
Research Article
Establishing an Integrated Push Notification System with Information Security Mechanism
@INPROCEEDINGS{10.1007/978-3-030-92163-7_3, author={Hsin-Te Wu}, title={Establishing an Integrated Push Notification System with Information Security Mechanism}, proceedings={Bio-Inspired Information and Communications Technologies. 13th EAI International Conference, BICT 2021, Virtual Event, September 1--2, 2021, Proceedings}, proceedings_a={BICT}, year={2022}, month={1}, keywords={Natural language processing Push technology Network security Personal information protection Internet of Things}, doi={10.1007/978-3-030-92163-7_3} }
- Hsin-Te Wu
Year: 2022
Establishing an Integrated Push Notification System with Information Security Mechanism
BICT
Springer
DOI: 10.1007/978-3-030-92163-7_3
Abstract
Today, many enterprises and governmental units utilize push technology to deliver messages. To enterprises, the system can announce company policies rapidly; to clients, it can distribute new events or promotions. There are many approaches to convey messages, such as emails and text and LINE messages; however, it requires a method to protect client information and avoid hackers or data theft by internal staff. The paper aims to develop a push notification system similar to a set-top box, and the system includes below features. 1. Establishing a set-top push system and server for firms to set login information. 2. Creating a function module for the operator to select suitable marketing models. 3. The integrated push notification system offers enterprises to send messages through emails, texts, and LINE application. 4. Through creating groups and user-friendly interfaces, operators could easily send push notices to various groups. 5. Build a hierarchical message authentication mechanism; the hierarchical method enables operators to review message content and ensure the correctness. 6. Develop personal information encryption and an Internet security mechanism to confirm the source, completeness, and authentication. 7. The personal information encryption protects the system from internal staff to export critical data. Clients will only need to rent the modules they need, and the supplier is in charge of providing the server and set-top push system, which will help to universalize the product.