WO2010087678A2 - 클립보드 보안 시스템 및 방법 - Google Patents
클립보드 보안 시스템 및 방법 Download PDFInfo
- Publication number
- WO2010087678A2 WO2010087678A2 PCT/KR2010/000621 KR2010000621W WO2010087678A2 WO 2010087678 A2 WO2010087678 A2 WO 2010087678A2 KR 2010000621 W KR2010000621 W KR 2010000621W WO 2010087678 A2 WO2010087678 A2 WO 2010087678A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- clipboard
- data
- trust
- information
- security
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000000605 extraction Methods 0.000 claims description 30
- 238000013075 data extraction Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 9
- 230000002265 prevention Effects 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000007726 management method Methods 0.000 description 66
- 238000010586 diagram Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 16
- 238000012546 transfer Methods 0.000 description 10
- 238000013500 data storage Methods 0.000 description 4
- 230000001965 increasing effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 208000024891 symptom Diseases 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1064—Restricting content processing at operating system level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- the present invention relates to a clipboard security system and method, and more particularly, to a clipboard security system and method for enhancing the security of data transmission through a clipboard frequently used when using a computer.
- a variety of operating systems provide a clipboard or similar space for the purpose of delivering arbitrary program data to other places, which is one of the most frequently used operating system functions when using a computer. Since the data transfer through the clipboard is not considered security at all, any program running in the operating system can use the data stored in the clipboard.
- the running applications can freely store the data in the clipboard 1 and extract and utilize the plain text. Can be.
- data stored in application 2 (5) can be extracted and pasted from document 2 (3) being edited in application 1 (4), and document 2 (3) being edited in application 1 (4).
- the data stored in the document 1 (2) can be extracted and pasted, and the data stored in the document 1 (2) can be extracted and pasted again in the document 1 (2).
- data on the clipboard can be freely transferred between any program that can use the data format, the information can be used not only for simple text, formatted text, pictures, but also for information having a specific format. It is possible to transfer between programs having a function.
- the transfer of information between programs by the clipboard must be an efficient way to properly utilize the multitasking capabilities of the operating system, but as the need for security of sensitive data increases, the need to protect data transferred between independent programs through the clipboard This has risen. For example, even if you manage a secure document and want to prevent the leakage of the document's contents, even if you introduce a feature that prevents you from making a copy of the document, you can not move the document to another storage location or send it externally.
- the contents of the security document can be transferred to the general document without restriction by using the clipboard, and leaked by someone who is not authorized by the contents stored in the clipboard. Therefore, there is a need to increase security by managing data transfer through the clipboard.
- applications that extend the clipboard to manage a plurality of temporary stored information e.g., Macintosh scrapbooks, Windows clipboard extension applications (Many Paste, multi-clipboard, clip tray, tray text) Etc.
- these applications mainly provide a function of storing a plurality of plain texts and selecting and utilizing desired ones, but do not provide a function related to security, and digital rights management (Digital).
- Digital digital rights Management
- the clipboard which is a basic function of the operating system, is a function that is frequently used for various computer-use tasks such as document work, picture work, program work, and presentation work. You need to be able to effectively control clipboard delivery for data that needs security in the state.
- the existing clipboard management means are configured to control the flow of information to prevent the transfer of information that requires security to an untrusted place, and in such a configuration, all information flow to the clipboard must be monitored. If any one of the information control fails, information leakage occurs and the reliability of the terminal having various situations is low. Therefore, there is an urgent need for a clipboard security method that guarantees free use of the clipboard, control reliability of the security content, and explicit reliability of information leakage prevention.
- an object of the present invention is to provide a clipboard for an object capable of copying and extracting data such as an application or a document requiring security. You can use the clipboard to pass data between trusted secured objects by encrypting the data passing contents of the data, so that data stored on the clipboard from the secured object cannot be transferred to the untrusted object or is encrypted. To provide a clipboard security system and method to prevent the leakage of security data.
- Another object of the embodiments of the present invention is to configure a clipboard management unit to encrypt the data provided from the trusted object to store in the clipboard, the clip to decrypt and provide the clipboard data required from the trusted object It is to provide a board security system and method.
- Another object of the embodiments of the present invention by using the DRM unit to determine the reliability and secure the secret key required for the encryption and decryption process of the clipboard use data between the trusted objects in the terminal to which the DRM unit for managing the security information as a secret key It is to provide a clipboard security system and method to enhance security and ease of application by doing so.
- Another object of the embodiments of the present invention is to monitor both the use of the clipboard of trusted objects and the use of the clipboard of untrusted objects, encrypts data that requires security, applies it to the clipboard, and decrypts the trusted object. It provides a clipboard security system and method that provides plain text and allows untrusted objects to be notified of the clipboard being empty instead of delivering encrypted data, thereby enabling control over clipboard usage and ensuring stability.
- Still another object of the embodiments of the present invention is to generate encryption-related information and anti-forgery information when secure data is encrypted to enable clipboard management through the corresponding information, thereby increasing safety and independence, and providing a clipboard management unit with API or hooking or the like. It provides a clipboard security system and method that can be implemented in various ways including coupling to increase security and stability.
- Another object of the embodiments of the present invention is to control the transfer of the information to only the object trusted by the security target object depending on whether the security target object is executed or exposed when storing the clipboard information through the screen capture.
- the present invention provides a clipboard security system and method for preventing data leakage.
- the clipboard management unit for storing data in the clipboard or extract data from the clipboard in response to the request of one or more objects.
- the clipboard management unit comprises: a data encryption unit for encrypting the data requested to be stored according to a trust relationship of an object for storing data in the clipboard and an object for extracting encrypted data stored in the clipboard And a data decryption unit for decrypting the encrypted data according to a trust relationship of the data.
- the clipboard security system for temporarily storing data and the storage and the clip of the data requested from the object located on the clipboard between the one or more objects and the clipboard Controls the extraction of data from the board and encrypts the data in response to the trust information provided from the object and stores the data in the clipboard or encrypted data stored in the clipboard in response to the trust information provided from the object.
- a clipboard management unit which decrypts and provides the object to the object.
- the clipboard security method for managing the use of the clipboard of one or more objects receiving first information including data from a first object, and the first information to the first information; Determining whether trust information corresponding to the first object is included, selectively performing an encryption operation on the received data according to the determination result, and storing the encrypted data on a clipboard. It is characterized by including.
- the clipboard security system and method according to the embodiment of the present invention encrypts data transmission contents of a clipboard targeting an object capable of copying and extracting data, such as an application or a document that requires security, and encrypts data between trusted security objects.
- the data can be transferred using the clipboard, but the data stored in the clipboard from the secure object cannot be transferred to an untrusted object or encrypted, so that the data can be effectively prevented from leaking through the clipboard. Work efficiency with the clipboard has an excellent effect that can be maintained.
- the clipboard security system and method configures a clipboard management unit to encrypt data provided from a trusted object, store the data in a clipboard, and decrypt and provide clipboard data required by a trusted object. By doing so, even if an untrusted object secures information in the clipboard, its contents cannot be checked, thereby increasing security.
- Clipboard security system and method to determine the reliability and obtain the secret key required for the encryption and decryption process of the clipboard use data between the trusted objects in the terminal to which the DRM unit for managing the information that requires security as a secret key; By using the DRM unit, the security and application convenience can be enhanced.
- Clipboard security system and method to generate encryption-related information and anti-forgery information when secure data encryption to enable the clipboard management through the information to increase the safety and independence, the clipboard management unit API or Implemented in various ways, including hooking or a combination thereof, has the effect of increasing security and stability.
- Clipboard security system and method controls the delivery of the information only to the object trusted by the security target object according to whether the security target object is executed or exposed when storing the clipboard information through the screen capture This can prevent data leakage due to screen capture.
- FIG. 1 is a conceptual diagram illustrating a general clipboard using method.
- FIG. 2 is a conceptual diagram illustrating a relationship between a clipboard and a use object.
- 3 and 4 is a configuration diagram illustrating the operation of the clipboard security system according to an embodiment of the present invention.
- 5, 6 is a configuration diagram illustrating the operation of the extended clipboard security system according to an embodiment of the present invention.
- FIG. 7 and 8 are diagrams illustrating the operation of the DRM unit linked clipboard security system according to an embodiment of the present invention.
- FIG. 9 is a configuration diagram illustrating the operation of the clipboard management unit division method according to an embodiment of the present invention.
- FIG. 10 is a conceptual diagram illustrating an operation method of a clipboard manager according to an exemplary embodiment of the present invention.
- FIG. 11 is a conceptual diagram illustrating an operation method of a clipboard manager according to an exemplary embodiment of the present invention.
- 12 and 13 are signal flow diagrams illustrating an operation process of a clipboard security system according to an embodiment of the present invention.
- FIG. 14 and 15 are flowcharts illustrating an operation process of a clipboard security system according to an embodiment of the present invention.
- an object refers to a storage space or an allocated space, or is used as a concept including data or commands.
- an object means an object of independent recognition or an object for practicing an operation. It is considered to mean an independent object that can carry data that can be stored on the clipboard or that can be extracted and pasted from the clipboard.
- object 1 (6) may store data in the clipboard 8
- object 2 (7) may extract and paste data stored in the clipboard.
- the objects 1 and 2 (6, 7) may be various targets such as an application program, a document, a sub window, and the like.
- Clipboards that store unspecified data from various objects and data are extracted from unspecified objects from various objects are also vulnerable to security as this convenience. Control is needed.
- FIG. 3 and 4 illustrate a concept of a clipboard security system according to an embodiment of the present invention.
- the access between the object 1 (11), the object 2 (12), and the clipboard 200 is controlled.
- the clipboard management unit 100 may be provided in the system.
- Managing access means that when the object 1 (11) and the object 2 (12) requests the storage of data in the clipboard 200 or the extraction of data from the clipboard 200, the storage / extraction of the data It may be meant to manage the operation.
- the object 1 (11) which is a trusted object requiring security
- the clipboard manager 100 encrypts the plain text data and stores the data in the clipboard 200, and the object 1 (11).
- object 1 (11) requests reliable extraction of data stored in the clipboard 200 by the object 2 (11)
- the clipboard manager 100 decrypts the encrypted and stored data.
- Object 3 (13) that is not trusted by Object 1 (11) may obtain the encrypted data by requesting extraction of encrypted data stored in the clipboard (200) in the same manner as above. Since it is encrypted, it cannot be used.
- the clipboard management unit 100 encrypts the plain text, decrypts the encrypted data, and converts the plain text into the plain text.
- the data actually stored on the clipboard is encrypted, an untrusted object will not be able to take advantage of the data stored in the clipboard even if it is obtained from the object that needs security. Therefore, no matter how the environment of the terminal is changed and how the system operation state is changed, since the data requiring security is stored in the clipboard in an encrypted state, it is possible to fundamentally block the possibility that the contents of the data are leaked.
- the object 1 (11) to trust the object 2 (12) means that the object 2 (12) can decrypt the encrypted data encrypting the data provided by the object 1 (11),
- the general trusted object is As an object using data that requires security, when storing data on the clipboard, it must be encrypted and stored.In the case of encrypted data, which is provided from a trust relationship object, it means that the plain text data can be obtained through decryption. do.
- Untrusted objects are objects that use data that does not require security.
- the trust object is information indicating that the trust object is a trust object in the clipboard management unit 100 or information that can identify trust (for example, a company unique number in the case of a company, a unique number of the corresponding group in a specific user group, etc.). ) Or the clipboard management unit 100 may check the information (for example, registered user information of the object (application)).
- FIG. 4 is a diagram illustrating an example of implementing the clipboard manager 100 illustrated in FIG. 3.
- various configurations for performing the functions of the clipboard manager 100 are blocked.
- the function of the clipboard manager 100 may also be implemented in software.
- codes for performing various function blocks shown in FIG. 4 are executed by a computer to perform the functions of the clipboard manager 100. The function can be performed.
- the clipboard managing unit 100 includes a storage request receiving unit 101 which receives a request for storing data from an object to a clipboard, and an extraction request receiving unit which requests to extract data stored in a clipboard from an object. 104).
- the clipboard management unit 100 receives trust information from the trust object, and trust information analyzer for analyzing the received trust information ( 102 may be further provided in the clipboard management unit 100.
- a data decryption unit 105 for decrypting the encrypted data extracted from the clipboard may be further provided in the clipboard management unit 100.
- the storage request receiver 101 receives a storage request S_Req and data from the object.
- the receiver further receives trust information T_info1 indicating this.
- the trust information T_info1 is transmitted to the trust information analyzer 102.
- the trust information analyzer 102 may preset and store trust information related to objects on which security is performed by the clipboard security system of the present invention. Accordingly, the trust information analyzer 102 analyzes the trust information T_info1 of the object provided from the store request receiver 101 to determine whether the object that generated the store request is a trust object and according to the determination result.
- the control signal CON1 is provided to the data encryption unit 103.
- the data encryption unit 103 performs an encryption operation on the data in response to the control signal CON1. For example, the trust information T_info1 is not provided to the trust information analyzing unit 102, or the trust information T_info1 provided to the trust information analyzing unit 102 does not correspond to an object to be secured by the system.
- the data encryption unit 103 may omit the encryption and the operation and store the plain text data as it is on the clipboard.
- the data is encrypted and the encrypted data EN_data is stored in the clipboard.
- data is provided from the storage request receiving unit 101 to the data encrypting unit 103, but the data may be directly provided to the data encrypting unit 103.
- the object different from the object may request data extraction from the clipboard.
- the extraction request receiving unit 104 extracts the request from the object requesting data extraction (E_Req) and the trust information (T_info2) of the object.
- the trust information T_info2 is not provided to the extraction request receiver 104.
- the trust information analyzer 102 receives trust information T_info2 of the object requesting data extraction, and analyzes the received trust information T_info2 to determine whether the object requesting data extraction is a trust object.
- the control signal CON2 according to the determination result may be provided to the data decoder 105.
- the data decryption unit 105 decrypts the encrypted data EN_data from the clipboard in response to the control signal CON2, and provides the plain text data as an object as a result of the decryption operation.
- 5 and 6 illustrate a case in which the clipboard management unit 110 processes the data as if there is no data in the clipboard when the untrusted object extracts encrypted data from the clipboard in order to increase user convenience and increase system operating stability. .
- the encrypted string When encrypted data is extracted and copied to an untrusted object as shown in FIGS. 3 and 4, the encrypted string may be pasted or a data format error may appear, and other unexpected symptoms may occur, resulting in low stability.
- the user may experience inconvenience such as deleting wrongly pasted information or resolving errors.
- the encrypted data is to be extracted from the clipboard 200. If the encrypted data is to be provided to the object 3 (23) which is an untrusted object, the clipboard management unit 110 provides the object 3 (23) with information indicating that the clipboard is empty instead of providing the encrypted data.
- a separate management unit may be further configured, or a clipboard management unit managing a trust object and a clipboard management unit managing an untrusted object may be separately configured.
- FIG. 6 is a diagram illustrating an example of implementing the clipboard manager 100 illustrated in FIG. 5. Detailed description of the same configuration as in FIG. 4 described above among the components illustrated in FIG. 6 will be omitted.
- the clipboard manager 110 includes a storage request receiver 111, a trust information analyzer 112, a data encryptor 113, an extraction request receiver 114, and a data decryptor 115. Etc. can be provided.
- a storage request receiver 111 a trust information analyzer 112
- a data encryptor 113 a data encryptor 113
- an extraction request receiver 114 a data decryptor 115. Etc. can be provided.
- Etc. can be provided.
- an object requests extraction of data stored in the clipboard
- an untrusted object requests extraction of encrypted data stored in the clipboard
- information for generating information indicating that the clipboard is empty is generated.
- the unit 116 may be further provided in the clipboard manager 110.
- the extraction request receiver 114 receives an extraction request of data stored in a clipboard from an object.
- the trust information T_info2 of the object is provided to the extraction request receiver 114 in addition to the extraction request E_Req.
- the untrusted object requests the extraction of data
- trust information is not provided to the extraction request receiver 114, or untrusted trust information is provided to the extraction request receiver 114.
- the trust information analyzing unit 112 analyzes whether trust information is provided from the object requesting the extraction of data, or analyzes whether the trust information provided from the object requesting the extraction of the data is an appropriate object as a security target, and provides a control signal accordingly. Occurs.
- the control signal CON2 is generated to activate the data decryption unit 115.
- the control signal CON2 is generated to activate the information generator 116. Accordingly, the information BLK_info indicating that the clipboard is empty is displayed. To be provided as a trust object.
- FIG. 7 and 8 are conceptual views illustrating a detailed operation process when the above-described clipboard security system is applied to, interlocked with, or employs a DRM means.
- the DRM unit 300 may be configured in a terminal or a remote server connected to a network.
- the DRM unit 300 may be configured to manage a known key (an encryption and decryption key such as a symmetric key, a secret key, a public key) and trust information.
- a known key an encryption and decryption key such as a symmetric key, a secret key, a public key
- the security of management is established, and if it is utilized or interlocked, the security can be extremely increased.
- the functions provided in the present embodiment by the illustrated DRM unit 300 may be embedded in the clipboard manager 120 to configure a clipboard security system.
- the clipboard manager 120 corresponds to the trust object 1 31.
- the object 1 31 information representing trust relationship, for example, a kind of trust identifier such as company-specific information in the case of a company
- the information related to encryption is generated while encrypting the received data.
- the encrypted data is stored in the clipboard 200 together. In this case, information that should not be exposed among the information related to encryption is encrypted and included in the encrypted data.
- the clipboard manager 120 obtains the encrypted data and related encryption information from the clipboard 200 and the object 2 32. After confirming the trust relationship based on the trust information obtained from the data, the encrypted data is decrypted and the plain text data is provided to the object 2 (32).
- the trust management between the encrypted information and the object may be performed by the clipboard manager 120 itself.
- a DRM unit 300 having excellent security functions exists to control security information.
- the trust or trust relationship between objects is checked through the DRM unit 300, and as a result, a secret key (or a specific encryption / decryption-related key or information). Can be obtained.
- the illustrated clipboard management unit 120 obtains the trust information from the object 1 (31) and provides it to the DRM unit 300, and the DRM unit 300 analyzes the trust information and the secret key according to the analysis result. Provided to the clipboard management unit 120.
- the clipboard manager 120 encrypts the data using the provided secret key and stores the data in the clipboard 200.
- the clipboard management unit 120 obtains the trust information from the object 2 (32) and provides it to the DRM unit 300, the DRM unit 300 analyzes the trust information and the clipboard secret key according to the analysis result Provided to the management unit 120.
- the clipboard manager 120 may decrypt the encrypted data stored in the clipboard 200 using the provided secret key.
- an encryption identifier for indicating whether the data is encrypted in plain text
- trust identification information indicating the reliability of the object as additional information necessary for confirming a trust relationship
- a corresponding information may include an authentication code to prevent forgery or tampering of the encrypted information.
- information except for the encryption identifier should not be exposed and thus may be encrypted in the same or different manner as the data to be encrypted and included in the encrypted data.
- a key value is required.
- the key value may use unique information of the terminal, such as a MAC address of a network card included in the terminal, a serial number of an applied central processing unit, or a secret key obtained from the DRM unit. This ensures that encrypted data obtained from the clipboard matches the value originally stored on the clipboard.
- the security-required data stored in the clipboard is safe even if it is leaked, thereby reducing the burden of flow management, maintaining the reliability of security, and having a plurality of clipboard managers or problems in the clipboard manager. Even if a situation such as re-execution occurs, the encryption information stored in the clipboard can be decrypted so that the stability of the clipboard security system can be maintained at all times.
- the clipboard manager 120 may include a storage request receiver 121, a data encryptor 124, an extraction request receiver 125, and a data decryptor 126.
- the clipboard manager 120 may store trust information of an object. Provided to the DRM unit 300, and also receives an encryption and decryption key for encrypting / decrypting data from the DRM unit (300).
- the clipboard manager 120 may further include a trust information transmitter 122 and an encryption / decryption key receiver 123.
- the trust information transmitter 122 receives trust information T_info1 and T_info2 provided from an object requesting data storage or data extraction, and transfers the trust information to the DRM unit.
- the DRM unit analyzes the trust information T_info1 and T_info2 to determine whether the object requesting data storage or data extraction is a trust object. If the object is determined to be a trusted object according to the determination result, the encryption / decryption keys (Key_E, Key_D) are provided to the clipboard manager 120.
- the encryption / decryption key receiving unit 123 provides the provided encryption / decryption keys Key_E and Key_D to the data encryption unit 124 and the data decryption unit 126.
- an encryption identifier, trust identification information, and forgery prevention authentication code may be further generated. Since the trust identification information and the tamper proof authentication code need not be exposed to the untrusted object, the operation of generating the encrypted trust identification information and the tamper proof authentication code is performed by the encryption / decryption key receiving unit 123. It may be performed using (Key_E, Key_D).
- the data encryption unit 124 shown in FIG. 8 may generate the above information, or a separate encryption information generator (not shown) for generating the above information may be further provided in the system.
- FIG. 9 is a diagram illustrating a case where a clipboard management unit is divided according to its functions.
- the clipboard management unit transmits encrypted data between trusted objects and prevents clipboard contents encrypted by an untrusted object from being transferred.
- the clipboard auxiliary management unit 135 performs a function of preventing the clipboard contents encrypted as an untrusted object from being separated from the clipboard management unit 130 which performs encryption and decryption. will be.
- the function of encrypting plain text data provided by the trust object 41 and storing the encrypted text in the clipboard 200 and decrypting the encrypted data in the trust object as a plain text is to be dedicated to the clipboard manager 130. do.
- the clipboard data flow for the trusted object is processed by the clipboard manager 130.
- the clipboard manager 130 encrypts the plain text data provided from the trusted object 41 to generate encrypted data, and stores the encrypted data in the clipboard 200.
- the encrypted data is extracted from the clipboard 200 and a decryption operation is performed to provide the plain text data to the trusted object 41.
- the clipboard auxiliary management unit 135 manages the storage / extraction request of the data from the untrusted object, the clipboard auxiliary management unit 135 directly stores the plain text data provided from the untrusted object on the clipboard 200.
- the data stored in the clipboard is provided to the untrusted object as it is (that is, the plain text data is bypassed).
- the clipboard assistant managing unit 135 determines whether the data extracted from the clipboard is encrypted data, and the determining operation detects whether a plain text encryption identifier exists in the data stored in the clipboard. Can be performed. If the data stored in the clipboard 200 requested to be extracted is encrypted data, the clipboard assistant managing unit 135 transmits the information indicating that the clipboard is empty to the untrusted object 42.
- the clipboard manager 130 and the clipboard assistant manager 135 are functionally separated, but may be substantially divided as a single module according to an operation mode.
- FIGS. 10 and 11 are views for explaining the configuration and installation method of the clipboard management unit for managing the data transfer contents between the object and the clipboard, the clipboard management unit, Figure 10 is for loading or executing the clipboard management unit By downloading or copying a program that installs the clipboard management unit separately and installing it on the terminal, the clipboard management unit is loaded for each application program that is an operation unit of an object to manage data transmission with the clipboard. Programming Interface).
- the clipboard management program 400 calls the clipboard management unit 141, and when the data storage for the clipboard 200 is required, the clipboard management unit 141 To store the encrypted data in the clipboard (200).
- the clipboard management program 400 calls the clipboard management unit 142, and extracts the encrypted data stored in the clipboard 200 If desired, the clipboard manager 142 decrypts the data and transmits the data to the application program 52.
- each clipboard management unit is configured and operated for each object (particularly, for each application) that requires security maintenance through trust relationship confirmation.
- a hooking method for monitoring all objects without modification of the application program can be used, which can operate in the manner shown in FIG.
- the clipboard management program 410 When the clipboard management program 410 is separately installed and executed as shown, it injects the monitoring modules 411 and 412 for each object (mainly an application program) 61 and 62 to be executed thereafter.
- the monitoring modules 411 and 412 are injected into each application program in the form of a DLL, and the monitoring modules 411 and 412 load the clipboard managers 151 and 152 respectively to perform data encryption and decryption.
- the monitoring module 411, 412 loads a clipboard management unit that performs encryption and decryption on a trusted object according to whether the injected objects are trusted (that is, whether security is required), and on an untrusted object.
- Load the clipboard assistant management unit which notifies that the encrypted clipboard contents are empty.
- the clipboard management unit may be loaded even in the case of the untrusted object, and the clipboard management unit may perform a function of notifying that the encrypted clipboard contents are empty.
- a predetermined object may call a clipboard management unit explicitly implemented by an API, and another object may call a clipboard management unit implemented by a hooking method.
- FIG. 12 and 13 are signal flow diagrams illustrating an operation process of a clipboard security system configuration using the DRM unit illustrated in FIG. 7.
- a corresponding function is replaced by a clipboard management unit. Can be performed.
- FIG. 12 illustrates an operation process of the clipboard manager 160 that receives data from the trust object 70, encrypts the data, and stores the encrypted data in the clipboard 200.
- the clipboard manager 160 obtains data to be stored and trust information of the corresponding trust object 70.
- the trust information may be explicitly provided by the trust object 70 or extracted by the clipboard manager 160 from the trust object.
- the clipboard manager 160 obtains the trust information and transfers it to the DRM unit 300 to obtain a key corresponding to the trust information. If the DRM unit 300 is not used, the clipboard manager 160 internally corresponds to the trust information.
- the key may be provided.
- the encryption information includes an encryption identifier inserted into the plain text so that it can be encrypted, an authentication code for preventing forgery, and trust information for verifying a trust relationship, and the authentication code and the trust information use the key or use a separate key.
- the encrypted data is included in the encrypted data and stored in the clipboard 200.
- the encryption identifier may be inserted in the clear text at the front of the encrypted data in order to quickly confirm whether the encryption.
- the clipboard management unit 160 that performs encryption is no longer needed, and when another clipboard management unit checks the contents of the clipboard, it can secure independence capable of appropriate decryption.
- FIG. 13 illustrates a process of extracting data from the clipboard 200 storing encryption information. Although shown in FIG. 13, an example using the DRM unit 300 is illustrated, but a function of the configuration is provided to the clipboard manager 170. May be included.
- the clipboard manager 170 checks this and obtains trust information from the trust object 80.
- the clipboard manager 170 requests data extraction from the clipboard 200 to receive encrypted information.
- the clipboard management unit 170 checks the received encryption information to confirm that the information received through the plain text encryption identifier is encrypted, and the received encryption information by using the forgery prevention authentication code is the original stored value of the clipboard. Check if it matches.
- trust identification information is checked.
- the trust relationship between the trust objects is determined using the trust information obtained from the trust object 80 and the trust information extracted from the encrypted data (trust identification information). Check it. That is, the trust information may be the same, or may be different, and in the case of different trust information, one or both trust relationships or untrust relationships may be identified.
- the trust information obtained from the trust object 80 is provided to the DRM unit 300 to correspond to the corresponding key. Will be obtained.
- the operation may be performed by the clipboard manager 170.
- the clipboard manager 170 decrypts the encrypted data using the key obtained through the DRM unit 300, and then transfers the plain text data to the trusted object 80.
- the clipboard management unit when the clipboard management unit receives a data extraction request signal from an untrusted object, the trust relationship with the trust information extracted from the encrypted data is untrusted even if the trust information is not obtained or the trust information is obtained. Therefore, it operates by transmitting a signal indicating that there is no data in the clipboard to the untrusted object without decrypting the encrypted data. Of course, this operation may be performed in the clipboard assistant managing unit.
- FIG. 14 and 15 are flowcharts illustrating an operation process of a clipboard security system.
- FIG. 14 is a diagram illustrating a process of encrypting data and storing the data in a clipboard.
- FIG. 15 is a diagram illustrating decrypting and extracting data stored in a clipboard. The process is shown.
- the user first starts the process of manually installing the clipboard management program or automatically installing and executing the clipboard management program.
- the clipboard manager is loaded in an explicit or hooking manner to monitor the application's operation.
- the clipboard manager detects this to determine whether the application is trusted, and in the case of a trust object, encrypts the data and generates relevant encryption information and stores them together in the clipboard. do. If it is an untrusted object, the plain text data is stored in the clipboard as it is.
- the clipboard management unit when the clipboard management unit is loaded as shown, when an object requests to extract data from the clipboard, the clipboard management unit receives the clipboard data and checks whether the data is encrypted through the plain text encryption identifier. do. If it is not encrypted, it is passed on to the requested object.
- the clipboard data is encrypted, verify that it is unmodified by checking the tamper-proof authentication code, and if so, verify that the trust relationship between the trust information of the object requesting data extraction and the trust information included in the encrypted data is trust. If there is a trust relationship, the encrypted data is decrypted into plain text data and the data is transmitted to the requesting object.
- the information indicating that there is no data on the clipboard is extracted. Pass to the requested object.
- the above description describes a process in which data is stored in a clipboard from an actual object, so that data of an object requiring security is not leaked into plain text so as to increase security reliability.
- the screen capture can basically block the operation of the professional screen capture program when a trusted object that requires security is running or exposed to the screen.
- the basic screen capture using the 'Print Screen' key is a function frequently used in document work, simply blocking it may be a factor to reduce work efficiency.
- the capture data is encrypted and stored by considering the trust object requesting to save the data in consideration of whether the trust object is executed or whether the screen is exposed. It can be decrypted and delivered only so that the screen capture function can be used and data of an object requiring security can be prevented from being leaked.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (26)
- 하나 이상의 객체의 요청에 응답하여 클립보드에 데이터를 저장하거나 상기 클립보드로부터 데이터를 추출하는 클립보드 관리부를 구비하며,상기 클립보드 관리부는,상기 클립보드에 데이터를 저장하고자 하는 객체의 신뢰관계에 따라 상기 저장이 요청되는 데이터를 암호화하는 데이터 암호화부; 및상기 클립보드에 저장된 암호화된 데이터를 추출하고자 하는 객체의 신뢰관계에 따라 상기 암호화된 데이터를 복호화하는 데이터 복호화부를 구비하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서,상기 하나 이상의 객체는, 보안이 요구되는 신뢰 객체와 보안이 요구되지 않는 비신뢰 객체를 포함하며,상기 신뢰 객체가 상기 클립보드에 상기 데이터의 저장이나 추출을 요청하는 경우, 상기 클립보드 관리부는 상기 신뢰 객체로부터 상기 신뢰관계를 나타내는 신뢰 정보를 수신하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제2항에 있어서, 상기 클립보드 관리부는,상기 신뢰 객체로부터 상기 신뢰 정보를 수신하고, 상기 신뢰 정보를 분석하여 상기 데이터 암호화부 및 상기 데이터 복호화부 중 적어도 하나를 제어하는 신뢰정보 분석부를 더 구비하는 특징으로 하는 클립보드 보안 시스템.
- 제3항에 있어서, 상기 클립보드 관리부는,상기 암호화된 데이터를 추출하고자 하는 객체가 비신뢰 객체인 경우, 상기 클립보드가 비었음을 나타내는 정보를 상기 비신뢰 객체로 제공하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서,상기 클립보드 관리부로부터 상기 신뢰관계를 나타내는 신뢰 정보를 전달받으며, 상기 신뢰 정보를 분석한 결과에 따라 데이터 암복호화 키를 상기 클립보드 관리부로 제공하는 DRM(Digital Rights Management)부를 더 구비하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서,외부의 DRM(Digital Rights Management) 시스템과 통신하며, 상기 클립보드 관리부로부터 상기 신뢰관계를 나타내는 신뢰 정보를 상기 외부의 DRM 시스템으로 제공하고, 상기 외부의 DRM 시스템으로부터 데이터 암복호화 키를 수신하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서, 상기 클립보드 관리부는,상기 객체의 실행에 따라 동작하는 API(Application Programming Interface) 방식 및 모든 종류의 객체 실행을 감시하는 후킹(hooking) 방식 중 어느 하나의 방식으로 동작하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서, 상기 클립보드 관리부는,상기 암호화된 데이터의 위조 또는 변조를 방지하기 위한 위변조 방지 인증 코드를 더 발생하여 상기 클립보드에 저장하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제8항에 있어서, 상기 클립보드 관리부는,상기 암호화된 데이터 복호화 전에 상기 위변조 방지 인증 코드를 이용하여 상기 암호화된 데이터의 위변조 여부를 확인하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제8항에 있어서, 상기 클립보드 관리부는,상기 데이터의 암호화 여부를 확인할 수 있는 평문 암호화 식별자와, 상기 신뢰관계를 나타내는 신뢰 정보를 암호화한 정보를 더 발생하여 상기 클립보드에 저장하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서, 상기 클립보드 관리부는,화면 캡처 동작이 수행되는 경우, 상기 화면 캡처 동작이 신뢰 객체의 실행 또는 상기 신뢰 객체가 노출되는 중에 수행되었는지를 판단하고, 그 판단 결과에 따라 캡처 화면을 암호화하여 상기 클립보드에 저장하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제1항에 있어서,상기 하나 이상의 객체는 보안이 요구되는 신뢰 객체와 보안이 요구되지 않는 비신뢰 객체를 포함하고, 상기 클립보드 관리부는 상기 신뢰 객체와 상기 클립보드 사이의 억세스를 관리하며,상기 클립보드 보안 시스템은, 상기 비신뢰 객체와 상기 클립보드 사이의 억세스를 관리하기 위한 클립보드 보조 관리부를 더 구비하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제12항에 있어서,상기 클립보드 보조 관리부는,상기 클립보드로부터 추출된 데이터가 암호와된 데이터인 경우에는 클립보드가 비어있음을 나타내는 정보를 상기 비신뢰 객체로 제공하며,상기 클립보드로부터 추출된 데이터가 평문인 경우에는 상기 평문 데이터를 상기 비신뢰 객체로 제공하는 것을 특징으로 하는 클립보드 보안 시스템.
- 데이터를 임시 저장하는 클립보드; 및상기 하나 이상의 객체와 상기 클립보드 사이에 위치하여 상기 객체로부터 요청되는 데이터의 클립보드에의 저장 및 클립보드로부터의 데이터의 추출을 제어하며, 상기 객체로부터 제공되는 신뢰 정보에 응답하여 상기 데이터를 암호화하여 상기 클립보드에 저장하거나, 상기 객체로부터 제공되는 신뢰 정보에 응답하여 상기 클립보드에 저장된 암호화된 데이터를 복호화하여 상기 객체로 제공하는 클립보드 관리부를 구비하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제14항에 있어서,상기 하나 이상의 객체는 보안이 요구되는 신뢰 객체와 보안이 요구되지 않는 비신뢰 객체를 포함하고,상기 클립보드 관리부는,상기 신뢰 객체로부터 데이터의 저장 또는 추출이 요청되는 경우, 상기 신뢰 객체로부터 제공되는 상기 신뢰 정보에 응답하여 데이터를 암호화하거나 암호화된 데이터를 복호화하며,상기 비신뢰 객체로부터 암호화된 데이터의 추출이 요청되는 경우, 상기 클립보드가 비었음을 나타내는 정보를 상기 비신뢰 객체로 제공하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제14항에 있어서,상기 하나 이상의 객체는 보안이 요구되는 신뢰 객체와 보안이 요구되지 않는 비신뢰 객체를 포함하고, 상기 클립보드 관리부는, 상기 신뢰 객체로부터 데이터의 저장 또는 추출을 요청받으며, 상기 신뢰 객체로부터 제공되는 상기 신뢰 정보에 응답하여 데이터를 암호화하거나 암호화된 데이터를 복호화하며,상기 클립보드 보안 시스템은, 상기 비신뢰 객체로부터 암호화된 데이터의 추출이 요청되는 경우, 상기 클립보드가 비었음을 나타내는 정보를 상기 비신뢰 객체로 제공하는 클립보드 보조 관리부를 더 구비하는 것을 특징으로 하는 클립보드 보안 시스템.
- 제14항에 있어서,상기 데이터를 암호화, 복호화 하기 위한 암복호화 키를 저장하며, 상기 클립보드 관리부로부터 상기 신뢰 객체의 신뢰 정보를 전달받으며, 상기 전달된 신뢰 정보에 따라 상기 암복호화 키를 상기 클립보드 관리부로 제공하는 DRM(Digital Rights Management)부를 더 포함하는 것을 특징으로 하는 클립보드 보안 시스템.
- 하나 이상의 객체의 클립보드 이용을 관리하는 클립보드 보안 방법에 있어서,제1 객체로부터 데이터를 포함하는 제1 정보를 수신하는 단계;상기 제1 정보에 상기 제1 객체에 대응하는 신뢰 정보가 포함되어 있는지를 판단하는 단계;상기 판단 결과에 따라, 상기 수신된 데이터에 대해 선택적으로 암호화 동작을 수행하는 단계; 및상기 암호화된 데이터를 클립보드에 저장하는 단계를 구비하는 것을 특징으로 하는 클립보드 보안 방법.
- 제18항에 있어서,제2 객체로부터 데이터 추출 요청 정보를 포함하는 제2 정보를 수신하는 단계;상기 제2 정보에 상기 제2 객체에 대응하는 신뢰 정보가 포함되어 있는지를 판단하는 단계;상기 판단 결과 상기 제2 객체에 대응하는 신뢰 정보가 포함되어 있는 경우, 상기 클립보드에 저장된 상기 암호화된 데이터를 복호화하는 단계; 및상기 복호화된 데이터를 상기 제2 객체에 제공하는 단계를 더 구비하는 것을 특징으로 하는 클립보드 보안 방법.
- 제19항에 있어서,상기 판단 결과 상기 제2 객체에 대응하는 신뢰 정보가 포함되어 있지 않으며, 상기 제2 객체가 상기 클립보드에 저장된 평문 데이터의 추출을 요청한 경우, 상기 클립보드에 저장된 평문 데이터를 상기 제2 객체로 제공하는 것을 특징으로 하는 클립보드 보안 방법.
- 제19항에 있어서,상기 판단 결과 상기 제2 객체에 대응하는 신뢰 정보가 포함되어 있지 않은 경우, 상기 클립보드가 비었음을 나타내는 정보를 상기 제2 객체로 제공하는 단계를 더 구비하는 것을 특징으로 하는 클립보드 보안 방법.
- 제19항에 있어서,상기 수신된 제1 정보 또는 제2 정보에 포함되는 신뢰 정보를 DRM 시스템에 전달하는 단계; 및상기 신뢰 정보를 판단한 결과에 따라, 상기 DRM 시스템에 저장된 보안용 키를 암호화/복호화 수단으로 제공하는 단계;를 더 구비하고,상기 데이터에 대한 암호화/복호화 동작은, 상기 DRM 시스템으로부테 제공된 상기 보안용 키를 이용하여 수행되는 것을 특징으로 하는 클립보드 보안 방법.
- 제19항에 있어서,상기 암호화 동작을 수행하는 단계는, 상기 암호화된 데이터에 대해 위변조 발생을 방지하기 위한 위변조 방지 인증 코드를 발생하는 단계를 더 포함하며,상기 복호화 동작을 수행하는 단계는, 상기 위변조 방지 인증 코드를 참조하여 상기 클립보드로부터 추출된 암호화된 데이터가 원래 저장된 값과 일치하는지를 판단하는 단계를 더 포함하는 것을 특징으로 하는 클립보드 보안 방법.
- 제19항에 있어서,상기 암호화 동작을 수행하는 단계는, 상기 데이터의 암호화 여부를 나타내는 평문 암호화 식별자를 더 생성하는 단계를 더 포함하며,상기 복호화 동작을 수행하는 단계는, 상기 평문 암호화 식별자를 참조하여 상기 복호화 동작을 수행하는 것을 특징으로 하는 클립보드 보안 방법.
- 제19항에 있어서,상기 클립보드에 저장 요청되는 데이터가 캡처 화면인 경우, 상기 캡처 화면이 보안이 요구되는 신뢰 객체의 실행 또는 상기 신뢰 객체가 노출되는 중에 수행되었는지를 판단하는 단계를 더 구비하고,상기 판단 결과에 따라 상기 캡처 화면을 암호화하여 상기 클립보드에 저장하는 것을 특징으로 하는 클립보드 보안 방법.
- 제1항에 기재된 클립보드 관리부의 암호화 및 복호화 기능이 수행되도록 하는 프로그램을 저장한 컴퓨터로 판독 가능한 저장매체.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP10736069.5A EP2393033B1 (en) | 2009-02-02 | 2010-02-02 | System and method for clipboard security |
US13/147,287 US9147050B2 (en) | 2009-02-02 | 2010-02-02 | System and method for clipboard security |
JP2011547810A JP2012517047A (ja) | 2009-02-02 | 2010-02-02 | クリップボード保安システム及び方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2009-0007885 | 2009-02-02 | ||
KR1020090007885A KR100928467B1 (ko) | 2009-02-02 | 2009-02-02 | 클립보드 보안 시스템 및 방법 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010087678A2 true WO2010087678A2 (ko) | 2010-08-05 |
WO2010087678A3 WO2010087678A3 (ko) | 2010-11-04 |
Family
ID=41605422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2010/000621 WO2010087678A2 (ko) | 2009-02-02 | 2010-02-02 | 클립보드 보안 시스템 및 방법 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9147050B2 (ko) |
EP (1) | EP2393033B1 (ko) |
JP (1) | JP2012517047A (ko) |
KR (1) | KR100928467B1 (ko) |
WO (1) | WO2010087678A2 (ko) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012203802A (ja) * | 2011-03-28 | 2012-10-22 | Kddi Corp | コンテンツ編集装置、コンテンツ編集方法及びコンテンツ編集プログラム |
JP2013539109A (ja) * | 2010-08-20 | 2013-10-17 | ファスドットコム カンパニー リミテッド | Drm環境におけるクリップボード保護システム及びその方法をコンピュータで実行させるためのプログラムを記録した記録媒体 |
WO2013177424A1 (en) * | 2012-05-25 | 2013-11-28 | Robert Hansen | Electronic clipboard protection |
US9305174B2 (en) | 2013-04-09 | 2016-04-05 | Robert Hansen | Electronic clipboard protection |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9282081B2 (en) | 2005-07-28 | 2016-03-08 | Vaporstream Incorporated | Reduced traceability electronic message system and method |
US7610345B2 (en) * | 2005-07-28 | 2009-10-27 | Vaporstream Incorporated | Reduced traceability electronic message system and method |
US8874935B2 (en) | 2011-08-30 | 2014-10-28 | Microsoft Corporation | Sector map-based rapid data encryption policy compliance |
US9928350B2 (en) * | 2012-02-17 | 2018-03-27 | Irdeto B.V. | Digital rights management |
US8972750B2 (en) * | 2012-12-19 | 2015-03-03 | Adobe Systems Incorporated | Method and apparatus for securing transfer of secure content to a destination |
US9866382B2 (en) * | 2012-12-21 | 2018-01-09 | Mobile Iron, Inc. | Secure app-to-app communication |
US9059974B2 (en) | 2012-12-21 | 2015-06-16 | Mobile Iron, Inc. | Secure mobile app connection bus |
EP2943878B1 (en) | 2013-01-08 | 2018-09-19 | BlackBerry Limited | Clipboard management |
US20140344570A1 (en) | 2013-05-20 | 2014-11-20 | Microsoft Corporation | Data Protection For Organizations On Computing Devices |
GB201321768D0 (en) | 2013-12-10 | 2014-01-22 | Ibm | Desktop redaction and masking |
US10615967B2 (en) | 2014-03-20 | 2020-04-07 | Microsoft Technology Licensing, Llc | Rapid data protection for storage devices |
US9825945B2 (en) * | 2014-09-09 | 2017-11-21 | Microsoft Technology Licensing, Llc | Preserving data protection with policy |
US9853812B2 (en) | 2014-09-17 | 2017-12-26 | Microsoft Technology Licensing, Llc | Secure key management for roaming protected content |
US9900295B2 (en) | 2014-11-05 | 2018-02-20 | Microsoft Technology Licensing, Llc | Roaming content wipe actions across devices |
US9853820B2 (en) | 2015-06-30 | 2017-12-26 | Microsoft Technology Licensing, Llc | Intelligent deletion of revoked data |
US9900325B2 (en) | 2015-10-09 | 2018-02-20 | Microsoft Technology Licensing, Llc | Passive encryption of organization data |
DE16774544T1 (de) * | 2016-07-29 | 2019-12-24 | Permanent Privacy Ltd. | Anwendungen in zusammenhang mit sicheren verschlüsselung |
KR101893950B1 (ko) * | 2018-02-06 | 2018-08-31 | 주식회사 이스트시큐리티 | 랜부팅 환경 기반 파일 보안 및 중앙화를 위한 장치, 이를 위한 방법 및 이 방법을 수행하기 위한 프로그램이 기록된 컴퓨터 판독 가능한 기록매체 |
WO2020013354A1 (ko) * | 2018-07-10 | 2020-01-16 | 엘지전자 주식회사 | 차량용 방화벽의 동작 방법 |
CN111539010B (zh) * | 2020-06-16 | 2023-09-01 | 北京明朝万达科技股份有限公司 | 剪贴板控制方法、装置、电子设备及计算机可读存储介质 |
US11768955B2 (en) * | 2020-12-15 | 2023-09-26 | Citrix Systems, Inc. | Mitigating insecure digital storage of sensitive information |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11249965A (ja) | 1998-02-27 | 1999-09-17 | Toshiba Corp | コンピュータシステム及び同システムに適用するコピー制限方法 |
KR100521338B1 (ko) * | 1998-08-21 | 2005-12-21 | 삼성전자주식회사 | 멀티-클립보드 기능을 위한 복수 개의 핫키를 갖는 컴퓨터 시스템 및 동작 방법 |
KR100390086B1 (ko) * | 2000-07-03 | 2003-07-04 | 사파소프트 주식회사 | 통합 내부정보 유출 방지 시스템 |
US7950066B1 (en) * | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
JP2005148913A (ja) * | 2003-11-12 | 2005-06-09 | Hitachi Ltd | ファイル監視装置 |
JP4350549B2 (ja) * | 2004-02-25 | 2009-10-21 | 富士通株式会社 | デジタル著作権管理のための情報処理装置 |
JP2006155155A (ja) * | 2004-11-29 | 2006-06-15 | Fujitsu Ltd | 情報漏洩防止装置、方法およびそのプログラム |
US20070011469A1 (en) | 2005-07-11 | 2007-01-11 | Simdesk Technologies | Secure local storage of files |
US20070016771A1 (en) * | 2005-07-11 | 2007-01-18 | Simdesk Technologies, Inc. | Maintaining security for file copy operations |
US20070011749A1 (en) | 2005-07-11 | 2007-01-11 | Simdesk Technologies | Secure clipboard function |
JP4208085B2 (ja) * | 2005-08-30 | 2009-01-14 | インターナショナル・ビジネス・マシーンズ・コーポレーション | アプリケーションプログラムの制御方法およびその装置 |
US7725737B2 (en) * | 2005-10-14 | 2010-05-25 | Check Point Software Technologies, Inc. | System and methodology providing secure workspace environment |
TWI405094B (zh) * | 2005-11-28 | 2013-08-11 | Ibm | 防止未授權獲取資訊之系統及其方法 |
US8813414B2 (en) * | 2006-03-01 | 2014-08-26 | J. R. Jones Company | Safety gaff |
CN101114319A (zh) * | 2006-07-28 | 2008-01-30 | 上海山丽信息安全有限公司 | 剪切板信息保护装置和方法 |
JP2008217449A (ja) * | 2007-03-05 | 2008-09-18 | Toshiba Corp | 遠隔制御装置、遠隔制御方法、及び遠隔制御プログラム |
JP2008226196A (ja) * | 2007-03-16 | 2008-09-25 | Hitachi Software Eng Co Ltd | 情報漏洩防止装置 |
JP5047664B2 (ja) * | 2007-03-29 | 2012-10-10 | 株式会社エヌ・ティ・ティ・データ | 電子文書管理装置、コンピュータプログラム、及び電子文書管理方法 |
JP5181139B2 (ja) * | 2008-06-30 | 2013-04-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | コンピュータプログラム、共有オブジェクト制御装置及び共有オブジェクト制御方法 |
JP5040859B2 (ja) * | 2008-08-28 | 2012-10-03 | 富士通株式会社 | 情報漏洩防止プログラムおよび情報漏洩防止方法 |
-
2009
- 2009-02-02 KR KR1020090007885A patent/KR100928467B1/ko active IP Right Grant
-
2010
- 2010-02-02 JP JP2011547810A patent/JP2012517047A/ja active Pending
- 2010-02-02 EP EP10736069.5A patent/EP2393033B1/en active Active
- 2010-02-02 US US13/147,287 patent/US9147050B2/en active Active
- 2010-02-02 WO PCT/KR2010/000621 patent/WO2010087678A2/ko active Application Filing
Non-Patent Citations (2)
Title |
---|
None |
See also references of EP2393033A4 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013539109A (ja) * | 2010-08-20 | 2013-10-17 | ファスドットコム カンパニー リミテッド | Drm環境におけるクリップボード保護システム及びその方法をコンピュータで実行させるためのプログラムを記録した記録媒体 |
EP2608100A4 (en) * | 2010-08-20 | 2017-06-07 | Fasoo. Com Co., Ltd | Clipboard protection system in drm environment and recording medium in which program for executing method in computer is recorded |
JP2012203802A (ja) * | 2011-03-28 | 2012-10-22 | Kddi Corp | コンテンツ編集装置、コンテンツ編集方法及びコンテンツ編集プログラム |
WO2013177424A1 (en) * | 2012-05-25 | 2013-11-28 | Robert Hansen | Electronic clipboard protection |
US9305174B2 (en) | 2013-04-09 | 2016-04-05 | Robert Hansen | Electronic clipboard protection |
Also Published As
Publication number | Publication date |
---|---|
WO2010087678A3 (ko) | 2010-11-04 |
US20120226913A1 (en) | 2012-09-06 |
EP2393033B1 (en) | 2017-06-28 |
EP2393033A4 (en) | 2012-07-04 |
KR100928467B1 (ko) | 2009-11-25 |
JP2012517047A (ja) | 2012-07-26 |
EP2393033A2 (en) | 2011-12-07 |
US9147050B2 (en) | 2015-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010087678A2 (ko) | 클립보드 보안 시스템 및 방법 | |
US8601280B2 (en) | Application executing apparatus and application execution method | |
WO2014119936A1 (en) | Method of and apparatus for processing software using hash function to secure software, and computer-readable medium storing executable instructions for performing the method | |
WO2018062761A1 (ko) | 보안 기능이 강화된 디바이스의 초기화 방법 및 디바이스의 펌웨어 업데이트 방법 | |
WO2018056601A1 (ko) | 콘텐츠 파일 접근 제어를 이용한 랜섬웨어 차단 장치 및 차단 방법 | |
WO2015034175A1 (ko) | 기업 내부 정보 보안을 강화하기 위한 방법, 시스템 및 장치 | |
WO2012050367A2 (en) | Method and apparatus for downloading drm module | |
US9336369B2 (en) | Methods of licensing software programs and protecting them from unauthorized use | |
WO2014010818A1 (ko) | 클라우드 컴퓨팅 환경에서 암호화를 위한 사용자 단말 장치 및 암호화 방법 | |
WO2018216988A1 (ko) | 다중 사용자의 인증요소를 조합하여 보안키를 생성하는 보안인증시스템 및 보안인증방법 | |
WO2014193058A1 (ko) | 원격 디지털 포렌식 환경에서 보안 제공 장치 및 그 방법 | |
WO2018169150A1 (ko) | 잠금화면 기반의 사용자 인증 시스템 및 방법 | |
WO2017034378A1 (ko) | 접근성을 이용하는 정보 보안 장치 및 정보 보안 방법 | |
US9129098B2 (en) | Methods of protecting software programs from unauthorized use | |
JP4664055B2 (ja) | プログラム分割装置、プログラム実行装置、プログラム分割方法及びプログラム実行方法 | |
WO2018016830A1 (ko) | 파일 암호화 방지 장치 및 방법 | |
WO2019103443A1 (en) | Method, apparatus and system for managing electronic fingerprint of electronic file | |
WO2011065768A2 (en) | Method for protecting application and method for executing application using the same | |
WO2013172562A1 (ko) | 콘텐츠의 객체별 권한 설정 장치 및 방법 | |
WO2013125883A1 (en) | Drm/cas service device and method using security context | |
WO2021225329A1 (ko) | 사용자 식별자 및 서명 수집을 이용한 모바일 애플리케이션 위변조 탐지 방법 및 시스템 | |
WO2022139357A1 (ko) | Pod 인쇄 콘텐츠 유출 방지 방법 및 장치 | |
WO2018164408A1 (ko) | 어플리케이션 보안 방법 및 이를 수행하기 위한 시스템 | |
WO2017213321A1 (ko) | 공유 정보를 보호하는 방법 및 시스템 | |
WO2018052166A1 (ko) | 어플리케이션을 검증하는 디바이스 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10736069 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13147287 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2010736069 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011547810 Country of ref document: JP Ref document number: 2010736069 Country of ref document: EP |