Heins, 2023 - Google Patents
Trusted Cellular IoT Devices: Design Ingredients and ConceptsHeins, 2023
- Document ID
- 14745539524690612016
- Author
- Heins K
- Publication year
External Links
Snippet
On this planet, everybody understands the value of trust. In fact, trust is a major prerequisite for every successful cooperation and provides mutual confidence that expectations will be met by the other party. Trust might be based on prior experience or evidence, or it is just a …
- 238000013461 design 0 title abstract description 59
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jurcut et al. | Security considerations for Internet of Things: A survey | |
Sookhak et al. | Security and privacy of smart cities: a survey, research issues and challenges | |
Kalogridis et al. | Toward unified security and privacy protection for smart meter networks | |
Trèek | An integral framework for information systems security management | |
CN109792386A (en) | Method and apparatus for trust computing | |
Salim | Cyber safety: A systems thinking and systems theory approach to managing cyber security risks | |
US7194759B1 (en) | Used trusted co-servers to enhance security of web interaction | |
CN107209838A (en) | Portable security device | |
Sujatha et al. | Cyber Security Applications for Industry 4.0 | |
Valadares et al. | Formal verification of a trusted execution environment-based architecture for IoT applications | |
Rani et al. | A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records | |
Heins | Trusted Cellular IoT Devices: Design Ingredients and Concepts | |
Hernández-Ardieta et al. | Enhancing the reliability of digital signatures as non-repudiation evidence under a holistic threat model | |
Quint et al. | Secure authentication in CPS-based production environments | |
Zafir et al. | Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques | |
Rull Aixa | Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach | |
Dhondge | Lifecycle IoT Security for Engineers | |
Wu et al. | Proof-carrying sensing: towards real-world authentication in cyber-physical systems | |
Heins | Challenges and Objectives | |
Mihailescu et al. | Cryptanalysis Attacks and Techniques | |
Flikkema et al. | When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants | |
Sun et al. | On the Development of a Protection Profile Module for Encryption Key Management Components | |
Rodriguez et al. | Dynamic Security and Privacy Seal Model Analysis | |
Farao | Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance | |
Camek et al. | Providing security to a smart grid prosumer system based on a service oriented architecture in an office environment |