US20130124420A1 - Secure system and method for enforcement of privacy policy and protection of confidentiality - Google Patents

Secure system and method for enforcement of privacy policy and protection of confidentiality Download PDF

Info

Publication number
US20130124420A1
US20130124420A1 US13/468,525 US201213468525A US2013124420A1 US 20130124420 A1 US20130124420 A1 US 20130124420A1 US 201213468525 A US201213468525 A US 201213468525A US 2013124420 A1 US2013124420 A1 US 2013124420A1
Authority
US
United States
Prior art keywords
data
privacy
enterprise
privacy policy
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/468,525
Inventor
Sastry S. Duri
Marco O. Gruteser
Xuan Liu
Paul A. Moskowitz
Ronald Perez
Edith G. Schonberg
Moninder Singh
Jung-Mu Tang
Charles P. Tresser
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Slingshot Iot LLC
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US13/468,525 priority Critical patent/US20130124420A1/en
Publication of US20130124420A1 publication Critical patent/US20130124420A1/en
Assigned to DAEDALUS GROUP LLC reassignment DAEDALUS GROUP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Assigned to DAEDALUS GROUP, LLC reassignment DAEDALUS GROUP, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Assigned to SLINGSHOT IOT LLC reassignment SLINGSHOT IOT LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DAEDALUS GROUP, LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Definitions

  • the present invention relates generally to network-based data privacy policies, and more particularly to a system and method of implementing a secure privacy policy.
  • B2B business-to-business
  • E2E enterprise-to-enterprise
  • the invention addresses the above-mention problems, as well as others, by providing various systems, architectures, frameworks and methodologies that can enforce a privacy policy in a secure environment.
  • the invention provides a method for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
  • the invention provides an automotive telematics system having a privacy protection framework, comprising: a plurality of sensors for collecting sensor data from the automobile; and a data protection manager for managing the sensor data, wherein the data protection manager includes: a system for receiving data requests for sensor data from a plurality of applications; a system for authenticating an application anytime a data request is made from the application; a system for storing each data request in a data log; and a privacy engine that ensures that each application requesting data has a privacy policy that complies with a privacy policy of the privacy engine.
  • the invention provides a method for securely guaranteeing a privacy policy for credit card transactions, comprising: building a plurality of data processing devices that can recognize each other using cryptography; programming a privacy policy into each of the data processing devices; certifying that each of the data processing devices are equipped with privacy policy enforcement means; distributing the data processing devices to a merchant and a financial institution; issuing a credit card to an end user from the financial institution, wherein the end user is assigned a privacy policy in the data processing device of the financial institution; making a credit card purchase from the merchant by the end-user; and requesting data from the financial institution's data processing device by the merchant's data processing device, wherein the type of data that can be provided to the merchant's data processing device regarding the end user is governed by the assigned privacy policy of the end user.
  • FIG. 1 depicts an enterprise-to-enterprise framework for implementing a secure privacy policy system.
  • FIG. 2 depicts a method of implementing a secure privacy policy system in a credit card transaction environment.
  • FIG. 3 depicts an overview of an automotive telematics system.
  • FIG. 4 depicts an architecture for enforcing a privacy policy.
  • FIG. 5 depicts an architecture for enforcing a privacy policy in an automotive telematics environment.
  • the present invention provides various mechanisms for securely guaranteeing a privacy policy between two enterprises.
  • a privacy policy dictates the type of information or data that can be transmitted from one enterprise to another enterprise regarding a third party.
  • the present invention sets forth various secure embodiments that ensure compliance with the privacy policy.
  • the term enterprise may comprise, e.g., any type of business, machine, application, device, vehicle, appliance, etc.
  • Each enterprise i.e., Enterprise 1 and Enterprise 2
  • Each enterprise comprises various components for managing profile data 16 protected by privacy rules 18 .
  • Profile data 16 may comprise any type of data (e.g., financial, personal, health, etc.) that a third party might entrust to a respective enterprise, subject to a set of privacy rules, i.e., a privacy policy.
  • the third party may be a driver or owner of a vehicle and the enterprise may be represented by a computing system with the vehicle or a computing system location at an application or telematics service provider.
  • the components are implemented in software and are stored on tamper-proof secure hardware, such as an IBMTM 4758 PCI Cryptographic Coprocessor (hereinafter “4758”).
  • the components include: (1) a responder 20 that manages requests and responses for profile data 16 ; (2) a privacy-enabled resource manager 22 that intercepts all requests for profile data 16 , and calls (3) a privacy rules matching engine 24 to verify that the requesting enterprise does not violate the privacy rules 18 associated with the profile data 16 .
  • both the profile data 16 and the privacy rules 18 are both considered to be personal data, and protected by privacy rules 18 .
  • Privacy-enabled resource manager 22 maintains and manages the profile data 16 (i.e., it is responsible for updating, creating, and deleting data).
  • Interaction between each Enterprise 1 and Enterprise 2 is as follows.
  • Enterprise 2 sends Enterprise 1 a message containing a request for data about a third party as well as Enterprise 2's privacy policy.
  • the requested privacy policy may be specific to the third party or be a generic policy for Enterprise 2, in which case it might not need to be sent each time.
  • the request is signed and certified, such that Enterprise 1 can be assured that Enterprise 2 has a tamper-proof, secure system, and that the privacy policy of Enterprise 2 will be enforced by the privacy rules engine in Enterprise 2.
  • Enterprise 1 receives the request, it is processed by the responder 20 , which sends the request to the privacy-enabled resource manager 22 .
  • the privacy-enabled resource manager 22 calls the privacy rules matching engine 24 , which matches the privacy policy and request from Enterprise 2 with the rules for the third party at Enterprise 1. If the match succeeds, then the privacy-enabled resource manager 22 retrieves the requested profile data, and returns it to the responder 20 .
  • the responder 20 encrypts and signs the response, which is returned to Enterprise
  • each request for information is signed by the requesting enterprise and certified.
  • Certification assures the enterprise receiving the request that the requesting enterprise will guarantee the enforcement of privacy policies.
  • the validity of such a certification can be readily determined by, for example, consulting a list of certified enterprises maintained by a trusted third party agency.
  • Trusted third parties, or trusted intermediaries are mutually trusted entities that are commonly used to certify or witness transactions between two or more potentially hostile parties in a transaction. Examples include companies such as VERISIGNTM, a certificate authority and trust services provider, or nonprofit organizations such as TRUSTeTM, which provide privacy policy disclosure and attestation services.
  • KDC Key Distribution Center
  • Kerberos authentication protocol Another example of trusted third parties is the Key Distribution Center (KDC) in the Kerberos authentication protocol, which is an entity that is trusted with the identification information of all parties on a network/system for the purposes of authenticating resource usage.
  • KDC Key Distribution Center
  • a hardware manufacturer could build a series of machines that could provide the necessary certification. Such an embodiment is described next with reference to a credit card transaction system.
  • one of the challenges of providing a secure privacy policy framework involves certifying that an enterprise requesting data will implement and enforce its published privacy rules.
  • a financial institution 32 must release financial data 33 to a merchant 34 when an end-user 36 makes a credit card purchase 35 .
  • merchant 34 may publish a privacy policy, without some security, there is no guarantee that merchant 34 will abide by the policy.
  • the present embodiment addresses this by producing a series of “pre-configured” data processing devices (i.e., machines 31 ) that can recognize each other using any of a set of well-known cryptographic mechanisms.
  • manufacturer 30 would build the whole series and certify all the machines are equipped to enforce privacy and confidentiality policies.
  • Each machine would be built for a specific user, e.g., financial institutions, merchants, end-users, identity service providers, etc.).
  • An “identity service provider” is a service that provides and/or certifies information about a person. It could provide, for example, basic authentication or other information about a person. For example, it may automatically fill in forms or certify facts, such as might be needed to complete a transaction, e.g., legal age, credit-worthiness, etc.
  • the enforcement part would be accomplished, for instance, by using the teachings of above described patent application “SYSTEM, METHOD, AND BUSINESS METHODS FOR ENFORCING PRIVACY PREFERENCES ON PERSONAL-DATA EXCHANGES ACROSS A NETWORK, which would provide a secrecy barrier using cryptography with a 4758 or a similar machine.
  • card data from end-user 36 would be encrypted and sent to the merchant's 4758, and from there to the financial institution 32 for validation and all aspects of execution.
  • the merchant's 4758 would be securely configured by the manufacturer 30 to only allow access to, for example: (1) limited types of data or identifiers (set by the privacy policy) of the customer; (2) the financial institution's commitment to the merchant; (3) and the amount money involved.
  • Other enterprises involved in such a transaction would have similar limitations pre-configured into their own machines 31 .
  • private key/public key pairs i.e., public schemes
  • secret encoding keys or secure hash functions such as SHA-1, as fully specified in the Federal Information Processing Standard Publication 180-1
  • secure hash functions such as SHA-1, as fully specified in the Federal Information Processing Standard Publication 180-1
  • the ability to “recognize” allows for the authentication of machines to each other based upon mutually respected cryptographic certification, and hence, their ability to trust each other based on those cryptographically authenticated identities.
  • the above-described environment would allow the end-user 36 to make secure credit or debit card payments over the World Wide Web.
  • the end-user 36 could receive some certification via their browser that the merchant they are dealing with only has access to the information agreed upon between the end-user 36 and the financial institution 32 .
  • the end-user could also be provided with a data processing system (e.g., software, such as a downloadable pluggin; or secure hardware) that would provide a secure interface.
  • a data processing system e.g., software, such as a downloadable pluggin; or secure hardware
  • merchants and financial institution would be allowed to operate at moderate costs while providing certifiable privacy and security.
  • a further embodiment where privacy policy security is desirable involves automotive telematics, where information from automotive vehicles is being collected for various purposes.
  • Automotive telematics utilizes information-intensive applications that are being enabled for vehicles (automobiles, trucks, buses, etc.) by a combination of telecommunications and computing technology.
  • the automobile is, in effect, a computing platform to which mobile commerce services may be delivered.
  • the services being delivered today on a regular basis and projected for the near future include navigation information, emergency roadside assistance, location-based services, delivery of digital information such as e-mail, entertainment, diagnostics and prognostics, and pay-for-use rental and insurance.
  • Location information may be based upon GPS (Global Positioning Satellite) information and include longitude, latitude, altitude, and a time stamp.
  • GPS Global Positioning Satellite
  • the present embodiment provides various safeguards to help guarantee the security data subject to one or more privacy policies.
  • FIG. 3 depicts an overview of a typical automotive telematics application 40 .
  • Cars 42 are equipped with a wireless communication device, a variety of sensors, and a car computer that has a display, sufficient memory, storage, and processing to run complex embedded applications and middleware.
  • the car computer interfaces to a car bus and other car sensors, for example, a Global Positioning System (GPS) sensor, and collects car engine performance data, safety information, and car location.
  • GPS Global Positioning System
  • TSP telematics service provider
  • ASP's application service providers
  • a car user needs to send some or all the information collected by the car computer to the ASP.
  • each car transmits data as necessary to the TSP 44 , which then provides data to different ASPs as needed.
  • the TSP acts as a service aggregator and a data broker. Data that is aggregated may be derived from many sensors located in one vehicle or from many vehicles.
  • the TSP can store user preferences and user subscriptions to services.
  • the TSP may subscribe to data, e.g. the data is transmitted by the car at intervals, or the data transmission may be event based, e.g. sent to the TSP when assistance is required.
  • the Pay-for-Use Insurance ASP may need user identification data, GPS data, miles driven to compute premiums and perform risk analysis.
  • the Information ASP may need user location, and user preferences to send back information on local attractions.
  • the Car Care and Emergency Assistance ASP may need car engine performance and safety information on regular basis, and car location in case of emergency. As is evident, not all ASP's need the same information. For instance, data identifying the user is not required for the Information ASP, but is required for the Pay-for-Use Insurance ASP.
  • Dynamically generated data within an automobile creates unique security challenges.
  • the sheer amount of the data generated makes it difficult, if not impossible, to store it within the automobile itself. Accordingly, certain pieces of data must be stored outside of the automobile (e.g., by a trusted third party on behalf of the individual) thereby emphasizing the importance of the driver's privacy policies.
  • static data which has to be collected only once by any interested party
  • dynamic data has to be collected repeatedly by a service provider to keep it up-to-date.
  • a continuous transfer of dynamic data to more than one service provider, governed by differing privacy policies is often required. Accordingly, a data protection framework is needed to ensure that each ASP is indeed enforcing its privacy policy.
  • the data protection framework of the present embodiment is built on the foundation of privacy and security technologies.
  • the privacy technology enables users and service providers to define an underlying data model, and to define policies authorizing access to data.
  • the security technology provides traditional capabilities such as encryption, authentication, and non-repudiation. Non-repudiation is the property of a cryptosystem whereby parties are unable to deny actions they perform, e.g., not being able to deny after the fact that you authorized a purchase/transaction.
  • the security technology provides secure environments for protected execution, which is essential to limiting data access to specific purposes.
  • policies specifying personal data handling preferences, and solution provider policies attesting to user data handling practices together form virtual contracts between users and ASP's.
  • the present framework enables enforcement of these policies by categorizing sensor data and defining data handling rules according to classifications and policies, and by assuring ASP compliance to the rules. Enforcement of policies and compliance assurance extends from the in-vehicle client to the solution or service provider back-end systems, and can be extended to third-party interactions within the domain of the framework.
  • Security and privacy policy enforcement relies on the classification and protection of data upon its creation, storage, transmission, usage, and destruction, ensuring integrity of the data for both users and ASP's.
  • Data protection is achieved in part by employing cryptographic algorithms and protocols, both for confidentiality as well as for integrity, authentication and authorization.
  • Data classification and protection also extends to solution or application integrity. Applications must first be authenticated; then executed in compliance with applicable policies and rules that are validated and auditable; and the framework will enable the secure configuration and update of applications as well as of the framework components themselves.
  • a data protection platform architecture 50 is shown.
  • Architecture 50 can be instantiated in car, in TSP and in ASP settings by choosing appropriate implementations of the two bottom layers 52 , 54 .
  • an RTOS real-time operating system
  • the TSP and ASP may use server operating systems such as LINUXTM.
  • the application server for in-car environments may use an OSGi (Open Services Gateway Initiative) based platform, while remote application servers may use WebSphereTM by the IBM Corporation, for example.
  • the Platform Protection Manager which is a part of the operating system, OS, monitors the integrity of all system software including the Data Protection Manager 56 and provides security functions such as verifying signatures on applications.
  • the Communications layer 58 handles encrypted, authenticated, and monitored network connections. For example, it supports protocols like SSL (Secure Sockets Layer) or IPSec (IP (Internet Protocol) Security Protocol).
  • SSL Secure Sockets Layer
  • IPSec IP (Internet Protocol) Security Protocol
  • the DBMS (database management services) layer 59 provides basic storage capabilities for the Data Protection Manager 56 .
  • the Data Protection Manager 56 is the key privacy technology, which regulates application access to data and enforces all other aspects of the privacy policy such as retention constraints.
  • a virtual blackboard provides a data processing environment that exists both locally (i.e., on the automobile) and remotely (e.g., at an ASP).
  • Data Protection Manager 56 provides an interface for information producers such as sensors or aggregation applications to publish data on the blackboard. Information consumers access this data through periodic queries or through a subscription/notification mechanism. Because the blackboard paradigm is extended across a virtual network, applications at the TSP or ASP can submit queries to, or receive notifications from, the in-car blackboard mechanism.
  • FIG. 5 illustrates how applications are implemented.
  • a GPS sensor may periodically publish location data items in the Data Protection Manager 56 via a GPS adapter 64 and sensor service 66 .
  • An application such as the Classified Mileage Calculator 62 can subscribe to the GPS data and compute (with the help of a road map) the total mileage driven on different types of roads. The results are again published in the Data Protection Manager 56 .
  • a Risk Analysis application running on the insurance server remotely can also subscribe to the aggregated and classified mileage data.
  • Blackboard-based architectures provide a simple paradigm for implementing sensor-based applications.
  • the blackboard approach provides another key advantage for a privacy protection framework that requires verifying that data accesses comply with the appropriate privacy policies.
  • Request Authentication 70 first authenticates a requestor, then the request is stored in Log Service 72 , and finally the Privacy Engine 74 examines the request. Only if the request complies with the policy, data is returned to the requestor by Data Service 76 .
  • the Data Protection Manager 56 provides the core functionality needed for data protection. As can be seen in FIG. 4 , it controls access to private data, user policies, configuration data, and an application registry. All applications needing access to private data must be signed and must register with the Data Protection Manager 56 .
  • the application server 52 entrusts its configuration data to the Data Protection Manager 56 and is by default registered with it. In this sense, application server configuration data is a special type of private data.
  • the Privacy Enabled Resource Manager (PERM) component 53 handles administration of data models, policies, and application registration.
  • PERM handles requests for private data.
  • a typical request for data includes application credentials, privacy policy data, and description of data items.
  • the PERM first verifies application credentials. Upon successful verification of credentials, the PERM compares an application privacy policy with the user's privacy policy to determine whether to grant access or not.
  • PERM also supports the subscription model for data.
  • the security features offered by the in-vehicle client platform, as well as the telematics services and solutions providers' platforms, will in large part determine the degree to which data privacy and protection assurances can be given. While the software components of the end-to-end framework may and should be vetted for security and for compliance to a privacy protection design, hardware components of the framework may still be vulnerable to attack or misuse both from within (e.g., users, service providers) as well as from external parties (e.g., hackers, thieves, competitors).
  • physically and logically secure systems are to be used for the in-vehicle clients as well as services and solutions providers' servers—i.e., systems that would resist most physical and logical attacks (e.g., physical penetration, voltage or temperature attacks, power analysis, monitoring of electromagnetic emissions), and sensing and responding to all others before a system compromise (e.g., by rendering sensitive data inaccessible).
  • Secure coprocessors can provide physically and logically secure subsystems that operate in conjunction with a local host system, employing cryptographic acceleration hardware, and providing a secure execution environment for the programs that are supposed to be run.
  • Such secure coprocessors the IBM 4758 PCI Cryptographic Coprocessor, a product used extensively in servers for applications requiring the highest levels of assurance (e.g., banking and financial applications, electronic commerce systems). Furthermore, the near term future promises similar devices for mobile and client platforms, at prices commensurate with such client devices, and offering performance capabilities surpassing the current generation of server-oriented secure coprocessors. Pervasive low-end secure coprocessors (e.g., smart cards, secure tokens), used for key storage and user authentication, are also currently available and may provide some security assurances in lieu of more comprehensive devices.
  • Pervasive low-end secure coprocessors e.g., smart cards, secure tokens
  • Secure coprocessors are also well suited to an emerging industry such as automotive telematics in that they generally support industry standard interconnects and communication protocols, allowing for greater ease in porting or integrating with existing telematics platforms. With or without physically secure platforms for clients and servers, both platforms should allow for secure configuration, update, and execution (booting) of system and application software. Typically, this functionality must exist primarily in the firmware/software that is initially executed upon power-on (e.g., BIOS or system boot firmware).
  • This power-on software layer is often in read-only memory, it should have minimal complexity and size, and should be able to (cryptographically) authenticate/verify a minimal set of commands and data that enable the configuration and update of the subsequent software layer (e.g., the system software or operating system layer).
  • the power-on software layer can authenticate the system software before each execution/instantiation, i.e., perform a secure boot.
  • the operating system like the power-on software and physical platform before, must also provide certain security features, such as access control, in order to support overall system and data protection.
  • security features such as access control
  • Elements of the application and application support layer may be highly integrated with the operating system. Together, these layers can provide support for cryptographic programming libraries, secure communication protocols, encrypted file systems or databases, firewall and intrusion detection capabilities, and even virtual machine application authentication, and execution.
  • the application support layer itself can provide virtual environments/machines for the purpose of protecting these applications from interfering with each other or the operating system.
  • the application support layer first verifies that the application has proper credentials. Then it deploys the application in a sandbox to protect it and other applications.
  • Each sandbox is associated with a set of access privileges defining access to system resources such as files and sockets.
  • each sandbox is associated with a name space. By properly structuring execution environment name spaces it is possible to define which applications and which system resources are available to a given application and therefore control the degree of isolation. Another aspect of isolation deals with application communication.
  • the application support layer prevents direct communication between different applications and with outside entities. All local and network communication are processed through the Data Protection Manager which checks the privacy policies before allowing communication to proceed and generates an audit trail for later verification. Requests for data by one application from another application are also similarly checked for privacy policy compliance. Requests for data and exchanges of data are logged by the Log Service of the Data Protection Manager. These logs may be audited later to confirm that privacy policies have been complied with.
  • systems, functions, mechanisms, methods, and modules described herein can be implemented in hardware, software, or a combination of hardware and software. They may be implemented by any type of computer system or other apparatus adapted for carrying out the methods described herein.
  • a typical combination of hardware and software could be a general-purpose computer system with a computer program that, when loaded and executed, controls the computer system such that it carries out the methods described herein.
  • a specific use computer containing specialized hardware for carrying out one or more of the functional tasks of the invention could be utilized.
  • the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods and functions described herein, and which—when loaded in a computer system—is able to carry out these methods and functions.
  • Computer program, software program, program, program product, or software in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.

Abstract

The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.

Description

  • This divisional application claims priority to U.S. Pat. No. 7,401,352 entitled SECURE SYSTEM AND METHOD FOR ENFORCEMENT OF PRIVACY POLICY AND PROTECTION OF CONFIDENTIALITY, filed on Aug. 30, 2002 and co-pending U.S. patent application Ser. No. 12/136,544 entitled SECURE SYSTEM AND METHOD FOR ENFORCEMENT OF PRIVACY POLICY AND PROTECTION OF CONFIDENTIALITY, filed on Jun. 10, 2008, the contents of which are hereby incorporated by reference in their entirety.
  • BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • The present invention relates generally to network-based data privacy policies, and more particularly to a system and method of implementing a secure privacy policy.
  • 2. Related Art
  • As the amount of information transmitted over networks by businesses, individuals and other entities continues to grow, the ability to guarantee privacy of information has become an ongoing challenge. For example, users that subscribe to a provider's services are often required to disclose sensitive personal information such as credit card information, medical information, family information, etc. The only safeguard available to such users is the privacy policy of the provider. Unfortunately, it is often impractical for an end-user to manually check the privacy policies of each provider that they may encounter, particularly in a network environment such as the Internet where policies can change over time and the actual provider of some service (e.g., credit approval) may be transparent to the end-user.
  • To address this, automated privacy policy matching systems have been proposed that compare the privacy requirements of a user with the privacy policy of each provider to ensure that the privacy rights of the user are maintained. In such systems, data is only released if the privacy constraints of the user can be met. Thus, an end-user can be confident that any entity collecting their personal data will not use the data in manner that is proscribed by the end-user. Such a system is described in U.S. Pat. No. 7,478,157, entitled “System, Method, and Business Methods for Enforcing Privacy Preferences on Personal-Data Exchanges Across a Network,” which is hereby incorporated by reference.
  • Unfortunately, the efficacy of such privacy policy matching systems is completely dependent on the integrity of the people and organizations that provide the services, or otherwise have access to the data. For instance, even though a provider may guarantee data will not be used or sold without the consent of the end-user, there is nothing to prevent an employee of the service provider from stealing personal information. Accordingly, present matching systems may not always provide the necessary level of security to guarantee privacy.
  • Additional issues arise in a business-to-business (B2B) or enterprise-to-enterprise (E2E) environment where personal data of an end user is transmitted between two or more businesses or entities during a transaction in which the end-user is not a direct party. For example, during a credit card purchase, a merchant must transmit sensitive information (e.g., credit card information) to a financial institution for approval. In a second example involving automotive telematics, an automobile may be required to transmit data to a service provider relating to the location of the vehicle, miles driven, etc. In these cases, like those mentioned above, the mere fact that the involved entities have a privacy policy matching system does not guard against outright theft and/or tampering. Accordingly, a need exists for a privacy policy system that includes the necessary security to ensure data privacy.
  • SUMMARY OF THE INVENTION
  • The present invention addresses the above-mention problems, as well as others, by providing various systems, architectures, frameworks and methodologies that can enforce a privacy policy in a secure environment. In a first aspect, the invention provides a method for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
  • In a second aspect, the invention provides an automotive telematics system having a privacy protection framework, comprising: a plurality of sensors for collecting sensor data from the automobile; and a data protection manager for managing the sensor data, wherein the data protection manager includes: a system for receiving data requests for sensor data from a plurality of applications; a system for authenticating an application anytime a data request is made from the application; a system for storing each data request in a data log; and a privacy engine that ensures that each application requesting data has a privacy policy that complies with a privacy policy of the privacy engine.
  • In a third aspect, the invention provides a method for securely guaranteeing a privacy policy for credit card transactions, comprising: building a plurality of data processing devices that can recognize each other using cryptography; programming a privacy policy into each of the data processing devices; certifying that each of the data processing devices are equipped with privacy policy enforcement means; distributing the data processing devices to a merchant and a financial institution; issuing a credit card to an end user from the financial institution, wherein the end user is assigned a privacy policy in the data processing device of the financial institution; making a credit card purchase from the merchant by the end-user; and requesting data from the financial institution's data processing device by the merchant's data processing device, wherein the type of data that can be provided to the merchant's data processing device regarding the end user is governed by the assigned privacy policy of the end user.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
  • FIG. 1 depicts an enterprise-to-enterprise framework for implementing a secure privacy policy system.
  • FIG. 2 depicts a method of implementing a secure privacy policy system in a credit card transaction environment.
  • FIG. 3 depicts an overview of an automotive telematics system.
  • FIG. 4 depicts an architecture for enforcing a privacy policy.
  • FIG. 5 depicts an architecture for enforcing a privacy policy in an automotive telematics environment.
  • The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
  • DETAILED DESCRIPTION OF THE INVENTION 1. Overview
  • As noted above, the present invention provides various mechanisms for securely guaranteeing a privacy policy between two enterprises. In general, a privacy policy dictates the type of information or data that can be transmitted from one enterprise to another enterprise regarding a third party. The present invention sets forth various secure embodiments that ensure compliance with the privacy policy. For the purposes of this invention, the term enterprise may comprise, e.g., any type of business, machine, application, device, vehicle, appliance, etc.
  • 2. Generic Enterprise-to-Enterprise Model
  • Referring first to FIG. 1, a generic enterprise-to-enterprise architecture 10 in accordance with the present invention is shown. Each enterprise (i.e., Enterprise 1 and Enterprise 2) comprises various components for managing profile data 16 protected by privacy rules 18. Profile data 16 may comprise any type of data (e.g., financial, personal, health, etc.) that a third party might entrust to a respective enterprise, subject to a set of privacy rules, i.e., a privacy policy. In the case of an automotive system, the third party may be a driver or owner of a vehicle and the enterprise may be represented by a computing system with the vehicle or a computing system location at an application or telematics service provider.
  • In the described embodiment, the components are implemented in software and are stored on tamper-proof secure hardware, such as an IBM™ 4758 PCI Cryptographic Coprocessor (hereinafter “4758”). The components include: (1) a responder 20 that manages requests and responses for profile data 16; (2) a privacy-enabled resource manager 22 that intercepts all requests for profile data 16, and calls (3) a privacy rules matching engine 24 to verify that the requesting enterprise does not violate the privacy rules 18 associated with the profile data 16. Note that both the profile data 16 and the privacy rules 18 are both considered to be personal data, and protected by privacy rules 18. Privacy-enabled resource manager 22 maintains and manages the profile data 16 (i.e., it is responsible for updating, creating, and deleting data).
  • Interaction between each Enterprise 1 and Enterprise 2 is as follows. Enterprise 2 sends Enterprise 1 a message containing a request for data about a third party as well as Enterprise 2's privacy policy. The requested privacy policy may be specific to the third party or be a generic policy for Enterprise 2, in which case it might not need to be sent each time. The request is signed and certified, such that Enterprise 1 can be assured that Enterprise 2 has a tamper-proof, secure system, and that the privacy policy of Enterprise 2 will be enforced by the privacy rules engine in Enterprise 2.
  • Once Enterprise 1 receives the request, it is processed by the responder 20, which sends the request to the privacy-enabled resource manager 22. The privacy-enabled resource manager 22 calls the privacy rules matching engine 24, which matches the privacy policy and request from Enterprise 2 with the rules for the third party at Enterprise 1. If the match succeeds, then the privacy-enabled resource manager 22 retrieves the requested profile data, and returns it to the responder 20. The responder 20 encrypts and signs the response, which is returned to Enterprise
  • As noted above, each request for information is signed by the requesting enterprise and certified. Certification assures the enterprise receiving the request that the requesting enterprise will guarantee the enforcement of privacy policies. The validity of such a certification can be readily determined by, for example, consulting a list of certified enterprises maintained by a trusted third party agency. Trusted third parties, or trusted intermediaries, are mutually trusted entities that are commonly used to certify or witness transactions between two or more potentially hostile parties in a transaction. Examples include companies such as VERISIGN™, a certificate authority and trust services provider, or nonprofit organizations such as TRUSTe™, which provide privacy policy disclosure and attestation services. Another example of trusted third parties is the Key Distribution Center (KDC) in the Kerberos authentication protocol, which is an entity that is trusted with the identification information of all parties on a network/system for the purposes of authenticating resource usage. As an alternative, a hardware manufacturer could build a series of machines that could provide the necessary certification. Such an embodiment is described next with reference to a credit card transaction system.
  • 3. Credit Card Transaction
  • As noted above, one of the challenges of providing a secure privacy policy framework involves certifying that an enterprise requesting data will implement and enforce its published privacy rules. Thus, for instance, in a credit card transaction environment as shown in FIG. 2, a financial institution 32 must release financial data 33 to a merchant 34 when an end-user 36 makes a credit card purchase 35. Even though merchant 34 may publish a privacy policy, without some security, there is no guarantee that merchant 34 will abide by the policy.
  • The present embodiment addresses this by producing a series of “pre-configured” data processing devices (i.e., machines 31) that can recognize each other using any of a set of well-known cryptographic mechanisms. In this case, manufacturer 30 would build the whole series and certify all the machines are equipped to enforce privacy and confidentiality policies. Each machine would be built for a specific user, e.g., financial institutions, merchants, end-users, identity service providers, etc.). An “identity service provider” is a service that provides and/or certifies information about a person. It could provide, for example, basic authentication or other information about a person. For example, it may automatically fill in forms or certify facts, such as might be needed to complete a transaction, e.g., legal age, credit-worthiness, etc. When the policy is written or at the time that it is created, only the publicly known rule of the business, e.g., merchant, financial institutions, merchants, end-users, identity service providers, etc., and the decision of the customer would be permitted to rule, and the will of the customer would be respected with no possible interference, except possibly by government agencies with proper warrants.
  • The enforcement part would be accomplished, for instance, by using the teachings of above described patent application “SYSTEM, METHOD, AND BUSINESS METHODS FOR ENFORCING PRIVACY PREFERENCES ON PERSONAL-DATA EXCHANGES ACROSS A NETWORK, which would provide a secrecy barrier using cryptography with a 4758 or a similar machine.
  • To operate credit and charge card transactions, card data from end-user 36 would be encrypted and sent to the merchant's 4758, and from there to the financial institution 32 for validation and all aspects of execution. The merchant's 4758 would be securely configured by the manufacturer 30 to only allow access to, for example: (1) limited types of data or identifiers (set by the privacy policy) of the customer; (2) the financial institution's commitment to the merchant; (3) and the amount money involved. Other enterprises involved in such a transaction would have similar limitations pre-configured into their own machines 31.
  • The use of private key/public key pairs (i.e., public schemes) as means to encrypt or digitally sign a file or document using secret encoding keys or secure hash functions (such as SHA-1, as fully specified in the Federal Information Processing Standard Publication 180-1) are well known. A description of these techniques with directions on how to use several of their implementations can be found in “Handbook of applied Cryptography”, by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, CRC Press, 1997. Another important enabler of secure electronic communication is to exchange secret keys while exchanging only messages that can be understood by third parties. Several protocols have been created to this effect, such as Diffie-Hellman. In the context of the present invention, this would be used, for instance, to create a series of machines that can recognize each other. The ability to “recognize” allows for the authentication of machines to each other based upon mutually respected cryptographic certification, and hence, their ability to trust each other based on those cryptographically authenticated identities.
  • The above-described environment would allow the end-user 36 to make secure credit or debit card payments over the World Wide Web. Namely, when the end-user 36 is dealing with enterprises that utilize the secure systems described above, the end-user 36 could receive some certification via their browser that the merchant they are dealing with only has access to the information agreed upon between the end-user 36 and the financial institution 32. In this case, the end-user could also be provided with a data processing system (e.g., software, such as a downloadable pluggin; or secure hardware) that would provide a secure interface. Using such a system, merchants and financial institution would be allowed to operate at moderate costs while providing certifiable privacy and security.
  • 4. Automotive Telematics
  • A further embodiment where privacy policy security is desirable involves automotive telematics, where information from automotive vehicles is being collected for various purposes. Automotive telematics utilizes information-intensive applications that are being enabled for vehicles (automobiles, trucks, buses, etc.) by a combination of telecommunications and computing technology. The automobile is, in effect, a computing platform to which mobile commerce services may be delivered. The services being delivered today on a regular basis and projected for the near future include navigation information, emergency roadside assistance, location-based services, delivery of digital information such as e-mail, entertainment, diagnostics and prognostics, and pay-for-use rental and insurance. These applications are enabled by the collection and use of data which may include information on the location of a vehicle as a function of time, emergency situations including accidents and personal health emergencies, diagnostic data on the many systems within the vehicle, services and entertainment that are selected by the vehicle occupants, the demographics of the driver and passengers, and the behavior of the vehicle driver. Location information may be based upon GPS (Global Positioning Satellite) information and include longitude, latitude, altitude, and a time stamp.
  • In the automotive telematics environment, there is a significant potential for the misuse of collected data. End users or consumers may substitute false data or hack into in-vehicle applications in order to avoid costs associated with provided services. Telematics service providers and application providers may sell consumers' data to third parties without the permission of the consumers. Accordingly, the present embodiment provides various safeguards to help guarantee the security data subject to one or more privacy policies.
  • FIG. 3 depicts an overview of a typical automotive telematics application 40. Cars 42 are equipped with a wireless communication device, a variety of sensors, and a car computer that has a display, sufficient memory, storage, and processing to run complex embedded applications and middleware. The car computer interfaces to a car bus and other car sensors, for example, a Global Positioning System (GPS) sensor, and collects car engine performance data, safety information, and car location.
  • Car users subscribe to a telematics service provider (TSP) 44 to get a variety of services from application service providers (ASP's) 46, which may include Pay-for-Use Insurance, Information, and Car Care and Emergency Assistance. In order to get services from an ASP, a car user needs to send some or all the information collected by the car computer to the ASP. In the framework of FIG. 3, each car transmits data as necessary to the TSP 44, which then provides data to different ASPs as needed. In this case, the TSP acts as a service aggregator and a data broker. Data that is aggregated may be derived from many sensors located in one vehicle or from many vehicles. In addition to the data transmitted by cars, the TSP can store user preferences and user subscriptions to services. Thus the TSP may subscribe to data, e.g. the data is transmitted by the car at intervals, or the data transmission may be event based, e.g. sent to the TSP when assistance is required.
  • As shown, different ASP's often need different user data and use it for different purposes. The Pay-for-Use Insurance ASP may need user identification data, GPS data, miles driven to compute premiums and perform risk analysis. The Information ASP may need user location, and user preferences to send back information on local attractions. The Car Care and Emergency Assistance ASP may need car engine performance and safety information on regular basis, and car location in case of emergency. As is evident, not all ASP's need the same information. For instance, data identifying the user is not required for the Information ASP, but is required for the Pay-for-Use Insurance ASP.
  • Dynamically generated data within an automobile creates unique security challenges. The sheer amount of the data generated makes it difficult, if not impossible, to store it within the automobile itself. Accordingly, certain pieces of data must be stored outside of the automobile (e.g., by a trusted third party on behalf of the individual) thereby emphasizing the importance of the driver's privacy policies. Moreover, unlike static data which has to be collected only once by any interested party, dynamic data has to be collected repeatedly by a service provider to keep it up-to-date. Thus, a continuous transfer of dynamic data to more than one service provider, governed by differing privacy policies is often required. Accordingly, a data protection framework is needed to ensure that each ASP is indeed enforcing its privacy policy.
  • The data protection framework of the present embodiment is built on the foundation of privacy and security technologies. The privacy technology enables users and service providers to define an underlying data model, and to define policies authorizing access to data. The security technology provides traditional capabilities such as encryption, authentication, and non-repudiation. Non-repudiation is the property of a cryptosystem whereby parties are unable to deny actions they perform, e.g., not being able to deny after the fact that you authorized a purchase/transaction. In addition, the security technology provides secure environments for protected execution, which is essential to limiting data access to specific purposes.
  • User-defined policies specifying personal data handling preferences, and solution provider policies attesting to user data handling practices together form virtual contracts between users and ASP's. The present framework enables enforcement of these policies by categorizing sensor data and defining data handling rules according to classifications and policies, and by assuring ASP compliance to the rules. Enforcement of policies and compliance assurance extends from the in-vehicle client to the solution or service provider back-end systems, and can be extended to third-party interactions within the domain of the framework.
  • Security and privacy policy enforcement relies on the classification and protection of data upon its creation, storage, transmission, usage, and destruction, ensuring integrity of the data for both users and ASP's. Data protection is achieved in part by employing cryptographic algorithms and protocols, both for confidentiality as well as for integrity, authentication and authorization. Data classification and protection also extends to solution or application integrity. Applications must first be authenticated; then executed in compliance with applicable policies and rules that are validated and auditable; and the framework will enable the secure configuration and update of applications as well as of the framework components themselves.
  • Referring to FIG. 4, a data protection platform architecture 50 is shown. Architecture 50 can be instantiated in car, in TSP and in ASP settings by choosing appropriate implementations of the two bottom layers 52, 54. In a car environment, an RTOS (real-time operating system) such as Neutrino™ by QNX™ may be utilized, whereas the TSP and ASP may use server operating systems such as LINUX™. The application server for in-car environments may use an OSGi (Open Services Gateway Initiative) based platform, while remote application servers may use WebSphere™ by the IBM Corporation, for example. The Platform Protection Manager, which is a part of the operating system, OS, monitors the integrity of all system software including the Data Protection Manager 56 and provides security functions such as verifying signatures on applications. The Communications layer 58 handles encrypted, authenticated, and monitored network connections. For example, it supports protocols like SSL (Secure Sockets Layer) or IPSec (IP (Internet Protocol) Security Protocol). The DBMS (database management services) layer 59 provides basic storage capabilities for the Data Protection Manager 56. The Data Protection Manager 56 is the key privacy technology, which regulates application access to data and enforces all other aspects of the privacy policy such as retention constraints.
  • Communication between data sensors and applications may utilize the architectural framework 60 shown in FIG. 5. In this embodiment, a virtual blackboard provides a data processing environment that exists both locally (i.e., on the automobile) and remotely (e.g., at an ASP). Data Protection Manager 56 provides an interface for information producers such as sensors or aggregation applications to publish data on the blackboard. Information consumers access this data through periodic queries or through a subscription/notification mechanism. Because the blackboard paradigm is extended across a virtual network, applications at the TSP or ASP can submit queries to, or receive notifications from, the in-car blackboard mechanism.
  • The embodiment of FIG. 5 illustrates how applications are implemented. In this case, a GPS sensor may periodically publish location data items in the Data Protection Manager 56 via a GPS adapter 64 and sensor service 66. An application, such as the Classified Mileage Calculator 62 can subscribe to the GPS data and compute (with the help of a road map) the total mileage driven on different types of roads. The results are again published in the Data Protection Manager 56. A Risk Analysis application running on the insurance server remotely can also subscribe to the aggregated and classified mileage data.
  • Blackboard-based architectures provide a simple paradigm for implementing sensor-based applications. In addition, because every data access passes through the central Data Protection Manager 56, the blackboard approach provides another key advantage for a privacy protection framework that requires verifying that data accesses comply with the appropriate privacy policies. To this end, Request Authentication 70 first authenticates a requestor, then the request is stored in Log Service 72, and finally the Privacy Engine 74 examines the request. Only if the request complies with the policy, data is returned to the requestor by Data Service 76.
  • The Data Protection Manager 56 provides the core functionality needed for data protection. As can be seen in FIG. 4, it controls access to private data, user policies, configuration data, and an application registry. All applications needing access to private data must be signed and must register with the Data Protection Manager 56. The application server 52 entrusts its configuration data to the Data Protection Manager 56 and is by default registered with it. In this sense, application server configuration data is a special type of private data.
  • The Privacy Enabled Resource Manager (PERM) component 53 handles administration of data models, policies, and application registration. In addition, PERM handles requests for private data. A typical request for data includes application credentials, privacy policy data, and description of data items. The PERM first verifies application credentials. Upon successful verification of credentials, the PERM compares an application privacy policy with the user's privacy policy to determine whether to grant access or not. In addition to supporting request/response protocol, PERM also supports the subscription model for data.
  • Since protection of information—user data, vehicle data, time and location information, and even executable software—that is generated or stored in, or transmitted to/from, the in-vehicle client platform is key to the success of automotive telematics, our security focus of the present embodiment seeks to ensure the integrity of such data during its life cycle. Security is provided from a bottoms-up perspective starting with the physical client platform itself. The view extends to the secure configuration and update firmware/software—the software that is first to execute and assures the secure instantiation of subsequent software components, including the system software (e.g., embedded operating system), middleware, and application support. Each layer of hardware and software provides its own security-related features. This concept of having multiple layers of protection with the goal of preventing a single point of compromise is called defense-in-depth. Together, the physical client platform and the various software layers comprise a secure execution environment.
  • The security features offered by the in-vehicle client platform, as well as the telematics services and solutions providers' platforms, will in large part determine the degree to which data privacy and protection assurances can be given. While the software components of the end-to-end framework may and should be vetted for security and for compliance to a privacy protection design, hardware components of the framework may still be vulnerable to attack or misuse both from within (e.g., users, service providers) as well as from external parties (e.g., hackers, thieves, competitors).
  • Ideally, physically and logically secure systems are to be used for the in-vehicle clients as well as services and solutions providers' servers—i.e., systems that would resist most physical and logical attacks (e.g., physical penetration, voltage or temperature attacks, power analysis, monitoring of electromagnetic emissions), and sensing and responding to all others before a system compromise (e.g., by rendering sensitive data inaccessible). Secure coprocessors can provide physically and logically secure subsystems that operate in conjunction with a local host system, employing cryptographic acceleration hardware, and providing a secure execution environment for the programs that are supposed to be run. Such secure coprocessors the IBM 4758 PCI Cryptographic Coprocessor, a product used extensively in servers for applications requiring the highest levels of assurance (e.g., banking and financial applications, electronic commerce systems). Furthermore, the near term future promises similar devices for mobile and client platforms, at prices commensurate with such client devices, and offering performance capabilities surpassing the current generation of server-oriented secure coprocessors. Pervasive low-end secure coprocessors (e.g., smart cards, secure tokens), used for key storage and user authentication, are also currently available and may provide some security assurances in lieu of more comprehensive devices.
  • Secure coprocessors are also well suited to an emerging industry such as automotive telematics in that they generally support industry standard interconnects and communication protocols, allowing for greater ease in porting or integrating with existing telematics platforms. With or without physically secure platforms for clients and servers, both platforms should allow for secure configuration, update, and execution (booting) of system and application software. Typically, this functionality must exist primarily in the firmware/software that is initially executed upon power-on (e.g., BIOS or system boot firmware). This power-on software layer is often in read-only memory, it should have minimal complexity and size, and should be able to (cryptographically) authenticate/verify a minimal set of commands and data that enable the configuration and update of the subsequent software layer (e.g., the system software or operating system layer). Once the platform system software has been securely configured/updated, the power-on software layer can authenticate the system software before each execution/instantiation, i.e., perform a secure boot.
  • The operating system, like the power-on software and physical platform before, must also provide certain security features, such as access control, in order to support overall system and data protection. There is a great deal of ongoing work in the area of secure operating systems. Elements of the application and application support layer may be highly integrated with the operating system. Together, these layers can provide support for cryptographic programming libraries, secure communication protocols, encrypted file systems or databases, firewall and intrusion detection capabilities, and even virtual machine application authentication, and execution.
  • Further, because application isolation is important when applications potentially come from competing or otherwise mutually hostile parties, the application support layer itself can provide virtual environments/machines for the purpose of protecting these applications from interfering with each other or the operating system.
  • The application support layer first verifies that the application has proper credentials. Then it deploys the application in a sandbox to protect it and other applications. Each sandbox is associated with a set of access privileges defining access to system resources such as files and sockets. In addition, each sandbox is associated with a name space. By properly structuring execution environment name spaces it is possible to define which applications and which system resources are available to a given application and therefore control the degree of isolation. Another aspect of isolation deals with application communication. The application support layer prevents direct communication between different applications and with outside entities. All local and network communication are processed through the Data Protection Manager which checks the privacy policies before allowing communication to proceed and generates an audit trail for later verification. Requests for data by one application from another application are also similarly checked for privacy policy compliance. Requests for data and exchanges of data are logged by the Log Service of the Data Protection Manager. These logs may be audited later to confirm that privacy policies have been complied with.
  • As alluded to above, the same hardware and software layers, and their respective security features, described for the in-vehicle client platform are also required for the various telematics service provider servers. End-to-end and life cycle protection of relevant data is assured only when the same level of security is employed across the entire system.
  • It is understood that the systems, functions, mechanisms, methods, and modules described herein can be implemented in hardware, software, or a combination of hardware and software. They may be implemented by any type of computer system or other apparatus adapted for carrying out the methods described herein. A typical combination of hardware and software could be a general-purpose computer system with a computer program that, when loaded and executed, controls the computer system such that it carries out the methods described herein. Alternatively, a specific use computer, containing specialized hardware for carrying out one or more of the functional tasks of the invention could be utilized. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods and functions described herein, and which—when loaded in a computer system—is able to carry out these methods and functions. Computer program, software program, program, program product, or software, in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
  • The foregoing description of the preferred embodiments of the invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teachings. Such modifications and variations that are apparent to a person skilled in the art are intended to be included within the scope of this invention as defined by the accompanying claims.

Claims (3)

1. A method for securely guaranteeing a privacy policy for credit card transactions, comprising:
building a plurality of data processing devices that can recognize each other using cryptography;
programming a privacy policy into each of the data processing devices;
certifying that each of the data processing devices are equipped with privacy policy enforcement means;
distributing the data processing devices to a merchant and a financial institution;
issuing a credit card to an end user from the financial institution, wherein the end user is assigned a privacy policy in the data processing device of the financial institution;
making a credit card purchase from the merchant by the end-user; and
requesting data from the financial institution's data processing device by the merchant's data processing device, wherein the type of data that can be provided to the merchant's data processing device regarding the end user is governed by the assigned privacy policy of the end user.
2. The method of claim 1, wherein the plurality of data processing devices comprise secure coprocessors.
3. The method of claim 1, wherein the plurality of data processing devices can communicate with each other using private key/public key pairs.
US13/468,525 2002-08-30 2012-05-10 Secure system and method for enforcement of privacy policy and protection of confidentiality Abandoned US20130124420A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/468,525 US20130124420A1 (en) 2002-08-30 2012-05-10 Secure system and method for enforcement of privacy policy and protection of confidentiality

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/233,339 US7401352B2 (en) 2002-08-30 2002-08-30 Secure system and method for enforcement of privacy policy and protection of confidentiality
US12/136,544 US8327451B2 (en) 2002-08-30 2008-06-10 Secure system and method for enforcement of privacy policy and protection of confidentiality
US13/468,525 US20130124420A1 (en) 2002-08-30 2012-05-10 Secure system and method for enforcement of privacy policy and protection of confidentiality

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/233,339 Division US7401352B2 (en) 2002-08-30 2002-08-30 Secure system and method for enforcement of privacy policy and protection of confidentiality

Publications (1)

Publication Number Publication Date
US20130124420A1 true US20130124420A1 (en) 2013-05-16

Family

ID=31990424

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/233,339 Active 2024-11-20 US7401352B2 (en) 2002-08-30 2002-08-30 Secure system and method for enforcement of privacy policy and protection of confidentiality
US12/136,544 Active 2024-06-10 US8327451B2 (en) 2002-08-30 2008-06-10 Secure system and method for enforcement of privacy policy and protection of confidentiality
US13/468,525 Abandoned US20130124420A1 (en) 2002-08-30 2012-05-10 Secure system and method for enforcement of privacy policy and protection of confidentiality

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US10/233,339 Active 2024-11-20 US7401352B2 (en) 2002-08-30 2002-08-30 Secure system and method for enforcement of privacy policy and protection of confidentiality
US12/136,544 Active 2024-06-10 US8327451B2 (en) 2002-08-30 2008-06-10 Secure system and method for enforcement of privacy policy and protection of confidentiality

Country Status (1)

Country Link
US (3) US7401352B2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936765A (en) * 2015-12-29 2017-07-07 国网智能电网研究院 A kind of end side privacy of user guard method of web service applications
EP3311525A4 (en) * 2015-06-22 2018-11-07 Symantec Corporation Techniques for managing privacy of a network communication
US10193700B2 (en) * 2015-02-27 2019-01-29 Samsung Electronics Co., Ltd. Trust-zone-based end-to-end security
US10699274B2 (en) 2015-08-24 2020-06-30 Samsung Electronics Co., Ltd. Apparatus and method for secure electronic payment
US10747897B2 (en) 2014-12-09 2020-08-18 Early Warning Services, Llc Privacy policy rating system
US10846696B2 (en) 2015-08-24 2020-11-24 Samsung Electronics Co., Ltd. Apparatus and method for trusted execution environment based secure payment transactions
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
US11129018B2 (en) 2015-02-27 2021-09-21 Samsung Electronics Co., Ltd. Payment means operation supporting method and electronic device for supporting the same
US11182769B2 (en) 2015-02-12 2021-11-23 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
WO2022128078A1 (en) * 2020-12-16 2022-06-23 Bayerische Motoren Werke Aktiengesellschaft System and method for improving the efficiency in vehicular data access while maintaining data security
WO2022128077A1 (en) * 2020-12-16 2022-06-23 Bayerische Motoren Werke Aktiengesellschaft System and method for improving the efficiency in vehicular data access while maintaining data security

Families Citing this family (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7207067B2 (en) * 2002-11-12 2007-04-17 Aol Llc Enforcing data protection legislation in Web data services
US7334013B1 (en) 2002-12-20 2008-02-19 Microsoft Corporation Shared services management
ATE492085T1 (en) * 2003-01-28 2011-01-15 Cellport Systems Inc A SYSTEM AND METHOD FOR CONTROLLING APPLICATIONS' ACCESS TO PROTECTED RESOURCES WITHIN A SECURE VEHICLE TELEMATICS SYSTEM
US20040225616A1 (en) * 2003-05-09 2004-11-11 Arnold Gordon K. Method, system and computer program product for third-party verification of anonymous e-marketplace transactions using digital signatures
US7600108B2 (en) * 2003-06-17 2009-10-06 Wms Gaming Inc. Gaming machine having reduced-read software authentication
US20050102194A1 (en) * 2003-11-12 2005-05-12 International Business Machines Corporation Method, system, and computer program product for filtering participants in electronic transactions using privacy policies
US20050102534A1 (en) * 2003-11-12 2005-05-12 Wong Joseph D. System and method for auditing the security of an enterprise
US7206758B2 (en) * 2003-11-12 2007-04-17 International Business Machines Corporation Method, system and computer program product for identifying and implementing collected privacy policies as aggregate privacy policies in electronic transactions
US7590705B2 (en) 2004-02-23 2009-09-15 Microsoft Corporation Profile and consent accrual
US8561126B2 (en) * 2004-12-29 2013-10-15 International Business Machines Corporation Automatic enforcement of obligations according to a data-handling policy
US8468361B2 (en) * 2005-09-21 2013-06-18 Broadcom Corporation System and method for securely provisioning and generating one-time-passwords in a remote device
GB2440170B8 (en) * 2006-07-14 2014-07-16 Vodafone Plc Digital rights management
US20160203212A1 (en) * 2006-10-20 2016-07-14 Mcafee, Inc. System, method and computer program product for determining preferences of an entity
US8050811B2 (en) * 2006-12-12 2011-11-01 General Motors Llc Method for controlling the distribution of vehicle-related data
US11482058B2 (en) 2008-09-09 2022-10-25 United Parcel Service Of America, Inc. Systems and methods for utilizing telematics data to improve fleet management operations
CN102203810A (en) 2008-09-09 2011-09-28 美国联合包裹服务公司 Systems and methods of utilizing telematics data to improve fleet management operations
US20110252456A1 (en) * 2008-12-08 2011-10-13 Makoto Hatakeyama Personal information exchanging system, personal information providing apparatus, data processing method therefor, and computer program therefor
US9137209B1 (en) * 2008-12-10 2015-09-15 Amazon Technologies, Inc. Providing local secure network access to remote services
WO2010138449A2 (en) * 2009-05-29 2010-12-02 Oracle America, Inc. Java store
US8826369B2 (en) * 2009-08-11 2014-09-02 Nec Corporation Terminal, communication system, data management method, server and storage medium
US10169599B2 (en) * 2009-08-26 2019-01-01 International Business Machines Corporation Data access control with flexible data disclosure
US9224007B2 (en) * 2009-09-15 2015-12-29 International Business Machines Corporation Search engine with privacy protection
CN102098271B (en) * 2009-12-10 2015-01-07 华为技术有限公司 User information acquisition method, device and system
US9600134B2 (en) 2009-12-29 2017-03-21 International Business Machines Corporation Selecting portions of computer-accessible documents for post-selection processing
US8473324B2 (en) 2010-04-30 2013-06-25 Bank Of America Corporation Assessment of risk associated with international cross border data movement
US9477534B2 (en) 2010-05-18 2016-10-25 Google Inc. Inter-extension messaging
US20120005720A1 (en) * 2010-07-01 2012-01-05 International Business Machines Corporation Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches
US8656452B2 (en) * 2010-07-20 2014-02-18 Hewlett-Packard Development Company, L.P. Data assurance
US9727751B2 (en) 2010-10-29 2017-08-08 Nokia Technologies Oy Method and apparatus for applying privacy policies to structured data
US9208626B2 (en) 2011-03-31 2015-12-08 United Parcel Service Of America, Inc. Systems and methods for segmenting operational data
US9953468B2 (en) 2011-03-31 2018-04-24 United Parcel Service Of America, Inc. Segmenting operational data
US9118686B2 (en) 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US9773102B2 (en) * 2011-09-09 2017-09-26 Microsoft Technology Licensing, Llc Selective file access for applications
US8990561B2 (en) 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
US8813172B2 (en) * 2011-12-16 2014-08-19 Microsoft Corporation Protection of data in a mixed use device
CN103188094A (en) * 2011-12-28 2013-07-03 中国移动通信集团贵州有限公司 Resource data verification system and resource data verification method
US9195853B2 (en) 2012-01-15 2015-11-24 International Business Machines Corporation Automated document redaction
WO2013121790A1 (en) * 2012-02-17 2013-08-22 日本電気株式会社 Information processing device for handling privacy information, information processing system for handling privacy information, and information processing method and program for handling privacy information
US8843820B1 (en) 2012-02-29 2014-09-23 Google Inc. Content script blacklisting for use with browser extensions
US8627097B2 (en) 2012-03-27 2014-01-07 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes
US10607219B2 (en) 2012-06-11 2020-03-31 Visa International Service Association Systems and methods to provide privacy protection for activities related to transactions
EP2680534B1 (en) * 2012-06-28 2017-12-27 Harman Becker Automotive Systems GmbH Logging for telematic systems
US8896858B2 (en) 2012-07-22 2014-11-25 Xerox Corporation Method for enforcing document privacy through third party systems
US10332108B2 (en) * 2012-08-01 2019-06-25 Visa International Service Association Systems and methods to protect user privacy
US9652525B2 (en) 2012-10-02 2017-05-16 Banjo, Inc. Dynamic event detection system and method
US9817997B2 (en) 2014-12-18 2017-11-14 Banjo, Inc. User-generated content permissions status analysis system and method
US10678815B2 (en) 2012-10-02 2020-06-09 Banjo, Inc. Dynamic event detection system and method
US10360352B2 (en) 2012-10-02 2019-07-23 Banjo, Inc. System and method for event-based vehicle operation
US9934368B2 (en) 2012-10-02 2018-04-03 Banjo, Inc. User-generated content permissions status analysis system and method
US9088613B2 (en) 2012-11-13 2015-07-21 Gogo Llc Ground system for vehicle data distribution
US9087193B2 (en) 2012-11-13 2015-07-21 Gogo Llc Communication system and method for nodes associated with a vehicle
US10382555B2 (en) 2012-11-13 2019-08-13 Gogo Llc Vehicle data distribution system and method
US9892278B2 (en) 2012-11-14 2018-02-13 International Business Machines Corporation Focused personal identifying information redaction
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
EP2755158A1 (en) * 2013-01-09 2014-07-16 Thomson Licensing Method and device for privacy-respecting data processing
US9864873B2 (en) * 2013-03-15 2018-01-09 Trustarc Inc Managing data handling policies
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
EP3028214A1 (en) 2013-07-30 2016-06-08 Hewlett Packard Enterprise Development LP Data management
US10257287B2 (en) * 2013-08-28 2019-04-09 Physio-Control, Inc. Real-time data distribution system for patient monitoring devices, cardiac defibrillators and associated information delivery systems
US9805521B1 (en) 2013-12-03 2017-10-31 United Parcel Service Of America, Inc. Systems and methods for assessing turns made by a vehicle
GB2521478B (en) * 2013-12-23 2022-02-02 Arm Ip Ltd Control of data provision
US9520006B1 (en) 2014-08-28 2016-12-13 Allstate Insurance Company Vehicle diagnostics
US9478076B2 (en) 2014-10-24 2016-10-25 Telogis, Inc. Systems and methods for executing custom fleet vehicle management scripts
US10006782B2 (en) * 2014-11-12 2018-06-26 Moj.Io Inc. Characterization of sensor data for vehicle telematics
US10795856B1 (en) * 2014-12-29 2020-10-06 EMC IP Holding Company LLC Methods, systems, and computer readable mediums for implementing a data protection policy for a transferred enterprise application
US11450415B1 (en) * 2015-04-17 2022-09-20 Medable Inc. Methods and systems for health insurance portability and accountability act application compliance
US10309788B2 (en) 2015-05-11 2019-06-04 United Parcel Service Of America, Inc. Determining street segment headings
US10346628B2 (en) * 2015-12-16 2019-07-09 Architecture Technology Corporation Multi-domain application execution management
US10289991B1 (en) 2016-06-13 2019-05-14 Square, Inc. Utilizing APIs to facilitate open ticket synchronization
CN110168556A (en) * 2016-11-10 2019-08-23 惠普发展公司,有限责任合伙企业 Traceability identifier
CN107231405B (en) * 2017-04-18 2018-11-02 北京摩拜科技有限公司 Location based service information cuing method, system and the APP equipment of shared vehicle
US11790470B1 (en) * 2018-03-16 2023-10-17 Block, Inc. Storage service for sensitive customer data
RU2725033C2 (en) * 2018-03-30 2020-06-29 Акционерное общество "Лаборатория Касперского" System and method of creating rules
US11645414B2 (en) * 2018-08-03 2023-05-09 Cox Communications, Inc. Data privacy opt in/out solution
US20200193454A1 (en) * 2018-12-12 2020-06-18 Qingfeng Zhao Method and Apparatus for Generating Target Audience Data
US11314901B2 (en) * 2020-04-20 2022-04-26 Geotab Inc. Method for shared vehicle misuse management
CN112270012B (en) * 2020-11-19 2022-04-12 北京炼石网络技术有限公司 Device, method and system for distributed data security protection
CN112733185A (en) * 2020-12-30 2021-04-30 普华云创科技(北京)有限公司 Method and system for controlling resources based on attribute access
US20220242342A1 (en) * 2021-01-29 2022-08-04 Toyota Motor North America, Inc. Correcting a mismatched user profile for vehicle settings
CN114417418B (en) * 2022-01-24 2024-03-01 重庆长安汽车股份有限公司 Privacy protection method and system for internet of vehicles data processing
DE102022113106A1 (en) 2022-05-24 2023-11-30 Cariad Se Data protection configuration in a data system for vehicles
CN115118507B (en) * 2022-06-29 2023-09-08 支付宝(杭州)信息技术有限公司 Log evidence-storing and log verification method and device suitable for privacy calculation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5164988A (en) * 1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
US5850442A (en) * 1996-03-26 1998-12-15 Entegrity Solutions Corporation Secure world wide electronic commerce over an open network
US20020111919A1 (en) * 2000-04-24 2002-08-15 Visa International Service Association Online payer authentication service
US6560581B1 (en) * 1995-06-29 2003-05-06 Visa International Service Association System and method for secure electronic commerce transaction
US6904417B2 (en) * 2000-01-06 2005-06-07 Jefferson Data Strategies, Llc Policy notice method and system

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69006885T3 (en) * 1989-04-14 1999-05-20 Hitachi Ltd Control device for cars.
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5999908A (en) * 1992-08-06 1999-12-07 Abelow; Daniel H. Customer-based product design module
US6618668B1 (en) * 2000-04-26 2003-09-09 Arrivalstar, Inc. System and method for obtaining vehicle schedule information in an advance notification system
US5675490A (en) * 1993-08-20 1997-10-07 Siemens Aktiengesellschaft Immobilizer for preventing unauthorized starting of a motor vehicle and method for operating the same
EP1431864B2 (en) * 1995-02-13 2012-08-22 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
DE19532067C1 (en) * 1995-08-31 1996-10-24 Daimler Benz Ag Programming system for vehicle electronic key
WO1997025798A1 (en) * 1996-01-11 1997-07-17 Mrj, Inc. System for controlling access and distribution of digital property
US5933503A (en) * 1996-03-15 1999-08-03 Novell, Inc Controlled modular cryptography apparatus and method
FR2746962B1 (en) * 1996-04-01 1998-04-30 Schlumberger Ind Sa SECURITY DEVICE OF A SEMICONDUCTOR PELLET
EP0912954B8 (en) * 1996-07-22 2006-06-14 Cyva Research Corporation Personal information security and exchange tool
DE19721286C1 (en) * 1997-05-21 1998-09-17 Siemens Ag Initialising motor vehicle anti-theft protection system with several portable electronic keys
US6158007A (en) * 1997-09-17 2000-12-05 Jahanshah Moreh Security system for event based middleware
US6304973B1 (en) * 1998-08-06 2001-10-16 Cryptek Secure Communications, Llc Multi-level security network system
US6351812B1 (en) * 1998-09-04 2002-02-26 At&T Corp Method and apparatus for authenticating participants in electronic commerce
US6360254B1 (en) 1998-09-15 2002-03-19 Amazon.Com Holdings, Inc. System and method for providing secure URL-based access to private resources
US6292899B1 (en) * 1998-09-23 2001-09-18 Mcbride Randall C. Volatile key apparatus for safeguarding confidential data stored in a computer system memory
EP1169792A4 (en) * 1998-12-23 2002-01-09 American Calcar Inc Technique for effective communications with, and provision of global positioning system (gps) based advertising information to, automobiles
US6754485B1 (en) * 1998-12-23 2004-06-22 American Calcar Inc. Technique for effectively providing maintenance and information to vehicles
US6260019B1 (en) * 1999-03-05 2001-07-10 Predict It Corporation Web-based prediction marketplace
GB2351588B (en) * 1999-07-01 2003-09-03 Ibm Security for network-connected vehicles and other network-connected processing environments
AU1093501A (en) 1999-12-02 2001-06-12 Lucrates, Inc. System and method for an internet-based consumer-to-business value cycle
DE10008973B4 (en) * 2000-02-25 2004-10-07 Bayerische Motoren Werke Ag Authorization procedure with certificate
US7225460B2 (en) * 2000-05-09 2007-05-29 International Business Machine Corporation Enterprise privacy manager
US20030130893A1 (en) * 2000-08-11 2003-07-10 Telanon, Inc. Systems, methods, and computer program products for privacy protection
US6556905B1 (en) * 2000-08-31 2003-04-29 Lisa M. Mittelsteadt Vehicle supervision and monitoring
US20020029201A1 (en) * 2000-09-05 2002-03-07 Zeev Barzilai Business privacy in the electronic marketplace
US6944679B2 (en) * 2000-12-22 2005-09-13 Microsoft Corp. Context-aware systems and methods, location-aware systems and methods, context-aware vehicles and methods of operating the same, and location-aware vehicles and methods of operating the same
JP2002243591A (en) * 2001-02-22 2002-08-28 Mitsubishi Electric Corp Failure diagnostic device for use in vehicle
US6496774B1 (en) * 2001-05-24 2002-12-17 Prc Inc. Automatic vehicle routing and recommendation system
US7478157B2 (en) * 2001-11-07 2009-01-13 International Business Machines Corporation System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network
SG115453A1 (en) 2002-02-27 2005-10-28 Oneempower Pte Ltd Activity management method
US7353532B2 (en) 2002-08-30 2008-04-01 International Business Machines Corporation Secure system and method for enforcement of privacy policy and protection of confidentiality

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5164988A (en) * 1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
US6560581B1 (en) * 1995-06-29 2003-05-06 Visa International Service Association System and method for secure electronic commerce transaction
US5850442A (en) * 1996-03-26 1998-12-15 Entegrity Solutions Corporation Secure world wide electronic commerce over an open network
US6904417B2 (en) * 2000-01-06 2005-06-07 Jefferson Data Strategies, Llc Policy notice method and system
US20020111919A1 (en) * 2000-04-24 2002-08-15 Visa International Service Association Online payer authentication service

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11790108B2 (en) 2014-12-09 2023-10-17 Early Warning Services, Llc Privacy policy rating system
US10747897B2 (en) 2014-12-09 2020-08-18 Early Warning Services, Llc Privacy policy rating system
US11182769B2 (en) 2015-02-12 2021-11-23 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
US10193700B2 (en) * 2015-02-27 2019-01-29 Samsung Electronics Co., Ltd. Trust-zone-based end-to-end security
US11129018B2 (en) 2015-02-27 2021-09-21 Samsung Electronics Co., Ltd. Payment means operation supporting method and electronic device for supporting the same
US10210347B2 (en) 2015-06-22 2019-02-19 Symantec Corporation Techniques for managing privacy of a network communication
EP3311525A4 (en) * 2015-06-22 2018-11-07 Symantec Corporation Techniques for managing privacy of a network communication
US10846696B2 (en) 2015-08-24 2020-11-24 Samsung Electronics Co., Ltd. Apparatus and method for trusted execution environment based secure payment transactions
US10699274B2 (en) 2015-08-24 2020-06-30 Samsung Electronics Co., Ltd. Apparatus and method for secure electronic payment
CN106936765A (en) * 2015-12-29 2017-07-07 国网智能电网研究院 A kind of end side privacy of user guard method of web service applications
WO2022128078A1 (en) * 2020-12-16 2022-06-23 Bayerische Motoren Werke Aktiengesellschaft System and method for improving the efficiency in vehicular data access while maintaining data security
WO2022128077A1 (en) * 2020-12-16 2022-06-23 Bayerische Motoren Werke Aktiengesellschaft System and method for improving the efficiency in vehicular data access while maintaining data security

Also Published As

Publication number Publication date
US20080307491A1 (en) 2008-12-11
US20040054918A1 (en) 2004-03-18
US8327451B2 (en) 2012-12-04
US7401352B2 (en) 2008-07-15

Similar Documents

Publication Publication Date Title
US7401352B2 (en) Secure system and method for enforcement of privacy policy and protection of confidentiality
CN111316278B (en) Secure identity and profile management system
US11153086B2 (en) Methods and systems for a digital trust architecture
Duri et al. Framework for security and privacy in automotive telematics
AU2002310144B2 (en) System and method for server security and entitlement processing
US11411959B2 (en) Execution of application in a container within a scope of user-granted permission
US20070271618A1 (en) Securing access to a service data object
AU2002310144A1 (en) System and method for server security and entitlement processing
JP2004537095A (en) Information security system
US11238170B2 (en) Delegation using pairwise decentralized identifier
EP4121879A1 (en) Access token for a verifiable claim
GB2386713A (en) Distributed access control
Kwame et al. V-chain: A blockchain-based car lease platform
CN113994630A (en) Presentation interruption for DID attestation
US20220385475A1 (en) Endorsement claim in a verfifiable credential
KR20240015642A (en) Reliable chain of custody for verifiable claims
CN117280346A (en) Method and apparatus for generating, providing and forwarding trusted electronic data sets or certificates based on electronic files associated with a user
Lock et al. Grid Security and its use of X. 509 Certificates
LU101758B1 (en) Digital wallet as a relying party in a decentralized network
CN115022039B (en) Information processing method, apparatus, device and storage medium
US20230319039A1 (en) Securing authentication flows using a decentralized identifier
Belsky et al. Personal data exchange protocol: X
CN115053217A (en) Issuing verifiable paired claims
Pohlmann et al. Infrastructure for trusted environment: In search of a solution
Mbanaso Privacy trust access control infrastructure using XACML

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: DAEDALUS GROUP LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:051032/0784

Effective date: 20190930

AS Assignment

Owner name: DAEDALUS GROUP, LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:051710/0445

Effective date: 20191230

AS Assignment

Owner name: SLINGSHOT IOT LLC, MARYLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DAEDALUS GROUP, LLC;REEL/FRAME:051733/0463

Effective date: 20200129