WO2017026055A1 - Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données - Google Patents

Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données Download PDF

Info

Publication number
WO2017026055A1
WO2017026055A1 PCT/JP2015/072792 JP2015072792W WO2017026055A1 WO 2017026055 A1 WO2017026055 A1 WO 2017026055A1 JP 2015072792 W JP2015072792 W JP 2015072792W WO 2017026055 A1 WO2017026055 A1 WO 2017026055A1
Authority
WO
WIPO (PCT)
Prior art keywords
target data
file
folder
user
unit
Prior art date
Application number
PCT/JP2015/072792
Other languages
English (en)
Japanese (ja)
Inventor
康央 山田
楽 岳彦
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to PCT/JP2015/072792 priority Critical patent/WO2017026055A1/fr
Priority to JP2017534075A priority patent/JP6544431B2/ja
Publication of WO2017026055A1 publication Critical patent/WO2017026055A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Definitions

  • the present invention relates to an information processing apparatus, a data display method, and a data display program.
  • a user waiting for printing can receive a setting of a secrecy mode or a non-hidden mode for a job selected from the list of jobs waiting to be printed, and print the job in the accepted mode.
  • a conventional technique that enables the printer to be left in an emergency.
  • the encrypted data When data is encrypted, the encrypted data is moved from the original location and stored in a dedicated location for the encrypted data.
  • the user decrypts data from a dedicated location, but the decrypted data is stored in the original location. Therefore, in order to use the decrypted data, the user needs to follow the directory to the original location, and there is a problem that it takes time until the user uses the data.
  • the present invention aims to reduce the time required for a user to use encrypted data.
  • the information processing apparatus disclosed in the present application includes a display control unit, a confirmation unit, and a deployment unit.
  • the display control unit displays a first window that accepts an instruction to display target data for each target data that can be concealed and indicates an electronic file or a folder in which the file is stored.
  • the confirmation unit confirms whether or not the target data is concealed when an instruction to display the target data is received from a user.
  • the expansion unit cancels the concealment setting of the target data and displays the target data in the second window.
  • the time required for the user to use the encrypted data can be shortened.
  • FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment.
  • FIG. 2 is a diagram illustrating an example of the target information storage unit.
  • FIG. 3 is a diagram illustrating an example of a registration screen.
  • FIG. 4 is a diagram showing a screen after registration.
  • FIG. 5 is a diagram illustrating an example of a window in which the user instructs expansion and decryption.
  • FIG. 6 is a diagram showing a window that displays the expanded folder.
  • FIG. 7 is a diagram illustrating a display example of the display window.
  • FIG. 8 is a diagram illustrating an example of designation of priority decoding by the user.
  • FIG. 9 is a diagram showing preferential decoding of a file designated by the user.
  • FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment.
  • FIG. 2 is a diagram illustrating an example of the target information storage unit.
  • FIG. 3 is a diagram illustrating an example of a
  • FIG. 10 is a diagram showing a screen in which a preferentially decrypted file is opened and displayed in a window.
  • FIG. 11 is a diagram illustrating a screen when the decoding control unit resumes the decoding process based on a predetermined order after the completion of the priority decoding.
  • FIG. 12 is a diagram illustrating a situation in which the resumed decoding process is progressing.
  • FIG. 13 is a flowchart showing the flow of expansion and preferential decoding processing.
  • FIG. 14 is a diagram illustrating a hardware configuration of the information processing apparatus that executes the display program according to the embodiment.
  • FIG. 1 is a diagram illustrating a functional configuration of the information processing apparatus according to the embodiment.
  • the information processing apparatus 1 according to the embodiment includes a concealment unit 2 and a data storage unit 3.
  • the concealing unit 2 conceals the folder and file specified by the user so that they cannot be seen, or conversely restores the concealed folder and file to the original location. For example, the user conceals and stores folders and files that are not desired to be seen by others, and temporarily restores them only when he / she sees them.
  • the data storage unit 3 includes a non-hidden data storage unit 3a and a hidden data storage unit 3b.
  • the non-hidden data storage unit 3a stores non-hidden folder and file data together with folder hierarchy information.
  • the concealment data storage unit 3b stores the data of the folder and file designated to be concealed together with information on the location of the restoration destination.
  • the hidden data storage unit 3b may encrypt and store data based on the security level, or may encrypt and store only folder and file information without encrypting the data.
  • the data storage unit 3 is realized by using a nonvolatile storage device such as an HDD (Hard Disk Drive).
  • the concealing unit 2 includes a storage unit 2a that stores data necessary for concealing and restoring folders and files, and a control unit 2b that uses the data stored in the storage unit 2a to conceal and restore folders and files. .
  • the storage unit 2a has a target information storage unit 2c.
  • the target information storage unit 2c stores information on folders and files to be concealed.
  • FIG. 2 is a diagram illustrating an example of the target information storage unit 2c. As illustrated in FIG. 2, the target information storage unit 2c stores an identifier, a restoration location, a type, a size, and a concealment state for each concealment target.
  • the identifier is the name of the folder or file to be hidden.
  • the restoration location is a path to a folder stored when the concealment target is restored.
  • the type indicates whether the concealment target is a folder or a file.
  • the size is the size of the folder or file to be concealed.
  • the concealment state indicates whether or not the folder or file to be concealed is in an encrypted concealed state. If the concealed state is concealed, it is “on” and the concealed state is not concealed. Is "off".
  • a hidden object whose name is Document is a folder stored under C: ⁇ Users ⁇ YAMADA03 ⁇ Desktop ⁇ MySecret when restored, and its size is 679 MB (megabytes), and is not hidden It is in.
  • the control unit 2b includes an authentication unit 21, a management unit 22, an encryption unit 23, and a decryption unit 24.
  • the authenticating unit 21 authenticates a user who uses the function of the concealing unit 2. Only the user who is permitted by the authentication can access the concealment object using the concealment unit 2.
  • the management unit 22 displays a window for dialogue with the user on the display device, and performs dialogue with the user to perform registration, cancellation, deployment, and the like of the concealment target.
  • development refers to specifying files and folders included in a hidden folder.
  • the management unit 22 includes a display control unit 22a, a registration unit 22b, a release unit 22c, and an expanded display unit 22d.
  • the display control unit 22a displays a window for interaction with the user on the display device and accepts an operation by the user.
  • the registration unit 22b registers the folder or file designated by the user as a concealment target. That is, the registration unit 22b stores information on a folder or file designated by the user in the target information storage unit 2c as a concealment target.
  • FIG. 3 is a diagram showing an example of a registration screen.
  • the display control unit 22a displays a dialog window 41 as shown in FIG.
  • the dialogue window 41 is a window for displaying a folder for concealment, and a list of folders and files already registered as a concealment target is displayed.
  • the “name” column indicates the name of the concealment target
  • the “type” column indicates whether the concealment target is a folder (file folder) or a file
  • the “size” column indicates the concealment target.
  • the size is shown
  • the “hide” column shows the concealment state of the concealment target. For example, in FIG. 4, a file named Secretdoc is registered as a concealment target.
  • the user can register as a concealment target by dragging a folder or file into the dialog window 41.
  • the user can select a folder or file to be concealed and press the button 40 for instructing addition of a file / folder to register it as a concealment target.
  • FIG. 3 shows a case where a folder named Document is dragged into the dialog window 41 and registered as a concealment target.
  • Fig. 4 shows the screen after registration.
  • the registered document information is displayed in the dialog window 41 as a registered data list.
  • the document concealment state is “off”
  • the document is not concealed.
  • the user can switch the concealment state from “off” to “on” or from “on” to “off” by pressing the button 42 in the “hide” column to be concealed.
  • the concealment state changes from “off” to “on”
  • the concealment target dragged to the dialog window 41 is replaced with a dummy folder or dummy file in the original folder, and the icon 44 is deleted from the display window 43 of the original folder.
  • an icon 44 is displayed in the display window 43 of the original folder.
  • the dummy folder is a folder that has the same folder name as the original folder but does not include a file
  • the dummy file is a file that has the same file name as the original file but does not include data.
  • “dummy” is used as a generic term for dummy folders and dummy files.
  • the registration unit 22b When the concealment state is instructed from “off” to “on” by the user, the registration unit 22b encrypts the concealment target and moves it from the non-concealed data storage unit 3a to the concealment data storage unit 3b, and the non-concealment data storage unit 3a Stores a dummy instead of a concealment target. Also, when the concealment state is instructed from “on” to “off” by the user, the registration unit 22b decrypts the concealment target and moves it from the concealment data storage unit 3b to the original folder of the non-concealment data storage unit 3a. Move and replace with dummy.
  • the release unit 22c releases the concealment of the folder or file. That is, the canceling unit 22c deletes information on the folder or file designated to be cancelled by the user from the target information storage unit 2c.
  • the canceling unit 22c decrypts the folder or file and restores the original folder of the non-hidden data storage unit 3a from the concealed data storage unit 3b. Move down and replace with a dummy.
  • the user can cancel the concealment of the folder or file by selecting the cancellation target from the dialog window 41 shown in FIG. 4 and pressing the button 45 displayed as “Registration cancellation”.
  • the user can turn on all the objects to be concealed by pressing the button 46 displayed as “Hide All”.
  • the expansion display unit 22d expands and displays the folder specified by the user. Then, the expansion display unit 22d decrypts the files included in the folder in a predetermined order.
  • the predetermined order is, for example, the order of names.
  • the expansion display unit 22d includes a reception unit 25, a expansion unit 26, a decoding control unit 27, and a priority unit 28.
  • the accepting unit 25 accepts folder expansion and decryption instructions from the user, and confirms the concealed state of the accepted folder.
  • the expansion unit 26 expands the folder and activates a window for displaying the folder when the hidden state of the folder designated by the user is “ON”.
  • FIG. 5 is a diagram illustrating an example of a window in which the user instructs expansion and decryption.
  • the user instructs the expansion of the corresponding folder by pressing a button 47 displayed as “Open”.
  • Document is expanded.
  • the button 47 displayed as “Open” is referred to as an “Open” button 47.
  • FIG. 6 is a diagram showing a window displaying the expanded folder. As shown in FIG. 6, the folder designated by the user is displayed in the display window 43 and automatically opened. In FIG. 6, Document is displayed in the display window 43 and automatically opened.
  • the decryption control unit 27 decrypts the folders and files included in the folder expanded by the expansion unit 26 in a predetermined order using the decryption unit 24 and replaces them with dummy files.
  • FIG. 7 is a diagram illustrating a display example of the display window 43. In FIG. 7, icons of files included in the document are displayed together with names.
  • an icon 48 indicating the file type is displayed for a file that has been decrypted
  • a dummy icon 49 indicating a dummy file is displayed for a file that has not been decrypted.
  • the dummy icon 49 changes to an icon 48 indicating the file type.
  • the priority unit 28 interrupts the decryption process based on a predetermined order, and selects the selected file. Decrypt and display preferentially. And the priority part 28 restarts the decoding process based on a predetermined order, when a priority process is complete
  • FIG. 8 is a diagram showing an example of designation of priority decoding by the user
  • FIG. 9 is a diagram showing priority decoding of a file designated by the user.
  • the user double-clicks a specific file 50 to be preferentially decoded while the files included in the document are being sequentially decoded. Then, as shown in FIG. 9, the file 50 designated by the user is preferentially decoded.
  • FIG. 10 is a diagram showing a screen displayed on the window 51 when the predecrypted file 50 is opened.
  • Document 015 for which priority decoding is designated by the user is displayed in window 51.
  • FIG. 11 is a diagram showing a screen when the decoding control unit 27 resumes the decoding process based on a predetermined order after the end of the priority decoding. As shown in FIG. 11, the progress of the decoding process is displayed on the dialog window 41 by a slider 52.
  • FIG. 12 is a diagram illustrating a situation in which the resumed decryption process is in progress. As shown in FIG. 12, since the files other than the preferentially processed file 50 are decrypted in order and the dummy file is replaced with the decrypted file, the number of icons 49 indicating the dummy file is reduced, and the file The icon 48 indicating the type increases.
  • the encryption unit 23 encrypts the folder or file in which the concealment state is instructed from “off” to “on” by the user.
  • the encryption unit 23 encrypts data based on the security level, or encrypts the name of the folder or file without encrypting the data.
  • the decryption unit 24 decrypts a folder or file whose concealment state is instructed from “on” to “off” by the user.
  • the decrypting unit 24 decrypts the data based on the security level, or decrypts the name of the folder or file without decrypting the data.
  • the decryption unit 24 decrypts the file based on an instruction from the decryption control unit 27.
  • FIG. 13 is a flowchart showing the flow of expansion and preferential decoding processing.
  • the display control unit 22a displays a list of objects to be concealed on the dialog window 41 (step S1), and the receiving unit 25 receives a press of the [Open] button 47 by the user (step S2). .
  • the reception unit 25 checks whether or not the concealment state of the folder corresponding to the pressed [Open] button 47 is “on” (step S3). The decryption process ends.
  • the expansion unit 26 expands the folder corresponding to the pressed [Open] button 47 and displays it on the display window 43 (step S4).
  • the expansion unit 26 displays the file before decryption with a file name and a dummy icon 49.
  • the decryption control unit 27 decrypts the file in which the dummy icon 49 is displayed in the display window 43 in a predetermined order (step S5) and replaces it with the dummy file.
  • the priority unit 28 accepts the double-click on the file (step S6), and the decryption by the decryption control unit 27 is interrupted (step S7).
  • the priority unit 28 determines whether or not the double-clicked file has been decrypted (step S8). If the file has not been decrypted, the priority unit 28 preferentially decrypts the double-clicked file. (Step S9), the file decrypted with priority is opened (Step S10). Then, the priority unit 28 resumes the interrupted decoding (step S11).
  • the priority unit 28 opens the file (step S12) and resumes the interrupted decryption (step S11).
  • the display control unit 22a displays the dialog window 41.
  • the accepting unit 25 accepts pressing of the [Open] button 47 by the user in the dialog window 41 and confirms the concealment state of the folder corresponding to the [Open] button 47 pressed by the user.
  • the expansion unit 26 expands the folder corresponding to the “Open” button 47 pressed by the user and displays the folder on the display window 43. Then, the decryption control unit 27 decrypts the files in the folder in a predetermined order.
  • the user can easily find the file to be decrypted and used from the display window 43, and the time for searching for the file to be used can be reduced.
  • the priority unit 28 preferentially decrypts and opens the file that the user double-clicked on the display window 43 during decryption. Therefore, the user can reduce the waiting time due to the decryption process of other files by designating the file to be decrypted and used on the display window 43.
  • the expansion display unit 22d displays and decrypts a folder whose concealment state is “on”, but the expansion display unit 22d decrypts a folder whose concealment state is “on”. And may be displayed. Further, the expansion display unit 22d may decrypt and display the file whose concealment state is “ON”.
  • the development display unit 22d displays the dialog window 41.
  • the receiving unit 25 receives the pressing of the [Open] button 47 by the user, and the corresponding folder is hidden. Check if it is “ON”.
  • the expansion unit 26 expands the folder and displays it on the display window 43.
  • the decryption control unit 27 decrypts the files in the folder in a predetermined order.
  • the user can easily find the file that the user wants to decrypt and use from the display window 43, and the time for the user to search for the file that the user wants to use can be reduced.
  • the expansion unit 26 displays an icon 48 indicating the file type for a file that has been decrypted, and displays a dummy icon 49 for a file that has not been decrypted. Therefore, the user can easily distinguish between files that have been decrypted and files that have not been decrypted.
  • the priority unit 28 preferentially decrypts the file that the user double-clicked on the display window 43 during the decryption. Therefore, the user can quickly use a specific file included in the encrypted folder.
  • the expansion display part 22d was demonstrated in the Example, the display program which has the same function can be obtained by implement
  • FIG. 14 is a diagram illustrating a hardware configuration of the information processing apparatus 1 that executes the display program according to the embodiment.
  • the information processing apparatus 1 includes a main memory 61, a CPU 62, a LAN (Local Area Network) interface 63, and an HDD 64.
  • the information processing apparatus 1 includes a super IO (Input Output) 65, a DVI (Digital Visual Interface) 66, and an ODD (Optical Disk Drive) 67.
  • the main memory 61 is a memory for storing a program and a program execution result.
  • the CPU 62 is a central processing unit that reads a program from the main memory 61 and executes it.
  • the CPU 62 includes a chip set having a memory controller.
  • the LAN interface 63 is an interface for connecting the information processing apparatus 1 to another information processing apparatus via the LAN.
  • the HDD 64 is a disk device that stores programs and data
  • the super IO 65 is an interface for connecting an input device such as a mouse or a keyboard.
  • the DVI 66 is an interface for connecting a liquid crystal display device
  • the ODD 67 is a device for reading / writing a DVD.
  • the LAN interface 63 is connected to the CPU 62 by PCI Express (PCIe), and the HDD 64 and ODD 67 are connected to the CPU 62 by SATA (Serial Advanced Technology Attachment).
  • the super IO 65 is connected to the CPU 62 by LPC (Low Pin Count).
  • the display program executed in the information processing apparatus 1 is stored in the DVD, read from the DVD by the ODD 67, and installed in the information processing apparatus 1.
  • the display program is stored in a database or the like of another information processing system connected via the LAN interface 63, read from these databases, and installed in the information processing apparatus 1.
  • the installed display program is stored in the HDD 64, read into the main memory 61, and executed by the CPU 62.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne un dispositif de traitement d'informations dans lequel une unité de commande d'affichage (22a) affiche une fenêtre de dialogue. Ensuite, lorsqu'un dossier chiffré doit être déchiffré, un utilisateur appuie sur un bouton « Ouvert » qui est disposé sur la fenêtre de dialogue et est associé au dossier chiffré. Lorsque l'utilisateur appuie sur le bouton « Ouvert », une unité de réception (25) reçoit cette opération de pression et détermine si un réglage dissimulé a été mis sur « Marche » pour le dossier associé au bouton « Ouvert ». Si le réglage dissimulé a été mis sur « Marche » pour le dossier, alors une unité de développement (26) développe le dossier et affiche le dossier développé dans une fenêtre d'affichage. Une unité de commande de déchiffrement (27) déchiffre ensuite les fichiers dans le dossier selon un ordre prédéterminé.
PCT/JP2015/072792 2015-08-11 2015-08-11 Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données WO2017026055A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2015/072792 WO2017026055A1 (fr) 2015-08-11 2015-08-11 Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données
JP2017534075A JP6544431B2 (ja) 2015-08-11 2015-08-11 情報処理装置、データ表示方法及びデータ表示プログラム

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2015/072792 WO2017026055A1 (fr) 2015-08-11 2015-08-11 Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données

Publications (1)

Publication Number Publication Date
WO2017026055A1 true WO2017026055A1 (fr) 2017-02-16

Family

ID=57983600

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/072792 WO2017026055A1 (fr) 2015-08-11 2015-08-11 Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données

Country Status (2)

Country Link
JP (1) JP6544431B2 (fr)
WO (1) WO2017026055A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09204330A (ja) * 1995-10-26 1997-08-05 Hitachi Ltd 情報の暗号化、復合化装置および方法
WO2001052472A1 (fr) * 2000-01-14 2001-07-19 Mitsubishi Denki Kabushiki Kaisha Procede et dispositif pour chiffrement, procede et dispositif pour dechiffrement, et support lisible sur machine pour l'enregistrement de programme
JP2009076004A (ja) * 2007-09-25 2009-04-09 Sharp Corp 印刷システム
JP2010097550A (ja) * 2008-10-20 2010-04-30 Intelligent Software:Kk ウイルス防止プログラム、コンピュータに着脱可能な記憶装置、及びウイルス防止方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07110747A (ja) * 1993-10-13 1995-04-25 Sumitomo Heavy Ind Ltd データ表示方法
JP2002073694A (ja) * 2000-08-30 2002-03-12 Yoshikazu Ando 画像情報表示装置および方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09204330A (ja) * 1995-10-26 1997-08-05 Hitachi Ltd 情報の暗号化、復合化装置および方法
WO2001052472A1 (fr) * 2000-01-14 2001-07-19 Mitsubishi Denki Kabushiki Kaisha Procede et dispositif pour chiffrement, procede et dispositif pour dechiffrement, et support lisible sur machine pour l'enregistrement de programme
JP2009076004A (ja) * 2007-09-25 2009-04-09 Sharp Corp 印刷システム
JP2010097550A (ja) * 2008-10-20 2010-04-30 Intelligent Software:Kk ウイルス防止プログラム、コンピュータに着脱可能な記憶装置、及びウイルス防止方法

Also Published As

Publication number Publication date
JPWO2017026055A1 (ja) 2018-02-15
JP6544431B2 (ja) 2019-07-17

Similar Documents

Publication Publication Date Title
JP6061171B1 (ja) コンピュータプログラム、秘密管理方法及びシステム
US7962755B2 (en) System and method for biometrically secured, transparent encryption and decryption
US8051142B2 (en) Computer program and method for granting multiple users access to a secure repository
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
KR20110128567A (ko) 사용자 인터페이스에 포함되는 오브젝트의 제어 방법 및 상기 방법이 채용된 장치
WO2005078587A1 (fr) Système informatique et procédé d’archivage/extraction de fichiers
AU2014296756B2 (en) Coerced encryption on connected devices
JP2011138446A (ja) 暗号化されて独立したファイル群を、専用の操作画面で簡易に操作可能なファイル暗号化システム
US10977383B2 (en) Systems, methods, and devices for encrypting database data
JP4707748B2 (ja) 外部記憶デバイス、外部記憶デバイスに記憶されたデータを処理するための方法、プログラムおよび情報処理装置
JP2005174211A (ja) 情報処理装置及び情報処理方法
JP6458866B2 (ja) 情報処理装置、復号化方法及び復号化プログラム
WO2017026055A1 (fr) Dispositif de traitement d'informations, procédé d'affichage de données et programme d'affichage de données
US20210006634A1 (en) Secure and private web browsing system and method
CN111309698A (zh) 磁盘重定向方法、装置和系统
JP2009230587A (ja) 電子計算機のデータ管理方法、そのためのプログラム
JP2008077600A (ja) シンクライアント、シンクライアントシステム、及びプログラム
JP2007102661A (ja) データ、ファイルの暗号化管理方法、および、暗号化管理プログラム
JP5646382B2 (ja) コンテンツ編集装置、コンテンツ編集方法及びコンテンツ編集プログラム
US20080253559A1 (en) Data Security Method, System and Storage Medium for Preventing a Desktop Search Tool from Exposing Encrypted Data
JP2007012022A (ja) セキュリティプログラム及びセキュリティシステム
JP4128982B2 (ja) 情報処理装置及びその情報処理方法、コンピュータプログラム及び記憶媒体
WO2017009988A1 (fr) Dispositif de traitement d'informations, procédé de dissimulation de données, et programme de dissimulation de données
KR102702029B1 (ko) Dpapi 기반 데이터 재생성을 통한 클라우드 데이터 획득 장치 및 방법
JP5443231B2 (ja) 情報処理装置、情報処理方法及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15901009

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017534075

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15901009

Country of ref document: EP

Kind code of ref document: A1