{"id":2599,"date":"2020-07-01T10:43:52","date_gmt":"2020-07-01T10:43:52","guid":{"rendered":"https:\/\/www.betronic.nl\/communicate-securely\/"},"modified":"2024-10-10T14:03:39","modified_gmt":"2024-10-10T14:03:39","slug":"communicate-securely","status":"publish","type":"post","link":"https:\/\/www.betronic.nl\/en\/communicate-securely\/","title":{"rendered":"Communicate securely"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2599\" class=\"elementor elementor-2599 elementor-1456\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7739b0a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7739b0a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-947dffd\" data-id=\"947dffd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-37a3f1a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37a3f1a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0ab81d5\" data-id=\"0ab81d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c84a36 elementor-widget elementor-widget-text-editor\" data-id=\"2c84a36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Communicate securely<\/strong><\/p>\n<p>In one of our previous articles, various communication protocols were discussed and the process was discussed to make the right choice. One aspect that has not been addressed here is how your data can be safely transferred to the cloud and stored securely in the cloud.<\/p>\n<p>Although this is not important for every product, with a standalone device or a product with an open protocol, there are often no requirements in this area. However, the general trend for products is that they can be provided with new firmware in one way or another. So a connection to the internet is important.<\/p>\n<p><strong>Secure Sockets\u00a0Layer<\/strong><br \/>A security protocol called SSL (Secure Sockets Layer) was developed in 1994 for the safe transfer of data. Several versions of this security protocol have been released but are now considered unsafe. A successor to SSL is TLS (Transport Layer Security).<\/p>\n<p><strong><img decoding=\"async\" class=\" wp-image-1461 alignleft\" src=\"https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/veilig-internet-computer24092019-300x169.png\" alt=\"\" width=\"234\" height=\"132\" srcset=\"https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/veilig-internet-computer24092019-300x169.png 300w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/veilig-internet-computer24092019-768x432.png 768w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/veilig-internet-computer24092019.png 780w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/>Transport Layer Security<\/strong><br \/>The advantage of TLS is that it is independent of the application protocol and ensures that the data cannot be intercepted or falsified. Several versions of TLS have already been published to be resistant to cyber attacks. Certificates are used to authenticate the data and guarantee privacy. Each certificate has a public key and the owner of the certificate has a private key.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-951de15\" data-id=\"951de15\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10a5f55 elementor-widget elementor-widget-text-editor\" data-id=\"10a5f55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><img decoding=\"async\" class=\" wp-image-1459 alignright\" src=\"https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/Privacyjpg-300x169.jpg\" alt=\"\" width=\"256\" height=\"144\" srcset=\"https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/Privacyjpg-300x169.jpg 300w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/Privacyjpg-1024x576.jpg 1024w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/Privacyjpg-768x432.jpg 768w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/Privacyjpg.jpg 1280w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/>Privacy<\/strong><\/p>\n<p>To prevent misuse of data, the privacy of data has been laid down in one European privacy law, the General Data Protection Regulation (<a href=\"https:\/\/gdpr.eu\/\"><span style=\"text-decoration: underline;\"><span style=\"color: #ff8b00; text-decoration: underline;\">GDPR<\/span><\/span><\/a>) in the Netherlands known as the General Data Protection Regulation (AVG). The law consists of 99 articles ranging from Encryption, Privacy by Design to Disclosure Obligations. Below are two aspects which we explain in more detail.<\/p>\n<p><strong>Encryption<\/strong><br \/>The privacy law does not specify which protocol (for example TLS 1.3) should be used. It is clearly stated that the likelihood of occurrence and the risk must be taken into account, as well as the state of the art and implementation costs. Implementation of the encryption is therefore a piece of custom work and depends on your product and business case.<\/p>\n<p><strong>Privacy by design<\/strong><br \/>The idea behind this is that data protection processes are best adhered to when they are technically integrated during development. The <a href=\"https:\/\/www.betronic.nl\/en\/services\/#processstappen\"> <span style=\"text-decoration: underline;\"> <span style=\"color: # ff8b00; text-decoration: underline;\"> structured approach <\/span> <\/span> <\/a> of a project within Betronic ensures that at the start of a project, the aspects of <span style=\"text-decoration: underline;\"> <span style=\"color: # ff8b00;\"> <a style=\"color: # ff8b00; text-decoration: underline;\" href=\"https:\/\/gdpr.eu\/\"> GDPR <\/a> <\/span> <\/span>. We make a choice of possible solutions together with the customer. The chosen solutions are implemented during the development process.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-848a894 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848a894\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-918b193\" data-id=\"918b193\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f9a7ef elementor-widget elementor-widget-text-editor\" data-id=\"6f9a7ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><img decoding=\"async\" class=\" wp-image-1475 alignright\" src=\"https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/20200619_1052011-300x146.jpg\" alt=\"\" width=\"290\" height=\"141\" srcset=\"https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/20200619_1052011-300x146.jpg 300w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/20200619_1052011-1024x498.jpg 1024w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/20200619_1052011-768x373.jpg 768w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/20200619_1052011-1536x746.jpg 1536w, https:\/\/www.betronic.nl\/wp-content\/uploads\/2020\/07\/20200619_1052011.jpg 1920w\" sizes=\"(max-width: 290px) 100vw, 290px\" \/>Prakticle example<\/strong><\/p>\n<p>The practical example of this newsletter is the project developed in collaboration with students from \u00a0<span style=\"text-decoration: underline;\"><span style=\"color: #ff8b00; text-decoration: underline;\"><a style=\"color: #ff8b00; text-decoration: underline;\" href=\"https:\/\/www.betronic.nl\/en\/collaboration-tu-delft\/\">TU Delft<\/a><\/span><\/span>, the <a href=\"https:\/\/www.betronic.nl\/en\/marijn-stam\/\"><span style=\"text-decoration: underline;\"><span style=\"color: #ff8b00; text-decoration: underline;\">HvA<\/span><\/span><\/a> and our own engineers.<\/p>\n<p>This is a product that measures the trend of vital signals from the human body and passes it on to a back office. The trend of the signals is analyzed by an algorithm. With the aid of the analysis, the healthcare authority assesses whether or not action should be taken. An action can consist of scheduling an appointment with a doctor or, for example, a visit by a nurse. The topics of safe communication and privacy are an important ingredient in this product.<\/p>\n<p><strong>Communicate securely<\/strong><br \/>The communication between the sensor for measuring the vital signals and the gateway for sending the data to the back office takes place by means of Bluetooth Low Energy (BLE). BLE is standard equipped with a 128 bit AES-CCM key for data encryption and connection integrity. TLS 1.3 encryption has been chosen for the communication from the gateway to the back office.<\/p>\n<p><strong>Privacy<\/strong><br \/>The user&#8217;s information such as name, address and age are not recorded in the sensor or gateway. In the back office, the connection is established between the data from the sensor and the relevant data of the patient. The data is protected by means of user levels with log-in and passwords so that only the right persons can access this data.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Communicate securely In one of our previous articles, various communication protocols were discussed and the process was discussed to make the right choice. One aspect that has not been addressed here is how your data can be safely transferred to the cloud and stored securely in the cloud. Although this is not important for every&#8230;<\/p>\n","protected":false},"author":11,"featured_media":4894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[297,289],"tags":[],"class_list":["post-2599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog_news","category-communication"],"_links":{"self":[{"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/posts\/2599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/comments?post=2599"}],"version-history":[{"count":1,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/posts\/2599\/revisions"}],"predecessor-version":[{"id":2600,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/posts\/2599\/revisions\/2600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/media\/4894"}],"wp:attachment":[{"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/media?parent=2599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/categories?post=2599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.betronic.nl\/en\/wp-json\/wp\/v2\/tags?post=2599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}