18290248. UNTRUSTED DATA COLLECTION COORDINATION FUNCTION simplified abstract (Telefonaktiebolaget LM Ericsson (publ))
Contents
UNTRUSTED DATA COLLECTION COORDINATION FUNCTION
Organization Name
Telefonaktiebolaget LM Ericsson (publ)
Inventor(s)
Ferhat Karakoc of Istanbul (TR)
[[:Category:Stefan H�kansson of Göteborg (SE)|Stefan H�kansson of Göteborg (SE)]][[Category:Stefan H�kansson of Göteborg (SE)]]
Ulf Mattsson of Kungsbacka (SE)
UNTRUSTED DATA COLLECTION COORDINATION FUNCTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18290248 titled 'UNTRUSTED DATA COLLECTION COORDINATION FUNCTION
The abstract of the patent application describes a Data Collection Coordination Function (DCCF) network node that facilitates the secure transfer of data between a data consumer and a data source.
- The DCCF network node receives a request for data from a data consumer.
- It determines a data source for the requested data.
- It verifies the authorization of the data consumer and the DCCF with a network node connected to the data source.
- The DCCF network node receives message containers containing encryption and integrity keys for both the data consumer and the data source.
- It then transmits the message container for the data consumer to the data consumer and the message container for the data source to the data source.
Potential Applications: - Secure data transfer in IoT devices - Data sharing in cloud computing environments - Secure communication in financial transactions
Problems Solved: - Ensuring data security during transfer - Authorizing access to sensitive information - Preventing unauthorized data breaches
Benefits: - Enhanced data security - Efficient data transfer process - Secure communication channels
Commercial Applications: Title: Secure Data Transfer Technology for IoT Devices This technology can be used in various industries such as healthcare, finance, and telecommunications to securely transfer sensitive data between devices and systems.
Questions about the technology: 1. How does the DCCF network node ensure the authorization of the data consumer and the data source? 2. What are the key components of the message container for the data consumer and the data source?
Original Abstract Submitted
A data collection coordination function, DCCF, network node receives (1a) a request for data from a data consumer, determines (2) a data source for the requested data, verifies (3a, 3b) with a network node that the data consumer and the DCCF are authorized by the data source, receives (3b) a message container for the data consumer from the network node, the message container for the data consumer including a data encryption key Kand a data integrity key Ki, and receives (3b) a message container for the data source from the network node, the message container for the data source including the data encryption key Kand the data integrity key Ki. The DCCF network node transmits (4a) the message container for the data consumer to the data consumer and transmits (5) the message container for the data source to the data source.