会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 9. 发明授权
    • Method and system for preventing information leakage based on telephone
    • US09736161B2
    • 2017-08-15
    • US14899116
    • 2014-06-16
    • THINKAT CO., LTD.
    • Wha Cheol JangJe Kee ParkGwang Ho Ko
    • H04L29/06G06F21/43G06F21/62
    • H04L63/10G06F21/43G06F21/6209H04L63/0428H04L63/20H04W12/06H04W12/12
    • The present invention relates to a method and a system for preventing an information leakage based on a telephone authentication. The present invention includes a first step in which a telephone-authentication data-loss-prevention (DLP) file policy is set by a generator as a user of a user terminal assembly including a server-connection terminal through using the server-connection terminal and the server-connection terminal sends the telephone-authentication DLP file policy and requests a generation of a telephone-authentication DLP file to a DLP server assembly through an internet network; a second step in which the DLP server assembly generates a contents identification (CID) by using information including the telephone-authentication DLP file policy and stores a telephone-authentication DLP file information including the CID and the telephone-authentication DLP file policy; and a third step in which the server-connection terminal or the DLP server assembly generates the telephone-authentication DLP file, wherein the telephone-authentication DLP file including the CID as a header of an original data file that is a general file. A telephone authentication is needed when a reader reads the generated telephone-authentication DLP file.The method and the system for preventing the information leakage based on the telephone authentication according to an embodiment of the present invention, secure can be effectively enhanced by combining a DLP and a telephone authentication. Also, even though data is leaked, a location of the data can be known through the telephone authentication. Also, encryption of all kinds of data such as personal information, a general document, and so on is possible. Thus, applicable objects and scopes can be broadened.