18290248. UNTRUSTED DATA COLLECTION COORDINATION FUNCTION simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

UNTRUSTED DATA COLLECTION COORDINATION FUNCTION

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Pinar Comak of Ankara (TR)

Christine Jost of Dalby (SE)

Ferhat Karakoc of Istanbul (TR)

[[:Category:Stefan H�kansson of Göteborg (SE)|Stefan H�kansson of Göteborg (SE)]][[Category:Stefan H�kansson of Göteborg (SE)]]

Ulf Mattsson of Kungsbacka (SE)

Zhang Fu of Stockholm (SE)

UNTRUSTED DATA COLLECTION COORDINATION FUNCTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18290248 titled 'UNTRUSTED DATA COLLECTION COORDINATION FUNCTION

The abstract of the patent application describes a Data Collection Coordination Function (DCCF) network node that facilitates the secure transfer of data between a data consumer and a data source.

  • The DCCF network node receives a request for data from a data consumer.
  • It determines a data source for the requested data.
  • It verifies the authorization of the data consumer and the DCCF with a network node connected to the data source.
  • The DCCF network node receives message containers containing encryption and integrity keys for both the data consumer and the data source.
  • It then transmits the message container for the data consumer to the data consumer and the message container for the data source to the data source.

Potential Applications: - Secure data transfer in IoT devices - Data sharing in cloud computing environments - Secure communication in financial transactions

Problems Solved: - Ensuring data security during transfer - Authorizing access to sensitive information - Preventing unauthorized data breaches

Benefits: - Enhanced data security - Efficient data transfer process - Secure communication channels

Commercial Applications: Title: Secure Data Transfer Technology for IoT Devices This technology can be used in various industries such as healthcare, finance, and telecommunications to securely transfer sensitive data between devices and systems.

Questions about the technology: 1. How does the DCCF network node ensure the authorization of the data consumer and the data source? 2. What are the key components of the message container for the data consumer and the data source?


Original Abstract Submitted

A data collection coordination function, DCCF, network node receives (1a) a request for data from a data consumer, determines (2) a data source for the requested data, verifies (3a, 3b) with a network node that the data consumer and the DCCF are authorized by the data source, receives (3b) a message container for the data consumer from the network node, the message container for the data consumer including a data encryption key Kand a data integrity key Ki, and receives (3b) a message container for the data source from the network node, the message container for the data source including the data encryption key Kand the data integrity key Ki. The DCCF network node transmits (4a) the message container for the data consumer to the data consumer and transmits (5) the message container for the data source to the data source.