Search

KR-20260063535-A - Method and system for preventing leakage of image file of mobile communication terminal based on authentication

KR20260063535AKR 20260063535 AKR20260063535 AKR 20260063535AKR-20260063535-A

Abstract

A method and system for preventing the leakage of image files of a mobile communication terminal are disclosed. An authentication-based method for preventing leakage of a mobile communication terminal image file according to an embodiment of the present invention comprises: (a) a step in which a slave terminal creates a first converted image file by inserting watermark information including a first user key identifying a master terminal user and a second user key identifying a slave terminal user into an image file captured through the camera of the slave terminal; (b) a step in which the slave terminal transmits image file information including the watermark information of the first converted image file to a master terminal to perform an authentication procedure for the access rights of the slave terminal user to the first converted image file, and receives grade information indicating the access rights grade of the slave terminal user from the master terminal; and (c) a step in which, if the access rights grade indicated in the received grade information is a first grade, the slave terminal encrypts the first converted image file, and if the access rights grade indicated in the received grade information is a second grade, the slave terminal inserts an image security program into the first converted image file to create a second converted image file.

Inventors

  • 백진호
  • 신춘일

Assignees

  • 주식회사 수퍼블리

Dates

Publication Date
20260507
Application Date
20241030

Claims (6)

  1. An authentication-based method for preventing leakage of image files in a mobile communication terminal, wherein the method prevents the leakage of an image file captured through a camera of a slave terminal among mobile communication terminals comprising a master terminal and at least one slave terminal, (a) a step in which the slave terminal generates a first converted image file by inserting watermark information including a first user key identifying a master terminal user and a second user key identifying a slave terminal user into an image file captured through the camera of the slave terminal; (b) the slave terminal transmits image file information including watermark information of the first converted image file to the master terminal to perform an access authorization procedure for the slave terminal user regarding the first converted image file, and receives level information indicating the access authorization level of the slave terminal user from the master terminal; and An authentication-based method for preventing leakage of mobile communication terminal image files, comprising the step (c) in which if the access authority level indicated in the received level information is level 1, the slave terminal encrypts the first converted image file, and if the access authority level indicated in the received level information is level 2, the slave terminal inserts an image security program into the first converted image file to generate a second converted image file.
  2. In paragraph 1, The above method is characterized by further including, prior to step (a), the step of the slave terminal receiving the first user key from the master terminal and receiving the second user key from the management server, in an authentication-based method for preventing leakage of mobile communication terminal image files.
  3. In paragraph 1, The image file information transmitted by the slave terminal to the master terminal in step (b) above further includes location information indicating the shooting location of the image file, and The above step (b) is characterized by including the step of, if the distance between the shooting location according to the location information and the master terminal is greater than or equal to a reference value, the master terminal authenticates the access rights of the slave terminal user to the first converted image file, and if the distance between the shooting location according to the location information and the master terminal is less than the reference value, the master terminal authenticates the access rights of the slave terminal user to the second converted image file.
  4. In paragraph 1, An authentication-based method for preventing image file leakage in a mobile communication terminal, characterized in that the image security program inserted in step (c) above is configured to obtain the URL (Uniform Resource Locator) of the web page and transmit it to a management server when the image file in which the image security program is inserted is loaded on a web page.
  5. In paragraph 4, An authentication-based method for preventing image file leakage of a mobile communication terminal, characterized in that the image security program is configured to mask the image of an image file loaded on the web page when a masking execution command is received from the management server.
  6. A computer program recorded on a recording medium as a computer program that executes a method according to any one of paragraphs 1 through 5 through a computer system.

Description

Method and system for preventing leakage of image file of mobile communication terminal based on authentication The present invention relates to an authentication-based method and system for preventing the leakage of image files of a mobile communication terminal, and more specifically, to a method and system for preventing the leakage of image files of a mobile communication terminal image file that is captured through a camera of a slave terminal among mobile communication terminals comprising a master terminal and at least one slave terminal. Recently, as the use of mobile communication devices equipped with camera functions, such as mobile phones and smartphones, has become commonplace, interest in and demand for technologies to prevent illegal filming, such as so-called voyeurism, as well as the leakage or unauthorized distribution of captured image files, are surging. However, as disclosed in Korean Registered Patent Publication No. 10-0653303, existing technology that restricts camera shooting of mobile communication terminals has the problem that it cannot prevent the leakage or unauthorized distribution of already captured image files. Furthermore, as disclosed in Korean Published Patent Application No. 10-2005-0026653, existing technology that simply inserts a watermark into an image captured by a mobile phone camera has the problem that it can only detect information about the illegal photographer who took the image, but cannot provide information about illegal users who are using image files that have already been leaked or distributed without authorization, nor can it technically restrict the use of said image files. FIG. 1 is a diagram showing a mobile communication terminal image file leakage prevention system according to one embodiment of the present invention. FIG. 2 is a block diagram showing a mobile communication terminal of a mobile communication terminal image file leakage prevention system according to one embodiment of the present invention. FIG. 3 is a flowchart illustrating the user authentication and user key issuance process of a method for preventing image file leakage of a mobile communication terminal according to an embodiment of the present invention. FIG. 4 is a flowchart illustrating an image file conversion process of a method for preventing image file leakage of a mobile communication terminal according to an embodiment of the present invention. Figure 5 is a diagram showing an example of an image security program inserted into an image file. FIG. 6 is a flowchart illustrating the control process between a master terminal and a slave terminal of a method for preventing image file leakage of a mobile communication terminal according to an embodiment of the present invention. Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings to clarify solutions to the technical problems of the present invention. However, in describing the present invention, if a description of related prior art would obscure the essence of the present invention, such description will be omitted. Furthermore, terms used in this specification are defined considering their functions in the present invention, and these may vary depending on the intentions or conventions of designers, manufacturers, etc. Therefore, the definitions of terms described below should be based on the content throughout this specification. FIG. 1 illustrates a mobile communication terminal image file leakage prevention system according to one embodiment of the present invention. As illustrated in FIG. 1, a mobile communication terminal image file leakage prevention system according to one embodiment of the present invention includes a mobile communication terminal (10) having a camera function and an image file management server (20), and may further include an authentication server (30), a web server (40), etc., depending on the embodiment. A mobile communication terminal (10) is a terminal having a camera function and can be configured as a communication device of various forms, such as a mobile phone, smartphone, tablet PC, laptop, or PDA (Personal Digital Assistant). The mobile communication terminal (10) takes photos or videos through the camera and stores the captured image files. The image file management server (20) is a server that performs data communication with a mobile communication terminal (10) and provides image file management services to a service subscriber user. The authentication server (30) is a server that performs user authentication, receives user information directly from a mobile communication terminal (10) or through an image file management server (20), and verifies the received user information to perform authentication for the corresponding user. According to an embodiment, the authentication server (30) may be integrated with the image file management server (20). The web server (40) is a server that provides various web pages to