A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users requesting data access and intelligence agents that provide analyses of data stored in the database. As a result, any data or data analysis obtained
A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users requesting data access and intelligence agents that provide analyses of data stored in the database. As a result, any data or data analysis obtained from the system is traceable and reliable.
대표청구항▼
1. A method comprising: receiving, via a gateway, data from a first sensor to store data in a database, wherein the gateway includes a routing table for routing the received data;determining that the first sensor is registered with an authentication server before allowing the data to be stored in th
1. A method comprising: receiving, via a gateway, data from a first sensor to store data in a database, wherein the gateway includes a routing table for routing the received data;determining that the first sensor is registered with an authentication server before allowing the data to be stored in the database by determining that a unique identifier of the first sensor matches a pre-stored identifier of one of a plurality of registered sensors at the authentication server;transmitting the authenticated data to an authentication server for storage in the database;authenticating the first sensor in response to determining that the first sensor is registered with the authentication server; otherwise, determining that the first sensor is not authenticated;storing the data of the first sensor in the database in response to the first sensor being authenticated; otherwise not permitting storage of the data from the first sensor in the database;receiving a request from a data requester for the stored data;determining that the data requester is registered with the authentication server before providing requested data from the database;authenticating the data requester in response to determining that the data requester is registered with the authentication server; otherwise, determining that the data requester is not authenticated; andproviding requested data from the database to the data requester only in response to the data requester being authenticated. 2. The method of claim 1, further comprising: registering analysis requesters with a presentation server;receiving a request from an analysis requester of an analysis of at least some of the data stored in the database;authenticating the analysis requester only when the analysis requester is determined to be one of the registered analysis requesters; andallow the analysis requester access to the database to perform the analysis. 3. The method of claim 1, wherein the aggregated data is obtained from sensors reading RFID (radio frequency identification) tags. 4. The method of claim 1, wherein at least some of the registered sensors measure an aspect of a person's health, the data is personal medical data, and further wherein the mobile gateways include smart phones. 5. The method of claim 1, wherein the data is an encrypted hash value, and further wherein the hash value is generated by a secret hash function known to the sensor that generated the data and the authentication server. 6. The method of claim 1, wherein at least some of the registered sensors measure environmental conditions, the data is environmental data, and further wherein the data analysis provides recommendations for improving crop yields. 7. The method of claim 1, wherein the data requester specifies a presentation format for the requested data, and further wherein subsequent requests for data made by the data requester are presented in the specified presentation format. 8. The method of claim 7, wherein the presentation format is selected from one of the following: instantaneous values of sensor data, graphing of a time series of sensor data with tolerance bars, linear regression or curve fitting of sensor data, and correlation of sensor data against another form of metadata stored in the database. 9. The method of claim 1, wherein authenticating the data requester comprises ensuring payment information is obtained from the data requester for the requested data before providing data to the data requester. 10. A system for authenticating data provided by a network of multiple sensors and providing an authenticated presentation of the data, the system comprising: a fixed gateway comprising memory that stores routing information for routing data aggregated from the network of sensors to an authentication server, and further stores sensor information about which sensors are registered so that the fixed gateway is configured to authenticate a given sensor; anda mobile gateway comprising memory and a processor that is configured to aggregate data from the network of sensors, and wherein each of the mobile gateways includes a routing table for routing the aggregated data to the fixed gateway,wherein the authentication server configured to: authenticate the fixed gateway;receive the data from the fixed gateway;store the data in the database; andreceive a request from a data requester;determining if the data requester is authenticated to receive data from the database;providing requested data from the database to the data requested only when the data requester is authenticated by the authentication server. 11. The system of claim 10, further comprising a presentation server configured to: register analysis requesters with the presentation server;receive a request from an analysis requester of an analysis of at least some of the data stored in the database;authenticate the analysis requester only when the analysis requester is determined to be one of the registered analysis requesters; andallow the analysis requester access to the database to perform the analysis. 12. The system of claim 10, wherein when the fixed gateway does not have the information to authenticate a sensor, and the fixed gateway queries the authentication server for authentication information. 13. The system of claim 10, wherein the authentication server is one of multiple authentication servers, and further wherein the routing information stored at the fixed gateway routes data aggregated from the network of sensors to a predetermined one of the multiple authentication servers. 14. The system of claim 10, wherein the data is obtained from sensors reading RFID (radio frequency identification) tags to determine a position of the RFID tags. 15. The system of claim 10, wherein the presentation server is further configured to provide a list of analysts for performing the analysis. 16. A method comprising: receiving first data from a first sensor at a server;receiving second data from a second sensor at the server;aggregating, via a gateway, data from at least some of the sensors andtransmitting the aggregated data to an authentication server for storage in a database, wherein the gateway includes a routing table for routing the aggregated data;authenticating the first sensor in response to determining that the first sensor is registered with the server;denying authentication of the second sensor in response to determining that the second sensor is not registered with the server;storing the received first data in the database in response to the first sensor being authenticated by the server as a registered sensor;preventing storage of the received second data in the database in response to the second sensor being denied authentication to the server. 17. The method of claim 16, further comprising: registering analysis requesters as registered sensors;receiving a request from an analysis requester for an analysis of at least some of the stored data;authenticating the analysis requester in response to determining that the analysis requester is authorized with the server as a registered analysis requester; andproviding access to the at least some of the stored data to the analysis requester or an analyst only in response to the analysis requester being authenticated. 18. The method of claim 17, further comprising ensuring payment information is obtained from the analysis requester for the requested analysis before providing analysis to the analysis requester. 19. The method of claim 16, wherein the first data is obtained from sensors reading RFID (radio frequency identification) tags to determine a position of the RFID tag.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (9)
Curtiss, David, Adaptive security network, sensor node and method for detecting anomalous events in a security network.
Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked hybrid wireless integrated network sensors (WINS).
Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method and apparatus for distributed signal processing among internetworked wireless integrated network sensors (WINS).
Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method and apparatus for internetworked wireless integrated network sensor (WINS) nodes.
Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
※ AI-Helper는 부적절한 답변을 할 수 있습니다.