US 12,147,568 B2
Method for managing a sensitive data
Gautam Arvind Pandian, Singapore (SG)
Assigned to THALES DIS FRANCE SAS, Meudon (FR)
Appl. No. 17/911,691
Filed by THALES DIS FRANCE SAS, Meudon (FR)
PCT Filed Mar. 16, 2021, PCT No. PCT/EP2021/056686
§ 371(c)(1), (2) Date Sep. 15, 2022,
PCT Pub. No. WO2021/191001, PCT Pub. Date Sep. 30, 2021.
Claims priority of application No. 20315052 (EP), filed on Mar. 26, 2020.
Prior Publication US 2023/0147493 A1, May 11, 2023
Int. Cl. G06F 21/62 (2013.01); G06F 21/32 (2013.01)
CPC G06F 21/6245 (2013.01) [G06F 21/32 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A computer-implemented method for managing a sensitive data, wherein each authentication factor in a set of authentication factors has been uniquely assigned a corresponding group from a plurality of groups, wherein each of the groups in the plurality of groups contains one or more secret shares from a plurality of secret shares generated by using a secret sharing scheme, wherein that the method comprises:
a checking step in which a user provides an input, a verification of said input is performed by using an authentication factor from the set of authentication factors to generate a score reflecting a level of confidence of the verification and adding a subset of the one or more secret share(s) of the corresponding group assigned to the authentication factor to a collection, said subset of the one or more secret shares of the corresponding group depending on both said score and a predefined parameter associated with the authentication factor,
a controlling step in which while the collection comprises a number of secret share(s) which is below a threshold, a further authentication factor is elected from the set of authentication factors and a further checking step is executed with the further authentication factor and a further corresponding group of one or more secret shares, and
a generating step in which, once the number of secret shares belonging to the collection has reached the threshold, the sensitive data is built from the secret shares of the collection by applying a predefined algorithm associated with the secret sharing scheme.