Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for controlling lighting nodes of a lighting system associated with a lighting infrastructure based on composited lighting models. An embodiment method performed by a processor of a computing device may include operations for obtaining a plurality of lighting model outputs generated by lighting control algorithms that utilize sensor data obtained from one or more sensor nodes within the lighting infrastructure, combining the plurality of lighting model outputs in an additive fashion to generate a composited lighting model, calculating lighting parameters for a lighting node within the lighting infrastructure based on the composited lighting model and other factors, and generating a lighting control command for configuring the lighting node within the lighting infrastructure using the calculated lighting parameters. The method may be performed by any combination of lighting node(s), sensor node(s), a remote server, and/or other devices within the lighting infrastructure.
Abstract:
In one example, a method of protecting customer data in a networked system comprises collecting sensor data available at sensor nodes within a sensor network in communication with a service data platform over a network. The method includes encrypting the sensor data using a certified public key associated with a customer key-pair, the sensor data representing the customer data associated with sensitive identification information. The sensor data is cryptographically signed with a device private key. The method includes transporting the encrypted sensor data to the service data platform for storage, and decrypting at the service data platform, the encrypted sensor data using a private key sharing scheme that reconstructs the private key associated with the customer key-pair using a first share and a password encrypted second share, the first share assigned to the service data platform and the password encrypted second share assigned to a customer of the customer key-pair.
Abstract:
In one example, a method of protecting customer data in a networked system comprises collecting sensor data available at sensor nodes within a sensor network in communication with a service data platform over a network. The method includes encrypting the sensor data using a certified public key associated with a customer key-pair, the sensor data representing the customer data associated with sensitive identification information. The sensor data is cryptographically signed with a device private key. The method includes transporting the encrypted sensor data to the service data platform for storage, and decrypting at the service data platform, the encrypted sensor data using a private key sharing scheme that reconstructs the private key associated with the customer key-pair using a first share and a password encrypted second share, the first share assigned to the service data platform and the password encrypted second share assigned to a customer of the customer key-pair.
Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for controlling lighting nodes of a lighting system associated with a lighting infrastructure based on composited lighting models. An embodiment method performed by a processor of a computing device may include operations for obtaining a plurality of lighting model outputs generated by lighting control algorithms that utilize sensor data obtained from one or more sensor nodes within the lighting infrastructure, combining the plurality of lighting model outputs in an additive fashion to generate a composited lighting model, calculating lighting parameters for a lighting node within the lighting infrastructure based on the composited lighting model and other factors, and generating a lighting control command for configuring the lighting node within the lighting infrastructure using the calculated lighting parameters. The method may be performed by any combination of lighting node(s), sensor node(s), a remote server, and/or other devices within the lighting infrastructure.
Abstract:
In various example embodiments, a system and method are provided for protection customer data collected at sensor nodes within a networked system. A key recovery module determines the encrypted sensor data in a request was encrypted with a certified public key associated with a first customer key-pair. The first customer key-pair represents a recovered private key. The key recovery module determines the private key associated with the first customer key-pair is encrypted with the private key associated with a second customer key-pair. The private key associated with the first customer key-pair is decrypted by using the private key associated with the second customer key-pair. The encrypted sensor data in the request is decrypted using the decrypted private key associated with the first customer key-pair.