SYSTEM AND METHOD FOR CONTROLLING EXIT OF SAVED DATA FROM SECURITY ZONE
First Claim
1. A system for controlling exit of saved data from a security zone, comprising an access control device, the access control device comprising an access detection module for detecting access of an application to a security zone and access of an application to a general zone, a target checking module for comparing the application, detected by the access detection module, with a list and then controlling access of the application to the security zone and access of the application to the general zone, and a processing control module for controlling writing of data of the application to the general zone.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for controlling exit of saved data from a security zone, comprising an access control device, the access control device comprising an access detection module for detecting access of an application to a security zone and access of an application to a general zone, a target checking module for comparing the application, detected by the access detection module, with a list and then controlling access of the application to the security zone and access of the application to the general zone, and a processing control module for controlling writing of data of the application to the general zone.
-
Citations
14 Claims
- 1. A system for controlling exit of saved data from a security zone, comprising an access control device, the access control device comprising an access detection module for detecting access of an application to a security zone and access of an application to a general zone, a target checking module for comparing the application, detected by the access detection module, with a list and then controlling access of the application to the security zone and access of the application to the general zone, and a processing control module for controlling writing of data of the application to the general zone.
-
9. A method of controlling exit of saved data from a security zone, comprising:
-
an access detecting step of an access detection module detecting access of an application to a general zone and access of an application to a security zone; a list checking step of a target checking module checking the application and a zone, access to which is being attempted by the application; and a data processing step of a processing control module detecting a request for writing of data of the security zone to the general zone from the application, and then stopping the writing of the data. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification