MX2021013229A - Gestion de datos y uso de datos en la red iot. - Google Patents
Gestion de datos y uso de datos en la red iot.Info
- Publication number
- MX2021013229A MX2021013229A MX2021013229A MX2021013229A MX2021013229A MX 2021013229 A MX2021013229 A MX 2021013229A MX 2021013229 A MX2021013229 A MX 2021013229A MX 2021013229 A MX2021013229 A MX 2021013229A MX 2021013229 A MX2021013229 A MX 2021013229A
- Authority
- MX
- Mexico
- Prior art keywords
- data usage
- processor
- data
- profile
- database
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/303—Terminal profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/065—Generation of reports related to network devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
En un procedimiento, un procesador recibe una solicitud de un dispositivo de red. El procesador obtiene de una base de datos un perfil de dispositivo para el dispositivo de red. Un procesador determina si el perfil de dispositivo del dispositivo de red tiene un patrón de uso de datos relacionado con los datos identificados por un identificador de datos. En respuesta a determinar que el perfil del dispositivo tiene un patrón de uso de datos relacionado, un procesador recibe el patrón de uso de datos relacionado de la base de datos. En respuesta a determinar que el perfil del dispositivo no tiene un patrón de uso de datos relacionado, un procesador obtiene un perfil de tipo de dispositivo de la base de datos. Un procesador clasifica la solicitud de uso de datos basado en al menos uno del perfil del dispositivo y el perfil del tipo de dispositivo. Un procesador ejecuta una acción de seguridad basado en la clasificación de la solicitud de uso de datos. Un procesador almacena la solicitud de uso de datos y la ejecuta la acción de seguridad a la base de datos.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/421,156 US11457032B2 (en) | 2019-05-23 | 2019-05-23 | Managing data and data usage in IoT network |
PCT/EP2020/062467 WO2020233984A1 (en) | 2019-05-23 | 2020-05-05 | Managing data and data usage in iot network |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2021013229A true MX2021013229A (es) | 2022-01-06 |
Family
ID=70554081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2021013229A MX2021013229A (es) | 2019-05-23 | 2020-05-05 | Gestion de datos y uso de datos en la red iot. |
Country Status (11)
Country | Link |
---|---|
US (1) | US11457032B2 (es) |
JP (1) | JP2022533305A (es) |
KR (1) | KR102612502B1 (es) |
CN (1) | CN113767613B (es) |
AU (1) | AU2020280677B2 (es) |
BR (1) | BR112021023486A2 (es) |
CA (1) | CA3137229A1 (es) |
IL (1) | IL288059A (es) |
MX (1) | MX2021013229A (es) |
SG (1) | SG11202110243RA (es) |
WO (1) | WO2020233984A1 (es) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11785021B2 (en) * | 2019-11-11 | 2023-10-10 | Jan-Robin Gerards | Systems and methods for facilitating detection of a security event associated with an IoT device |
US11824881B2 (en) | 2020-04-15 | 2023-11-21 | T-Mobile Usa, Inc. | On-demand security layer for a 5G wireless network |
US11444980B2 (en) | 2020-04-15 | 2022-09-13 | T-Mobile Usa, Inc. | On-demand wireless device centric security for a 5G wireless network |
US11070982B1 (en) | 2020-04-15 | 2021-07-20 | T-Mobile Usa, Inc. | Self-cleaning function for a network access node of a network |
US11799878B2 (en) | 2020-04-15 | 2023-10-24 | T-Mobile Usa, Inc. | On-demand software-defined security service orchestration for a 5G wireless network |
US11057774B1 (en) | 2020-05-14 | 2021-07-06 | T-Mobile Usa, Inc. | Intelligent GNODEB cybersecurity protection system |
US11206542B2 (en) * | 2020-05-14 | 2021-12-21 | T-Mobile Usa, Inc. | 5G cybersecurity protection system using personalized signatures |
US11962469B2 (en) * | 2021-02-10 | 2024-04-16 | Cisco Technology, Inc. | Identifying devices and device intents in an IoT network |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6606659B1 (en) * | 2000-01-28 | 2003-08-12 | Websense, Inc. | System and method for controlling access to internet sites |
US6691175B1 (en) | 2000-02-25 | 2004-02-10 | Sun Microsystems, Inc. | Method and apparatus for managing data propagation between software modules |
ATE375567T1 (de) * | 2001-11-23 | 2007-10-15 | Protegrity Res & Dev | Verfahren zur erkennung von eindringling in einem datenbanksystem |
JP4698383B2 (ja) * | 2004-10-26 | 2011-06-08 | パナソニック株式会社 | 無線端末装置、管理端末装置、および端末管理方法 |
US8161111B2 (en) | 2006-03-27 | 2012-04-17 | Packet Video, Corp | System and method for identifying common media content |
US8176095B2 (en) | 2007-06-11 | 2012-05-08 | Lucid Design Group, Llc | Collecting, sharing, comparing, and displaying resource usage data |
US8756675B2 (en) | 2008-08-06 | 2014-06-17 | Silver Spring Networks, Inc. | Systems and methods for security in a wireless utility network |
US8107973B1 (en) * | 2008-08-07 | 2012-01-31 | At&T Mobility Ii Llc | Class structured location based services |
US7916635B2 (en) * | 2008-12-23 | 2011-03-29 | Qwest Communications International, Inc. | Transparent network traffic inspection |
US9065868B2 (en) | 2009-04-08 | 2015-06-23 | Blackberry Limited | System and method for sharing data in a group of mobile devices |
CA2774648C (en) * | 2009-09-30 | 2017-07-25 | Amazon Technologies, Inc. | Modular device authentication framework |
US9716595B1 (en) | 2010-04-30 | 2017-07-25 | T-Central, Inc. | System and method for internet of things (IOT) security and management |
US10445721B2 (en) * | 2012-06-25 | 2019-10-15 | Visa International Service Association | Method and system for data security utilizing user behavior and device identification |
US9420002B1 (en) * | 2013-03-14 | 2016-08-16 | Mark McGovern | Authorization server access system |
WO2015113156A1 (en) * | 2014-01-30 | 2015-08-06 | Marketwired L.P. | Systems and methods for continuous active data security |
US9277559B2 (en) * | 2014-04-11 | 2016-03-01 | Verizon Patent And Licensing Inc. | Sharing radio resources among devices of different device classes |
US10083291B2 (en) | 2015-02-25 | 2018-09-25 | Verisign, Inc. | Automating internet of things security provisioning |
US10304090B2 (en) * | 2015-10-16 | 2019-05-28 | Nokia Technologies Oy | Method, apparatus and computer program product for a cookie used for an internet of things device |
US9961082B2 (en) * | 2016-02-08 | 2018-05-01 | Blackberry Limited | Access control for digital data |
US10560840B2 (en) | 2016-03-18 | 2020-02-11 | Wipro Limited | System and method for providing dynamic, adaptive and composite privacy and security for IoT communication |
US9929913B2 (en) * | 2016-03-28 | 2018-03-27 | International Business Machines Corporation | Automatic finding and sharing of IoT connected devices |
US9781602B1 (en) * | 2016-03-31 | 2017-10-03 | Ca, Inc. | Geographically based access management for internet of things device data |
US10237284B2 (en) | 2016-03-31 | 2019-03-19 | International Business Machines Corporation | Internet of things security appliance |
US10616249B2 (en) | 2016-03-31 | 2020-04-07 | Intel Corporation | Adaptive internet of things edge device security |
US10181978B1 (en) * | 2016-06-29 | 2019-01-15 | Amazon Technologies, Inc. | Discovery of device capabilities |
US10313404B2 (en) * | 2016-06-30 | 2019-06-04 | Microsoft Technology Licensing, Llc | Sharing user context and preferences |
US10498754B2 (en) * | 2017-06-09 | 2019-12-03 | Verizon Patent And Licensing Inc. | Systems and methods for policing and protecting networks from attacks |
US11792008B2 (en) * | 2017-06-19 | 2023-10-17 | Silverfort Ltd. | Actively monitoring encrypted traffic by inspecting logs |
US10862911B2 (en) * | 2017-06-27 | 2020-12-08 | Allot Ltd. | System, device, and method of adaptive network protection for managed internet-of-things services |
US20190014137A1 (en) * | 2017-07-10 | 2019-01-10 | ZingBox, Inc. | IoT DEVICE SECURITY |
US10944753B2 (en) * | 2017-08-17 | 2021-03-09 | Verizon Patent And Licensing Inc. | IoT devices wireless network connectivity policy management |
US11544501B2 (en) * | 2019-03-06 | 2023-01-03 | Paypal, Inc. | Systems and methods for training a data classification model |
-
2019
- 2019-05-23 US US16/421,156 patent/US11457032B2/en active Active
-
2020
- 2020-05-05 SG SG11202110243RA patent/SG11202110243RA/en unknown
- 2020-05-05 JP JP2021557531A patent/JP2022533305A/ja active Pending
- 2020-05-05 WO PCT/EP2020/062467 patent/WO2020233984A1/en active Application Filing
- 2020-05-05 CA CA3137229A patent/CA3137229A1/en active Pending
- 2020-05-05 MX MX2021013229A patent/MX2021013229A/es unknown
- 2020-05-05 BR BR112021023486A patent/BR112021023486A2/pt unknown
- 2020-05-05 AU AU2020280677A patent/AU2020280677B2/en active Active
- 2020-05-05 KR KR1020217036686A patent/KR102612502B1/ko active IP Right Grant
- 2020-05-05 CN CN202080032483.7A patent/CN113767613B/zh active Active
-
2021
- 2021-11-11 IL IL288059A patent/IL288059A/en unknown
Also Published As
Publication number | Publication date |
---|---|
US20200374304A1 (en) | 2020-11-26 |
US11457032B2 (en) | 2022-09-27 |
AU2020280677B2 (en) | 2023-07-20 |
KR20220002948A (ko) | 2022-01-07 |
WO2020233984A1 (en) | 2020-11-26 |
JP2022533305A (ja) | 2022-07-22 |
AU2020280677A1 (en) | 2021-10-14 |
CN113767613A (zh) | 2021-12-07 |
SG11202110243RA (en) | 2021-10-28 |
IL288059A (en) | 2022-01-01 |
KR102612502B1 (ko) | 2023-12-11 |
CA3137229A1 (en) | 2020-11-26 |
BR112021023486A2 (pt) | 2022-01-18 |
CN113767613B (zh) | 2024-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2021013229A (es) | Gestion de datos y uso de datos en la red iot. | |
US10686843B2 (en) | Authorization policy recommendation method and apparatus, server, and storage medium | |
MX2019008243A (es) | Gestión de aparatos inteligentes que utiliza tecnología de cadena de bloques . | |
US11531766B2 (en) | Systems and methods for attributing security vulnerabilities to a configuration of a client device | |
MY195644A (en) | Login Information Processing Method and Device | |
BR112015021705A2 (pt) | sistemas e métodos para descobrir dispositivos em uma rede ciente de vizinhança | |
EP3706022A3 (en) | Permissions policy manager to configure permissions on computing devices | |
PH12017550118A1 (en) | Management of commitments and requests extracted from communications and content | |
PH12020550701A1 (en) | Asset management method and apparatus, and electronic device | |
US20170346676A1 (en) | Alarm correlation in network function virtualization environment | |
SG11201907518UA (en) | Risk management and control method and device | |
US10567398B2 (en) | Method and apparatus for remote malware monitoring | |
US11323453B2 (en) | Data processing method, device, access control system, and storage media | |
EP2916524A3 (en) | System for suggesting network resource for use by a network terminal based on network resource ranking | |
US20160269902A1 (en) | Method And System For Monitoring And Processing Wireless Signals | |
EP2800024A1 (en) | System and methods for identifying applications in mobile networks | |
GB2575944A (en) | Location-based service zone management for a geographic region | |
US11133990B2 (en) | System and method for providing a dynamic comparative network health analysis of a network environment | |
PH12020551963A1 (en) | Managing vplmn configuration updates in the ue due to home plmn configuration changes | |
WO2015017699A3 (en) | Mobile device connection control for synchronization and remote data access | |
PH12018501167A1 (en) | User data sharing method and device | |
WO2019137568A3 (en) | Methods and devices for managing access to account in blockchain system | |
JP2020513632A5 (es) | ||
PH12015000166A1 (en) | Method and system for fraud detection and compliance management | |
IN2015CH05361A (es) |