EP3423982A1 - Systeme ouvert et securise de signature electronique et procede associe - Google Patents
Systeme ouvert et securise de signature electronique et procede associeInfo
- Publication number
- EP3423982A1 EP3423982A1 EP17713441.8A EP17713441A EP3423982A1 EP 3423982 A1 EP3423982 A1 EP 3423982A1 EP 17713441 A EP17713441 A EP 17713441A EP 3423982 A1 EP3423982 A1 EP 3423982A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- signature
- user
- business application
- manager
- signed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- the invention relates to the field of electronic signature. More particularly, the invention relates to an open and secure system for signing an electronic document. The invention further relates to a method for preparing and processing a signature request.
- the electronic signature mainly consists in allowing a human user to encrypt the fingerprint of a document to be signed, with a private key corresponding to a public key associated with his identity, this private key being generally protected by a cryptographic device and a secret code, the result of the encryption then to be incorporated or associated with the document to be signed so as to constitute a proof.
- a human user to encrypt the fingerprint of a document to be signed, with a private key corresponding to a public key associated with his identity, this private key being generally protected by a cryptographic device and a secret code, the result of the encryption then to be incorporated or associated with the document to be signed so as to constitute a proof.
- the sequence of calculation, management and verification tasks necessary for the realization of an electronic signature is excessively complex. Indeed, the algorithms on which the calculations are based must themselves be compatible with the requirements of security and confidence.
- the data to be signed are not necessarily accessible directly by the signature process but can be remote, that the same data to be signed must be able to be framed by contextual elements such as the date and time of the signature, the signatory certification chain, role, signature location, signature policy, etc.
- the private key can be on a local or remote cryptographic device of the user, and the environment of these operations is sometimes on the user's workstation, but can also be remote or run in fashion client-server in a web browser, or on a smartphone or tablet.
- EP 1393144 B1 discloses a method and a web-based system for the legally enforceable signature of documents in a Web environment.
- the system includes first access means for accessing the web environment from an electronic system, and also includes a plurality of modules.
- a rendering module of the document for presenting the user with a web representation of the document
- a legal information module for presenting to the user, in the Web environment, legal information relating to the electronic signature of the document, and to obtain the agreement of the user of this legal information.
- a document approval module to integrate the user's signature into the document, with the user's consent of the legal information.
- the system also includes a logging module for generating a log of the signature processes of the document by associating this log of the process with the signed document.
- a document distribution module to make the signed document available. This document concerns the traceability of the process. There is a particular need to streamline the electronic signature process and also to mask the complexity of the process to users.
- the invention therefore aims, on the one hand, to streamline the electronic signature process, to break it down into independent tasks whose interactions between them will be secured by exchange protocols specifically designed for this purpose, and on the other hand, to mask this complexity to the users of the electronic signature and the business applications that want to implement it.
- an open and secure electronic signature system comprising a business application, developed and executed in various environments, said business application having a programming interface configured to request a signature of a document from a signature manager for a user.
- the system is characterized in that said business application is able to define a content to be signed, to identify criteria and to select a signatory user, define the use of a type of digital identity, that it is also able to perform a collection of signature properties and require a signature format.
- Said signature manager is able to coordinate said signature request by performing the following steps: verification of the identity and the authorization of the business application; - verification of the identity of the signing user; - recovery of the document to be signed; - preparation of the signature request with fingerprint calculations of the data to be signed, via signature servers; sending a notification of the signature request via a notification server to the signature services of the user.
- the user by means of said signature services, is able to control the execution of the signature process by activating the private key corresponding to a certificate of the user meeting the selection criteria sent to said signature manager by the business application in question. view of the encryption of the fingerprint of the data to be signed.
- the signature manager is able to identify the identity of the signing user by means of a user directory managed by said signature manager. Data fingerprint calculations are performed either by a signature server or by a reverse signature server.
- the signature manager is also able to retrieve the signatures made and to send said signatures to the business application.
- the notification server being configured to notify said business application of the arrival of said signatures beforehand.
- the system further comprises timestamped and archived log files, in which the steps of the signature transaction are written.
- the signature manager is configured to manage said log files so as to constitute a proof file for each signature transaction.
- the signature service is a light and downloadable software component on a device of the user and in that said device is a PC and / or a Mac and / or a tablet and / or a smartphone of said user .
- the system further comprises a personal signature manager belonging to the user and that the business application is able to make a signature request from said personal signature manager.
- Said personal signature manager runs on a device of said user so as to allow said user to sign a document in local mode when there is no available internet connection or that the signature manager is not usable in this context.
- the system further comprises a local signature creation device in the form of a hardware or software component, and / or a remote signature creation device and that the user is able to sign.
- the document is using the local signature creation device using the hardware component, such as a cryptographic device, or the software component, such as a software certificate accessible on the user's device, or using the remote signature creation device, said remote signature creation device being able to incorporate a certificate generated on the fly, during a displacement of said user.
- said certificates generated on the fly are generated so that they have a security level compliant with the requirements formulated in the signature request sent by the business application and that they are able to perform the encryption of the application. the fingerprint of the data to be signed by an associated private key.
- the business application accesses the data to be signed, said data to be signed are located either in the local environment of said business application, or in the network environment of said business application (10) .
- the local signature creation device is in the form of a cryptographic chip or a software certificate, the user locally accesses said local signature creation device from his device, said device being a workstation, or a smartphone or tablet.
- the remote signature creation device is characterized in that it is located in the network environment of the signature manager and contains a certificate generated on the fly, and that the system includes an infrastructure. Key management key capable of generating said certificate on the fly, and in that the private key associated with said certificate on the fly is generated and stored securely by the signature servers.
- the signature manager by means of the notification server is able to notify the signature request of the document to the signature services of the user and the notification server is associated with an execution environment of said services. of signatures.
- the signature service is configured to register with the notification server associated with its execution environment and is able to communicate with the signature manager to indicate to him that he knows the information enabling auditing. signature manager to notify it.
- the invention also relates to a method for preparing and processing a signature application, by a business application, of a document with a signature manager for a user, registered and identified with said manager of a signature, said method being implemented in the system described above and comprises the following steps: connection of a user to the business application to sign document;
- a signature request to said signature manager by the business application, said request includes content to be signed, criteria for identifying and selecting the signatory user, a type of digital identity to be used, performs a collection of signature properties and requires a signature format;
- FIG. 1 illustrates the general architecture of the system according to the present invention
- FIG. 2 illustrates the steps of the method implemented in the system according to the invention
- Figure 1 represents the general architecture of the system according to the present invention. This architecture represents, on the one hand, the environment 1 of a user 30 of the system and, on the other hand, the internet environment 2 of a signature manager 40.
- a user 30 is a natural person who wishes or must sign a or several documents.
- the architecture of the system as shown in Figure 1 comprises a business application 10, said business application can be developed and executed in various environments such as web servers, Internet browsers, in a native PC or Mac environment , or from a mobile phone or tablet.
- the business application is at the origin of the signature process, thus, any request for signature, whether made at the initiative of the signatory user himself, or whether it is carried out by a third party. to sign a document, must necessarily go through this business application 10.
- Said application 10 is designed so that it is able to make a request for signing a document 20 with a signature manager 40 for a user 30.
- the business application 10 contains a programming interface 42, developed with specific libraries, enabling it to communicate with the signature manager 40.
- the purpose of the business application 10 is to define the specification of the signature or signatures to be made, ie defining a content to be signed, criteria for identifying and selecting a signatory user 30, a type of digital identity to be used, performs r a collection of signature properties, require a signature format.
- the business application 10 submits this signature request to the central component of the system, namely the signature manager 40.
- the role of the signature manager 40 is to process a request for signature of the business application 10 and to coordinate its execution by following the following steps: verification of the identity and the authorization of the business application 10, taking into account the request, identification of the signatory user 30, recovery of the document 20 to sign indicated by the business application, preparation of the signature request with the fingerprint calculation of the data to be signed, via a signature server 50 or 51, notification of the signature request, via a notification server 70 to all the signature services 60 of the user 30, and finally making available the result of the operations with the business application 10.
- Said signature manager 40 verifies the identity of the signatory user 30 at the through a user directory 41.
- Said user directory 41 is associated and managed by a set of signature managers 40.
- the document or documents 20 to be signed may be located in the local environment of the business application 10 called "local DTBS" 21 (the local data to be signed) generally on a device of the user, and accessible locally by this one; in this case, it is the responsibility of the business application 10 to retrieve this data to compose the signature request to be sent to the signature manager 40.
- the documents to be signed may also be located in the network environment of the business application 10 called "DTBS remote" 22 (the remote data to be signed), typically in a GED (electronic document management tool) to which the business application 10 accesses, which will thus be able to upload this data to the signature manager 40.
- the signature manager 40 After the recovery of the document (s) 20 to be signed by the signature manager 40, the latter prepares the signature request (s) with the fingerprint calculations of the data to be signed, namely the content of the document (s) as well as the properties. These fingerprint calculations of the data are performed either by a signature server 50 or by an inverse signature server 51.
- the system comprises a signature creation device 61, it is a hardware or software component that can perform the encryption of the fingerprint data to be signed by the private key associated with the certificate of the user signatory 30.
- Said signature creation device 61 may be located in the local environment of the user 30 and be accessible only by the latter, typically in the form of a cryptographic device (smart card, cryptographic USB token) or a software certificate accessible locally from the user's workstation or from his mobile terminal (smartphone, tablet).
- the signature creation device 61 may also be located in the network environment of the signature manager 40, referenced 62 in the figure, typically in the form of a certificate generated on the fly by a key management infrastructure. Indeed, the signature manager 40 can instruct said key management infrastructure to generate this certificate on the fly.
- the private key associated with said user's on-the-fly certificate is generated and securely stored by the signature servers.
- the idea is, at each signature, to generate a "certificate on the fly” or “single use” valid for a single use.
- the signature server 50 is a centralized signature server to which the signature manager 40 sends a signature request.
- a typical example of the signature server 50 is the LP7SignBox software developed by the company Lex Persona (applicant), but it could be envisaged to access other signature servers complying, for example, with the OASIS DSS protocol (signature service). digital).
- the reverse signature server 51 is a decentralized signature server called by the signature manager 40 to compose the signature in a desired format, for example, for the signatures, according to the formats: CAdES, PAdES, XAdES, etc. Said reverse signature server 51 is also able to calculate the hash of the data to be signed in the case of a decentralized signature request.
- This fingerprint will be sent by the signature manager 40 to the signature service 60 of the user 30.
- the signature service 60 uses a signature creation device 61 to encrypt the fingerprint with the private key and returns the result of the signature. generated signature signature manager 40 which in turn transmits it to the reverse signature server 51 which then finalizes the composition of the signature.
- a typical example of a reverse signing server that offers the above functionality is the LP7SignBox software developed by Lex Persona (Applicant). This case is particularly suitable for the decentralized signature with a local signature creation device 61 in the form of a cryptographic device produced from a mobile terminal of the user (smartphone or tablet).
- the signature manager 40 notifies the signature services 60 of the signing user 30 by means of a notification server 70 in order to notify said user to sign the document or documents 20.
- the manager signature 40 sends notifications to the notification servers (push) 70 associated with the signature services 60 of the user 30. It is therefore necessary for a signature service 60 to be able to register, as soon as it is launched, with the server 70 push notification associated with its execution environment for example: GCM for Android, APN for Apple, WNS for Windows, etc.
- the signature service 60 associated with the device of the user, then communicates to the signature managers 40 that he knows, the information that will allow them to notify it.
- a signature service 60 therefore has a configuration file containing the list of signature managers 40 with which it can declare itself.
- a signature service 60 is a universal personal application, which allows the user 30 to control the execution of the signature process, namely the activation of the private key corresponding to one of the certificates of the user 30 meeting the selection criteria sent to the signature manager 40 by the business application 10, for the purpose of encrypting the fingerprint of the data to be signed. Due to the separation between the business application 10, to which the signatory user 30 generally has access, and the signature service 60, the signature service 60 may be qualified as a companion application.
- the signature service 60 is a software component that is as light as possible so that it can be downloaded quickly and take up the least possible space on the user's device 30.
- the user interface of the signature service 60 is very simple and intuitive with a graphic identity as general as possible.
- the signature service 60 is able to sign in local mode.
- an Internet connection may be absent for a longer or shorter time, in which case the signature service 60 is able to finalize the signature without an Internet connection, or automatically as soon as the Internet connection is available. new effective.
- a user 30 may have several signature services 60, so it is for example possible for the user 30 to sign with a local signature-creation device 61, from his Windows or Mac workstation when he is at home. his office, using a hardware component (smart card) or software (certificate), or to sign from his smartphone when on the move, with a remote signature creation device 62 in the form a certificate generated on the fly. Only if the security level of the certificate on the fly complies with the requirements formulated in the signature request sent by the business application 10 to the signature manager 40.
- the signature manager 40 is capable of recovering the signature (s) once that (s) -ci performed (s) and, in the case of wraparound or enveloped signatures, it proceeds to the formatting of the (s) signatures made. It is also able to make available to the business application 10 the result of the operations performed or errors possibly encountered. Indeed, all the steps of the signature operations managed by the signature manager 40 are written in newspapers. The logs are time stamped and archived to form a complete and secure proof file for each signature transaction.
- the business application 10 may submit the signature request to a personal signature manager, not shown in the figure.
- Said personal signature manager is personal in that it is in the local environment of the user and in that it executes on his personal workstation, whatever the typology of said workstation, tablet, smartphone ... Said personal signature manager is able to perform and coordinate all steps of the signature process like the signature manager. It should be noted that the personal signature manager can also be requested by the application even if the user has an Internet connection to sign it directly without going through a signature manager.
- the user directory 41 is associated and managed by a set of signature managers 40.
- the users can be of three categories.
- the business application will signify to the signature manager that it already knows the user, which is anonymous for the signature manager, but not for the business application.
- the business application may be responsible for launching the user's signature service and sending the signature request to the personal signature manager that can be packaged with the signature service. Possibly, if the user already has an account on a signature manager of his choice, he can log in to possibly retrieve different information and credit his account of the signature that will be made.
- Each qualified user has the following data: User ID, SHA256 fingerprint of the user's password, last name and / or alias, date of birth, telephone number on which it is possible to send messages. short, Mail address, pushTokenIDs corresponding to the devices on which it is possible to notify the user when it is the subject of a signature request, user certificates and reference of the associated signature creation device. Some of this data is optional and may not be in the directory.
- This user directory 41 will enable a signature manager 40 to identify the signatory designated by a signature request sent to it by a business application 10, to select the appropriate certificate corresponding to the signature request, from access the user's pushTokenIDs for notifying the user, notifying that user that he is the subject of a signature request on the various signature services capable of processing the signature request.
- the system includes a directory of signature managers. Indeed, from the moment when it is possible to have different signature managers each able to process requests for signatures from different business applications, it is possible to give the possibility to a business application to send a request for a signature. signing not to a specific signature manager, but to query a signature manager directory in order to be able to identify the most appropriate signature manager to process the request. Also, if for example a business application allows a user to report tax on the company, it might be convenient for the business application to query a directory of signature managers to select the "national" signature manager that will allow the company to declare its tax in the country of the company.
- the IGC server designates a server Public Key Management Infrastructure. Its role is to deliver certificates to users on the fly and whose associated private keys are stored securely by a signature server that will perform the signature requests that will be assigned to it.
- a timestamp authority (TSA: Time StampAuthority) issuing timestamp tokens.
- TSA Time StampAuthority
- certain modules require the possibility of calling on a time stamp, such as the writing of all the steps of the signature transaction in timestamped logs or the time stamp of the electronic signatures generated. .
- FIG. 2 represents the various steps of the method for preparing and processing a signature request, by a business application 10, of a document 20 with a signature manager 40 for a registered user 30. and identified with said signature manager 40, implemented in the system of the invention and comprising the steps below. Each step corresponds to one or more numbers represented by arrows.
- said request includes content to be signed, identification and selection criteria of the signatory user, a type of digital identity to use , signature properties and a signature format, (arrow 8).
- the document to be signed may be accessible to the user locally, on his workstation, or remotely, in a network environment.
- the signature creation device can be accessible locally, in the form of a smart card for example, or remotely, in the network environment of the system, in the form of a signature server with generation certificate on the fly.
- the signature manager can be accessed locally or via the network. The skilled person will choose one or the other of the different possibilities according to the economic, ergonomic, dimensional or other constraints that must be respected.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR1670070A FR3048530B1 (fr) | 2016-03-01 | 2016-03-01 | Systeme ouvert et securise de signature electronique et procede associe |
| PCT/IB2017/051168 WO2017149453A1 (fr) | 2016-03-01 | 2017-02-28 | Systeme ouvert et securise de signature electronique et procede associe |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP3423982A1 true EP3423982A1 (fr) | 2019-01-09 |
Family
ID=57045214
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP17713441.8A Pending EP3423982A1 (fr) | 2016-03-01 | 2017-02-28 | Systeme ouvert et securise de signature electronique et procede associe |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20190097811A1 (fr) |
| EP (1) | EP3423982A1 (fr) |
| FR (1) | FR3048530B1 (fr) |
| WO (1) | WO2017149453A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3812945A1 (fr) | 2019-10-27 | 2021-04-28 | Lex Persona | Système ouvert et sécurisé de traitement de demande de signature électronique et procédé associe |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR3092419B1 (fr) * | 2019-02-05 | 2021-05-21 | In Idt | Procédé et Système pour authentifier une signature manuscrite. |
| US11050571B2 (en) * | 2019-02-14 | 2021-06-29 | Carrott Richard F | Systems for producing and maintaining verified electronic signatures |
| CN112202719B (zh) * | 2020-09-04 | 2022-09-13 | 广州江南科友科技股份有限公司 | 基于数字证书的签名方法、系统、装置及存储介质 |
| CN112836227B (zh) * | 2021-02-07 | 2021-11-19 | 新大陆(福建)公共服务有限公司 | 一种可信数字身份应用的方法 |
| JP7694085B2 (ja) * | 2021-03-22 | 2025-06-18 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置及び情報処理プログラム |
| EP4457972A1 (fr) * | 2021-12-30 | 2024-11-06 | Cloudpeer Global Teknoloji A. S. | Système de signature électronique mobile |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1393144B9 (fr) | 2000-12-14 | 2009-08-12 | Silanis Technology Inc. | Procede et systeme bases sur le web permettant d'appliquer une signature legale sur un document electronique |
| US8484723B2 (en) * | 2009-06-05 | 2013-07-09 | Signix, Inc. | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer |
| US8874923B2 (en) * | 2012-07-24 | 2014-10-28 | Adobe Systems Incorporated | Policy-based signature authentication system and method |
| NO335397B1 (no) * | 2012-11-15 | 2014-12-08 | Maestro Soft As | Signaturportering |
| WO2014166519A1 (fr) * | 2013-04-08 | 2014-10-16 | Bonsignore Antonio Salvatore Piero Vittorio | Système et procédé de signature électronique qualifiée et terminal de traitement mobile pour signature électronique qualifiée |
-
2016
- 2016-03-01 FR FR1670070A patent/FR3048530B1/fr active Active
-
2017
- 2017-02-28 EP EP17713441.8A patent/EP3423982A1/fr active Pending
- 2017-02-28 US US16/081,161 patent/US20190097811A1/en not_active Abandoned
- 2017-02-28 WO PCT/IB2017/051168 patent/WO2017149453A1/fr not_active Ceased
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3812945A1 (fr) | 2019-10-27 | 2021-04-28 | Lex Persona | Système ouvert et sécurisé de traitement de demande de signature électronique et procédé associe |
| FR3102589A1 (fr) | 2019-10-27 | 2021-04-30 | Lex Persona | Système ouvert et sécurisé de traitement de demande de signature électronique et procédé associe |
Also Published As
| Publication number | Publication date |
|---|---|
| FR3048530A1 (fr) | 2017-09-08 |
| FR3048530B1 (fr) | 2019-09-06 |
| US20190097811A1 (en) | 2019-03-28 |
| WO2017149453A1 (fr) | 2017-09-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| FR3048530B1 (fr) | Systeme ouvert et securise de signature electronique et procede associe | |
| EP2619941B1 (fr) | Procede, serveur et systeme d'authentification d'une personne | |
| US10205723B2 (en) | Distributed storage of authentication data | |
| EP2567502A2 (fr) | Procede d'authentification d'un utilisateur requerant une transaction avec un fournisseur de service | |
| EP3803670A1 (fr) | Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publié | |
| US20200242717A1 (en) | Prevention of identification document forgery through use of blockchain technology and biometrics based authentication | |
| FR2930391A1 (fr) | Terminal d'authentification d'un utilisateur. | |
| EP3241137A1 (fr) | Procede mis en oeuvre dans un document d'identite et document d'identite associe | |
| EP3812945B1 (fr) | Système ouvert et sécurisé de traitement de demande de signature électronique et procédé associé | |
| EP3435601B1 (fr) | Système de messagerie certifié et procédé | |
| CN109388923A (zh) | 一种程序执行方法及装置 | |
| CA2694335C (fr) | Gestion et partage de coffres-forts dematerialises | |
| EP3673633B1 (fr) | Procédé d'authentification d'un utilisateur auprès d'un serveur d'authentification | |
| FR3047622B1 (fr) | Procede de controle d'un parametre indicatif d'un niveau de confiance associe a un compte utilisateur d'un service en ligne | |
| WO2023001846A1 (fr) | Procédé de transaction entre un organisme et un établissement sur une chaîne de blocs | |
| EP2071799B1 (fr) | Procédé et serveur pour l'accès a un coffre-fort électronique via plusieurs entités | |
| EP3899765B1 (fr) | Réinitialisation d'un secret applicatif au moyen du terminal | |
| WO2024079144A1 (fr) | Procédé de gestion de données d'authentification permettant l'accès à un service d'un utilisateur depuis un terminal | |
| EP3979109A1 (fr) | Procédé et système d'authentification d'un utilisateur sur un appareil utilisateur | |
| FR3007929A1 (fr) | Procede d'authentification d'un utilisateur d'un terminal mobile | |
| WO2008132393A2 (fr) | Procédé et système d'authentification d'un utilisateur | |
| EP3926499A1 (fr) | Procédé d'authentification d'un utilisateur sur un équipement client avec un système d'archivage sécurisé de justificatifs d'identité | |
| WO2022184726A1 (fr) | Procédé pour permettre à des utilisateurs de déployer des contrats intelligents dans une chaîne de blocs au moyen d'une plateforme de déploiement | |
| OA20002A (fr) | Système ouvert et sécurisé de traitement de demande de signature électronique et procédé associé. | |
| FR2888437A1 (fr) | Procede et systeme de controle d'acces a un service d'un fournisseur d'acces implemente sur un serveur multimedia, module, serveur, terminal et programmes pour ce systeme |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
| 17P | Request for examination filed |
Effective date: 20180930 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: BA ME |
|
| DAV | Request for validation of the european patent (deleted) | ||
| DAX | Request for extension of the european patent (deleted) | ||
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
| 17Q | First examination report despatched |
Effective date: 20200428 |
|
| 17Q | First examination report despatched |
Effective date: 20200901 |