×

Method and device for data protection

  • US 7,716,478 B2
  • Filed: 10/17/2002
  • Issued: 05/11/2010
  • Est. Priority Date: 10/19/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A process for protecting data, comprising:

  • a step of assigning (310), in an IT system of an author user, attributes referred to as <

    <

    digital conditioning>

    >

    of said data, attributes corresponding to at least one predetermined event that affects a future use of said data in the course of said data'"'"'s future use by a future user,a step of attributing (312), in the IT system of the author user, information that secures an integrity of said data,a step of encrypting (314), by the IT system of the author user, said data using said information that secures the integrity of said data,a step of setting up a file called <

    <

    envelope>

    >

    (315), in the IT system of the author user, envelope carrying data, digital conditioning attributes affected to said data and information that secures the integrity of said data,a step of storing (316) from an IT system of the author user in a remote IT system, digital conditioning attributes affected to said data, information that secures the integrity of said data and said encrypted data,a step (322) of connecting a recipient future user and the remote IT system, to access encrypted data,for each predetermined event related to said data, a step of storing (326), in the remote IT system and in relation with the attributes of said data, of an identifier of said event and of the date of said event, andat each connection between the author'"'"'s IT system and the remote IT system, a step of storing (332) predetermined events corresponding to the attributes of the data, in the IT system of the author, so that the IT system of the author keeps track, for each event regarding said data, of the identifier of said event, the identifier of the user at the origin of the event and the date of said event,wherein said envelope is transmitted from the author user to the recipient future user via a path separate from the remote IT system, the remote IT system controlling a transfer between the users,wherein each event regarding said data can only be set, by the future user, during a connection between the IT system of said future user and the remote IT system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×