Method and opportunistic sensing
First Claim
1. A method in a group of devices for anonymously delivering data from a sampling device to a task initiator, the group of devices comprising at least one device acting as the sampling device, and one or more devices acting as intermediate devices, the method comprising:
- the task initiator initiating a task,the sampling devicecreating a data sample related to the initiated task,calculating a hash based on at least the data sample,encrypting the hash with a public key of the sampling device,encrypting the created data sample and the encrypted hash with a public key of the task initiator to produce a protected sample, andcommunicating the protected sample to one of the one or more intermediate devices,one of the one or more intermediate devices delivering the protected sample to the task initiator, such that the task initiator does not know the identity of the sampling device, and only the identity of said one of the one or more intermediate devices that delivered the protected sample to the task initiator,wherein the group of devices are participants in opportunistic sensing.
4 Assignments
0 Petitions
Accused Products
Abstract
A method in a first device for anonymously delivering data to a part that has initiated a task is provided. The first device and the part initiating a task are participants in opportunistic sensing. The method comprises creating a data sample and encrypting the data sample with a public key of the task initiating part. After communicating the protected sample to one or more intermediate devices, one of the one or more intermediate devices delivers the protected sample to the task initiating part, such that the task initiating part does not know the identity of the first device. The task initiating device only know the identity of the one of the one or more intermediate devices that delivered the protected sample to the task initiating part, wherein the intermediate devices are participants in the opportunistic sensing.
24 Citations
17 Claims
-
1. A method in a group of devices for anonymously delivering data from a sampling device to a task initiator, the group of devices comprising at least one device acting as the sampling device, and one or more devices acting as intermediate devices, the method comprising:
-
the task initiator initiating a task, the sampling device creating a data sample related to the initiated task, calculating a hash based on at least the data sample, encrypting the hash with a public key of the sampling device, encrypting the created data sample and the encrypted hash with a public key of the task initiator to produce a protected sample, and communicating the protected sample to one of the one or more intermediate devices, one of the one or more intermediate devices delivering the protected sample to the task initiator, such that the task initiator does not know the identity of the sampling device, and only the identity of said one of the one or more intermediate devices that delivered the protected sample to the task initiator, wherein the group of devices are participants in opportunistic sensing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A multiprocessor system for anonymously delivering data from a sampling device to a task initiator, the system comprising:
-
a task initiator comprising a processor executing a computer program stored on a non-transitory computer readable storage medium, which causes the processor to initiate a task, and a group of devices being participants in opportunistic sensing, wherein the group comprises; at least one sampling device comprising a processor executing a computer program stored on a non-transitory computer readable storage medium, which causes the processor to create a data sample, calculate a hash based on at least the data sample, encrypt the hash with a public key of the sampling device, encrypt the data sample and the encrypted hash with a public key of the task initiator to produce a protected sample, and communicate the protected sample to one or more devices acting as intermediate devices, and one or more intermediate devices, each comprising a processor executing a computer program stored on a non-transitory computer readable storage medium, which causes the processor to deliver the protected sample to the task initiator, wherein the task initiating part does not know the identity of the sampling device, only the identity of the device acting as delivering device delivering the protected sample to the task initiating part. - View Dependent Claims (16)
-
-
15. A non-transitory computer readable storage medium having computer readable program code embodied therein, wherein execution of the computer readable program code by processors in a multiprocessor system causes the processors to execute a method in a group of devices for anonymously delivering data from a sampling device to a task initiator, the group of devices comprising at least one device acting as the sampling device, and one or more devices acting as intermediate devices, the method comprising:
-
the task initiator initiating a task, the sampling device creating a data sample related to the initiated task, calculating a hash based on at least the data sample, encrypting the hash with a public key of the sampling device, encrypting the created data sample and the encrypted hash with a public key of the task initiator to produce a protected sample, and communicating the protected sample to one of the one or more intermediate devices, one of the one or more intermediate devices delivering the protected sample to the task initiator, such that the task initiator does not know the identity of the sampling device, and only the identity of said one of the one or more intermediate devices that delivered the protected sample to the task initiator. - View Dependent Claims (17)
-
Specification