, which is the decrypted second data, is transmitted to the decryption authority.
The operations of the
5 is a flowchart illustrating the operation of the security device of the present invention.
FIG. 5 discloses a demodulation process of the security device.
First, the
When the de-tokenizing request is received, the
When the integrity of the authority is confirmed (approved), the node requests a key ID (S 530).
At this time, the node may be a connection IP address, i.e., a terminal or an ERP server to which the terminal is connected. If the integrity of the rights is violated, the first data is returned as is, or the security target field is masked and returned (S 580). At this time, the non-authorizer obtains the tokenized first data or the masked data, so that the security of the original data is maintained.
When the key ID is received, the default token unit compares the key ID of the policy table 120 and the received key ID using the type of the first data received and the record date (S 540). In other words, verify the integrity of the key ID. For example, in the policy table 120 of FIG. 2, when the first data is tokenized after July 19, 2009, the key ID is AAD. Since the security device stores the corresponding policy table 120, it knows that the corresponding key ID is AAD. In this situation, if the received key ID indicates a different key value rather than AAD, the integrity of the key ID is regarded as infringed.
If the received key ID matches the pre-stored key ID in the policy table 120, the
If the received key ID does not match the pre-stored key ID in the policy table 120, the
Next, the security device may generate a log including the processing result of the dittoken portion (S570). The generation of the log is performed in the
Claims (6)
Wherein the detuning unit performs the detuning if the integrity of the authority for requesting the detuning is confirmed.
And the detoken part performs the detokenization by decrypting second data that is stored together with the first data and is encrypted with the security-object field.
The dittoken unit includes:
Identifying the type of the first data requested by the demodulation,
Searching a policy table for a key ID and an encryption algorithm assigned to the type of the first data,
And decrypting the second data, which is stored together with the first data by reversing the retrieved encryption algorithm, and encrypts the security target field.
Wherein the type of the first data includes at least one of a bank account number, a credit card number, and a personal identification number.
Wherein the dittoken unit identifies the type of the first data requested by the ditokenization and, if the type of the first data exists in the policy table, transmits a key ID assigned to the type of the first data, A security device that requests a node.
The dittoken unit previously stores the policy table,
And compares the received key ID with a key ID of the pre-stored policy table according to a request of the key ID, and if the key ID is matched, demodulates the first data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130156516A KR20150069863A (en) | 2013-12-16 | 2013-12-16 | Apparatus for data security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130156516A KR20150069863A (en) | 2013-12-16 | 2013-12-16 | Apparatus for data security |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150069863A true KR20150069863A (en) | 2015-06-24 |
Family
ID=53516878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020130156516A KR20150069863A (en) | 2013-12-16 | 2013-12-16 | Apparatus for data security |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150069863A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109041055A (en) * | 2018-07-27 | 2018-12-18 | 马占朝 | A kind of mobile terminal for financial secure environment and gateway server transmission method |
-
2013
- 2013-12-16 KR KR1020130156516A patent/KR20150069863A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109041055A (en) * | 2018-07-27 | 2018-12-18 | 马占朝 | A kind of mobile terminal for financial secure environment and gateway server transmission method |
CN109041055B (en) * | 2018-07-27 | 2021-11-19 | 环玺信息科技(上海)有限公司 | Mobile terminal and gateway server transmission method for financial security environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10986073B2 (en) | Vaultless tokenization engine | |
US10614244B1 (en) | Sensitive data aliasing | |
EP3435591B1 (en) | 1:n biometric authentication, encryption, signature system | |
US8898086B2 (en) | Systems and methods for transmitting financial account information | |
AU2013101034B4 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US9003177B2 (en) | Data security for digital data storage | |
EP3879747A1 (en) | Key security management system and method, medium, and computer program | |
KR101874721B1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
CN107864115A (en) | A kind of method that user account login authentication is carried out using portable terminal | |
US10037433B2 (en) | Secure text retrieval | |
US20060294391A1 (en) | Data encryption and decryption method | |
US20150220718A1 (en) | Method for web service user authentication | |
Camara et al. | Distortion‐Free Watermarking Approach for Relational Database Integrity Checking | |
KR20190004328A (en) | Security Collection of Sensitive Data | |
CN102782692A (en) | System, apparatus and method for encryption and decryption of data transmitted over a network | |
KR101214502B1 (en) | Apparatus for data security | |
KR102375973B1 (en) | Security server using case based reasoning engine and storage medium for installing security function | |
CN115694921B (en) | Data storage method, device and medium | |
JP2007060581A (en) | Information management system and method | |
KR20150069863A (en) | Apparatus for data security | |
KR20140011542A (en) | Log in system and method | |
JP2005339238A (en) | Reader, data base apparatus, physical distribution information management method, and program | |
US9922199B2 (en) | Document security tool | |
EP3659089A1 (en) | Key generation in secure electronic payment systems | |
US11176264B2 (en) | Data access control using data block level decryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |