Thank you Jeff….I’ll put them to the our use-case repository
From: dg-idot-bounces@kantarainitiative.org [mailto:dg-idot-bounces@kantarainitiative.org] On Behalf Of j stollman
Sent: Montag, 19. August 2013 15:05
Cc: dg-idot@kantarainitiative.org
Subject: [DG-IDoT] Proposed IoT Use Cases #2 and #3
Proposed Use Case #2
Sticking with the automobile theme, I am concerned about authorization to access data stored within a vehicles computer systems.
As autos become smarter and more of them have built-in navigation and emergency communications systems, the data accumulating in these systems becomes increasingly personal. The data is of value to many parties. At a minimum these include the following:
Unlike Ingo's use case which appears only to require uniquely identifying a vehicle, this scenario requires selectively authorizing read and write access to a large amount of personal data by a variety of parties.
Use Case #3
Electric refueling at a friend's house
As electric cars become more common, the scenario is likely to evolve where Bob drives Carole's electric car to visit Alice. Once at Alice's house, he wants to recharge his vehicle using Alice's electric hookup. But he wants the bill for the electricity used for charging to go to his account, rather than hers.
Currently, to do this would likely require having Alice go online to her account to tell the electricity supplier that all electricity going through the car charge for the next three hours should be charged to Bob. And Bob will have to go into his account to authorize the charges coming from Alice's charger.
As we migrate towards IoT, it may be possible to make this transaction more automated. One obvious way is to allow the electric hookup to interrogate each car and change any charging to the registered owner of the vehicle. This would solve many problems. But in this case, it would mean that Carole would be charged for Bob's use of the electricity.
Another option would be to use the scenario above, but allow for an override function. The system may default to charging Alice, but by entering a command (through some interface which might be a hardware switch), Bob could authenticate and direct the charges to his account or credit card.
I don't consider this as interesting as Use Case #2. But it does involve true authentication, not just identification.
Thank you.
Jeff
--
Jeff Stollman
stollman.j@gmail.com
1 202.683.8699
Truth never triumphs — its opponents just die out.
Science advances one funeral at a time.
Max Planck