EP2041686A1 - Server zum verwalten von anonymen vertraulichen daten - Google Patents

Server zum verwalten von anonymen vertraulichen daten

Info

Publication number
EP2041686A1
EP2041686A1 EP07787274A EP07787274A EP2041686A1 EP 2041686 A1 EP2041686 A1 EP 2041686A1 EP 07787274 A EP07787274 A EP 07787274A EP 07787274 A EP07787274 A EP 07787274A EP 2041686 A1 EP2041686 A1 EP 2041686A1
Authority
EP
European Patent Office
Prior art keywords
data
coded
user
confidential
confidential data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07787274A
Other languages
English (en)
French (fr)
Inventor
Frédéric Faure
Gary Chew
Lionel Martin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Publication of EP2041686A1 publication Critical patent/EP2041686A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Definitions

  • the present invention relates to an anonymous confidential data management server.
  • the user terminals store their personal data locally and exchange them directly with other terminals in point-to-point communication.
  • a first terminal wishing to communicate with a second terminal of the network must first perform a search for information characterizing the second terminal to obtain a contact identifier of the second terminal such as a telephone number or an Internet address. During this search, the first terminal must address many network terminals before obtaining a first contact with the second terminal, which leads to a long search time and a significant occupation of the network.
  • a solution to the drawbacks mentioned above is recommended in the US patent application US 2004/0139025 filed November 10, 2003 concerning a method of protecting personal information.
  • This process guarantees the control and confidentiality of the personal information of individuals, prevents unauthorized use thereof and allows limited use by access rights.
  • Individual data is collected and maintained in a secure database of confidential data.
  • the rights of access to an individual's confidential data are included in notifications transmitted from the database managing entity to other parties involved in the confidential data transactions of the individual.
  • each party involved in a transaction knows the identity of the individual and can then communicate directly with it.
  • the invention aims to find a contact of a user based on his private personal information without disclosing them. Thus an entity having made such a search is put in relation with the user without knowing the personal data of the user.
  • a method for managing confidential data of users of communicating objects stored in a server medium, the communicating objects and the server medium communicating through a telecommunications network comprises the steps following: storing encoded confidential data and a user reference transmitted from a first communicating object in the server medium, and searching for a reference of a user from stored encoded confidential data associated with other user references in the server means as a function of at least one coded search data transmitted from a second communicating object, and transmission of at least one user reference associated with a coded confidential data item corresponding to the search data coded by the server means to the second communicating object.
  • the coded confidential data record may comprise an input of the confidential data of the user from the first communicating object, a coding of said confidential data and a transmission of the coded confidential data and the reference of the user to the means.
  • server in order to record the coded confidential data in association with the reference of the user in the server medium among coded confidential data associated with references of other users.
  • the reference search can comprise an input of at least one search data from the second communicating object, a coding of the search data into the coded search data, a transmission of the coded search data to the server means so that the one it compares the coded search data transmitted to all the coded confidential data stored in the server means, and transmits to the second communicating object at least the reference associated with the coded confidential data item corresponding to the coded search data item.
  • the server means does not contain personal user data but encrypted confidential data undecipherable by a malicious entity attempting to access the data in the server medium.
  • the method of the invention has the advantage of obtaining a reference from a user of the network from search data characterizing the user in order, for example, to relate to the latter, without the latter disclosing his information. confidential personal data.
  • the method comprises an update of at least a first confidential data of the user into a modified confidential data item from the first communicating object, a coding of said modified confidential data item and a transmission of the first coded confidential data item.
  • coded modified confidential data and the reference of the user to the server means, a deletion of coded confidential data associated with the reference of the user in the server means and identical to the first coded confidential data transmitted, and a record of the modified confidential data encoded in association with the reference of the user in the server medium.
  • each confidential data item is associated with a category that characterizes it and is recorded coded in the server medium in association with said category and the reference, and during the search, the reference and category associated in the server medium with a coded confidential data corresponding to the data coded search are transmitted to the second communicating object.
  • the confidential data entered by the user in the first communicating object is declined in at least one confidential version which is also coded, transmitted to the server means and recorded in the server medium in association with the reference of the user of the first communicating object; and during the search, the search data in the second communicating object is divided into at least one search variation which is coded, transmitted to the server means and compared with the confidential coded data and associated associated coded confidential declensions in the server medium.
  • the invention also relates to a server means for managing confidential data of users of communicating objects through a telecommunications network.
  • the server means is characterized in that it comprises: means for storing coded confidential data and a reference of a user transmitted from a first communicating object, means for searching a reference of a user among registered coded confidential data associated with other user references as a function of at least one coded search data transmitted from a second communicating object, and means for transmitting at least one user reference associated with a coded confidential data corresponding to the data of coded search to the second communicating object.
  • the invention also relates to a communicating object, communicating through a telecommunications network with a server means for managing confidential data of users.
  • the communicating object is characterized in that it comprises during a recording of confidential data of the user of the communicating object: a means for entering said confidential data; means for encoding said confidential data; and means for transmitting the encrypted confidential data and a reference of the user to the server means for storing the encoded confidential data in association with the user reference in the server medium among coded confidential data associated with references unique to other users.
  • the invention also relates to a communicating object, communicating through a telecommunications network with a server means for managing confidential data of users.
  • the communicating object is characterized in that it comprises, when searching for a reference of a user of another communicating object: a means for entering at least one search data item; means for encoding the search data into coded search data; and means for transmitting the coded search data to the server means for the server to compare the transmitted coded search data with all coded confidential data stored in the server. medium server, and transmits to the communicating object at least one user reference associated with an encoded confidential data corresponding to the coded search data.
  • a communicating object according to the invention may comprise both the means stated in the two preceding paragraphs.
  • the invention relates to a computer program adapted to be implemented in a server means communicating with communicating objects through a telecommunications network for managing confidential data of users of communicating objects.
  • the program includes instructions which, when the program is executed in said server means, perform the steps according to the method of the invention.
  • FIG. a schematic block diagram of an anonymous confidential data management system implementing an anonymous confidential data management method according to the invention
  • Figure 2 is a more detailed block diagram of the system of Figure 1;
  • FIG. 3 is an algorithm representative of a first main step of the method for storing confidential user data according to the invention
  • FIG. 4 is an algorithm representative of a second main step of the method according to the invention for searching a reference relating to anonymous confidential data of a user.
  • FIG. 1 represents an anonymous confidential data management system comprising an anonymous confidential data management server ADS and communicating objects such as a mobile radio terminal TA, a personal computer TB or any other personal communication device, through a network.
  • RR-RPQ telecommunications network telecommunications network.
  • the telecommunications network comprises a GSM type cellular radio network with mobility management and GPRS radio access, or third generation Coded Division Multiple Access (3GPP) type multiple access type.
  • GSM Global System for Mobile communications
  • 3GPP Third Generation Coded Division Multiple Access
  • UMTS Universal Mobile Telecommunications System
  • UTRAN UMTS
  • the network RT can also be a WiFi type local network (Wireless Fidelity), WiMax
  • Wibro Wireless Broadband
  • NFC Near-Fi Protected Fidelity
  • the anonymous confidential data management server ADS is connected to or comprises a database BD which contains confidential data coded DC1 to DCN respectively associated with unique references RU1 to RUN.
  • Datas confidential DCA, DCB, with l ⁇ A ⁇ N, l ⁇ B ⁇ N, are for example personal data of a user of a communicating object TA, TB, and correspond for example to the name of the user, his first name, date of birth, home address, phone number (s), occupation, business address.
  • the unique reference RUA, RUB of the user can be his phone number. However, it is preferable that this unique reference remains anonymous and characterizes the user and / or his terminal without allowing the user to be directly identified and to allow direct communication with him.
  • a user who wishes to communicate with another user without necessarily disclosing his personal data uses the management server 1 of the invention.
  • the management server implements an anonymous confidential data management method comprising two main steps respectively represented in FIGS. 3 and 4. These main steps are a record of confidential anonymous coded data of a user associated with a unique reference of the user in the database BD, and a search for a unique reference of a user based on a coded search data among anonymous confidential coded user data stored in the database BD.
  • the terminal TA When recording confidential data of a user of a first communicating object, for example the mobile radio terminal TA, the terminal TA transmits the confidential data in DCA encoded form and a single reference RUA characterizing the terminal user to the ADS server via the RR radio networks and RPQ packets.
  • the ADS server stores the DCA data in association with the reference RUA in the database BD.
  • the computer TB transmits to the server ADS via the packet network RPQ a request RQ containing search data encoded DRC.
  • the server sends him one or RUn user references relating to confidential data DCn stored in the database BD and corresponding to the search data DRC, with 1 ⁇ n ⁇ N.
  • the communication gateway may include an access gateway for communicating with the ADS server through the network of high-speed RPQ packets.
  • Another access gateway of the communication gateway communicates with at least one switch of the RR radio network, often through an access network such as an X.25 type packet network or an ISDN network (network Digital to Service Integration) or ATM (Asynchronous Transfer Mode).
  • the communication gateway exchanges with the mobile radio terminal TA through the RR network messages that encapsulate IP packets (Internet Protocol) forwarded to and through the ADS server through the RPQ network.
  • IP packets Internet Protocol
  • the anonymous confidential data management server ADS and the communicating object TA are represented in the form of functional blocks, most of which provide functions relating to the invention and can correspond to software modules and / or or materials.
  • the communicating object TB is not shown.
  • the anonymous confidential data management server ADS comprises a data manager GD which manages various operations in the database BD, and a communication interface IC for transmitting and receiving IP packets through the packet network RPQ.
  • the operations managed by the manager GD include the recording of confidential coded data of a user transmitted by the communicating object of the user in association with a unique reference of the user, the search for confidential data encoded in the database BD compared to search data transmitted by another communicating object, and the establishment of a response RP containing one or references to the confidential data encoded in the database corresponding to the search data.
  • the communicating object TA illustrated in FIG. 2 is a mobile radio terminal associated by or without contact with a CA smart card.
  • the mobile radio terminal TA comprises an IRT radio interface, a PT processor, an HMI human-machine interface, MT memories and an LT card reader.
  • the various elements of the terminal are interconnected by a bidirectional bus BT.
  • the interface HMI controls the interaction between the terminal TA and the user of the terminal, and comprises a keyboard associated with a display and / or a touch screen and optionally a voice recognition device.
  • the CA smart card is a multi-media card (MMC), or SD (Secure Digital) or USB (Universal Serial Bus) or UICC (Universal Integrated Circuit (s) Card).
  • MMC multi-media card
  • SD Secure Digital
  • USB Universal Serial Bus
  • UICC Universal Integrated Circuit
  • the UICC smart card is for example a card provided with a Subscriber Identity Module (SIM) application when the terminal hosting the card is a mobile connected to a GSM / GPRS type network (Global System for Mobile Communications / General Packet Radio Service). ), or a Universal Subscriber Identity (USIM) application
  • SIM Subscriber Identity Module
  • GSM Global System for Mobile Communications / General Packet Radio Service
  • USB Universal Subscriber Identity
  • ISIM Removable User Identity Module
  • ISIM Removable User Identity Module
  • IP Subscriber Identity Module or EAP-SIM
  • the CA chip card mainly comprises a PC processor, or several processors, and three memory blocks M1 to M3.
  • the card exchanges commands, or requests, and responses with the TA terminal through a PES input / output port and the LT reader with or without contact.
  • the different elements of the card are connected to each other by a bidirectional bus BC.
  • the memory Ml is of the ROM or Flash type and includes the operating system of the card.
  • the memory M2 is a non-volatile memory, for example EEPROM or Flash, in particular for storing keys, identity numbers and other parameters of the profile of the user having the card, such as personal data, a PIN code and other data. of security.
  • the memory M2 also includes the unique reference RUA of the user and an AC coding algorithm.
  • the AC coding algorithm has the particularity of carrying out a one-way coding on a datum that does not then make it possible to retrieve the datum by applying an inverse algorithm.
  • the coding algorithm is for example an asymmetric encryption algorithm or a generator of a graphical representation representing the data once coded.
  • the memory M3 is a RAM or SRAM memory used more particularly for data processing.
  • the CA smart card further comprises, in relation to the invention, an AE recording application, an AR search application and a software module called an AgC coding agent (applet), distributed in the memories M1 and M2.
  • the applications AE and AR relate to the two distinct main steps of the method of the invention and are activated from the human-machine interface HMI under the control of the user of the terminal.
  • the AE recording application displays on the HMI interface fields for entering and validating confidential data by the user of the terminal when he wishes to record personal data in the ADS server.
  • the search application AR displays on the interface HMI fields to enter and validate search data by the user when it wishes to obtain a unique reference from another user of a terminal of the telecommunications network that has already registered his personal data with the ADS server.
  • the search application also displays the unique reference (s) obtained from the ADS server or a result derived from these references.
  • the two applications AE and AR are one and the same application.
  • the main function of the AgC coding agent is to memorize in the memory M2 and to code the data entered and validated on the human-machine interface HMI in order to transmit them in coded form to the ADS server.
  • the MT memories of the terminal TA comprise the two applications AE and AR and optionally the coding agent AgC.
  • the communicating object of a user such as the terminal TA associated with the smart card CA, includes only one of the two applications AE and AR for either saving personal data or performing a search to obtain one or more references from other users.
  • the invention is not limited to a mobile radio terminal associated with a smart card.
  • the map to chip can also be a card included in a portable computer for example connected to a mobile terminal or directly connected to the Internet, a credit card, an electronic purse card, a health card, an electronic passport, or any other additional card linked to a mobile terminal.
  • the invention applies to other portable communicating electronic objects, such as personal computers or PDA communicating personal digital assistants.
  • the main step of recording confidential data of the anonymous confidential data management method comprises steps E1 to E7.
  • step E1 the user of the mobile radio terminal TA activates the recording application AE by means of the interface HMI. It displays personal data entry fields such as a name field, a first name field, a date field, an address field, a phone number field and a profession field.
  • the user enters personal data DA in step E2.
  • the user selects from the personal data entered those DPA he wishes to register anonymously and confidentially in the ADS server to allow a subsequent search of its reference by another user.
  • step E3 Upon validation of the recording, after selecting a validation icon for example on the HMI interface, in step E3, the recording application AE transfers the data entered to the AgC coding agent. This one memorizes all the personal data DA transferred to the memory M2 of the card, in step E4. Then, in step E5, the AgC agent applies the AC one-way coding algorithm to the selected DPA data in order to encode them into DCA-encoded personal data.
  • step E6 the agent AgC establishes a registration message MR comprising the personal data encoded DCA and the reference RUA of the user read in the memory M2.
  • the message MR is transmitted by the radio interface IRT of the terminal TA to the server ADS.
  • the data manager GD of the ADS server On receipt of the message MR by the communication interface IC in the ADS server, in step E7, the data manager GD of the ADS server stores the confidential data encoded DCA in association with the reference RUA in the database BD .
  • the message MR also includes for each personal coded data transmitted the category, or an identifier of the category, of the associated input field transmitted in clear, such as "name”, “first name”, “date”, “address” ",” phone number "or” profession ".
  • each coded personal data is registered in association with its category or the category identifier, and the set of DCA data and their categories is registered in association with the unique reference RUA of the user.
  • the recording application AE optionally displays all the confidential data stored in the memory M2 by means of the interface HMI of the terminal.
  • the user modifies one or more confidential data some of which have been previously selected or are newly selected by the user to be recorded anonymously in the ADS database BD.
  • the application AE transfers the modified data to the coding agent. It updates them in memory M2 by overwriting the corresponding initial data, and encodes the selected modified data. Then the encoding agent transmits a message containing the encoded modified confidential data, the initial encoded confidential data and the reference of the user to the ADS server.
  • the data manager GD of the ADS server deletes from the database BD the confidential coded data associated with the reference of the user extracted from the message and which are identical to the initial confidential coded data also extracted from the message. message.
  • the manager GD stores, in the database BD, the coded modified confidential data extracted from the transmitted message, in association with the reference of the user.
  • the main step of searching for confidential data of the management method of FIG. anonymous confidential data includes steps R1 through R8.
  • step R1 the user of the personal computer TB wishing to obtain the reference RUA of the user of the terminal TA activates the search application AR by means of the interface HMI. It displays search fields for confidential data such as a name field, a first name field, a date field, an address field, a phone number field and a profession field.
  • step R2 the user of the computer TB enters in the search field or fields at least one DR search data or often DR search data characterizing the user of the terminal TA with which the user of the computer TB wishes to be connected, for example.
  • the search application AR transfers the data or search data DR input to the agent AgC coding of the TB computer.
  • the agent applies the one-way coding algorithm AC, identical to that used by the coder of the terminal TA, to the search data item DR in order to code it into coded search data. DRC.
  • the DR data is thus coded in a manner similar to the personal data stored in coded form in the database BD.
  • the AgC agent of the computer TB makes a request RQ including the search data encoded DRC.
  • the request RQ is transmitted to the server ADS by a communication interface of the computer TB to the server ADS.
  • the data manager GD of the server ADS compares the confidential coded data DCn associated with each reference RUn with the transmitted coded search data. DRC extracted from the RQ request. If one or more confidential data are respectively identical to one or more DRC encoded search data, then the reference associated with the encoded confidential data is copied into a response RP established by the manager GD.
  • the manager GD performs the same operation for each reference recorded in the database BD, the DRC encoded search data extracted from the request RQ can be identical to certain confidential coded data associated with two or more different references RUl to RUN.
  • the response RP including one or more references RUn associated with confidential data identical to the search data encoded DRC is transmitted to the computer TB.
  • the response RP is processed by the AgC coding agent of the computer TB which instructs the search application AR to display the transmitted references RUn by means of the human-machine interface HMI, in step R8.
  • the request RQ also includes for each coded search data transmitted the category, or an identifier of the category, the associated search field, transmitted in clear, such as "name”, “first name”, “date”, “ address ",” number of telephone "or” profession. "Thus the ADS GD data manager compares the DCn encoded confidential data associated with each RUn reference and the categories associated with these data with respectively the DRC encoded search data and the associated associated categories extracted from the request. This makes it possible to establish a response containing the references corresponding to the coded confidential data which are identical to the coded search data and whose associated categories are identical to the categories associated with said coded search data.
  • the data manager GD includes in the response RP one or more references RUn in association with the coded search data identical to the confidential coded data associated with said references in the database BD.
  • the search application AR of the computer TB displays, by means of the human-machine interface HMI, the transmitted references RUn together with the corresponding search data entered by the user. in step R1 and relating to the coded search data extracted from the RP response.
  • the category associated with the confidential data item is included in the response RP in association with the reference relating to said confidential data item.
  • the response RP therefore includes one or more references associated with categories of encrypted confidential data corresponding to the coded search data.
  • the transmitted categories are displayed on the HMI interface together with the references to which they are associated.
  • the user of the computer TB wishes to be put in contact with the user of the terminal TA.
  • the user of the computer TB activates the search application AR by means of the interface HMI, and enters in the search field "name", the name of the user of the terminal TA as search data.
  • the AgC agent of the computer TB encodes the search data and transmits it in a request RQ to the ADS server.
  • the server ADS Upon receiving the request, the server ADS searches the database BD as described in step R6, and obtains two identical confidential data corresponding to the transmitted search data.
  • the categories and references associated with the two confidential data obtained are respectively different.
  • the first confidential data associated with a first reference corresponds to a first name while the second confidential data associated with a second reference corresponds to a name.
  • the ADS server transmits an RP response including the two references and the two categories respectively associated with the computer TB.
  • each category is displayed on the HMI interface together with the reference with which it is associated, indicating for example that a first reference is relative to a first name and that the second reference relates to a name.
  • the user selects the second reference relating to the category "name" and further characterizes the user of the terminal TA in order, for example, to communicate with the latter using the reference selected. .
  • the one-way coding algorithm AC may comprise two different coding functions.
  • Each personal data item to be encoded is applied to each of the two functions in order to obtain from the same personal data two separate coded data concatenated into a pair registered in association with the same category in the database BD.
  • the entered search data is also encoded to obtain two distinct concatenated search data to compare with all pairs of concatenated coded confidential data stored in the database.
  • each personal data input by means of the interface HMI and transmitted to the coding agent in the terminal TA is declined by the agent in one or more generally several declensions which can be parts of the personal data entered and / or data substantially similar to the personal data entered or parts of it, for example distinct by their spelling and / or pronunciation.
  • declensions which can be parts of the personal data entered and / or data substantially similar to the personal data entered or parts of it, for example distinct by their spelling and / or pronunciation.
  • each search data input by means of the HMI interface and transmitted to the coding agent is declined by the agent in one or more generally several variations of the entered search data.
  • This search data and their variations are coded by the coding agent and transmitted to the ADS server which compares them with the coded confidential data and their coded declensions recorded in the database BD.
  • the references of the coded confidential data and / or their coded versions corresponding to the coded search data and / or their coded declensions are transmitted to the terminal requiring a search, and are displayed in order of similarity of the variations of the search data entered with the research data.
  • the invention described here relates to a confidential data management method.
  • the steps of the method of the invention are determined by the instructions of a computer program incorporated in an ADS server means communicating with communicating objects TA, TB through an RR-RPQ telecommunications network to manage confidential data of users of communicating objects.
  • the program comprises program instructions which, when said program is executed in a processor of the server means, perform the steps of the method according to the invention.
  • the program can also be executed partly in communicating objects TA, TB.
  • the invention also applies to a computer program, in particular a computer program recorded on or in a computer readable information medium and any data processing device, adapted to implement the computer program. 'invention.
  • This program can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code such as in a partially compiled form, or in any other form desirable to implement the method according to the invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
EP07787274A 2006-07-10 2007-07-09 Server zum verwalten von anonymen vertraulichen daten Withdrawn EP2041686A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0652896 2006-07-10
PCT/EP2007/056998 WO2008006811A1 (fr) 2006-07-10 2007-07-09 Serveur de gestion de donnees confidentielles anonymes

Publications (1)

Publication Number Publication Date
EP2041686A1 true EP2041686A1 (de) 2009-04-01

Family

ID=37907453

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07787274A Withdrawn EP2041686A1 (de) 2006-07-10 2007-07-09 Server zum verwalten von anonymen vertraulichen daten

Country Status (4)

Country Link
US (1) US8386518B2 (de)
EP (1) EP2041686A1 (de)
JP (1) JP2009543489A (de)
WO (1) WO2008006811A1 (de)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8249630B1 (en) * 2009-03-25 2012-08-21 Sprint Communications Company L.P. Messaging session enhancement with user data
EP2506177A1 (de) * 2011-04-01 2012-10-03 Palio AG Verfahren und Vorrichtung zum Vergleich von Identifikationsdaten
CN105528537A (zh) * 2014-09-29 2016-04-27 联芯科技有限公司 便携式无线宽带装置及其安全防护方法
US10623411B2 (en) * 2015-09-17 2020-04-14 Sony Corporation Information processing device, information processing method, and mapping server
CN106096947B (zh) * 2016-06-08 2019-10-29 广东工业大学 基于nfc的半离线匿名支付方法
CN106991337B (zh) * 2017-04-06 2019-10-22 北京数聚世界信息技术有限公司 一种出生日期数据的脱敏方法及装置
JP6372813B1 (ja) * 2017-12-20 2018-08-15 株式会社イスプリ データ管理システム

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE232626T1 (de) * 1996-05-24 2003-02-15 Jong Eduard Karel De Vorrichtung und verfahren zur kryptographisch gesicherten kommunikation
WO2001039041A1 (en) * 1999-11-19 2001-05-31 Institute Of Medicinal Molecular Design. Inc. Id symbol unique to structural formula of compound
JP2001256395A (ja) * 2000-03-10 2001-09-21 Aip:Kk 情報送受信システム及び情報送受信方法
JP3859450B2 (ja) * 2001-02-07 2006-12-20 富士通株式会社 秘密情報管理システムおよび情報端末
EP1393179A4 (de) 2001-05-08 2005-10-05 Ipool Corp System und verfahren zum schutz der privatsphäre
US20030079136A1 (en) * 2001-08-21 2003-04-24 Emmanuel Ericta Security framework
WO2003071446A1 (en) * 2002-02-19 2003-08-28 Pureprofile.Com Inc System for permission-based communication and exchange of information
US20020184530A1 (en) * 2002-05-29 2002-12-05 Ira Spector Apparatus and method of uploading and downloading anonymous data to and from a central database by use of a key file
AU2003245447B2 (en) * 2002-09-06 2009-08-27 United States Postal Service Method and system for efficiently retrieving secured data by securely pre-processing provided access information
US7159119B2 (en) * 2002-09-06 2007-01-02 United States Postal Service Method and system for efficiently retrieving secured data by securely pre-processing provided access information
JP4429619B2 (ja) * 2003-04-15 2010-03-10 三菱電機株式会社 情報提供装置
JP2005025561A (ja) * 2003-07-03 2005-01-27 Ntt Docomo Inc 検索システム及び検索方法
US7606788B2 (en) * 2003-08-22 2009-10-20 Oracle International Corporation Method and apparatus for protecting private information within a database
US7593548B2 (en) * 2005-12-15 2009-09-22 Microsoft Corporation Secure and anonymous storage and accessibility for sensitive data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2008006811A1 *

Also Published As

Publication number Publication date
WO2008006811A1 (fr) 2008-01-17
JP2009543489A (ja) 2009-12-03
US20090319488A1 (en) 2009-12-24
US8386518B2 (en) 2013-02-26

Similar Documents

Publication Publication Date Title
EP1994780B1 (de) System für den fernzugriff auf eine massenspeichereinheit und einer sicherheitsspeichereinheit in einem tragbaren kommunikationsobjekt
US8832795B2 (en) Using a communications network to verify a user searching data
WO2008006811A1 (fr) Serveur de gestion de donnees confidentielles anonymes
US20240211627A1 (en) Contact discovery service with privacy aspect
US20100316219A1 (en) Systems and methods for simultaneous integrated multiencrypted rotating key communication
EP2041942B1 (de) Gesteuerte gemeinsame nutzung persönlicher daten
US20140362992A1 (en) Systems and Methods for Conducting Secure Wired and Wireless Networked Telephony
FR2977418A1 (fr) Systeme d'authentification via deux dispositifs de communication
EP2619941A1 (de) Verfahren, server und system zur authentifizierung einer person
JP4897971B2 (ja) ユーザのid処理方法および処理システム
EP2047697B1 (de) Anpassung eines funkkommunikationsendgeräts mit sim-karte
US20080044030A1 (en) Protected contact data in an electronic directory
CN106203141A (zh) 一种应用的数据处理方法和装置
JP5363657B2 (ja) 電気通信ネットワークにおける共用マルチメディア・オブジェクトに関連したタグの管理
CN106254226A (zh) 一种信息同步方法及装置
Chowdhury et al. Distributed identity for secure service interaction
FR2821188A1 (fr) Procede de stockage securise de donnees personnelles et de consultation, carte a puce, terminal et serveur pour la mise en oeuvre du procede
WO2003046730A2 (fr) Procede de securisation d'un acces a une ressource numerique
CN106416188A (zh) 用于保护和/或隐去数据保护服务的订户的用户身份和/或用户数据的方法和系统、移动通信网络、程序以及计算机程序产品
EP0172047B1 (de) Verfahren und System zum Chiffrieren und Dechiffrieren von zwischen einem Sender und einem Empfänger übertragenen Daten
WO2003079714A1 (fr) Procede d'echange d'informations d'authentification entre une entite de communciation et un serveur-operateur
TWI230533B (en) Method for protecting private file in smart phone
EP2660748A1 (de) Verfahren und System zur Passwortverwaltung
FR2890520A1 (fr) Execution d'une commande pro-active elaboree dans un terminal
CN109598145A (zh) 一种防泄密的数据传输和云端存储方法及系统

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20090210

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20141007