DOI QR코드

DOI QR Code

Implementation of anti-screen capture modules for privacy protection

개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현

  • Received : 2013.10.19
  • Accepted : 2013.11.25
  • Published : 2014.01.31

Abstract

According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.

최근 컴퓨터의 보급과 정보사회의 발달로 인해 개인 신상 정보에 대한 관심이 증대되고, 이와 관련된 정책과 기술이 발전함에 따라서 개인 신상 정보를 보호하려는 시도가 다양하게 이루어지고 있다. 본 논문에서는 컴퓨터를 사용하면서, 개인의 중요한 자료나 신상정보 또는 회사의 기밀 내용을 다루는 기관 및 부서를 대상으로 중요한 자료와 신상정보 및 회사의 기밀을 보호하는 방안을 제안 하였다. 결과적으로 공공기관 또는 개인 컴퓨터 내에서 타인의 정보를 악의적으로 도용하거나 도취하는 것을 방지하고, 기관 내의 시스템들 사이에서 정보가 오가는 동안 중요한 자료와 신상 정보들의 노출을 1차적으로 막을 수 있다.

Keywords

References

  1. S. Y. Shin and T. K. Kwon, "A Study of HCI technologies for privacy", Review of KIISE Korea Institute of Information Science and Engineers, vol. 27, no. 12, pp. 68-77, Dec. 2009.
  2. T. H. Hwang, Security incidents Dilemma. KT can not see a solution specifically, [Internet]. Available: http://search.etnews.com/etnews, 2012. 07. 31
  3. J. J. Lee, MBC Information gathering program went out to financial transactions, and medical information, [Internet]. Available: http:// www.mediatoday.co.kr/news/MediaToday, 2012. 09. 24.
  4. M. J. Back, Goes out personal privacy by App stomach, [Internet]. Available: http: //www.focus.co.kr
  5. Y. I Cho, "Information Privacy and Intelligent Agency Technology," Review of Korean Institute of Information Technology, vol. 6, no. 1, pp. 29-35, Jan. 2008.
  6. Y. H Shin and J. C. Ryou, "Study on adoption of suitable encryption scheme according to data properties on MySQL Database," Proc. of the KIISE Korea Computer Congress 2010, vol. 37, no. 1(D), pp. 77-80, Jan. 2010.
  7. C. S. Ahn and J. G. Shon, "Design and Implementation of a Hooking Client for Document Security in File Sharing Environments based on SMB Protocol," Proc. of the KIISE Korea Computer Congress 2009, vol. 36, no. 1(D), pp. 61-65, Jan. 2009.
  8. J. H. Park, N W. Jo, K. H. Lee and I. H. Choi, "Development of Personal Information Protection Systems in company," Review of KIISC Korea Institute of Information Security and Cryptology, vol. 18, no. 6, pp. 28-33, Jun. 2008.
  9. D. R. Kim, K. C. Sim and M. S. Jeon, "Personal information protection system compared to the Privacy Act," Review of KIISC Korea Institute of Information Security and Cryptology, vol. 21, no. 6, pp. 16-23, Jun. 2011.
  10. Y. N. Shin and M. G. Chun, "Personal Information Protection for Biometric Verification based TeleHealth Services," Korean Institute of Intelligent Systems, Vol. 20, No. 5, pp. 659-664, Oct. 2010. https://doi.org/10.5391/JKIIS.2010.20.5.659
  11. NIST, "NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing," 2011. 01.
  12. NIST, "NIST SP 800-145 The NIST Definition of Cloud Computing," 2011. 01.
  13. NIST, "NIST SP 800-146 Cloud Computing Synopsis and Recommendations," 2011. 05.

Cited by

  1. Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique vol.11, pp.7, 2014, https://doi.org/10.3837/tiis.2017.07.020