WO2016028027A1 - 개인 데이터 관리 시스템 및 그 방법 - Google Patents
개인 데이터 관리 시스템 및 그 방법 Download PDFInfo
- Publication number
- WO2016028027A1 WO2016028027A1 PCT/KR2015/008458 KR2015008458W WO2016028027A1 WO 2016028027 A1 WO2016028027 A1 WO 2016028027A1 KR 2015008458 W KR2015008458 W KR 2015008458W WO 2016028027 A1 WO2016028027 A1 WO 2016028027A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- data management
- user
- personal
- authentication
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/805—Real-time
Definitions
- the present invention relates to a personal data management system and the method L.
- the user's personal data is more randomly distributed and managed randomly without being stored in the user's terminal or talk server. It is about personal data management system and method that prevents data from being leaked even if the user terminal is lost by recovering personal data from the user terminal through authentication process.
- the present invention has been made in consideration of the above-described prior art technology, and the user's personal data is distributed and managed randomly without being stored in the user's terminal or talk server, and if necessary, the user undergoes multiple authentication procedures.
- the purpose of the present invention is to provide a personal data management system and a method of preventing personal data from being leaked even when the user terminal is lost, as well as greatly reducing the possibility of hacking by recovering personal data from the terminal. Task solution
- the step e) further comprises the step of randomly extracting a predetermined number from the terminal identification information pool (Pool.) To which the data management server 10 is subjected.
- the method is provided.
- f is a process in which the personal data management application 6 randomly extracts some of the data transmission target terminals provided from the data management server 10 to determine a final target terminal. There is provided a method of managing personal data by tapping what is further included.
- the g) process is provided by the personal data management application (6) by further comprising the step of transmitting the divided backup data to a separate data backup target terminal to provide a personal data management method. .
- step g Preferably, after the step g), h) managing the personal data.
- the application 6 determining whether the data recovery mode is selected; i) when a specific data recovery signal is received, extracting, by the personal data management application 6, target terminal information for distributing and storing the divided data of the heading data; j) understanding the personal data management application 6; Receiving data by performing a data transmission request to the data storage target terminal; k) When data reception is completed, a personal data management method is provided, characterized in that the personal data management application 6 further includes a process of recovering data.
- a personal data management method is provided, characterized in that the personal data management application (6) further includes a step of performing a data transmission request to the corresponding backup storage target terminal side.
- the personal data management application 6 Provided is a personal data management method, characterized in that the data management server 10 further includes a step of transmitting data transmission target terminal information.
- the h) processes and i) Between the process, 1) the individual data management
- An application (6) transmitting data information to be recovered to the data management server (10) and requesting user information of the corresponding data; m) said data
- the user terminal (2) of the corresponding authentication user further includes a step of transmitting an authentication confirmation signal to the personal data management application (6).
- a personal data management method Provided is a personal data management method.
- the m) process is a process of transmitting the authentication user information by the data management server 10 through a short message or an email to the corresponding personal data management application (6). This provided di-.
- the 0) process authentication authentication failure signal is generated by the authentication user.
- the personal data management application 6 When received from the terminal 2, the personal data management application 6 eunsanggi data management server (10) and transmitting the authentication failure information to and: If the preset time is exceeded by the authentication signal is not received, pools the personal data Lee
- the application (6) is a process of transmitting a request signal for the new authentication user information to the data management server (10); and the process of transmitting the new authentication user information to the data management application (6) by the data management server ⁇
- a personal data management method is provided, which is further characterized.
- the process k) may include specific divided data until a predetermined time elapses.
- a personal data management method is provided, which further includes a process of requesting data transmission to the party.
- the transmission user terminal (2-1) which divides and transmits data, and divides it.
- the transmitting user terminal (2a) is sent to the receiving user terminal (2-3) side.
- a personal data management method characterized by further comprising transmitting data divided and stored by the terminal 2-1, receiving authentication information, and storing terminal information of the remaining divided data.
- the present invention is driven by user authentication.
- a personal data management system is provided, which is configured with a topping consisting of a data management server 10 which extracts terminal identification information of a talking user and transmits the terminal identification information to the user terminal 2.
- the data management server (1 ()) is configured to randomly extract a predetermined number from the terminal identification information pool of the target terminal when extracting the terminal identification information of a specific user, the personal data by topping A management system is provided.
- the personal data management application 6 is the data
- a personal data management system is provided which is configured to randomly extract a predetermined number of terminal identification information of a user provided from the management server 10.
- the user terminal 2 for distributing and transmitting data
- a personal data management system characterized in that the data transmitted between the distributed savings-user user machine 2 and the data management server 10 is encrypted data.
- the personal data management application 6 is divided into a plurality.
- a personal data management system characterized in that any one of the data is stored in the corresponding user terminal (2), and the other data is distributed and stored in multiple user terminals (2) of the identification number.
- the personal data management application 6 includes communication terminals 20 communicating with a plurality of user terminals 2 and a data management server 10 for distributing and storing data therein;
- a user authentication unit 22 for authenticating a user through information authentication;
- a storage target information requesting unit (24) for automatically requesting storage target information for distributing and storing data to the data management server (1.0); and a data division processing unit (28) for splitting and processing specific data selected by a user;
- An encryption / decryption processing unit (32) for encrypting and decrypting the data; and a data storage unit (34) for storing some data of the divided data, and storing target information storing the divided data;
- Data storage by communicating with the data management server (10) ⁇ Target information 1, received and divided into specific data to store some data, and other data is transferred to a number of data storage target terminals to be distributed and stored
- a personal data judging system is provided, which includes a control unit 36 which performs a recovery by transmitting a transmission request signal of the talk data to the
- the personal data management application 6 further comprises a dashing-random extraction section 26 therein which randomly extracts some of the storage target information received from the data management server 10.
- a personal data management system that taps into it.
- the personal data management application 6 further includes an object random matching unit 30 for processing the divided data stones and the object to store the data to be randomly matched therein. Personal data management system provided.
- the personal data management application 6 transmits the divided data to the terminals of the plurality of data transmission targets, transfers the same divided data to the terminal side of the backup targets, and processes the data to be backed up and stored for a predetermined time.
- a personal data management system is provided, characterized in that it is configured to perform recovery processing from backup data if recovery of the specific partitioned data is not performed.
- the data management server 10 registers a single authentication user information that requires authentication at the time of recovery of specific data in the distributed storage of data, and authenticates the data when the data recovery request of the personal data management application 6 is requested.
- a personal data management system is provided, characterized by being configured to provide user information to a personal data management application (6).
- the personal data management application 6 has a reward of 71 days.
- the user terminal (2) Upon receiving the authentication user information from the management server (10), the user terminal (2) is configured to request the input of personal authentication information to the user terminal (2) of the corresponding authentication user.
- a personal data management system is provided, characterized in that it is configured to send an authentication confirmation signal to the management application 6.
- the data management server 10 the personal data management
- a personal data management system is provided, characterized in that the authentication user information to be sent to the application 6 is configured to be sent via a text message or an email.
- the personal data management application 6 is a preset time
- a personal data management system is provided, characterized in that the new data management server 10 is configured to request new authentication user information.
- the single-user user terminal 2 is a transmission user for dividing the original data.
- the transmitting user terminal (2-1) is a transmitting user to the receiving user terminal (2-3).
- a personal data management system is provided, characterized in that the terminal (2-1) is configured to transmit data to be divided and stored, reception authentication information, and storage terminal information of the remaining divided data.
- the de-veterinary user terminal 2 storing distributed data is provided with a personal data management system, characterized in that it is either a server, a PC or a wireless terminal. ⁇
- the personal data management system and method according to the name of the present invention divide and store personal data in a plurality of user terminals, so that even if the data management server, email server or SNS server is hacked, no data is obtained or only a part of the divided data is hacked. There is no meaning of hacking, and even if the server is hacked, if you do not hack many second user terminals, you will not be able to get all the split data, and you will get only one specific data even if you hack a number of user terminals. As a result, hackers have very few benefits, which can enhance security performance.
- FIG. 1 is a schematic diagram showing the configuration of a personal data management system according to a first embodiment of the present invention
- FIG. 2 is a view showing a data storage target selection state through a personal data management system according to the first embodiment of the present invention
- FIG. 3 is a diagram showing a data partitioning storage and recovery state through a personal data management system according to the first embodiment of the present invention
- FIG. 4 is a block diagram showing the operation of a personal data management application included in the personal data management system according to the first embodiment of the present invention
- FIG. 5 is a flowchart showing the signal flow of the personal data management system according to the first embodiment of the present invention.
- FIG. 6 is a schematic diagram showing the configuration of a personal data management system according to a second embodiment of the present invention.
- FIG. 7 illustrates the structure of a personal data management system according to a second embodiment of the present invention.
- FIG. 8 is a view showing a user selection state for authentication through a personal data management system according to a second embodiment of the present invention.
- 9, 10, and 1 are flow charts illustrating a data recovery process through a personal data management system according to a second embodiment of the present invention.
- FIG. 12 shows the configuration of a personal data management system according to a third embodiment of the present invention.
- FIG. 1 is a schematic diagram showing the configuration of a personal data management system according to a first embodiment of the present invention
- FIG. 2 shows a data storage target selection state through the personal data management system according to the first embodiment of the present invention
- FIG. 3 is a diagram showing a data partition storage and recovery state through the personal data management system according to the first embodiment of the present invention.
- the personal data management system according to the embodiment of the present invention randomly stores and manages the user's personal data without storing the user's personal data in the user's terminal or a specific server, and manages a plurality of personal data if necessary.
- the personal data management system is driven by user authentication, and automatically separates a plurality of specific data selected by the user and transmits a specific identification transmitted from the data management server 10.
- a data management server (10) made of transfer processing.
- the user terminal (2) stores the original data (4) before division, and actually divides the original data (4) to transmit the divided data to a separate storage means, and then divides the data.
- the singer-based user terminal 2 does not need to be classified according to its function.
- the user terminal 2 that divides and transmits data and recovers the divided data is separately provided.
- a code for example, A001
- the user terminal (2) for receiving and storing the divided data is separately given (for example, BOOL C001, D001, E001).
- the user terminal 2 assigned with the code A001 will be named as the first user terminal 2-1.
- the user terminal (2) coded B001-E001 is designated as the second user terminal (2-2)-.
- the data management server (10) is to extract the terminal identification information of a specific user
- the data management server 10 is configured to randomly extract a predetermined number from the target terminal identification information pool. That is, when the first will end (2-1) requests the data management server 10 for the information about the storage hash to divide and store the data, the data management server 10 Extract information about the storage destination that can store the divided data in advance and send it to the first user terminal (2- 1.).
- the data management server (1.0) stores the information on the storage target for storing the divided data
- the obstacle target means the second user ⁇ terminal (2-2).
- the second user terminal (2 ⁇ 2) 3 ⁇ 4 randomly extracts some identification information of the terminal (2-2) and provides it to the first user terminal (2-1).
- the application 6 is configured to randomly extract a predetermined number of user and terminal identification information provided from the singer-based data management server 10.
- the data management server 10 randomly extracts the identification information of the second user terminal 2-2 and provides it to the first user terminal 2-1, the first user terminal ( 2- 1.)
- Some three of two identification terminals (2-2) of the identification information provided from the data management server 10 are extracted randomly, and the extraction information is extracted from the data.
- the data management server (10) included in the personal data management system according to the first embodiment of the present invention is the first user terminal (2-1), the one-part data to be stored It only stores information on which terminal the partitioned data is stored on, so even if it is illegally hacked by a hacker, the hacker cannot secure the user's data.
- the first user terminal 2-1 stores, for example, data to be divided (e.g., D-1) of the whole original data 4, and stores a plurality of pieces of divided data. Since only the identification information of the second user terminal (2-2) (e.g., B001, C001, # 1, E001, etc.) that is being saved is stored, the data that the user wants to hide even if a hacker hacks You will only be able to get some data.
- data to be divided e.g., D-1
- the identification information of the second user terminal (2-2) e.g., B001, C001, # 1, E001, etc.
- the application 6 stores data divided into a plurality of data, which data is stored in the corresponding I user terminal 2-1, and the data other than L is stored in a plurality of user terminals 2, i.e., a second user with a specific identification number. It is configured to be distributed to and stored in the terminal 2-2.
- the plurality of second user terminals 2-2 storing the distributed data are either a server, a PC, or a wireless terminal.
- any one of the second user terminals 2-2 (e.g., B001) that divides and stores the original data 4 stores some partial data (e.g., 3).
- Which second user terminal 2-2 (e.g. C001) stores some partial data (e.g. D-2), which is 1 2 user terminal (2-2K eg D001).
- Which part do you have Data (e.g. D-5) is stored, and any part of data (e.g., D-4) is stored in any second user terminal (2 ⁇ 2) (e.g. E001).
- any second user terminals 2 is hacked, only a part of data will be secured.
- the hacking will be able to obtain a price corresponding to the effort required for the hacking, but the present invention can be obtained even by hacking the data management server (10). You have to hack a myriad of user terminals (2) to get it, so there is virtually no price a hacker can get.
- the personal data management system has the user terminal 2 for distributing and transmitting the data, and the user terminal for distributing and storing the data.
- (2) and the data transmitted between the data management server 10 are encrypted data.
- the first-person data management system according to the first embodiment of the present invention is
- the personal data management mounted on the first user terminal 2-1.
- the application 6 transmits a split data to a plurality of data transfer target terminals, for example, the second user terminal 2-2, and transmits the same split data to another second user terminal 2-2 as a backup target. It is configured to process the data to be backed up, and to perform the recovery process from the backup data if the recovery of the divided data within a certain time does not succeed.
- the application 6 stores identification information of the second user terminal 2-2 that stores divided data and identification information of the second user terminal 2-2 that stores backup data, respectively.
- FIG. 4 is a block diagram showing the operation of the personal data management application included in the personal data management system according to the first embodiment of the present invention.
- the single-user personal data management application 6 has a communication module 20 communicating therewith with a plurality of user terminals 2 and a data management server 10 for distributing and storing data therein.
- a user authentication unit 22 for authenticating a user role through personal identification information authentication;
- a storage target information requesting unit (24) for automatically requesting storage target information for distributing and storing data to the data management server (10).
- the personal data management application 6 includes a data partition processing unit 28 for dividing and processing specific data of a predetermined purpose therein; an encryption / decryption for performing encryption and decryption on the data to be communicated.
- Processing section 32 A storage destination for storing some of the divided data and storing the divided data.
- a data storage unit 34 for storing information rolls; and communicating with the data management server 10 to receive data storage target information, dividing specific data to store some data, and storing a plurality of other data storage target terminals.
- a control unit 36 for processing the data to be distributed and stored, and transmitting the specific data transmission request signal to the corresponding storage target terminal for recovery.
- the personal data management application 6 has therein, the data
- a dashing configured to randomly extract some of the storage target information received from the management server (1.0), and further comprising a random extraction unit (26).
- the personal data management application (6) is a target random to process the target to store the data to be divided into a random randomly matched therein
- [77 . 1 is a flowchart showing the signal flow of a personal data management system according to the first embodiment of the present invention.
- a user terminal (2) included in the personal data management system according to the first embodiment of the present invention for example, in order to distribute and store specific data by a user who owns the first user terminal (2-1)
- the personal data management application 6 is driven, and personal authentication information such as a password is input to perform authentication.
- the personal data management application 6 determines whether the data distribution mode is selected.
- the personal data management application 6 determines whether a dispersion selection signal for specific data is applied.
- the personal data management application 6 requests the data management server 10 for data transmission target information.
- the data management server 10 stores identification information of the second user terminal 2-2, which is a plurality of divided data storage target terminals, and includes a plurality of second user terminals ( 2-2) Randomly extracting the second user terminal 2-2 of the partial partial identification information to manage personal data of the first user terminal 2-1
- the final target terminal is determined by randomly extracting a part of the data transmission target terminals provided from the management server 10.
- the personal data management application 6 divides the data into a predetermined number and divides the divided data into data transmission target terminals.
- the personal data management application 6 is a separate data backup target Send the divided backup data to the terminal.
- the application 6 transmits divided data to a plurality of terminals to which data is transmitted, for example, the second user terminal 2-2, and transfers the same divided data to another second user terminal 2-2, which is a backup proxy. Transfer to handle backup.
- the application 6 judges whether a data recovery mode is selected, and when a specific data recovery signal is received, the personal data management application 6 performs target terminal information for distributing and storing divided data of the corresponding data, e.g. Identification information of the user terminal 2-2 is extracted.
- the personal data management application 6 of the first user terminal 2-1 Performs a data transmission request to the corresponding data storage target terminal, eg, the second user terminal 2-2. do.
- the personal data management application 6 extracts the information of the target storage data of the heading data. .
- the personal data management application (6) is subject to the backup storage
- a data transmission request is made to the terminal side to recover the original data (4).
- FIG. 6 is a schematic diagram showing the configuration of a personal data management system according to a second embodiment of the present invention
- FIG. 7 conceptually shows the structure of a personal data management system 3 ⁇ 4 according to the second embodiment of the present invention.
- FIG. 8 is a diagram illustrating an authentication target user selection state through a personal data management system according to a second embodiment of the present invention.
- the personal data management system according to the second embodiment of the present invention is referred to.
- the system includes an offline authentication process.
- the system further includes an additional authentication process when the first user terminal 2-1 attempts to recover data.
- the system stores and stores any divided data 8 divided by the first user terminal 2- ⁇ .
- a second user terminal (2 ⁇ 2) is a system that performs an authentication process that performs user authentication.
- User authentication of the user terminal 2-2 is performed by the personal data management application 6 mounted in the second user terminal 2-2, and the authentication success signal is transmitted to the first user terminal 2-1.
- the personal data management application 6 of the first user terminal 2-1 A device configured to command the recovery of data.
- the owner of the specific second user terminal (2-2) to be authenticated is called an authentication user, and the data management server (1.0) is divided through the I user terminal (2-1).
- the information of the authentication user is randomly generated and stored through the random number processing modules 12 so as to match the identification information of the specific data.
- the authentication user information is not stored in the first user terminal 2-1, even if a hacker attempts to recover the data by hacking the first user terminal 2-1, the authentication user information. Data recovery will not be performed without
- the data management server 10 registers a single authentication request information that requires authentication at the time of recovery of specific data in the distributed storage of data, and the personal data management application of the first user terminal 2-1. 6) Requesting this data recovery provides the corresponding authentication user information to the personal data management application (6).
- the personal data management application 6 of the first user terminal 2-1 receives authentication user information from the data management server 10
- the user terminal 2 of the corresponding authentication user for example, The second user terminal (2-1)
- the user terminal 2 of the corresponding authentication user is configured to request the input of personal authentication information (eg, password, fingerprint, interest information, etc.), and when the personal authentication is successful, the second user terminal (2-2) of the corresponding authentication user
- An authentication confirmation signal is transmitted to the personal data management application 6 of the first user terminal 2-1.
- the authentication user information transmitted from the data management server 10 to the personal data management application 6 is transmitted through a text message or an email. Consisting of D-.
- a non-heterogeneous communication concept is included, when the identification information of the authentication user is transmitted from the data management server 10 to the I user terminal 2-1. E-mail log of the user who owns the authentication information of the user, even if the hacker has found out the password of the personal data management application (6) of the first user terminal (2- 1) If you fail to hack the transport server 40, you will not be able to recover your data.
- the second user terminal (2-2) which is the target of the authentication user, must successfully authenticate the user of the personal data management application (6) by inputting the user's user information, but the predetermined time has elapsed.
- the personal data management application 6 can also configure new authentication user information to the data management server 1 so as not to receive the authentication confirmation information of the authentication user until a predetermined time elapses. .
- FIGS. 9, 10 and 11 are flowcharts illustrating a data recovery process through a personal data management system according to a second embodiment of the present invention.
- the personal data management system is divided.
- the concept of offline authentication is to allow a specific user to perform user authentication by inputting information such as password input, fingerprint, and iris.
- the personal data management application is registered on the user terminal (2).
- Teen with user can be the target of the authentication user.
- the designation of the authentication user is performed by the data management server (10) at the time of the request for data recovery from the first user terminal (2-1).
- the I user terminal (2- 1) is configured to divide data of specific data.
- the first user terminal (2-1) transmits the information to the data management server (1.0) and stores the information.
- information of the second user terminal (2-2) which is a terminal to which the data is stored, may be deleted.
- the personal data management application 6 transmits identification information (eg, g 20:13) of specific data to be recovered to the data management server 10, and requests identification information of an authentication user at the same time.
- identification information eg, g 20:13
- the data management server 10 extracts identification information (for example, a telephone number) of any user who has installed the personal data management application 6, and then selects the first user group device ( 2-1) to the personal data management application (6).
- identification information for example, a telephone number
- the personal data management system according to the second embodiment of the present invention preferably includes a heterogeneous communication concept in addition to the offline concept.
- the identification information of the authentication user is transmitted from the management server 10 to the first user terminal 2-1, the identification information of the user is transmitted during the e-mail login of the user who owns the corresponding i terminal 2-1. Even if the hacker finds out the password of the personal data management application 6 of the first user terminal 2-1, the hacker cannot recover the data unless the user hacks the email transmission server 40 of the user.
- the application 6 preferably transmits the authentication request signal to the second user terminal 2-2 having the identification information of the corresponding authentication user, and preferably the personal data management application of the second user terminal 2-2. 6) to send the authentication request signal.
- the user who owns the second user terminal 2-2 enters authentication information into the personal data management application 6 of the second user terminal 2-2 to perform authentication.
- Bar preferably of the personal data management application ( 6) Just enter your password.
- the personal data management application 6 of the first user terminal 2-1 transmits a data recovery signal to a plurality of second user terminals 2-2 storing corresponding divided data 3 ⁇ 4.
- the identification information of the data to be recovered is also transmitted.
- the personal data management application 6 of the second user terminal 2-2 transmits the divided data 8 to the first user terminal 2-1.
- the personal data management application 6 of the i user terminal 2-1 determines whether all divided data has been received, and recovers the data when reception of the divided data is completed.
- Singh group a second user terminal (2 eu 2) uising - if the group if the personal data management application (6) failed to a personal authentication and personal authentication information received enter a password mismatch, said second seat
- the application 6 transmits authentication failure information to the application 6 to the personal data management of the first user terminal 2-1.
- application 6 is a di-i re-transmits the authentication failure information of the authenticated user to the data management server 10.
- the first user terminal (2- 1) is authenticated until a certain time elapses.
- the personal data management application 6 of the first user terminal 2-1 may transmit information on the non-authentication signal to the data management server 10, in both cases.
- the data management server 10 requests the identification information of the new authentication user.
- the personal data # -replication application 6 of the first user terminal 2-1 Extracts the identification information of the second user terminal (2-2) storing the backup data of the partitioned data that has not been received.
- the transfer of backup data may be requested to the personal data management application 6 of the user terminal 22.
- identification information of the second user terminal (2-2) storing the backup data is stored in the data management server (10), and the identification information is not stored in the first user terminal (2-1). You can also design—not.
- the personal data management application 6 of the first user terminal 2-1 stores backup data of the divided data not received by the data management server 10.
- the data management server (K) extracts the identification information 3 ⁇ 4—of the second user terminal (2-2) storing the backup data of the divided data, and extracts the corresponding second user terminal (2-2).
- a request for the transmission of the backup data to the personal data management application (6) is received, and the received backup data can be transmitted back to the I. user terminal (2- 1.) to enable data recovery.
- FIG. 1 is a block diagram of a personal data management system according to a third embodiment of the present invention.
- the personal data management system according to the third embodiment of the present invention is a personal data management system.
- This function is very effective for maintaining data security when sending e-mails or transmitting the talk data to the talk user via SNS.
- the personal data management application 6 of the first user terminal 2-1 is automatically driven at the time of e-mail transmission to divide the original data 4 to be transmitted into a plurality of pieces of data (eg , D-1.)
- the personal data management application 6 of the first user terminal 2-1 is
- the remaining divided data is sent to and stored in a plurality of open data management applications 6 of the second user terminal 2-2. '
- the data is sent to the personal data management application 6 of the user terminal 2-1.
- the personal data management application 6 of the first user terminal 2- 1. authenticates the corresponding password to authenticate whether the user is a legitimate data reader. If the password matches, the first user terminal ( The personal data management application 6 of 2- 1) generates a corresponding data transmission signal to a plurality of the second user terminals 2-2 which distribute and store the corresponding data.
- the personal data management application 6 of the second user terminal 2-2 manages the divided data 8, respectively, and manages the personal data of the third user terminal 2-3.
- the personal data management application 6 of the third user terminal 2-3 can recover the data. This feature can work in conjunction with an email server.
- the first user terminal (2-n's personal data management application 6) automatically attaches any divided data (e.g., D-1) divided into specific data to the corresponding email, and provides the password and storage location information.
- the identification information of the personal data management application 6 of the second user terminal 2 ⁇ 2 is inputted in the content field of the corresponding email and transmitted.
- the personal data management application 6 of the first user terminal 2-1 includes the email receiver's email information along with the recipient's terminal information.
- the identification information of the user terminal 2-3 and the personal data management application ( ⁇ ) of the second user terminal 2-2 should be stored together.
- the personal data management application 6 of the I-user terminal 2-1 transmits the remaining divided data to the second user terminal 2-2.
- the third user receives a command to recover the data through the personal data management application 6, and manages the personal data of the second user terminal 2-2.
- the personal data management application 6 of the second user terminal 2-2 transmits the divided data stones to the third user terminal 2-3.
- the personal data management application 6 of the third user terminal 2-3 receives all the divided data, and when the password 3 ⁇ 4 is inputted by the first user, the data is displayed on the screen. Will be output.
- the hacker cannot acquire the split data sent through the SNS to the user terminal (2-3), and even if the SNS server is hacked, if the second user terminal (2-2) is not damaged, all the split data can be obtained. Even if you hack each user terminal 2, you can get only the specific data of each person, so that the hackers are not profitable.
- the personal data management system and method thereof according to the embodiment of the present invention are not limited to the above embodiments but various modifications can be made without departing from the technical gist of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/504,653 US10387671B2 (en) | 2014-08-18 | 2015-08-12 | Private data management system and method therefor |
EP15834568.6A EP3185158B1 (en) | 2014-08-18 | 2015-08-12 | Private data management system and method therefor |
CA2958433A CA2958433C (en) | 2014-08-18 | 2015-08-12 | Private data management system and method therefor |
JP2017508674A JP6427661B2 (ja) | 2014-08-18 | 2015-08-12 | 個人データ管理システム及びその方法 |
SG11201701261PA SG11201701261PA (en) | 2014-08-18 | 2015-08-12 | Private data management system and method therefor |
CN201580044257.XA CN106687982B (zh) | 2014-08-18 | 2015-08-12 | 个人数据管理系统及其管理方法 |
AU2015304185A AU2015304185A1 (en) | 2014-08-18 | 2015-08-12 | Private data management system and method therefor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140107267A KR101687287B1 (ko) | 2014-08-18 | 2014-08-18 | 개인 데이터 관리 시스템 및 그 방법 |
KR10-2014-0107267 | 2014-08-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016028027A1 true WO2016028027A1 (ko) | 2016-02-25 |
Family
ID=55350927
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2015/008458 WO2016028027A1 (ko) | 2014-08-18 | 2015-08-12 | 개인 데이터 관리 시스템 및 그 방법 |
Country Status (9)
Country | Link |
---|---|
US (1) | US10387671B2 (ko) |
EP (1) | EP3185158B1 (ko) |
JP (1) | JP6427661B2 (ko) |
KR (1) | KR101687287B1 (ko) |
CN (1) | CN106687982B (ko) |
AU (1) | AU2015304185A1 (ko) |
CA (1) | CA2958433C (ko) |
SG (1) | SG11201701261PA (ko) |
WO (1) | WO2016028027A1 (ko) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10437791B1 (en) * | 2016-02-09 | 2019-10-08 | Code 42 Software, Inc. | Network based file storage system monitor |
TWI650665B (zh) * | 2017-05-18 | 2019-02-11 | 南基元 | 個人資料管理系統及其管理方法 |
KR101971632B1 (ko) * | 2018-04-05 | 2019-04-23 | 주식회사 인포바인 | 데이터를 분산하여 저장 및 복원하는 방법 및 장치 |
CN109298836B (zh) * | 2018-09-04 | 2022-07-08 | 航天信息股份有限公司 | 处理数据的方法、装置和存储介质 |
KR102181645B1 (ko) * | 2018-12-26 | 2020-11-24 | 주식회사 아이콘루프 | 데이터를 분산해서 저장하는 시스템 및 방법 |
KR102150806B1 (ko) * | 2019-11-15 | 2020-09-02 | (주)키프코프롬투 | 데이터 보호 방법 |
KR102419433B1 (ko) * | 2019-11-27 | 2022-07-12 | 주식회사 와임 | 분할 기능을 이용한 보안이 강화된 평가 데이터 조회 방법 및 시스템 |
CN116547943A (zh) | 2020-12-04 | 2023-08-04 | 三星电子株式会社 | 用于管理安全密钥的方法和设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007234054A (ja) * | 2007-05-14 | 2007-09-13 | Fujitsu Ltd | 登録装置 |
JP2009157437A (ja) * | 2007-12-25 | 2009-07-16 | Dainippon Printing Co Ltd | 分散記憶システム |
JP2012226544A (ja) * | 2011-04-19 | 2012-11-15 | Clickbenefit Co Ltd | 情報処理システムおよびデータバックアップ方法 |
KR20130049623A (ko) * | 2011-11-04 | 2013-05-14 | 주식회사 케이티디에스 | 데이터 분산 저장 시스템 및 그 방법 |
KR20130101641A (ko) * | 2012-02-21 | 2013-09-16 | 윤경한 | 데이터 보호 방법 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7669051B2 (en) * | 2000-11-13 | 2010-02-23 | DigitalDoors, Inc. | Data security system and method with multiple independent levels of security |
JP2003271782A (ja) * | 2002-03-14 | 2003-09-26 | Nec Corp | 個人情報管理システム |
JP3871996B2 (ja) * | 2002-10-25 | 2007-01-24 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | データ分割管理方法及びプログラム |
CN101375284B (zh) * | 2004-10-25 | 2012-02-22 | 安全第一公司 | 安全数据分析方法和系统 |
JP2009139990A (ja) * | 2007-12-03 | 2009-06-25 | Internatl Business Mach Corp <Ibm> | 情報の不正取得を防止する技術 |
JP4917116B2 (ja) * | 2009-02-25 | 2012-04-18 | 株式会社エヌ・ティ・ティ・ドコモ | データ暗号化システム、通信機器、及びデータ暗号化方法 |
JP2011232834A (ja) * | 2010-04-23 | 2011-11-17 | Fujitsu Ltd | データ分散プログラム、データ復元プログラム、データ分散装置、データ復元装置、データ分散方法、およびデータ復元方法 |
KR101278722B1 (ko) * | 2011-12-28 | 2013-06-25 | 에스케이텔레콤 주식회사 | 이기종 네트워크 기반 데이터 동시 전송 방법 및 이에 적용되는 장치 |
KR101873530B1 (ko) * | 2012-04-10 | 2018-07-02 | 삼성전자주식회사 | 모바일 기기, 모바일 기기의 입력 처리 방법, 및 모바일 기기를 이용한 전자 결제 방법 |
JP6042692B2 (ja) * | 2012-10-18 | 2016-12-14 | 株式会社日立システムズ | 分割ファイルバックアップシステム |
-
2014
- 2014-08-18 KR KR1020140107267A patent/KR101687287B1/ko active IP Right Grant
-
2015
- 2015-08-12 EP EP15834568.6A patent/EP3185158B1/en active Active
- 2015-08-12 CA CA2958433A patent/CA2958433C/en not_active Expired - Fee Related
- 2015-08-12 US US15/504,653 patent/US10387671B2/en active Active
- 2015-08-12 WO PCT/KR2015/008458 patent/WO2016028027A1/ko active Application Filing
- 2015-08-12 AU AU2015304185A patent/AU2015304185A1/en not_active Abandoned
- 2015-08-12 JP JP2017508674A patent/JP6427661B2/ja active Active
- 2015-08-12 SG SG11201701261PA patent/SG11201701261PA/en unknown
- 2015-08-12 CN CN201580044257.XA patent/CN106687982B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007234054A (ja) * | 2007-05-14 | 2007-09-13 | Fujitsu Ltd | 登録装置 |
JP2009157437A (ja) * | 2007-12-25 | 2009-07-16 | Dainippon Printing Co Ltd | 分散記憶システム |
JP2012226544A (ja) * | 2011-04-19 | 2012-11-15 | Clickbenefit Co Ltd | 情報処理システムおよびデータバックアップ方法 |
KR20130049623A (ko) * | 2011-11-04 | 2013-05-14 | 주식회사 케이티디에스 | 데이터 분산 저장 시스템 및 그 방법 |
KR20130101641A (ko) * | 2012-02-21 | 2013-09-16 | 윤경한 | 데이터 보호 방법 |
Also Published As
Publication number | Publication date |
---|---|
EP3185158B1 (en) | 2019-06-12 |
US20170255791A1 (en) | 2017-09-07 |
CN106687982A (zh) | 2017-05-17 |
EP3185158A1 (en) | 2017-06-28 |
CA2958433A1 (en) | 2016-02-25 |
CN106687982B (zh) | 2019-12-13 |
JP2017527900A (ja) | 2017-09-21 |
EP3185158A4 (en) | 2018-04-18 |
SG11201701261PA (en) | 2017-03-30 |
KR101687287B1 (ko) | 2017-01-02 |
CA2958433C (en) | 2019-07-09 |
AU2015304185A1 (en) | 2017-04-20 |
KR20160021670A (ko) | 2016-02-26 |
JP6427661B2 (ja) | 2018-11-21 |
US10387671B2 (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016028027A1 (ko) | 개인 데이터 관리 시스템 및 그 방법 | |
KR101727660B1 (ko) | 하나의 장치를 이용하여 다른 장치를 언로크하는 방법 | |
US20190384934A1 (en) | Method and system for protecting personal information infringement using division of authentication process and biometric authentication | |
CN101958892B (zh) | 基于人脸识别的电子数据保护方法、装置及系统 | |
CN110706379B (zh) | 基于区块链的门禁访问控制方法和装置 | |
CN110399717B (zh) | 密钥获取方法和装置、存储介质及电子装置 | |
EP2544117A1 (en) | Method and system for sharing or storing personal data without loss of privacy | |
CN102215221A (zh) | 从移动设备对计算机的安全远程唤醒、引导及登录的方法和系统 | |
EP2984781A1 (en) | Secure backup and recovery system for private sensitive data | |
CN103856472A (zh) | 一种账户登录的方法及装置 | |
CN104717224B (zh) | 一种登录方法及装置 | |
CN107920052B (zh) | 一种加密方法及智能装置 | |
EP2974123B1 (en) | Systems and methods for account recovery using a platform attestation credential | |
CN109005144B (zh) | 一种身份认证方法、设备、介质和系统 | |
US9602284B1 (en) | Secure offline authentication | |
EP4037250A1 (en) | Message transmitting system with hardware security module | |
KR101792220B1 (ko) | 생체 인증 결합 사용자 간편 인증 방법, 이를 위한 인증 어플리케이션이 탑재된 사용자 모바일 단말기, 인증 서비스 장치 및 컴퓨터 프로그램 | |
EP3480718B1 (en) | System and method for facilitating authentication via a shortrange wireless token | |
EP2775658A2 (en) | A password based security method, systems and devices | |
KR101657243B1 (ko) | 온라인 시크릿 데이터 관리시스템 및 그 방법 | |
CN112987942A (zh) | 键盘输入信息的方法、装置、系统、电子设备和存储介质 | |
CN112073185A (zh) | 云游戏安全传输方法及装置 | |
KR102104823B1 (ko) | 인증프로세스의 단계분할과 생체인증을 접목한 개인정보침해 방어 방법 및 시스템 | |
CN105072136A (zh) | 一种基于虚拟驱动的设备间安全认证方法和系统 | |
TWI650665B (zh) | 個人資料管理系統及其管理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15834568 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2017508674 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2958433 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15504653 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015834568 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015834568 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2015304185 Country of ref document: AU Date of ref document: 20150812 Kind code of ref document: A |