Biström et al., 2024 - Google Patents
Open-Sourcing a Humanoid Robot: Ensuring Integrity and Privacy of Robot Sensor DataBiström et al., 2024
- Document ID
- 1669852970641202696
- Author
- Biström D
- Kuvaja Adolfsson K
- Tigerstedt C
- Espinosa-Leal L
- Publication year
- Publication venue
- International Conference on Smart Technologies & Education
External Links
Snippet
This paper outlines the process of open sourcing key components of a commercial humanoid service robot. Humanoid service robots collect data from their environment, and the integrity of these data streams cannot be ensured for proprietary solutions. The integrity …
- 238000012358 sourcing 0 title abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | IoT with multimedia investigation: A secure process of digital forensics chain-of-custody using blockchain hyperledger sawtooth | |
Hu et al. | A survey on data provenance in IoT | |
Perera et al. | Big data privacy in the internet of things era | |
Lax et al. | A Blockchain-based approach for matching desired and real privacy settings of social network users | |
Gómez Romero et al. | Big data meaning in the architecture of IoT for smart cities | |
Nikouei et al. | Decentralized smart surveillance through microservices platform | |
De Marco et al. | Cloud forensic readiness: Foundations | |
Parkhomenko et al. | The application of the remote lab for studying the issues of Smart House systems power efficiency, safety and cybersecurity | |
Sujatha et al. | Cyber Security Applications for Industry 4.0 | |
Chandramohan et al. | A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment | |
Gupta et al. | Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications | |
Georgescu et al. | The importance of internet of things security for smart cities | |
Hernández-Serrano et al. | On the road to secure and privacy-preserving iot ecosystems | |
Chaudhary et al. | Model-driven engineering in digital thread platforms: a practical use case and future challenges | |
Biström et al. | Open-Sourcing a Humanoid Robot: Ensuring Integrity and Privacy of Robot Sensor Data | |
Magare et al. | Security and privacy issues in smart city: Threats and their countermeasures | |
Allegue et al. | Toward gdpr compliance in iot systems | |
Gagliardi et al. | Distributed video antifire surveillance system based on IoT embedded computing nodes | |
Dharani et al. | Blockchain for CCTV Surveillance | |
Kadir et al. | Home Monitoring System Based on Cloud Computing Technology and Object Sensor | |
Clausing et al. | Your industrial facility and its IP address: A first approach for cyber-physical attack modeling | |
Thangavel et al. | Security challenges in the IoT paradigm for enterprise information systems | |
Fernandez-Carrasco et al. | ChronoEOS: configuration control system based on EOSIO blockchain for on-running forensic analysis | |
Sharma et al. | A unique approach towards image publication and provenance using blockchain | |
Gupta et al. | Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies |