FR3124341B1 - Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform - Google Patents
Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform Download PDFInfo
- Publication number
- FR3124341B1 FR3124341B1 FR2106588A FR2106588A FR3124341B1 FR 3124341 B1 FR3124341 B1 FR 3124341B1 FR 2106588 A FR2106588 A FR 2106588A FR 2106588 A FR2106588 A FR 2106588A FR 3124341 B1 FR3124341 B1 FR 3124341B1
- Authority
- FR
- France
- Prior art keywords
- data
- identity
- server
- user terminals
- allowing user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 101150004367 Il4i1 gene Proteins 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention est relative à un procédé et à un ensemble permettant à des terminaux utilisateurs d’échanger des données personnelles avec une plateforme de serveurs dont l’architecture garantit qu’aucun des serveurs qui la composent ne stocke la totalité des données. L’ensemble de serveurs comporte au moins un serveur d’identités, un serveur de clés et un serveur de données. Le procédé comprend les étapes de : Stockage d’informations d’identitésGénération d’une paire de clés associées : clé d’identité et clé de donnéesRecherche des informations d’identités à partir de la clé d’identitéRecherche des données à partir de la clé de données Le procédé et l’ensemble selon l’invention sont particulièrement destinés à la gestion des données de santé, sans toutefois y être limités. Figure pour l’abrégé : [Fig1]The present invention relates to a method and an assembly allowing user terminals to exchange personal data with a server platform whose architecture guarantees that none of the servers which compose it stores all of the data. The set of servers includes at least one identity server, a key server and a data server. The method comprises the steps of: Storing identity informationGenerating a pair of associated keys: identity key and data keySearching identity information from the identity keySearching data from the key data The method and the assembly according to the invention are particularly intended for the management of health data, without however being limited thereto. Figure for the abstract: [Fig1]
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR2106588A FR3124341B1 (en) | 2021-06-21 | 2021-06-21 | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform |
PCT/EP2022/066766 WO2022268741A1 (en) | 2021-06-21 | 2022-06-20 | Method and assembly for enabling user terminals to confidentially exchange personal data items with a server platform |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR2106588 | 2021-06-21 | ||
FR2106588A FR3124341B1 (en) | 2021-06-21 | 2021-06-21 | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3124341A1 FR3124341A1 (en) | 2022-12-23 |
FR3124341B1 true FR3124341B1 (en) | 2023-10-27 |
Family
ID=78212165
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR2106588A Active FR3124341B1 (en) | 2021-06-21 | 2021-06-21 | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR3124341B1 (en) |
WO (1) | WO2022268741A1 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7681042B2 (en) * | 2004-06-17 | 2010-03-16 | Eruces, Inc. | System and method for dis-identifying sensitive information and associated records |
WO2010115607A1 (en) * | 2009-04-03 | 2010-10-14 | Digidentity B.V. | Secure data system |
US11003789B1 (en) * | 2020-05-15 | 2021-05-11 | Epsilon Data Management, LLC | Data isolation and security system and method |
-
2021
- 2021-06-21 FR FR2106588A patent/FR3124341B1/en active Active
-
2022
- 2022-06-20 WO PCT/EP2022/066766 patent/WO2022268741A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2022268741A1 (en) | 2022-12-29 |
FR3124341A1 (en) | 2022-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11882139B2 (en) | Method and system for preventing illicit use of a telephony platform | |
Barry et al. | Profiting from sanctions: Economic coercion and US foreign direct investment in third-party states | |
Belli | Net neutrality, zero rating and the minitelisation of the internet | |
Clark et al. | The effect of explicit communication on pricing: Evidence from the collapse of a gasoline cartel | |
Allen | Discovering and developing the blockchain cryptoeconomy | |
Kypri et al. | ‘If someone donates 1000,theysupportyou.Iftheydonate 100 000, they have bought you’. Mixed methods study of tobacco, alcohol and gambling industry donations to Australian political parties | |
Heerwig et al. | Buying a voice: gendered contribution careers among affluent political donors to federal elections, 1980–2008 | |
FR3124341B1 (en) | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform | |
Kerr et al. | The timing of smoking onset, prolonged abstinence and relapse in men: a prospective study from ages 18 to 32 years | |
Lanois | Caught in the Clouds: The Web 2.0, Cloud Computing, and Privacy? | |
Elbra | Activism and the ‘new’politics of tax justice | |
Van Den Dam | Big data a sure thing for telecommunications: Telecom's future in big data | |
Crago | Fundamental Rights on the Infobahn: Regulating the Delivery of Internet Related Services Within the European Union | |
Tafuro | Fatal attraction | |
Myrstad et al. | Out of Control. How consumers are exploited by the online advertising industry | |
Analysts | Tax Notes | |
Kristensen | “In Essence still a British Country”: Britain's withdrawal from East of Suez | |
Lewis et al. | The digital donga | |
Caliskan et al. | Strange Bedfellows: Consumer Protection and Competition Policy in the Making of the EU Privacy Regime | |
Bregu | THE ROLE OF THE EU AS A NORMATIVE POWER ON THE PROTECTION OF HUMAN RIGHTS IN ALBANIA | |
Ruisch et al. | Are There Ideological Asymmetries in Intergroup Bias? A Minimal Groups Approach | |
FR3135853A1 (en) | Method for issuing a contact request and method for analyzing a history of communication elements | |
WO2023228070A1 (en) | Method for issuing a contact request and method for analysing a history of communication elements | |
Olk | IMPACT OF PERSONAL AND ORGANIZATIONAL TIES ON ALLIANCES: EVIDENCE FROM ENTREPRENEURIAL COMPANIES. | |
Ramburn | Understanding use and adoption of mobile data services in two African countries |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLSC | Publication of the preliminary search report |
Effective date: 20221223 |
|
TP | Transmission of property |
Owner name: G5 DIGITAL, FR Effective date: 20230223 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |