FR3101176B1 - Système d'échange d'informations crypté de bout en bout ne nécessitant pas de tiers de confiance, procédé et programme associés - Google Patents
Système d'échange d'informations crypté de bout en bout ne nécessitant pas de tiers de confiance, procédé et programme associés Download PDFInfo
- Publication number
- FR3101176B1 FR3101176B1 FR1910541A FR1910541A FR3101176B1 FR 3101176 B1 FR3101176 B1 FR 3101176B1 FR 1910541 A FR1910541 A FR 1910541A FR 1910541 A FR1910541 A FR 1910541A FR 3101176 B1 FR3101176 B1 FR 3101176B1
- Authority
- FR
- France
- Prior art keywords
- trusted
- party
- program
- exchange system
- information exchange
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
L’invention concerne un système d’échange d’informations à distance, en particulier de messagerie à distance comprenant- au moins une application web (2) pour échanger des informations à transmettre, en particulier des messages,- au moins un module (3, 3a, 3b) pour crypter/décrypter les informations à transmettre ;caractérisé en ce que le module (3, 3a, 3b) est configuré pour décrypter lesdites informations en fonction des données d’utilisateurs, en particulier d’un mot de passe d’utilisateur. L’invention porte en outre sur un procédé et un programme associés. L’invention permet ainsi de crypter/décrypter des informations sans avoir besoin de passer par un tiers de confiance. Figure de l’abrégé : Fig. 3.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1910541A FR3101176B1 (fr) | 2019-09-24 | 2019-09-24 | Système d'échange d'informations crypté de bout en bout ne nécessitant pas de tiers de confiance, procédé et programme associés |
PCT/ZA2020/050052 WO2021062453A1 (fr) | 2019-09-24 | 2020-09-25 | Système d'échange d'informations chiffrées de bout en bout, sans nécessiter une tierce partie de confiance, procédé et programme associés |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1910541 | 2019-09-24 | ||
FR1910541A FR3101176B1 (fr) | 2019-09-24 | 2019-09-24 | Système d'échange d'informations crypté de bout en bout ne nécessitant pas de tiers de confiance, procédé et programme associés |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3101176A1 FR3101176A1 (fr) | 2021-03-26 |
FR3101176B1 true FR3101176B1 (fr) | 2022-01-21 |
Family
ID=69468694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1910541A Active FR3101176B1 (fr) | 2019-09-24 | 2019-09-24 | Système d'échange d'informations crypté de bout en bout ne nécessitant pas de tiers de confiance, procédé et programme associés |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR3101176B1 (fr) |
WO (1) | WO2021062453A1 (fr) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7251728B2 (en) * | 2000-07-07 | 2007-07-31 | Message Secure Corporation | Secure and reliable document delivery using routing lists |
US20130159699A1 (en) * | 2011-12-16 | 2013-06-20 | F-Secure Corporation | Password Recovery Service |
DE102013108925A1 (de) * | 2013-08-19 | 2015-02-19 | Deutsche Post Ag | Unterstützung der Nutzung eines geheimen Schlüssels |
TWI608361B (zh) * | 2016-09-23 | 2017-12-11 | 群暉科技股份有限公司 | 電子裝置、伺服器、通訊系統及通訊方法 |
-
2019
- 2019-09-24 FR FR1910541A patent/FR3101176B1/fr active Active
-
2020
- 2020-09-25 WO PCT/ZA2020/050052 patent/WO2021062453A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2021062453A1 (fr) | 2021-04-01 |
FR3101176A1 (fr) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107040369B (zh) | 数据传输方法、装置及系统 | |
US10848315B2 (en) | Contract agreement method, agreement verification method, contract agreement system, agreement verification device, contract agreement device, contract agreement program and agreement verification program | |
US9800402B2 (en) | Secure and delegated distribution of private keys via domain name service | |
CN109886040B (zh) | 数据处理方法、装置、存储介质及处理器 | |
US9401893B2 (en) | System and method for providing data security in a hosted service system | |
EP1582950A2 (fr) | Procédé et système de gestion de droits numériques | |
CN103546289B (zh) | 一种基于USBKey的安全传输数据的方法及系统 | |
ATE433245T1 (de) | Datenübertragungs- un verwaltungsverfahren | |
EP2323306A1 (fr) | Procédé de transmission de données sécurisé et systeme de chiffrement et de dechiffrement permettant une telle transmission | |
CN104219228A (zh) | 一种用户注册、用户识别方法及系统 | |
US20110167258A1 (en) | Efficient Secure Cloud-Based Processing of Certificate Status Information | |
ATE309586T1 (de) | Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen | |
US8422673B2 (en) | Method and system for protecting against unity keys | |
US20100061550A1 (en) | Data processing apparatus | |
CN104052606A (zh) | 数字签名、签名认证装置以及数字签名方法 | |
CN103152322A (zh) | 数据加密保护方法及系统 | |
CN110049032A (zh) | 一种双向认证的数据内容加密方法及装置 | |
CN108985409B (zh) | 身份证信息读取方法、装置及电子设备 | |
CN115567312B (zh) | 一种可满足多种场景的联盟链数据权限管理系统和方法 | |
FR3101176B1 (fr) | Système d'échange d'informations crypté de bout en bout ne nécessitant pas de tiers de confiance, procédé et programme associés | |
CN113849797A (zh) | 数据安全漏洞的修复方法、装置、设备及存储介质 | |
CN110324149B (zh) | 一种多方共识签名后的证据固定验证方法 | |
Park et al. | An SGX-based key management framework for data centric networking | |
KR101992402B1 (ko) | 동형 암호화를 이용한 개인 정보 보호 방법 | |
CN101103588A (zh) | 通信系统和通信方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLSC | Publication of the preliminary search report |
Effective date: 20210326 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 5 |