摘要 |
A method and a system of managing information security for a mobile device in a restricted area based on location information regarding the mobile device are provided. The method includes receiving, by the mobile device, a request for the execution of an application program in a restricted area from a server managing the restricted area, executing, by the mobile device, the application program requested for execution when the program was set to be executable according to a security policy set to the restricted area, encrypting, by the mobile device, a file, created according to the execution of the application program, based on location information regarding the mobile device, and storing the encrypted file. |
主权项 |
1. A method for managing information security for a mobile device in a restricted area, based on location information regarding the mobile device, the method comprising:
receiving, by the mobile device, a request for the execution of an application program in a restricted area from a server managing the restricted area; executing, by the mobile device, the application program requested for execution when the program is set to be executable according to a security policy set to the restricted area; encrypting, by the mobile device, a file, created according to the execution of the application program, based on location information regarding the mobile device, the encrypted file including a flag indicating whether the encrypted file is created while the mobile device is in the restricted area; storing the encrypted file; receiving, by the mobile device, when the mobile device is located in the restricted area, a request for the execution of the encrypted file; requesting, by the mobile device, when the encrypted file requested for execution is created while the mobile device is in the restricted area, a decryption key for executing the encrypted file from the server; and receiving, by the mobile device, the decryption key from the server, decrypting the encrypted file via the received decryption key, and executing the decrypted file, wherein the encrypted file comprises:
a header; andencrypted data following the header, wherein the header comprises:
the flag; andthe location information for identifying at least one of an encryption key and the decryption key, and wherein the flag indicates whether the location information includes information regarding a location where the encrypted file is created. |