Use of a digital signature obtained from at least one structural characteristic of a material element to protect the direct reading of sensitive data and method for reading this protected data
First Claim
1. Method for reading protected sensitive data characterised in that the reading is performed by subjecting the protected sensitive data in digital form to a digital processing which implements at least one digital signature obtained from at least one structural characteristic of a material element chosen from among all or part of a fibrous material, plastic, metal, leather, wood, composite material, glass, mineral, crystalline structure.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention is related to the use of one or several digital signatures obtained from at least one structural characteristic of a material element that has a complex, chaotic, unique and stable structure, to protect the direct reading of sensitive data, a media of such protected data and a method for reading this protected data.
-
Citations
71 Claims
- 1. Method for reading protected sensitive data characterised in that the reading is performed by subjecting the protected sensitive data in digital form to a digital processing which implements at least one digital signature obtained from at least one structural characteristic of a material element chosen from among all or part of a fibrous material, plastic, metal, leather, wood, composite material, glass, mineral, crystalline structure.
-
30-31. -31. (canceled)
-
33. Method for protecting sensitive data implementing the sensitive data in digital form and at least a digital signature obtained from at least one structural characteristic of a material element chosen from among all or part of a fibrous material, plastic, metal, leather, wood, composite material, glass, mineral, crystalline structure, characterised in that the protecting of the sensitive data in digital form is performed by one of:
-
means of a cryptographic algorithm, the digital signature(s) of the material element playing the role of cryptographic key(s);
means of a steganographic algorithm, the digital signature(s) of the material element playing the role of steganographic key(s);
combining at least one digital signature of a material element, rendering both the sensitive data in digital form and the digital signature at least partially illegible, from their binary, hexadecimal, ASCII or alphabetic form, by jointly or singly applying the principles of permutation, transposition, substitution, iteration, mask (logical operators including XOR, addition, subtraction, bit by bit (in sequence) or block by block . . . ) or mathematical properties of modular algebra (modulo n) and of numbers theory; and
using the digital signature(s) as “
digital envelopes”
of the sensitive digital data in compressed, cyphered and/or steganographed form. - View Dependent Claims (36, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 58)
-
-
34-35. -35. (canceled)
-
37. (canceled)
- 53. Data media comprising sensitive data protected from direct reading whose protection implemented the sensitive data in digital form and at least a digital signature obtained from at least one structural characteristic of a material element, characterised in that it is in the form of a paper, cardboard or nonwoven document, of which all or part corresponds to the material element from which issues at least one digital signature that was used to protect the sensitive data, which is in a localised form and protected by an external transparent folder acting as a protection against normal external attacks through usage, from which it can not be separated without being destroyed.
- 66. Method for encrypting with asymmetric keys, using a public key and a private key, characterised in that the public key and/or private key is a digital signature obtained from at least one structural characteristic of a material element chosen from among all or part of a fibrous material, plastic, metal, leather, wood, composite material, glass, mineral, crystalline structure.
-
68. Method for securing sensitive data comprising the following steps:
-
a) one step of protection the direct reading of sensitive data implementing a method of protection, said method comprising implementing the sensitive data in digital form and at least a digital signature obtained from at least one structural characteristic of a material element chosen from among all or part of a fibrous material, plastic, metal, leather, wood, composite material, glass, mineral, crystalline structure, characterised in that the protecting of the sensitive data in digital form is performed by one of;
means of a cryptographic algorithm, the digital signature(s) of the material element playing the role of cryptographic key(s);
means of a steganographic algorithm, the digital signature(s) of the material element playing the role of steganographic key(s);
combining at least one digital signature of a material element, rendering both the sensitive data in digital form and the digital signature at least partially illegible, from their binary, hexadecimal, ASCII or alphabetic form, by jointly or singly applying the principles of permutation, transposition, substitution, iteration, mask (logical operators including XOR, addition, subtraction, bit by bit (in sequence) or block by block . . . ) or mathematical properties of modular algebra (modulo n) and of numbers theory; and
using the digital signature(s) as “
digital envelopes”
of the sensitive digital data in compressed, cyphered and/or steganographed form in order to obtain protected sensitive data; and
b) one step of reading the protected sensitive data obtained in step a), allowing to find the sensitive data. - View Dependent Claims (69, 70, 71)
-
Specification