Method and apparatus for providing privacy management in machine-to-machine communications

ABSTRACT

A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy.

This application is a continuation of U.S. patent application Ser. No.13/324,660, filed Dec. 13, 2011, now U.S. Pat. No. 9,124,632, of whichis herein incorporated by reference in its entirety.

The present disclosure relates generally to machine-to-machinecommunications and, more particularly, to a method and apparatus forproviding privacy management for machine-to-machine communications.

BACKGROUND

Machine-to-machine (M2M) communication is gaining popularity and can besupported by various types of networks, e.g., a cellular access network.Traditionally, privacy has not been a concern for M2M communications.

SUMMARY

In one embodiment, the present disclosure provides a method forprocessing a request from a server of a machine-to-machine serviceprovider. For example, the method receives the request from the serverof the machine-to-machine service provider to communicate with amachine-to-machine device, determines whether to authorize the requestbased upon a policy in a privacy database, and enables communicationsbetween the server of the machine-to-machine service provider and themachine-to-machine device if the request is authorized based upon thepolicy.

BRIEF DESCRIPTION OF THE DRAWINGS

The essence of the present disclosure can be readily understood byconsidering the following detailed description in conjunction with theaccompanying drawings, in which:

FIG. 1 illustrates one example of a high level block diagram of acommunications network of the present disclosure;

FIG. 2 illustrates a more detailed block diagram of the communicationsnetwork of the present disclosure;

FIG. 3 illustrates an example flowchart of a method for providingprivacy management for machine-to-machine communications;

FIG. 4 illustrates an example flowchart of a method for provisioning aprivacy policy for the machine-to-machine devices;

FIG. 5 illustrates an example flowchart of a method for modifying aprivacy policy; and

FIG. 6 illustrates a high-level block diagram of a general-purposecomputer suitable for use in performing the functions described herein.

To facilitate understanding, identical reference numerals have beenused, where possible, to designate identical elements that are common tothe figures.

DETAILED DESCRIPTION

The present disclosure broadly discloses a method, non-transitorycomputer readable medium and apparatus for providing privacy managementfor machine-to-machine (M2M) communications. In one embodiment, amechanism based upon privacy policy settings of device users and serviceproviders is provided to protect M2M communications. Examples of M2Mcommunications include an appliance, e.g., a refrigerator, sending arequest to a grocery store to buy additional groceries, a grocery storerequesting inventory data of a user's refrigerator, a meter (e.g., anenergy meter, a gas meter, a water meter and the like) sending data to autility company, a sensor (e.g., a motion sensor, a temperature sensor,an Infrared sensor, and the like) sending a communication to a securitycompany and the like. Traditionally, privacy has not been a concern forM2M communications

However, the increasing popularity of M2M devices may lead to concernsregarding privacy for M2M communications, especially some communicationsthat may be privileged. For example, as M2M communications become moresophisticated, M2M communications may include privileged or personalinformation such as account numbers, credit card information, paymentinformation, address information, telephone numbers, user preferences,user behavior patterns, and the like. In addition, M2M communicationsmay be used to monitor user activity without permission from the user.The present disclosure resolves these privacy issues by providingprivacy management for M2M communications to control which M2M serviceproviders may access the M2M devices, when they may access the M2Mdevices, and how they may access the M2M devices.

FIG. 1 is a block diagram depicting one example of a communicationsnetwork 100. For example, the communications network 100 may be any typeof Internet Protocol (IP) network such as an IP Multimedia Subsystem orIP Multimedia Core Network Subsystem (IMS), a wired network, a wirelessnetwork, a Wi-Fi network, a cellular network, e.g., a long termevolution (LTE) network, and the like, related to the currentdisclosure. It should be noted that an IP network is broadly defined asa network that uses Internet Protocol to exchange data packets.

In one embodiment, the network 100 may comprise a core network 102, oneor more access networks 104 and 106, one or more M2M devices 116, 118and 120 and one or more M2M service providers 122 and 124 (havingrespective hardware servers (e.g., computer servers) 126, and 128 thatcan effect M2M communications with the M2M devices 116, 118 and 120). Inone embodiment, the core network 102 may include an edge/applicationprogramming interface (API) gateway 108, a M2M privacy gateway 110, andone or more databases 112 and 114. In one embodiment, the one or moredatabases 112 and 114 may include a privacy database for M2M serviceproviders 112 and a privacy database for M2M devices 114. Although FIG.1 illustrates three M2M devices 116, 118 and 120 and two M2M serviceproviders 122 and 124, any number of M2M devices or M2M serviceproviders may be deployed.

In one embodiment, the edge/API gateway 108 provides an interface forallowing the M2M service providers 122 and 124 to interact with the M2Mprivacy gateway 110. In one embodiment, the edge/API gateway 108 sits atan edge of the core network 102. The edge/API gateway 108 may haveaccess security functions and control access to the M2M privacy gateway110. In other words, the M2M service providers 122 and 124 do not havedirect access to the M2M privacy gateway 110. This will provide agreater security for the M2M privacy gateway 110.

In one embodiment, the M2M privacy gateway 110 controls the manner as tohow the M2M service providers 122 and 124 will have access to one of thedevices 116, 118 or 120. For example, requests for communicationsreceived from the M2M service provider 122 to access the M2M device 116may be routed to the M2M privacy gateway 110 via the edge/API gateway108. The M2M privacy gateway 110 may then check with the privacydatabase for M2M service providers 112 and/or the privacy database forthe M2M devices 114 to determine whether the request should be granted.

In one embodiment, the edge/API gateway 108 and the M2M privacy gateway110 may be implemented in hardware as a specialized computer server. Inone embodiment, the computer server may be similar to the generalpurpose computer illustrated in FIG. 4 and discussed in further detailbelow.

In one embodiment, the privacy database for M2M service providers 112and/or the privacy database for the M2M devices 114 may includerespective policies that are referenced by the M2M privacy gateway 110to determine whether a request from the M2M service providers 122 and/or124 should be granted. In one embodiment, a privacy policy stored in theprivacy database for M2M service providers 112 may be defined by acommunications network service provider of the core network 102. Inanother embodiment, the privacy policy may be defined based uponparameters associated with a service level agreement negotiated betweenthe communications network service provider and a particular M2M serviceprovider.

In one embodiment, the communications network service provider definedprivacy policy may define which M2M service providers are authorized tocommunicate over the communications network 100 (e.g., via predefinedlist of approved M2M service providers), when the M2M service providermay communicate with a M2M device, how much bandwidth is allocated tothe M2M service provider for communications, what types ofcommunications or actions may be performed by the M2M service provider,and the like.

For example, the communications network service provider may only allowM2M service providers that subscribe to services from the communicationsnetwork service provider to access the communications network 100. Inanother example, only M2M service providers that have a particularsecurity clearance may be authorized to access the communicationsnetwork 100. In yet another example, the communications network serviceprovider may simply predefine a list of M2M service providers that areallowed to access the communications network 100. The above are onlyexamples and should not be considered as limiting of the presentdisclosure.

The communications network service provider may also set how muchbandwidth will be allocated to the M2M service provider at variouspredetermined times. For example, the communications network serviceprovider may provide more bandwidth during off peak hours and lessbandwidth during peak hours. In one embodiment, the communicationsnetwork service provider may not provide any bandwidth during certaintimes of the day if there is scheduled maintenance in the communicationsnetwork 100. The above are only examples and should not be considered aslimiting of the present disclosure.

In one embodiment, the communications network service provider may onlyallow the M2M service provider to obtain information from the M2Mdevices, but not allow the M2M service provider to upload any data tothe M2M devices for security reasons. For example, the communicationsnetwork service provider may define what types of communications may beexchanged. For example, the communications network service provider mayspecify that communications involving personal data may not beexchanged. The above are only examples and should not be considered aslimiting of the present disclosure.

In one embodiment, the privacy policy defined by the communicationsnetwork service provider is dynamically negotiable. In other words, theprivacy policy may be modified “on the fly” for a brief time periodafter the privacy policy is initially defined by the communicationsnetwork service provider to satisfy a temporary need of the M2M serviceprovider. For example, during a peak shopping season, the M2M serviceprovider 122 may request to have additional bandwidth for communicationsto the M2M device 122 for a temporary time frame, e.g., one week, thatis outside of the privacy policy defined by the communications networkservice provider. If additional bandwidth is available, thecommunications network service provider may adjust the privacy policy toprovide additional bandwidth temporarily on a dynamic basis. In oneembodiment, the M2M service provider 122 may have to pay an additionalfee for the change.

In one embodiment, a privacy policy stored in the privacy database forM2M devices 114 may be defined by a user of an M2M device. For example,a user of the M2M device 116 may define a privacy policy for the M2Mdevice 116 that is stored in the privacy database for M2M devices 114.

In one embodiment, the user defined privacy policy may define which M2Mservice providers are authorized to communicate with the M2M device(e.g., via a predefined list of approved M2M service providers), whenthe M2M service provider may communicate with the M2M device, how muchbandwidth is allocated to the M2M service provider for communications,what types of communications or actions may be performed by the M2Mservice provider, and the like.

For example, a user may only allow M2M service providers for which theyare subscribed to services to access his or her M2M device(s). In otherwords, the user may not allow unsolicited communications from M2Mservice providers. In another example, the user may only allow access tohis or her M2M device(s) between 6 PM and midnight while they are homeso that the user may monitor the activity and communications between theM2M service provider and their M2M device. In another example, the usermay limit the number of times for a predefined time period that the M2Mservice provider may access the M2M device. In another example, the usermay only allow a certain percentage of available bandwidth to be used bya particular M2M service provider such that the M2M device may havebandwidth to access other M2M service providers or execute other tasks.

The user may define which M2M devices (e.g., each user may have aplurality of M2M devices) that the M2M service provider may have accessto, what types of activities may be performed on each of the M2M deviceslisted, and a limit as to the allowed activities. For example, the usermay specify that the M2M service provider may only request inventorydata from a refrigerator, but not initiate any new orders for groceries.In another example, the user may allow the M2M service provider to onlyinitiate new orders for perishable foods, such as milk and eggs, andlimit the orders to no more than two per item. The above are onlyexamples and should not be considered as limiting to the presentdisclosure.

Although two databases 112 and 114 are illustrated in FIG. 1, it shouldbe noted that any number of databases may be deployed. In oneembodiment, a single database may be deployed to store both the privacypolicy defined by the communications network service provider and theprivacy policy defined by the user.

In one embodiment, the M2M devices or machines 116, 118 and 120 may beany type of machine capable of communicating over the communicationsnetwork 100. For example, the machines 116, 118 and 120 may be any typeof smart hardware devices or appliances such a refrigerator, a freezer,a set top box, a modem, a terminal adaptor, a sensor, and the like. Itshould be noted that the present disclosure is not limited to anyparticular type of machines.

In one embodiment, the M2M service provider 122 and 124 may be any typeof M2M service provider. For example, the M2M service provider 122 and124 may be a grocery store, a utility company, a repair shop forappliances, a department store, and the like.

In one embodiment, the access networks 104 and 106 may be any type ofaccess network such as a cellular network, an LTE network, a wirelessnetwork, a Wi-Fi network, a publicly switched telephone network (PSTN),an Internet Protocol (IP) network, and the like. The access networks 104and 106 may be operated by the same operator or by different operators.The access networks 104 and 106 and the core network 102 may includeadditional network elements that are not disclosed. For example, theaccess networks 104 and 106 and the core network 102 may also includeborder elements, gateways, routers, switches, call control elements,firewalls, various application servers, and the like.

FIG. 2 illustrates a more detailed block diagram of a communicationsnetwork 200 of the present disclosure. In one embodiment, FIG. 2illustrates, by example, a flow of communications between M2M serviceproviders 202, the edge/API gateway 108, the M2M privacy gateway 110,the privacy database for M2M service providers 112, the privacy databasefor M2M devices 114 and M2M devices 204.

The flow of communications is illustrated by arrows 206, 208, 210, 212,214 and 216. For example, arrows 206 and 208 illustrate communicationsrelated to a request received from the M2M service providers 202 to theM2M privacy gateway 110. The arrows 214 and 216 illustratecommunications related to a response to the request sent from the M2Mprivacy gateway 110 back to the M2M service providers 202. The arrows210 and 212 illustrate communications between the M2M privacy gateway110 and the privacy database for M2M service providers 112 and theprivacy database for M2M devices 114, respectively.

As illustrated by FIG. 2, in one embodiment, the requests to communicatewith the M2M devices 204 flow from the M2M service providers to theedge/API gateway 108. The edge/API gateway 108 may then parse therequest and send a policy request to the M2M privacy gateway 110 foraccess permission.

Upon receiving the policy request, the M2M privacy gateway 110 mayreference the privacy database for M2M service providers 112 and theprivacy database for M2M devices 114 to determine if the particular M2Mservice provider is an authorized M2M service provider and what mannerof access is allowed for that particular M2M service provider.

If the request is granted, the M2M privacy gateway 110 may then respondto the edge/API gateway 108 with detailed instructions including one ormore parameters defining what type of access, how much access and whenthe M2M service provider may access the M2M device. Subsequently, one ofthe M2M service providers 202 may establish communications with one ofthe M2M devices 204, as represented by the two way arrow 218 forauthorized data flow.

FIG. 3 illustrates a flowchart of a method 300 for providing privacymanagement for machine-to-machine communications. In one embodiment, themethod 300 may be performed by a specialized computer server, e.g., theM2M privacy gateway 110 or a general purpose computer as illustrated inFIG. 6 and discussed below.

The method 300 begins at step 302. At step 304, the method 300 receivesa request from an M2M service provider to communicate with an M2Mdevice. For example, the request may be from a utility company to accessa meter at a user's home to determine how much electricity the user hasconsumed.

In one embodiment, the request may be received indirectly from the M2Mservice provider, for example, via an edge/API gateway. Using theedge/API gateway may provide more security by preventing the M2M serviceprovider from having direct access to the M2M privacy gateway 110.

At step 306, the method 300 determines whether to authorize the requestbased upon a policy in a privacy database. In one embodiment, twoseparate policies in two different databases may be checked to determinewhether or not to authorize the request. For example, one of the privacypolicies may be a communications network service provider definedprivacy policy stored in a privacy database for M2M service providers.Another one of the privacy policies may be a user defined privacy policystored in a privacy database for M2M devices.

For example, the M2M service provider may attempt to communicate with aM2M device at 2:00 AM and need a particular amount of bandwidth. The M2Mprivacy gateway may check the privacy policy in the privacy database forM2M service providers to find that the M2M service provider is anauthorized M2M service provider and that the particular amount ofbandwidth at 2:00 AM is allowed within the communications networkservice provider defined privacy policy.

The M2M privacy gateway may also check the privacy policy in the privacydatabase for M2M devices. The user defined privacy policy may allow theM2M service provider to access the M2M device associated with the userat 2:00 AM.

If the request is not authorized at step 306, the method 300 proceeds tostep 308. At step 308, the method 300 provides a reason as to why therequest was denied back to the requestor. The method 300 proceeds tostep 310, where the method 300 determines if the requestor providedadditional information. For example, additional information may berequested to rectify the reason the request was denied.

If no additional information is provided, then the method 300 mayproceed back to step 304 to receive another request. If additionalinformation was provided by the requestor that addressed the reason forthe denial, then the method 300 may proceed to step 312.

Referring back to step 306, if the request is authorized, then themethod 300 proceeds to step 312. At step 312, the method 300 provides orenables communications (e.g., establishing a communication session)between the M2M service provider and the M2M device if the request isauthorized based upon the policy. Using the above example discussed atstep 306, the request would be authorized as the request does notviolate any of the privacy policies. As a result, a communications pathbetween the M2M service provider and the M2M device may be establishedand the M2M service provider may be permitted to transmit and receivedata from the M2M device.

At step 314, the method 300 enforces the policy during thecommunications. In other words, any communication or transaction betweenthe M2M service provider and the M2M device is monitored to ensure thatthey are in compliance with the policy. The method 300 ends at step 316.

FIG. 4 illustrates a flowchart of a method 400 for provisioning aprivacy policy for one or more the M2M devices. In one embodiment, themethod 400 may be performed by a specialized computer server, e.g., theM2M privacy gateway 110 or a general purpose computer as illustrated inFIG. 6 and discussed below.

The method 400 begins at step 402. At step 404, the method 400 providesa predefined template to a user for a privacy policy for a M2M device.For example, the network service provider may have an initial privacypolicy having default settings that show the user of the M2M devicewhich parameters may be configured or modified. For example, someparameters may be initially populated on behalf of the user, e.g., basedon government regulations and/or suggestions made by a network serviceprovider.

At step 406, the method 400 receives one or more initial parameters. Forexample, the user of the M2M device may provide inputs as to how he orshe would like each one of the parameters in the privacy policy to beset.

At step 408, the method 400 determines if there are additionalparameters that will be received from the user. If there are additionalparameters, the method goes back to step 406 to receive them from theuser. If there are no additional parameters, then all of the parametersare received and the method 400 proceeds to step 410.

At step 410, the method 400 finalizes the privacy policy for the M2Mdevice. For example, the predefined template may be modified inaccordance with the received initial parameters.

At step 412, the method 400 stores the privacy policy in the privacydatabase for M2M device. At optional step 414, the method 400 mayconfigure the M2M device based upon the stored privacy policy for M2Mdevices. The method 400 ends at step 416.

FIG. 5 illustrates a flowchart of a method 500 for modifying a privacypolicy. In one embodiment, the method 500 may be performed by aspecialized computer server, e.g., the M2M privacy gateway 110 or ageneral purpose computer as illustrated in FIG. 6 and discussed below.

The method 500 begins at step 502. At step 504, the method 500 receivesa request to modify a privacy policy.

At step 506, the method 500 determines and authenticates the source ofthe change request. If the request is from an M2M service provider,i.e., the source is identified as an M2M service provider, the method500 proceeds to step 508.

At step 508, the method 500 receives changes from the M2M serviceprovider. At step 510, the method 500 modifies the privacy policy forthe M2M service provider. At step 512, the method 500 stores the privacypolicy that is modified in the privacy database for the M2M serviceprovider. The method 500 ends at step 520.

Referring back to step 506, if the request is not from an M2M serviceprovider, then the request is from the user of an M2M device, i.e., thesource is identified as an end user and the method proceeds to step 514.

At step 514, the method 500 receives changes from a user of an M2Mdevice. At step 516, the method 500 modifies the privacy policy for theM2M device. At step 518, the method 500 stores the privacy policy thatis modified in the privacy database for M2M device. The method ends atstep 520.

It should be noted that although not explicitly specified, one or moresteps of the methods 300, 400 and 500 described above may include astoring, displaying and/or outputting step as required for a particularapplication. In other words, any data, records, fields, and/orintermediate results discussed in the methods can be stored, displayed,and/or outputted to another device as required for a particularapplication. Furthermore, steps or blocks in FIGS. 3-5 that recite adetermining operation, or involve a decision, do not necessarily requirethat both branches of the determining operation be practiced. In otherwords, one of the branches of the determining operation can be deemed asan optional step.

FIG. 6 depicts a high-level block diagram of a general-purpose computersuitable for use in performing the functions described herein. Asdepicted in FIG. 6, the system 600 comprises a processor element 602(e.g., a CPU), a memory 604, e.g., random access memory (RAM) and/orread only memory (ROM), a module 605 for providing privacy managementfor machine-to-machine communications, and various input/output devices606 (e.g., storage devices, including but not limited to, a tape drive,a floppy drive, a hard disk drive or a compact disk drive, a receiver, atransmitter, a speaker, a display, a speech synthesizer, an output port,and a user input device (such as a keyboard, a keypad, a mouse, and thelike)).

It should be noted that the present disclosure can be implemented insoftware and/or in a combination of software and hardware, e.g., usingapplication specific integrated circuits (ASIC), a general purposecomputer or any other hardware equivalents, e.g., computer readableinstructions pertaining to the method(s) discussed above can be used toconfigure a hardware processor to perform the steps of the abovedisclosed methods. For example, a computer-readable medium may be incommunication with the processor, where the computer-readable mediumhaving stored thereon a plurality of instructions, the plurality ofinstructions including instructions which, when executed by the hardwareprocessor, cause the hardware processor to perform the methods (e.g.,methods 300, 400 and 500) as disclosed above.

In one embodiment, the present module or process 405 for providingprivacy management for machine-to-machine communications can be loadedinto memory 604 and executed by processor 602 to implement the functionsas discussed above. As such, the present methods 605 for providingprivacy management for machine-to-machine communications (includingassociated data structures) of the present disclosure can be stored on anon-transitory (physical and tangible) computer readable storage medium,e.g., RAM memory, magnetic or optical drive or diskette and the like.For example, the processor 602 can be programmed or configured withinstructions (e.g., computer readable instructions) to perform the stepsof methods 300, 400 and 500.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of a preferred embodiment shouldnot be limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A method for processing a request from a serverof a machine-to-machine service provider, the method comprising:receiving, by a system comprising a processor in a communication networkof a communication network service provider, the request from the serverof the machine-to-machine service provider to communicate with amachine-to-machine device, wherein the machine-to-machine devicecomprises an appliance; determining, by the system in the communicationnetwork, whether to authorize the request based upon amachine-to-machine service provider policy in a machine-to-machineservice provider privacy database located in the communication network;determining, by the system in the communication network, a manner ofaccess that is allowed based upon a machine-to-machine device policy ina machine-to-machine device privacy database located in thecommunication network when the request is authorized, wherein themachine-to-machine device policy is defined by a user of themachine-to-machine device, wherein the manner of the access that isallowed is defined by the user; sending, by the system in thecommunication network, a response to the server of themachine-to-machine service provider, where the response defines themanner of the access that is allowed when the request is authorized; andmonitoring, by the system, communications between the server of themachine-to-machine service provider and the machine-to-machine device todetermine whether the communications are in compliant with themachine-to-machine device policy.
 2. The method of claim 1, wherein therequest is received at a machine-to-machine privacy gateway.
 3. Themethod of claim 1, wherein the request is routed via an applicationprogramming interface gateway.
 4. The method of claim 1, wherein themachine-to-machine service provider policy associated with themachine-to-machine service provider privacy database is dynamicallynegotiable.
 5. The method of claim 4, wherein the machine-to-machineservice provider policy associated with the machine-to-machine serviceprovider privacy database is defined by the communication networkservice provider.
 6. The method of claim 1, wherein the response is sentwhen the request from the server of the machine-to-machine serviceprovider is deemed not to violate a privacy policy.
 7. The method ofclaim 1, wherein the response further comprises a request for additionalinformation when the request from the server of the machine-to-machineservice provider is deemed to violate a privacy policy.
 8. Anon-transitory computer-readable medium storing a plurality ofinstructions, which when executed by a processor of a system in acommunication network of a communication network service provider, causethe processor to perform operations for processing a request from aserver of a machine-to-machine service provider, the operationscomprising: receiving the request from the server of themachine-to-machine service provider to communicate with amachine-to-machine device, wherein the machine-to-machine devicecomprises an appliance; determining whether to authorize the requestbased upon a machine-to-machine service provider policy in amachine-to-machine service provider privacy database located in thecommunication network; determining a manner of access that is allowedbased upon a machine-to-machine device policy in a machine-to-machinedevice privacy database located in the communication network when therequest is authorized, wherein the machine-to-machine device policy isdefined by a user of the machine-to-machine device, wherein the mannerof the access that is allowed is defined by the user; sending a responseto the server of the machine-to-machine service provider, where theresponse defines the manner of the access that is allowed when therequest is authorized; and monitoring communications between the serverof the machine-to-machine service provider and the machine-to-machinedevice to determine whether the communications are in compliant with themachine-to-machine device policy.
 9. The non-transitorycomputer-readable medium of claim 8, wherein the request is received ata machine-to-machine privacy gateway.
 10. The non-transitorycomputer-readable medium of claim 8, wherein the request is routed viaan application programming interface gateway.
 11. The non-transitorycomputer-readable medium of claim 8, wherein the machine-to-machineservice provider policy associated with the machine-to-machine serviceprovider privacy database is dynamically negotiable.
 12. Thenon-transitory computer-readable medium of claim 11, wherein themachine-to-machine service provider policy associated with themachine-to-machine service provider privacy database is defined by thecommunication network service provider.
 13. The non-transitorycomputer-readable medium of claim 8, wherein the response is sent whenthe request from the server of the machine-to-machine service provideris deemed not to violate a privacy policy.
 14. The non-transitorycomputer-readable medium of claim 8, wherein the response furthercomprises a request for additional information when the request from theserver of the machine-to-machine service provider is deemed to violate aprivacy policy.
 15. An apparatus for processing a request from a serverof a machine-to-machine service provider, the apparatus comprising: aprocessor in a communication network of a communication network serviceprovider; and a computer readable medium storing a plurality ofinstructions which, when executed by the processor, cause the processorto perform operations, the operations comprising: receiving the requestfrom the server of the machine-to-machine service provider tocommunicate with a machine-to-machine device, wherein themachine-to-machine device comprises an appliance; determining whether toauthorize the request based upon a machine-to-machine service providerpolicy in a machine-to-machine service provider privacy database locatedin the communication network; determining a manner of access that isallowed based upon a machine-to-machine device policy in amachine-to-machine device privacy database located in the communicationnetwork when the request is authorized, wherein the machine-to-machinedevice policy is defined by a user of the machine-to-machine device,wherein the manner of the access that is allowed is defined by the user;sending a response to the server of the machine-to-machine serviceprovider, where the response defines the manner of the access that isallowed when the request is authorized; and monitoring communicationsbetween the server of the machine-to-machine service provider and themachine-to-machine device to determine whether the communications are incompliant with the machine-to-machine device policy.
 16. The apparatusof claim 15, wherein the apparatus comprises a machine-to-machineprivacy gateway.
 17. The apparatus of claim 15, wherein the request isrouted via an application programming interface gateway.
 18. Theapparatus of claim 15, wherein the machine-to-machine service providerpolicy associated with the machine-to-machine service provider privacydatabase is dynamically negotiable.
 19. The apparatus of claim 18,wherein the machine-to-machine service provider policy associated withthe machine-to-machine service provider privacy database is defined bythe communication network service provider.
 20. The apparatus of claim15, wherein the response is sent when the request from the server of themachine-to-machine service provider is deemed not to violate a privacypolicy.