[go: up one dir, main page]

MY166564A - A system and method for privacy management for internet of things services - Google Patents

A system and method for privacy management for internet of things services

Info

Publication number
MY166564A
MY166564A MYPI2013001491A MYPI2013001491A MY166564A MY 166564 A MY166564 A MY 166564A MY PI2013001491 A MYPI2013001491 A MY PI2013001491A MY PI2013001491 A MYPI2013001491 A MY PI2013001491A MY 166564 A MY166564 A MY 166564A
Authority
MY
Malaysia
Prior art keywords
internet
things
privacy
access
identity
Prior art date
Application number
MYPI2013001491A
Inventor
Ab Manan Jamalul-Lail
Faizal Mubarak Mohd
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2013001491A priority Critical patent/MY166564A/en
Priority to PCT/MY2014/000034 priority patent/WO2014175721A1/en
Publication of MY166564A publication Critical patent/MY166564A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A SYSTEM AND METHOD FOR PRIVACY MANAGEMENT FOR INTERNET OF THINGS (LOT) SERVICES IS PROVIDED BY UTILIZING INFORMATION PRIVACY CONTROL MODULE (IPCM) TO INTEGRATE INTERNET OF THINGS (LOT) DEVICES AND INTERNET OF THINGS (LOT) GATEWAY. GENUINE USERS UTILIZE INTERNET OF THINGS (LOT) SERVICES ANONYMOUSLY FOR PROTECTION OF IDENTITY AND GENUINE USERS HAVE CONTROL OVER PERSONAL PRIVATE DATA THROUGH PRIVACY ACCESS POLICY. THE SYSTEM OF THE PRESENT INVENTION INCLUDES AT LEAST ONE ACCESS CONTROL SERVER (302); AT LEAST ONE INFORMATION PRIVACY CONTROL MODULE (304) WITHIN AT LEAST ONE ACCESS CONTROL SERVER (302); AT LEAST ONE PRIVACY POLICY TABLE (306) WITHIN AT LEAST ONE ACCESS CONTROL SERVER (302); A PLURALITY OF INTERNET OF THINGS GATEWAYS (312); AND A PLURALITY OF INTERNET OF THINGS SENSORS (316). THE AT LEAST ONE INFORMATION PRIVACY CONTROL MODULE (304) PROVIDES ACCESS RIGHTS TO CLIENT FOR CLIENT TO ACCESS THE INTERNET OF THINGS GATEWAY BASED ON USER PRIVACY ACCESS RIGHTS IN CLIENT PRIVACY POLICY TABLE. FURTHER, SECURE CONNECTION IS PROVIDED BY THE INFORMATION PRIVACY CONTROL MODULE FOR CLIENT TO ACCESS TO SELECTED INTERNET OF THINGS GATEWAY AND INTERNET OF THINGS GATEWAY IS INITIATED TO PERFORM CHALLENGE RESPONSE WITH INTERNET OF THINGS SENSORS TO PROVIDE UNCLONABLE IDENTITY. THE UNCLONABLE IDENTITY IS PROVIDED BY THE PHYSICALLY UNCLONABLE FUNCTIONS EMBEDDED WITHIN THE SENSORS TO ELIMINATE WRONG MEASUREMENTS BY EXTRACTING SECRET CRYPTOGRAPHIC KEYS FROM PHYSICAL CHARACTERISTIC OF INTEGRATED CIRCUIT. IN SHORT, FOR TRUST ESTABLISHMENT, INTEGRITY VERIFICATION PROTECTS AGAINST PHISING AND ROOTKITS AND INTERNET OF THINGS SENSORS EMBEDDED WITH PHYSICALLY UNCLONABLE FUNCTIONS PROVIDES UNCLONABLE IDENTITY AND ELIMINATES WRONG MEASUREMENTS. THE MOST ILLUSTRATIVE DRAWING IS
MYPI2013001491A 2013-04-25 2013-04-25 A system and method for privacy management for internet of things services MY166564A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2013001491A MY166564A (en) 2013-04-25 2013-04-25 A system and method for privacy management for internet of things services
PCT/MY2014/000034 WO2014175721A1 (en) 2013-04-25 2014-03-18 A system and method for privacy management for internet of things services

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2013001491A MY166564A (en) 2013-04-25 2013-04-25 A system and method for privacy management for internet of things services

Publications (1)

Publication Number Publication Date
MY166564A true MY166564A (en) 2018-07-16

Family

ID=50729749

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2013001491A MY166564A (en) 2013-04-25 2013-04-25 A system and method for privacy management for internet of things services

Country Status (2)

Country Link
MY (1) MY166564A (en)
WO (1) WO2014175721A1 (en)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9461976B1 (en) * 2015-03-25 2016-10-04 Mcafee, Inc. Goal-driven provisioning in IoT systems
US11172273B2 (en) 2015-08-10 2021-11-09 Delta Energy & Communications, Inc. Transformer monitor, communications and data collection device
WO2017027682A1 (en) 2015-08-11 2017-02-16 Delta Energy & Communications, Inc. Enhanced reality system for visualizing, evaluating, diagnosing, optimizing and servicing smart grids and incorporated components
WO2017041093A1 (en) 2015-09-03 2017-03-09 Delta Energy & Communications, Inc. System and method for determination and remediation of energy diversion in a smart grid network
US9641553B2 (en) 2015-09-25 2017-05-02 Intel Corporation Methods and apparatus to facilitate end-user defined policy management
CA3000206C (en) 2015-10-02 2023-10-17 Delta Energy & Communications, Inc. Supplemental and alternative digital data delivery and receipt mesh network realized through the placement of enhanced transformer mounted monitoring devices
WO2017070646A1 (en) 2015-10-22 2017-04-27 Delta Energy & Communications, Inc. Data transfer facilitation across a distributed mesh network using light and optical based technology
WO2017070648A1 (en) 2015-10-22 2017-04-27 Delta Energy & Communications, Inc. Augmentation, expansion and self-healing of a geographically distributed mesh network using unmanned aerial vehicle technology
DE102015222794A1 (en) * 2015-11-18 2017-05-18 Siemens Aktiengesellschaft Protective device for protecting the privacy of a person
US10044696B2 (en) * 2015-12-22 2018-08-07 Mcafee, Llc Simplified sensor integrity
US10375109B2 (en) * 2015-12-23 2019-08-06 Mcafee, Llc Protecting personally identifiable information from electronic user devices
MX389497B (en) 2016-02-24 2025-03-11 Delta Energy & Communications Inc 802.11S distributed mesh network using transformer module hardware for data capture and transmission
WO2017146727A1 (en) 2016-02-26 2017-08-31 Hewlett Packard Enterprise Development Lp Device privacy protection
CN105635952B (en) * 2016-03-14 2019-04-30 南京邮电大学 A control system in an open environment and its realization method
US10237284B2 (en) 2016-03-31 2019-03-19 International Business Machines Corporation Internet of things security appliance
US10452872B2 (en) 2016-05-26 2019-10-22 Raytheon Company Detection system for detecting changes to circuitry and method of using the same
US10445531B2 (en) * 2016-05-26 2019-10-15 Raytheon Company Authentication system and method
US11256828B1 (en) 2016-07-05 2022-02-22 Wells Fargo Bank, N.A. Method and apparatus for controlling IoT devices by agent device
US10652633B2 (en) 2016-08-15 2020-05-12 Delta Energy & Communications, Inc. Integrated solutions of Internet of Things and smart grid network pertaining to communication, data and asset serialization, and data modeling algorithms
US10404569B2 (en) 2016-08-22 2019-09-03 General Electric Company Internet of things associate
US10325112B2 (en) 2016-12-29 2019-06-18 T-Mobile Usa, Inc. Privacy breach detection
US10395017B2 (en) 2017-02-01 2019-08-27 International Business Machines Corporation Selectively redacting digital footprint information in order to improve computer data security
CN112152827A (en) * 2019-06-27 2020-12-29 北京微云智联科技有限公司 Management method and device of Internet of things equipment, gateway and readable storage medium
CN111209558B (en) * 2019-12-26 2022-05-13 曙光网络科技有限公司 Internet of things equipment identity authentication method and system based on block chain
CN111614621B (en) * 2020-04-20 2022-09-06 深圳奇迹智慧网络有限公司 Internet of things communication method and system
CN111541780B (en) * 2020-07-07 2020-12-08 德能森智能科技(成都)有限公司 An intelligent gateway based on cloud platform
WO2023178691A1 (en) * 2022-03-25 2023-09-28 Oppo广东移动通信有限公司 Security implementation method and apparatus, device and network element
CN114500103A (en) * 2022-03-31 2022-05-13 泰山学院 A kind of Internet of things privacy data segmentation encryption method and blockchain system
CN115065703B (en) * 2022-06-17 2024-07-16 京东方科技集团股份有限公司 Internet of things system, authentication and communication method thereof and related equipment
CN118575497A (en) * 2022-12-29 2024-08-30 北京小米移动软件有限公司 Wireless perception communication method, device, equipment and storage medium
CN116669018B (en) * 2023-07-28 2023-10-13 陕西通信规划设计研究院有限公司 Data processing method and device based on Internet of things communication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7401233B2 (en) 2003-06-24 2008-07-15 International Business Machines Corporation Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing
US8458489B2 (en) * 2010-03-25 2013-06-04 Empire Technology Development Llc Differential uncloneable variability-based cryptography
KR20120071722A (en) * 2010-12-23 2012-07-03 한국전자통신연구원 Application field communication method and system
US20120222083A1 (en) 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy

Also Published As

Publication number Publication date
WO2014175721A1 (en) 2014-10-30

Similar Documents

Publication Publication Date Title
MY166564A (en) A system and method for privacy management for internet of things services
Liang et al. Towards decentralized accountability and self-sovereignty in healthcare systems
Zubaydi et al. Security of mobile health (mHealth) systems
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
Odelu et al. An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
MX2015015140A (en) User authentication.
WO2014151730A3 (en) Identity escrow management for minimal disclosure credentials
CN112422500A (en) Cross-platform data transmission method and device, storage medium, and electronic device
Chaudhari et al. A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)
JP2017530636A (en) Authentication stick
Kapil et al. Securing big healthcare data using attribute and honey-based encryption in cloud environment
Mandlekar et al. Survey on fog computing mitigating data theft attacks in cloud
Raggett Tackling data security and privacy challenges for the Internet of Things
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Wagner The hard truth about hardware in cyber-security: it's more important
Edwards Ending identity theft and cyber crime
Greco et al. A forensic framework for screen capture validation in legal contexts
CN109219814A (en) System and method for access control of collecting evidence
Kamarudin et al. IBE_Trust Authentication for e-health mobile monitoring system
Liu et al. On the security of a dynamic identity‐based remote user authentication scheme with verifiable password update
MY163655A (en) Electronic ticket booking with improved privacy
TW201612786A (en) Encrypted authentication method of mobile device with signature gesture verification
Nugroho et al. Pseudonym-based privacy protection for steppy application
Sani Implementing Effective Protocols and Techniques for Data Privacy in Wireless Sensor Networks within Healthcare
Jain et al. Trending security mechanism in cloud computing