EP4252405A1 - Method for communication between a third-party component on a user device and a service component in the cloud, and network arrangement for implementing the method - Google Patents
Method for communication between a third-party component on a user device and a service component in the cloud, and network arrangement for implementing the methodInfo
- Publication number
- EP4252405A1 EP4252405A1 EP21799023.3A EP21799023A EP4252405A1 EP 4252405 A1 EP4252405 A1 EP 4252405A1 EP 21799023 A EP21799023 A EP 21799023A EP 4252405 A1 EP4252405 A1 EP 4252405A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- component
- data
- cloud
- party
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000006854 communication Effects 0.000 title claims abstract description 21
- 238000004891 communication Methods 0.000 title claims abstract description 21
- 238000007726 management method Methods 0.000 claims description 50
- 238000004590 computer program Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000009434 installation Methods 0.000 claims description 4
- 238000003860 storage Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 description 62
- 238000009826 distribution Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000012800 visualization Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004931 aggregating effect Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Definitions
- the invention relates to a method having the features of claim 1 and a network arrangement having the features of claim 11, a computer program having the features of claim 12 and a machine-readable storage medium.
- cloud solutions are often preferred, with the apps being distributed via a provider in the cloud, such as Google Play Store. After distribution, the apps are largely independent of the provider and use the communication partners provided by the app.
- the publication DE 10 2018 219 067 A1 which is probably the closest prior art, describes a system and a method for the local composition of a data page with personal user data for a number of services that the user accesses and which is on a number of servers to be provided.
- the invention relates to a method for communication between a third-party component on a user device and a service component in the cloud.
- a user device is understood to mean, in particular, a UE—user equipment.
- the user device can be designed in particular as a mobile phone, tablet, computer, but also as a vehicle, production machine, work machine, robot, etc.
- the user device is thus understood to mean in particular all end devices that enable the third-party component to run.
- the third-party component is understood to be application software, an application program, software, a computer program and/or an app that can run on the user device.
- Cloud means in particular an IT infrastructure that is made available, for example, via the Internet.
- the cloud is designed as a computer network.
- the cloud can provide various service models, in particular Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) and/or Function as a Service (FaaS).
- IaaS Infrastructure as a Service
- PaaS Platform as a Service
- SaaS Software as a Service
- FaaS Function as a Service
- At least one service is offered in the cloud by a service component.
- the service may constitute processing.
- the simplest example of processing is a forwarding of data.
- different types of cloud processing components are provided as service components that implement the at least one service. This includes, for example, cloud processing services for visualization, cloud processing services for forwarding or cloud processing services for aggregating data.
- Under the service component is an application software, an application program, a software, a Computer program and/or an app understood, which can run in the cloud.
- the method enables communication, in particular data exchange, between the third-party component on the user device and the service component in the cloud.
- the communication can only be unidirectional, in particular from the third-party component to the service component, or bidirectional, so that data is sent from the third-party component to the service component and data from the service component to the third-party component.
- the data can have any form and in particular also include images, videos, acoustic information, messages, in particular control messages.
- the service component is provided with a data ID, which is signed together with the service component.
- the signing takes place via a certificate.
- the certificate is designed in particular as a cryptographic and/or digital certificate which has a public part and a private part, in particular a public key and a private key.
- Signing with the certificate takes place in particular via the private part of the certificate and can be checked via the public part of the certificate.
- the public part is deposited with a certification authority.
- the third party component provides component data.
- the third-party component can record input signals and/or input data via the user device, process them and provide them as component data. It is envisaged that the component data will be tagged with the data ID to create tagged component data.
- the component data is linked to the data ID in terms of data technology.
- the identified component data, including the component data and the data ID, are transmitted to the cloud, in particular via an endpoint.
- the identified component data will be associated with the service component with the data ID in the cloud.
- the identified component data is forwarded to the service component with the data ID residing in the identified component data in the cloud.
- the network arrangement is able to process any data without having to pay attention to compatible or standardized data types.
- a particular advantage of the invention is that the data can be processed independently of the compatibility with other components or standards.
- the relationship between user device and cloud processing can be designed differently. These can be a simple redirect. But there are also z. B. compression / decompression or analysis and visualization conceivable.
- the service component in the cloud as a service can also be, for example, a visualization of specific app data and/or component data as part of a data dashboard that can display data from multiple third-party components from the same user device or from multiple user devices.
- the third-party component is signed with a component ID.
- the signing takes place via the or another certificate.
- the certificate is designed in particular as a cryptographic and/or digital certificate which has a public part and a private part, in particular a public key and a private key.
- the user device has a device management component.
- the device management component can also be referred to as a device manager or as a device manager. It is envisaged that the device management component will communicate with a device management server in the cloud.
- the device management server can also be referred to as a device server. Provision is preferably made for the identified component data to be routed to the service component in the cloud via the device management component and the device management server.
- the data transmission of the marked component data takes place via the
- the device management server provides an endpoint, with the device management component in particular communicating exclusively with the endpoint.
- This connection is particularly preferably designed as a secured connection.
- this connection is designed as a VPN connection.
- This refinement means that only a single, particularly secure connection to the device management server in the cloud must be maintained, via which the component data can be transmitted.
- This connection allows to control the flow of component data and other data, especially in terms of throughput, overhead and latency. This is particularly beneficial in a corporate environment where many uncontrolled connections could lead to IT security concerns.
- the third-party component now does not transfer the component data directly to the cloud, but via the device management component.
- the device management component is able to control the component data, especially with regard to data volume and latency.
- the device management component can handle multiple files at the expense of latency bundle to reduce overhead.
- this check can also take place as a function of the license purchased for the user device, so that a decision is made in favor of the reduced overhead if a basic license is present, while a decision is made in favor of a lower latency if an extended license is present.
- the service component sends control messages to the third-party component via the device management server and the device management component.
- the same, preferably secure, connection is used as for the transmission of the marked component data.
- the third-party component is transferred to the user device via the device management server and the device management component for the purpose of installation and/or update.
- the third-party component is particularly preferably transmitted together with the data ID.
- the identified component data, control messages and the third-party component for installation and/or updating are thus transmitted via the same, in particular secure, connection.
- This architecture ensures that the transmission of data can be protected in a simple manner with regard to IT security.
- the use of the data ID ensures that the component data is assigned to the respective service component, so that IT security is also increased to the effect that the component data and other data are routed to the correct recipient.
- the service component and the third-party component are signed with the same certificate and/or with a certificate from the same developer.
- the data ID preferably includes the component ID as information, so that there is a strict and therefore secure association between the third-party component, the service component and the component data.
- the service component is signed using a first certificate and the third-party component is signed using a second certificate. It is particularly preferred that the signed service component is signed together with the signed third-party component using a bundle certificate. In this embodiment, the assignment of
- Data ID for the service component can only be done by signing the bundle certificate.
- This architecture of the signatures makes it possible for the third-party component and the service component to be signed by different certificates and for the merging to take place using the bundle certificate. It is also possible that service components that already exist and are possibly signed by a third-party certificate can be included in the method with the bundle certificate.
- the third-party certificate is from another developer.
- Figure 1 shows a first embodiment of the invention of a network arrangement for executing a method for communication in a schematic
- FIG. 2 shows a second exemplary embodiment of the invention of a network arrangement for carrying out a method for communication in a schematic block diagram
- FIG. 3 shows a third exemplary embodiment of the invention of a network arrangement for carrying out a method for communication in a schematic block diagram
- FIG. 4 shows a fourth exemplary embodiment of the invention of a network arrangement for carrying out a method for communication in a schematic block diagram
- FIG. 5 shows a fifth exemplary embodiment of the invention of a network arrangement for carrying out a method for communication in a schematic block diagram
- FIG. 6 shows a sixth exemplary embodiment of the invention of a network arrangement for carrying out a method for communication in a schematic block diagram
- FIG. 7 shows a seventh exemplary embodiment of the invention of a network arrangement for carrying out a method for communication in a schematic block diagram.
- FIG. 1 shows a network arrangement 1 as an exemplary embodiment of the invention in a schematic block diagram.
- the network arrangement 1 has a user device 2 and modules in a cloud 3 .
- the user device 2 is in the form of a terminal device, such as a cell phone, or any other terminal device. It can record input signals 19, such as images, video sequences, sound sequences, sensor readings or also input data via appropriate interfaces.
- the user device 2 has a third-party component 4, the third-party component 4 being designed as a computer program, in particular as an app.
- the third-party component 4 can come from the manufacturer of the operating system of the user device 2 or from another provider.
- the third-party component 4 receives the input signals 19, preferably in digitized form, and converts them into component data 20 as output data from the third-party component 4.
- the user device 2 has a device management component 5, wherein the device management component 5 can also be referred to as a device manager or as a device manager.
- the component data 20 are transferred to the cloud 3 via the device management component 5 via a connection 6 .
- the connection 6 can be designed as a secure connection, in particular as a VPN channel.
- a device management server 7 and a service module 8 as well as a component distribution module 9 are provided as modules in the cloud 3 .
- the modules can be centralized or decentralized in the cloud 3 as software modules and/or hardware modules.
- the service module 8 has a service component 10, the service component 10 being designed as a computer program, in particular as an app.
- the component distribution module 9 is used to distribute the third-party component 4 to the user device 2 and from the service component 10 to the service module 8.
- the third-party component 4 is first delivered to the device management server 7, and the third-party component 4 or an update thereof is sent via the device management server 7 via the connection 6 delivered to the user device 2.
- the user device 2 identifies the component data 20 of the third-party component 4 with the data ID, so that identified component data 21 is generated.
- the identification with the data ID can be performed by the third-party component 4 or, as shown in FIG. 1, by the device management component 5.
- the identified component data 21 is routed via the connection 6 from the device management component 5 to the cloud 3 to the device management server 7 and then to the service module 8 with the service component 10, which has the data ID of the identified component data. What is achieved with this architecture is that the third-party component 4 is distributed and the marked component data is transferred via the same connection 6 .
- identifying the component data with the data ID ensures that the identified component data 21 or the component data 20 in the Cloud 3 is forwarded to the service module 8 with the corresponding service component 10 with the same data ID, so that the assignment of the component data 20 to the service component 10 is deterministically ensured.
- app bundles are known from Android, which are signed bundles of software components from which only a subset has to be installed on a device, this subset resulting from the characteristics of the device on which the software is installed.
- concept of multi-APK is also known from Android, in which several apps are basically available, but only the version of the app that has been optimized by the developer for the corresponding device is installed.
- the third-party components are written by a software developer and then signed using a certificate.
- the secret key is known only to the software developer himself.
- the public part of the certificate is deposited with a service for distributing / selling apps, which can be used to confirm the origin of the software.
- a device now communicates with this distribution service via an endpoint in the cloud, via which the apps are installed on the device (e.g. Google Play Store). Data sent by the app is usually sent via a separate server (e.g. WhatsApp).
- FIG. 1 shows a system that is only partially known from the prior art.
- the device management component 5 on the user device 2 connects it to the device management server 7 in the cloud 3.
- the device management server 7 is connected to a system for distributing and managing third-party components 4, the component distribution module 8.
- a developer can now develop the third-party component 4 for the user device 2 and this Device management component (component distribution module 8) passed in the cloud 3.
- the particularly cryptographic certificate 11 is used, from which the public part of the administration component (component distribution module 8) has been made known in the course of a first-time registration process.
- the owner of the user device 2 can now obtain the third-party component 4 via the cloud 3 and have it installed on the user device 2 .
- the installation is orchestrated via the device management server 7.
- one of a large number of possible variants of the third-party component 4 can be used here.
- each of the third-party components 4 is usually responsible for the communication itself and communicates with its own servers, as can be seen from the large number of available messengers.
- the exemplary embodiments in the figures deal with the user device 2, with third-party components 4 being able to be installed later and which may be used in a secure environment.
- the user device 2 detects and processes input data and/or signals 19 and sends them as component data 20 or 21 to the cloud 3.
- the preferred single connection 6 to the cloud 3 should be used. This enables the communication of the user device 2 to be checked more precisely and simplifies the effort involved in setting up firewall rules.
- One idea is to identify service components 10 in the cloud 3 by the developer, identify the component data 20 generated by the third-party component 4 on the user device 2, and bundle both components using cryptographic signatures S. By identifying the component data with the data -ID for implementation in the marked component data 21, an assignment of the component data 20 in the cloud 3 and an adapted processing by the service component 4 with the same data ID is possible.
- This procedure enables the network arrangement 1 to process any data, without having to rely on compatible or standardized data types must be respected.
- only at least or precisely one single (secured) connection 6 to the cloud 3 (to the device management server 7) must be maintained, via which the transmission of component data is now also possible.
- This connection allows to control the flow of data, especially in terms of throughput, overhead and latency. This is particularly beneficial in a corporate environment where many, uncontrolled connections could lead to concerns about IT security.
- a particular advantage is that the component data 20 can be processed independently of the compatibility with other components or standards, since the component data 20 is assigned to the corresponding, compatible service component 10 .
- the relationship between user device and cloud processing can be designed differently. These can be a simple redirect. But there are also z. B. compression / decompression or analysis and visualization conceivable.
- the service component 10 in the cloud 3 can, for example, also be a visualization of specific component data as part of a data dashboard which can display the data from a number of third-party components 4 .
- the network arrangement 1 is described, in which the user device 2 is to be operated via as few as possible, preferably via a single, connection 6 to the outside world. This enables the communication of user device 2 to be checked more precisely and simplifies the effort involved in setting up firewall rules.
- One or more apps are located on the user device 2 as third-party components 4, which process an input signal and/or signal 19, for example a video signal or a user input. The apps generate output signals in the form of digital data as component data 20.
- the apps now do not give the data 20 directly, but via a device manager as a device management component 5 in the cloud 3.
- the device manager is able to control the data here, specifically with regard to data volume and latency.
- the device manager can bundle multiple data at the cost of latency to reduce overhead.
- this check can also take place depending on the license purchased for the user device, so that if a basic license is available, a decision is made in favor of the reduced overhead, while if there is a basic license an extended license is decided in favor of a lower latency.
- the apps i.e. the third-party component 4 or the device management component 5, mark the component data 20 with the data ID, which is evaluated in the cloud 3 by the receiving body.
- the or another developer now creates a processing component as a service component 10 for the cloud 3, signs it with his certificate 11 and makes it available to the cloud 3.
- This processing component is intended and marked for the processing of a data ID.
- the cloud 3 can now carry out the specific processing for the component data 20 via this data ID, in that the component data 20 is processed using the processing component.
- forwarding by the device management server 7 to the correct processing unit as a service module 8 with the service component 10 in the cloud 3 is made possible by means of the data ID.
- the component data are transferred to a processing instance, which uses the data ID to decide which service component 10 is to be executed for the component data 20.
- These service components 10 are programmed by developers like the apps and are accordingly provided with a cryptographic signature with the data ID. It should be noted that an app on the user device 2 can also generate different component data 20 each with a unique data ID.
- the simplest example of processing by the service component 10 is a simple forwarding of the component data 20, as shown in FIG.
- the component data are forwarded by the service module 8 with the service component 10 with the corresponding data ID to a predeterminable server 14, for example.
- service components 10 and/or service modules 8 are supported, for example cloud processing modules for visualization, cloud processing modules for forwarding or cloud processing modules for aggregation. It is also possible that the cloud processing modules in turn use the device management server 7 to control messages 22 to the Deliver third-party components, as shown in FIG. 3 by way of example.
- the connection 6 is used for the control messages 22, so that only a single connection 6 is still used.
- the control messages are sent by the service component 10 and are marked with the component ID 12 .
- the control messages are sent to the user device 2 via the device management server 7 .
- the component ID 12 can ensure delivery to the desired user device, in particular to the desired third-party component with the same component ID.
- the component ID 12 can mark the control message and thus secure it.
- the data ID is a key element as it links the processing on the user device 2 to the processing in the cloud 3 . It is also possible for the component data 20 to first be stored in a database before processing. This is particularly useful when the cloud processing is a visualization.
- the data ID is preferably a hierarchical structure made up of a basic data type, component ID, specialization and/or version number.
- the base data type allows to choose an appropriate storage in a database.
- the component ID allows assignment to a third-party component 4, the specialization allows the third-party component 4 to distinguish specific data, and the version number finally allows later processing, which is particularly useful when the data is stored in a database.
- the device management component 5 preferably checks the component ID in the data ID (or adds it) to prevent a third-party component 4 from setting a data ID in such a way that unwanted processing is carried out by another cloud processing component, in particular service component 10 , which can lead to security problems.
- the cloud 3 preferably verifies that the service component 10 has been signed by the same developer as the component ID identified by the data ID, which prevents other third-party components 4 component data from being signed by a non competent service component 10 can be processed. (This check can be done once).
- the third-party component 4 and the service component 10 are signed with different certificates 11 S.
- the third-party component 4 can be signed by a first developer and the service component 10 can be signed by a second developer, each with different certificates 11 .
- the signed components 4, 10 are jointly signed using a bundle certificate 15 with the signature S.
- the network arrangement 2 described in the preceding figures uses the same certificate 11 for all components 4 and 10 that belong together.
- the components that belong together are identified via this common certificate 11 .
- a variant is shown in FIG. 4, this implicit association being solved by a further signature as a bundle certificate 15, so that in principle three certificates 11, 11, 15 are used, one each for the individual components 4, 10 and one for the collection of components 4, 10.
- This allows existing certificates and methods to be used for signing the individual components, although typically at least two signatures are identical. In particular, this solves the problem of backwards compatibility.
- the third-party component 4 distributed to the user device 2 behaves identically to the case where there is no cloud processing. This property applies accordingly to cloud processing. It is thus also possible to outsource the cloud processing to third-party components 4 which require certain signatures which the component administration cannot check. For example, if the processing takes place on a "foreign" cloud.
- a local processing node 16 with a processing component 17 can be installed, or intermediate processing, such as compression of the data in the processing component 17, can take place.
- the processing node 16 can be designed in different ways. It can be a physical computing unit, a virtual machine, or just time on a Cloud 3 or Edge Cloud. This device can be installed together with the devices on a site ("on-premise") or made available by a third party, for example in a nearby data center ("off-premise", not shown). It can also be dedicated resources or parts of third-party systems, such as systems for managing the devices.
- a processing ID 18 of the processing component 17 behaves analogously to the data ID in the cloud 3.
- the processing ID 18 is signed by means of the bundle certificate 15.
- the processing component 17 checks analogously for the mechanisms described, the data ID and, if necessary, requests missing processing components from the cloud 3.
- This enables the identification of already (pre-)processed data, so that a hybrid use of the components is possible.
- the developer signs two cloud processing components, the local processing component 17 and the third-party component 4.
- the data IDs of the cloud processing components as service components 10, 10' are designed in such a way that one receives the component data of the third-party component 4 directly (data ID 13A) and one the Component data of the local processing component 16 receives (data ID 13B).
- the processing ID of the local processing component corresponds to the data ID A.
- a particular advantage of using component bundles with a bundle certificate 15 is that systems can be used that require specific certificates, e.g. because the component comes from a third-party manufacturer. Allocation in Cloud 3 is still possible. However, the checks on the IDs of the components are most likely not implemented in the existing system. Therefore, the device management server 7 in the cloud must, if necessary, explicitly link which data is to be processed in which component.
- FIG. 1 shows the basic mechanism.
- a developer creates several different components for different purposes (processing on the device and processing in the cloud) and digitally signs them.
- a data ID which annotates the data sent to the cloud, triggers processing by the corresponding component in the cloud responsible for the data ID.
- FIG. 2 shows the implementation of the application as an example.
- Figure 3 shows the form with bidirectional communication, which enables the cloud processing components Deliver control messages to the device.
- FIG. 4 shows the embodiment with a component bundle. Existing certificates can be used to sign individual components. The collection of components is then signed with another certificate.
- FIG. 5 shows the use of existing cloud processing modules, for example to visualize standard data types.
- Figure 6 shows the use of component bundles for processing on multiple devices.
- FIG. 7 shows the use of component bundles in hybrid use, in which both separate processing on a separate device and collective processing in the cloud is possible.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102020214845.7A DE102020214845A1 (en) | 2020-11-26 | 2020-11-26 | Method for communication between a third-party component on a user device and a service component in the cloud and network arrangement for implementing the method |
PCT/EP2021/079477 WO2022111923A1 (en) | 2020-11-26 | 2021-10-25 | Method for communication between a third-party component on a user device and a service component in the cloud, and network arrangement for implementing the method |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4252405A1 true EP4252405A1 (en) | 2023-10-04 |
Family
ID=78414027
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21799023.3A Withdrawn EP4252405A1 (en) | 2020-11-26 | 2021-10-25 | Method for communication between a third-party component on a user device and a service component in the cloud, and network arrangement for implementing the method |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240022576A1 (en) |
EP (1) | EP4252405A1 (en) |
CN (1) | CN116746134A (en) |
DE (1) | DE102020214845A1 (en) |
WO (1) | WO2022111923A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9613052B2 (en) | 2012-06-05 | 2017-04-04 | International Business Machines Corporation | Establishing trust within a cloud computing system |
US10924554B2 (en) * | 2014-05-05 | 2021-02-16 | Citrix Systems, Inc. | Application customization |
US9935955B2 (en) | 2016-03-28 | 2018-04-03 | Zscaler, Inc. | Systems and methods for cloud based unified service discovery and secure availability |
DE102018219067A1 (en) | 2018-11-08 | 2020-05-14 | Robert Bosch Gmbh | Transparency mechanism for the local composition of personal, distributed stored user data |
-
2020
- 2020-11-26 DE DE102020214845.7A patent/DE102020214845A1/en active Pending
-
2021
- 2021-10-25 EP EP21799023.3A patent/EP4252405A1/en not_active Withdrawn
- 2021-10-25 CN CN202180092078.9A patent/CN116746134A/en active Pending
- 2021-10-25 US US18/254,341 patent/US20240022576A1/en active Pending
- 2021-10-25 WO PCT/EP2021/079477 patent/WO2022111923A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CN116746134A (en) | 2023-09-12 |
WO2022111923A1 (en) | 2022-06-02 |
US20240022576A1 (en) | 2024-01-18 |
DE102020214845A1 (en) | 2022-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102011081804B4 (en) | Method and system for providing device-specific operator data, which are bound to an authentication credential, for an automation device of an automation system | |
WO2010026152A1 (en) | Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system | |
DE112010003638B4 (en) | Public BOT management in private networks | |
DE102014219472A1 (en) | Method for transmitting data, network nodes and network | |
DE102014009495B4 (en) | Method for establishing a communication connection suitable for the transmission of media streams from a first RTC client to a second RTC client | |
DE102018202996A1 (en) | Method for performing a diagnosis | |
DE60313231T2 (en) | Network management system with policy verification | |
EP3058701B1 (en) | Method, management apparatus and device for certificate-based authentication of communication partners in a device | |
EP4327506A1 (en) | Managing keys for secure communication between communication subscribers via a separate communication channel | |
EP1494401A2 (en) | Router and method of activating a deactivated computer | |
EP3080950A1 (en) | Method and system for deterministic auto-configuration of a device | |
EP3105898B1 (en) | Method for communication between secured computer systems as well as computer network infrastructure | |
EP4252405A1 (en) | Method for communication between a third-party component on a user device and a service component in the cloud, and network arrangement for implementing the method | |
EP3376419B1 (en) | System and method for electronically signing a document | |
EP1798620A1 (en) | System and method for remote analysis,remote maintenance and/or remote error recovery of a technical equipment. | |
DE102010052054A1 (en) | Remote maintenance system for devices | |
EP3607437B1 (en) | Method for configuring at least one device of a railway vehicle in a network, computer program and computer-readable storage medium | |
EP1158747A2 (en) | Method for data transmission | |
DE102022001115B3 (en) | System for secure data transmission between a motor vehicle and a cloud service | |
EP1832132B1 (en) | System and method for delivering data between a data provider and a mobile terminal | |
EP3627788A1 (en) | Method and device for configuring an access control system | |
EP3881486B1 (en) | Method for providing proof of origin for a digital key pair | |
DE202018100577U1 (en) | Apparatus for performing printing operations in a network | |
EP3873052B1 (en) | Onboarding of a device in a client-capable virtual network of an industrial network | |
DE102022001848B3 (en) | Method for user-related setup of a terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230626 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20240116 |