发明名称 Method of managing sensitive data in mobile terminal and escrow server for performing same
摘要 A method of managing the sensitive data of a mobile terminal and an escrow server for performing the method are disclosed. In the method of managing the sensitive data of a mobile terminal, an escrow server receives a request for registration from a mobile terminal, a user key is generated in response to the request for registration, a user virtual folder adapted to store the sensitive data of the mobile terminal is generated, encrypted sensitive data is received from the mobile terminal if the mobile terminal determines to store the sensitive data in the escrow server, and the encrypted sensitive data is re-encrypted and stored in the user virtual folder.
申请公布号 US9479333(B2) 申请公布日期 2016.10.25
申请号 US201414451546 申请日期 2014.08.05
申请人 ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE 发明人 Park Suwan
分类号 G06F1/26;H04L9/08;H04L29/06;G06F21/62;H04W12/02;H04W12/04;H04L29/08 主分类号 G06F1/26
代理机构 Staas & Halsey LLP 代理人 Staas & Halsey LLP
主权项 1. A method of managing sensitive data of a mobile terminal, comprising: receiving, by an escrow server comprising a hardware processor, a request for registration from the mobile terminal; generating a user key in response to the request for registration; generating a user virtual folder adapted to store the sensitive data of the mobile terminal; receiving encrypted sensitive data from the mobile terminal when the mobile terminal determines to store the sensitive data in the escrow server; and re-encrypting the encrypted sensitive data and storing the re-encrypted sensitive data in the user virtual folder, wherein storing the re-encrypted sensitive data in the user virtual folder comprises performing, by the escrow server, verification of validity of software installed on the mobile terminal, and wherein performing the verification of the validity comprises: comparing, via the hardware processor, a hash value of the software to a reference hash value stored in the escrow server;determining the software to be legitimate when, as a result of the comparison, the hash value of the software is found to be identical to the reference hash value, and determining the software to be illegitimate when, as a result of the comparison, the hash value of the software is found to be different from the reference hash value; andsending a result of the determination to the mobile terminal.
地址 Daejeon KR