MY166564A - A system and method for privacy management for internet of things services - Google Patents
A system and method for privacy management for internet of things servicesInfo
- Publication number
- MY166564A MY166564A MYPI2013001491A MYPI2013001491A MY166564A MY 166564 A MY166564 A MY 166564A MY PI2013001491 A MYPI2013001491 A MY PI2013001491A MY PI2013001491 A MYPI2013001491 A MY PI2013001491A MY 166564 A MY166564 A MY 166564A
- Authority
- MY
- Malaysia
- Prior art keywords
- internet
- things
- privacy
- access
- identity
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 2
- 238000005259 measurement Methods 0.000 abstract 2
- 238000012795 verification Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A SYSTEM AND METHOD FOR PRIVACY MANAGEMENT FOR INTERNET OF THINGS (LOT) SERVICES IS PROVIDED BY UTILIZING INFORMATION PRIVACY CONTROL MODULE (IPCM) TO INTEGRATE INTERNET OF THINGS (LOT) DEVICES AND INTERNET OF THINGS (LOT) GATEWAY. GENUINE USERS UTILIZE INTERNET OF THINGS (LOT) SERVICES ANONYMOUSLY FOR PROTECTION OF IDENTITY AND GENUINE USERS HAVE CONTROL OVER PERSONAL PRIVATE DATA THROUGH PRIVACY ACCESS POLICY. THE SYSTEM OF THE PRESENT INVENTION INCLUDES AT LEAST ONE ACCESS CONTROL SERVER (302); AT LEAST ONE INFORMATION PRIVACY CONTROL MODULE (304) WITHIN AT LEAST ONE ACCESS CONTROL SERVER (302); AT LEAST ONE PRIVACY POLICY TABLE (306) WITHIN AT LEAST ONE ACCESS CONTROL SERVER (302); A PLURALITY OF INTERNET OF THINGS GATEWAYS (312); AND A PLURALITY OF INTERNET OF THINGS SENSORS (316). THE AT LEAST ONE INFORMATION PRIVACY CONTROL MODULE (304) PROVIDES ACCESS RIGHTS TO CLIENT FOR CLIENT TO ACCESS THE INTERNET OF THINGS GATEWAY BASED ON USER PRIVACY ACCESS RIGHTS IN CLIENT PRIVACY POLICY TABLE. FURTHER, SECURE CONNECTION IS PROVIDED BY THE INFORMATION PRIVACY CONTROL MODULE FOR CLIENT TO ACCESS TO SELECTED INTERNET OF THINGS GATEWAY AND INTERNET OF THINGS GATEWAY IS INITIATED TO PERFORM CHALLENGE RESPONSE WITH INTERNET OF THINGS SENSORS TO PROVIDE UNCLONABLE IDENTITY. THE UNCLONABLE IDENTITY IS PROVIDED BY THE PHYSICALLY UNCLONABLE FUNCTIONS EMBEDDED WITHIN THE SENSORS TO ELIMINATE WRONG MEASUREMENTS BY EXTRACTING SECRET CRYPTOGRAPHIC KEYS FROM PHYSICAL CHARACTERISTIC OF INTEGRATED CIRCUIT. IN SHORT, FOR TRUST ESTABLISHMENT, INTEGRITY VERIFICATION PROTECTS AGAINST PHISING AND ROOTKITS AND INTERNET OF THINGS SENSORS EMBEDDED WITH PHYSICALLY UNCLONABLE FUNCTIONS PROVIDES UNCLONABLE IDENTITY AND ELIMINATES WRONG MEASUREMENTS. THE MOST ILLUSTRATIVE DRAWING IS
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2013001491A MY166564A (en) | 2013-04-25 | 2013-04-25 | A system and method for privacy management for internet of things services |
| PCT/MY2014/000034 WO2014175721A1 (en) | 2013-04-25 | 2014-03-18 | A system and method for privacy management for internet of things services |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2013001491A MY166564A (en) | 2013-04-25 | 2013-04-25 | A system and method for privacy management for internet of things services |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY166564A true MY166564A (en) | 2018-07-16 |
Family
ID=50729749
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2013001491A MY166564A (en) | 2013-04-25 | 2013-04-25 | A system and method for privacy management for internet of things services |
Country Status (2)
| Country | Link |
|---|---|
| MY (1) | MY166564A (en) |
| WO (1) | WO2014175721A1 (en) |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9461976B1 (en) * | 2015-03-25 | 2016-10-04 | Mcafee, Inc. | Goal-driven provisioning in IoT systems |
| US11172273B2 (en) | 2015-08-10 | 2021-11-09 | Delta Energy & Communications, Inc. | Transformer monitor, communications and data collection device |
| WO2017027682A1 (en) | 2015-08-11 | 2017-02-16 | Delta Energy & Communications, Inc. | Enhanced reality system for visualizing, evaluating, diagnosing, optimizing and servicing smart grids and incorporated components |
| WO2017041093A1 (en) | 2015-09-03 | 2017-03-09 | Delta Energy & Communications, Inc. | System and method for determination and remediation of energy diversion in a smart grid network |
| US9641553B2 (en) | 2015-09-25 | 2017-05-02 | Intel Corporation | Methods and apparatus to facilitate end-user defined policy management |
| CA3000206C (en) | 2015-10-02 | 2023-10-17 | Delta Energy & Communications, Inc. | Supplemental and alternative digital data delivery and receipt mesh network realized through the placement of enhanced transformer mounted monitoring devices |
| WO2017070646A1 (en) | 2015-10-22 | 2017-04-27 | Delta Energy & Communications, Inc. | Data transfer facilitation across a distributed mesh network using light and optical based technology |
| WO2017070648A1 (en) | 2015-10-22 | 2017-04-27 | Delta Energy & Communications, Inc. | Augmentation, expansion and self-healing of a geographically distributed mesh network using unmanned aerial vehicle technology |
| DE102015222794A1 (en) * | 2015-11-18 | 2017-05-18 | Siemens Aktiengesellschaft | Protective device for protecting the privacy of a person |
| US10044696B2 (en) * | 2015-12-22 | 2018-08-07 | Mcafee, Llc | Simplified sensor integrity |
| US10375109B2 (en) * | 2015-12-23 | 2019-08-06 | Mcafee, Llc | Protecting personally identifiable information from electronic user devices |
| MX389497B (en) | 2016-02-24 | 2025-03-11 | Delta Energy & Communications Inc | 802.11S distributed mesh network using transformer module hardware for data capture and transmission |
| WO2017146727A1 (en) | 2016-02-26 | 2017-08-31 | Hewlett Packard Enterprise Development Lp | Device privacy protection |
| CN105635952B (en) * | 2016-03-14 | 2019-04-30 | 南京邮电大学 | A control system in an open environment and its realization method |
| US10237284B2 (en) | 2016-03-31 | 2019-03-19 | International Business Machines Corporation | Internet of things security appliance |
| US10452872B2 (en) | 2016-05-26 | 2019-10-22 | Raytheon Company | Detection system for detecting changes to circuitry and method of using the same |
| US10445531B2 (en) * | 2016-05-26 | 2019-10-15 | Raytheon Company | Authentication system and method |
| US11256828B1 (en) | 2016-07-05 | 2022-02-22 | Wells Fargo Bank, N.A. | Method and apparatus for controlling IoT devices by agent device |
| US10652633B2 (en) | 2016-08-15 | 2020-05-12 | Delta Energy & Communications, Inc. | Integrated solutions of Internet of Things and smart grid network pertaining to communication, data and asset serialization, and data modeling algorithms |
| US10404569B2 (en) | 2016-08-22 | 2019-09-03 | General Electric Company | Internet of things associate |
| US10325112B2 (en) | 2016-12-29 | 2019-06-18 | T-Mobile Usa, Inc. | Privacy breach detection |
| US10395017B2 (en) | 2017-02-01 | 2019-08-27 | International Business Machines Corporation | Selectively redacting digital footprint information in order to improve computer data security |
| CN112152827A (en) * | 2019-06-27 | 2020-12-29 | 北京微云智联科技有限公司 | Management method and device of Internet of things equipment, gateway and readable storage medium |
| CN111209558B (en) * | 2019-12-26 | 2022-05-13 | 曙光网络科技有限公司 | Internet of things equipment identity authentication method and system based on block chain |
| CN111614621B (en) * | 2020-04-20 | 2022-09-06 | 深圳奇迹智慧网络有限公司 | Internet of things communication method and system |
| CN111541780B (en) * | 2020-07-07 | 2020-12-08 | 德能森智能科技(成都)有限公司 | An intelligent gateway based on cloud platform |
| WO2023178691A1 (en) * | 2022-03-25 | 2023-09-28 | Oppo广东移动通信有限公司 | Security implementation method and apparatus, device and network element |
| CN114500103A (en) * | 2022-03-31 | 2022-05-13 | 泰山学院 | A kind of Internet of things privacy data segmentation encryption method and blockchain system |
| CN115065703B (en) * | 2022-06-17 | 2024-07-16 | 京东方科技集团股份有限公司 | Internet of things system, authentication and communication method thereof and related equipment |
| CN118575497A (en) * | 2022-12-29 | 2024-08-30 | 北京小米移动软件有限公司 | Wireless perception communication method, device, equipment and storage medium |
| CN116669018B (en) * | 2023-07-28 | 2023-10-13 | 陕西通信规划设计研究院有限公司 | Data processing method and device based on Internet of things communication |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7401233B2 (en) | 2003-06-24 | 2008-07-15 | International Business Machines Corporation | Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing |
| US8458489B2 (en) * | 2010-03-25 | 2013-06-04 | Empire Technology Development Llc | Differential uncloneable variability-based cryptography |
| KR20120071722A (en) * | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | Application field communication method and system |
| US20120222083A1 (en) | 2011-02-28 | 2012-08-30 | Nokia Corporation | Method and apparatus for enforcing data privacy |
-
2013
- 2013-04-25 MY MYPI2013001491A patent/MY166564A/en unknown
-
2014
- 2014-03-18 WO PCT/MY2014/000034 patent/WO2014175721A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2014175721A1 (en) | 2014-10-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MY166564A (en) | A system and method for privacy management for internet of things services | |
| Liang et al. | Towards decentralized accountability and self-sovereignty in healthcare systems | |
| Zubaydi et al. | Security of mobile health (mHealth) systems | |
| GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
| Odelu et al. | An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card | |
| MX2015015140A (en) | User authentication. | |
| WO2014151730A3 (en) | Identity escrow management for minimal disclosure credentials | |
| CN112422500A (en) | Cross-platform data transmission method and device, storage medium, and electronic device | |
| Chaudhari et al. | A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT) | |
| JP2017530636A (en) | Authentication stick | |
| Kapil et al. | Securing big healthcare data using attribute and honey-based encryption in cloud environment | |
| Mandlekar et al. | Survey on fog computing mitigating data theft attacks in cloud | |
| Raggett | Tackling data security and privacy challenges for the Internet of Things | |
| Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
| Wagner | The hard truth about hardware in cyber-security: it's more important | |
| Edwards | Ending identity theft and cyber crime | |
| Greco et al. | A forensic framework for screen capture validation in legal contexts | |
| CN109219814A (en) | System and method for access control of collecting evidence | |
| Kamarudin et al. | IBE_Trust Authentication for e-health mobile monitoring system | |
| Liu et al. | On the security of a dynamic identity‐based remote user authentication scheme with verifiable password update | |
| MY163655A (en) | Electronic ticket booking with improved privacy | |
| TW201612786A (en) | Encrypted authentication method of mobile device with signature gesture verification | |
| Nugroho et al. | Pseudonym-based privacy protection for steppy application | |
| Sani | Implementing Effective Protocols and Techniques for Data Privacy in Wireless Sensor Networks within Healthcare | |
| Jain et al. | Trending security mechanism in cloud computing |