Method for protecting confidential file of security countermeasure application and confidential file protection device
A technology for confidential documents and protection devices, applied in secure communication devices, computer security devices, electrical components, etc., can solve problems such as stealing personal information, and achieve the effect of reducing the frequency of issuance and ensuring protection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Hereinafter, with reference to the drawings, a mode for carrying out the present invention will be specifically explained.
[0039] FIG. 1 is a block diagram showing the functions of an embodiment of a computer (secret file protection device) to which the present invention is applied.
[0040] The computer 1 includes a keyboard 2, a mouse 3, a display 4, a CPU 5, an external storage device 6, and a memory 7. The memory 7 stores a security countermeasure application 8 that is the object of protection in the present invention. In addition, business applications 9 used in various businesses are stored.
[0041] In addition, a confidential file 10 authentication / file I / O capture module 11 for protecting the security countermeasure application 8 is stored.
[0042] The authentication and file I / O capture module 11 includes an authentication application management table 111, which captures the authentication and file I / O commands of the security countermeasure application 8 or ot...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 