SECURE DATA CONTAINER FOR AN AMBIENT INTELLIGENT ENVIRONMENT
First Claim
1. A method comprising:
- collecting a set of information from a first digital network information endpoint associated with a vehicle;
associating, by use of a data processor, a persistent digital identifier with the collected information, the persistent digital identifier being derived from information associated with the vehicle;
enabling a user to specify a shared data set from the collected information;
enabling the user to specify a set of sharing controls corresponding to the shared data set;
combining information identifying the shared data set and the sharing controls in a secure container; and
enabling a second digital network information endpoint access the shared data set via the secure container upon presentation of a valid secure access token.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a secure data container for an ambient intelligent environment are disclosed. A particular embodiment includes: collecting a set of information from a first digital network information endpoint associated with a vehicle; associating, by use of a data processor, a persistent digital identifier with the collected information, the persistent digital identifier being derived from information associated with the vehicle; enabling a user to specify a shared data set from the collected information; enabling the user to specify a set of sharing controls corresponding to the shared data set; combining information identifying the shared data set and the sharing controls in a secure container; and enabling to second digital network information endpoint to access the shared data set via the secure container upon presentation of a valid secure access token.
-
Citations
20 Claims
-
1. A method comprising:
-
collecting a set of information from a first digital network information endpoint associated with a vehicle; associating, by use of a data processor, a persistent digital identifier with the collected information, the persistent digital identifier being derived from information associated with the vehicle; enabling a user to specify a shared data set from the collected information; enabling the user to specify a set of sharing controls corresponding to the shared data set; combining information identifying the shared data set and the sharing controls in a secure container; and enabling a second digital network information endpoint access the shared data set via the secure container upon presentation of a valid secure access token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
one or more data processors; and a vehicle-based Distributed Shared Data Object system, executable by the one or more data processors, to; collect a set of information from a first digital network information endpoint associated with a vehicle; associate a persistent digital identifier with the collected information, the persistent digital identifier being derived from information associated with the vehicle; enable a user to specify a shared data set from the collected information; enable the user to specify a set of sharing controls corresponding to the shared data set; combine information identifying the shared data set and the sharing controls in a secure container; and enable a second digital network information endpoint to access the shared data set via the secure container upon presentation of a valid secure access token. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory machine-useable storage medium embodying instructions which, when executed by as machine, cause the machine to:
-
collect a set of information from a first digital network information endpoint associated with a vehicle; associate a persistent digital identifier with the collected information, the persistent digital identifier being derived from information associated with the vehicle; enable a user to specify a shared data set from the collected information; enable the user to specify a set of sharing controls corresponding to the shared data set; combine information identifying the shared data set and the sharing controls in a secure container; and enable a second digital network information endpoint to access the shared data set via the secure container upon presentation of a valid secure access token. - View Dependent Claims (20)
-
Specification