WO2011151066A1 - Procede de securisation de donnees numeriques et d'identites notamment au sein de processus utilisant des technologies de l'information et de la communication - Google Patents
Procede de securisation de donnees numeriques et d'identites notamment au sein de processus utilisant des technologies de l'information et de la communication Download PDFInfo
- Publication number
- WO2011151066A1 WO2011151066A1 PCT/EP2011/002712 EP2011002712W WO2011151066A1 WO 2011151066 A1 WO2011151066 A1 WO 2011151066A1 EP 2011002712 W EP2011002712 W EP 2011002712W WO 2011151066 A1 WO2011151066 A1 WO 2011151066A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- receiver
- authority
- author
- protocol
- dogging
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Definitions
- the present invention relates to a method for controlling, securing and protecting by confidentiality, data within declarative, informative, administrative or productive processes using information and communication technologies.
- This framework defines ways to know or not know, access, hold, process or transmit these data.
- identity attributes for example surname, first name, postal or telecommunication address, bank details, credit card number and expiry date, social security number and other references, personal codes, seals, visas or distinctive marks. Which help to identify, access by this information and snippets of identity to personal spaces or personal functions, such as activate an account banking, being able to go to the place of residence, trace or profile a person in a nominative way.
- the invention may more generally apply to any desirable data to frame in its use or status, such as confidentiality, integrity, availability, immunity, completeness, completeness, validity, property. Data may be considered sensitive for reasons such as:
- the importance of a given data may relate to its purpose such as the setting in operation of a fire-fighting equipment or an automated switching.
- the word "data” here encompasses a spectrum ranging from the analog signal to the structured formatting of digital data in the form of information or instructions. This formatting as much as the content stem from the knowledge of their author and belong to his heritage, with the same needs to be secure in themselves and in their structure.
- the information can be both digital and analog, regardless of its final expression for an observer, by numbers, letters, drawings, videos, pulses, colors or sounds. It can be in various forms such as magnetic or optical.
- the distinctive criterion of the present invention, for its operation, is that this data is conveyed or stored in a frame, considered as the container, which takes the form of a computer protocol or communication. In the extreme, it can be a simple container, without content, where the mere fact of receiving it becomes itself informative or trigger.
- protocols can be called “proprietary”, or “open” when the interfaces are public and can therefore syntactically dialogue with the black box. It can be static data on their support, as long as their access, their integrity or their implementation depend in advance of a protocol.
- file a document or a computer program, an executable, a software entity, a virtual entity such as a virtual memory.
- mail a message, a sending file or documents, a phone call, participation in a dialogue, a visit made by telecommunications, and more generally any form of flow, issue or any form of exchange by putting in relation or connection.
- This mail can be carried out between several supports, or within the same equipment, in the case of moving data from one zone to another within, for example, a computer or a card. electronic, as far as this displacement resorts to the use of a computer protocol or communication.
- the term mail applies to peer-to-peer, when the message is shredded as in the case of a distribution of data on disks or servers connected to the internet. Will be subsequently named "author”, the sender of this mail.
- the author will be considered to be the label and its carrier, and not the terminal having created an electromagnetic field.
- the term author may include, in addition to the one who designed it, the one who is at the moment concerned the holder, the custodian or the manager.
- the material support of the mail can be a communication network, in particular telecommunications or television broadcast, as well as physical mobile means such as a USB key, a smart card or magnetic, a disk, a badge, a ticket such as metro, a pass with contact or without contact as is a transport card.
- the receiving object can be a support or a telecommunications terminal, or television broadcasting such as a television set, a video recorder or a decoder, and more generally any computer or electronic equipment capable of participating in an information distribution.
- a mobile mail carrier it may be a computer machine with sockets such as USB, a mobile phone, a wizard or diary, a card or disk drive, a vending machine such as banknotes, an airlock or an identification terminal, as examples.
- the receiver can be external, for example a speaker receiving a mail or accessing a file, as well as internal, like a file or mail content, provided with technical capabilities that make some components active, autonomous and able to participate in actions such as data collection, such as "intelligent agents".
- These autonomous entities endowed with cognition and with capacities of interaction with their environment, can put themselves in dialogue with their own protocol, and make the distinctive sign according to the invention a use identical to that of an external receiver. It may be then to use this sign, with its functional and cryptonymic properties, as well as as a sign of recognition.
- central receiver about this mail the recipient considered by the author as the natural recipient of his mail. It may be in particular a commercial website, a biological analysis laboratory required as part of an anonymised expertise, a toll management company using tickets or cut-files such as magnetic or electronic, without wanting to reveal the true name of its owner.
- the central recipient may be neither the original receiver of the stream nor its final recipient.
- peripheral receivers The other receivers will then be called “peripheral receivers", and may be:
- the invention structures and supports a game with several actors, among which are the author, the various receivers, authorities subsequently called anonymisation. There is added one or more entities named after lock, which can be considered either active or, in a more complete form, passive and responsive to the actions of other actors.
- This game unfolds around a distinctive and characteristic sign inserted into the computer or communication protocol.
- this marking by a characteristic sign said scratching, inserted for distinctive purposes, recognition, and transmission of instructions or information.
- This multifunctional clawing placed at the level of computer or communication protocols, will serve, for a receiver, information in itself or means to obtain additional information from an authorized third party;
- a first feature of the invention lies in its finding that a more secure way not to be stolen a thing is not to hold or know it from the beginning.
- An advantage of this mechanism lies in its ability to regulate this communication, this holding or this processing of sensitive data, to remedy the weaknesses mentioned. This results in a reduction of the risk, as well during their various uses as in the possibility of their loss, theft, piracy or other form of wastage, of imperfect scrapping, of duplication, of subcontracting, of outsourcing or of legal transfer of ownership such as a subsequent purchase of business assets.
- the present invention modifies, recomposes and expands the devices expressed in the patent application FR 2 932 043 relating to a method of traceability and resurgence of pseudonymised flows on communication networks, and an information flow transmission method capable of securing the security. data traffic and its recipients.
- the new invention expands the digital privacy portion, and articulates it with new data security, action control, and information delivery functions.
- This characteristic sign is called scratching, by analogy with the affixing of a claw as a signature that personalizes but also as a mark that modifies, signals and serves as an external sign of referencing.
- This term of marking which encompasses just as much a possible encapsulation, covers a procedure consisting of an addition, an amputation or a characteristic modification, on a protocol, while respecting the standard of this protocol. As examples, it may be the labeling or tattooing of an IP packet, a steganographic marking or the use of an additional protocol.
- a second improvement over the scratching of the protocol is to vary its effects, in several ways:
- clawings activatable by choice or according to defined and updatable job charters. These signs will either be dissimilar in themselves, or distinguishable by another bias such as a schedule that is or not office work, so the presence or absence of the person on the spot.
- Each of the clawings then corresponds to specific information or instructions, such as the designation of only one of the bank accounts of a person. This will allow this author, in case of purchase from a website, to choose his account to be charged.
- This adaptive character will be found on having pre-registered several bank accounts, or several payment cards or for example several addresses and more generally any attribute that may exist in multiple copies.
- a fourth improvement over the scratching of the protocol is that not only are communication protocols but protocols assigned to static data. Thus, it is no longer just content related to a stream, but content that can be a recipient of a stream.
- a fifth improvement is the fact that the scratching, also a sign of recognition, is seen wearing properties including those of a passport: it allows the access or the issuance of non-functional data, as were the instructions. It exceeds this passport status, since it is in itself the equivalent of a key to access a virtual vault, in which some secure accounts are planned for his coming. These secured accounts can still be called chests.
- the anonymization authority is coupled with a lock mechanism. These two entities can be united in one, but can advantageously be maintained in an autonomous situation, supplemented by information transfers between them.
- lock a device acting as a cryptographic access control protocol and responding as much to a given digital than an analog signal, and whose response can be both digital and analogical.
- lock device or the term lock.
- the authority of anonymization serves as an interface with the author, granting him the systems of scratching, agreeing on the meaning and the equivalence of these scratches in instructions, information or values. She also agrees, with and for him, a stable pseudonym linked to the successive cryptonymes that are these clawings, and knowing it by its real identity.
- the lock receives, at least, information of the grafts of the author. In larger configurations, it can receive the pseudonym of this author as well as its coordinates or telecommunications identity. These correspond to what appears in the complete communication protocol of one of his shipments.
- a first mode it serves to validate the reality, authenticity and timeliness of a claw presented to it by the recipient of a shipment bearing such a mark.
- the scratching is then akin to a physical key that one would seek to introduce into a physical lock, for the sole purpose of checking their adequacy.
- Such verification can be conducted in two different ways:
- the action will no longer consist only of introducing the key, but to try to turn the lock. It will be considered here that the longitudinal profile could remain hidden to the receiver, in parallel with the fact that it will not have access to the internal morphology of the barrel. By transposition, the hidden longitudinal profile of the key corresponds here to the party remained functionally prohibited access within the protocol, and the internal morphology of the barrel corresponds to the same part as known by the lock.
- the first use will validate that a graft presented by a receiver is real, authentic and current.
- the second use will be used to confirm with the third party verifier that the part visible or accessible for him in the protocol, is well coupled to the part that has remained invisible or inaccessible to him, for example the communication identity.
- a lock such as actuating a mechanism or signal, allow or not access, open a safe, to be recognized. It may be here for example to provide the receiver who uses it, access or receipt of a deposit or information.
- This function can be as much an automatism independent of the will of this user, as a configuration where he can choose what he needs in a secure account previously filled with various data by the author of the mail or file as well as possibly by the anonymizing authority.
- This safe can be personalized and reserved for access by a single pre-designated recipient, as well as being accessible to several or all possible recipients. This chest can finally also be a furniture storage, in case the author chooses to be his own recipient. Access to the safe may be subject to any form of restraint or conditions precedent, such as opening only after a specified date.
- the said safe of a given author can be subdivided and resemble a mural set of mailboxes of a building, where each resident, that is to say here each receiver, has the means of access the contents of his box.
- a receiver punctually authorized to access not one but several boxes could be sent a key: - either opening one by one the boxes concerned;
- opening for example a single front panel corresponding to these boxes, excluding other boxes, and in a cache logic that continues to hide the contents or locks of these other boxes;
- Such a collection can also and advantageously be done by a marking system in a lock, where a cryptonyme inserted in it would come out with the additional imprint of this pseudonym.
- a marking system in a lock where a cryptonyme inserted in it would come out with the additional imprint of this pseudonym.
- This in the same way that a physical key uncut in its longitudinal direction can be introduced into a lock and be marked inside, by chalk or previously sprayed paint on the internal fittings, a contour drawing this profile research. Or here, by transposing into a basic form, an outline drawing the pseudonym.
- This method is not intended to open the lock, but to learn a second information, the longitudinal profile of the key, when we know a first information, the transverse profile of the same key, which allows to introduce in the lock.
- This mechanism is usable as much to obtain a pseudonym as to obtain knowledge for example of the part remained inaccessible communication protocol, or any instruction or information. It differs from the previous "second modes" which were the actuation of a mechanism, a signal, an access or the opening of a safe. Actually no actuation occurs, but the mere affixing of an informative imprint on, with, around or in a previous imprint acting as a key.
- the lock stands out a so-called "trusted third party" function in that trust is not necessary but replaced by a mechanical process where access to an informative step is materially conditioned to the good control of the previous step.
- the function usually assigned to a "trusted third party" is further subdivided between an anonymizing authority and this lock.
- the anonymizing authority may remain unaware of what will be deposited in the safe, or who will check a scratch. Just as the lock can ignore the real identity of the owner of this sign.
- the receiver may be constrained, to be able to check a scratch with the lock or to activate a mechanism, to make himself use of an identification system, or more frequently authentication, which signals as a known and authorized receiver.
- a configuration could be a two-lock safe, or beyond two.
- This second numeric key will be named later as a counter-key.
- the person assigned to this task opens it in the company of, for example, a predefined colleague carrying a second counter-key.
- This third party, auxiliary, witness or guarantor may be the original author of a letter, or the holder of a computer file marked at the level of his protocol, and who would like to be informed of the subsequent use made of this clawing or of this file, and be present on this occasion. It can also be the anonymizing authority.
- the present invention differs firstly from the patent application FR 2 932 043 in that it modifies the preferred general architecture, by adopting different scission lines.
- the invention is particularized secondly about this partitioning, in that it does not offer the same arbitration between information readable or not, in particular in the sense of accessible by a given recipient.
- this new arbitrations is the partitioning, channeling and, if necessary later or in interval, confronting, juxtaposing or composing information present on both the protocol of a telecommunication flow such as the address of the sender, and out of this protocol even out of this mail or even out of authority anonymization or lock, such as references to a bank account.
- a feature of the invention is, in terms of protection against the risks resulting from the possession of information, the fact that it is no longer really a detention, with the fact that it is no longer really " an information, both singular and exhaustive, in relation to a unity of place, time, and action.
- the first of the evolutions makes that the anonymizing authority can grant the insertion of scratches in static file protocols likely to be receivers of a flow such as a request.
- the second is the appearance of a two-headed structure, where the authority of anonymization is added an entity named lock.
- the invention allows thirdly the existence of several anonymization entities instead of one, as well as the expression of preferences from their users.
- a fourth point is that the border between the anonymizing authority and the peripheral receivers is adaptive and movable if necessary, allowing for example the first to hold some banking data, or conversely to a bank to know or manage various components of the identity-pseudonym link.
- the information in the patent application FR 2 932 043, it is to transmit essentially the correspondence between a cryptonyme and a pseudonym, or possibly to mention for example whether this visitor remaining unknown was a regular or not.
- the authority or the lock will henceforth respond by transmitting or allowing access, according to their right to know, to the equivalence between such clawing making cryptonym and for example a real identity or other attribute punctual a person such as an address, as well as any type of data stored, for example a calculation element deposited by this person, and any kind of instruction.
- It can be a mixture of information and prescriptions: mathematical data and test to be conducted with, accounting data and breakdown to be applied to the books of account, odds and launch of a machining.
- Information filed may also be similar to the principle of half a bank note, torn in two, and without which the second part already known or held by a receiver would remain unemployable, or incomprehensible for a less known image that 'a note.
- the actions may be assignments of order, the supervision of tasks, visa or authorization requirements prior to an action, and more generally all activities falling within a chain of command, a supply chain or still an accounting follow-up.
- the invention may serve as a reminder of such an intention or task.
- the protocol with dogging will be transmitter alone, and a reminder assimilable in its purpose to the sticky paper butterflies on a wall and carrying any mention that the author intends for himself or for others.
- the anonymizing authority is a distributor as much as a recipient of secrets. This function of public officer is reinforced by the fact that the delivery of cons-keys can be used for a third party to be present.
- the anti-repudiation system is traceability and the duplication system adds quantitative control to this previous tracing.
- the device according to the invention covers professions based on trust, fiduciarus, including those relating to the creation or manipulation of money.
- a feature of the device according to the invention is that it can serve as a support for both a monetary exchange device and an electronic payment system, depending on its mode of deployment:
- the trust is centered in the link and the vector that is to say the scratching which passes from a shipper to a receiver, it is like a token, a coupon, a bearer bond, a tax stamp, with a fiduciary dimension, like a virtual stamp.
- a distinctive sign it is recognized a value, a magnitude or a symbolism attached to it, sendable to others, liberating as much as the latter wants to share this perception of value and believe in the robustness of the scratching and the mechanism that maintains its unique character. Clawing can be an amount visibly expressed from the outset by a number.
- the cryptonymic properties of this scratching open a field where its correspondence to a value will refer to an arbitrary convention between at least two actors participating in the exchange, or any other interpersonal activity that may result from a valuation consensus.
- the invention can include the promises of donations and installments, online games, online auctions or even live, calls to value property or immaterial quantities and to exchange or merge them on these respective valuation bases.
- This generally variant cryptonyme, attached to a generally invariant pseudonym, will find here an extension of its applications through the evolution of functions and partitions, in that, while relieving the central receivership of certain knowledge, it nevertheless preserves in its favor an opportunity to gradually capitalize a detailed knowledge on the author, visitor of his website for example, via his current or past behavior, regardless of whether his prior visits were accompanied by purchase.
- the invention creates identity management with drawers.
- the anonymization authority is thus akin to a supplier of digital identity packages with drawers.
- the invention therefore particularly relates to a method for securing and controlling data and identities within a communication process between an author and at least one receiver, said method comprising at least:
- the data stream comprising at least one instruction.
- the scratching is cryptonymic, it is for example attached to at least one pseudonym.
- the data flow is received at the receiver or upstream of the receiver, partitioned and channeled, or for example masked, treated, cantoned or refused, by parts of instructions, said parts of the mail or file can be predetermined, and said partitioning, masking, processing, channeling, blocking or refusal is performed according to instructions received from the anonymization authority or via the lock device, by means of the dogging.
- the data flow protocol is received at the receiver or upstream of the receiver, partitioned or masked, processed, channeled, confined or refused, by parts, said parts of the mail or file protocol being able to be predetermined, and said partitioning, masking, treatment, channeling, cantonment or refusal taking place according to instructions received from the anonymisation authority or via the lock device, by means of the dogging.
- the clawing corresponds to different responses or different ways of responding from the anonymizing authority and the lock device, to different functionalities or modes, or to different modes. depending on the addressee, the context and the environment in which the addressee evolves, the chronology or location of the facts, the manner to act or to be of this recipient, the nature of the data or the signal corresponding to this scratching or what it will implement, these modes of operation being able to be pre-established and discriminated according to items agreed with the author, as much as case by case in one or more stages.
- the clawing key and on the other hand the said lock are for example each in whole or in part the respondent of the other, either as a profile and counter-profile, or as an image and its negative, or as a matrix and its work, as a claw and its scar, this complementarity towards a whole or a succession generating capacities for dialogue, correspondence, reconstitution of all or filiation, for purposes of validation, identification or authentication, actuation of a signal or a mechanism, expression of a meaning or a set of instructions, or connection between them.
- the dogging acting as key of the lock device that is to say, opening the device, it engages for example an access, an actuation of any form of lock and door to a reserved space. It can also trigger a mechanism or a recording, an action or a technical reaction, or an informative or declarative signal.
- the lock device may exist, independently of the secure account or other subordinate device, for purposes of validating the reality, the authenticity and timeliness of a keying claw.
- An operating instruction transmitted or accessible by means of scratching is for example an authorization, a prohibition, total or partial and discriminated, the issuing of requests or conditional clauses, the activation, the modification or the stopping of a function a receiver.
- the communication stream or the file consists only of the protocol marked with the scratch, to the exclusion of any content.
- the anonymization authority or the lock device holds, for example, any type of instruction, data or signal relating to the management of a stream or file with the protocol with dogging, as well as any type of instruction, given or signal connected to that clawing or to a given identity, but independent of this direct management and for their mere provision from the author to a receiver.
- the lock device acting as a cryptographic access control protocol, is for example provided with parts not visible by a receiver, allowing the validation of a cryptonymic scratch, or data that remains unknown and corresponding to these non-visible parts. , or the link between this known cryptonyme and this unknown part, or the link between several unknown parts, the unknown part being a pseudonym, a real identity, the continuation of the computer or communication protocol, the contents of the file or mail, or any other information or instructions.
- a lock can align a juxtaposition, a succession or a composition of said counter-profiles, so-called negative, said matrices or works or said scars, corresponding to at least one scratching as well as to other data such as a pseudonym.
- the lock allows during its test by the dogging, the apposition or insertion of additional data in, with, around or on this dogging.
- a functional instruction relating to the communication, the processing, the reading or the storage of data, results for example from the presence of the scratching in the protocol, the instruction concerning the content of the flow, the file or the rest of the protocol.
- the prohibition or partial functional authorization concerns for example, a predeterminable part of the mail or the file, both in its content and in its protocol.
- the prohibition of storing certain data in a receiver is accompanied for example by the elimination of these data.
- the grafting is for example used by its successive receivers as a sign of recognition between them or with the author, as well as to obtain from an anonymizing authority or via a lock, the correspondence between this scratching and attributes of the identity to which the said clawing is pieced, or any other data or signal, retained by them for the purposes of that transmission.
- the anomysation authority or the lock device is for example entitled to transfer to a receiver or an approved third party, said correspondence or said data, said receiver or third party using said correspondence or said data, to perform a task devolved on him by a previous receiver or the author of the stream or file.
- Said task adds, for example, information received from the anomysation authority or the lock device, on a job that is partially or completely anonymous or incomplete, waiting for the identity attributes required to use it, to forward it. or finalize it.
- Said work is for example related to an electronic transaction between the author of the mail or file and a main receiver.
- Said work is for example relating to a physical or telecommunication routing between a main or peripheral receiver and the author.
- Said work is for example related to a writing game, being performed between the author and a main or peripheral receiver.
- Said work is for example related to a verification of the operation, behavior, state, integrity or authenticity of a terminal or a communication medium, and the mechanisms connected to them.
- a peripheral receiver acts as an anonymizing authority for the correspondence between the dogging and various data or responses related thereto.
- the anonymizing authority is, for example, notified of a receiver delegated to a task or a role, by the author or by a previous receiver.
- the anonymizing authority transmits for example the correspondence between such cryptonym, such pseudonym, and secondly behavioral information, situational or related to the past or the profile of this author, for the purpose of characterizing it without necessarily transmitting either its true identity or another of its pseudonyms.
- a scratch inserted in a protocol, or the pseudonyms attached to it, or autonomous sub-parts or composed of these three options, can be used to mark or tattoo objects, materials or real beings, for purposes of recognition, validation of rights or status, valuation, membership or dependence, linking, identification or authentication without revealing a true identity.
- File or mail content equipped with technical capabilities for interacting with their environment, which makes some components of them active and autonomous, can be put into dialogue with their own protocol, and make the same use of a scratch. external receiver.
- FIG. 1a a non-exhaustive synthesis of the device according to the invention, in its mechanism and its effects on any complex procedure, and on the entities involved in this procedure;
- FIG. 2 the method of managing a file or letter carrying scratching issued by an author
- FIG. 5a an example of verification of a cryptonymic scratch near a lock
- FIG. 13 a mode of deployment of the method according to the invention making it possible to anonymize and restrict restrictively the memorization of a stream for which the author would not have a full freedom of choice of the recipient, of a full freedom of activation or not of this stream, or a full control on the system transmitting this stream;
- FIG. 14 a particular mode of deployment of the method according to the invention in which a receiver will have access to identity or information attributes present in the computer or communication protocol, but without knowing the nature and detail of his relationship to follow with the author. He will only be informed of the existence of this link;
- FIG. 15a a use of the device in a business-to-business or inter-site relationship, for administrative or productive purposes;
- FIG. 15b a configuration of use as a stamp, stamp or control stick, passing between successive carriers, and transmitter of a meaning, of an agreed magnitude or value, or of a form of exclusivity;
- FIG. 1a illustrates in a simplified and non-exhaustive manner the general principle of the method according to the invention, in its means, its actions, its points of impact and its consequences.
- the invention uses a device 10 'essentially consisting of three central tools, which are an anonymizing authority, a means of marking the computer or communication protocols by a distinctive sign and feature called scratching, and a so-called digital lock.
- This lock is in itself a counterpart to the previous distinctive sign since it represents, among other functionalities, a hollow imprint of it, or its original mold since the chronology of their respective births is reversible as much as simultaneous placable, just as much it may be a negative image, a counter-silhouette or a counter-profile, the scar, wake, event, possibly standardized, as here as this scratching. From this kinship can arise multiple functions of identification, authentication, validation, but also hanging on the principle of tenons and mortises. It may still be the appearance of a meaning or an action during their meeting.
- - silos expressible in particular by dividing entities as well as actions, separating them and making them autonomous or subject to different purposes, as well as hiding, scrambling, de-marking and anonymizing.
- a channeling mode expressible in particular by distributing them in a parallel or sequential manner, composing them, creating them links or cooperation, aggregate, unmask or re-mark these entities or actions.
- This device 11 ' by its partitioning and channeling, affects definitively or provisionally and therefore sometimes reversible entities and actions concerned 12' under their two quantitative and qualitative properties.
- the quantity includes, in particular, the multiplication or reduction of the number, the modification of the perimeter, while the qualitative concerns mainly the modification of their nature or their identity.
- Figure 1b specifies the general mechanism of partitioning and channeling, illustrating the cleavage lines 180, 181 and their temporal scheduling, before or after a stream has been emitted, or retransmitted for all or part to a third party.
- the method of the invention provides a secure account 45, safe, able to receive in deposit, from the author, instructions 182 such as later deliverable instructions or information. It can also be identity elements, for example a true identity, cryptonymic or pseudonymic, and correspondence between some of these identities.
- the trunk 45 is provided with a lock device 50, digital or analog, activated by a multifunctional clawing key.
- the receiver (s) presenting said key to said lock, this key carrying a secret that opens the lock 50 acting as a cryptographic access control protocol to said secure account.
- the keying and on the other hand the said lock are each in whole or in part the respondent of the other, either as a profile and against-profile, or as an image and its negative, either as a matrix and its work, or as a claw and its scar, this complementarity towards a whole or a succession generating capacities for dialogue, correspondence, reconstitution of all or filiation, for purposes of validation, identification or authentication, activation of a signal or mechanism, expression of a meaning or an instruction such as a setpoint or a datum, or of solidarity between them.
- This scratching is affixed by the author, by means of a marking system, at the level of the computer protocol or communication 183 of a stream or a file 1, which protocol is comparable to a container.
- This container as much as the content 184 is subject to possible total or partial restrictions of access, processing, storage or transmission and retransmission, on the basis of the instructions obtained via scratching from the secure account 45 or the authority of anonymisation, or on the basis of prior instructions corresponding to the simple observation of the presence of scratching in a protocol by its receiver.
- At least one operating instruction dedicated to at least one receiver is transmitted or accessible by means of the dogging. Said operating instruction is for example an authorization, a ban, total or partial and discriminated, the issuing of requests or conditional clauses, the activation, modification or termination of a function of a receiver.
- the method elaborates a partitioning of data or instructions of a temporal order, in that:
- a part of the split 181 can be made before it is sent (ante shipment), with the filing of instructions 182 placeable by the author in his safe 45 provided with lock 50 (secure electronic account) and managed by the authority of anonymization;
- At least one other part 180 can be performed on receipt (post-shipment), according to instructions available from the anonymization authority or via the same lock 50, activated by the presentation of the accompanying clawing of this shipment.
- FIG. 1c illustrates, by way of example, the various parts of a mail or file 1 that can be assigned in the event of, for example, a prohibition or order of reading, processing, recording or transmission, intended for a receiver 2:
- this part can take the form for example of boxes or digital inserts in the mail or in the file, or segments of its content responding to a detachable coupon logic. These latter cases can lead to split mail or file.
- Figures 2 and 3 describe this distinctive sign named scratching, its operation and its role. They make it possible to specify the difference between, on the one hand, the intrinsic functional value of this dogging, and on the other hand its passport status to obtain from third parties additional information or other instructions.
- the dichotomy between intrinsic meaning and passport emphasizes the widening of the roles of this sign, which is both distinctive and of recognition in relation to the patent application FR 2 932 043.
- FIG. 2 illustrates the method of management of a document 1 or of a scratch-carrying mail sent by an author 10, the mode of interpretation of the latter and the functions corresponding to his presence. It details the use of the intrinsic functional meaning of this clawing, that is to say the fact that its presence corresponds in itself to a function triggerable by a central receiver 2, a function that may be prohibition or authorization , modifying or stopping a given action such as reading, accessing, processing, recording or transmission.
- a device 11 managed by an anonymisation authority 4 provides the author with 10 a dogging system and a convention of use which agrees on the functional significance of this dogging according to the receivers or according to other differentiating criteria.
- the patent application FR 2 932 043 preferred the fact that the scratching inserted in the protocol is almost mono-function, centered on the principle of being able to read or not certain data. It is now allowed a variety of broader functions, processing, recording or transmission of each data. This enlargement is multiplied by the fact that the dogging does not constantly correspond to the same instruction according to its types of receivers or according to other criteria such as calendar. As a result, there is almost an infinity of variants, especially since each type of instruction can be of a total or partial level.
- the dogging will be set to initiate actions from the information present in this mail or this file, especially in the remaining part possibly prohibited access for the only central receiver 2.
- Either the receiver 2 or 3 has from the outset knowledge of the functional significance of the marking, or he asks the anonymizing authority 4 or the lock by presenting him with a copy of this scratch or the protocol as a whole.
- the authority or the lock transmits the correspondence between this clawing and the instruction corresponding to such a receiver, or such type of receiver. There may therefore be several different instructions depending on the nature and the number of receivers, or even a progressive issuance of these instructions.
- a prohibition of access, reading, processing or recording may take the form of an immediate rejection of the documents, sections or information spaces complained of, so that they do not penetrate not in the computer system for example from the central receiver.
- the corresponding data will either be rejected and without a recipient, or automatically directed to predetermined peripheral receivers 3.
- it may be a buffer zone or a black box, independent of the system Central Receiver 2, and placed upstream, under or out of its control.
- the presence of the clawing will be noted further upstream, for example at the level of the telecommunications operator 5 as soon as the flow concerned is in transit.
- the coexistence of this dogging with the indication of such pre-registered recipient will automatically direct all or a predefined part of the flow to a third entity entrusted with a delegated management, replacing the central receiver.
- This referral is accompanied by possible tasks such as partial retention or amputation, agreed according to the general procedure of initial reception.
- this variant would not fundamentally modify the general scheduling since the central addressee would remain central because using a simple right to the delegation, and because remaining recipient in the mind of the author as well as responsible for the successful completion of the process.
- Figure 3 details the role of passport endorsed by the dogging, to obtain other information or instructions that those, functional, directly attachable by a receiver to the management of mail or file. It illustrates the respective game of the various receivers 2, 31, 32 and anonymization authorities or the lock, between them and vis-à-vis the data present in or out of the mail or file 1 governed by scratching.
- the variety of responses that an anonymizing authority or the lock will be able to deliver in view of the clawing goes beyond the field in which the patent application FR 2 932 043 was placed.
- the latter was, apart from instructions, confined to information 201, 311 , 321 often minimal, themselves essentially related to identities alone.
- the anonymization authority 4 or the lock can currently issue any type of instruction or information, such as an identity, a pseudonym, an address, an accounting or scientific calculation element, that is to say more usually any missing element for the accomplishment of the tasks and for the understanding of the treatment to be administered to them. For example, it may be a way to decipher such content and then use it in the rules, as well as its general instructions.
- the anonymisation authority 4 or the lock retains the information and instructions 201, 311, 321 on behalf of the author 10.
- the information or instructions may also vary depending on the types of receivers or other criteria such as calendar.
- both means of access to a setpoint and means for obtaining or activating other information named external information will be obtained either:
- the peripheral receivers 31, 32, or the central receiver 2 can act in the same way with the possible part of the mail or file on which they had the right to act, mixed also with internal or external information.
- the unknown term may be understood as inaccessible, illegible, indecipherable, incomprehensible or inexpressive, it may therefore be:
- - linking unknown information with other unknown information for example, a distinctive sign referring to another secret or arbitrary code, in the case of a dialogue between the authority anonymisation or the lock and a credit card group knowing a customer through a personal number;
- FIG. 4 illustrates the case of a static document 41 present for example on a computer, where a dogging 53 is inserted in its computer protocol.
- the author, the keeper, the depositary or the manager 43 of this document 41 may firstly affix the dogging 53 in the protocol, and secondly file the meaning of this dogging with the anonymisation authority 4 or for example a digital safe 45, protected by a lock.
- a visitor 44 wishing to access this document for purposes of knowledge, processing, transmission or recording, must, in view of the presence of the dogging 53, previously obtain its meaning either from the anonymizing authority 4 or from of the digital safe 45.
- FIG. 5a illustrates the verification of the clawing with the lock 50.
- the anonymisation authority 4 serves as an interface with the user of the claws, the author 51 of flow or the file holder, by granting him the control systems. scratching, by agreeing on a stable pseudonym linked to successive cryptonymes, and knowing it by its real identity.
- the lock 50 receives, at least, information of the grafts of the author. It makes it possible to validate the reality, the authenticity and the actuality of a dogging 53 presented to it by a recipient 52 of a consignment carrying such a sign 53.
- the dogging 53 is then similar to a physical key that we would try to introduce in a physical lock, for the sole purpose of checking their adequacy, and make sure that the transverse profile of the key, pictorially with its specific grooves, corresponds well to the cutting of the inlet port lock, and therefore check whether or not it can enter this dwelling. This without having to turn it once inside.
- the receiver and verifier can, however, collect other information through the introduction of the key in this lock.
- This collection is done mechanically by a marking system where a scratch inserted into a lock would come out with the additional fingerprint of a second piece of information.
- a physical key uncut in its longitudinal direction can be introduced into a lock and be marked inside, by chalk or previously sprayed paint on the internal fittings, a contour drawing this profile research.
- transposition of an outline drawing the pseudonym corresponding to the cryptonyme.
- This mechanism is usable as much to know for example the remaining inaccessible portion of the computer or communication protocol, or any instructions, information, secret or signal.
- no lock actuation occurs, but the mere affixing of an informative imprint on, with or in a previous imprint acting key. This apposition is consecutive to the adequacy check between this key and this lock, when they are put in relation.
- Figure 5b shows a particular use of the lock, confirming with her that the scratch belongs to its author approved. It is currently not yet desired to open a safe, an access, an airlock or actuate another mechanism, and the only proper functioning of this lock will itself be relevant information.
- the lock 50 will be aware of the co-ordinates or telecommunications identity of an author as well if necessary as of his pseudonym. These communication coordinates corresponding to what appears in the complete protocol of one of his shipments.
- the action will consist of introducing the key and then trying to turn the lock. It will be considered here that the longitudinal profile of the key could remain hidden at the receiver 52, in parallel with the fact that it will not have access to the internal morphology of the barrel 502, with in particular the length of the pins or the position of the linings internal.
- the hidden longitudinal profile of the key here corresponds to the portion remaining functionally prohibited access 532 within the computer or communication protocol, and the internal morphology of the cylinder corresponds to the same part as known and transmitted to the lock by the anonymisation authority 4.
- This use serves in particular to confirm with the receiver and verifier, in case of proven correspondence between the functionally prohibited portion of access 532 and the internal morphology of the barrel 502, that the visible part 531 or accessible for him in the protocol, is well coupled to the part that has remained invisible or inaccessible to him. That is to say, for example, to confirm to this receiver that such scratching of which he has knowledge is well coupled with the identity of communication which accompanies it, such as the authority of anonymization 4 recognizes them related.
- Figure 5c shows an assignment where the lock is used for all common uses of a lock, such as actuating a mechanism or signal, allow or not access, open an airlock or chest 59 to access its contents.
- This function can be as much an automatism independent of the will of this user, as a configuration where he can for example choose what he needs in a vault previously filled with various data by the author as well as possibly by the anonymisation authority.
- This box 59 can be personalized and reserved for the access of a single pre-designated recipient, as far as being accessible to several or all possible recipients.
- This safe can also be a furniture storage, in case the author chooses to be his own recipient. Access to the safe may be subject to any form of restraint or conditions precedent, such as opening only after a specified date.
- the contents that the receiver can collect via this lock and the opening of a digital safe 59 are not limited a priori: it can be identity attributes, the pseudonym of the author as well as any data, instructions, information signal or trigger, provided only that the filing has been made by or with the consent of either the author or the authority of anonymisation or third parties authorized by them, according to the various employment charters possible.
- identity attributes the pseudonym of the author as well as any data, instructions, information signal or trigger, provided only that the filing has been made by or with the consent of either the author or the authority of anonymisation or third parties authorized by them, according to the various employment charters possible.
- it is not a safe but another type of device such as an airlock or mechanism their configuration and operation will be regulated again either by the author or the authority anonymisation.
- the function usually devolved to a trusted third party is here subdivided between an anonymization authority 4 and lock 50.
- This lock can be a single entity and autonomous acting as a counter. It may have other configurations, until its installation with the receiver 52, in a logic for example of black box receiving priority streams. In the latter case, the updating of the data relating to variant claws or contained in the digital vault, will be through either a central point managing these decentralized digital locks, or the anonymizing authority, or a mix of both.
- the notion of central point does not imply its immutability or uniqueness.
- the receiver and verifier may be constrained, in order to be able to verify a cryptonyme clawing with the lock 50, to make use of an identification or authentication system which signals him as a known receiver and authorized.
- Figure 6 illustrates an example of use of a digital key requiring that of cons-keys.
- An author 51 has a document, or issues a mail, with a dog 53.
- a given chest 45 is provided with a lock 50 corresponding to the dogging 53 inserted in a protocol, as well as a second lock 50 'corresponding to a mark 53' granted to a receiver 52 or to a delegated authority.
- This receiver 52 or his delegate, to open the trunk or to operate the first lock 50, must make use of both dogging 53 discovered in the protocol, named key, and of its own brand 53 'named counter-key.
- the number of locks is not limited and other 53 "counter-keys, corresponding to other locks 50", can be attributed to the receiver, or to a third party such as one of his colleagues 61, even the author who affixed the initial scratching.
- the entity 4 that grants or not, issues and distributes keys and counter-keys is an anonymizing authority.
- it may be an entity dedicated to this function. It can be a plural of entities.
- An anonymizing authority may itself hold a counter-key for such a safe.
- FIG. 7 shows the main possible steps of a method according to the invention, applied by way of example to a central receiver 2 having received an order 1 emanating from a customer as part of an online purchase, for example on Internet.
- Their relationship based on a desire to protect various attributes of the client's identity will be translated to the website manager by the fact of prohibiting him functionally for example to become acquainted as well as to preserve and archive, or to process, contained data.
- This receiver 2 will prepare the package and the invoice, but will know neither the name of the buyer, nor his bank references, nor his mailing address to send the package. His knowledge will be reduced to:
- Copy of the scratch will be sent by him to a group of bank cards 72, accompanied by the invoice without name.
- This sign of recognition will allow the group to determine the identity of the debtor to be added, and to proceed to the corresponding financial levy.
- the same dogging will be sent to a postal administration 73, accompanied by the parcel without the name of the consignee. This sign will allow the postman to add the corresponding name and physical address.
- peripheral recipients which are a group of bank cards 72 or a postal administration 73, will request or have received in parallel transmission of the equivalence between such clawing and such peripheral information left in their sole discretion.
- This parallel or sequential provisioning can result either from a communication directly brought to their attention by the author 10, or, in a more rational organization mode, by the anonymisation authority 4 which will centralize the management of equivalences. or via the lock.
- One or the other will cooperate with the peripheral receivers 72, 73, transmitting to them the equivalence between a grappling 71 and a real identity or other one-off attribute of a person.
- This peripheral receiver is a peripheral receiver
- the anonymizing authority or the lock may hold them and transmit them to him, as well as any other non-residential address left to the client's choice. 'author.
- the latter address may be that of the person receiving a purchase of flowers or a jewel to be delivered by a third party, when it is desired that the merchant does not know the buyer or the beneficiary.
- peripheral receivers are not limited, and the previous example can be expanded.
- a telecommunications operator 75 is likely to be activated to route a response to the author 10, adding his Internet address on a label from the central receiver 2. This device also works if the author of the mail or the visit becomes at a later time beneficiary for example of a download or for any other reception.
- the information and instructions that can be transmitted via the anonymisation authority 4 or the lock are not limited a priori. It may be not just a identity attribute such as a mailing address, but also details of the desired shipping terms, the type of packaging desired or any other request. In a variant, and in order to limit the autonomous power of action or decision-making left to the peripheral receivers, it may be envisaged that this peripheral information is itself incomplete or insufficient to understand or carry out the intended task, without reception in sus:
- the peripheral receiver in charge of the financial levy on the account of the author can serve as an intermediate account when the payment to the central receiver.
- Figure 8 presents the possible steps of an anonymized response to an anonymized application, or to a grading of an online test, since the various tasks mentioned in the latter are likely to motivate the same desire for confidentiality or of intimacy in the sense of return. This configuration can also follow chronologically that of Figure 7.
- the central receiver 2 receives the submission 1 without being able to access the content, automatically transmitted to a peripheral receiver 73 who does not know the author.
- the rating or response is then transmitted via the central receiver 2 if he has the right to know the author, or more advantageously to perfect the anonymization through a third party 81, to whom he addresses scratching and grading or answer.
- This third party obtains the contact details of the author from the anonymisation authority 4 or via the lock, and sends him the answer without specifying the speaker who made it.
- Figure 9 presents the possible steps that allow a data receiver, such as an e-commerce site 2, to continue part of its activities of good knowledge or profiling of its consumers or visitors, but via a form of anonymisation. which does not disturb it on its useful part.
- a receiver noting the presence of a grading 71 on a mail will obtain its equivalence in the form of the pseudonym of the author, such as Harlequin.
- the pseudonym 74 is invariant, while the clawing 71 is variant, likely to have changed since the last mail.
- the anonymizing authority 4 or the lock is able to connect this series of clawings to their stable pseudonym.
- the principal receiver 2 is thus able to link the present visit or request of the author to his past and previous observations.
- it may be to measure the evolution of a health factor.
- it may be to have listed its purchases, preferences, interests, as well as its rights or duties such as a discount for purchase fidelity.
- This receiver 2 may also send letters to this author, without knowing his real identity, and through the receivers 73, 75 who will obtain this confidential data via the anonymization authority 4 or the lock, on presentation of the dogging.
- the central receiver 2 can customize, for example via a webmaster 91, the page visited, configuring it based on this knowledge of the past of Harlequin.
- Figure 10 presents a variant providing a restriction to the principle of recognizing without knowing, presented in Figure 9.
- Possible variant when it is accepted by all the protagonists, and authorizing several pseudonyms simultaneous or successive to the same author.
- This arbitration where one or more scratches referring to a plurality of pseudonyms would all connect to the same identity by a tree game, or form single-chain aliases, would reinforce the secrecy surrounding it, to the advantage of the author but at the informative expense of the receiver.
- This may be part of a logic of pseudonyms à la carte, as there are à la carte identities or degrees of protection and security à la carte, and correspond to an expectation of the author bearable by the recipient.
- the central receiver 2 will ignore the link between the various pseudonyms of the same interlocutor, but will retain the guarantee that under its multiple appearances it remains approved by the authority 4 granting the pseudonyms. Homologation likely to result from selective criteria themselves known to the receiver 2, these criteria being able to maintain an interlocutor as persona grata or enjoying benefits.
- the receiver 2 could signal to the authority 4, that it now considers such interlocutor as persona non grata, whatever its pseudonym of the moment, and so ban it in the future in a mail or a visit from him.
- the ban could possibly be more absolute by a mechanism to widen the scope of the sanction to other receivers 21, 22 having accepted the principle of this decision-making community of approval, grading, banishment or quarantine.
- a bank that considers that a veto issued by a group of bank cards against a person automatically applies to it too, at least as a precautionary measure.
- this variant may be deployed in a manner in which the author can initially but definitively choose which of his pseudonyms that it desires, to address such a receiver 2, 21, 22. Subsequently, he will keep this pseudonym during his later correspondence.
- two different receivers could not know that Harlequin, in one, and Pierrot, in the other, correspond to the same author, knowing that their holder corresponds under these two labels to their accepted behavioral code.
- the loyalty of a visitor to two sites could lead to discounts calculated on the addition of its consumption at each.
- One of the interests of this formula is a limitation to cross files beyond what is sufficient for the good relationship to the consumer.
- the anonymisation authority 4 or the lock via a deposit and registration mechanism may serve as a central hub for the ratings, assessments or quotations from the various receivers, and concerning the same author whatever the pseudonym 101 under which it is initially labeled.
- This anonymizing authority 4 or the lock will distribute these judgments to other receivers either at their request in view of the transmitted scratch, or more automatically according to a predefinable employment charter.
- FIG. 11 presents a configuration in which the same author can simultaneously have several different gratings A, B, which can be used according to his choice or according to predefinable procedures.
- This adaptive character may also relate to pre-registering several bank accounts 111, 112 or several payment cards or for example several addresses and more generally all attributes. Each pre-registration gives rise to attribution not only of a scratch A, B, but of a filiation of this distinctive sign, since this one is variant.
- This plurality of choices offering the possibility of rendering preferentially activatable one more than the other, according to predefined employment charters and updatable if necessary, a charter linking the author 10 to the anonymizing authority 4, which from then on it will transmit to a receiver 72 the corresponding information.
- a variant consists, for example, in that a mail to a receiver 2 is coupled to a copy with a one-off instruction, to the anonymisation authority 4 or under lock.
- This less simple formula would be conceivable mainly for cases suspended from reservations, conditional, suspensive or moratorium clauses, confirmations or validations to come, such as a final choice of debit account made after verification of the assets actually available on the various accounts of the author. This can be considered also for cases of subsequent validation of a choice on which the author is legally entitled to return, or when he expects effective delivery of a product or service to judge its real quality.
- Figure 12 presents provisions in which pseudonyms, polynymes or cryptonymes according to the invention are likely extensions and uses in the social or economic material life.
- the triple level consists of a real identity covered by claws functionally masking this identity, and themselves referable to one or more pseudonyms 123, are used in real life.
- a pseudonym can thus express itself, as a substitute for the traditional real identity, on a physical physical medium, such as a kind of identity card, a smart card, a ticket, a token or a form of tattoo or custom header. This could find employment for example to come to withdraw at a counter or to justify to a controller an order previously placed and paid by telecommunications.
- FIG. 13 shows a mode of deployment of the method according to the invention making it possible to anonymize and restrictively restrict the storage of a stream 1 for which the author 10 would not have a full freedom of choice of the addressee 2, a full freedom of activation or not of this flow, or a full control on the system transmitting this stream.
- This situation is common, as single-use or single-manager communication media, such as public transport companies. These frequently opt for anonymisation either on a memory erasure in one or more times, so subsequent to storage, or on an anonymization prior to the manufacture and delivery of the support.
- the present solution would be between the two options mentioned above.
- the electronic ticket of a person would be indicated in terms of identity, near the crossing 131, only by scratching, functionally masking any other attribute of identity. This clawing would eventually be transmitted to the anonymizing authority 4 or the lock, via a central receiver 2, in case of desire to profile the behavior over time, but would be known only by the invariant pseudonym transmitted back .
- the terminal of each subscriber intermittently sends a signal to the relay antenna network, to indicate its current geographical position in case of a call coming from 'a third.
- many of these devices result in forms of traceability which make respect for the intimacy of a random security of the detention or erasure of the corresponding data, or an ethics difficult to verify.
- Such a technical solution would also find application in a number of terminals or communicating media, and in dialogue with land or on-board terminals as well as positioning and geolocation satellites.
- such a manager knows the behavior of a user only through the scratch corresponding to a pseudonym. Depending on the chosen cases, it could also continue to manage a customer in parallel by knowing this time by his identity and in particular through its successive payments. However, even in the case of such a parallel knowledge of his real identity, the manager could not establish a link with a given behavioral profile, within all his clients. This cut-off option would enable him, on the face of his name, to check unpaid bills or, among other relational possibilities, to provide him with discounts or benefits resulting from his position as a client.
- a third example of application would concern software or electronic component manufacturers able to interact directly and on their immediate or programmed initiative, with software or equipment installed on the terminal of a user.
- the desire to see online breakdown, behavior or general condition, would be attached only to scratching this user.
- This procedure would be parallel and decoupled from that of managing the relationship with the customer as a known buyer and payer, according to a partitioned deployment mode: anonymization authority possibly coupled to a lock on the one hand, and peripheral receivers of somewhere else.
- buyer broadens to forms of contractualization common in computer science, such as leasing.
- FIG. 14 shows a method according to the invention in which a receiver 2 of mail 1 will have access to identity or information attributes present in the communication protocol, but without knowing the nature and detail of his relationship to follow with him. He will only be informed of the existence of this link.
- the central receiver 2 could have such author as customer, as member or interlocutor, but would remain unaware of the service that will be provided.
- the service involved invoicing or other accounting the amount concerned would, for example, be included in the bulk of the other receipts and would remain unknown in detail by the central receiver.
- Such a case could usefully be applied when donating to a charity or for an online quest, when the authors do not want the amount paid by each to be known to the receiver or ultimate beneficiary. The latter would know who to thank, without being able to judge the respective amounts.
- the spectrum concerned would go from kitty for a retirement, until a donation giving right to tax exemption itself managed by an ad hoc peripheral receiver.
- the central receiver 2 retains only the protocol, but without the right to know anything other than scratching. In this way, he will be informed of the fidelity of such anonymous interlocutor, of the act of sending made by this author to his attention, and will be able to guarantee that the mail has arrived. This return in the form of an acknowledgment is effected, for lack of communication address, by a peripheral receiver such as a telecommunications operator.
- Figure 15a shows a use of the device in a relationship such as inter-company or inter-site, where the scratching will allow the delivery of data or signals.
- a computer file 1 whose protocol bears a scratch, and kept on the computer of an "author" company 10, receives the visit or the download request from an employee of a partner company, or another site, who wants to use the content.
- the presence of the claw initially returns this visitor or receiver 2 to the anonymizing authority 4 or lock, which issue conditions, requests, instructions or information, prerequisites, simultaneous or consecutive to the possible authorization of access or download, authorization of functional order but which can also take physical forms such as a decryption key content.
- Identification and authentication tools can be used on this occasion.
- the authorization or prohibition may also concern the processing, storage or retransmission of all or part of the file and its contents.
- a request may be to justify a prior approval granted by the holding company to this partner.
- An instruction may be to inform a supervisor 173 or to send him a copy of any subsequent action taken with this content.
- the supervisor may be for example a technician whose presence is deemed essential, a leader whose knowledge or countersigning is desired, an accounting or legal department responsible for postponing this job in his books, as well as an autonomous technical system such as a timer which will record for example the duration of consultation of the scratched file, in a case where a pricing will be based on a duration.
- the employee having for example downloaded the file, can forward it to a subsequent receiver 171 for the purpose of carrying out a task.
- the initial scratching may retain an entire role, and require successive receivers to address the anonymizing authority or the lock.
- An electronic cabinet managing the production of a workshop, and the receiver can thus be signified a level of urgency of the manufacture, supplemented by an obligation to be aware of the tariff grid emanating from the electricity producer.
- an arbitration can be conducted at the level of the cabinet as to the expectation or not of a low tariff range, corresponding to schedules of low collective consumption, no peak production or the risk of overloading internal or external distribution networks.
- the numerical control machine 172 receiving in turn the scratched file may among other possibilities be notified the activation, prior to its start, a sound warning the surrounding workers or a staff d maintenance, to stand at a safe distance.
- This security system, or alarm, 170 can also be activated directly by the anonymizing authority.
- This device presented as inter-sites, applies equally to an entity to ensure its autonomy and self-control, such as an airframe, where various electrotechnical transmission commands must ensure their proper operation at each step, especially for all-electric aircraft.
- FIG. 15b illustrates a configuration of use where the scratching 200 is similar to a stamp, a stamp or a control stick passing from the author 10 to successive receivers 176, 177, 178, being a carrier and transmitter of a meaning , of an agreed size or value, or a form of exclusivity.
- stamp emphasizes the impossibility of unauthorized access to a content or a meaning
- concept of stamp emphasizes the possibility of a face value
- control stick expresses a divestment to the profit of a new carrier, keeping this initial value, this magnitude or this symbolism.
- a grafting endorsing such a representativeness implies that it is not falsifiable or imitable and reproducible in series, difficult criteria to obtain in technologies to which the cloning faculty is almost inherent.
- This fragility can be circumvented with the present device, by the fact that a global trust is not only placed in the technical graffiti, but also in the confidence that the community which practices the exchanges is carried to itself and its solidarity, as well as in the trust that it places in the body that grants them.
- the combination of these three sub-parties of trust builds the sum, and a decline on one of them, as far as it does not reach a crippling threshold, can often be offset by an increase on one of the two other.
- the authority of anonymisation 4 assumes a role of federator of communities.
- communities able to good internal cohesion because knowing sharing, for example, the same ethics or the same behavioral standards incorporated in these stipulations to be and remain approved.
- Transferring these properties of transparency and verifiability in telecommunications, while moving to a larger spatial and quantitative scale, is usually difficult since the latter, and especially the Internet, instead play on the argument of anonymity if not unlimited use of false identity.
- the device of the invention will remedy this dilemma by being both a tool that allows to know others, while leaving it anonymous, through its pseudonym system.
- the anonymizing authority or the lock informing the successive receivers of the meaning, the size or the value attached to the scratch itself, may indeed present the sender under his pseudonym 74 as well as by his true identity .
- This real identity could previously remain inaccessible to these receivers by the claw functionally masking the telecommunications identity of its author.
- the fact that the scratching expresses what it represents only via this request from the receiver 176, 177, 178 to this authority or to the lock makes it possible to trace its course, to guarantee that it does not find itself counterfeited or duplicated, at least not otherwise than according to an agreed employment charter within the community.
- the authority of anonymity assumes a status of flux observer, and guarantees that it applies to it, in the desired proportions, the adage of nothing is created nothing is lost. She is the transmitter of the system of dogging, then observer bringing its guarantee in terms of traceability, partially assimilable in its finality to a sending with acknowledgment of receipt.
- the authority of anonymization can thus associate or merge with another organism 175 able to give it and make recognize a given size, value or symbolism, and give it course.
- This agency both regulator and guarantor, may be for example a railway company in the case where scratching is a momentary exclusive use of a lane, granted to such a recipient. It may be a postal service that awards a face value to a kind of digital stamp or stamp, during a secure routing on networks. It may still be an online service company, a merchant site, a private bank or even a central bank, in the case of a face value taking a monetary dimension. This last application being only the addition of a valuable stamp, and assignable as a control stick.
- This anti-duplicate property will more correctly be qualified as a guarantee that a duplication remains within the agreed quantitative limit, since the anonymizing authority will record the number of receptions of the same scratch issued by a given author, or pictured, the number of times the mail has been opened.
- An alternative way to reduce the danger of possible duplicates uncontrolled would be to partially lose their undifferentiated status by customizing them from their first stage, a principle that is otherwise extensible to other industrial or recreational uses. Without losing the distinctiveness and distinctiveness of the scratching, its characteristic part with functional and cryptonymic properties could be accompanied by additions or modifications indicating either the number of successive receivers, as a counter or digital notches, or more precisely their nature, their profile or their identity. Such a mechanism would be tantamount to a real endorsement, leaving here a latitude of choice between an endorsement by anonymous signature, pseudonymized or carrying a true identity.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Communication Control (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11725626.3A EP2577542A1 (fr) | 2010-06-01 | 2011-06-01 | Procede de securisation de donnees numeriques et d'identites notamment au sein de processus utilisant des technologies de l'information et de la communication |
JP2013512790A JP2013534654A (ja) | 2010-06-01 | 2011-06-01 | 特に情報技術および通信技術を用いるプロセスにおいて、デジタルデータおよび識別情報をセキュリティ保護する方法 |
CN2011800378791A CN103124974A (zh) | 2010-06-01 | 2011-06-01 | 特别在应用信息与通信技术的过程中保障数字数据和身份的方法 |
US13/701,442 US8959592B2 (en) | 2010-06-01 | 2011-06-01 | Method for securing digital data and identities in particular in a process using information and communication technologies |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1054272A FR2960671B1 (fr) | 2010-06-01 | 2010-06-01 | Procede de securisation de donnees numeriques et d'identites notamment au sein de processus utilisant des technologies de l'information et de la communication |
FR1054272 | 2010-06-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011151066A1 true WO2011151066A1 (fr) | 2011-12-08 |
Family
ID=43558373
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2011/059068 WO2011151388A1 (fr) | 2010-06-01 | 2011-06-01 | Procede de controle et de protection de donnees et d'identite notamment au sein de processus utilisant des technologies de l'information et de la communication |
PCT/EP2011/002712 WO2011151066A1 (fr) | 2010-06-01 | 2011-06-01 | Procede de securisation de donnees numeriques et d'identites notamment au sein de processus utilisant des technologies de l'information et de la communication |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2011/059068 WO2011151388A1 (fr) | 2010-06-01 | 2011-06-01 | Procede de controle et de protection de donnees et d'identite notamment au sein de processus utilisant des technologies de l'information et de la communication |
Country Status (6)
Country | Link |
---|---|
US (2) | US8959592B2 (fr) |
EP (2) | EP2577542A1 (fr) |
JP (2) | JP2013534654A (fr) |
CN (2) | CN103229476A (fr) |
FR (1) | FR2960671B1 (fr) |
WO (2) | WO2011151388A1 (fr) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8924545B2 (en) * | 2012-01-13 | 2014-12-30 | Microsoft Corporation | Cross-property identity management |
US9202086B1 (en) * | 2012-03-30 | 2015-12-01 | Protegrity Corporation | Tokenization in a centralized tokenization environment |
US20150127593A1 (en) * | 2013-11-06 | 2015-05-07 | Forever Identity, Inc. | Platform to Acquire and Represent Human Behavior and Physical Traits to Achieve Digital Eternity |
WO2016082032A1 (fr) | 2014-11-25 | 2016-06-02 | Arhin Linda | Système et procédé pour faciliter une communication anonyme entre un message publicitaire et des utilisateurs sociaux |
CN117611331A (zh) * | 2016-02-23 | 2024-02-27 | 区块链控股有限公司 | 用于使用区块链在点对点分布式账簿上有效转移实体的方法及系统 |
CN107707507A (zh) * | 2016-08-08 | 2018-02-16 | 深圳中电长城信息安全系统有限公司 | 基于安全池网络数据传输的控制方法和系统 |
CN108537538A (zh) * | 2018-03-07 | 2018-09-14 | 胡金钱 | 电子发票的开具方法及系统、计算机存储介质 |
KR102211360B1 (ko) * | 2020-09-24 | 2021-02-03 | 주식회사 화난사람들 | 디지털 문서 내 위치 정보를 이용한 디지털 문서 인증 방법 |
CN114531302B (zh) * | 2021-12-28 | 2024-09-13 | 中国电信股份有限公司 | 数据加密方法、装置及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010029496A1 (en) * | 2000-02-23 | 2001-10-11 | Otto Ray Karl | Systems and methods for providing anonymous financial transactions |
US20080244076A1 (en) * | 2007-03-10 | 2008-10-02 | Shah Nitin J | Method and Apparatus for Tagging Network Traffic Using Extensible Fields in Message Headers |
US20090158030A1 (en) * | 2007-12-14 | 2009-06-18 | Mehran Randall Rasti | Doing business without SSN, EIN, and charge card numbers |
FR2932043A1 (fr) | 2008-06-03 | 2009-12-04 | Groupe Ecoles Telecomm | Procede de tracabilite et de resurgence de flux pseudonymises sur des reseaux de communication, et procede d'emission de flux informatif apte a securiser le trafic de donnees et ses destinataires |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3589881B2 (ja) * | 1998-12-10 | 2004-11-17 | シャープ株式会社 | 電子メールサーバシステム |
WO2002003219A1 (fr) * | 2000-06-30 | 2002-01-10 | Plurimus Corporation | Procede et systeme pour le controle de comportement de reseau informatique en ligne et la creation de profils de comportement en ligne |
US7472423B2 (en) * | 2002-03-27 | 2008-12-30 | Tvworks, Llc | Method and apparatus for anonymously tracking TV and internet usage |
JP2003316742A (ja) * | 2002-04-24 | 2003-11-07 | Nippon Telegr & Teleph Corp <Ntt> | シングルサインオン機能を有する匿名通信方法および装置 |
US7480935B2 (en) * | 2002-10-10 | 2009-01-20 | International Business Machines Corporation | Method for protecting subscriber identification between service and content providers |
FR2847401A1 (fr) * | 2002-11-14 | 2004-05-21 | France Telecom | Procede d'acces a un service avec authentification rapide et anonymat revocable et systeme d'ouverture et de maintien de session |
JP2004178486A (ja) * | 2002-11-29 | 2004-06-24 | Toshiba Corp | 監視サーバおよび監視方法 |
DE60308733T2 (de) * | 2003-02-21 | 2007-08-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Dienstanbieteranonymisierung in einem single sign-on system |
KR20050119133A (ko) * | 2003-03-21 | 2005-12-20 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 허가 증명서들내의 사용자 신분 프라이버시 |
US7814119B2 (en) * | 2004-03-19 | 2010-10-12 | Hitachi, Ltd. | Control of data linkability |
US20060098900A1 (en) * | 2004-09-27 | 2006-05-11 | King Martin T | Secure data gathering from rendered documents |
US7472277B2 (en) * | 2004-06-17 | 2008-12-30 | International Business Machines Corporation | User controlled anonymity when evaluating into a role |
US7614546B2 (en) * | 2005-02-03 | 2009-11-10 | Yottamark, Inc. | Method and system for deterring product counterfeiting, diversion and piracy |
US8468351B2 (en) * | 2006-12-15 | 2013-06-18 | Codesealer Aps | Digital data authentication |
CN101521569B (zh) * | 2008-02-28 | 2013-04-24 | 华为技术有限公司 | 实现服务访问的方法、设备及系统 |
US20090228582A1 (en) * | 2008-03-06 | 2009-09-10 | At&T Knowledge Ventures, L.P. | System and method in a communication system with concealed sources |
ES2365887B1 (es) * | 2009-05-05 | 2012-09-03 | Scytl Secure Electronic Voting S.A. | Metodo de verificacion de procesos de descifrado |
-
2010
- 2010-06-01 FR FR1054272A patent/FR2960671B1/fr active Active
-
2011
- 2011-06-01 CN CN2011800343203A patent/CN103229476A/zh active Pending
- 2011-06-01 CN CN2011800378791A patent/CN103124974A/zh active Pending
- 2011-06-01 WO PCT/EP2011/059068 patent/WO2011151388A1/fr active Application Filing
- 2011-06-01 EP EP11725626.3A patent/EP2577542A1/fr not_active Withdrawn
- 2011-06-01 JP JP2013512790A patent/JP2013534654A/ja active Pending
- 2011-06-01 JP JP2013512922A patent/JP2013535045A/ja active Pending
- 2011-06-01 WO PCT/EP2011/002712 patent/WO2011151066A1/fr active Application Filing
- 2011-06-01 US US13/701,442 patent/US8959592B2/en not_active Expired - Fee Related
- 2011-06-01 US US13/701,462 patent/US9003178B2/en not_active Expired - Fee Related
- 2011-06-01 EP EP11723446.8A patent/EP2577909A1/fr not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010029496A1 (en) * | 2000-02-23 | 2001-10-11 | Otto Ray Karl | Systems and methods for providing anonymous financial transactions |
US20080244076A1 (en) * | 2007-03-10 | 2008-10-02 | Shah Nitin J | Method and Apparatus for Tagging Network Traffic Using Extensible Fields in Message Headers |
US20090158030A1 (en) * | 2007-12-14 | 2009-06-18 | Mehran Randall Rasti | Doing business without SSN, EIN, and charge card numbers |
FR2932043A1 (fr) | 2008-06-03 | 2009-12-04 | Groupe Ecoles Telecomm | Procede de tracabilite et de resurgence de flux pseudonymises sur des reseaux de communication, et procede d'emission de flux informatif apte a securiser le trafic de donnees et ses destinataires |
WO2009147163A1 (fr) * | 2008-06-03 | 2009-12-10 | Groupe Des Ecoles Des Telecommunications - Ecole Nationale Superieure Des Telecommunications | Procède de traçabilité et de résurgence de flux pseudonymises sur des réseaux de communication, et procède d'émission de flux informatif apte a sécuriser le trafic de données et ses destinataires |
Also Published As
Publication number | Publication date |
---|---|
US8959592B2 (en) | 2015-02-17 |
JP2013535045A (ja) | 2013-09-09 |
FR2960671B1 (fr) | 2020-01-10 |
EP2577542A1 (fr) | 2013-04-10 |
US20130212375A1 (en) | 2013-08-15 |
WO2011151388A1 (fr) | 2011-12-08 |
US9003178B2 (en) | 2015-04-07 |
FR2960671A1 (fr) | 2011-12-02 |
CN103229476A (zh) | 2013-07-31 |
EP2577909A1 (fr) | 2013-04-10 |
CN103124974A (zh) | 2013-05-29 |
JP2013534654A (ja) | 2013-09-05 |
US20130205371A1 (en) | 2013-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2577542A1 (fr) | Procede de securisation de donnees numeriques et d'identites notamment au sein de processus utilisant des technologies de l'information et de la communication | |
EP3754939B1 (fr) | Système d'identité numérique | |
US20180173906A1 (en) | Digital Identity System | |
CN104408486B (zh) | 一种身份证读写器 | |
JP2021519488A (ja) | ブロックチェーン内でコード及びイメージを用いるためのシステム及び方法 | |
US20030158960A1 (en) | System and method for establishing a privacy communication path | |
US20070106892A1 (en) | Method and system for establishing a communication using privacy enhancing techniques | |
CN103745345A (zh) | 应用于交易平台实现金融信息分级安全处理的系统及方法 | |
KR20220113307A (ko) | 블록체인과 정품인증 태그 기술을 사용한 제품 진위성 검증 및 소유권 변경이력관리 시스템 | |
US10445730B2 (en) | Digital transactional procedures and implements | |
Birch | Digital identity management: perspectives on the technological, business and social implications | |
WO2019063512A1 (fr) | Procédé de génération d'une identité numérique, identité numérique, procédé de création d'un document de transaction électronique et document de transaction électronique | |
Levi | Organising Plastic Fraud: Enterprise Criminals and the Side‐Stepping of Fraud Prevention | |
Thomas | Is Malaysia's MyKad the'One Card to Rule Them All'? The Urgent Need to Develop a Proper Legal Framework for the Protection of Personal Information in Malaysia | |
Jalil et al. | Developments in electronic contract laws: A Malaysian perspective | |
RU2138848C1 (ru) | Способ проведения платежа через коммуникационную сеть | |
Briscoe | On the Cards: privacy, identity and trust in the age of smart technologies | |
Yadav et al. | Management Cases Studies and Technical Use Cases on Web 3 | |
Kosta et al. | Collection and storage of personal data: A critical view on current practices in the transportation sector | |
Reddy et al. | Consumer perceptions on security, privacy, and trust on e-portals | |
Indriyani | Utilization of Information Technology and Electronic Transactions in the Insurance | |
Tee | Considerations for a Malaysian cradle-to-grave identification proposal | |
Lang et al. | Information and Communications Technology Threats: Personal Data and User Behaviour | |
Lang et al. | Technology Threats: Personal Data and User Behaviour | |
Yeoul et al. | Smart Card System Architecture for enhancing the security and the applications of Local e-Government |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201180037879.1 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11725626 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013512790 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2011725626 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011725626 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13701442 Country of ref document: US |