KR20170034963A - Data security management system - Google Patents

Data security management system Download PDF

Info

Publication number
KR20170034963A
KR20170034963A KR1020150132889A KR20150132889A KR20170034963A KR 20170034963 A KR20170034963 A KR 20170034963A KR 1020150132889 A KR1020150132889 A KR 1020150132889A KR 20150132889 A KR20150132889 A KR 20150132889A KR 20170034963 A KR20170034963 A KR 20170034963A
Authority
KR
South Korea
Prior art keywords
communication terminal
security management
personal communication
security
terminal
Prior art date
Application number
KR1020150132889A
Other languages
Korean (ko)
Inventor
윤상원
심기연
문경훈
이건희
강대훈
Original Assignee
윤상원
이건희
강대훈
문경훈
심기연
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 윤상원, 이건희, 강대훈, 문경훈, 심기연 filed Critical 윤상원
Priority to KR1020150132889A priority Critical patent/KR20170034963A/en
Publication of KR20170034963A publication Critical patent/KR20170034963A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • H04L51/24
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/182Network node acting on behalf of an other network entity, e.g. proxy

Abstract

The present idea relates to a data security management system for performing a mobile security in a state that more flexibility and context-suitability are secured, in which a security policy is established with respect to a personal communication terminal such as a smart phone carried by a worker or a visitor at a security zone required for a security such as a research institute, and a data use of the personal communication terminal positioned in the security zone is restricted based on a security control policy and an area where a terminal user is positioned, thereby preventing the information leakage using the personal communication terminal, securing a data security through cooperation with a server terminal separated from a leakage action by the personal communication terminal, and establishing a setup by applying a position of the personal communication terminal, information on a related department, a security level and so on.

Description

[0001] The present invention relates to a data security management system,

The present invention relates to a data security management system, and more particularly, it relates to a data security management system that controls security for a personal communication terminal such as a smart phone carried by a worker or a visitor in a security-requiring area such as a research institute, To a security control system and method for a personal communication terminal.

Recent developments in technology have led to the emergence of smart devices such as private communication terminals, which are becoming an important issue in businesses and research centers.

Conventional techniques are not out of the technical limit. In order to solve this problem, a method for managing a security event, a system for configuring a security event manager as a system, receiving security event data from a plurality of security event sources of the mobile device, and determining whether a security event has occurred Discloses a technique for comparing security event data based on a security policy and responding to a security event based on the security policy. However, it can not provide security specific to the business environment, and there is a limit in imposing a security action according to the management grade.

In order to achieve this, it is possible to provide a differential security policy for the security events that occur according to the use of the mobile terminal through various steps, and to provide different strong security. However, there was no way to control personal communication devices and to know where these spills were coming from.

Published Patent No. 10-2010-0135036 Published Japanese Patent Application No. 10-2013-0058863

In order to solve the above problem, the idea is to establish a security control policy for a personal communication terminal such as a smart phone carried by a worker or a visitor in a secure area requiring security such as a research center, It is possible to prevent the leakage of information using the personal communication terminal by restricting the data use of the personal communication terminal located in the security zone based on the security of the personal communication terminal, And can be set by reflecting the location of the personal communication terminal, the information of the related departments, the security level, etc., and aims at a data security management system capable of carrying out mobile security with more flexibility and securing the conformity.

The security control system of a personal communication terminal according to the present invention is a system for registering user information of a personal communication terminal existing in a security zone and information of the personal communication terminal in a server and installing security control software in the personal communication terminal through wireless communication The position of the personal communication terminal can be checked in real time on the security management server by controlling the personal communication terminal, so that the position can be grasped when the data leakage is detected, and the data leaked to the personal communication terminal due to the high security control software And is automatically deleted.

The present invention relates to a data security management system for registering user identification information and personal communication terminal information in a security management server with respect to a personal communication terminal possessed by a worker or a visitor in a secure area such as a corporation, The location information of the personal communication terminal registered through the security control software installed through the security management server and the data leaked to the personal communication terminal are automatically deleted so that the data leakage through the personal communication terminal It can prevent security threats such as virus spreading, and it can detect the location even if security threats occur, so it can catch the criminal.

1 is a reference diagram for explaining a data security management system of the present invention.
2 is a configuration diagram showing an embodiment of the data security management server of the present invention.
3 is a configuration diagram showing an embodiment of a personal communication terminal of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings.

1 is a reference diagram for explaining a data security management system of the present invention.

The operation of each component of the data security management system will now be described in detail with reference to FIG. The data security management system comprises at least one personal communication terminal 20 to be subjected to security management, a wireless communication 30 for receiving data of at least one personal communication terminal 20, And a security management server 10 for controlling the personal communication terminal 20.

The personal communication terminal 20 registered in the security management controller 12 registering and managing the personal communication terminal 20 through the security management server 10 is managed by the security management server 10 of the data security management system 10 .

The security management server 10 can set security for at least one personal communication terminal 20 through the wireless communication 30, or can monitor the security status by detecting the real time location.

The security management server 10 can remotely control at least one personal communication terminal 20 through the wireless communication 30 when the data leakage is detected and can automatically delete the leaked data.

The wireless communication 30 is not restricted to wifi, Bluetooth, and the like. Here, the wireless communication 30 is a communication method using an electromagnetic wave and a communication method using an ultrasonic wave area that can not (hear) human audible frequencies. A general signal (such as a human voice) is synthesized with a high frequency wave, The high-frequency signal received in this way is processed and converted to the original signal.

2 is a configuration diagram showing an embodiment of the data security management server of the present invention.

An embodiment of the security management server 10 of the data security management system will be described in more detail with reference to FIG.

The security management server 10 includes a communication unit 11, a security management control unit 12, and a database 13.

The communication unit 11 is a device that mutually transmits and receives data to be controlled by the personal communication terminal 20 through the wireless communication 30. [

The security management controller 12 manages and controls unauthorized actions such as leakage of information from the personal communication terminal 20. [

The security management control unit 12 remotely controls the personal communication terminal 20 via the communication unit 11 and the wireless communication 30 to control the personal communication terminal 20 when there is an unauthorized action such as leakage of information from the personal communication terminal 20, And instructs the communication terminal 20 to automatically delete the leaked data stored therein.

The security management controller 12 remotely commands the personal communication terminal 20 via the communication unit 11 and the wireless communication 30 so as to manage the position of the personal communication terminal 20 at any time in real time.

The security management controller 12 determines the position of the personal communication terminal 20 through the GPS.

Here, the GPS receiver receives the signals transmitted from three or more GPS satellites to determine the positions of the satellites and the receivers. If you measure the time difference between the signal transmitted from the satellite and the signal received from the receiver, you can obtain the distance between the satellite and the receiver. Once you know the distance to at least three satellites and the position of each satellite, you can calculate the position of the receiver using the same method as for the trilateration. However, since the clock is not completely accurate, it is usually a system that uses four or more satellites to determine the position to compensate for the error.

The database 13 includes a security control S / W 13a, terminal location information 13b, and terminal information 13c. The security control S / W 13a for the terminal sends a command to the communication unit 11 in the security management control unit 12 when the personal communication terminal 20 is registered in the security management server 20, The security control S / W 13a for the terminal is installed in the terminal 20.

The terminal position information 13b is received by the communication unit 11, and the security management controller 12 grasps the position in real time and stores the information in the database 13. [

The terminal information 13c is a portion in which the terminal information 13c is stored when the personal communication terminal 20 is registered.

3 is a configuration diagram showing an embodiment of a personal communication terminal of the present invention.

Hereinafter, an embodiment of the personal communication terminal 20 will be described in detail with reference to FIG.

The personal communication terminal 20 includes a control (OS) 21, a communication unit 22, a memory unit 23, an input unit 24, and an output unit 25.

The control (OS) 21 controls all the parts of the personal communication terminal 20 by a device that controls the personal communication terminal 20.

The communication unit 22 is a device capable of mutual transmission and reception with the security management server 10 through the wireless communication 30 and the communication unit 11. [

When the personal communication terminal 20 registers with the security management server 10, the memory unit 23 sends a command to the communication unit 11 from the personal security management control unit 12, And a security control S / W 13a for the terminal is stored in the memory 20. Here, the memory means a function of recall to store, hold, and recall information.

The input unit 24 is a device for inputting a control command sent from the security management server 10 through the communication unit 21. [

The output unit 25 can output a control command sent from the security management server 10 through the communication unit 21 at the input unit 24 as a sound or a screen to confirm a warning message about data leakage.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. . Therefore, the true scope of protection of the present invention should be defined only by the appended claims.

10: security management server
11:
12; Security management control unit
13: Database
13a: Security control S / W for terminal
13b: Terminal location information
13c: Terminal information
20: Personal communication terminal
21: Control (OS)
22:
23:
24:
25: Output section
30: Wireless communication

Claims (4)

It is possible to remotely control at least one personal communication terminal 20 through the wireless communication 30 when the data leakage is detected and to automatically delete the leaked data and to transmit the data to the at least one personal communication terminal 20 A security management server 10 capable of setting, controlling, or monitoring a security status of real-time locations;

A personal communication terminal 20 for registering and controlling information in the security management server 10 and outputting a warning message sent from the security management server 10 at the time of data leakage;

And a wireless communication (30) enabling the security management server (10) to communicate the command of the personal communication terminal (20).
The system according to claim 1, wherein the security management server (10) comprises: a communication unit (11) as a device for mutually transmitting and receiving data to be controlled by the personal communication terminal (20) through the wireless communication (30);

The personal communication terminal 20 manages and controls illegal actions such as leakage of information and controls the personal communication terminal 20 by controlling the communication with the personal communication terminal 20 via the communication unit 11 and the wireless communication 30, The personal communication terminal 20 can be remotely controlled by the communication unit 11 and the wireless communication 30 so that the position of the personal communication terminal 20 can be monitored in real time. A security management control unit (12) which is a device for sending an instruction to a user;

And a database (13) in which all data are stored.
The security management system according to claim 2, wherein the database (13) sends a command to the communication unit (11) from the security management controller (12) when registering the security management server in the personal communication terminal (20) A security control S / W 13a for a terminal, which is a program that can control and manage the terminal 20;

Terminal position information 13b which is received by the communication unit 11, grasps the position in real time in the security management control unit 12 and stores information in the database 13;

And terminal information (13c) in which information of the personal communication terminal (20) is stored when the personal communication terminal (20) is registered in the security management server (10).
The personal communication terminal (20) according to claim 1, wherein the personal communication terminal (20) comprises: control (os) (21) for controlling all parts of the personal communication terminal (20);

A communication unit 22 as a device capable of mutual transmission and reception with the security management server 10 through the wireless communication 30 and the communication unit 11;

When the personal communication terminal 20 registers with the security management server 10, the personal security management controller 12 issues a command to the communication unit 11 to transmit the command from the personal communication terminal 20 to the terminal A memory unit 23 which is a device in which the security control S / W 13a is stored;

An input unit 24 for inputting a control command sent from the security management server 10 through the communication unit 21;

And an output unit 25 for outputting a control command sent from the security management server 10 through the communication unit 21 through the input unit 24 on a sound or a screen to confirm a warning message about data leakage Features a data security management system.
KR1020150132889A 2015-09-21 2015-09-21 Data security management system KR20170034963A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150132889A KR20170034963A (en) 2015-09-21 2015-09-21 Data security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150132889A KR20170034963A (en) 2015-09-21 2015-09-21 Data security management system

Publications (1)

Publication Number Publication Date
KR20170034963A true KR20170034963A (en) 2017-03-30

Family

ID=58503105

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150132889A KR20170034963A (en) 2015-09-21 2015-09-21 Data security management system

Country Status (1)

Country Link
KR (1) KR20170034963A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100135036A (en) 2009-06-16 2010-12-24 ( 주 ) 화신 Kingpin assembly device for vehicle
KR20130058863A (en) 2011-11-28 2013-06-05 박찬홍 Blanket for knee having travel map playing yut board

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100135036A (en) 2009-06-16 2010-12-24 ( 주 ) 화신 Kingpin assembly device for vehicle
KR20130058863A (en) 2011-11-28 2013-06-05 박찬홍 Blanket for knee having travel map playing yut board

Similar Documents

Publication Publication Date Title
KR101608639B1 (en) Total smart system for information security
US11778417B2 (en) System and method for detecting and locating contraband devices in a secure environment
US9232345B1 (en) Close proximity vehicular data transmission
EP3188936B1 (en) Key module
JP6630679B2 (en) Secure current movement indicator
CN107331213B (en) Unmanned aerial vehicle supervision method and system
CN105306204A (en) Security verification method, device and system
JP2016012364A (en) Method and system for remote management of security system
US20160174038A1 (en) Method for indicating proximity, corresponding device, program and recording medium
KR101518929B1 (en) Method and system for protecting hacking of vehicle using telematics
EP3123665B1 (en) Network node security using short range communication
KR20150098702A (en) Patrol Management System Using Near Field Communication
KR102131596B1 (en) Location based user terminal control method and system therefor
CN210072356U (en) Extended operator control unit display system and operator control unit
KR101972655B1 (en) Security system for detecting a resident by using verification technology of ultrasound signal
KR20170034963A (en) Data security management system
US10419484B2 (en) System and method for communicating with security devices within secure networks
KR20150136791A (en) Authentication and access control system to use indoor LBS
US9877152B2 (en) Auto-locate operation
JP2019134426A (en) Wireless terminal, wireless system, and wireless communication method
EP3804231B1 (en) Operational constraints for operational functions of field devices
KR101657087B1 (en) Method and system for personal authentication using beacon
KR101588603B1 (en) Security features provided with a mobile two-way text sending and receiving system
KR101569838B1 (en) How to send and receive letters using the security features provided with a mobile two-way text sending and receiving system
JP2010130028A (en) Rfid tag communication device and rfid tag communication system