Supercharge Your Innovation With Domain-Expert AI Agents!

File management system and method, and mobile terminal

A file management system and a portable terminal technology, applied in the field of portable terminal devices, can solve problems such as inability to extract information

Inactive Publication Date: 2012-07-11
HITACHI SOFTWARE ENG
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when storing confidential files in the secondary storage device of the user terminal, the extraction of confidential data is restricted by encrypting the files
In this method, even if the file is extracted, the information itself cannot be extracted because it is encrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File management system and method, and mobile terminal
  • File management system and method, and mobile terminal
  • File management system and method, and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0047] (1) Structure of data management system

[0048] figure 1 It is a figure which shows the schematic structure of the data management system of 1st Embodiment of this invention. Such as figure 1 As shown, the data management system has a file server 100, a user terminal 101, a mobile phone (not limited to a mobile phone, but also a portable terminal such as a PDA with a communication function) 102, and a mobile management server 103. In addition, the file server 100 and the user terminal 101 can communicate via the Internet 104 , and the mobile phone 102 and the mobile management server 103 can communicate via the wireless telephone line network 106 .

[0049] In an environment where the Internet 104 is available, the user terminal 101 can manage confidential data by communicating with the file server 100, but in an environment where the Internet 104 is not available, the mobile phone 102 can manage confidential data. Since confidential data can be managed by a mobile ...

no. 2 approach

[0070] (1) Structure of data management system

[0071] Figure 6 It is a figure which shows the schematic structure of the data management system of 2nd Embodiment of this invention. The second embodiment relates to a confidential data management method using an existing PC. Therefore, although the security level is lower than that of the first embodiment, it is more convenient to use than the first embodiment. In addition, in this embodiment, trust in the user is assumed.

[0072]In the data management system of this embodiment, the difference from the first embodiment is that the user terminal 600 is an existing PC, and writing control to the secondary storage device 608 or to an external storage medium is not performed.

[0073] Such as Figure 6 As shown, the data management system has a user terminal 600 , a mobile phone (not limited to a mobile phone, but also a portable terminal such as a PDA with a communication function) 601 and a mobile management server 602 . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a system in which writing into a secondary storage or writing into an external storage medium is inhibited to prevent the leak and loss of confidential information, created confidential data is stored in a safe manner with no fear of loss of the data when the data cannot be stored in a file server since communication is not available. For this purpose, first, a specified folder is created on anonvolatile memory for storage built in a mobile terminal to store created confidential data. Then, access control is performed over the specified folder by a filter driver to prevent information leak by a malicious user using an application in a mobile phone. Further, a function of deleting data in the specified folder in the mobile terminal from a mobile terminal management server via a telephone line network prevents the loss of the stored confidential data due to the loss of the mobile terminal.

Description

technical field [0001] The present invention relates to a file management system and method, and a portable terminal device. For example, it relates to a method for safely storing data in an environment where a communication function cannot be used in a user terminal device and a generated confidential file cannot be stored in a file server. Background technique [0002] Currently, when a confidential file is stored in a secondary storage device of a user terminal, extraction of the confidential data is restricted by encrypting the file. In this method, even if the file is extracted, the information itself cannot be extracted because it is encrypted. For example, in Patent Document 1, an automatic file encryption system that is highly convenient for users is realized by automatically performing encryption and decryption processing in file I / O processing of the OS. Also, confidential file editing can be performed by performing access control to an external storage medium or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/00G06F21/44G06F21/60G06F21/62H04W12/08
CPCG06F21/6245H04L63/101H04W12/12H04W12/08H04W12/082H04W12/126
Inventor 桐畑康裕大浜伸之
Owner HITACHI SOFTWARE ENG
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More