SlideShare a Scribd company logo
1 of 18
Download to read offline
PageSierra Wireless Proprietary and Confidential 1
The Vigisanté project &
Matters of importance for M2M E-Health
ETSI M2M Workshop, 24th-25th October 2012, Mandelieu, France
Nicolas Damour – Senior Manager, Business & Innovation Development – ndamour@sierrawireless.com
Page
The Vigisanté Project
• Arterial hypertension - a public health issue
• Stakeholders and perimeter
• Solution description and highlights
Matters of importance for M2M E-Health
• Regulation and Standardization
• M2M Platforms Interoperability
• Medical Data Security and Privacy
2
Agenda
© Sierra Wireless 2012
Page 3
Vigisanté Project - Arterial hypertension
© Sierra Wireless 2012
Source: World Health Organization and Global Health Observatory, 2011. http://www.who.int
Percentages of population aged 25 years and over with raised blood pressure (systolic ≥140 or diastolic ≥90).
Number one cause of deaths in the world
23.6% of all deaths – 13.4 million deaths per year
15 million
hypertensive people
in France
29% 16%29% 25%
1.9 billion
hypertensive people
in the world
Less than 50% of people aware of their condition
Page
Vigisanté Project - Stakeholders
4© Sierra Wireless 2012
Page
• Nord – Pas-de-Calais region
• 22000 employees of more than 50 companies
• 4000 screened candidates
• 1000 actual patients
Vigisanté Project - Perimeter
5© Sierra Wireless 2012
April 2010
Call for
e-health projects
November 2010
Vigisanté project
awarded funding
June 2012
End of
screening
April 2013
Planned end of first
phase and extension
2011 20122010 2013
December 2011
Candidates
screening
Page
Vigisanté Project - Solution Overview
Scales
Electrocardiograph
Pill dispenser on
communications base
GSM Network
AirVantage M2M Cloud
Business
Web-application
MMC Server
(ECG data)
Inovelan
Appliance
Participants
Doctors
Medicalized support
(Patient’s home)
(Medical center)
6© Sierra Wireless 2012
Tensiometer
Page
Platforms Interoperability
Regulatory aspects
Business model
Vigisanté Project – Important Aspects
7© Sierra Wireless 2012
Page
95/46/CE Directive on Protection of Personal data
Data must be kept on European territory
Exceptions: Canada, Switzerland, Argentina
Privacy – Transaction – Security (admin, physical, technical)
Unique Identifier – Enforcement
Data must be kept on US territory
Seven principles
Notice – Choice – Onward Transfer – Security
Data Integrity – Access – Enforcement
Legal - Regulation
8© Sierra Wireless 2012
Page
Medical devices
IEC 60601 US FDA 510K process
Information technologies
Health and Data Semantics
ISO 27005
ISO 13485
Technological - Standardization
9© Sierra Wireless 2012
Page
• Service Oriented Architecture
• Service Abstraction Layer
• RESTful Architecture and APIs
M2M Platforms Interoperability
10© Sierra Wireless 2012
Page
Confidentiality
Prevention of disclosure of information to unauthorized individuals or systems.
Confidentiality is necessary (but not sufficient) for privacy
Integrity
Prevention of undetectable modification of the data
Accessibility
The information must be available when it is needed
Medical Data Security and Privacy
11© Sierra Wireless 2012
Page
Security Chain
12
GSM Network
Data Center
and Application
Service User
on Web Client Internet
© Sierra Wireless 2012
Page 13
M2M Communications Security
Security based on credentials :
• Server unique identity
• Device unique identity
• Nonce: one-time password, different for each session
• Public keys and Hardware Security Modules
Implementation:
• HMAC-MD5 or HMAC-SHA1 authentication
• AES Cypher Block Chaining and Counter Mode encryption
• 128 and 256 bits encryption
• Hardware security modules to store keys
© Sierra Wireless 2012
Page
M2M Cloud Security
• Physical Security
• Locks, Card reader access
• Security guards, Motion sensors and cameras
• Controlled environment
• Backup power, Fire containment
• Redundant network connections
• Low probability of natural disasters
• Application Security
• Monitoring of access logs
• Backups of data and OS
• Periodic Security Testing
• Firewall
• Redundancy and Data Recovery plans
• Tier 3+ Datacenters, SAS70 Type II audits, ISO certification
14© Sierra Wireless 2012
Page
Web Security
• Web Authentication over HTTPS, 256 bits data encryption
• Option to use RSA SecurID tokens for user authentication
• Virtual Private Networks
15© Sierra Wireless 2012
Page
Conclusion – Questions?
Nicolas DAMOUR
Senior Manager, Business & Innovation Development
ndamour@sierrawireless.com
Phone: +33 670 706 003
Page
Backup Slides
17
Page 18
Vigisanté Project - Arterial hypertension
© Sierra Wireless 2012
Arterial hypertension in countries per income Men Women
High income (eg. USA, Japan, Germany, France, United Kingdom) 24,8% 17,4%
Upper middle income (eg. China, Brazil, Russia, Mexico, Iran) 35,3% 28,3%
Lower middle income (eg. India, Indonesia, Pakistan, Nigeria) 28,7% 26,0%
Low income (eg. Bangladesh, Dem. Rep. of Congo, Ethiopia) 32,9% 29,9%
Source: World Health Organization and Global Health Observatory, 2011. http://www.who.int
Percentages of population aged 25 years and over with raised blood pressure (systolic ≥140 or diastolic ≥90).
Income-group aggregates are based on the 2008 World Bank list of economies: http://siteresources.worldbank.org/DATASTATISTICS/Resources/CLASS.XLS
29,1% 16,2%
29,2% 24,8%
Number one cause of deaths in the world
23,6% of all deaths – 13,4 million deaths per year
15 millions total
in France

More Related Content

What's hot

Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sectoracinfotec
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...TI Safe
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)TI Safe
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Jack Shaffer
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiBL4CKSWAN Srl
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
5 star technology advertising 2015
5 star technology advertising 20155 star technology advertising 2015
5 star technology advertising 2015leopoldgiterson
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
How 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersHow 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersrajpatel787077
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 

What's hot (20)

Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sector
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
Ijisa
IjisaIjisa
Ijisa
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
5 star technology advertising 2015
5 star technology advertising 20155 star technology advertising 2015
5 star technology advertising 2015
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
How 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturersHow 5g technology affects cctv camera manufacturers
How 5g technology affects cctv camera manufacturers
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
HIPAA
HIPAAHIPAA
HIPAA
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 

Similar to Vigisanté Project

Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your DataInnoTech
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Maganathin Veeraragaloo
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataUlf Mattsson
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Digitalization for profitability and cost optimisation. revised
Digitalization for profitability and cost optimisation. revisedDigitalization for profitability and cost optimisation. revised
Digitalization for profitability and cost optimisation. revisedAbdulRahman Mijinyawa
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Webinartestforslideshare
WebinartestforslideshareWebinartestforslideshare
WebinartestforslideshareColin Walls
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 

Similar to Vigisanté Project (20)

Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big data
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Digitalization for profitability and cost optimisation. revised
Digitalization for profitability and cost optimisation. revisedDigitalization for profitability and cost optimisation. revised
Digitalization for profitability and cost optimisation. revised
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Webinartestforslideshare
WebinartestforslideshareWebinartestforslideshare
Webinartestforslideshare
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 

More from Nicolas Damour

Cellular LPWA and LTE-M
Cellular LPWA and LTE-MCellular LPWA and LTE-M
Cellular LPWA and LTE-MNicolas Damour
 
LTE-M & NB-IoT Roadmap at LPWAN Conference 2018
LTE-M & NB-IoT Roadmap at LPWAN Conference 2018LTE-M & NB-IoT Roadmap at LPWAN Conference 2018
LTE-M & NB-IoT Roadmap at LPWAN Conference 2018Nicolas Damour
 
LTE-M - LTE for Machines
LTE-M - LTE for MachinesLTE-M - LTE for Machines
LTE-M - LTE for MachinesNicolas Damour
 
Combining LwM2M and OneM2M
Combining LwM2M and OneM2MCombining LwM2M and OneM2M
Combining LwM2M and OneM2MNicolas Damour
 
The future of IoT Connectivity
The future of IoT ConnectivityThe future of IoT Connectivity
The future of IoT ConnectivityNicolas Damour
 
Interoperability for Water Management in Smart Cities
Interoperability for Water Management in Smart CitiesInteroperability for Water Management in Smart Cities
Interoperability for Water Management in Smart CitiesNicolas Damour
 
Cellular LPWA for the IoT
Cellular LPWA for the IoTCellular LPWA for the IoT
Cellular LPWA for the IoTNicolas Damour
 
Close encounters of the Seventh Kind
Close encounters of the Seventh KindClose encounters of the Seventh Kind
Close encounters of the Seventh KindNicolas Damour
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MNicolas Damour
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsNicolas Damour
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership ProjectNicolas Damour
 
Standards horizontaux pour l'IoT
Standards horizontaux pour l'IoTStandards horizontaux pour l'IoT
Standards horizontaux pour l'IoTNicolas Damour
 
Optimized Communication Management
Optimized Communication ManagementOptimized Communication Management
Optimized Communication ManagementNicolas Damour
 
M2M Service Optimization
M2M Service OptimizationM2M Service Optimization
M2M Service OptimizationNicolas Damour
 
M2M and IoT - Two words for two meetings worlds
M2M and IoT - Two words for two meetings worldsM2M and IoT - Two words for two meetings worlds
M2M and IoT - Two words for two meetings worldsNicolas Damour
 
Lasting Solutions for Electric Vehicle Charging Stations
Lasting Solutions for Electric Vehicle Charging StationsLasting Solutions for Electric Vehicle Charging Stations
Lasting Solutions for Electric Vehicle Charging StationsNicolas Damour
 
Build wireless M2M solutions easily
Build wireless M2M solutions easilyBuild wireless M2M solutions easily
Build wireless M2M solutions easilyNicolas Damour
 

More from Nicolas Damour (19)

Cellular LPWA and LTE-M
Cellular LPWA and LTE-MCellular LPWA and LTE-M
Cellular LPWA and LTE-M
 
LTE-M & NB-IoT Roadmap at LPWAN Conference 2018
LTE-M & NB-IoT Roadmap at LPWAN Conference 2018LTE-M & NB-IoT Roadmap at LPWAN Conference 2018
LTE-M & NB-IoT Roadmap at LPWAN Conference 2018
 
LTE-M - LTE for Machines
LTE-M - LTE for MachinesLTE-M - LTE for Machines
LTE-M - LTE for Machines
 
3GPP LTE-M Standard
3GPP LTE-M Standard3GPP LTE-M Standard
3GPP LTE-M Standard
 
Combining LwM2M and OneM2M
Combining LwM2M and OneM2MCombining LwM2M and OneM2M
Combining LwM2M and OneM2M
 
The future of IoT Connectivity
The future of IoT ConnectivityThe future of IoT Connectivity
The future of IoT Connectivity
 
Introduction to LTE-M
Introduction to LTE-MIntroduction to LTE-M
Introduction to LTE-M
 
Interoperability for Water Management in Smart Cities
Interoperability for Water Management in Smart CitiesInteroperability for Water Management in Smart Cities
Interoperability for Water Management in Smart Cities
 
Cellular LPWA for the IoT
Cellular LPWA for the IoTCellular LPWA for the IoT
Cellular LPWA for the IoT
 
Close encounters of the Seventh Kind
Close encounters of the Seventh KindClose encounters of the Seventh Kind
Close encounters of the Seventh Kind
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2M
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery Platforms
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership Project
 
Standards horizontaux pour l'IoT
Standards horizontaux pour l'IoTStandards horizontaux pour l'IoT
Standards horizontaux pour l'IoT
 
Optimized Communication Management
Optimized Communication ManagementOptimized Communication Management
Optimized Communication Management
 
M2M Service Optimization
M2M Service OptimizationM2M Service Optimization
M2M Service Optimization
 
M2M and IoT - Two words for two meetings worlds
M2M and IoT - Two words for two meetings worldsM2M and IoT - Two words for two meetings worlds
M2M and IoT - Two words for two meetings worlds
 
Lasting Solutions for Electric Vehicle Charging Stations
Lasting Solutions for Electric Vehicle Charging StationsLasting Solutions for Electric Vehicle Charging Stations
Lasting Solutions for Electric Vehicle Charging Stations
 
Build wireless M2M solutions easily
Build wireless M2M solutions easilyBuild wireless M2M solutions easily
Build wireless M2M solutions easily
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Vigisanté Project

  • 1. PageSierra Wireless Proprietary and Confidential 1 The Vigisanté project & Matters of importance for M2M E-Health ETSI M2M Workshop, 24th-25th October 2012, Mandelieu, France Nicolas Damour – Senior Manager, Business & Innovation Development – ndamour@sierrawireless.com
  • 2. Page The Vigisanté Project • Arterial hypertension - a public health issue • Stakeholders and perimeter • Solution description and highlights Matters of importance for M2M E-Health • Regulation and Standardization • M2M Platforms Interoperability • Medical Data Security and Privacy 2 Agenda © Sierra Wireless 2012
  • 3. Page 3 Vigisanté Project - Arterial hypertension © Sierra Wireless 2012 Source: World Health Organization and Global Health Observatory, 2011. http://www.who.int Percentages of population aged 25 years and over with raised blood pressure (systolic ≥140 or diastolic ≥90). Number one cause of deaths in the world 23.6% of all deaths – 13.4 million deaths per year 15 million hypertensive people in France 29% 16%29% 25% 1.9 billion hypertensive people in the world Less than 50% of people aware of their condition
  • 4. Page Vigisanté Project - Stakeholders 4© Sierra Wireless 2012
  • 5. Page • Nord – Pas-de-Calais region • 22000 employees of more than 50 companies • 4000 screened candidates • 1000 actual patients Vigisanté Project - Perimeter 5© Sierra Wireless 2012 April 2010 Call for e-health projects November 2010 Vigisanté project awarded funding June 2012 End of screening April 2013 Planned end of first phase and extension 2011 20122010 2013 December 2011 Candidates screening
  • 6. Page Vigisanté Project - Solution Overview Scales Electrocardiograph Pill dispenser on communications base GSM Network AirVantage M2M Cloud Business Web-application MMC Server (ECG data) Inovelan Appliance Participants Doctors Medicalized support (Patient’s home) (Medical center) 6© Sierra Wireless 2012 Tensiometer
  • 7. Page Platforms Interoperability Regulatory aspects Business model Vigisanté Project – Important Aspects 7© Sierra Wireless 2012
  • 8. Page 95/46/CE Directive on Protection of Personal data Data must be kept on European territory Exceptions: Canada, Switzerland, Argentina Privacy – Transaction – Security (admin, physical, technical) Unique Identifier – Enforcement Data must be kept on US territory Seven principles Notice – Choice – Onward Transfer – Security Data Integrity – Access – Enforcement Legal - Regulation 8© Sierra Wireless 2012
  • 9. Page Medical devices IEC 60601 US FDA 510K process Information technologies Health and Data Semantics ISO 27005 ISO 13485 Technological - Standardization 9© Sierra Wireless 2012
  • 10. Page • Service Oriented Architecture • Service Abstraction Layer • RESTful Architecture and APIs M2M Platforms Interoperability 10© Sierra Wireless 2012
  • 11. Page Confidentiality Prevention of disclosure of information to unauthorized individuals or systems. Confidentiality is necessary (but not sufficient) for privacy Integrity Prevention of undetectable modification of the data Accessibility The information must be available when it is needed Medical Data Security and Privacy 11© Sierra Wireless 2012
  • 12. Page Security Chain 12 GSM Network Data Center and Application Service User on Web Client Internet © Sierra Wireless 2012
  • 13. Page 13 M2M Communications Security Security based on credentials : • Server unique identity • Device unique identity • Nonce: one-time password, different for each session • Public keys and Hardware Security Modules Implementation: • HMAC-MD5 or HMAC-SHA1 authentication • AES Cypher Block Chaining and Counter Mode encryption • 128 and 256 bits encryption • Hardware security modules to store keys © Sierra Wireless 2012
  • 14. Page M2M Cloud Security • Physical Security • Locks, Card reader access • Security guards, Motion sensors and cameras • Controlled environment • Backup power, Fire containment • Redundant network connections • Low probability of natural disasters • Application Security • Monitoring of access logs • Backups of data and OS • Periodic Security Testing • Firewall • Redundancy and Data Recovery plans • Tier 3+ Datacenters, SAS70 Type II audits, ISO certification 14© Sierra Wireless 2012
  • 15. Page Web Security • Web Authentication over HTTPS, 256 bits data encryption • Option to use RSA SecurID tokens for user authentication • Virtual Private Networks 15© Sierra Wireless 2012
  • 16. Page Conclusion – Questions? Nicolas DAMOUR Senior Manager, Business & Innovation Development ndamour@sierrawireless.com Phone: +33 670 706 003
  • 18. Page 18 Vigisanté Project - Arterial hypertension © Sierra Wireless 2012 Arterial hypertension in countries per income Men Women High income (eg. USA, Japan, Germany, France, United Kingdom) 24,8% 17,4% Upper middle income (eg. China, Brazil, Russia, Mexico, Iran) 35,3% 28,3% Lower middle income (eg. India, Indonesia, Pakistan, Nigeria) 28,7% 26,0% Low income (eg. Bangladesh, Dem. Rep. of Congo, Ethiopia) 32,9% 29,9% Source: World Health Organization and Global Health Observatory, 2011. http://www.who.int Percentages of population aged 25 years and over with raised blood pressure (systolic ≥140 or diastolic ≥90). Income-group aggregates are based on the 2008 World Bank list of economies: http://siteresources.worldbank.org/DATASTATISTICS/Resources/CLASS.XLS 29,1% 16,2% 29,2% 24,8% Number one cause of deaths in the world 23,6% of all deaths – 13,4 million deaths per year 15 millions total in France