Method, first device, second device and system for managing access to data

    公开(公告)号:US10963167B2

    公开(公告)日:2021-03-30

    申请号:US15858882

    申请日:2017-12-29

    摘要: The invention relates to a method for managing data access. The method includes receiving at least one request for accessing data; capturing data relating to at least one current context signal during each data access request; comparing, as a current authorization step, the data relating to at least one captured current context signal to predetermined reference data relating to at least one corresponding context signal according to at least one corresponding predetermined authorization policy; determining, based upon the current authorization result and at least one predetermined dynamic data access policy, whether the data access is or is not authorized, as a data access decision; and issuing the data access decision. The invention also relates to corresponding first device, second device and system.

    Method for asynchronously provisioning keys from one secure device to another
    3.
    发明授权
    Method for asynchronously provisioning keys from one secure device to another 有权
    从一个安全设备到另一个安全设备异步配置密钥的方法

    公开(公告)号:US09124563B2

    公开(公告)日:2015-09-01

    申请号:US13969903

    申请日:2013-08-19

    申请人: Gemalto SA

    IPC分类号: H04L29/06

    摘要: A method to securely and asynchronously provisioning keys from one source secure device to a target secure device through a key provisioning server, in which the keys to be provisioned via the method remain unknown. The method includes the steps of, for the source secure device, encrypting a key to be transferred using a transport key so that only the target secure device can decrypt, and sending the encrypted key to the provisioning server and, for the target secure device, when available, getting the encrypted transferred key, and decrypting the transferred key using the transport key.

    摘要翻译: 一种通过密钥提供服务器将密钥从一个源安全设备安全地和异步地配置到目标安全设备的方法,其中将通过该方法来提供的密钥是未知的。 该方法包括以下步骤:对于源安全设备,使用传输密钥加密要传送的密钥,使得仅目标安全设备可以解密,并将加密的密钥发送到配置服务器,并且对于目标安全设备, 当可用时,获取加密的转移密钥,并使用传输密钥解密转移的密钥。