Technical Components of IoTOnDemand Cloud Platform
Networking IoT Hardware
IoT network brings all your connected devices at one platform, thus enabling them to “talk” to each other. These smart devices collect information & communicate the codes to the data center, via the internet.
Our low energy Bluetooth 4.0, is another medium of wireless connection of all devices in the network. This version maintains a similar communication range while ensuring reduced power consumption and reduces expenses.
IoT Device Firmware
- Custom Linux OS
- Highly hardened and secure
- Firewall enabled: blocks all the inward ports
- Our OS is Over-the-air (OTA) enabled, capable of wireless deployment, bug fixing & security
- Compatible with new IoT California Law https://www.cnet.com/news/california-governor-signs-countrys-first-iot-security-law/
- Wi-Fi provisioning framework
- User Access Security Framework
- Reports & fixes hardware issues
- Seamless reporting of customer issues and product improvement
- HTTPS, Wi-Fi, Bluetooth and 6LowPAN protocol used
- Two factor user authentication(2FA) enabled with open source technology JWT (JSON Web Token)
- Firmware for more than 100 sensor
- OS is capable of using ultra low power mode in Micro Amps. Can operate on Lithium-ion or AAA battery with lots of years of life.
Hadoop BigData Cloud Platform
IoTOnDemand aims to design the best possible solutions with state-of-the-art techniques, to the business problems your company is attempting to solve. This begins with understanding your business operations & providing customised IoT enabled solutions for your devices.
SaaS architecture allows data to be accessed from any device (with internet connection & a web browser), thus removing the need for you to deploy & run applications in your own data centers. This convenience eliminates the expense of hardware acquisition, provisioning & maintenance, as well as software licensing, installation & support.
IoTOnDemand designs & deploys a fully customisable & personalised mobile application to bring the control of all your IoT enabled devices at your fingertips.
Artificial Intelligence /Machine Learning
At IoTOnDemand we analyze the machine behavior and take actions that maximize its chance of success. Our AI algorithms are capable of learning from data and can enhance themselves by learning. Some of the features and principles we use in AI are:
High-Velocity Computing and Testing
At IoTOnDemand High-Velocity Computing and Testing is the core fabric of Hadoop and BigData. The base philosophy that rapid computing, testing, and experimentation is the key to our major growth.
Optimization, small team sizes, prioritization is key to achieve our goals The impact of high-velocity computing is multiple times and at a super rapid pace. We use the principle of simple and secure programming language which plays an important role in achieving our objectives. Some to basic principles we use are:
Licensed with Approved USA Patents
Patent No 15/292,381 and Patent No 15/356,244
Smart Electronics Device Management System (Patent No 15/292,381) – Inventor: Harpal Singh
A smart electronic device management system that is utilized to manage and control electronic devices. The device includes a housing structure that may be mounted to a surface such as a wall.
A video capture device provides a live video feed of the surrounding areas while at least one environmental sensor allows monitoring of conditions in the surrounding areas. A wireless communication module allows the device to be associated with an external computing device. Various electronic devices may be connected to the device through a plurality of electrical outlets on the housing structure. A control unit allows the device to monitor and manage electronic devices that are wirelessly connected to the device or connected through the plurality of electrical outlets. The control unit is configured to calculate a sprinkler schedule using data retrieved through the wireless communication module.
Security & Compliance
IoTOnDemand adheres to security standards and industry requirements and builds them into the internal control framework. We are IoT solution provider with ISO, PDPB Law and GDPR certificates.
IoTOnDemand is legally compliant with the India’s Personal Data Protection Bill (PDPB). The PDPB defines personal data broadly, much like the GDPR and some more recent US privacy laws, such as the CCPA. The PDPB establishes the Data Protection Authority of India. The PDPB provides distinct rules for processing “sensitive personal data, The PDPB provides seven data protection obligations that apply to all data fiduciaries.
IoTOnDemand is legally compliant with the new European Union’s Data Protection Regulation (GDPR).The EU General Data Protection Regulation (GDPR) is intended to protect EU data subjects’ fundamental privacy rights and personal data security. IoTOnDemand adheres to Military-grade AES and HTTPS WAN/LAN encryption, Dynamic key allocation for security of registered devices, GDPR privacy protection compliant.
IoTOnDemand is Compatible with new IoT California Law and is FCC/UL certified, Which means the product meets the standards of Underwriters Laboratories, a private safety testing organization, and the product meets the standards of the Federal Communications Commission.
ISO 27001 info security management compliant
ISO 27001 standard is designed to function as a framework for an organization’s information security management system (ISMS). This includes all policies and processes relevant to how data is controlled and used. IoTOnDemand is ISO 27001 Information Security Management System compliant.
ISO 27017 cloud information security compliant
ISO 27017 standard provides guidance on the information security aspects of cloud computing, recommending and assisting with the implementation of cloud-specific information security controls supplementing the guidance in ISO/IEC 27002 and other ISO27k standards. IoTOnDemand is ISO 27017 Compliant for information security of cloud services.
ISO 27018 personal data protection
ISO 27018 is fully called ISO/IEC 27018 Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors, IoTOnDemand is compliant with ISO 27018 and it focuses on protecting the personal data in the cloud.
IoTOnDemand is CCPA-compliant by TrustArc and enables IoT platform with full-fledged and comprehensive mechanisms for data privacy protection, IoTOnDemand is dedicated to provide the better level of user data protection and serving our users with an optimized mechanism.
IoTOnDemand is adequately implementing data privacy and governance being TRUST certified. With this certification, IoTOnDemand is reaching next level of data and privacy adherence and a secure and trustworthy IoT platform. IoTOnDemand meet the TRUST Enterprise Privacy & Data Governance Practices Assessment Criteria.
SSAE 16 SOC 2 Type II
Industry Served: Service Providers, Software, IT Related Service Organizations. When it comes to evaluating the Security, Availability, Processing Integrity, and Confidentiality (Privacy) at a service organization, the SSAE-16 SOC-2 Type 2 report on controls is used to assess compliance and identify critical oversights.
PCI – Payment Card Industry
Industry Served: Banking, Financial, Credit Card Processing and Clearing House. No matter the size of your operation, if you accept credit card payments, you must protect cardholder data. In 2005, Payment Card Industry Council created the Payment Card Industry Data Security Standard– a requirement of all five major credit companies including American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa.
HIPAA – Health Insurance Portability and Accountability
Both the HIPAA Privacy Rule and HIPAA Security Rule outline national standards to safeguard sensitive patient data and protected health information (PHI). Where the privacy rule to the storing and sharing of medical records, the security rule more specifically outlines standards for handling electronic protected health information (ePHI). HIPAA compliant hosting providers and HIPAA compliant data centers must maintain certain administrative, physical and technical safeguards to keep records and personal health information confidential, error-free, and protected. Compliance standards set forth by U.S. Department of Health and Human Services outlines certain physical and technical protections.