The above and other objects, features and advantages of the present invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings in which:
Preferred embodiments of the present invention will be described herein below with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail.
Below, by performing an authentication process during an MTP connection between a portable terminal and a computer, the present invention provides a method and apparatus for preventing data leaks from the memory of the portable terminal. The portable terminal described below encompasses all types of portable terminals that support MTP.
Referring to
Then, the computer 202 transfers its own data (for example, an ID code) to the portable terminal 200 for authentication in step 216, and the portable terminal 200 checks the computer's 202 data to determine whether the computer has been authorized by the user of the portable terminal in step 218. If it is determined that the computer 202 has not been authorized, the connection between the portable terminal 200 and the computer 202 is terminated. If it is determined that the computer 202 has been authorized, the portable terminal 200 notifies the user that the computer 202 has been authenticated and that files may be transferred.
Next, the computer 202 requests a list of media files stored in the memory of the portable terminal 200 in step 220, and the portable terminal 200 transfers the handles of the media files stored in its memory to the computer 202 in step 222. Then, the computer 202 requests a transfer of metadata of the media files stored in the portable terminal 200 in step 224, and the portable terminal transfers the metadata of the media files stored in its memory to the computer 202 in step 226. In step 228, the portable terminal 200 and the computer 202 respectively transfer and receive the media files.
Referring to
The user authenticator 302 receives data on the currently connected computer from the controller 300, and outputs whether authentication of the computer has successfully been completed to the controller 300 after it is determined that the input data is the same as data of a computer that has been previously authenticated by a user. Also, when a user personal identification number (PIN) is input from the controller 300, the input user PIN is compared to a PIN preset by the user, and the result of whether they match is output to the controller 300.
The internal memory 304 is a memory installed inside the portable terminal, and the external memory 306 is a memory that is installable and detachable to and from the portable terminal. The internal memory 304 and external memory 306 may both store media files. Here, the internal memory 304 stores programs and various reference data for processing and controlling by the controller 300 of functions other than the media files, temporary data that is generated during the performing of the programs, various storable data, and data of computers that have successfully been authenticated according to the present invention.
The RF module 308 uses MTP to process signals that are transmitted and received for connecting to the computer. In particular, the RF module 308 of the present invention transfers and receives computer data from the computer to the controller 300, and transfers a signal through the controlling of the controller 300 that authentication of the computer has been successfully completed.
The inputter 310 has a plurality of function keys that provide data corresponding to each key pressed by a user to the controller 300. In particular, the inputter 310 receives an input of a user authentication number, and provides it to the controller 300.
The display 312 displays data on the state of operation of the portable terminal, and a limited number of characters. In the present invention, the display 312 displays whether a computer has successfully been authenticated through the controlling of the controller 300, and a message requesting that a user inputs the user authentication number.
Referring to
Next in
If the computer data is received within the predetermined timeframe, the portable terminal performs step 413, in which it compares received computer data to data of an already authenticated computer that has already been saved in the internal memory 304, and determines whether the computer is a computer that has already been successfully authenticated by the user. If the computer is a computer that has already been successfully authenticated, the portable terminal performs step 415 in which it signals that the computer has successfully been authenticated and media files may be transferred. Then, the portable terminal checks in step 417 whether transfer of data on stored media files is requested by the computer. If transfer of data on the stored media files is requested, the portable terminal performs step 419 in which it transfers data on media files stored in the internal and external memories, and then transfers the media files to the computer in step 421.
Then, the portable terminal ends the process of the present invention.
On the other hand, if the computer is determined in step 413 not to be a computer that has successfully been authenticated (that is, if the received computer data and the data of the authenticated computer pre-stored in the internal memory 304 do not match), the portable terminal performs step 423 in which it displays a message requesting an input of a PIN on the display 312. Next, when the user inputs the PIN, the portable terminal performs step 425 in which it determines whether the inputted PIN matches a preset PIN. When the input PIN matches the preset PIN, the portable terminal saves the received computer data in the internal memory 304 in step 427, and performs step 415.
Conversely, if it is determined step 425 that the input PIN does not match the preset PIN, the portable terminal counts the number of times that PINs are input incorrectly, and compares the number of incorrect inputs to a maximum number of allowed incorrect inputs in step 429. If the number of incorrect inputs is less than the maximum number of allowed incorrect inputs, the portable terminal returns to step 423 and requests that the user input a PIN.
If the number of incorrect inputs exceeds the maximum number of allowed incorrect inputs, the portable terminal notifies the user in step 431 that authentication of the computer was unsuccessful, deletes the media files stored in the internal memory 304 and the external memory 306, and disconnects the connection with the computer in step 433. Here, depending on a user's settings, the portable terminal may not delete the media files stored in the internal and external memories 304 and 306, and may only cancel the connection with the computer. Additionally, a user may preset media files that the user does not wish to be leaked, so that the portable terminal deletes only a portion of the stored media files (that is, the preset media files).
Then, the portable communication terminal ends the process of the present invention.
Referring to
Next, the computer performs step 511 in which it transfers data for authenticating the computer to the portable terminal, and then performs step 513 in which it detects whether a signal notifying the user that computer authentication was successful. If a signal notifying the user that computer authentication was unsuccessful is received, the computer performs step 521 in which it cancels the connection with the portable terminal and ends the process of the present invention.
On the other hand, if a signal notifying the user that computer authentication was successful is received, the computer performs step 515 in which it requests the transfer of data on the multimedia files stored in the portable terminal, and performs step 517 in which it checks whether the data on the requested multimedia files is received. When the data on the multimedia files is received, the computer performs step 519 in which it receives the multimedia files from the portable terminal, and ends the process of the present invention.
Alternate embodiments of the present invention can also comprise computer readable codes on a computer readable medium. The computer readable medium includes any data storage device that can store data that can be read by a computer system. Examples of a computer readable medium include magnetic storage media (such as ROM, floppy disks, and hard disks, among others), optical recording media (such as CD-ROMs or DVDs), and storage mechanisms such as carrier waves (such as transmission through the Internet). The computer readable medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion. Also, functional programs, codes, and code segments for accomplishing the present invention can be construed by programmers of ordinary skill in the art to which the present invention pertains.
As described above, the present invention performs an authentication process of a computer in a portable terminal when the portable terminal is connected using MTP to the computer. Thus, by allowing transfer of data stored in the memory of the portable terminal only in cases where the computer and/or a user is authenticated, the present invention prevents data that is not intended to be leaked to others by the user from being stolen, misappropriated or leaked.
While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2006-0066288 | Jul 2006 | KR | national |