Method and device for data protection
First Claim
1. A process for protecting data, comprising:
- a step of assigning (310), in an IT system of an author user, attributes referred to as <
<
digital conditioning>
>
of said data, attributes corresponding to at least one predetermined event that affects a future use of said data in the course of said data'"'"'s future use by a future user,a step of attributing (312), in the IT system of the author user, information that secures an integrity of said data,a step of encrypting (314), by the IT system of the author user, said data using said information that secures the integrity of said data,a step of setting up a file called <
<
envelope>
>
(315), in the IT system of the author user, envelope carrying data, digital conditioning attributes affected to said data and information that secures the integrity of said data,a step of storing (316) from an IT system of the author user in a remote IT system, digital conditioning attributes affected to said data, information that secures the integrity of said data and said encrypted data,a step (322) of connecting a recipient future user and the remote IT system, to access encrypted data,for each predetermined event related to said data, a step of storing (326), in the remote IT system and in relation with the attributes of said data, of an identifier of said event and of the date of said event, andat each connection between the author'"'"'s IT system and the remote IT system, a step of storing (332) predetermined events corresponding to the attributes of the data, in the IT system of the author, so that the IT system of the author keeps track, for each event regarding said data, of the identifier of said event, the identifier of the user at the origin of the event and the date of said event,wherein said envelope is transmitted from the author user to the recipient future user via a path separate from the remote IT system, the remote IT system controlling a transfer between the users,wherein each event regarding said data can only be set, by the future user, during a connection between the IT system of said future user and the remote IT system.
3 Assignments
0 Petitions
Accused Products
Abstract
For controlling the broadcasting of a digital document, the method brings at least three actors into play. First actor is an originator user computer system wherein a file is generated for containing the digital document, digital conditioning attributes corresponding to at least one predetermined event that is liable to affect the data in future use and information that secures data integrity are associated with the data. Second actor is a future user computer system which causes an occurrence of the predetermined event. Third actor is a remote computer system arranged for detecting the event occurrence by storing digital conditioning attributes and information that secures data integrity without knowledge of the digital document.
7 Citations
15 Claims
-
1. A process for protecting data, comprising:
-
a step of assigning (310), in an IT system of an author user, attributes referred to as <
<
digital conditioning>
>
of said data, attributes corresponding to at least one predetermined event that affects a future use of said data in the course of said data'"'"'s future use by a future user,a step of attributing (312), in the IT system of the author user, information that secures an integrity of said data, a step of encrypting (314), by the IT system of the author user, said data using said information that secures the integrity of said data, a step of setting up a file called <
<
envelope>
>
(315), in the IT system of the author user, envelope carrying data, digital conditioning attributes affected to said data and information that secures the integrity of said data,a step of storing (316) from an IT system of the author user in a remote IT system, digital conditioning attributes affected to said data, information that secures the integrity of said data and said encrypted data, a step (322) of connecting a recipient future user and the remote IT system, to access encrypted data, for each predetermined event related to said data, a step of storing (326), in the remote IT system and in relation with the attributes of said data, of an identifier of said event and of the date of said event, and at each connection between the author'"'"'s IT system and the remote IT system, a step of storing (332) predetermined events corresponding to the attributes of the data, in the IT system of the author, so that the IT system of the author keeps track, for each event regarding said data, of the identifier of said event, the identifier of the user at the origin of the event and the date of said event, wherein said envelope is transmitted from the author user to the recipient future user via a path separate from the remote IT system, the remote IT system controlling a transfer between the users, wherein each event regarding said data can only be set, by the future user, during a connection between the IT system of said future user and the remote IT system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification