FR3029668B1 - Procede de controle de droits de dechiffrement de donnees - Google Patents
Procede de controle de droits de dechiffrement de donneesInfo
- Publication number
- FR3029668B1 FR3029668B1 FR1462042A FR1462042A FR3029668B1 FR 3029668 B1 FR3029668 B1 FR 3029668B1 FR 1462042 A FR1462042 A FR 1462042A FR 1462042 A FR1462042 A FR 1462042A FR 3029668 B1 FR3029668 B1 FR 3029668B1
- Authority
- FR
- France
- Prior art keywords
- controlling data
- opening
- terminal
- data encryption
- operating system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title abstract 2
- 238000001514 detection method Methods 0.000 abstract 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Il est proposé un procédé de contrôle de droits de déchiffrement de données comprenant les étapes suivantes, mises en œuvre par un terminal (1a) comprenant un système d'exploitation accessible par plusieurs utilisateurs et un module de chiffrement (20): • détection (100) d'une ouverture d'accès au système d'exploitation par un utilisateur, • en réponse à la détection d'ouverture, paramétrage (104) du module de chiffrement (20) avec une clé de chiffrement propre à l'utilisateur pour chiffrer des données (D) à destination d'un autre terminal (1b), • envoi à un serveur (2) de contrôle: ○ (102) d'une clé de déchiffrement (K) adaptée pour déchiffrer les données chiffrées au moyen de la clé de chiffrement, et ○ (103) d'une information (S1) indicative de l'ouverture d'accès pour contrôler l'utilisation de la clé de déchiffrement (K) par l'autre terminal (1b).
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1462042A FR3029668B1 (fr) | 2014-12-08 | 2014-12-08 | Procede de controle de droits de dechiffrement de donnees |
CA2970082A CA2970082A1 (fr) | 2014-12-08 | 2015-12-08 | Procede de chiffrement dynamique de donnees, et procede de controle de droits de dechiffrement associe |
PCT/EP2015/079015 WO2016091898A1 (fr) | 2014-12-08 | 2015-12-08 | Procédé de chiffrement dynamique de données, et procédé de contrôle de droits de déchiffrement associé |
JP2017548342A JP6718466B2 (ja) | 2014-12-08 | 2015-12-08 | 動的データ暗号化方法、及び復号権を制御する関連方法 |
US15/533,985 US10826700B2 (en) | 2014-12-08 | 2015-12-08 | Dynamic data encryption method, and associated method for controlling decryption rights |
EP15807866.7A EP3231152B1 (fr) | 2014-12-08 | 2015-12-08 | Procédé de chiffrement dynamique de données, et procédé de contrôle de droits de déchiffrement associé |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1462042A FR3029668B1 (fr) | 2014-12-08 | 2014-12-08 | Procede de controle de droits de dechiffrement de donnees |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3029668A1 FR3029668A1 (fr) | 2016-06-10 |
FR3029668B1 true FR3029668B1 (fr) | 2016-12-30 |
Family
ID=52988168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1462042A Active FR3029668B1 (fr) | 2014-12-08 | 2014-12-08 | Procede de controle de droits de dechiffrement de donnees |
Country Status (1)
Country | Link |
---|---|
FR (1) | FR3029668B1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174136B (zh) * | 2022-05-23 | 2024-02-02 | 北京旷视科技有限公司 | 数据获取和数据传送方法、终端、服务器及存储介质 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7272230B2 (en) * | 2001-04-18 | 2007-09-18 | Pumpkin House Incorporated | Encryption system and control method thereof |
GB2436910B (en) * | 2006-04-03 | 2011-02-16 | Identum Ltd | Electronic Data Communication System |
-
2014
- 2014-12-08 FR FR1462042A patent/FR3029668B1/fr active Active
Also Published As
Publication number | Publication date |
---|---|
FR3029668A1 (fr) | 2016-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9252946B2 (en) | Method and system to securely migrate and provision virtual machine images and content | |
US9912645B2 (en) | Methods and apparatus to securely share data | |
US10491403B2 (en) | Data loss prevention with key usage limit enforcement | |
MX2018014312A (es) | Uso de region aislada segura basada en hardware para prevenir la pirateria y el engaño en dispositivos electronicos. | |
TW200701725A (en) | Automatic data encryption and access control based on bluetooth device proximity | |
RU2019124722A (ru) | Система и способы предоставления зашифрованных данных удаленного сервера | |
MX2015014636A (es) | Metodo de seguridad para archivos y aparatos para el mismo. | |
WO2013130555A3 (fr) | Procédé de fonctionnement d'un dispositif informatique, dispositif informatique et programme informatique | |
US20170060777A1 (en) | Method and system for converting data in an electronic device | |
GB2542303A (en) | Secure host communications | |
JP2016072769A5 (fr) | ||
EP3477521B1 (fr) | Dispositif de contrôle de processus, procédé de contrôle de processus, et support d'enregistrement sur lequel est enregistré un programme de contrôle de processus | |
GB2550081A (en) | Secure file transfer | |
CN110958255B (zh) | 一种数据传输方法、装置及电子设备和存储介质 | |
JP2009135890A5 (fr) | ||
WO2016045533A1 (fr) | Dispositif d'interaction d'informations de sécurité reposant sur un environnement d'exécution de confiance | |
FR3029668B1 (fr) | Procede de controle de droits de dechiffrement de donnees | |
GB201305600D0 (en) | Security | |
Soundararajan et al. | Data security and privacy in cloud using RC6 and SHA algorithms | |
Anitha et al. | Metadata driven Efficient CRE based cipher key generation and distribution in cloud security | |
US20160072777A1 (en) | Hardware crypto module and system for communicating with an external environment | |
KR20160139914A (ko) | 소프트웨어의 변조 여부 탐지 시스템 및 방법 | |
Sharma et al. | Modified Hill cipher using Vandermonde matrix and finite field | |
US20170288857A1 (en) | Data encryption to ensure data is correctly being accessed | |
Liang et al. | Full Disk Encryption based on Virtual Machine and Key Recovery Scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLSC | Publication of the preliminary search report |
Effective date: 20160610 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 6 |
|
PLFP | Fee payment |
Year of fee payment: 7 |
|
PLFP | Fee payment |
Year of fee payment: 8 |
|
PLFP | Fee payment |
Year of fee payment: 9 |
|
PLFP | Fee payment |
Year of fee payment: 10 |