[go: up one dir, main page]

Biström et al., 2024 - Google Patents

Open-Sourcing a Humanoid Robot: Ensuring Integrity and Privacy of Robot Sensor Data

Biström et al., 2024

Document ID
1669852970641202696
Author
Biström D
Kuvaja Adolfsson K
Tigerstedt C
Espinosa-Leal L
Publication year
Publication venue
International Conference on Smart Technologies & Education

External Links

Snippet

This paper outlines the process of open sourcing key components of a commercial humanoid service robot. Humanoid service robots collect data from their environment, and the integrity of these data streams cannot be ensured for proprietary solutions. The integrity …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details

Similar Documents

Publication Publication Date Title
Khan et al. IoT with multimedia investigation: A secure process of digital forensics chain-of-custody using blockchain hyperledger sawtooth
Hu et al. A survey on data provenance in IoT
Perera et al. Big data privacy in the internet of things era
Lax et al. A Blockchain-based approach for matching desired and real privacy settings of social network users
Gómez Romero et al. Big data meaning in the architecture of IoT for smart cities
Nikouei et al. Decentralized smart surveillance through microservices platform
De Marco et al. Cloud forensic readiness: Foundations
Parkhomenko et al. The application of the remote lab for studying the issues of Smart House systems power efficiency, safety and cybersecurity
Sujatha et al. Cyber Security Applications for Industry 4.0
Chandramohan et al. A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment
Gupta et al. Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications
Georgescu et al. The importance of internet of things security for smart cities
Hernández-Serrano et al. On the road to secure and privacy-preserving iot ecosystems
Chaudhary et al. Model-driven engineering in digital thread platforms: a practical use case and future challenges
Biström et al. Open-Sourcing a Humanoid Robot: Ensuring Integrity and Privacy of Robot Sensor Data
Magare et al. Security and privacy issues in smart city: Threats and their countermeasures
Allegue et al. Toward gdpr compliance in iot systems
Gagliardi et al. Distributed video antifire surveillance system based on IoT embedded computing nodes
Dharani et al. Blockchain for CCTV Surveillance
Kadir et al. Home Monitoring System Based on Cloud Computing Technology and Object Sensor
Clausing et al. Your industrial facility and its IP address: A first approach for cyber-physical attack modeling
Thangavel et al. Security challenges in the IoT paradigm for enterprise information systems
Fernandez-Carrasco et al. ChronoEOS: configuration control system based on EOSIO blockchain for on-running forensic analysis
Sharma et al. A unique approach towards image publication and provenance using blockchain
Gupta et al. Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies