FR3124341B1 - Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform - Google Patents
Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform Download PDFInfo
- Publication number
- FR3124341B1 FR3124341B1 FR2106588A FR2106588A FR3124341B1 FR 3124341 B1 FR3124341 B1 FR 3124341B1 FR 2106588 A FR2106588 A FR 2106588A FR 2106588 A FR2106588 A FR 2106588A FR 3124341 B1 FR3124341 B1 FR 3124341B1
- Authority
- FR
- France
- Prior art keywords
- data
- identity
- server
- user terminals
- allowing user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention est relative à un procédé et à un ensemble permettant à des terminaux utilisateurs d’échanger des données personnelles avec une plateforme de serveurs dont l’architecture garantit qu’aucun des serveurs qui la composent ne stocke la totalité des données. L’ensemble de serveurs comporte au moins un serveur d’identités, un serveur de clés et un serveur de données. Le procédé comprend les étapes de : Stockage d’informations d’identitésGénération d’une paire de clés associées : clé d’identité et clé de donnéesRecherche des informations d’identités à partir de la clé d’identitéRecherche des données à partir de la clé de données Le procédé et l’ensemble selon l’invention sont particulièrement destinés à la gestion des données de santé, sans toutefois y être limités. Figure pour l’abrégé : [Fig1]The present invention relates to a method and an assembly allowing user terminals to exchange personal data with a server platform whose architecture guarantees that none of the servers which compose it stores all of the data. The set of servers includes at least one identity server, a key server and a data server. The method comprises the steps of: Storing identity informationGenerating a pair of associated keys: identity key and data keySearching identity information from the identity keySearching data from the key data The method and the assembly according to the invention are particularly intended for the management of health data, without however being limited thereto. Figure for the abstract: [Fig1]
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR2106588A FR3124341B1 (en) | 2021-06-21 | 2021-06-21 | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform |
| PCT/EP2022/066766 WO2022268741A1 (en) | 2021-06-21 | 2022-06-20 | Method and assembly for enabling user terminals to confidentially exchange personal data items with a server platform |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR2106588 | 2021-06-21 | ||
| FR2106588A FR3124341B1 (en) | 2021-06-21 | 2021-06-21 | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| FR3124341A1 FR3124341A1 (en) | 2022-12-23 |
| FR3124341B1 true FR3124341B1 (en) | 2023-10-27 |
Family
ID=78212165
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| FR2106588A Active FR3124341B1 (en) | 2021-06-21 | 2021-06-21 | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform |
Country Status (2)
| Country | Link |
|---|---|
| FR (1) | FR3124341B1 (en) |
| WO (1) | WO2022268741A1 (en) |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7681042B2 (en) * | 2004-06-17 | 2010-03-16 | Eruces, Inc. | System and method for dis-identifying sensitive information and associated records |
| SI2414983T1 (en) * | 2009-04-03 | 2018-06-29 | Digidentity B.V. | Secure data system |
| US11003789B1 (en) * | 2020-05-15 | 2021-05-11 | Epsilon Data Management, LLC | Data isolation and security system and method |
-
2021
- 2021-06-21 FR FR2106588A patent/FR3124341B1/en active Active
-
2022
- 2022-06-20 WO PCT/EP2022/066766 patent/WO2022268741A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| FR3124341A1 (en) | 2022-12-23 |
| WO2022268741A1 (en) | 2022-12-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11882139B2 (en) | Method and system for preventing illicit use of a telephony platform | |
| March et al. | Technological sovereignty as ability, not autarky | |
| Giarratana | The birth of a new industry: Entry by start-ups and the drivers of firm growth: The case of encryption software | |
| Belli | Net neutrality, zero rating and the minitelisation of the internet | |
| Allen | Discovering and developing the blockchain cryptoeconomy | |
| Laanti et al. | How well do traditional theories explain the internationalisation of service MNEs from small and open economies?–Case: National telecommunication companies | |
| US10341308B2 (en) | Method for transmitting information from a first information provider to a second information provider via an information intermediary | |
| Roberts et al. | Technology factors in corporate adoption of mobile cell phones: A case study analysis | |
| FR3124341B1 (en) | Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform | |
| Iheanachor et al. | The role of networks in the internationalization process of firms from emerging economies: The Nigerian perspective | |
| Olakpe | Views on migration partnerships from the ground: Lessons from Nigeria | |
| Elbra | Activism and the ‘new’politics of tax justice | |
| Caliskan et al. | Strange Bedfellows: Consumer Protection and Competition Policy in the Making of the EU Privacy Regime | |
| Kerr et al. | The timing of smoking onset, prolonged abstinence and relapse in men: a prospective study from ages 18 to 32 years | |
| FR3129504A1 (en) | Methods, terminal and server for managing personal data | |
| Bregu | THE ROLE OF THE EU AS A NORMATIVE POWER ON THE PROTECTION OF HUMAN RIGHTS IN ALBANIA | |
| Harcourt et al. | Unions and discriminatory hiring: Evidence from New Zealand | |
| Colangelo | Do Ecosystems Exist in EU Competition Law? | |
| FR3135853A1 (en) | Method for issuing a contact request and method for analyzing a history of communication elements | |
| Olk | IMPACT OF PERSONAL AND ORGANIZATIONAL TIES ON ALLIANCES: EVIDENCE FROM ENTREPRENEURIAL COMPANIES. | |
| Ramburn | Understanding use and adoption of mobile data services in two African countries | |
| Reich et al. | Effects of sexist comments in political discussions online on women | |
| Prykaziuk et al. | Adaptation of insurance distribution to the new challenges | |
| Fareh et al. | Digital Marketing Strategies in the Hotel Sector: How to Effectively Promote a Moroccan Tourist | |
| Jun et al. | Derivation of vulnerable infrastructure services by region through survey of infrastructure service satisfaction |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PLFP | Fee payment |
Year of fee payment: 2 |
|
| PLSC | Publication of the preliminary search report |
Effective date: 20221223 |
|
| TP | Transmission of property |
Owner name: G5 DIGITAL, FR Effective date: 20230223 |
|
| PLFP | Fee payment |
Year of fee payment: 3 |
|
| PLFP | Fee payment |
Year of fee payment: 4 |
|
| PLFP | Fee payment |
Year of fee payment: 5 |