Content security at service layer

A content and security technology, applied in the field of content security at the service layer, which can solve problems such as restrictions

Active Publication Date: 2018-03-27
CONVIDA WIRELESS LLC
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] As mentioned above, for example, existing approaches to security in oneM2M networks are limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content security at service layer
  • Content security at service layer
  • Content security at service layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] As mentioned above, existing approaches to security in M2M networks are limited. For example, in oneM2M content may only be protected when "transmitted" between two "trusted" entities by means of a transport layer protocol (eg TLS / DTLS). Therefore, content is not protected while it is hosted at an entity (at rest). The implication is that content (object) protection, if implemented at all, must be done at the application layer. It should be recognized here that there are issues associated with applying content protection methods. For example, the application does not provide a unified mechanism for application content protection. Also, the service layer resources themselves are not protected. Also, if there are application layer protections, they may only provide actual application data protection, not the resources associated with the service layer (SL). It is further recognized herein that a separate application layer protocol for protecting content must be implem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Existing approaches to security within network, for instance one M2M networks, are limited. For example, content might only be protected while the content is in transit between entities that trust each other. Here, the integrity and the confidentiality of content in an M2M network are protected. Such content may be "at rest," such that the content is stored at a hosting node. Only authorized entities may store and retrieve the data that is stored at the hosting node, and the data may be protected from a confidentiality perspective and an integrity perspective.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of U.S. Provisional Patent Application No. 62 / 188,141, filed July 2, 2015, and U.S. Provisional Patent Application No. 62 / 248,808, filed October 30, 2015, the entire contents of said U.S. Provisional Patent Application Incorporated herein by reference. Background technique [0003] A typical communication session typically involves a persistent interactive exchange of information between two or more communicating entities (eg, devices, applications, etc.), which may also be referred to as nodes. In the current RESTful approach, there is no real persistent connection. Instead, communication is performed through on-demand request and response messages. For example, a communication session may be established at a certain point in time and may be torn down at a later point in time based on various circumstances (eg, after a session times out or when one of the entities decides to termina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/08H04W12/06
CPCH04L63/101H04W4/70H04L63/0435H04L63/061H04L63/0823H04W12/086H04W12/069H04W12/06H04W12/08H04L63/0876H04L67/51
Inventor 维诺德·库马尔·乔伊约根德拉·C·沙阿黛尔·N·希德迈克尔·F·斯塔西尼克沙米姆·阿克巴尔·拉赫曼李庆光陈卓威廉·罗伯特·弗林四世
Owner CONVIDA WIRELESS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products