Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Means for content security at the service level

A technology of content and public service entities, applied in the direction of security devices, machine-to-machine/machine-type communication services, electrical components, etc., can solve problems such as limitations

Active Publication Date: 2021-02-02
CONVIDA WIRELESS LLC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] As mentioned above, for example, existing approaches to security in oneM2M networks are limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Means for content security at the service level
  • Means for content security at the service level
  • Means for content security at the service level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] As mentioned above, existing approaches to security in M2M networks are limited. For example, in oneM2M content may only be protected when "transmitted" between two "trusted" entities by means of a transport layer protocol (eg TLS / DTLS). Therefore, content is not protected while it is hosted at an entity (at rest). The implication is that content (object) protection, if implemented at all, must be done at the application layer. It should be recognized here that there are issues associated with applying content protection methods. For example, the application does not provide a unified mechanism for application content protection. Also, the service layer resources themselves are not protected. Also, if there are application layer protections, they may only provide actual application data protection, not the resources associated with the service layer (SL). It is further recognized herein that a separate application layer protocol for protecting content must be implem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Existing approaches to security in networks such as the oneM2M network are limited. For example, content may only be protected if it is transmitted between mutually trusted entities. Here, the integrity and confidentiality of the content in the M2M network is protected. Such content may be "stationary" such that the content is stored at the hosting node. Only authorized entities can store and retrieve data stored at the hosting node, and the data can be protected from a confidentiality and integrity perspective.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of U.S. Provisional Patent Application No. 62 / 188,141, filed July 2, 2015, and U.S. Provisional Patent Application No. 62 / 248,808, filed October 30, 2015, the entire contents of said U.S. Provisional Patent Application Incorporated herein by reference. Background technique [0003] A typical communication session typically involves a persistent interactive exchange of information between two or more communicating entities (eg, devices, applications, etc.), which may also be referred to as nodes. In the current RESTful approach, there is no real persistent connection. Instead, communication is performed through on-demand request and response messages. For example, a communication session may be established at a certain point in time and may be torn down at a later point in time based on various circumstances (eg, after a session times out or when one of the entities decides to termina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/08H04W12/06
CPCH04L63/101H04W4/70H04L63/0435H04L63/061H04L63/0823H04W12/086H04W12/069H04W12/06H04W12/08H04L63/0876H04L67/51
Inventor 维诺德·库马尔·乔伊约根德拉·C·沙阿黛尔·N·希德迈克尔·F·斯塔西尼克沙米姆·阿克巴尔·拉赫曼李庆光陈卓威廉·罗伯特·弗林四世
Owner CONVIDA WIRELESS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products