KR20170034963A - Data security management system - Google Patents
Data security management system Download PDFInfo
- Publication number
- KR20170034963A KR20170034963A KR1020150132889A KR20150132889A KR20170034963A KR 20170034963 A KR20170034963 A KR 20170034963A KR 1020150132889 A KR1020150132889 A KR 1020150132889A KR 20150132889 A KR20150132889 A KR 20150132889A KR 20170034963 A KR20170034963 A KR 20170034963A
- Authority
- KR
- South Korea
- Prior art keywords
- communication terminal
- security management
- personal communication
- security
- terminal
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/12—Arrangements for remote connection or disconnection of substations or of equipment thereof
-
- H04L51/24—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
- H04W88/182—Network node acting on behalf of an other network entity, e.g. proxy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
The present invention relates to a data security management system, and more particularly, it relates to a data security management system that controls security for a personal communication terminal such as a smart phone carried by a worker or a visitor in a security-requiring area such as a research institute, To a security control system and method for a personal communication terminal.
Recent developments in technology have led to the emergence of smart devices such as private communication terminals, which are becoming an important issue in businesses and research centers.
Conventional techniques are not out of the technical limit. In order to solve this problem, a method for managing a security event, a system for configuring a security event manager as a system, receiving security event data from a plurality of security event sources of the mobile device, and determining whether a security event has occurred Discloses a technique for comparing security event data based on a security policy and responding to a security event based on the security policy. However, it can not provide security specific to the business environment, and there is a limit in imposing a security action according to the management grade.
In order to achieve this, it is possible to provide a differential security policy for the security events that occur according to the use of the mobile terminal through various steps, and to provide different strong security. However, there was no way to control personal communication devices and to know where these spills were coming from.
In order to solve the above problem, the idea is to establish a security control policy for a personal communication terminal such as a smart phone carried by a worker or a visitor in a secure area requiring security such as a research center, It is possible to prevent the leakage of information using the personal communication terminal by restricting the data use of the personal communication terminal located in the security zone based on the security of the personal communication terminal, And can be set by reflecting the location of the personal communication terminal, the information of the related departments, the security level, etc., and aims at a data security management system capable of carrying out mobile security with more flexibility and securing the conformity.
The security control system of a personal communication terminal according to the present invention is a system for registering user information of a personal communication terminal existing in a security zone and information of the personal communication terminal in a server and installing security control software in the personal communication terminal through wireless communication The position of the personal communication terminal can be checked in real time on the security management server by controlling the personal communication terminal, so that the position can be grasped when the data leakage is detected, and the data leaked to the personal communication terminal due to the high security control software And is automatically deleted.
The present invention relates to a data security management system for registering user identification information and personal communication terminal information in a security management server with respect to a personal communication terminal possessed by a worker or a visitor in a secure area such as a corporation, The location information of the personal communication terminal registered through the security control software installed through the security management server and the data leaked to the personal communication terminal are automatically deleted so that the data leakage through the personal communication terminal It can prevent security threats such as virus spreading, and it can detect the location even if security threats occur, so it can catch the criminal.
1 is a reference diagram for explaining a data security management system of the present invention.
2 is a configuration diagram showing an embodiment of the data security management server of the present invention.
3 is a configuration diagram showing an embodiment of a personal communication terminal of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings.
1 is a reference diagram for explaining a data security management system of the present invention.
The operation of each component of the data security management system will now be described in detail with reference to FIG. The data security management system comprises at least one
The
The
The
The
2 is a configuration diagram showing an embodiment of the data security management server of the present invention.
An embodiment of the
The
The
The
The security
The
The
Here, the GPS receiver receives the signals transmitted from three or more GPS satellites to determine the positions of the satellites and the receivers. If you measure the time difference between the signal transmitted from the satellite and the signal received from the receiver, you can obtain the distance between the satellite and the receiver. Once you know the distance to at least three satellites and the position of each satellite, you can calculate the position of the receiver using the same method as for the trilateration. However, since the clock is not completely accurate, it is usually a system that uses four or more satellites to determine the position to compensate for the error.
The
The
The
3 is a configuration diagram showing an embodiment of a personal communication terminal of the present invention.
Hereinafter, an embodiment of the
The
The control (OS) 21 controls all the parts of the
The communication unit 22 is a device capable of mutual transmission and reception with the
When the
The
The
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. . Therefore, the true scope of protection of the present invention should be defined only by the appended claims.
10: security management server
11:
12; Security management control unit
13: Database
13a: Security control S / W for terminal
13b: Terminal location information
13c: Terminal information
20: Personal communication terminal
21: Control (OS)
22:
23:
24:
25: Output section
30: Wireless communication
Claims (4)
A personal communication terminal 20 for registering and controlling information in the security management server 10 and outputting a warning message sent from the security management server 10 at the time of data leakage;
And a wireless communication (30) enabling the security management server (10) to communicate the command of the personal communication terminal (20).
The personal communication terminal 20 manages and controls illegal actions such as leakage of information and controls the personal communication terminal 20 by controlling the communication with the personal communication terminal 20 via the communication unit 11 and the wireless communication 30, The personal communication terminal 20 can be remotely controlled by the communication unit 11 and the wireless communication 30 so that the position of the personal communication terminal 20 can be monitored in real time. A security management control unit (12) which is a device for sending an instruction to a user;
And a database (13) in which all data are stored.
Terminal position information 13b which is received by the communication unit 11, grasps the position in real time in the security management control unit 12 and stores information in the database 13;
And terminal information (13c) in which information of the personal communication terminal (20) is stored when the personal communication terminal (20) is registered in the security management server (10).
A communication unit 22 as a device capable of mutual transmission and reception with the security management server 10 through the wireless communication 30 and the communication unit 11;
When the personal communication terminal 20 registers with the security management server 10, the personal security management controller 12 issues a command to the communication unit 11 to transmit the command from the personal communication terminal 20 to the terminal A memory unit 23 which is a device in which the security control S / W 13a is stored;
An input unit 24 for inputting a control command sent from the security management server 10 through the communication unit 21;
And an output unit 25 for outputting a control command sent from the security management server 10 through the communication unit 21 through the input unit 24 on a sound or a screen to confirm a warning message about data leakage Features a data security management system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150132889A KR20170034963A (en) | 2015-09-21 | 2015-09-21 | Data security management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150132889A KR20170034963A (en) | 2015-09-21 | 2015-09-21 | Data security management system |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170034963A true KR20170034963A (en) | 2017-03-30 |
Family
ID=58503105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150132889A KR20170034963A (en) | 2015-09-21 | 2015-09-21 | Data security management system |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170034963A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20100135036A (en) | 2009-06-16 | 2010-12-24 | ( 주 ) 화신 | Kingpin assembly device for vehicle |
KR20130058863A (en) | 2011-11-28 | 2013-06-05 | 박찬홍 | Blanket for knee having travel map playing yut board |
-
2015
- 2015-09-21 KR KR1020150132889A patent/KR20170034963A/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20100135036A (en) | 2009-06-16 | 2010-12-24 | ( 주 ) 화신 | Kingpin assembly device for vehicle |
KR20130058863A (en) | 2011-11-28 | 2013-06-05 | 박찬홍 | Blanket for knee having travel map playing yut board |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101608639B1 (en) | Total smart system for information security | |
US11405750B2 (en) | System and method for detecting and locating contraband devices in a secure environment | |
US9232345B1 (en) | Close proximity vehicular data transmission | |
EP3188936B1 (en) | Key module | |
JP6630679B2 (en) | Secure current movement indicator | |
CN107331213B (en) | Unmanned aerial vehicle supervision method and system | |
CN105306204A (en) | Security verification method, device and system | |
JP2016012364A (en) | Method and system for remote management of security system | |
KR20120031787A (en) | Securety and management system using real time location system in smart building | |
KR101518929B1 (en) | Method and system for protecting hacking of vehicle using telematics | |
KR20150098702A (en) | Patrol Management System Using Near Field Communication | |
EP3123665B1 (en) | Network node security using short range communication | |
CN210072356U (en) | Extended operator control unit display system and operator control unit | |
JP7286329B2 (en) | radio system | |
KR101972655B1 (en) | Security system for detecting a resident by using verification technology of ultrasound signal | |
KR20170034963A (en) | Data security management system | |
US10419484B2 (en) | System and method for communicating with security devices within secure networks | |
KR20150136791A (en) | Authentication and access control system to use indoor LBS | |
US9877152B2 (en) | Auto-locate operation | |
CN112514329B (en) | Operation constraints for operating functions of field devices | |
CN108987930B (en) | Antenna with a shield | |
JP2010130028A (en) | Rfid tag communication device and rfid tag communication system | |
KR101657087B1 (en) | Method and system for personal authentication using beacon | |
KR20240083142A (en) | Integrated Public Sector Smart Information Security System | |
KR101588603B1 (en) | Security features provided with a mobile two-way text sending and receiving system |