Method and server of electronic safes with information sharing
First Claim
Patent Images
1. A method of managing electronic safes implemented by a server on behalf of at least one user possessing at least a first electronic safe, said method comprising:
- a step of implementing access means designed to provide said user with access, via a second safe belonging to said user, to a set of data forming part of a content accessible via the first electronic safe, said access requiring an authentication of said user as a user to whom said second safe belongs,wherein said step of implementing access means being intended to be carried out in the event of authentication of said user as the user owning the first electronic safe,wherein the first safe and second safe comprise storage space, andwherein the first safe and second safe only contain encrypted data and said user is able to decrypt said data by a decryption process.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of managing electronic safes implemented by a server on behalf of at least one user possessing at least a first electronic safe, said method comprising a step of implementing access means designed to provide said user with access, via a second safe belonging to said user, to a set of data forming part of a content accessible via the first electronic safe, said implementation step being intended to be carried out in the event of authentication of said user as the user owning the first electronic safe.
-
Citations
12 Claims
-
1. A method of managing electronic safes implemented by a server on behalf of at least one user possessing at least a first electronic safe, said method comprising:
-
a step of implementing access means designed to provide said user with access, via a second safe belonging to said user, to a set of data forming part of a content accessible via the first electronic safe, said access requiring an authentication of said user as a user to whom said second safe belongs, wherein said step of implementing access means being intended to be carried out in the event of authentication of said user as the user owning the first electronic safe, wherein the first safe and second safe comprise storage space, and wherein the first safe and second safe only contain encrypted data and said user is able to decrypt said data by a decryption process. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer program product comprising a computer readable medium, having stored thereon a computer program comprising instructions for implementing, during execution of said program on a computer, by a server on behalf of at least one user possessing at least a first electronic safe, access means designed to provide said user with access, via a second safe belonging to said user, to a set of data forming part of a content accessible via the first electronic safe, said access requiring an authentication of said user as a user to whom said second safe belongs, wherein said step of implementing access means is intended to be carried out in the event of authentication of said user as the user owning the first electronic safe, wherein the first safe and second safe comprise storage space, and wherein the first safe and second safe only contain encrypted data and said user is able to decrypt said data by a decryption process.
-
9. A server for managing electronic safes on behalf of at least one user possessing at least a first electronic safe, the server comprising:
-
access means designed to provide said user with access, via a second safe belonging to said user, to a set of data forming part of a content accessible via the first electronic safe, said access requiring an authentication of said user as a user to whom said second safe belongs, wherein said access means being intended to be activated in the event of authentication of said user as the user owning the first electronic safe, wherein the first safe and second safe comprise storage space, and wherein the first safe and second safe only contain encrypted data and said user is able to decrypt said data by a decryption process. - View Dependent Claims (10, 11, 12)
-
Specification