WO2007096908A1 - Method for the acquisition of data regarding a collection of objects by means of an information processing device - Google Patents

Method for the acquisition of data regarding a collection of objects by means of an information processing device Download PDF

Info

Publication number
WO2007096908A1
WO2007096908A1 PCT/IT2006/000090 IT2006000090W WO2007096908A1 WO 2007096908 A1 WO2007096908 A1 WO 2007096908A1 IT 2006000090 W IT2006000090 W IT 2006000090W WO 2007096908 A1 WO2007096908 A1 WO 2007096908A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
storage medium
collection
processing device
transfer
Prior art date
Application number
PCT/IT2006/000090
Other languages
French (fr)
Inventor
Stefano Bucci
Massimo Maggio
Umberto Trocino
Original Assignee
Progress Insurance Broker S.R.L
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Progress Insurance Broker S.R.L filed Critical Progress Insurance Broker S.R.L
Priority to PCT/IT2006/000090 priority Critical patent/WO2007096908A1/en
Publication of WO2007096908A1 publication Critical patent/WO2007096908A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Definitions

  • the present invention relates to a method for the acquisition of data regarding a collection of objects by- means of an information processing device.
  • an information processing device As is known, in some sectors, for example the item collectors' sector, there is a particular need to catalog data regarding the items collected and to suitably protect the cataloged data from unauthorized access, since said data often contain information which is preferably kept secret or confidential .
  • cataloging and data acquisition methods are known which simply record the acquired data on a paper medium and/or store them in electronic form, for example in one or more files of a personal computer.
  • images portraying said items are acquired and inserted in paper or electronic files.
  • the object of the present invention is to provide a method to acquire data regarding a collection of objects, or cataloging method, which makes it possible to guarantee an adequate protection level for the confidential information contained in said data. This object is reached by means of an acquisition method as defined in the attached claim 1 in its most general form and in the dependent claims in its preferred embodiments.
  • - figure 1 schematically shows a flow diagram of a method according to the present invention
  • - figure 2 schematically shows an example of a data structure which can be used in the method of figure 1;
  • Figure 1 illustrates a preferred embodiment of a method 100, according to the present invention, for the acquisition of data regarding a collection of objects by means of an information processing device and for transferring said acquired data to a non-volatile memory- storage medium.
  • the present description for exemplary but non-limiting purposes, will refer in particular to a method for acquiring data regarding a collection of works of art and/or antiques. It should be remembered, however, that a method according to the invention can also be advantageously applied for acquiring data regarding collections of objects of a different nature or of other items in general .
  • the method according to the invention is implemented by means of a program run on an information processing device, for example by means of a program on a personal computer.
  • said program uses a Relational Database Management System (RDBMS), for example Microsoft AccessTM.
  • RDBMS Relational Database Management System
  • the data acquired by means of the method are transferred to a removable non-volatile memory storage medium which can be associated to the information processing device, preferably an optical medium, for example an optical disk, more preferably of the non- rewritable type.
  • the acquisition method 100 comprises a first step of making available (i.e. allocating) a data area, in one area of the memory of the information processing device, suitable to temporarily contain a plurality of data structures (or records) , each of said structures being associated to a respective object in the collection.
  • each of said data structures is intended to contain data regarding one object of the collection.
  • FIG. 2 A particularly advantageous embodiment of the data structure which can be used in the method according to the present invention is schematically represented in figure 2, where said structure is generally indicated with 200.
  • the data structure 200 comprises at least one first data field 201, 202 for storage of the data intended to remain visible, i.e. data intended to be normally accessible without any particular restrictions.
  • the first data field will be referred to in this description with the expression “public data field” .
  • the data structure 200 further comprises at least a second data field 203, 204, 205 distinct from the first data field and intended to contain data to be kept secret, i.e. data which are not intended for the eyes of third parties.
  • the second data field will be referred to in this description with the expression "confidential data field” .
  • the method 100 includes, for each object in the collection, a step 102 for acquiring, by means of the processing device, at least a first and a second data element containing information about said object.
  • the first data element contains information about the object intended to remain normally visible, i.e. accessible.
  • the first data element will be referred to in this description with the expression "public data” .
  • the second data element includes information about the object intended to remain normally non-accessible.
  • the second data element will be referred to in this description with the expression "confidential data” .
  • the data acquired during the step 102 are stored respectively in the public data field 201 and in the confidential data field 203 of the data structure 200 associated to the object in question.
  • a first public data element contains information on the value (real or estimated) of said object
  • a further public data element includes general information on the typology of said object (e.g. jewels, coins, sculptures, watches, etc.)
  • other public data i.e. containing non-identifying information on the object in question.
  • a public data element containing information on the state of conservation of the object (e.g. brand new, spectacular, good, if the object in question is in particular a coin) .
  • All the acquired public data are stored during step 103 in a respective public data field 201, 202. Furthermore, during the acquisition step 102, one or more confidential data are acquired (intended to be stored during step 103 in the respective confidential data fields) , in particular data containing identifying information on the object in question, which are intended to remain normally non-accessible, for example title, author, size, creation date, weight, origin, etc.
  • the acquisition step 102 also provides for the acquisition, as a confidential data element, of a digital image portraying the object, intended to be stored during step 103 in a suitable confidential data field 205 of the data structure 200.
  • the acquisition of the digital image of the object is carried out by placing near the object in question a graduated chromatic-dimensional reference instrument, such as to provide a reliable comparison reference of the chromatic and dimensional characteristics of the object.
  • a reference instrument 300 is schematically illustrated in figure 3, in the form of a printed image on a paper medium and bearing one or more graduated scales 303, 304 in length units, and one or more graduated chromatic scales 301, 302.
  • Said printed image preferably includes a graduated scale 303 in centimeters, a graduated scale 304 in inches, a graduated scale 301 with elements 305 which represent respective tonalities in scales of grey and a graduated scale 302 with elements 306 which represent respective reference colors .
  • the method 100 optionally includes a processing step 104 which, starting from the acquired and stored public data, is such as to output summary data relating to said starting public data.
  • a processing step 104 which, starting from the acquired and stored public data, is such as to output summary data relating to said starting public data.
  • the summary data in output from the step 104 could be in the form of partial total values calculated for each type of object.
  • the processing stage 104 could simply include an operation to make an electronic copy of the public data, or to print said data, for the purposes which will be illustrated hereunder.
  • the method 100 further comprises a step 105 for cryptographic encryption, during which at least the confidential data acquired and stored during the preceding steps are processed to be encrypted by means of an encryption key.
  • the encryption used is of the 128 bit type.
  • the method according to the invention performs the encryption step 105, as indicated by the arrow 108, repeatedly in two phases: in a first phase, encryption starting from the so acquired and stored data is performed and, in a second phase, encryption starting from the encrypted data in output from the first phase is performed.
  • the first and second phases use a first and second encryption key respectively, intended to be known to people distinct from each other.
  • the first encryption key is generated by a password entered by the collection owner and the second encryption key is generated by a password entered by the third party interested in purchasing the collection.
  • the public data can also be encrypted together with the confidential data.
  • the summary data produced during phase 104 can also be encrypted.
  • the method 100 includes a step 107 for transferring the encrypted data from step 105 to the non-volatile storage medium, for example to an optical disk.
  • the public data (whether encrypted or not) or the summary of said data are transferred to the same medium, for example in accordance with the following, non-limiting combinations: • Encrypted confidential data + encrypted public data + copy of public data (unencrypted) ;
  • a collector wishes to catalog for private purposes his collection of objects, e.g. works of art or similar.
  • the collector After acquiring the public and private data by means of a processor using steps 101, 102, 103 of the method 100, if necessary also by the acquisition of digital photos with the dimensional-chromatic reference instrument, the collector creates a CD with the encrypted public and private data and also prints a copy of the public data, or any summary data if present, to be associated to the CD 1 for example in the form of a CD cover or a paper file associated to the CD.
  • the printed copy containing the public data can be used by the collector as a source of data directly accessible in the future to the collector himself in order to remind him immediately of the contents of the CD, without running the risk that the encrypted data stored in the CD is disclosed in the case where, for example, accidentally or not, the CD or a copy of it falls into the hands of a third party.
  • the public data can be added to the same CD containing the encrypted data, for example making it possible for the collector to identify the content of the CD should the printed copy be lost and without having to decrypt the entire contents of the CD.
  • the method 100 is advantageously used for example in calculating the premium and drawing up an insurance contract to cover a collection of works of art or similar, for example of a private collector who wishes to keep the information on his collection as confidential as is compatible with the transparency requirements normally requested when signing an insurance contract .
  • a collector who intends to insure his items will contact an insurance brokerage company which, together with consulting experts linked to the company, will carry out cataloging of the items to be insured using the method according to the invention.
  • Said cataloging will take place by entering into a processor, for example a portable computer, the public data, such as the personal data of the collector, and a series of information useful for the definition of the risk and necessary for the calculation of the estimate, such as the value (real or estimated) of the works, their state of conservation and whether there are antitheft devices protecting said works.
  • Confidential data will also be entered, for example photographic reproductions of the works and identifying data (e.g. the title) of said works.
  • the confidential data will subsequently be encrypted by means of a double cryptographic encryption with encryption keys generated respectively by a password established by the consultant and a password established by the collector. In the case the contract is effectively drawn up, the collector can leave his password in the custody of a notary.
  • three copies of a storage medium will subsequently be created, for example a CD or DVD, containing the encrypted data and, where not provided for, a printed copy of the public data (or preferably a summary of these) and a copy of the unencrypted public data.
  • the public data, or their summary will then be available for the calculation of the insurance premium.
  • said calculation can safely be made on-line using a remote server, since transmission of the confidential data to perform said calculation will not be requested.
  • the company in order to issue the policy and to be certain that the risk to be undertaken has been assessed correctly, will have access only to the really necessary unencrypted data (public data), for example the insured' s city of residence, where the items are kept, the type of protection in place to safeguard the items, the type of alarms present, if any, the total value to be insured and the state of conservation of the items .
  • public data for example the insured' s city of residence, where the items are kept, the type of protection in place to safeguard the items, the type of alarms present, if any, the total value to be insured and the state of conservation of the items .
  • the confidential data contained in the CD can be decrypted and, in any case, only in the presence of both the brokerage company and the collector.

Abstract

Method (100) for the acquisition of data regarding a collection of objects by means of an information processing device and to transfer said acquired data to a non-volatile storage medium, the method (100) comprising steps : - to make available (101) in a memory of said processing device a data area such as to temporarily contain a plurality of data structures (200) , each data structure being associated to a respective object of said collection, each of said data structures comprising at least a first data field (201, 202) and at least a second data field (203, 204, 205) distinct from said first data field; - to acquire (102) , for each object in said collection and by means of said processing device, at least a first and at least a second data element containing information on said object; - to store (103) , for each object in said collection and by means of said processing device, said first and said second data element respectively in the first (201, 202) and in the second (203, 204, 205) data field of the data structure (200) associated to said object; - to carry out cryptographic encryption (105, 108) of said second stored data, such as to make cryptographic decryption necessary for subsequent access to said second stored data; - to transfer (107) said second encrypted data to the non-volatile storage medium.

Description

"Method for the acquisition of data regarding a collection of objects by means of an information processing device".
DESCRIPTION [0001] The present invention relates to a method for the acquisition of data regarding a collection of objects by- means of an information processing device. [0002] As is known, in some sectors, for example the item collectors' sector, there is a particular need to catalog data regarding the items collected and to suitably protect the cataloged data from unauthorized access, since said data often contain information which is preferably kept secret or confidential . [0003] For example, cataloging and data acquisition methods are known which simply record the acquired data on a paper medium and/or store them in electronic form, for example in one or more files of a personal computer. In particular, in the case of cataloguing items of a private collection, images portraying said items are acquired and inserted in paper or electronic files.
[0004] However, the cataloging methods known in the art are not able to associate an adequate level of protection to these data especially in the case where they are intended to circulate, even between a limited number of people who, for various reasons, must be guaranteed access to at least part of said data. In fact, it often happens that the confidentiality of data collected by means of the prior art is violated without particular difficulty, whether accidentally or not . [0005] The object of the present invention is to provide a method to acquire data regarding a collection of objects, or cataloging method, which makes it possible to guarantee an adequate protection level for the confidential information contained in said data. This object is reached by means of an acquisition method as defined in the attached claim 1 in its most general form and in the dependent claims in its preferred embodiments. [0006] Further features and advantages of the method according to the present invention will become more apparent from the following detailed description of an exemplary but non-limiting embodiment thereof, as illustrated in the accompanying drawings, in which:
- figure 1 schematically shows a flow diagram of a method according to the present invention; - figure 2 schematically shows an example of a data structure which can be used in the method of figure 1; and
- figure 3 schematically shows a graduated chromatic- dimensional reference instrument . [0007] In the figures, equal or similar elements are indicated with the same reference numbers. [0008] Figure 1 illustrates a preferred embodiment of a method 100, according to the present invention, for the acquisition of data regarding a collection of objects by means of an information processing device and for transferring said acquired data to a non-volatile memory- storage medium. The present description, for exemplary but non-limiting purposes, will refer in particular to a method for acquiring data regarding a collection of works of art and/or antiques. It should be remembered, however, that a method according to the invention can also be advantageously applied for acquiring data regarding collections of objects of a different nature or of other items in general . [0009] In a preferred embodiment, the method according to the invention is implemented by means of a program run on an information processing device, for example by means of a program on a personal computer. [0010] Preferably, said program uses a Relational Database Management System (RDBMS), for example Microsoft Access™. [0011] In a particularly preferred, but non-limiting, embodiment the data acquired by means of the method are transferred to a removable non-volatile memory storage medium which can be associated to the information processing device, preferably an optical medium, for example an optical disk, more preferably of the non- rewritable type.
[0012] As illustrated in figure 1, the acquisition method 100 comprises a first step of making available (i.e. allocating) a data area, in one area of the memory of the information processing device, suitable to temporarily contain a plurality of data structures (or records) , each of said structures being associated to a respective object in the collection. In other words, each of said data structures is intended to contain data regarding one object of the collection.
[0013] A particularly advantageous embodiment of the data structure which can be used in the method according to the present invention is schematically represented in figure 2, where said structure is generally indicated with 200.
[0014] The data structure 200 comprises at least one first data field 201, 202 for storage of the data intended to remain visible, i.e. data intended to be normally accessible without any particular restrictions. Hereinafter, the first data field will be referred to in this description with the expression "public data field" . [0015] The data structure 200 further comprises at least a second data field 203, 204, 205 distinct from the first data field and intended to contain data to be kept secret, i.e. data which are not intended for the eyes of third parties. Hereinafter, the second data field will be referred to in this description with the expression "confidential data field" . [0016] In the particular embodiment of the data structure 200 given in figure 2, only by way of example, two public data fields 201, 202 and three confidential data fields 203, 204, 205 are illustrated. [0017] Returning to the flow diagram in figure 1, the method 100 includes, for each object in the collection, a step 102 for acquiring, by means of the processing device, at least a first and a second data element containing information about said object. In particular, the first data element contains information about the object intended to remain normally visible, i.e. accessible. Hereinafter, the first data element will be referred to in this description with the expression "public data" . [0018] The second data element includes information about the object intended to remain normally non-accessible. Hereinafter, the second data element will be referred to in this description with the expression "confidential data" . [0019] In a further step 103 of the method 100, the data acquired during the step 102 are stored respectively in the public data field 201 and in the confidential data field 203 of the data structure 200 associated to the object in question.
[0020] As shown by the arrow 106 in the diagram in figure 1, the steps 102 and 103 are repeated for each object in the collection.
[0021] In a practical case, during the acquisition step 102, several public data are acquired, in particular data containing non-identifying information about the object, for example a first public data element contains information on the value (real or estimated) of said object, a further public data element includes general information on the typology of said object (e.g. jewels, coins, sculptures, watches, etc.) . However, it is also possible to acquire other public data, i.e. containing non-identifying information on the object in question. For example, it is possible to provide for the acquisition of a public data element containing information on the state of conservation of the object (e.g. brand new, splendid, good, if the object in question is in particular a coin) .
[0022] All the acquired public data are stored during step 103 in a respective public data field 201, 202. Furthermore, during the acquisition step 102, one or more confidential data are acquired (intended to be stored during step 103 in the respective confidential data fields) , in particular data containing identifying information on the object in question, which are intended to remain normally non-accessible, for example title, author, size, creation date, weight, origin, etc.
[0023] In a particularly preferred embodiment, the acquisition step 102 also provides for the acquisition, as a confidential data element, of a digital image portraying the object, intended to be stored during step 103 in a suitable confidential data field 205 of the data structure 200. In a particularly advantageous embodiment, the acquisition of the digital image of the object is carried out by placing near the object in question a graduated chromatic-dimensional reference instrument, such as to provide a reliable comparison reference of the chromatic and dimensional characteristics of the object. [0024] A particular example of a reference instrument 300 is schematically illustrated in figure 3, in the form of a printed image on a paper medium and bearing one or more graduated scales 303, 304 in length units, and one or more graduated chromatic scales 301, 302. Said printed image preferably includes a graduated scale 303 in centimeters, a graduated scale 304 in inches, a graduated scale 301 with elements 305 which represent respective tonalities in scales of grey and a graduated scale 302 with elements 306 which represent respective reference colors .
[0025] Returning to the drawing in figure 1, upon completion of the acquisition 102 and storage 103 steps, the method 100 optionally includes a processing step 104 which, starting from the acquired and stored public data, is such as to output summary data relating to said starting public data. For example, in the case where, for each object, a public data element representing the value of the object is acquired and a public data element containing information on the general typology of the object is also acquired, the summary data in output from the step 104 could be in the form of partial total values calculated for each type of object. Alternatively, the processing stage 104 could simply include an operation to make an electronic copy of the public data, or to print said data, for the purposes which will be illustrated hereunder. [0026] The method 100 further comprises a step 105 for cryptographic encryption, during which at least the confidential data acquired and stored during the preceding steps are processed to be encrypted by means of an encryption key. For example, the encryption used is of the 128 bit type. [0027] In a particularly advantageous embodiment, especially in the case where the acquired and encrypted data are for some reason intended to be made available to third parties, for example for contractual purposes, the method according to the invention performs the encryption step 105, as indicated by the arrow 108, repeatedly in two phases: in a first phase, encryption starting from the so acquired and stored data is performed and, in a second phase, encryption starting from the encrypted data in output from the first phase is performed. Preferably, the first and second phases use a first and second encryption key respectively, intended to be known to people distinct from each other. For example, in the case of negotiations for the sale of a collection of objects, the first encryption key is generated by a password entered by the collection owner and the second encryption key is generated by a password entered by the third party interested in purchasing the collection.
[0028] In the encryption step 105, optionally the public data can also be encrypted together with the confidential data. Optionally, the summary data produced during phase 104, if provided for, can also be encrypted. {0029] As shown in figure 1, the method 100 includes a step 107 for transferring the encrypted data from step 105 to the non-volatile storage medium, for example to an optical disk. In addition, it is possible that during step 107 the public data (whether encrypted or not) or the summary of said data are transferred to the same medium, for example in accordance with the following, non-limiting combinations: • Encrypted confidential data + encrypted public data + copy of public data (unencrypted) ;
• Encrypted confidential data + encrypted public data + summary data of public data (unencrypted) ;
• Encrypted confidential data + summary data of public data (unencrypted) ;
• Encrypted confidential data + public data (unencrypted) ;
• Only encrypted confidential data (if available printed copy of public data or summary data) ; • Encrypted confidential data + encrypted public data (if available printed copy of public data or summary data) .
[0030] On the basis of the above description, it can be seen how the objects of the present invention are fully reached. In particular, the data acquisition method according to the present invention fully satisfies the protection requirements described above with reference to the prior art. To support said statement, two particularly advantageous embodiments for the use of a method according to the invention will be described hereunder.
[0031] In the first case, it is supposed that a collector wishes to catalog for private purposes his collection of objects, e.g. works of art or similar. After acquiring the public and private data by means of a processor using steps 101, 102, 103 of the method 100, if necessary also by the acquisition of digital photos with the dimensional-chromatic reference instrument, the collector creates a CD with the encrypted public and private data and also prints a copy of the public data, or any summary data if present, to be associated to the CD1 for example in the form of a CD cover or a paper file associated to the CD. The printed copy containing the public data can be used by the collector as a source of data directly accessible in the future to the collector himself in order to remind him immediately of the contents of the CD, without running the risk that the encrypted data stored in the CD is disclosed in the case where, for example, accidentally or not, the CD or a copy of it falls into the hands of a third party. Alternatively, or in addition, the public data can be added to the same CD containing the encrypted data, for example making it possible for the collector to identify the content of the CD should the printed copy be lost and without having to decrypt the entire contents of the CD. The cryptographic decryption of the encrypted data of the CD will only be necessary for example when, in the case of theft or loss of one or more objects in the collection, the collector must report the stolen or lost items to the competent authorities. In this case, any digital photos acquired with the chromatic-dimensional reference instrument will be particularly useful for the unequivocal identification of the lost or stolen items. [0032J In a second utilization embodiment, the method 100 is advantageously used for example in calculating the premium and drawing up an insurance contract to cover a collection of works of art or similar, for example of a private collector who wishes to keep the information on his collection as confidential as is compatible with the transparency requirements normally requested when signing an insurance contract .
[0033] In this case, a collector who intends to insure his items will contact an insurance brokerage company which, together with consulting experts linked to the company, will carry out cataloging of the items to be insured using the method according to the invention. [0034] Said cataloging will take place by entering into a processor, for example a portable computer, the public data, such as the personal data of the collector, and a series of information useful for the definition of the risk and necessary for the calculation of the estimate, such as the value (real or estimated) of the works, their state of conservation and whether there are antitheft devices protecting said works. Confidential data will also be entered, for example photographic reproductions of the works and identifying data (e.g. the title) of said works. The confidential data, or at least these, will subsequently be encrypted by means of a double cryptographic encryption with encryption keys generated respectively by a password established by the consultant and a password established by the collector. In the case the contract is effectively drawn up, the collector can leave his password in the custody of a notary. [0035] By using the method according to the invention, three copies of a storage medium will subsequently be created, for example a CD or DVD, containing the encrypted data and, where not provided for, a printed copy of the public data (or preferably a summary of these) and a copy of the unencrypted public data. [0036] The public data, or their summary, will then be available for the calculation of the insurance premium. For example, said calculation can safely be made on-line using a remote server, since transmission of the confidential data to perform said calculation will not be requested. [0037] At the time the company has to issue the policy, it will receive one copy of the storage medium, another will be kept by the collector and the remaining copy will be kept by the insurance brokerage company in special protected premises .
[0038] The company, in order to issue the policy and to be certain that the risk to be undertaken has been assessed correctly, will have access only to the really necessary unencrypted data (public data), for example the insured' s city of residence, where the items are kept, the type of protection in place to safeguard the items, the type of alarms present, if any, the total value to be insured and the state of conservation of the items . [0039] Only if really necessary (e.g. for the definition of a claim) , the confidential data contained in the CD can be decrypted and, in any case, only in the presence of both the brokerage company and the collector. [0040] Naturally, in order to satisfy contingent and specific requirements, a person skilled in the art may apply to the above-described method according to the invention many modifications and variations, all of which, however, are included within the scope of protection of the invention as defined by the following claims .

Claims

1. Method (100) for the acquisition of data regarding a collection of objects by means of an information processing device and to transfer said acquired data to a non-volatile storage medium, the method (100) comprising steps:
- to make available (101) in a memory of said processing device a data area such as to temporarily contain a plurality of data structures (200) , each data structure being associated to a respective object of said collection, each of said data structures comprising at least a first data field (201, 202) and at least a second data field (203, 204, 205) distinct from said first data field; - to acquire (102) , for each object in said collection and by means of said processing device, at least a first and at least a second data element containing information on said object;
- to store (103) , for each object in said collection and by means of said processing device, said first and said second data element respectively in the first (201, 202) and in the second (203, 204, 205) data field of the data structure (200) associated to said object;
- to carry out cryptographic encryption (105, 108) of said second stored data, such as to make cryptographic decryption necessary for subsequent access to said second stored data;
- to transfer (107) said second encrypted data to the non-volatile storage medium.
2. Method (100) according to claim 1, wherein said transfer step (107) also includes an operation to transfer said first data to the storage medium.
3. Method (100) according to any of the previous claims, further including a step (104) for processing said first data in order to create a copy of said first stored data and/or summary data, wherein said encryption step (105, 108) further includes an operation to perform a cryptographic encryption operation of said first data and wherein said transfer step (107) further includes an operation to transfer said first encrypted data to the storage medium.
4. Method (100) according to claims 2 and 3, wherein said transfer stage (107) further includes an operation to transfer said copy of data or said data summary to the storage medium.
5. Method (100) according to any of the previous claims, wherein said at least second data field (203, 204, 205) includes a data field (205) such as to store a digital image of said object .
6. Method (100) according to claim 5, wherein said second data element includes a digital image portraying said object, said image also portraying a dimensional and/or chromatic reference instrument (300) placed alongside the object therein portrayed.
7. Method (100) according to any of the previous claims, wherein said at least second data element includes information such as to identify said object.
8. Method (100) according to any of the previous claims, wherein said first data element includes an estimate of the economic value of the second object.
9. Method (100) according to any of the previous claims, wherein said encryption step (107, 108) is performed repeatedly in two phases, respectively by means of a first and a second encryption key generated by respective passwords intended to be known to people distinct from each other .
10. Method (100) according to any of the previous claims, wherein said storage medium is a removable storage medium which can be associated to said processing device.
11. Method (100) according to any of the previous claims, wherein said storage medium is an optical storage medium.
12. Method (100) according to claim 11, wherein said optical storage medium is of the non-rewritable type.
13. Method (100) according to claim 1 or 3, further including a step to calculate the premium of an insurance policy on the basis of said first data and/or on the basis of said summary data.
14. Computer product including program lines of code which can be directly loaded into the memory of at least one processor and comprising portions of software codes to execute the method (100) according to any of the claims from 1 to 13.
PCT/IT2006/000090 2006-02-20 2006-02-20 Method for the acquisition of data regarding a collection of objects by means of an information processing device WO2007096908A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IT2006/000090 WO2007096908A1 (en) 2006-02-20 2006-02-20 Method for the acquisition of data regarding a collection of objects by means of an information processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IT2006/000090 WO2007096908A1 (en) 2006-02-20 2006-02-20 Method for the acquisition of data regarding a collection of objects by means of an information processing device

Publications (1)

Publication Number Publication Date
WO2007096908A1 true WO2007096908A1 (en) 2007-08-30

Family

ID=37026965

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IT2006/000090 WO2007096908A1 (en) 2006-02-20 2006-02-20 Method for the acquisition of data regarding a collection of objects by means of an information processing device

Country Status (1)

Country Link
WO (1) WO2007096908A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4864616A (en) * 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US5787175A (en) * 1995-10-23 1998-07-28 Novell, Inc. Method and apparatus for collaborative document control
EP1320010A2 (en) * 2001-12-12 2003-06-18 Pervasive Security Systems Inc. Secured data format for access control
US20040190722A1 (en) * 2003-03-31 2004-09-30 Grobman Steven L. Encrypted content recovery

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4864616A (en) * 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US5787175A (en) * 1995-10-23 1998-07-28 Novell, Inc. Method and apparatus for collaborative document control
EP1320010A2 (en) * 2001-12-12 2003-06-18 Pervasive Security Systems Inc. Secured data format for access control
US20040190722A1 (en) * 2003-03-31 2004-09-30 Grobman Steven L. Encrypted content recovery

Similar Documents

Publication Publication Date Title
JP3503773B2 (en) Method and apparatus for securing access to a file
TWI291109B (en) Method and apparatus for storing data records on a database system
JP3503774B2 (en) Method and apparatus for securing access to a file
CN100449560C (en) Computer data security protective method
US9672388B2 (en) Computer recovery or return
EP1282029A2 (en) Method and apparatus for distributing electronic content
JP2002251325A (en) Method and apparatus for enabling software object distribution
JPH07295803A (en) Method and equipment to distribute software object
JPH07295801A (en) Method of distributing software object
WO1995015628A1 (en) Apparatus and method for storing data
JP3762935B1 (en) Information processing apparatus, file management system, and file management program
JP3843405B2 (en) Personal information recording method, personal information recording system and recording medium
JP7128597B1 (en) Biometric authentication device using thermal image
CA2431484A1 (en) System of databases of personal data and a method of governing access to databases of personal data
Gu et al. On the crack-tip blunting model for fatigue crack propagation in ductile materials
Abu Sirhan et al. Digital rights management (DRM) in libraries of public universities in Jordan
JP7245936B2 (en) Authentication device, authentication system, and authentication processing method
WO2007096908A1 (en) Method for the acquisition of data regarding a collection of objects by means of an information processing device
Sansurooah et al. A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011
JP2007058257A (en) Management system and management program
JP2006140944A (en) Information embedding device, method, system and user terminal
US20080307228A1 (en) Wedi: an encryption-based method and system for the identification and protection of printed documents or those being transmitted by electronic means
EP1116110B1 (en) Method of creating an inseparable link between an electronic document and ole objects
CN116383861B (en) Computer security processing system based on user data protection
US20240029057A1 (en) Method and system for hard cryptowallets

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06728438

Country of ref document: EP

Kind code of ref document: A1