Alternatively, in one or more embodiments, the access rights associated with the second user profile that authorize the reading of data if these data were previously written by the user of the device can be managed on the basis of an identification (possibly combined with an authentication) of the user having the second profile, such identification and where applicable authentication possibly, depending on the embodiment, being implemented for the configuration of the second profile similarly to what is described in the present description for the identification and authentication of a first-profile user. It is possible to implement this management of second-profile users using an identification, possibly combined with an authentication, only for certain second-profile users. This has the advantage of allowing second-profile users to access data that they have previously written in the memory of the storage device, independently of the concept of a utilization session as explained above.
In these embodiments, a second-profile user who identifies himself or herself when using the device, can have read access to the data that he or she has written in the memory of the device. The control of the device can thus be configured to manage associations between a second-profile user identifier and data written in memory by this user, associations that can be stored in memory, for example in the memory of the storage device.
In one or more embodiments, the access rights associated with the second user profile prohibit the reading of data written in memory, independently of the second-profile user who wrote these data. This configuration of the access rights associated with the second user profile allows simplified management of the access rights associated with the second profile, while reinforcing the confidentiality protection for the data written in the memory of the device.