KR20160053651A - Security method and security server for digital content - Google Patents
Security method and security server for digital content Download PDFInfo
- Publication number
- KR20160053651A KR20160053651A KR1020140152986A KR20140152986A KR20160053651A KR 20160053651 A KR20160053651 A KR 20160053651A KR 1020140152986 A KR1020140152986 A KR 1020140152986A KR 20140152986 A KR20140152986 A KR 20140152986A KR 20160053651 A KR20160053651 A KR 20160053651A
- Authority
- KR
- South Korea
- Prior art keywords
- users
- release condition
- digital content
- access
- satisfied
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
A security method for digital contents according to an exemplary embodiment of the present invention includes receiving a release condition for accessing digital content from a plurality of users, wherein the release condition is satisfied when two or more users of a plurality of users are required to intervene, The method comprising the steps of: setting a release condition; determining whether the release condition is satisfied; and, when it is determined that the release condition is satisfied, allowing access to digital content of one or more users among a plurality of users do.
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a digital content security method and security server, and more particularly, to a digital content security method and security server capable of securely processing digital contents with high security need.
In recent years, the use of digital devices such as personal computers and smart phones has been rapidly increasing, and it has become common to perform various tasks with digital contents such as electronic documents, photographs, and videos. Since digital contents are manufactured in a digital manner, they have an advantage that they can be easily processed, stored and moved using a wired / wireless network or various storage means.
As the use of digital contents to perform a variety of tasks become common, it becomes necessary to secure digital contents in order to prevent illegally accessing digital contents from the outside. A typical security process for digital contents is to register a password in the digital content so that the user can access the digital content only by inputting the password. Since the password can be composed of a large number of characters or numbers that can not be easily found by others, the password is effectively used to block access to illegal digital contents of others.
However, securing digital content containing confidential company secrets with a high degree of security need, for example, with a simple one password can pose a significant risk. This is because, if any one of a plurality of persons who know the password can steal the password to the outside with impure intention, the user can easily access the digital contents from the outside using such a password. Once the leaked digital content can be copied easily, it is very important to secure the digital content from being leaked in the first place.
Accordingly, a new technology for reliably and securely processing digital contents with high security needs is demanded.
It is an object of the present invention to provide a security method and security server for digital contents which can prevent a person who is aware of a method of securing digital contents from disclosing digital contents to the outside intentionally.
An object of the present invention is to provide a digital content security method and security server capable of performing reliable security processing on digital contents.
The problems of the present invention are not limited to the above-mentioned problems, and other problems not mentioned can be clearly understood by those skilled in the art from the following description.
According to another aspect of the present invention, there is provided a method of securing digital content according to an exemplary embodiment of the present invention includes receiving a release condition for accessing digital content from a plurality of users, The method comprising the steps of: setting a release condition, wherein at least two users are required to intervene; determining whether the release condition is satisfied; and, if it is determined that the release condition is satisfied, The method comprising the steps of:
According to another aspect of the present invention, the release condition may be satisfied when the terminal of two or more of the plurality of users intervenes.
According to another aspect of the present invention, the cancellation condition can be satisfied by receiving a unique address for the terminal of two or more of the plurality of users.
According to another aspect of the present invention, the release condition can be satisfied only when a unique password of two or more of the plurality of users is input.
According to another aspect of the present invention, the release condition may be more than two.
According to another aspect of the present invention, there is provided a method for accessing digital content, the method comprising: receiving a request for accessing digital content from a user among a plurality of users; requesting authentication of accessing digital content to a terminal of the remaining user of the plurality of users; And receiving authentication regarding access of the digital contents from the terminal of the remaining users.
According to another aspect of the present invention, the step of requesting authentication regarding the access of the digital contents may include the step of inquiring whether or not to allow the terminal of the remaining user to grant authority to access digital contents to a user have.
According to another aspect of the present invention, there is provided a method for accessing digital content, the method comprising: receiving a request for access to digital content; requesting authentication for access to digital content; and receiving authentication for accessing digital content, .
According to an aspect of the present invention, there is provided a security server for digital contents according to an exemplary embodiment of the present invention includes a release condition receiver for receiving a release condition for accessing content from a plurality of users, And an access permission unit for permitting access to contents of one or more users among a plurality of users when it is determined that the cancellation condition is satisfied, wherein the cancellation condition is that at least two of the plurality of users must intervene Is satisfied.
A computer readable medium having stored thereon a set of instructions for implementing the present invention includes instructions for causing a computing device to access content from a plurality of users when executed by the computing device, The user is allowed to access the contents of one or more of the plurality of users when the release condition is determined to be satisfied and the release condition is set so that a plurality of users Intervention is required if two or more users are involved.
The details of other embodiments are included in the detailed description and drawings.
The present invention has the effect of preventing a person who is aware of the method for releasing the digital content from disclosing the digital content to the outside with impure intent.
INDUSTRIAL APPLICABILITY The present invention has an effect of performing reliable security processing on digital contents.
The effects of the present invention are not limited to the effects mentioned above, and other effects not mentioned can be clearly understood by those skilled in the art from the following description.
1 is a block diagram illustrating a detailed configuration of a digital content security server according to an exemplary embodiment of the present invention.
FIG. 2 is a flowchart illustrating a digital content security method according to an exemplary embodiment of the present invention.
3 is a flowchart illustrating a security method of digital contents according to another embodiment of the present invention.
Figures 4A-4E are illustrations of examples where the present invention may be advantageously utilized.
Figures 5A-5E are diagrams illustrating other examples in which the present invention may be advantageously utilized.
6A and 6B are diagrams showing still another example in which the present invention can be advantageously utilized.
BRIEF DESCRIPTION OF THE DRAWINGS The advantages and features of the present invention, and the manner of achieving them, will be apparent from and elucidated with reference to the embodiments described hereinafter in conjunction with the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Is provided to fully convey the scope of the invention to those skilled in the art, and the invention is only defined by the scope of the claims.
Like reference numerals refer to like elements throughout the specification.
It is to be understood that each of the features of the various embodiments of the present invention may be combined or combined with each other partially or entirely and technically various interlocking and driving is possible as will be appreciated by those skilled in the art, It may be possible to cooperate with each other in association.
Various embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
1 is a block diagram illustrating a detailed configuration of a digital content security server according to an exemplary embodiment of the present invention.
1, the
The release condition receiving unit 110 receives a release condition for accessing digital contents from a plurality of users. The inputted release condition can be stored in the
Here, the digital content refers to information or contents that can be provided in digital form through the Internet or computer communication, for example, an electronic document, a photograph, a moving image, and the like. An electronic document means information transmitted, received or stored in an electronic form by an information processing system and can be used in electronic form or printed
Also, the release condition means a condition for accessing the digital contents, and it is satisfied that more than two users among a plurality of users have to intervene. A plurality of users can set a release condition for allowing digital content to be accessed in a free form through a common agreement. For example, the release condition can be set to be satisfied when a unique password of two or more of the plurality of users is input. In addition, the release condition may be set so that the terminal of two or more of the plurality of users is required to intervene. In addition, the release condition may be set to be satisfied by receiving a unique address of the terminal of two or more of the plurality of users. The unique address for each terminal of a plurality of users may be, for example, a Mac address uniquely assigned to an individual mobile terminal. The release condition may include two or more schemes, so that access to digital content is allowed if one or more of the two schemes is met, or access is allowed to digital content if both are met Can be set.
The release condition determination unit 120 determines whether or not the release condition is satisfied. Whether or not the release condition is satisfied may be different depending on what kind of release condition is.
The
The
On the other hand, when receiving a request for access to digital contents from one user among a plurality of users, the
The
In the
Meanwhile, although the above-described configurations have been shown and described as separate configurations for convenience of explanation, each configuration may be merged, or one configuration may be implemented separately.
FIG. 2 is a flowchart illustrating a digital content security method according to an exemplary embodiment of the present invention.
In step 210, the
In step 220, the
In step 230, the
In step 240, the
If the
3 is a flowchart illustrating a security method of digital contents according to another embodiment of the present invention.
In step 310, the
In step 320, the
And receives a request for accessing digital content from one of the plurality of users at step 330. The manner in which one of the plurality of users makes a request for access to digital contents is not particularly limited. For example, a user of a plurality of users may view the digital content in a manner that clicks the " open " button of the digital content, or in a manner that performs an action associated with itself in the release condition (e.g., In a manner such that one user enters his or her own password in the case of inputting all of the unique password of the digital content).
In step 340, the terminal of the remaining one of the plurality of users requests authentication regarding the access of the digital contents. In order to prevent a specific user who can not access digital contents illegally from accessing digital contents or to prevent one of a plurality of users from accessing digital contents without unauthorized consent of the other users, Request authorization for access. At this time, there may be two or more users who are requested to be authenticated for accessing digital contents, and the
The authentication request for access to the digital content may be performed based on the release condition. For example, if the release condition is to receive a password of one of a plurality of users and then receive a simple confirmation (i.e., a confirmation through an act of selecting "Yes") of the remaining users, the
If there are two or more release conditions, at step 330, the terminal of the remaining user may be requested to authenticate access to the digital content based on an action performed by the one user to request access to the digital content. For example, if the release condition is a unique password input method for all of a plurality of users and a login method for all of a plurality of users, and if an action performed by one user is a unique password input, To request authentication for access to digital content.
And receives authentication regarding the access of the digital contents from the terminal of the remaining user in step 350. And receives authentication regarding the access of digital contents in the form of the authentication requested in step 340. For example, if authentication is requested in the form of a simple verification in step 340, authentication regarding access to digital contents is received from the remaining users in the form of simple verification. When authentication is requested in the form of inputting a unique password in step 340, authentication regarding the access of the digital contents is received in the form of receiving a unique password from the remaining users.
In step 360, the
If the release condition is satisfied in step 370, a user is authorized to access digital contents. As a result, one user can access digital contents. When the digital content is an electronic document, an electronic document can be executed to perform a reading or a writing operation. When the digital content is a moving image, the contents of the moving image can be confirmed.
If the release condition is not met at step 380, then one user is not authorized to access digital content. Accordingly, one user can not access the digital content, and the
Figures 4A-4E are illustrations of examples where the present invention may be advantageously utilized.
Referring to FIG. 4A, it is assumed that the
Next, referring to FIG. 4B, after a certain time has elapsed, a
Next, referring to FIG. 4C, the
4D, the remainder of the
4E, after the
Figures 5A-5E are diagrams illustrating other examples in which the present invention may be advantageously utilized.
5A, when a plurality of
Next, referring to FIG. 5B, after a predetermined time has elapsed, one
Next, referring to FIG. 5C, the
5D, the remaining
5E, after confirming the responses of the remaining
6A and 6B are diagrams showing still another example in which the present invention can be advantageously utilized.
6A, only when all of the
6B, all the
In this specification, each block may represent a portion of a module, segment, or code that includes one or more executable instructions for executing the specified logical function (s). It should also be noted that in some alternative implementations, the functions mentioned in the blocks may occur out of order. For example, two blocks shown in succession may actually be executed substantially concurrently, or the blocks may sometimes be performed in reverse order according to the corresponding function.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software module may reside in a RAM memory, a flash memory, a ROM memory, an EPROM memory, an EEPROM memory, a register, a hard disk, a removable disk, a CD-ROM or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor, which is capable of reading information from, and writing information to, the storage medium. Alternatively, the storage medium may be integral with the processor. The processor and the storage medium may reside within an application specific integrated circuit (ASIC). The ASIC may reside within the user terminal. Alternatively, the processor and the storage medium may reside as discrete components in a user terminal.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the present invention is not limited to the disclosed exemplary embodiments, but various changes and modifications may be made without departing from the spirit and scope of the invention. Therefore, the embodiments disclosed in the present invention are not intended to limit the scope of the present invention but to limit the scope of the technical idea of the present invention. The scope of protection of the present invention should be construed according to the following claims, and all technical ideas within the scope of equivalents should be construed as falling within the scope of the present invention.
100, 400, 500, 600: Security server
110: Release condition receiver
120: Release condition determining unit
130: access permission unit
140:
150:
160: Memory
410, 420, 430, 510, 520, 530: user
440, 540, 640: electronic document
450: input window
550: Selection window
670, 680, 690: mobile phone
Claims (10)
Determining whether the release condition is satisfied; And
And allowing access by the one or more users of the plurality of users to the digital content if the release condition is determined to be satisfied.
Wherein the release condition is satisfied when a terminal of two or more of the plurality of users is intervened.
Wherein the release condition is satisfied by receiving a unique address for the terminal of two or more of the plurality of users.
Wherein the release condition is satisfied only when a unique password of two or more of the plurality of users is inputted.
Wherein the release condition is at least two.
Receiving a request for access to the digital content from a user of the plurality of users;
Requesting authentication of accessing the digital content to a terminal of a remaining one of the plurality of users; And
And receiving authentication regarding access of the digital content from the terminal of the remaining user.
Wherein the step of requesting authentication for accessing the digital content comprises the step of inquiring whether the one user is authorized to access the digital content to the terminal of the remaining user, How to secure content.
Receiving a request for access to the digital content, requesting authentication for access to the digital content, and receiving authentication for accessing the digital content are performed over a wireless network. , A method of securing digital content.
A release condition determiner for determining whether the release condition is satisfied; And
And an access permission unit which permits access to the contents of one or more users among the plurality of users when the release condition is determined to be satisfied,
Wherein the release condition is satisfied when at least two of the plurality of users are to intervene.
Wherein the sets of instructions cause the computing device to, when executed by the computing device,
A plurality of users are allowed to receive a release condition for accessing the content,
Whether or not the release condition is satisfied,
If the release condition is determined to be satisfied, allowing one or more users of the plurality of users to access the content,
Wherein the release condition is satisfied when at least two of the plurality of users are to intervene.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140152986A KR20160053651A (en) | 2014-11-05 | 2014-11-05 | Security method and security server for digital content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140152986A KR20160053651A (en) | 2014-11-05 | 2014-11-05 | Security method and security server for digital content |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160053651A true KR20160053651A (en) | 2016-05-13 |
Family
ID=56023462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020140152986A KR20160053651A (en) | 2014-11-05 | 2014-11-05 | Security method and security server for digital content |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160053651A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200132554A (en) * | 2019-05-17 | 2020-11-25 | (주)리마보안연구소 | Content management method using co-authentication of multiple users |
-
2014
- 2014-11-05 KR KR1020140152986A patent/KR20160053651A/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200132554A (en) * | 2019-05-17 | 2020-11-25 | (주)리마보안연구소 | Content management method using co-authentication of multiple users |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110463161B (en) | Password state machine for accessing protected resources | |
EP3070632B1 (en) | Binding to a user device | |
US20160277383A1 (en) | Binding to a user device | |
US10205711B2 (en) | Multi-user strong authentication token | |
US8918901B2 (en) | System and method for restricting access to requested data based on user location | |
US20140282992A1 (en) | Systems and methods for securing the boot process of a device using credentials stored on an authentication token | |
CN111316611B (en) | User-directed authentication over a network | |
KR20160097323A (en) | Near field communication authentication mechanism | |
CA2798071A1 (en) | Methods and systems for increasing the security of network-based transactions | |
JP5850879B2 (en) | Authentication system and program | |
WO2018126616A1 (en) | Sharing method, apparatus and system | |
US10318725B2 (en) | Systems and methods to enable automatic password management in a proximity based authentication | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
US9451128B2 (en) | Mobile data processing having secured association with multifunction device | |
EP3759629B1 (en) | Method, entity and system for managing access to data through a late dynamic binding of its associated metadata | |
KR101576075B1 (en) | Mobile payment system, mobile terminal, and mobile payment method | |
WO2016187966A1 (en) | Terminal and method for protecting data security of terminal | |
KR20160053651A (en) | Security method and security server for digital content | |
KR101603988B1 (en) | System for context-aware service | |
EP3384632B1 (en) | Apparatus and method for camera-based user authentication for content access | |
CN111488620A (en) | File processing method and device, mobile terminal and storage medium | |
CN111787006A (en) | Access control method and system for security application | |
JP2007172176A (en) | Authentication device | |
KR101594315B1 (en) | Service providing method and server using third party's authentication | |
CN113507445B (en) | Method and device for detecting rule security of third party of Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |