Browse Prior Art Database

Methods and apparatus for user's privacy protection in IOT

IP.com Disclosure Number: IPCOM000203241D
Publication Date: 2011-Jan-21
Document File: 4 page(s) / 158K

Publishing Venue

The IP.com Prior Art Database

Abstract

The method proposed in the disclosure is to submit one target query together with multiple non-target queries and the non-target queries are selected intentionally. An apparatus is designed to implement the proposed method with the component in mobile terminal and in k-margin random series generator.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 34% of the total text.

Page 01 of 4

Methods and apparatus for user's privacy protection in IOT

Internet of Things (IOT)

will play an important role to make our society and lives smarter

                                                        . When tremendous objects around us are connected and instrumented, more and more messages and information will be collected and analyzed for better life, efficient operations, lower energy consumption, etc.

When IOT is deployed widely and lots of information is collected and processed, privacy leak will be a key concern for adopting IOT solutions, especially for the solutions which are related to our daily life. Since the collected information from individual's activities is always with the person's privacy while lots of IOT applications need to monitor and collect individual's information,

we need a method to protect users

'privacy in IOT applications.

In common Internet applications, the terminal (i.e., the computer) is not associated with a specific user, so the privacy information collected from a computer

will not be associated with the user of the computer

                                 . However, in many IOT applications, the terminal (such as mobile phone, healthcare instrument) are always associated with a specific user, and the association information is held by third part companies (such as telecom, or hospital). Once the association information is leaked to a malicious person or company, it can be used to associate the collected privacy to the actual individual. Since we cannot ensure that the association information can be protected with no problem,

we should seek for a method that can prevent associating collected and analyzed privacy

information to an actual person even if the association between the terminal and the person is leaked.

A typical application scenario of IOT is like this: a user in a supermarket finds a product and he wants to know more information about this product, he uses its mobile phone embedded with RFID scanner to scan the product and obtain the tag of this product. Then the mobile phone can use the tag as index to search for the related information from a website. In such a scenario, the website can analyze the behavior and mine lots of information about the user of the mobile phone. For example, it can associate the queried product with the user of the mobile phone. In this way, the user's privacy is leaked since the product may have special meaning to this user. For example, a special drug may imply that the user or his relative has a special kind of disease.

The method and apparatus proposed in this disclosure aims at the privacy protection in the mentioned typical scenario, that is to say,

we propose a method to

make sure that when a user queries information through IOT terminals, his privacy can not be analyzed and dug out.

The method proposed in the disclosure is to submit one target query together with multiple non-target queries and the non-target queries are selected intentionally. In this way, the receiver of these queries can not analyze and dig out privacy inform...