SlideShare a Scribd company logo
#CONNECT2013
2net System Overview, Security and Privacy
Rajeev Rajan
Sr. Director, Product Management, Qualcomm Life
Session Agenda
2	
  
•  Qualcomm	
  Life,	
  2net,	
  Healthy	
  Circles,	
  Qualcomm	
  Life	
  
Ecosystem…High-­‐Level	
  Overview	
  
•  2net	
  Product	
  Overview…The	
  Body’s	
  Systems	
  
•  2net	
  Security	
  &	
  Privacy	
  Overview…The	
  Immune	
  
System	
  
Our Mission
Mobilize healthcare
Our Vision
A world with access to healthcare anytime, anywhere
3	
  
Low Energy
2net	
  	
  Cloud	
  
Pla-orm	
  
Home	
  
	
  Hub	
  
Sample	
  Scenario	
  	
  
Bill’s	
  blood	
  pressure	
  reading	
  is	
  collected	
  over	
  short-­‐
range	
  radio,	
  and	
  wirelessly	
  communicated	
  over	
  3G	
  by	
  
his	
  2net	
  Home	
  Hub	
  to	
  the	
  2net	
  Cloud	
  Pla@orm,	
  to	
  be	
  
delivered	
  to	
  his	
  doctor	
  thru	
  2net’s	
  Customers/Partners.	
  
2net
Customers/
PartnersCellular	
  
3G	
  
2net Use-Case
4	
  
Customer/In-­‐House	
  
HealthyCircles
ConnecIng	
  the	
  Care	
  Team	
  Accelerates	
  AdopIon	
  
HIE/EHR	
  
Clinical	
  	
  
Data	
  
Lab	
  Results	
   Rx	
  Data	
  
Tradi=onal	
  Healthcare	
  Se?ngs	
  
EMR1	
  
EMR2	
  
5	
  
Qualcomm Life Ecosystem
Note:	
  Both	
  the	
  2net	
  Hub	
  and	
  PlaUorm	
  	
  are	
  (1)	
  FDA	
  listed	
  Class	
  I	
  MDDS	
  (US)	
  (2)	
  CE	
  registered,	
  Class	
  I	
  listed	
  MDD	
  under	
  EU	
  DirecIve	
  93/42/EEC	
  (Europe)	
  (3)	
  Class	
  I	
  listed	
  CMDCAS	
  (Canada).	
  
6	
  
#CONNECT2013
2net Product Overview
… The Body’s Systems
Disease Management Kits
Diabetes
COPD / AsthmaCHF
Wellness/Prevention
8	
  
2net Hub : High level Data Flows
1	
  
2	
  
4	
  
6	
  
3	
  
5	
  
Legend	
  
2	
  
Biometric	
  data	
  flow	
  
Device	
  command	
  flow	
  
Data	
  flow	
  step	
  number	
  
2net	
  Service	
  
Pla-orm/	
  
Cloud	
  
2net	
  Hub	
  
2net	
  
Customer	
  
Pla-orm	
  
/Cloud	
  
9	
  
High Level System Design
Hub
Cellular
Data
Network
2net
Service
Platform
Internet
Dashboard	
  
Visualization/
Analysis
Customer
data	
  handling
2net	
  
Connect
Server
Biometric
data
10	
  
1.  Captures	
  the	
  biometric	
  measurement	
  data	
  from	
  health	
  care	
  
and	
  fitness	
  data	
  from	
  customer	
  or	
  collaborator	
  wireless	
  devices	
  
2.  Stores	
  the	
  biometric	
  measurement	
  data	
  in	
  a	
  secure	
  system	
  
3.  Delivers	
  the	
  data	
  to	
  integrated	
  portals/databases	
  	
  
Carrier
Network
Data
Connectivity
Plan
• Customer
application
InternetDevice Agents
Hub Software
Customer
Interface
Cellular
Carrier
Portal
Customer
Care
(Tier 2/3)
Device Agents
Pharma
Fitness
Medical
USE
Consumer	
  and/or	
  
Payer	
  Billing	
  
Provisioning
Carrier
Transaction
Billing
Device Agents
Hub App
Software
Firmware/OS
Customer 1
Contract Manufacturer
Venture Corp
(Singapore/Malaysia)
Hub
Design
…
Internet
Buy
Hubs
Relationships
(Carriers,
OEMs,
Licensees,
CM/ODMs etc.)
• TransacIons	
  
• Data	
  	
  Storage,	
  	
  
Databases	
  
2net End-to-End (E2E) Architecture
HUB PLATFORM	
  San	
  Diego,	
  USA
OTHER	
  CUSTOMERS/PARTNERS
CUSTOMER/PARTNER	
  
	
  
Hub Software
Hub
Configurations
Hub Config
File (Authorization)
Home
11	
  
Biometric Data Flow : End-to-End
TransacIon	
  Storage	
  
(Encrypted)	
  
Device	
  Customer	
  
Portal	
  
Decrypt	
  
Server	
  
Adapter	
  
Device	
  specific	
  “Agents”	
  (DAs)are	
  
installed	
  on	
  the	
  2net	
  hub.	
  	
  These	
  
agents	
  iniIate	
  data	
  transfers	
  from	
  the	
  
devices	
  using	
  short-­‐range	
  radios	
  (BT,	
  
BTLE,	
  Wi-­‐Fi,	
  etc.).	
  
Data	
  is	
  uploaded	
  to	
  the	
  2net	
  
Cloud	
  PlaUorm	
  over	
  the	
  cellular	
  
network.	
  	
  The	
  data	
  is	
  
transmieed	
  over	
  authenIcated	
  
SSL	
  connecIons.	
  
Internet	
  	
  
Device	
  
TransacIons	
  
2net	
  Cloud	
  Pla-orm	
  
Device	
  data	
  is	
  decrypted	
  and	
  
transmieed	
  to	
  the	
  customer.	
  	
  
Thru	
  Server	
  Adapters	
  (SAs),	
  
including	
  non-­‐standard	
  
interfaces)	
  
…
2net	
  CUSTOMERS
12	
  
2net Hub
Encrypted
Hub Software
Radio Manager
Device Agent
For	
  data	
  delivery,	
  the	
  2net	
  	
  
Cloud	
  stores	
  the	
  encrypted	
  data	
  
for	
  transmission	
  to	
  the	
  
customers.	
  
Cellular	
  
Data	
  	
  
Network	
  
#CONNECT2013
2net Security and Privacy
… The Immune System
FRB 	
  Feature	
  Request	
  Board	
  
ES 	
  Engineering	
  Sample	
  
FC 	
  Feature	
  Complete	
  
CS 	
  Commercial	
  Sample	
  
CPL 	
  Customer	
  Product	
  Line	
  
14	
  
Qualcomm Product Security Initiative
Deliver	
  world-­‐class	
  cyber	
  security	
  and	
  risk	
  
management	
  capabiliIes	
  
Qualcomm	
  IT	
  :	
  InformaIon	
  Security	
  and	
  Risk	
  Management	
  
Overview	
  
Align	
  cyber	
  risk	
  profile	
  
with	
  desired	
  level	
  
	
  
Informa=on	
  
Deliver	
  security	
  capabiliIes	
  to	
  advance	
  
Company	
  business	
  strategy	
  
Promote	
  responsible	
  security	
  
behavior	
  consistent	
  with	
  
Company	
  policies	
  and	
  values	
  
15	
  
Monitoring & Response
" Advanced security monitoring for attacks, data theft, policy violations, and
vulnerabilities
" Subjective analysis, triage, and coordination
Threat Management
" Intelligence and counter intelligence gathering, analysis, and sharing inside and
outside the company
" Proactively address threat trends
" Hunter-killer
Application Security
" Secure coding practices, training and testing
Cyber	
  Security	
  and	
  Threat	
  Management	
  
16	
  
Focus	
  on	
  ProacIve	
  Data	
  ProtecIon
	
  
Business	
  Security	
  Engineering	
  
"   Partner	
  with	
  engineering	
  and	
  business	
  leaders	
  to	
  manage	
  cyber	
  risk	
  profiles,	
  including	
  
improvements	
  to	
  technical	
  and	
  administraIve	
  processes	
  
"   Drive	
  security-­‐related	
  business	
  knowledge	
  into	
  IT	
  pracIces	
  
	
  
Security	
  Architecture	
  	
  
"   Strategic	
  development,	
  direcIon	
  segng,	
  evangelizing,	
  and	
  knowledge	
  transfer	
  of	
  
enterprise	
  security	
  architecture	
  standards,	
  policies,	
  concepts,	
  and	
  roadmaps	
  	
  
"   Oien	
  assigned	
  as	
  security	
  SMEs	
  on	
  non-­‐security	
  driven	
  projects	
  
"   Special	
  projects	
  ex.	
  predicIve	
  analyIcs	
  
Compliance	
  
"   Support	
  compliance	
  with	
  laws,	
  regulaIons,	
  industry	
  standards	
  (ex:	
  ISO,	
  ITAR,	
  Privacy,	
  
PCI,	
  HIPAA),	
  and	
  contractual	
  requirements	
  
"   Contract	
  reviews	
  with	
  Legal	
  and	
  Procurement	
  
	
   17	
  
Education and Awareness
" Educate employees and increase their cyber security awareness through
development and maintenance of the Company security awareness program
Policies and Guidelines
" Partner, develop, and maintain:
" Corporate cyber policies (ex. E-media, CCI, Conduct)
" Internal cyber security standards such as hardening and logging requirements
Focus on Proactive Data Protection contd.
18	
  
Leveraging Qualcomm’s Unmatched Expertise
•  OperaIng	
  for	
  over	
  25	
  years	
  
•  4	
  con=nents,	
  40	
  countries,	
  8	
  dedicated	
  Network	
  Opera=ons	
  Centers	
  	
  
•  Helping	
  over	
  10,000	
  businesses	
  manage	
  millions	
  of	
  mission	
  criIcal	
  devices	
  
A Premier Enterprise Wireless Data Platform
19	
  
End-­‐to-­‐end	
  SoluIon	
  Leverages	
  Qualcomm’s	
  Network	
  OperaIons	
  Center	
  	
  
§  Device integration
support
§  QCL built device agents
for each medical device
§  Test and Validation with
each medical device
§  Integration to device
logistics partners
§  Device design
§  Development
§  Certifications
§  Adaptive for future
med device
integration
§  Global roadmap
§  Test and validation
§  CM selection,
onboarding
§  ISO 13485
§  FDA-Listed Class I
Device (MDDS)
§  CE registered, Class I
MDD (Europe)
§  Integration to device
logistics partners
§  International Operators
§  Global data plans
§  Integration to NOC
§  Technical knowledge of
respective architectures
§  Reliable delivery of data
to the customer
applications through a
single simple interface
§  Two-way device
communication
§  OTA updates,
provisioning, device
agent pushes
§  PCI compliant data
centers
§  Designed for HIPAA
compliance, privacy and
security
§  Access to healthcare
data platform for “mix
and match” of devices
and applications
§  3rd party apps
§  2net portal
§  Web services
§  FDA-Listed Class 1
Device (MDDS)
§  CE registered, Class I
MDD (Europe)
§  Activation &
provisioning
§  OTA software updates
and agent mgmt
§  Device management,
version control, CM
§  Network management
§  Active network
monitoring
§  Timely enterprise
support
§  Direct carrier
engineering support
§  Fraud detection, Carrier
billing reconciliation
§  End-to-end enterprise
management of
message delivery
§  Reliability, Redundancy
Medical Devices Hub Networks
Network
Management
Data Management
Customer
Applications
20	
  
QCL – 2netTM – Security and Privacy Highlights
On	
  Hub	
  
Biometric	
  data	
  encrypIon	
  :	
  Advanced	
  EncrypIon	
  Standard	
  (AES)	
  128	
  
	
  
Cellular	
  Network	
  
Private	
  Network	
  (APN)	
  
	
  
Transport	
  Layer	
  (Over	
  Cellular	
  and	
  	
  Internet)	
  
Secure	
  Sockets	
  Layer	
  (SSL)	
  via	
  heps	
  (MulIple	
  cerIficate	
  authoriIes)	
  
	
  
Server/Database	
  
Rack/Servers	
  in	
  secure	
  area	
  
Oracle	
  naIve	
  (if	
  needed)	
  
	
  
Data	
  Integrity	
  
Security	
  Hash	
  Algorithm	
  (SHA)-­‐256	
  Hash	
  for	
  every	
  Hub	
  to	
  2netTM	
  Service	
  PlaUorm	
  (SP)/Cloud	
  	
  
transmission	
  
	
  
Cloud	
  Data-­‐center	
  Controls	
  
Located	
  in	
  ISO	
  27001	
  cerIfied	
  and	
  PCI	
  compliant	
  datacenters	
  (excluding	
  UK)	
  
HIPAA	
  Security	
  Rule	
  Compliance	
  Checklist	
  
	
  
Underlying	
  Protocols	
  
TCP/IP	
  
UMTS	
  
Multi-Level Controls
Upper	
  ApplicaIon	
  Layers	
  
XML	
  
1EEE	
  11073/	
  
HTTPS	
  
SSL	
  
TCP/IP	
  
UMTS	
  
21	
  
Service Security
Database,	
  OLTP
Customer
Services
Hub
Communications
-­‐	
  data
-­‐	
  SMS
Hubapp	
  and	
  
DA	
  software
2net	
  Service	
  
Platform
Data	
  Posting
Data
SA
REST	
  Services
2net	
  
Customer
Data	
  
handling
Firmware
Android
HUBAPPDA
Encryption
AES128
HTTPS
SSL
Private APN
UMTS/EDGE/GPRS
Cellular
END TO END
DATA
INTEGRITY:
Secure	
  Hash	
  Algo
SHA-256
Server system certifications:
·∙ 	
   Located in ISO 27001 certified and PCI compliant
datacenters (excluding UK)
·∙ 	
   Limited physical and logical access to servers
·∙ 	
   Firewall, Intrusion Detection Systems, Audit logging
·∙ 	
   HIPAA Security Rule Compliance Checklist
Decryption
HTTPS
Internet (SSL)
22	
  
Service Security
Component	
   Security	
  
Hub 	
  	
   –	
  Data	
  encrypIon	
  with	
  Advanced	
  EncrypIon	
  Standard	
  (AES)	
  128	
  
Over-­‐the-­‐Air	
  (OTA)	
  	
  
and	
  Internet	
  	
  
–	
  Private	
  cellular	
  data	
  network	
  (Private	
  APN)	
  
–	
  Secure	
  Sockets	
  Layer	
  (SSL)	
  via	
  HTTPS	
  (mulIple	
  cerIficate	
  authoriIes)	
  
SP	
  Server,	
  Database	
  	
  
and	
  Cloud	
  
–	
  Limited	
  physical	
  and	
  logical	
  access	
  to	
  servers	
  
–	
  Located	
  in	
  ISO	
  27001	
  cerIfied	
  and	
  PCI	
  compliant	
  datacenters	
  (excluding	
  UK)	
  
–	
  Firewall,	
  Intrusion	
  DetecIon	
  Systems,	
  Audit	
  logging	
  
–	
  HIPAA	
  Security	
  Rule	
  Compliance	
  Checklist	
  
–	
  Oracle	
  naIve	
  database	
  security	
  (if	
  required)	
  
Data	
  Integrity	
   –	
  Security	
  Hash	
  Algorithm	
  (SHA)-­‐256	
  hash	
  for	
  every	
  hub	
  to	
  Service	
  PlaUorm/Cloud	
  
transmission	
  
Underlying	
  Protocols	
   –	
  Internet	
  transacIons	
  over	
  TCP/IP	
  	
  
–	
  Wireless	
  link	
  between	
  hub	
  and	
  cellular	
  carrier	
  uses	
  UMTS	
  or	
  EDGE/GPRS	
  
23	
  
© 2013 Qualcomm Life. All rights reserved.
#CONNECT2013
Thank you

More Related Content

What's hot

Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
MHumaamAl
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
Minhaz A V
 
USB flash drive security
USB flash drive securityUSB flash drive security
USB flash drive security
jin88lin
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
Executive Leaders Network
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Anne ndolo
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
Ajinkya Nikam
 
Zabezpieczenia sieci komputerowych
Zabezpieczenia sieci komputerowychZabezpieczenia sieci komputerowych
Zabezpieczenia sieci komputerowychg4life
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
Data Vault Introduction
Data Vault IntroductionData Vault Introduction
Data Vault Introduction
Patrick Van Renterghem
 
資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...
資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...
資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...
luna chen
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
Antonio Fontes
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
Denim Group
 
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Jason Trost
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
James Wickett
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
PriyaNemade
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
Bernie Leung, P.E., CISSP
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
Anton Chuvakin
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 

What's hot (20)

Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
USB flash drive security
USB flash drive securityUSB flash drive security
USB flash drive security
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
Zabezpieczenia sieci komputerowych
Zabezpieczenia sieci komputerowychZabezpieczenia sieci komputerowych
Zabezpieczenia sieci komputerowych
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Data Vault Introduction
Data Vault IntroductionData Vault Introduction
Data Vault Introduction
 
資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...
資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...
資訊管理 CH6 資料倉儲、資料探勘與巨量資料分析系統 (Data Warehouse、Data Mining、Big Data Analytic sys...
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 

Viewers also liked

Qualcomm Life Connect 2013: Overview on 2net APIs and SDKs
Qualcomm Life Connect 2013: Overview on 2net APIs and SDKsQualcomm Life Connect 2013: Overview on 2net APIs and SDKs
Qualcomm Life Connect 2013: Overview on 2net APIs and SDKsQualcomm Life
 
Medical Device Integration for Patient Centered Health Care
Medical Device Integration for Patient Centered Health CareMedical Device Integration for Patient Centered Health Care
Medical Device Integration for Patient Centered Health Care
John Squeo
 
Optare Solutions - Corporate Brochure (Outdated)
Optare Solutions - Corporate Brochure (Outdated)Optare Solutions - Corporate Brochure (Outdated)
Optare Solutions - Corporate Brochure (Outdated)
Optare Solutions
 
Saúl “canelo”álvarez
Saúl “canelo”álvarezSaúl “canelo”álvarez
Saúl “canelo”álvarez
2vherrera
 
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasanFood safety in one page talal khalid hasan
Food safety in one page talal khalid hasan
Amqc Almumtaz
 
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilDisruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.il
Amir Langer
 
Does the Bible mean what it says?
Does the Bible mean what it says?Does the Bible mean what it says?
Does the Bible mean what it says?
Wycliffe Bible Translators
 
Gifted futures
Gifted futures Gifted futures
Gifted futures
Carmen Tschofen
 
Исследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров УкраиныИсследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров УкраиныМария Романенко
 
So much UX data! Now what?
So much UX data! Now what?So much UX data! Now what?
So much UX data! Now what?
Jennifer Romano Bergstrom
 
Reconsidering talent development in a connective era
Reconsidering talent development in a connective eraReconsidering talent development in a connective era
Reconsidering talent development in a connective era
Carmen Tschofen
 
САМ - силовой активный материал
САМ - силовой активный материалСАМ - силовой активный материал
САМ - силовой активный материалkulibin
 
インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版
kazuto sato
 
How effective is the combination of your main Product and the Ancillary Tasks
How effective is the combination of your main Product and the Ancillary TasksHow effective is the combination of your main Product and the Ancillary Tasks
How effective is the combination of your main Product and the Ancillary Taskscourtfew5
 
Research in Metaphors of Leadership
Research in Metaphors of LeadershipResearch in Metaphors of Leadership
Research in Metaphors of LeadershipRichi Sumedho Mihary
 
Change Management Initiatives That Ensure Smooth Program Transition and Deliv...
Change Management Initiatives That Ensure Smooth Program Transition and Deliv...Change Management Initiatives That Ensure Smooth Program Transition and Deliv...
Change Management Initiatives That Ensure Smooth Program Transition and Deliv...
Chazey Partners
 
Nairobi water full page
Nairobi water full pageNairobi water full page
Nairobi water full page
The Star Newspaper
 
Connected autonomy and talent development
Connected autonomy and talent developmentConnected autonomy and talent development
Connected autonomy and talent development
Carmen Tschofen
 
Futures thinking and learning
Futures thinking and learningFutures thinking and learning
Futures thinking and learning
Carmen Tschofen
 

Viewers also liked (20)

Qualcomm Life Connect 2013: Overview on 2net APIs and SDKs
Qualcomm Life Connect 2013: Overview on 2net APIs and SDKsQualcomm Life Connect 2013: Overview on 2net APIs and SDKs
Qualcomm Life Connect 2013: Overview on 2net APIs and SDKs
 
Medical Device Integration for Patient Centered Health Care
Medical Device Integration for Patient Centered Health CareMedical Device Integration for Patient Centered Health Care
Medical Device Integration for Patient Centered Health Care
 
Optare Solutions - Corporate Brochure (Outdated)
Optare Solutions - Corporate Brochure (Outdated)Optare Solutions - Corporate Brochure (Outdated)
Optare Solutions - Corporate Brochure (Outdated)
 
Saúl “canelo”álvarez
Saúl “canelo”álvarezSaúl “canelo”álvarez
Saúl “canelo”álvarez
 
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasanFood safety in one page talal khalid hasan
Food safety in one page talal khalid hasan
 
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilDisruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.il
 
Does the Bible mean what it says?
Does the Bible mean what it says?Does the Bible mean what it says?
Does the Bible mean what it says?
 
Gifted futures
Gifted futures Gifted futures
Gifted futures
 
Исследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров УкраиныИсследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров Украины
 
Raghavendra 1234
Raghavendra 1234Raghavendra 1234
Raghavendra 1234
 
So much UX data! Now what?
So much UX data! Now what?So much UX data! Now what?
So much UX data! Now what?
 
Reconsidering talent development in a connective era
Reconsidering talent development in a connective eraReconsidering talent development in a connective era
Reconsidering talent development in a connective era
 
САМ - силовой активный материал
САМ - силовой активный материалСАМ - силовой активный материал
САМ - силовой активный материал
 
インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版
 
How effective is the combination of your main Product and the Ancillary Tasks
How effective is the combination of your main Product and the Ancillary TasksHow effective is the combination of your main Product and the Ancillary Tasks
How effective is the combination of your main Product and the Ancillary Tasks
 
Research in Metaphors of Leadership
Research in Metaphors of LeadershipResearch in Metaphors of Leadership
Research in Metaphors of Leadership
 
Change Management Initiatives That Ensure Smooth Program Transition and Deliv...
Change Management Initiatives That Ensure Smooth Program Transition and Deliv...Change Management Initiatives That Ensure Smooth Program Transition and Deliv...
Change Management Initiatives That Ensure Smooth Program Transition and Deliv...
 
Nairobi water full page
Nairobi water full pageNairobi water full page
Nairobi water full page
 
Connected autonomy and talent development
Connected autonomy and talent developmentConnected autonomy and talent development
Connected autonomy and talent development
 
Futures thinking and learning
Futures thinking and learningFutures thinking and learning
Futures thinking and learning
 

Similar to Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy

Smart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdf
Smart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdfSmart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdf
Smart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdf
Gslab1
 
Diaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark Healthcare Technology Services
Diaspark Healthcare Technology Services
Diaspark
 
Health IT Services
Health IT ServicesHealth IT Services
Health IT Services
Key Management Group, Inc.
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
Guy Vinograd ☁
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
Armin Torres
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
DevOps.com
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Greenlight Guru
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
ICS
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
Cruatech
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB
 
Presentation SafetyDrugs
Presentation SafetyDrugsPresentation SafetyDrugs
Presentation SafetyDrugs
Andrea Garlanda
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
North Texas Chapter of the ISSA
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
Guy Vinograd ☁
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
Databricks
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
The Security of Things Forum
 
NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...
NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...
NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...
Hafez Kamal
 
eWave Md 2010 Company Profile
eWave Md 2010 Company ProfileeWave Md 2010 Company Profile
eWave Md 2010 Company Profile
Talor Sax
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 

Similar to Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy (20)

Smart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdf
Smart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdfSmart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdf
Smart Wearable medical Device and Implant For Patient Monitoring - GSLab.pdf
 
Diaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark Healthcare Technology Services
Diaspark Healthcare Technology Services
 
Health IT Services
Health IT ServicesHealth IT Services
Health IT Services
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
Presentation SafetyDrugs
Presentation SafetyDrugsPresentation SafetyDrugs
Presentation SafetyDrugs
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...
NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...
NanoSec Conference 2019: Attacking and Securing HealthCare Standards & Pentes...
 
eWave Md 2010 Company Profile
eWave Md 2010 Company ProfileeWave Md 2010 Company Profile
eWave Md 2010 Company Profile
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 

More from Qualcomm Life

Qualcomm Life Connect 2013: Overview
Qualcomm Life Connect 2013: OverviewQualcomm Life Connect 2013: Overview
Qualcomm Life Connect 2013: OverviewQualcomm Life
 
Qualcomm Life Connect 2013: On Boarding and Customer Support
Qualcomm Life Connect 2013: On Boarding and Customer SupportQualcomm Life Connect 2013: On Boarding and Customer Support
Qualcomm Life Connect 2013: On Boarding and Customer SupportQualcomm Life
 
Qualcomm Life Connect 2013 - Rick Valencia Welcome
Qualcomm Life Connect 2013 - Rick Valencia WelcomeQualcomm Life Connect 2013 - Rick Valencia Welcome
Qualcomm Life Connect 2013 - Rick Valencia WelcomeQualcomm Life
 
Qualcomm Life Connect 2013 - Michael Z. Jones
Qualcomm Life Connect 2013 - Michael Z. JonesQualcomm Life Connect 2013 - Michael Z. Jones
Qualcomm Life Connect 2013 - Michael Z. Jones
Qualcomm Life
 
Pre-Con Session: Qualcomm Life Onboarding and Operations Overview
Pre-Con Session: Qualcomm Life Onboarding and Operations OverviewPre-Con Session: Qualcomm Life Onboarding and Operations Overview
Pre-Con Session: Qualcomm Life Onboarding and Operations OverviewQualcomm Life
 
Qualcomm Life Connect 2013 - Terrance H. Gregg
Qualcomm Life Connect 2013 - Terrance H. GreggQualcomm Life Connect 2013 - Terrance H. Gregg
Qualcomm Life Connect 2013 - Terrance H. Gregg
Qualcomm Life
 
Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.
Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.
Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.
Qualcomm Life
 
Qualcomm Life Case Study - Asthmapolis
Qualcomm Life Case Study - AsthmapolisQualcomm Life Case Study - Asthmapolis
Qualcomm Life Case Study - AsthmapolisQualcomm Life
 

More from Qualcomm Life (8)

Qualcomm Life Connect 2013: Overview
Qualcomm Life Connect 2013: OverviewQualcomm Life Connect 2013: Overview
Qualcomm Life Connect 2013: Overview
 
Qualcomm Life Connect 2013: On Boarding and Customer Support
Qualcomm Life Connect 2013: On Boarding and Customer SupportQualcomm Life Connect 2013: On Boarding and Customer Support
Qualcomm Life Connect 2013: On Boarding and Customer Support
 
Qualcomm Life Connect 2013 - Rick Valencia Welcome
Qualcomm Life Connect 2013 - Rick Valencia WelcomeQualcomm Life Connect 2013 - Rick Valencia Welcome
Qualcomm Life Connect 2013 - Rick Valencia Welcome
 
Qualcomm Life Connect 2013 - Michael Z. Jones
Qualcomm Life Connect 2013 - Michael Z. JonesQualcomm Life Connect 2013 - Michael Z. Jones
Qualcomm Life Connect 2013 - Michael Z. Jones
 
Pre-Con Session: Qualcomm Life Onboarding and Operations Overview
Pre-Con Session: Qualcomm Life Onboarding and Operations OverviewPre-Con Session: Qualcomm Life Onboarding and Operations Overview
Pre-Con Session: Qualcomm Life Onboarding and Operations Overview
 
Qualcomm Life Connect 2013 - Terrance H. Gregg
Qualcomm Life Connect 2013 - Terrance H. GreggQualcomm Life Connect 2013 - Terrance H. Gregg
Qualcomm Life Connect 2013 - Terrance H. Gregg
 
Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.
Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.
Qualcomm Life Connect 2013 - Jonathan Javitt, M.D., M.P.H.
 
Qualcomm Life Case Study - Asthmapolis
Qualcomm Life Case Study - AsthmapolisQualcomm Life Case Study - Asthmapolis
Qualcomm Life Case Study - Asthmapolis
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy

  • 1. #CONNECT2013 2net System Overview, Security and Privacy Rajeev Rajan Sr. Director, Product Management, Qualcomm Life
  • 2. Session Agenda 2   •  Qualcomm  Life,  2net,  Healthy  Circles,  Qualcomm  Life   Ecosystem…High-­‐Level  Overview   •  2net  Product  Overview…The  Body’s  Systems   •  2net  Security  &  Privacy  Overview…The  Immune   System  
  • 3. Our Mission Mobilize healthcare Our Vision A world with access to healthcare anytime, anywhere 3  
  • 4. Low Energy 2net    Cloud   Pla-orm   Home    Hub   Sample  Scenario     Bill’s  blood  pressure  reading  is  collected  over  short-­‐ range  radio,  and  wirelessly  communicated  over  3G  by   his  2net  Home  Hub  to  the  2net  Cloud  Pla@orm,  to  be   delivered  to  his  doctor  thru  2net’s  Customers/Partners.   2net Customers/ PartnersCellular   3G   2net Use-Case 4  
  • 5. Customer/In-­‐House   HealthyCircles ConnecIng  the  Care  Team  Accelerates  AdopIon   HIE/EHR   Clinical     Data   Lab  Results   Rx  Data   Tradi=onal  Healthcare  Se?ngs   EMR1   EMR2   5  
  • 6. Qualcomm Life Ecosystem Note:  Both  the  2net  Hub  and  PlaUorm    are  (1)  FDA  listed  Class  I  MDDS  (US)  (2)  CE  registered,  Class  I  listed  MDD  under  EU  DirecIve  93/42/EEC  (Europe)  (3)  Class  I  listed  CMDCAS  (Canada).   6  
  • 8. Disease Management Kits Diabetes COPD / AsthmaCHF Wellness/Prevention 8  
  • 9. 2net Hub : High level Data Flows 1   2   4   6   3   5   Legend   2   Biometric  data  flow   Device  command  flow   Data  flow  step  number   2net  Service   Pla-orm/   Cloud   2net  Hub   2net   Customer   Pla-orm   /Cloud   9  
  • 10. High Level System Design Hub Cellular Data Network 2net Service Platform Internet Dashboard   Visualization/ Analysis Customer data  handling 2net   Connect Server Biometric data 10   1.  Captures  the  biometric  measurement  data  from  health  care   and  fitness  data  from  customer  or  collaborator  wireless  devices   2.  Stores  the  biometric  measurement  data  in  a  secure  system   3.  Delivers  the  data  to  integrated  portals/databases    
  • 11. Carrier Network Data Connectivity Plan • Customer application InternetDevice Agents Hub Software Customer Interface Cellular Carrier Portal Customer Care (Tier 2/3) Device Agents Pharma Fitness Medical USE Consumer  and/or   Payer  Billing   Provisioning Carrier Transaction Billing Device Agents Hub App Software Firmware/OS Customer 1 Contract Manufacturer Venture Corp (Singapore/Malaysia) Hub Design … Internet Buy Hubs Relationships (Carriers, OEMs, Licensees, CM/ODMs etc.) • TransacIons   • Data    Storage,     Databases   2net End-to-End (E2E) Architecture HUB PLATFORM  San  Diego,  USA OTHER  CUSTOMERS/PARTNERS CUSTOMER/PARTNER     Hub Software Hub Configurations Hub Config File (Authorization) Home 11  
  • 12. Biometric Data Flow : End-to-End TransacIon  Storage   (Encrypted)   Device  Customer   Portal   Decrypt   Server   Adapter   Device  specific  “Agents”  (DAs)are   installed  on  the  2net  hub.    These   agents  iniIate  data  transfers  from  the   devices  using  short-­‐range  radios  (BT,   BTLE,  Wi-­‐Fi,  etc.).   Data  is  uploaded  to  the  2net   Cloud  PlaUorm  over  the  cellular   network.    The  data  is   transmieed  over  authenIcated   SSL  connecIons.   Internet     Device   TransacIons   2net  Cloud  Pla-orm   Device  data  is  decrypted  and   transmieed  to  the  customer.     Thru  Server  Adapters  (SAs),   including  non-­‐standard   interfaces)   … 2net  CUSTOMERS 12   2net Hub Encrypted Hub Software Radio Manager Device Agent For  data  delivery,  the  2net     Cloud  stores  the  encrypted  data   for  transmission  to  the   customers.   Cellular   Data     Network  
  • 13. #CONNECT2013 2net Security and Privacy … The Immune System
  • 14. FRB  Feature  Request  Board   ES  Engineering  Sample   FC  Feature  Complete   CS  Commercial  Sample   CPL  Customer  Product  Line   14   Qualcomm Product Security Initiative
  • 15. Deliver  world-­‐class  cyber  security  and  risk   management  capabiliIes   Qualcomm  IT  :  InformaIon  Security  and  Risk  Management   Overview   Align  cyber  risk  profile   with  desired  level     Informa=on   Deliver  security  capabiliIes  to  advance   Company  business  strategy   Promote  responsible  security   behavior  consistent  with   Company  policies  and  values   15  
  • 16. Monitoring & Response " Advanced security monitoring for attacks, data theft, policy violations, and vulnerabilities " Subjective analysis, triage, and coordination Threat Management " Intelligence and counter intelligence gathering, analysis, and sharing inside and outside the company " Proactively address threat trends " Hunter-killer Application Security " Secure coding practices, training and testing Cyber  Security  and  Threat  Management   16  
  • 17. Focus  on  ProacIve  Data  ProtecIon   Business  Security  Engineering   "   Partner  with  engineering  and  business  leaders  to  manage  cyber  risk  profiles,  including   improvements  to  technical  and  administraIve  processes   "   Drive  security-­‐related  business  knowledge  into  IT  pracIces     Security  Architecture     "   Strategic  development,  direcIon  segng,  evangelizing,  and  knowledge  transfer  of   enterprise  security  architecture  standards,  policies,  concepts,  and  roadmaps     "   Oien  assigned  as  security  SMEs  on  non-­‐security  driven  projects   "   Special  projects  ex.  predicIve  analyIcs   Compliance   "   Support  compliance  with  laws,  regulaIons,  industry  standards  (ex:  ISO,  ITAR,  Privacy,   PCI,  HIPAA),  and  contractual  requirements   "   Contract  reviews  with  Legal  and  Procurement     17  
  • 18. Education and Awareness " Educate employees and increase their cyber security awareness through development and maintenance of the Company security awareness program Policies and Guidelines " Partner, develop, and maintain: " Corporate cyber policies (ex. E-media, CCI, Conduct) " Internal cyber security standards such as hardening and logging requirements Focus on Proactive Data Protection contd. 18  
  • 19. Leveraging Qualcomm’s Unmatched Expertise •  OperaIng  for  over  25  years   •  4  con=nents,  40  countries,  8  dedicated  Network  Opera=ons  Centers     •  Helping  over  10,000  businesses  manage  millions  of  mission  criIcal  devices   A Premier Enterprise Wireless Data Platform 19  
  • 20. End-­‐to-­‐end  SoluIon  Leverages  Qualcomm’s  Network  OperaIons  Center     §  Device integration support §  QCL built device agents for each medical device §  Test and Validation with each medical device §  Integration to device logistics partners §  Device design §  Development §  Certifications §  Adaptive for future med device integration §  Global roadmap §  Test and validation §  CM selection, onboarding §  ISO 13485 §  FDA-Listed Class I Device (MDDS) §  CE registered, Class I MDD (Europe) §  Integration to device logistics partners §  International Operators §  Global data plans §  Integration to NOC §  Technical knowledge of respective architectures §  Reliable delivery of data to the customer applications through a single simple interface §  Two-way device communication §  OTA updates, provisioning, device agent pushes §  PCI compliant data centers §  Designed for HIPAA compliance, privacy and security §  Access to healthcare data platform for “mix and match” of devices and applications §  3rd party apps §  2net portal §  Web services §  FDA-Listed Class 1 Device (MDDS) §  CE registered, Class I MDD (Europe) §  Activation & provisioning §  OTA software updates and agent mgmt §  Device management, version control, CM §  Network management §  Active network monitoring §  Timely enterprise support §  Direct carrier engineering support §  Fraud detection, Carrier billing reconciliation §  End-to-end enterprise management of message delivery §  Reliability, Redundancy Medical Devices Hub Networks Network Management Data Management Customer Applications 20  
  • 21. QCL – 2netTM – Security and Privacy Highlights On  Hub   Biometric  data  encrypIon  :  Advanced  EncrypIon  Standard  (AES)  128     Cellular  Network   Private  Network  (APN)     Transport  Layer  (Over  Cellular  and    Internet)   Secure  Sockets  Layer  (SSL)  via  heps  (MulIple  cerIficate  authoriIes)     Server/Database   Rack/Servers  in  secure  area   Oracle  naIve  (if  needed)     Data  Integrity   Security  Hash  Algorithm  (SHA)-­‐256  Hash  for  every  Hub  to  2netTM  Service  PlaUorm  (SP)/Cloud     transmission     Cloud  Data-­‐center  Controls   Located  in  ISO  27001  cerIfied  and  PCI  compliant  datacenters  (excluding  UK)   HIPAA  Security  Rule  Compliance  Checklist     Underlying  Protocols   TCP/IP   UMTS   Multi-Level Controls Upper  ApplicaIon  Layers   XML   1EEE  11073/   HTTPS   SSL   TCP/IP   UMTS   21  
  • 22. Service Security Database,  OLTP Customer Services Hub Communications -­‐  data -­‐  SMS Hubapp  and   DA  software 2net  Service   Platform Data  Posting Data SA REST  Services 2net   Customer Data   handling Firmware Android HUBAPPDA Encryption AES128 HTTPS SSL Private APN UMTS/EDGE/GPRS Cellular END TO END DATA INTEGRITY: Secure  Hash  Algo SHA-256 Server system certifications: ·∙   Located in ISO 27001 certified and PCI compliant datacenters (excluding UK) ·∙   Limited physical and logical access to servers ·∙   Firewall, Intrusion Detection Systems, Audit logging ·∙   HIPAA Security Rule Compliance Checklist Decryption HTTPS Internet (SSL) 22  
  • 23. Service Security Component   Security   Hub     –  Data  encrypIon  with  Advanced  EncrypIon  Standard  (AES)  128   Over-­‐the-­‐Air  (OTA)     and  Internet     –  Private  cellular  data  network  (Private  APN)   –  Secure  Sockets  Layer  (SSL)  via  HTTPS  (mulIple  cerIficate  authoriIes)   SP  Server,  Database     and  Cloud   –  Limited  physical  and  logical  access  to  servers   –  Located  in  ISO  27001  cerIfied  and  PCI  compliant  datacenters  (excluding  UK)   –  Firewall,  Intrusion  DetecIon  Systems,  Audit  logging   –  HIPAA  Security  Rule  Compliance  Checklist   –  Oracle  naIve  database  security  (if  required)   Data  Integrity   –  Security  Hash  Algorithm  (SHA)-­‐256  hash  for  every  hub  to  Service  PlaUorm/Cloud   transmission   Underlying  Protocols   –  Internet  transacIons  over  TCP/IP     –  Wireless  link  between  hub  and  cellular  carrier  uses  UMTS  or  EDGE/GPRS   23  
  • 24. © 2013 Qualcomm Life. All rights reserved. #CONNECT2013 Thank you