EP1949590A1 - Verfahren zum sicheren deponieren digitaler daten, diesbezügliches verfahren zum wiederherstellen digitaler daten, diesbezügliche einrichtungen zum implementieren von verfahren und system mit den einrichtungen - Google Patents

Verfahren zum sicheren deponieren digitaler daten, diesbezügliches verfahren zum wiederherstellen digitaler daten, diesbezügliche einrichtungen zum implementieren von verfahren und system mit den einrichtungen

Info

Publication number
EP1949590A1
EP1949590A1 EP06819179A EP06819179A EP1949590A1 EP 1949590 A1 EP1949590 A1 EP 1949590A1 EP 06819179 A EP06819179 A EP 06819179A EP 06819179 A EP06819179 A EP 06819179A EP 1949590 A1 EP1949590 A1 EP 1949590A1
Authority
EP
European Patent Office
Prior art keywords
data
key
party
encrypted
transfer key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP06819179A
Other languages
English (en)
French (fr)
Inventor
Eric Brier
Mathieu Ciet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemplus SCA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus SCA filed Critical Gemplus SCA
Publication of EP1949590A1 publication Critical patent/EP1949590A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the invention relates to the secure deposit of data by an applicant on a possibly insecure storage medium, and the subsequent recovery of these data by a recipient possibly unknown to the applicant, or nonexistent at the time of filing.
  • the data is digital data, or digitized analog data.
  • a first solution known as total delegation, is for the depositor to encrypt the data with a key of a trusted third party and to transmit the encrypted data to the trusted third party.
  • the recipient authenticates with the trusted third party who sends back to him the data he has previously decrypted with his key and possibly encrypted with a key provided by the recipient.
  • a second solution known as delegation of rights, is for the applicant to, on the one hand, encrypt the data with a transfer key and store the encrypted data on a storage medium accessible to the recipient and, on the other hand, on the other hand, to encrypt the transfer key with the key of the trusted third party and to transmit the encrypted transfer key to the trusted third party.
  • the recipient authenticates with the trusted third party who sends back to him the transfer key that he has previously decrypted with his key and possibly encrypted with a key provided by the recipient. The recipient will then retrieve the encrypted data on the storage medium, then decrypts it with the transfer key he has obtained from the trusted third party.
  • the encryption of the data and / or the transfer key can be achieved either by a symmetric encryption method or by an asymmetric encryption method.
  • a communication channel is required between the depositor and the trusted third party to transmit the data or at least one transfer key.
  • the trusted third party must keep information, data or at least a transfer key, for an unknown duration and possibly unlimited if the recipient does not come to recover the data. This is unrealistic if there is a large number of applicants and / or large amounts of data to keep.
  • the trusted third party has clear access to the data to be transmitted.
  • the subject of the invention is a secure data depositing method and a data recovery method which do not have the drawbacks mentioned above of the known methods.
  • the invention also relates to devices for implementing the methods of the invention.
  • the subject of the invention is a method for the secure deposit of data, during which an applicant encrypts the data with a transfer key and encrypts the transfer key with a key of a trusted third party, and then deposits the encrypted data and the encrypted transfer key on a storage medium.
  • the invention also relates to a data recovery method, in which:
  • a recipient retrieves on a storage medium encrypted data with a transfer key, and a transfer key encrypted with a key of a trusted third party,
  • the recipient authenticates with the trusted third party, ⁇ the recipient sends the encrypted transfer key to the trusted third party, • after authentication of the recipient, the trusted third party decrypts the encrypted transfer key with its key and returns the key of transfer to the recipient,
  • the invention further relates to a secure data deposit device comprising:
  • RAND random transfer key
  • the applicant has no contact with the trusted third party and does not transmit any information to him, even not a key.
  • no communication channel is not necessary between the applicant and the trusted third party and the anonymity of the applicant is guaranteed vis-à-vis the trusted third party.
  • the trusted third party does not have data to keep or information about the data. He may not even be aware that a recipient may be able to contact him one day.
  • the third party does not have clear access to the data unless it has physical access to the data storage medium.
  • FIG. 1 is a flowchart of a secure deposit method according to the invention
  • FIG. 2 is a flowchart of a data recovery method, according to the invention
  • FIG. 3 is an example of a system implementing the deposition method according to FIG. 1 and the recovery method according to FIG. 2.
  • FIG. 3 represents a system that can be used for implementing the methods according to the invention in the field of mobile communication.
  • the system of FIG. 3 allows a first user having a mobile equipment 1 with access on a communication network 2 and a personal authentication module 3 to authorize a second user (or the same first user) to use the mobile equipment 1 with a second authentication module 4 to access the communication network 2.
  • the first authentication module securely deposit in the memory of the mobile equipment data necessary to access the network 2.
  • the system thus allows the secure transfer of data from the first module to the second module through the memory of the mobile equipment.
  • the mobile equipment is a mobile phone, a terminal, a personal PC, etc.
  • the personal authentication module is a UICC card.
  • FIG. 1 represents a general flowchart of the deposition process according to the invention.
  • an applicant A encrypts data DATA with a transfer key RAND, and encrypts the transfer key RAND with a public key pkB of a trusted third party B.
  • A then stores the encrypted data E RAND (DATA) and the encrypted transfer key E pkB (RAND) on a storage medium.
  • the applicant A is a first user authentication module 3.
  • the trusted third party B is an operator operating a mobile communication network 2.
  • the operator may be a legal entity that owns the network, or the network locat ⁇ ce, or even a legal entity that outsources the operation of the network to another person.
  • the storage medium D is a memory
  • the module 3 is naturally connected to the mobile equipment 1.
  • the first authentication module 3 comprises in particular a memory 31, a random number generator 32, a first calculation means 33, a second calculation means 34, a storage means 35 and a control device 36.
  • the memory 31 stores DATA data which are in the example data necessary for the identification of the mobile equipment 1 on the communication network 2, and a public key pkB of the communication operator 2.
  • the random number generator 32 provides on request from the control device a random transfer key RAND to the first calculation means 33.
  • the first calculation means 33 is adapted to implement an asymmetric encryption method such as an RSA method ( Rivest Shamir Adelman) or a process based on elliptic curve calculations. It is used to encrypt the RAND key with the public key pkB.
  • the second calculation means 34 is adapted to implement a symmetric encryption method such as a DES (Data Encryption Standard) or AES (Advanced Encryption Standard) method. It is used to encrypt DATA data with the RAND key it receives from the random number generator.
  • the storage means 35 is adapted to store in the memory 11 of the portable equipment 1 the encrypted transfer key E pkB (RAND) and the encrypted data E RAND (DATA).
  • the control device 36 is adapted to control the operation of the memory 31, the random number generator 32, the first calculation means 33, the second calculation means 34, and the storage means 35. control device is for example activated by the user of the first authentication module.
  • the first authentication module implements the deposition method according to Figure 1 as follows.
  • control device 36 of the first module 3 In a first step, the control device 36 of the first module 3:
  • FIG. 2 represents a general flowchart of the secure data recovery method according to the invention.
  • the recipient C retrieves the encrypted data E RAND (DATA) and the encrypted transfer key E PkB (RAND) on the storage medium D.
  • the recipient C authenticates to the trusted third party B.
  • the recipient C transmits the encrypted transfer key to the trusted third party.
  • the third decrypts the encrypted transfer key E pkB (RAND) with its private key and sends the transfer key RAbJD to the recipient C.
  • the recipient C decrypts the encrypted data E RAND (DATA) with the transfer key.
  • the trusted third party B is the mobile communication operator 2
  • the recipient C is a second user authentication module 4
  • the storage medium D is the memory 11 of the user.
  • the second authentication module 4 comprises in particular a reading means 41, a communication means 42, a third calculation means 43, a memory 44 and a control device 45.
  • the reading means 41 is adapted to read in the memory 11 the encrypted data and encrypted transfer key.
  • the communication means 42 is adapted to exchange information and / or data with the mobile communication operator 2, and in particular to: ⁇ transmit to the operator personal authentication data,
  • the third calculation means 43 is adapted to decrypt the encrypted data E RAND (DATA) using the transfer key provided by the operator.
  • the data DATA can then for example be stored in a memory 44 of the second module 4.
  • the control device 45 is adapted to control the operation of the reading means 41, the communication means 42, the third calculation means 43 and the memory 44.
  • the control device 45 is for example activated by the owner of the first module authentication.
  • the recovery method according to FIG. 1 is implemented by the following way.
  • the second authentication module 4 is connected to the mobile equipment 1 for the implementation of the method.
  • control device 45 activates the reading means 41 which will read the encrypted data and the encrypted transfer key into the memory
  • control device 45 activates the communication means 42, which transmits to the operator 2 authentication information of the second module 4.
  • control device 45 activates the communication means 42, which transmits to the operator 2 the encrypted transfer key.
  • the operator 2 authenticates the second module 4.
  • the operator decrypts the transfer key with his personal private key, and returns the transfer key to the second module.
  • control device 45 activates the third calculation means which decrypts the encrypted data E RMJD (DATA) with the transfer key.
  • the trusted third party is the mobile communication operator. It could be any other person in the broadest sense: physical or moral person, but also data server, etc. It suffices that said person has a set of keys comprising a public key pkB and an associated private key, and hardware means to use it obviously.
  • the public key pkB trusted third is stored in the memory 31 of the first module 3. The said key could also be stored in the memory 11 of the mobile equipment. It could also be requested: by the module 3, to the trusted third party for example or to any other person having this key, 3 uste before its use for the encryption of the key RAND.
  • a symmetric encryption method is used to encrypt the data.
  • An asymmetric encryption method could also be used, but its implementation would be slower and more expensive than the implementation of a symmetrical method.
  • an asymmetric encryption method is used to encrypt the RAND transfer key. This prevents the applicant and the recipient from agreeing beforehand on a transfer key to use.
  • an unsecured implementation of this encryption method is sufficient and inexpensive, and easily achievable on a smart card.
  • the associated decryption method which is much more expensive, is implemented by the trusted third party which has much more substantial hardware resources such as a server.
  • the recipient C transmits to the trusted third party B information relating to his identity that the third party B checks to authenticate the recipient C or not, that is to say to validate or not the right It has thus been assumed that the third party B previously had sufficient information to authenticate the recipient C.
  • the authentication information in the example is indications of membership of the network. communication system such as a subscription number. The applicant A can thus in the example allow the use of mobile equipment to anyone with an authentication module 1 to the same network, without specifying any person explicitly.
  • the applicant A also stores on the storage medium access criteria ID to the data including in particular a hash of the key RAND and authentication information of the addressee C. access criteria prove that the RAND key is associated with the data. These criteria are encrypted with the key pkB and signed by the applicant.
  • the recipient will pass the access criteria to the trusted third party with his or her personal authentication data. The third party will then use these ID criteria and the personal identification data transmitted by the recipient to authenticate it.
  • the storage medium D is the memory 11 of the mobile equipment 1.
  • the storage medium is a sort of container, a means for storing digital data.
  • the storage medium D may for example be a removable storage medium, such as a compact disc CD, a DVD (Digital Versatile Disc), a non-volatile memory, a memory module, a SD (Secured Digital Card) or any other type of memory card. It can be kept by a natural or legal person, and / or stored in a data server.
  • a removable storage medium such as a compact disc CD, a DVD (Digital Versatile Disc), a non-volatile memory, a memory module, a SD (Secured Digital Card) or any other type of memory card. It can be kept by a natural or legal person, and / or stored in a data server.
  • Figure 3 shows an application of the invention in the field of mobile communication.
  • the invention can for example be used for the transmission of information within a dynamic group, whose members enter and leave at any time, the members do not necessarily know each other.
  • the methods according to the invention can be used to allow different stakeholders (people, companies) on a given site
  • the trusted third party may be, for example, the owner, the site manager or any other person who coordinates the actions of the various stakeholders on the site, without having the need or interest to know the information exchanged between the parties.
  • the invention can also advantageously be used for any application in which the applicant wishes to transmit information while maintaining complete anonymity, or in which the addressee is anonymous to the applicant. It should be noted that the existence of the recipient is not necessary at the time of the deposit of the data. Similarly, the existence of the applicant is no longer necessary at the time of the withdrawal of the data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
EP06819179A 2005-11-02 2006-10-27 Verfahren zum sicheren deponieren digitaler daten, diesbezügliches verfahren zum wiederherstellen digitaler daten, diesbezügliche einrichtungen zum implementieren von verfahren und system mit den einrichtungen Withdrawn EP1949590A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0511124A FR2892876A1 (fr) 2005-11-02 2005-11-02 Procede de depot securise de donnees numeriques, procede associe de recuperation de donnees numeriques, dispositifs associes pour la mise en oeuvre des procedes, et systeme comprenant les dits dispositifs
PCT/EP2006/067897 WO2007051769A1 (fr) 2005-11-02 2006-10-27 Procede de depot securise de donnees numeriques, procede associe de recuperation de donnees numeriques, dispositifs associes pour la mise en œuvre des procedes, et systeme comprenant les dits dispositifs

Publications (1)

Publication Number Publication Date
EP1949590A1 true EP1949590A1 (de) 2008-07-30

Family

ID=36599104

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06819179A Withdrawn EP1949590A1 (de) 2005-11-02 2006-10-27 Verfahren zum sicheren deponieren digitaler daten, diesbezügliches verfahren zum wiederherstellen digitaler daten, diesbezügliche einrichtungen zum implementieren von verfahren und system mit den einrichtungen

Country Status (6)

Country Link
US (1) US20090154710A1 (de)
EP (1) EP1949590A1 (de)
JP (1) JP2009515393A (de)
KR (1) KR20080073316A (de)
FR (1) FR2892876A1 (de)
WO (1) WO2007051769A1 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009018684A1 (fr) * 2007-08-08 2009-02-12 Kamfu Wong Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique
CN101933287B (zh) * 2007-08-08 2015-11-25 黄金富 对抗木马程式用完即弃一次性密钥的加密认证装置和方法
US8312269B2 (en) * 2007-11-28 2012-11-13 Hitachi Global Storage Technologies Netherlands, B.V. Challenge and response access control providing data security in data storage devices
CN101350060B (zh) * 2008-07-23 2011-06-01 西安西电捷通无线网络通信股份有限公司 一种适合电子标签的数据安全存取方法
WO2013044302A2 (en) * 2011-09-30 2013-04-04 Cocoon Data Holdings Limited A system and method for distributing secured data
KR102013841B1 (ko) * 2012-08-06 2019-08-23 삼성전자주식회사 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치
US10396987B2 (en) * 2017-01-26 2019-08-27 Wickr Inc. Securely provisioning an application with user information

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2913770B2 (ja) * 1990-05-31 1999-06-28 株式会社エヌ・ティ・ティ・データ 暗号化通信方式
US5673316A (en) * 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
FI980085A0 (fi) * 1998-01-16 1998-01-16 Finland Telecom Oy Kryptering av kortmeddelanden och annullering av krypteringen
FI114434B (fi) * 1999-05-11 2004-10-15 Nokia Corp Viestintälaitteet
US6760752B1 (en) * 1999-06-28 2004-07-06 Zix Corporation Secure transmission system
CN1217509C (zh) * 2000-03-30 2005-08-31 三洋电机株式会社 内容数据存储装置
JP4560922B2 (ja) * 2000-09-12 2010-10-13 ソニー株式会社 携帯端末およびアプリケーション実行方法
US7353204B2 (en) * 2001-04-03 2008-04-01 Zix Corporation Certified transmission system
US7092527B2 (en) * 2002-04-18 2006-08-15 International Business Machines Corporation Method, system and program product for managing a size of a key management block during content distribution
US7284127B2 (en) * 2002-10-24 2007-10-16 Telefonktiebolaget Lm Ericsson (Publ) Secure communications
JP4099039B2 (ja) * 2002-11-15 2008-06-11 松下電器産業株式会社 プログラム更新方法
US7549044B2 (en) * 2003-10-28 2009-06-16 Dphi Acquisitions, Inc. Block-level storage device with content security
DE10357782B3 (de) * 2003-12-10 2005-05-04 Infineon Technologies Ag Vorrichtung und Verfahren zum Erzeugen von Zufallszahlen mit einem Pseudozufallsgenerator
US7379551B2 (en) * 2004-04-02 2008-05-27 Microsoft Corporation Method and system for recovering password protected private data via a communication network without exposing the private data
US7664966B2 (en) * 2004-05-17 2010-02-16 Microsoft Corporation Secure storage on recordable medium in a content protection system
CN101292463B (zh) * 2005-12-26 2011-02-16 三菱电机株式会社 内容分配系统和终端以及服务器

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2007051769A1 *

Also Published As

Publication number Publication date
FR2892876A1 (fr) 2007-05-04
KR20080073316A (ko) 2008-08-08
JP2009515393A (ja) 2009-04-09
US20090154710A1 (en) 2009-06-18
WO2007051769A1 (fr) 2007-05-10

Similar Documents

Publication Publication Date Title
EP1645100B1 (de) Verfahren zur herstellung und verwaltung eines lokalen netzwerks
EP1529369B1 (de) Vorrichtung zum gesicherten datenaustausch zwischen zwei vorrichtungen
EP3391585B1 (de) Verfahren zur sicherung einer aufzeichnung von multimedia-inhalten in einem speichermedium
FR2930390A1 (fr) Procede de diffusion securisee de donnees numeriques vers un tiers autorise.
EP1829280A2 (de) Verfahren zur gesicherten authentifikation zur bereitstellung von diensten in einem datenübertragungsnetz
FR2906096A1 (fr) Procede de securisation de sessions entre un terminal radio et un equipement dans un reseau
EP1949590A1 (de) Verfahren zum sicheren deponieren digitaler daten, diesbezügliches verfahren zum wiederherstellen digitaler daten, diesbezügliche einrichtungen zum implementieren von verfahren und system mit den einrichtungen
FR2930391A1 (fr) Terminal d'authentification d'un utilisateur.
CA3142763A1 (fr) Procede de chiffrement et de stockage de fichiers informatiques et dispositif de chiffrement et de stockage associe.
EP1867189A1 (de) Gesicherte übertragung zwischen einem datenbearbeitungsgerät und einem sicherheitsmodul
EP1958371A2 (de) Wiederherstellung obsoleter entschlüsselungsschlüssel
EP1514377A1 (de) Schnittstellenverfahren- und einrichtung zum online-austausch von inhaltsdaten auf sichere weise
WO2019115943A1 (fr) Technique de protection d'une clé cryptographique au moyen d'un mot de passe utilisateur
EP1794926A1 (de) Kryptographische vorrichtung und verfahren mit öffentlichem schlüssel und zertifizierungs-server sowie an diese vorrichtung angepasste speicher
EP3568964B1 (de) Verfahren für end-to-end-übertragung eines teils einer verschlüsselten digitalen information und system zur implementierung dieses verfahrens
EP4012972A1 (de) Methode zur selektiven weitergabe von daten über eine blockchain
WO2003019899A2 (fr) Reseau numerique local, procedes d'installation de nouveaux dispositifs et procedes de diffusion et de reception de donnees dans un tel reseau
WO2002065413A1 (fr) Module d'identification pourvu d'un code d'authentification securise
FR3107415A1 (fr) Procede de chiffrement pour l’envoi d’une donnee personnelle
WO2010133459A1 (fr) Procede de chiffrement de parties particulieres d' un document pour les utilisateurs privileges
WO2021156078A1 (fr) Procédé et dispositif d'évaluation de correspondance d'ensembles de données structurées protégées par le chiffrement
CH693295A5 (fr) Procédé permettant de sécuriser des données lors detransactions et ensemble pour sa mise enoeuvre.
EP2339775A1 (de) Verfahren und Gerät für verteilte Datenverschlüsselung, basierend auf einem Schlüsselserver
WO2007138229A2 (fr) Procede d'acces securise a une ressource cryptee
FR3010559A1 (fr) Procede de transfert et de stockage securise de documents et appareils associes au procede

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080602

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: GEMALTO SA

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20130726

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20131206