METHOD FOR HANDLING PRIVACY DATA
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention aims to improve data protection against illegal access by a strong differentiation of the security level specific on a type of data so that when the protection on a part of the data is violated, the remaining data are still inaccessible. A method for controlling access, via an open communication network, to user private data, comprising steps of: dividing the user private data into a plurality of categories, each category defining a privacy level of the data, encrypting the user private data of each category with a category key pertaining to the category of the data, attributing to a stakeholder an entity configured for accessing to at least one category of user private data, and authorizing the access to the at least one category of user private data for the entity of the stakeholder, by providing the stakeholder with the category keys required for decrypting the user private data of the corresponding category.
-
Citations
35 Claims
-
1-15. -15. (canceled)
-
16. A method for controlling access, via an open communication network, to user private data with a strong differentiation of security level and a high granularity of protection by a diversity of encryption/decryption keys, said user private data being provided by a plurality of source entities, comprising steps of:
-
dividing the user private data into a plurality of categories, each category defining a privacy level of the user private data; encrypting by each source entity the user private data of each category with a category key pertaining to the category of the user private data; attributing to a stakeholder at least one client entity configured for accessing to at least one category of user private data, and authorizing the access to the at least one category of user private data for the at least one client entity of the stakeholder, by providing the at least one client entity with the category keys required for decrypting the user private data of the corresponding category. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system configured to control access, via an open communication network, to user private data with a strong differentiation of security level and a high granularity of protection by a diversity of encryption/decryption keys, the system comprising:
-
a plurality of source entities configured to provide user private data; and at least one client entity attributed to a stakeholder; wherein the user private data are divided into a plurality of categories, each category defining a privacy level of the user private data; wherein each source entity is configured to encrypt the user private data of each category with a category key pertaining to the category of the user private data; and wherein the at least one client entity is configured to access to at least one category of user private data, and to authorize the access to the at least one category of user private data by providing the category keys required for decrypting the user private data of the corresponding category. - View Dependent Claims (31, 32, 33, 34, 35)
-
Specification