Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for protecting confidential file of security countermeasure application and confidential file protection device

A technology for confidential documents and protection devices, applied in secure communication devices, computer security devices, electrical components, etc., can solve problems such as stealing personal information, and achieve the effect of reducing the frequency of issuance and ensuring protection.

Active Publication Date: 2008-07-02
HITACHI SOFTWARE ENG
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It should be understood that it is possible to illegally steal personal information by attacking security holes in security countermeasure applications, tampering with definition information such as work environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting confidential file of security countermeasure application and confidential file protection device
  • Method for protecting confidential file of security countermeasure application and confidential file protection device
  • Method for protecting confidential file of security countermeasure application and confidential file protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Hereinafter, with reference to the drawings, a mode for carrying out the present invention will be specifically explained.

[0039] FIG. 1 is a block diagram showing the functions of an embodiment of a computer (secret file protection device) to which the present invention is applied.

[0040] The computer 1 includes a keyboard 2, a mouse 3, a display 4, a CPU 5, an external storage device 6, and a memory 7. The memory 7 stores a security countermeasure application 8 that is the object of protection in the present invention. In addition, business applications 9 used in various businesses are stored.

[0041] In addition, a confidential file 10 authentication / file I / O capture module 11 for protecting the security countermeasure application 8 is stored.

[0042] The authentication and file I / O capture module 11 includes an authentication application management table 111, which captures the authentication and file I / O commands of the security countermeasure application 8 or ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A confidential file protecting method for a security measure application is provided that can restrain degradation in the performance of a security measure application, and surely protect a confidential file. The confidential file protecting method for a security measure application according to the present invention is characterized by comprising: a first step of communicating between a authentication module for authenticating an application requesting access to the confidential file and a communication module implemented in the security measure application, and authenticating the application as an application permitted to access the confidential file and recording the application as an authenticated application in a management table if the communication module sends back a valid response code; and a second step by said authentication module, of permitting the request to access to said confidential file to access if the access requesting application is an authenticated application that has been recorded in said management table.

Description

Technical field [0001] The present invention relates to a method and device for protecting confidential files applied by security measures by controlling access to confidential information applied by security measures by application unit. Background technique [0002] In recent years, incidents of leakage of important personal information such as the outflow of customer information have frequently occurred. For companies, the protection of customer information has become a major concern. [0003] In addition, since April 2005, the personal information protection law has been fully implemented for private business owners, so there has been a rapid increase in interest in the application of security measures. [0004] In the application of security countermeasures, it goes without saying that it is important to prevent the leakage of personal information and protect the confidential information of the application itself (work environment definition information or policy definition ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/22H04L9/32G06F21/62G06F21/12
CPCG06F2221/2103H04L9/3271H04L63/0428H04L63/08G06F21/629G06F2221/2137G06F2221/2141
Inventor 原田建树熊谷仁志
Owner HITACHI SOFTWARE ENG