The invention relates to access by a requesting access terminal to a secure communication session between participating communication terminals. A secure communication session is particularly understood to be a secure shared digital space, such as a conference call, a video conference, a virtual collaborative space, etc., which requires the use of access keys for each of the participating communication terminals.
This type of secure communication session requires defining the list of participants before establishing the communication session: for example, identifying users and/or participating terminals. Thus, only the participants identified in the list will be authorized to establish and/or access the secure communication session.
In order to add an additional level of security, provision also can be made for the establishment of and/or the access to the secure communication session to also be dependent on the provision of a key by the participating communication terminal wishing to establish and/or to access the secure communication session, which key is particularly made up of an access code (such as a digital code, an alphanumeric code, also called password, a scheme, a code formed by a succession of images, etc.) and/or biometric data, etc.
Thus, only the previously registered participants can access this secure communication session and, if necessary, they must be able to present the access code in order to be granted access thereto.
However, a participant may have forgotten or lost their access code. This can prove to be problematic since the content (conversation, text documents, audio and/or video, etc.) that the participant was to share during this secure communication session then would not be accessible by the other participants. Furthermore, when the secure communication session allows at least one final content to be generated, this final content will be erroneous since it will not be in accordance with the content of the participant, who has not accessed the secure communication session but has only accessed the content shared by the participants who have accessed this session.
One solution would involve using a system for recovering the access code. However, if a system for recovering the access code is not provided in connection with the secure access to the secure communication session, or if the participant does not have the necessary means for recovering the access code (for example, if they do not have the cellphone receiving the temporary code via SMS with them), they will not be authorized to access the secure communication session.
Furthermore, the list of participants can be erroneous: with a person and/or a communication device having been omitted from the list. In this case as well, the omitted person will not be authorized to access the secure communication session: they therefore will not be able to contribute to the session, and if this session generates final content, this final content will be erroneous.
One solution, if such a person is aware of the communication session or has been notified by a participant of the communication session, would involve them contacting the person administering the list of participants and this person adding them to this list of participants in order to be able to access the secure communication session. However, this process is laborious since it firstly requires the omitted person being aware of the planned secure communication session, then the omitted person knowing the person administering the list of participants and having at least one means of contacting them (telephone number, email address, etc.), and the person administering the list of participants being contacted by the omitted person before the secure communication session in order to include them in the list of participants. Furthermore, even in this case, there is still a risk of error involving the omitted person being included in another list when the person administering the list manages several lists of participants in separate secure communication sessions.
One of the aims of the present invention is to address the disadvantages with respect to the prior art.
An aim of the invention is a method for accessing a first secure communication session, called first session, ongoing between participating communication terminals, called participating terminals, by a requesting communication terminal, called requesting terminal, the access method comprising:
Thus, the requesting terminal will easily access the first secure communication session even if the requesting terminal does not follow the secure access procedure (either that the requesting terminal is not a terminal of the list of participants authorized to access the first secure communication session, or that the requesting terminal does not have the access code to the first secure communication session). Furthermore, the requesting terminal accessing the first secure communication session will have access to the same exchanges carried out in the first session as any of the terminals participating in the first session.
Advantageously, the requesting terminal is separate from the participating terminals of the list of participating terminals associated with the first communication session.
Advantageously, the message, which once transmitted triggers access to the first session, comprises data entered by means of the requesting terminal.
Advantageously, the access method comprises:
Thus, the acceptance is managed directly by the access method, avoiding overloading the network if the acceptance is first transmitted to the requesting terminal, which must then transmit it to the access method in order to trigger admission of the requesting terminal into the first session.
Advantageously, the access method comprises:
Thus, the participating terminal has the elements that are required for transmitting the acceptance directly to the access method since the access request originates from the access method and not directly from the requesting terminal.
Furthermore, the requesting terminal can thus submit a request to access a first session even if they do not have means (telephone number, email address, user identifier in a social network, etc.) to directly contact a participant in the first session.
Advantageously, sending the access request message to the at least one participating terminal of the first session comprises one of the following steps:
Thus, irrespective of the mode of sending the access request message, the message is received by at least one participant and the requesting terminal is not aware of any exchanges that occurred in the first session before accessing this session following the acceptance.
Furthermore, broadcasting the message thus allows the possibility of acceptance of the access request to be maximized.
Moreover, with the message being sent outside the first session, a suspension of the exchanges in the first session thus can be avoided.
Advantageously, the access request message comprises at least one datum from among the following data:
Advantageously, the access method comprises:
Advantageously, the access method comprises:
Another aim of the invention is a method for requesting access to a first secure communication session, called first session, ongoing between participating communication terminals, called participating terminals, by a requesting communication terminal, called requesting terminal, the access request method comprising:
A further aim of the invention is a method for granting access to a first secure communication session, called first session, ongoing between participating communication terminals, called participating terminals, by a requesting communication terminal, called requesting terminal, the method for granting access comprising:
Advantageously, according to one implementation of the invention, the various steps of the method according to the invention are implemented by software or by a computer program, with this software comprising software instructions intended to be executed by a data processor of a device forming part of a communication architecture and being designed to command the execution of the various steps of this method.
Therefore, the invention also relates to a program comprising program code instructions for executing the steps of the method for accessing a first secure communication session and/or the method for requesting access and/or the method for granting access when said program is executed by a processor.
This program can use any programming language and can be in the form of source code, object code or intermediate code between source code and object code, such as in a partially compiled format or in any other desirable format.
A further aim of the invention is a device for managing access to a first secure communication session, called first session, ongoing between participating communication terminals, called participating terminals, by a requesting communication terminal, called requesting terminal, the access management device comprising:
A further aim of the invention is a requesting communication terminal, called requesting terminal, capable of requesting access to a first secure communication session, called first session, ongoing between participating terminals, called participating terminals, by a requesting communication terminal, called requesting terminal, the requesting terminal comprising:
Advantageously, the requesting terminal comprises:
A further aim of the invention is a participating communication terminal, called participating terminal, participating in a first secure communication session, called first session, ongoing between participating communication terminals, called participating terminals, the participating terminal comprising:
Advantageously, the participating terminal comprises:
The features and advantages of the invention will become more clearly apparent from reading the description, which is provided by way of an example, and from the corresponding figures, which show:
The method SS1X_MNGT for managing access to the first secure communication session comprises establishing SS1X_STB the first secure communication session, in particular, following a request ss1X_oreq to establish a secure communication session from a first participating communication terminal TP1. The first participating communication terminal TP1 is a communication terminal from the list of participants associated with the first secure communication session SS1X. In this particular case, establishing SS1X_STB the first session involves the first participating terminal TP1 accessing the first session SS1X.
In particular, the method SS1X_MNGT for managing access comprises providing SS1X_SACC secure access to the first session SS1X to at least one participating terminal TPn,n∈[2,N] from the list upon a subsequent request ss1X_sreq for secure access to the first session by the at least one participating terminal TPn,n∈[2,N] from the list.
After providing SS1X_SACC secure access to the first session, the at least one participating terminal TPn accesses the first session SS1X. The participating terminals TP1, {TPn}n accessing the first session SS1X exchange data such as text messages, audio and/or video communications, content, etc., via this first session SS1X.
The management method SS1X_MNGT is implemented:
A particular embodiment of the management method SS1X_MNGT is a program comprising program code instructions for executing the steps of the management method SS1X_MNGT when said program is executed by a processor.
The access method SS1X_ACC is a method for accessing a first secure communication session SS1X, called first session, ongoing between participating communications terminals {TRn}n=1...N, called participating terminals, by a requesting communication terminal TR, called requesting terminal. The access method SS1X_ACC comprises:
In the case whereby access to the first secure communication session depends on belonging to a list of participating communication terminals associated with this first session for securing the first session (for example, preventing third party terminals, i.e., not belonging to this list, from accessing the exchanges made during this first session), the requesting terminal is particularly a communication terminal not belonging to the list of participants associated with the first secure communication session.
In the case whereby, in order to secure the first session, the participating terminals also must provide an access code in order to be authorized to access the first session, the requesting terminal also can be one of the participating terminals not having the access code during its request for access: either the user of the access terminal has forgotten the access code to the first session, or the access code previously recorded by the requesting terminal has been lost, or the access code is made available to the user of the requesting terminal on a communication terminal of the user of the requesting terminal that is separate from the requesting terminal and for which the request for access is currently unavailable to the user (in particular, the requesting terminal is a computer or a tablet, by means of which a user requests access to a collaborative space, for example, when they are traveling, this collaborative space sends an access code to the cellphone of the user. If the user has forgotten their cellphone, for example, at home, they will not be able to access this space).
In particular, the access method SS1X_ACC comprises:
In particular, the access method SS1X_ACC comprises:
In particular, sending DACC_TR the access request message to the at least one participating terminal of the first session SS1X comprises:
In an alternative embodiment, sending DACC_TR the access request message to the at least one participating terminal of the first session SS1X comprises:
In particular, sending DACC_TR the access request message to the at least one participating terminal of the first session SS1X comprises:
In particular, the access request message dacc_mssg comprises at least one datum from among the following data:
In particular, the access method SS1X_ACC comprises:
Then, the access method SS1X_ACC particularly comprises implementing a communication SS2_COM via the second session SS2 between the participating terminal TPi and the requesting terminal TR. They thus can particularly exchange messages ss2_mssg1, ss2_mssg2, etc. By virtue of these exchanges, the participating terminal TPi and/or the user of the participating terminal TPi can request additional information from the requesting terminal TR and/or the user of the requesting terminal TR. For example, when only the telephone number of the requesting terminal is provided by the access request message dacc_mssg, the participating terminal TPi and/or its user can request the name of the user of the requesting terminal and any other information concerning the requesting terminal (technical capabilities, for example, in order to check its compatibility for accessing all or part of the first session: content, type of video communication, etc.) or concerning the user of the requesting terminal (affiliation with a school, an educational level, a company, a team, etc.; skills; age, etc.). The additional information will enable the user of the participating terminal TPi or the participating terminal to implement a decision-making method for accepting or not accepting the access request from the requesting terminal.
In particular, the access method SS1X_ACC comprises:
In particular, receiving OK_REC an acceptance or triggering ENT_TRG admission commands ss2_stp the closure SS2_CL of the second session.
In particular, the access method SS1X_ACC comprises managing SS2_MNGT a second communication session, called second session, separate from the first session. The second session SS2 allows the requesting terminal TR to exchange with at least one participating terminal TPi participating in the first session. Managing SS2_MNGT a second session particularly comprises implementing the communication SS2_COM via the second session SS2 between the participating terminal TPi and the requesting terminal TR.
In particular, managing SS2_MNGT a second session comprises establishing SS2_STB the second session and/or closing SS2_CL the second session.
In particular, the steps of managing SS2_MNGT a second session are implemented by the access method SS1X_ACC.
After admission of the requesting terminal TR into the first session SS1X has been triggered ENT_TRG, the requesting terminal TR accesses the first session SS1X. The participating terminals TP1, {TPn}n and the requesting terminal TR accessing the first session SS1X exchange data such as text messages, audio and/or video communications, content, etc., via this first session SS1X.
In particular, the access method SS1X_ACC is implemented in the access management method SS1X_MNGT, in particular as illustrated in
In a particular embodiment, the management method SS1X_MNGT comprises creating SS1X_CREA a first secure communication session prior to its establishment SS1X_STB. The first session is created SS1X_CREA upon a request from a participating terminal, called administrator terminal, of the first session, for example, the first participating terminal TP1. During this creation step SS1X_CREA, a list of participants is generated for which at least one identifier associated with each of the participants is provided by the administrator terminal. The identifier associated with a participant is particularly an identifier relating to a participating user having a communication terminal, by means of which they accessed the first session and/or a participating communication terminal. For example, when creating a first session for a conference call (audio conference or video conference), the identifiers of the participants are particularly the numbers of the participating telephones. In another example, when creating a first session for a collaborative space allowing both text and/or audio and/or video exchanges, in addition to the sharing of content, the identifiers of the participants are particularly email addresses of the participating users.
Once the first session is created, the management method SS1X_MNGT establishes SS1X_STB the first session either (first option) automatically on a session start date and/or time associated with the first session, or (second option) upon receipt by the management method SS1X_MNGT of a first session request ss1X_oreq from a first participating terminal TP1, etc. The example of
In particular, the management method SS1X_MNGT checks that the first session request ss1X_oreq originates from the administrator terminal that helped to create the first session before establishing SS1X_STB the first session.
Once the first session is established, the management method SS1X_MNGT provides secure access SS1X_SACC to the first session to a participating communication terminal, called participating terminal, upon a request for secure access ss1X_sreq by a participating terminal TPn. The participating terminal is particularly understood to be a communication terminal, an identifier of which forms part of the list of participants associated with the first session or the user of which has an identifier that forms part of the list of participants associated with the first session.
In particular, granting access to the first session SS1X_SACC comprises checking whether the communication terminal from which the secure access request ss1X_sreq originates is a communication terminal relating to one of the participants from the list of participants. A terminal relating to one of the participants from the list of participants is understood to be a terminal corresponding to one of the terminals of the list of participants (when this list comprises identifiers of terminals) and/or a terminal available to a user corresponding to one of the users from the list of participants (when this list comprises identifiers relating to users: email address, name, pseudonym, etc.). It should be noted that the list of participants can also comprise both terminal identifiers (telephone number, IP address, IMEI, etc.) and user identifiers (email address, name, pseudonym, etc.).
In particular, the management method SS1X_MNGT activates the access method SS1X_ACC as soon as at least one participating terminal TPi accesses the first session, or the administrator terminal when the first session is established SS1X_STB upon its request SS1X_oreq, or any other participating terminal TPn,n=1...N when the first session is automatically established at a given time, for example.
Triggering ENT_TRG the admission of a requesting terminal TR implemented by the access method SS1X_ACC results from an acceptance ok_cmd by a participating terminal TPi after an access request message dacc_mssg is sent by the requesting terminal TR.
In particular, the access method SS1x_ACC comprises receiving DACC_REC an access request acc_req(dacc_mssg) from the requesting terminal, then sending DACC_TR the access request message dacc_mssg to at least one participating terminal TPi. Thus, if the requesting terminal TR does not know the participating terminals TPn, nor their users UPn, their access request nevertheless will be examined or even accepted and, in this case, it will nevertheless access the first session SS1X.
Alternatively, subject to the requesting terminal TR knowing at least one participating terminal TP1 or a participating user UPi (provided with a participating terminal TPi) participating in the first session SS1X, the access request acc_req is sent directly from the requesting terminal TR to the participating terminal TPi or to the participating user UPi (provided with a participating terminal TPi). Furthermore, the participating terminal TPi accepting the access request directly or indirectly commands ok_cmd the triggering ENT_TRG, by the access method SS1X_ACC, of the admission of the requesting terminal TR into the first session SS1X.
In particular, the triggering ENT_TRG is directly commanded ok_cmd by the participating terminal TPi. Alternatively, the access method SS1X_ACC comprises receiving OK_REC an acceptance ok_cmd from the participating terminal TPi. The reception of an acceptance OK_REC commands ent_ok the triggering ENT_TRG of admission into the first session.
Optionally, the acceptance ok_cmd comprises, in addition to validating the admission of the requesting terminal into the first session SS1X (for example, in the form of an identifier associated with the requesting terminal and, optionally, of an identifier of the first session), data relating to the granted access. For example, access to the first session SS1x for the requesting terminal TR can be:
In a particular embodiment, optionally supplementing the previous specific embodiment, the one or more participating terminal(s) TPi that received the access request message dacc_mssg from the requesting terminal TR can synchronously or asynchronously exchange with the requesting terminal TR prior to the acceptance ok_cmd. The one or more participating terminal(s) TPi can particularly send a first message mssg1 to the requesting terminal.
In particular, the first message mssg1 of the one or more participating terminal(s) TPi comprises a request relating to the requesting terminal TR, in particular to its capabilities in terms of peripherals (camera, microphone, screen size, etc.), in terms of memory, in terms of processing (software, plug-in, etc.), etc., and/or to the user of the requesting terminal (identity, location, age, skill(s), skill(s) level, etc.). In this case, the requesting terminal TR can send a second message mssg2 in return or in response that particularly comprises one or more response(s) to the requests of the first message mssg1. The exchange can continue with additional messages between the one or more participating terminal(s) TPi and the requesting terminal TR. In particular, the exchange is particularly closed by the acceptance ok_cmd by one of the participating terminals TPi exchanging with the requesting terminal TR.
In particular, one of the messages mssg originating from the participating terminal TPi comprises the acceptance command ok_cmd. In this latter case, the requesting terminal TR commands ok_cmd the triggering ENT_TRG of its admission into the first session by sending the acceptance command contained in the first message mssg1 to the access method SS1X_ACC.
A particular embodiment of the access method SS1X_ACC is a program comprising program code instructions for executing the steps of the access method SS1X_ACC when said program is executed by a processor.
A particular embodiment of the management method SS1X_MNGT is a program comprising program code instructions for executing the steps of the management method SS1X_MNGT and of the access method SS1X_ACC when said program is executed by a processor.
The access request method SS1X_DACC is a method for requesting access to a first secure communication session, called first session, ongoing between participating communication terminals TPi, called participating terminals, by a requesting communication terminal TR, called requesting terminal. The access request method SS1X_DACC comprises:
In particular, the access request method SS1X_DACC comprises:
In particular, sending DACC_EM the access request message to the at least one terminal participating in the first session SS1X comprises:
In an alternative embodiment, sending DACC_EM the access request message to the at least one participating terminal of the first session SS1X comprises:
In particular, sending DACC_EM the access request message to the at least one participating terminal of the first session SS1Xcomprises:
In particular, the access request message dacc_mssg comprises at least one datum from among the following data:
In particular, the access request method SS1X_DACC comprises:
Then, the access request method SS1X_DACC particularly comprises implementing a communication SS2_COM via the second session SS2 between the participating terminal TPi and the requesting terminal TR. They can thus particularly exchange messages SS2_mssg1, SS2_mssg2, etc. By virtue of these exchanges, the participating terminal TPi and/or the user of the participating terminal TPi can request additional information from the requesting terminal TR and/or from the user of the requesting terminal TR. For example, when only the telephone number of the requesting terminal is provided by the access request message dacc_mssg, the participating terminal TPi and/or its user can request the name of the user of the requesting terminal and any other information concerning the requesting terminal (technical capabilities, for example, in order to check its compatibility for accessing all or part of the first session: content, type of video communication, etc.) or concerning the user of the requesting terminal (affiliation with a school, an educational level, a company, a team, etc.; skills; age, etc.). The additional information will enable the user of the participating terminal TPi or the participating terminal to implement a decision-making method for accepting or not accepting the access request from the requesting terminal.
In particular, the access request method SS1X_DACC comprises:
In particular, the access request method SS1X_DACC comprises participating, as a caller SS2_CE, in a second communication session, called second session, separate from the first session. The second session SS2 allows the requesting terminal TR to exchange with at least one participating terminal TPi participating in the first session. Participating in a second session as a caller SS2_CE particularly comprises implementing the communication SS2_COM, via the second session SS2, between the participating terminal TPi and the requesting terminal TR.
In particular, participating in a second session as a caller SS2_CE comprises connecting SS2_CNX and/or disconnecting SS2_DCNX the requesting terminal TR to/from the second session SS2.
In particular, the steps of participating in a second session as a caller SS2_CE are implemented by the access request method SS1X_DACC.
After admission SS1X_ENT of the requesting terminal TR into the first session SS1X, the requesting terminal TR accesses the first session SS1X. The participating terminals TP1, {TPn}n and the requesting terminal TR accessing the first session SS1X exchange data, such as text messages, audio and/or video communications, content, etc., via this first session SS1X.
In a particular embodiment, the admission SS1X_ENT of a requesting terminal TR results from an acceptance acc_cmd by a participating terminal TPi after an access request message dacc_mssg is sent by the requesting terminal TR.
In particular, the access request method SS1X_DACC comprises sending DACC_EM an access request acc_reg(dacc_mssg) from the requesting terminal to at least one participating terminal TPi, in particular via the access method SS1X_ACC.
Alternatively, subject to the requesting terminal TR knowing at least one participating terminal TPi or a participating user UPi (provided with a participating terminal TPi) participating in the first session SS1X, the access request acc_req is sent directly from the requesting terminal TR to the participating terminal TPi or to the participating user UPi (provided with a participating terminal TPi). Furthermore, the participating terminal TPi accepting the access request directly or indirectly (in particular via the access method SS1X_DACC) commands ok_cmd the admission of the requesting terminal TR into the first session SS1X_ENT.
In particular, the admission SS1X_ENT is directly commanded acc_cmd by the participating terminal TPi. Alternatively, the access method SS1X_ACC receiving an acceptance ok_cmd from the participating terminal TPi commands acc_cmd the admission SS1X_ENT.
In a particular embodiment, optionally supplementing the previous specific embodiment, the one or more participating terminal(s) TPi that received the access request message dacc_mssg from the requesting terminal TR can synchronously or asynchronously exchange with the requesting terminal TR prior to the acceptance triggering the admission command acc_cmd. The requesting terminal TR can particularly receive SS2_REC a first message mssg1 from the one or more participating terminal(s) TPi, in particular via a second session SS2, the first message mssg1 is then, for example, relayed from the participating terminal TPi to the requesting terminal TR by the method SS2_MNGT for managing the second session.
In particular, the first message mssg1 comprises a request relating to the requesting terminal TR, in particular to its capabilities in terms of peripherals (camera, microphone, screen size, etc.), in terms of memory, in terms of processing (software, plug-in, etc.), etc., and/or to the user of the requesting terminal (identity, location, age, skill(s), skill(s) level, etc.). In this case, the requesting terminal TR can send SS2_EM a second message mssg2 in return or in response that particularly comprises one or more response(s) to the requests of the first message mssg1, in particular via the second session SS2 if the first message mssg1 was transmitted thereby, the second message mssg2 is then, for example, relayed from the requesting terminal TR to the participating terminal TPi by the method SS2_MNGT for managing the second session. The exchange can continue with additional messages between the one or more participating terminal(s) TPi and the requesting terminal TR. In particular, the exchange is particularly closed by the acceptance command acc_cmd by one of the participating terminals TPi exchanging with the requesting terminal TR.
In particular, one of the messages mssg originating from the participating terminal TPi comprises the acceptance command acc_cmd, ok_cmd. In this latter case, the requesting terminal TR commands acc_cmd its admission SS1X_ENT into the first session by sending the acceptance command acc_cmd, ok_cmd contained in the received message mssg either directly to the admission SS1X_ENT or to the access method SS1X_ACC.
A particular embodiment of the access request method SS1X_DACC is a program comprising program code instructions for executing the steps of the access request method SS1X_DACC when said program is executed by a processor.
The method SS1X_ADM for granting access grants access to a first secure communication session SS1X, called first session, ongoing between participating communication terminals TPn, called participating terminals, by a requesting communication terminal TR, called requesting terminal. The method SS1X_ADM for granting access comprises:
In particular, the method SS1X_ADM for granting access comprises:
In particular, the access request message dacc______mssg comprises at least one datum from among the following data:
In particular, sending OK_EM the acceptance is activated ok_act by the participating user UPi with the participating terminal TPi implementing the method SS1X_ADM for granting access.
By way of an example, the access request message dacc_mssg comprises an entrance gong and the name of the requesting user UR of the requesting terminal TR. The access request message dacc_mssg will be reproduced by the participating terminal TPi. Furthermore, the participating user UPi with the participating terminal TPi will perform an approval action ok_act: oral approval, pressing an OK key on a physical or virtual keyboard, nodding of the head. The method SS1X_ADM for granting access optionally comprises detecting UP_CPT the approval action ok_act that activates sending of the acceptance OK_EM.
In particular, the method SS1X_ADM for granting access comprises:
Then, the method SS1X_ADM for granting access particularly comprises implementing a communication SS2_COM via the second session SS2 between the participating terminal TPi and the requesting terminal TR. They thus can particularly exchange messages SS2_mssg1, SS2_mssg2, etc. By virtue of these exchanges, the participating terminal TPi and/or the user of the participating terminal TPi can request additional information from the requesting terminal TR and/or from the user of the requesting terminal TR. The additional information will enable the user of the participating terminal TPi or the participating terminal to implement a decision-making method for accepting or not accepting the access request from the requesting terminal.
In particular, the method SS1X_ADM for granting access comprises:
In particular, the method SS1X_ADM for granting access comprises participating, as a caller SS2_CG, in a second communication session, called second session, separate from the first session. The second session SS2 allows the participating terminal TPi to exchange with the requesting terminal. Participating in a second session as a caller SS2_CG particularly comprises implementing the communication SS2_COM, via the second session SS2, between the participating terminal TPi and the requesting terminal TR.
In particular, participating in a second session as a caller SS2_CG comprises requesting the establishment SS2_STBR of the second session and/or disconnecting SS2_DCNX the participating terminal TPi from the second session.
In particular, the steps of participating in a second session as a caller SS2_CG are implemented by the method SS1X_ADM for granting access.
After sending OK_EM the acceptance triggering ENT_TRG, by means of the access method SS1X_ACC, admission of the requesting terminal TR into the first session SS1X, the requesting terminal TR accesses the first session SS1X. The participating terminals TP1, {TPn}n and the requesting terminal TR accessing the first session SS1X exchange data such as text messages, audio and/or video communications, content, etc., via this first session SS1X.
Triggering ENT_TRG the admission of a requesting terminal TR that is implemented by the access method SS1X_ACC results from a participating terminal TPi sending OK_EM an acceptance ok_cmd that is received, particularly by the access method SS1X_ACC, after an access request message dacc_mssg is sent by the requesting terminal TR.
In particular, the method SS1X_ADM for granting access comprises receiving DACC_REC an access request message dacc_mssg from a requesting terminal TR, particularly in the form of an access request acc_req(dacc_mssg) from the requesting terminal comprising the access request message dacc_mssg.
In particular, the access request message dacc_mssg received DACC_REC by the method SS1X_ADM for granting access is sent by an access request method SS1X_DACC, as is particularly described with reference to
Alternatively, subject to the requesting terminal TR knowing at least one participating terminal TPi or a participating user UPi (provided with a participating terminal TPi) participating in the first session SS1X, the access request acc_req is directly received DACC_REC by the participating terminal TPi from the requesting terminal TR. Furthermore, the participating terminal TPi accepting the access request directly or indirectly commands ok_cmd the triggering ENT_TRG, by the access method SS1X_ACC, of the admission of the requesting terminal TR into the first session SS1X.
In particular, the triggering ENT_TRG is directly commanded ok_ cmd by the participating terminal TP; by sending OK_EM the acceptance to the access method SS1X_ACC. Alternatively, the access method SS1X_ACC comprises receiving OK_REC an acceptance ok_cmd from the participating terminal TPi. The reception of an acceptance OK_REC commands ent_ok_ the triggering of admission into the first session ENT_TRG.
Optionally, the acceptance OK_EM comprises, in addition to validating ok_cmd(SS1X, TR) the admission of the requesting terminal into the first session SS1X (for example, in the form of an identifier associated with the requesting terminal and, optionally, of an identifier of the first session), data relating to the granted access ok_cmd(SS1X, TR, acc_tyTR). For example, access acc_tYTR to the first session SS1X for the requesting terminal TR can be:
In a particular embodiment, optionally supplementing the previous specific embodiment, the participating terminal TPi that received the access request message dacc_mssg from the requesting terminal TR can synchronously or asynchronously exchange with the requesting terminal TR before sending OK_EM the acceptance ok_cmd. The participating terminal TPi can particularly send a first message mssg1 to the requesting terminal.
In particular, the first message mssg1 of the participating terminal TPi comprises a request relating to the requesting terminal TR, in particular to its capabilities in terms of peripherals (camera, microphone, screen size, etc.), in terms of memory, in terms of processing (software, plug-in, etc.), etc., and/or to the user of the requesting terminal (identity, location, age, skill(s), skill(s) level, etc.). In this case, the requesting terminal TR can send a second message mssg2 in return or in response that particularly comprises one or more response(s) to the requests of the first message mssg1. The exchange can continue with additional messages between the participating terminal TPi and the requesting terminal TR. In particular, the exchange is particularly closed by the acceptance ok_cmd by the participating terminal TPi exchanging with the requesting terminal TR.
In particular, one of the messages mssg originating from the participating terminal TPi comprises the acceptance command ok_ cmd. In this latter case, the requesting terminal TR commands ok_cmd the triggering ENT_TRG of its admission into the first session by sending the acceptance command contained in the first message mssg1 to the access method SS1X_ACC.
A particular embodiment of the method SS1X_ADM for granting access is a program comprising program code instructions for executing the steps of the method SS1X_ADM for granting access when said program is executed by a processor.
In a particular embodiment of the invention, the invention relates to a program comprising program code instructions for executing the steps of the method for accessing a first secure communication session and/or the method for requesting access and/or the method for granting access when said program is executed by a processor.
The embodiment of
A first secure communication session SS1X is established by the communication server SCOM (as shown in phase 1 of
The first terminal TP1 with access to the first session SS1X can prepare the work contemplated for the first session, for example, by sharing content c and/or by filing a message for welcoming the other participants.
At any time during the first session SS1X, at least one of the participating terminals TPi, {TPn} (separate from the first terminal in the example of
In particular, the access management method SS1 X_MNGT checks AUTH_V whether the relevant participating terminal TPi, {TPn} is authorized to access the first session SS1X before granting secure access SS1X_ACC to the first session SS1X to the participating terminal TPi, {TPn} requesting this secure access. This authorization check AUTH_V particularly comprises at least one from among the following checking steps:
The communication server SCOM grants secure access to the first session SS1X to the relevant participating terminal TPi, {TPn} (as shown in phase II of
During this first session SS1X, a requesting terminal TR can request access to the first session at any time, in particular from the communication server SCOM, as illustrated in
The communication server SCOM receiving the access request message daccc_mssg transmits it to at least one participating terminal TP1, TPi, TPn. Optionally, receiving and then sending the access request message daccc_mssg to a participating terminal TP1, TPi, TPn is a step of an access method SS1X_ACC, in particular as illustrated in
Following this request, at least one participating terminal TPi can send an acceptance ok_cmd of this request to the communication server SCOM. Optionally, the participating terminal TPi sending an acceptance to the communication server SCOM is a step of a method SS1X_ADM for granting access, in particular as illustrated in
Before the participating terminal TPi sends an acceptance ok_cmd, the participating terminal can request SS2_req, from the communication server SCOM, the establishment of a second communication session between the participating terminal TPi and the requesting terminal TR. The communication server SCOM establishes the second session SS2. Thus, the participating terminal TPi and the requesting terminal TR can exchange in order to particularly allow the participating terminal TPi and/or its user UPi to determine APV_DT whether or not the access by the requesting terminal to the first session is approved. The exchanges are particularly exchanges of messages SS2_mssg1, SS2_mssg2, etc. In particular, the communication server SCOM receiving the acceptance ok_cmd or the communication server SCOM triggering the admission of the requesting terminal TR closes ss2_stp the second session.
The access management device 31 is capable of managing access to a first secure communication session, called first session, ongoing between participating communications terminals 11, 1n, 1i, called participating terminals, by a requesting communication terminal 2, called requesting terminal.
The access management device 31 comprises:
The communication architecture illustrated in
In particular, the access management device 31 is implemented in a communication server, i.e., a device capable of managing at least one communication session via the communication network 4.
In particular, the access management device 31 is, or comprises, or is implemented in a device for managing a first secure communication session via the communication network 4. In the example of
In particular, the access management device 31 comprises a database of first secure sessions 313, in which lists of participants are recorded that are associated with first secure communication sessions. Optionally, predefined start and/or end dates and/or times of first secure sessions associated with a first session are also recorded in the database of first secure sessions 313.
In particular, the access management device 31 comprises a generator 310O capable of establishing ss1X_stb a first secure communication session SS1X.
Optionally, the generator 310O receives an establishment request ss1X_oreq from a first participating terminal 11. Then, the generator 310O is capable of establishing ss1X_stb the first secure communication session SS1X upon receipt of the establishment request ss1X_oreq.
In particular, the access management device 31 comprises a connector 310A capable of granting secure access ss1X_sacc to the first secure communication session SS1X to other participating terminals 12... 1n, 1i upon request for secure access ss1X_sreq from these participating terminals 12... 1n, 1i. Then, at least one of the participating terminals particularly comprises a generator/transmitter of requests for establishing a first secure session (not shown). This is the case, in particular, of the first participating terminal 11 of
In particular, the management device 31 further comprises an access request relay 311 capable of transmitting an access request message dacc_mssg received from a requesting terminal 2 to at least one of the participating terminals 12... 1n, 1i. In particular, the relay comprises a receiver (not shown) for receiving an access request message dacc_mssg and/or an access request acc req originating from the requesting terminal, with the access request acc_req(dacc_mssg) comprising the access request message. Optionally, the relay comprises a transmitter (not shown) for sending an access request message dacc_mssg to at least one of the participating terminals 12... 1n, 1i via the first session SS1X or outside, by synchronous, asynchronous or broadcast communication. The relay also particularly comprises an extractor (not shown) for extracting a message from a request that is capable of extracting an access request message dacc_mssg from an access request acc_req. The extractor is implemented between the request receiver and the access request message transmitter in order to provide the transmitter with the access request message extracted from the received access request.
In particular, the requesting terminal 2 comprises:
In particular, the requesting terminal 2 comprises at least one output human-machine interface, called output interface, or reproduction means 24, such as a screen, at least one loudspeaker, etc., and/or at least one input or entry human-machine interface (not shown), called input interface, such as a keyboard, a mouse, a touch screen, a microphone, a camera, etc.
In the case whereby the generator 21 generates an access signal acc_sg following an action dact by the requesting user UR, the generator 21 receives data from an input interface relating to the action dact relating to this input interface of the requesting user UR. For example, the requesting user activates a warning button (similar to an entrance doorbell) on this input interface or strikes the touch screen in a manner similar to a knock on a door (“knock knock”).
In particular, the participating terminal 1i comprises a receiver 11i for receiving an access request message dacc_mssg originating from the requesting terminal 2 for access to the first session SS1X.
In particular, the participating terminal 1i comprises at least one output human-machine interface, called output interface, or reproduction means 14i, such as a screen, at least one loudspeaker, etc., and/or at least one input or entry human-machine interface (not shown), called input interface, such as a keyboard, a mouse, a touch screen, a microphone, a camera, etc.
The receiver 11i optionally provides the output interface 14i with the access request message dacc_mssg so that the access request message dacc_mssg can be perceived (read, heard, etc.) by the participating user UPi of the participating terminal TPi.
In particular, the validator 16i receives, directly or via an input interface (not shown) of the participating terminal TPi, an acceptance action ok_act from the participating user UPi in response, in particular to the access request message dacc_mssg made available to the participating user UPi via the output interface 14i.
In particular, the participating terminal 1i comprises:
In particular, the participating terminal 1i comprises a generator 15i for generating requests for establishing a second session ss2_req. The generator 15i sends the request for establishing a second session ss2_req to a device 32 for managing a second session, particularly implemented in a communication server 3. Thus, the device 31 for managing a first secure communication session and the device 32 for managing a second session can be implemented, for example, in a communication server 3.
In particular, the access management device 32 comprises a generator 320 capable of establishing ss2_stb a second communication session SS2 between the requesting terminal 2 and the participating terminal 1i.
In particular, the participating terminal 1i and the requesting terminal 2 each comprise a communication device, respectively 13i, 23, via the second session SS2. The communication devices 13i, 23 comprise connectors 130i, 230 to the second session SS2, and optionally transmitters 131i, 231 and/or receivers 132i, 232, for example, for sending/receiving messages mssg1, mssg2, etc., which are sent via the second session SS2 under the names of ss2_mssg1, ss2-mssg2, etc.
In particular, the generator 15i for generating requests for establishing a second session SS2 activates xtrg the communication device via the second session 13i of the participating terminal 1i.
In particular, the messages mssg1, mssg2, etc., transmitted via the second session are entered via the input interfaces 131i, 231, respectively, and are reproduced by the output interfaces 132i, 232, respectively, intended for the participating user UPi and the requesting user UR, respectively.
In particular, the validator 16i comprises an analyzer capable of decision-making as a function of the access request message dacc_mssg, and/or of the messages exchanged via the second session ss2_mssg1, SS2_mssg1, etc., in particular those received from the requesting terminal 2, and/or of an action ok_act of the participating user UPi of an acceptance of the requesting terminal 2 to access the first session SS1X. In the case whereby the analyzer decides upon an acceptance, the validator 16i sends an acceptance ok_cmd to the device 31 for managing the first session, in particular to the controller 312.
The screen optionally comprises several windows, including one window associated with the first session SS1X_WD and optionally divided into sub-windows:
This first session admission window SS1X_EWD1 particularly comprises a zone for entering an identifier id_cptz of the requesting user UR and/or an identifier of their terminal and/or an area for entering an access code cd_cptz. With the requesting user UR not having the access code or not being included in the list of participants they cannot enter the requested identifier ID and/or access code CD in order to securely access the first session SS1X.
The first session admission window SS1X_EWD1 particularly comprises a virtual warning button kk_cptz, on which the requesting user can act dact in order to transmit an access request message. In an alternative embodiment of the invention, not shown, with the requesting user UR having previously been identified as not belonging to the list of participants, the input window comprises only an interaction element, such as the virtual warning button kk_cptz, or the detection of a door knocking gesture, or the detection of a verbal interpellation, “Hello! Is anyone there?”, “Hello”, etc.
Optionally, following the action of the requesting user dact with respect to the first session admission window SS1X_EWD1, a second admission window SS1X_EWD2 is reproduced allowing the requesting user UR to complete the access request message dacc_cpl. In particular, the requesting user can add their name, the reason for their access request, etc. Furthermore, the access request message dacc_mssg thus formed by the action dact of the user and/or a supplement dacc_cpl is sent from the requesting terminal to at least one participating terminal of one of the participating users U1... UPn.
At least one of the participating terminals of the participating users UP1... UPn receives the access request message and reproduces it in an access request window DACC_WD.
If the participating user i UPi establishes a second session with the requesting terminal of the requesting user UR, the exchanges relating to this second session are reproduced in association with the access request window DACC_WD. For example, if these exchanges are voice exchanges, they will only be possible if the access request window DACC_WD is activated (for example, by selection by the participating user i UPi). In another example, the exchanges are reproduced in text form in the access request window DACC_WD, at least if they are text exchanges, or even also by converting voice into text when they are voice and/or audio exchanges. In the example of
The access request window DACC_WD comprises at least one interaction element OK_BT allowing the participating user UPi to accept the access request of the requesting user. This interaction element is a physical or virtual acceptance button in particular, and/or a camera detecting a nodding head, and/or a microphone detecting an oral acceptance, etc.
The screen optionally comprises several windows, including one window SS1X_WD associated with the first session and optionally divided into sub-windows:
By using the invention, a requesting user aware of the location of the secure shared digital space (for example, the access url, the name of the virtual room, etc.), but who is not able to enter their identifiers and/or passwords due to forgetting or losing them, etc., is able to request access (especially in the form of a voice call, a sound, a touch, a visual call, etc.) to this space that they are seeking to join via a secure channel. This call, which is visible from within this space, allows any person already present to accept their admission into/their access to this space.
The invention is applicable to any secure shared digital space as long as this space requires an access key (in any form). Thus, only one person will need their key in order to access this space before confirming (by accepting ok_cmd) the access of the other participants one by one by recognizing them using their voice when the access request message comprises a voice message, their face when the access request message comprises a photo or a video of the requesting user, their access hardware, a secret question or any other recognition element.
The invention also relates to a medium. The information medium can be any entity or device capable of storing the program. For example, the medium can comprise a storage means, such as a ROM, for example, a CD-ROM or a microelectronic circuit ROM or even a magnetic recording means, for example, a floppy disk or a hard disk.
Moreover, the information medium can be a transmissible medium, such as an electrical or optical signal, which can be routed via an electrical or optical cable, by radio or by other means. The program according to the invention particularly can be downloaded over a network, in particular of the Internet type.
Alternatively, the information medium can be an integrated circuit, in which the program is incorporated, with the circuit being capable of executing or being used for executing the method in question.
In another implementation, the invention is implemented by means of software and/or hardware components. In this respect, the term module can equally correspond to a software component or to a hardware component. A software component corresponds to one or more computer program(s), one or more sub-program(s) of a program, or more generally to any element of a program or software capable of implementing a function or a set of functions according to the above description. A hardware component corresponds to any element of a hardware assembly (or hardware) capable of implementing a function or a set of functions.
Although the present disclosure has been described with reference to one or more examples, workers skilled in the art will recognize that changes may be made in form and detail without departing from the scope of the disclosure and/or the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
FR2006267 | Jun 2020 | FR | national |
This Application is a Section 371 National Stage Application of International Application No. PCT/FR2021/051063, filed Jun. 15, 2021, which is incorporated by reference in its entirety and published as WO 2021/255375 A1 on Dec. 23, 2021, not in English.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/FR2021/051063 | 6/15/2021 | WO |