KR20160053651A - Security method and security server for digital content - Google Patents

Security method and security server for digital content Download PDF

Info

Publication number
KR20160053651A
KR20160053651A KR1020140152986A KR20140152986A KR20160053651A KR 20160053651 A KR20160053651 A KR 20160053651A KR 1020140152986 A KR1020140152986 A KR 1020140152986A KR 20140152986 A KR20140152986 A KR 20140152986A KR 20160053651 A KR20160053651 A KR 20160053651A
Authority
KR
South Korea
Prior art keywords
users
release condition
digital content
access
satisfied
Prior art date
Application number
KR1020140152986A
Other languages
Korean (ko)
Inventor
엄태광
Original Assignee
주식회사 인프라웨어
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 인프라웨어 filed Critical 주식회사 인프라웨어
Priority to KR1020140152986A priority Critical patent/KR20160053651A/en
Publication of KR20160053651A publication Critical patent/KR20160053651A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

A security method for digital contents according to an exemplary embodiment of the present invention includes receiving a release condition for accessing digital content from a plurality of users, wherein the release condition is satisfied when two or more users of a plurality of users are required to intervene, The method comprising the steps of: setting a release condition; determining whether the release condition is satisfied; and, when it is determined that the release condition is satisfied, allowing access to digital content of one or more users among a plurality of users do.

Description

TECHNICAL FIELD [0001] The present invention relates to a digital content security method,

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a digital content security method and security server, and more particularly, to a digital content security method and security server capable of securely processing digital contents with high security need.

In recent years, the use of digital devices such as personal computers and smart phones has been rapidly increasing, and it has become common to perform various tasks with digital contents such as electronic documents, photographs, and videos. Since digital contents are manufactured in a digital manner, they have an advantage that they can be easily processed, stored and moved using a wired / wireless network or various storage means.

As the use of digital contents to perform a variety of tasks become common, it becomes necessary to secure digital contents in order to prevent illegally accessing digital contents from the outside. A typical security process for digital contents is to register a password in the digital content so that the user can access the digital content only by inputting the password. Since the password can be composed of a large number of characters or numbers that can not be easily found by others, the password is effectively used to block access to illegal digital contents of others.

However, securing digital content containing confidential company secrets with a high degree of security need, for example, with a simple one password can pose a significant risk. This is because, if any one of a plurality of persons who know the password can steal the password to the outside with impure intention, the user can easily access the digital contents from the outside using such a password. Once the leaked digital content can be copied easily, it is very important to secure the digital content from being leaked in the first place.

Accordingly, a new technology for reliably and securely processing digital contents with high security needs is demanded.

It is an object of the present invention to provide a security method and security server for digital contents which can prevent a person who is aware of a method of securing digital contents from disclosing digital contents to the outside intentionally.

An object of the present invention is to provide a digital content security method and security server capable of performing reliable security processing on digital contents.

The problems of the present invention are not limited to the above-mentioned problems, and other problems not mentioned can be clearly understood by those skilled in the art from the following description.

According to another aspect of the present invention, there is provided a method of securing digital content according to an exemplary embodiment of the present invention includes receiving a release condition for accessing digital content from a plurality of users, The method comprising the steps of: setting a release condition, wherein at least two users are required to intervene; determining whether the release condition is satisfied; and, if it is determined that the release condition is satisfied, The method comprising the steps of:

According to another aspect of the present invention, the release condition may be satisfied when the terminal of two or more of the plurality of users intervenes.

According to another aspect of the present invention, the cancellation condition can be satisfied by receiving a unique address for the terminal of two or more of the plurality of users.

According to another aspect of the present invention, the release condition can be satisfied only when a unique password of two or more of the plurality of users is input.

According to another aspect of the present invention, the release condition may be more than two.

According to another aspect of the present invention, there is provided a method for accessing digital content, the method comprising: receiving a request for accessing digital content from a user among a plurality of users; requesting authentication of accessing digital content to a terminal of the remaining user of the plurality of users; And receiving authentication regarding access of the digital contents from the terminal of the remaining users.

According to another aspect of the present invention, the step of requesting authentication regarding the access of the digital contents may include the step of inquiring whether or not to allow the terminal of the remaining user to grant authority to access digital contents to a user have.

According to another aspect of the present invention, there is provided a method for accessing digital content, the method comprising: receiving a request for access to digital content; requesting authentication for access to digital content; and receiving authentication for accessing digital content, .

According to an aspect of the present invention, there is provided a security server for digital contents according to an exemplary embodiment of the present invention includes a release condition receiver for receiving a release condition for accessing content from a plurality of users, And an access permission unit for permitting access to contents of one or more users among a plurality of users when it is determined that the cancellation condition is satisfied, wherein the cancellation condition is that at least two of the plurality of users must intervene Is satisfied.

A computer readable medium having stored thereon a set of instructions for implementing the present invention includes instructions for causing a computing device to access content from a plurality of users when executed by the computing device, The user is allowed to access the contents of one or more of the plurality of users when the release condition is determined to be satisfied and the release condition is set so that a plurality of users Intervention is required if two or more users are involved.

The details of other embodiments are included in the detailed description and drawings.

The present invention has the effect of preventing a person who is aware of the method for releasing the digital content from disclosing the digital content to the outside with impure intent.

INDUSTRIAL APPLICABILITY The present invention has an effect of performing reliable security processing on digital contents.

The effects of the present invention are not limited to the effects mentioned above, and other effects not mentioned can be clearly understood by those skilled in the art from the following description.

1 is a block diagram illustrating a detailed configuration of a digital content security server according to an exemplary embodiment of the present invention.
FIG. 2 is a flowchart illustrating a digital content security method according to an exemplary embodiment of the present invention.
3 is a flowchart illustrating a security method of digital contents according to another embodiment of the present invention.
Figures 4A-4E are illustrations of examples where the present invention may be advantageously utilized.
Figures 5A-5E are diagrams illustrating other examples in which the present invention may be advantageously utilized.
6A and 6B are diagrams showing still another example in which the present invention can be advantageously utilized.

BRIEF DESCRIPTION OF THE DRAWINGS The advantages and features of the present invention, and the manner of achieving them, will be apparent from and elucidated with reference to the embodiments described hereinafter in conjunction with the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Is provided to fully convey the scope of the invention to those skilled in the art, and the invention is only defined by the scope of the claims.

Like reference numerals refer to like elements throughout the specification.

It is to be understood that each of the features of the various embodiments of the present invention may be combined or combined with each other partially or entirely and technically various interlocking and driving is possible as will be appreciated by those skilled in the art, It may be possible to cooperate with each other in association.

Various embodiments of the present invention will now be described in detail with reference to the accompanying drawings.

1 is a block diagram illustrating a detailed configuration of a digital content security server according to an exemplary embodiment of the present invention.

1, the security server 100 according to an exemplary embodiment of the present invention includes a release condition receiving unit 110, a release condition determination unit 120, an access permission unit 130, a control unit 140, (150) and a memory (160). According to an embodiment of the present invention, the release condition receiving unit 110, the release condition determination unit 120, the access permission unit 130, the control unit 140, the communication unit 150, May be program modules that communicate with a user's terminal. These program modules may be included in the security server 100 in the form of an operating system, an application program module, and other program modules, and may be physically stored on various known storage devices. These program modules may also be stored in a remote storage device capable of communicating with the security server 100. [ Such program modules, on the other hand, encompass but are not limited to routines, subroutines, programs, objects, components, data structures, etc. that perform local tasks or execute local abstract data types, as described below in accordance with the present invention.

The release condition receiving unit 110 receives a release condition for accessing digital contents from a plurality of users. The inputted release condition can be stored in the memory 160 of the security server 100 in a form that can not be read and recognized from the outside.

Here, the digital content refers to information or contents that can be provided in digital form through the Internet or computer communication, for example, an electronic document, a photograph, a moving image, and the like. An electronic document means information transmitted, received or stored in an electronic form by an information processing system and can be used in electronic form or printed

Also, the release condition means a condition for accessing the digital contents, and it is satisfied that more than two users among a plurality of users have to intervene. A plurality of users can set a release condition for allowing digital content to be accessed in a free form through a common agreement. For example, the release condition can be set to be satisfied when a unique password of two or more of the plurality of users is input. In addition, the release condition may be set so that the terminal of two or more of the plurality of users is required to intervene. In addition, the release condition may be set to be satisfied by receiving a unique address of the terminal of two or more of the plurality of users. The unique address for each terminal of a plurality of users may be, for example, a Mac address uniquely assigned to an individual mobile terminal. The release condition may include two or more schemes, so that access to digital content is allowed if one or more of the two schemes is met, or access is allowed to digital content if both are met Can be set.

The release condition determination unit 120 determines whether or not the release condition is satisfied. Whether or not the release condition is satisfied may be different depending on what kind of release condition is.

The access permission unit 130 allows access to digital contents of one or more users among a plurality of users when the release condition determining unit 120 determines that the release condition is satisfied.

The control unit 140 controls the flow of data between the release condition receiving unit 110, the release condition determination unit 120, the access permission unit 130, the communication unit 150, and the memory 160. In other words, the control unit 140 controls the flow of data between the components of the digital content security server 100 or from outside, thereby controlling the release condition receiving unit 110, the release condition determination unit 120, The control unit 130, the communication unit 150, and the memory 160, respectively.

On the other hand, when receiving a request for access to digital contents from one user among a plurality of users, the control unit 140 requests authentication of accessing the digital contents to the terminals of the remaining users among the plurality of users, Lt; RTI ID = 0.0 > of digital content. ≪ / RTI >

The communication unit 150 serves to enable the security server 100 to communicate with external devices such as terminals of a plurality of users.

In the memory 160, the contents of the release condition and the information necessary to satisfy the release condition are stored. The memory 160 may include a random access memory (RAM), a read-only memory (ROM), a magnetic disk device, an optical disk device, a flash memory 160, However, the present invention is not limited thereto.

Meanwhile, although the above-described configurations have been shown and described as separate configurations for convenience of explanation, each configuration may be merged, or one configuration may be implemented separately.

FIG. 2 is a flowchart illustrating a digital content security method according to an exemplary embodiment of the present invention.

In step 210, the security server 100 receives a release condition for accessing digital contents from a plurality of users. The manner of receiving the release conditions from a plurality of users is not particularly limited. For example, a plurality of pre-classified release conditions may be first presented, and a release condition may be input in a manner of selecting one of the release conditions.

In step 220, the security server 100 may collect the information necessary to satisfy the release condition. For example, when the release condition is to input two or more unique passwords of a plurality of users, the security server 100 may collect a unique password of each of the plurality of users. Further, if the release condition is to receive a unique address for the terminal of two or more of the plurality of users, the security server 100 may collect a unique address for each of the plurality of users. In addition, if the release condition is to be achieved by contacting the portable terminal, the security server 100 may collect the portable terminal number of each of the plurality of users. Further, when the release condition is achieved by inputting two or more fingerprints among a plurality of users, the security server 100 can collect fingerprints of each of the plurality of users.

In step 230, the security server 100 determines whether or not the release condition is satisfied. For example, it is possible to judge whether or not two or more unique passwords of a plurality of users have been input, whether a unique address relating to a terminal of two or more users among a plurality of users has been received, have.

In step 240, the security server 100 permits access to digital content of one or more of the plurality of users if it is determined that the release condition is satisfied. Accordingly, a specific user among the plurality of users can access the digital contents, or all of the plurality of users, and even unspecified users can access the digital contents.

If the security server 100 does not determine that the release condition is satisfied, the security server 100 may return to step 230 to determine whether the release condition is satisfied.

3 is a flowchart illustrating a security method of digital contents according to another embodiment of the present invention.

In step 310, the security server 100 receives a release condition for accessing digital contents from a plurality of users. The release condition in FIG. 3 assumes that a security server 100 and a plurality of user terminals can communicate with each other through a wired or wireless network, and a case where one user among a plurality of users requests access to digital contents Respectively. As a specific example, the release condition in FIG. 3 may be that two or more of a plurality of users enter their own password through a wired or wireless network.

In step 320, the security server 100 collects the information necessary to satisfy the release condition.

And receives a request for accessing digital content from one of the plurality of users at step 330. The manner in which one of the plurality of users makes a request for access to digital contents is not particularly limited. For example, a user of a plurality of users may view the digital content in a manner that clicks the " open " button of the digital content, or in a manner that performs an action associated with itself in the release condition (e.g., In a manner such that one user enters his or her own password in the case of inputting all of the unique password of the digital content).

In step 340, the terminal of the remaining one of the plurality of users requests authentication regarding the access of the digital contents. In order to prevent a specific user who can not access digital contents illegally from accessing digital contents or to prevent one of a plurality of users from accessing digital contents without unauthorized consent of the other users, Request authorization for access. At this time, there may be two or more users who are requested to be authenticated for accessing digital contents, and the security server 100 may request authentication for accessing digital contents to all of the remaining user terminals.

The authentication request for access to the digital content may be performed based on the release condition. For example, if the release condition is to receive a password of one of a plurality of users and then receive a simple confirmation (i.e., a confirmation through an act of selecting "Yes") of the remaining users, the security server 100 simply inquires whether the user of the remaining user terminal is allowed to access the digital content to a single user in the case where there is a password input of one user among a plurality of users, Can be requested.

If there are two or more release conditions, at step 330, the terminal of the remaining user may be requested to authenticate access to the digital content based on an action performed by the one user to request access to the digital content. For example, if the release condition is a unique password input method for all of a plurality of users and a login method for all of a plurality of users, and if an action performed by one user is a unique password input, To request authentication for access to digital content.

And receives authentication regarding the access of the digital contents from the terminal of the remaining user in step 350. And receives authentication regarding the access of digital contents in the form of the authentication requested in step 340. For example, if authentication is requested in the form of a simple verification in step 340, authentication regarding access to digital contents is received from the remaining users in the form of simple verification. When authentication is requested in the form of inputting a unique password in step 340, authentication regarding the access of the digital contents is received in the form of receiving a unique password from the remaining users.

In step 360, the security server 100 determines whether authentication regarding access to the digital content received from the terminal of the remaining user is appropriate, i.e., whether or not the release condition is satisfied.

If the release condition is satisfied in step 370, a user is authorized to access digital contents. As a result, one user can access digital contents. When the digital content is an electronic document, an electronic document can be executed to perform a reading or a writing operation. When the digital content is a moving image, the contents of the moving image can be confirmed.

If the release condition is not met at step 380, then one user is not authorized to access digital content. Accordingly, one user can not access the digital content, and the security server 100 must wait until it receives authentication regarding access to the digital content.

Figures 4A-4E are illustrations of examples where the present invention may be advantageously utilized.

Referring to FIG. 4A, it is assumed that the electronic document 440 can be executed only by inputting a unique password of each of the plurality of users 410, 420, and 430, 430 each input a password unique to the security server 400. [ And, when a user 410 of a plurality of users intends to execute the electronic document 440, a plurality of users (e. G., ≪ RTI ID = 410, 420, and 430, respectively.

Next, referring to FIG. 4B, after a certain time has elapsed, a user 410 of a plurality of users inputs his password to the security server 400 to access the electronic document 440. The security server 400 regards the behavior of this one user 410 as a request for accessing the electronic document 440 of the one user 510. [

Next, referring to FIG. 4C, the security server 400 requests authentication of accessing the electronic document 440 to the remaining users 420 and 430 among the plurality of users through the wireless network. Specifically, a message is input to the remaining users 420 and 430 through the wireless network to inform the one-user 410 to access the electronic document 440, and provides an input window 450 for inputting a password .

4D, the remainder of the users 420 and 430 enter their passwords in the input window 450 to authenticate the user 410 to allow access to the electronic document 440. [ And sends it to the server 400.

4E, after the security server 400 confirms the passwords of the remaining users 420 and 430, the security server 400 gives the authority to access the electronic document 440 to the one user 410 . Accordingly, the user can execute the electronic document 440 to perform an operation such as editing or browsing of the electronic document 440. [

Figures 5A-5E are diagrams illustrating other examples in which the present invention may be advantageously utilized.

5A, when a plurality of users 510, 520, and 530 are allowed to execute the electronic document 540 only when they log in to the security server 500, a release condition is set, and a plurality of users 510 520, and 530 each input an ID and a password unique to the security server 500. A plurality of users (e. G., A plurality of users) may be configured to receive an authentication request regarding the access of the electronic document 540 from the security server 500 when a user 510 of the plurality of users intends to execute the electronic document 540 510, 520, and 530).

Next, referring to FIG. 5B, after a predetermined time has elapsed, one user 510 of a plurality of users inputs his or her ID and password to the security server 500 to access the electronic document 540 .

Next, referring to FIG. 5C, the security server 500 requests authentication regarding the access of the electronic document 540 to the terminals of the remaining users 520 and 530 among the plurality of users through the wireless network. Specifically, since the one user 510 wants to access the electronic document 540 via the wireless network to the terminals of the remaining users 520 and 530, a message of "Yes" or "No" is selected A selection window 550 is provided.

5D, the remaining users 520, 530 select "Yes" in the selection window 550 to authenticate the authentication of the one user 510 to allow access to the electronic document 540, And sends it to the server 500.

5E, after confirming the responses of the remaining users 520 and 530, the security server 500 grants the authority to access the electronic document 540 to the one user 510 . Accordingly, the one-user 510 can execute the electronic document 540 to perform an operation such as editing or browsing of the electronic document 540. [

6A and 6B are diagrams showing still another example in which the present invention can be advantageously utilized.

6A, only when all of the mobile phones 670, 680, 690 of each of the plurality of users are located within a short distance, for example, within 10 m from the security server 600, the electronic document 640 can be executed And registers the MAC address of each of the plurality of users' mobile phones 670, 680, and 690 in the security server 600.

6B, all the mobile phones 670, 680, and 690 of each of the plurality of users are located within 10 m from the security server 600, and the release condition is satisfied. Thus, not only a plurality of users but also all of the unspecified users can read the electronic document 640.

In this specification, each block may represent a portion of a module, segment, or code that includes one or more executable instructions for executing the specified logical function (s). It should also be noted that in some alternative implementations, the functions mentioned in the blocks may occur out of order. For example, two blocks shown in succession may actually be executed substantially concurrently, or the blocks may sometimes be performed in reverse order according to the corresponding function.

The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software module may reside in a RAM memory, a flash memory, a ROM memory, an EPROM memory, an EEPROM memory, a register, a hard disk, a removable disk, a CD-ROM or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor, which is capable of reading information from, and writing information to, the storage medium. Alternatively, the storage medium may be integral with the processor. The processor and the storage medium may reside within an application specific integrated circuit (ASIC). The ASIC may reside within the user terminal. Alternatively, the processor and the storage medium may reside as discrete components in a user terminal.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the present invention is not limited to the disclosed exemplary embodiments, but various changes and modifications may be made without departing from the spirit and scope of the invention. Therefore, the embodiments disclosed in the present invention are not intended to limit the scope of the present invention but to limit the scope of the technical idea of the present invention. The scope of protection of the present invention should be construed according to the following claims, and all technical ideas within the scope of equivalents should be construed as falling within the scope of the present invention.

100, 400, 500, 600: Security server
110: Release condition receiver
120: Release condition determining unit
130: access permission unit
140:
150:
160: Memory
410, 420, 430, 510, 520, 530: user
440, 540, 640: electronic document
450: input window
550: Selection window
670, 680, 690: mobile phone

Claims (10)

The method comprising: receiving a release condition for accessing digital content from a plurality of users, wherein the release condition is satisfied when at least two users of the plurality of users are required to intervene;
Determining whether the release condition is satisfied; And
And allowing access by the one or more users of the plurality of users to the digital content if the release condition is determined to be satisfied.
The method according to claim 1,
Wherein the release condition is satisfied when a terminal of two or more of the plurality of users is intervened.
3. The method of claim 2,
Wherein the release condition is satisfied by receiving a unique address for the terminal of two or more of the plurality of users.
The method according to claim 1,
Wherein the release condition is satisfied only when a unique password of two or more of the plurality of users is inputted.
The method according to claim 1,
Wherein the release condition is at least two.
The method according to claim 1,
Receiving a request for access to the digital content from a user of the plurality of users;
Requesting authentication of accessing the digital content to a terminal of a remaining one of the plurality of users; And
And receiving authentication regarding access of the digital content from the terminal of the remaining user.
The method according to claim 6,
Wherein the step of requesting authentication for accessing the digital content comprises the step of inquiring whether the one user is authorized to access the digital content to the terminal of the remaining user, How to secure content.
The method according to claim 6,
Receiving a request for access to the digital content, requesting authentication for access to the digital content, and receiving authentication for accessing the digital content are performed over a wireless network. , A method of securing digital content.
A release condition receiving unit for receiving a release condition for accessing contents from a plurality of users;
A release condition determiner for determining whether the release condition is satisfied; And
And an access permission unit which permits access to the contents of one or more users among the plurality of users when the release condition is determined to be satisfied,
Wherein the release condition is satisfied when at least two of the plurality of users are to intervene.
43. A computer-readable medium for storing a set of instructions,
Wherein the sets of instructions cause the computing device to, when executed by the computing device,
A plurality of users are allowed to receive a release condition for accessing the content,
Whether or not the release condition is satisfied,
If the release condition is determined to be satisfied, allowing one or more users of the plurality of users to access the content,
Wherein the release condition is satisfied when at least two of the plurality of users are to intervene.
KR1020140152986A 2014-11-05 2014-11-05 Security method and security server for digital content KR20160053651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140152986A KR20160053651A (en) 2014-11-05 2014-11-05 Security method and security server for digital content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140152986A KR20160053651A (en) 2014-11-05 2014-11-05 Security method and security server for digital content

Publications (1)

Publication Number Publication Date
KR20160053651A true KR20160053651A (en) 2016-05-13

Family

ID=56023462

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140152986A KR20160053651A (en) 2014-11-05 2014-11-05 Security method and security server for digital content

Country Status (1)

Country Link
KR (1) KR20160053651A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200132554A (en) * 2019-05-17 2020-11-25 (주)리마보안연구소 Content management method using co-authentication of multiple users

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200132554A (en) * 2019-05-17 2020-11-25 (주)리마보안연구소 Content management method using co-authentication of multiple users

Similar Documents

Publication Publication Date Title
CN110463161B (en) Password state machine for accessing protected resources
EP3070632B1 (en) Binding to a user device
US20160277383A1 (en) Binding to a user device
US10205711B2 (en) Multi-user strong authentication token
US8918901B2 (en) System and method for restricting access to requested data based on user location
US20140282992A1 (en) Systems and methods for securing the boot process of a device using credentials stored on an authentication token
CN111316611B (en) User-directed authentication over a network
KR20160097323A (en) Near field communication authentication mechanism
CA2798071A1 (en) Methods and systems for increasing the security of network-based transactions
JP5850879B2 (en) Authentication system and program
WO2018126616A1 (en) Sharing method, apparatus and system
US10318725B2 (en) Systems and methods to enable automatic password management in a proximity based authentication
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
US9451128B2 (en) Mobile data processing having secured association with multifunction device
EP3759629B1 (en) Method, entity and system for managing access to data through a late dynamic binding of its associated metadata
KR101576075B1 (en) Mobile payment system, mobile terminal, and mobile payment method
WO2016187966A1 (en) Terminal and method for protecting data security of terminal
KR20160053651A (en) Security method and security server for digital content
KR101603988B1 (en) System for context-aware service
EP3384632B1 (en) Apparatus and method for camera-based user authentication for content access
CN111488620A (en) File processing method and device, mobile terminal and storage medium
CN111787006A (en) Access control method and system for security application
JP2007172176A (en) Authentication device
KR101594315B1 (en) Service providing method and server using third party's authentication
CN113507445B (en) Method and device for detecting rule security of third party of Internet of things

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination