作者: Jan Vilhuber , Joseph Salowey
DOI:
关键词: Cryptographic protocol 、 Computer science 、 Computer security 、 Public-key cryptography 、 Process (computing)
摘要: Techniques for validating a first device are provided. A second receives public key and identification information from the device. Validation of is required security process using protocol. The sends to an AAA server validation. separate response server, including indication whether received validated with stored key. If validated, action performed