About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Bio-Inspired Information and Communications Technologies. 13th EAI International Conference, BICT 2021, Virtual Event, September 1–2, 2021, Proceedings

Research Article

Establishing an Integrated Push Notification System with Information Security Mechanism

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-92163-7_3,
        author={Hsin-Te Wu},
        title={Establishing an Integrated Push Notification System with Information Security Mechanism},
        proceedings={Bio-Inspired Information and Communications Technologies. 13th EAI International Conference, BICT 2021, Virtual Event, September 1--2, 2021, Proceedings},
        proceedings_a={BICT},
        year={2022},
        month={1},
        keywords={Natural language processing Push technology Network security Personal information protection Internet of Things},
        doi={10.1007/978-3-030-92163-7_3}
    }
    
  • Hsin-Te Wu
    Year: 2022
    Establishing an Integrated Push Notification System with Information Security Mechanism
    BICT
    Springer
    DOI: 10.1007/978-3-030-92163-7_3
Hsin-Te Wu1,*
  • 1: Department of Computer Science and Information Engineering
*Contact email: hsinte@niu.edu.tw

Abstract

Today, many enterprises and governmental units utilize push technology to deliver messages. To enterprises, the system can announce company policies rapidly; to clients, it can distribute new events or promotions. There are many approaches to convey messages, such as emails and text and LINE messages; however, it requires a method to protect client information and avoid hackers or data theft by internal staff. The paper aims to develop a push notification system similar to a set-top box, and the system includes below features. 1. Establishing a set-top push system and server for firms to set login information. 2. Creating a function module for the operator to select suitable marketing models. 3. The integrated push notification system offers enterprises to send messages through emails, texts, and LINE application. 4. Through creating groups and user-friendly interfaces, operators could easily send push notices to various groups. 5. Build a hierarchical message authentication mechanism; the hierarchical method enables operators to review message content and ensure the correctness. 6. Develop personal information encryption and an Internet security mechanism to confirm the source, completeness, and authentication. 7. The personal information encryption protects the system from internal staff to export critical data. Clients will only need to rent the modules they need, and the supplier is in charge of providing the server and set-top push system, which will help to universalize the product.

Keywords
Natural language processing Push technology Network security Personal information protection Internet of Things
Published
2022-01-01
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-92163-7_3
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL