Distributed authentication with thresholds in iot devices

作者: John Teddy , Glen J. Anderson , Chakradhar Kotamraju

DOI:

关键词:

摘要: Managing authentication of a child device includes receiving, by host device, sensor data from deriving simplified the based on capability storing in an profile for and transmitting to wherein is sufficient allow authenticate user without device.

参考文章(12)
Masaaki Iwasaki, Takahiro Nakano, Shihoko Taguchi, Masahiko Nakahara, Kazuyoshi Serizawa, Tadashi Takeuchi, Process executing method and resource accessing method in computer system ,(1997)
Shigeru Hosono, Makoto Hatakeyama, Hidehito Gomi, Distributed Authentication System and Distributed Authentication Method ,(2007)
Hyun-Ju Hong, Woo-Sup Lee, Youn-Ju Kim, Jae-Bong Chun, Jung-Sik Park, Electronic device and transaction method using the same ,(2016)
James David Bacchus John Bradley, Zia Hayat, Systems and methods for decentralized user authentication ,(2016)
Francislav P. Penov, Xinlei Wang, Session management for internet of things devices ,(2016)
Steffen Schulz, Meiyuan Zhao, Jianqing Zhang, Jesse Walker, Xiruo Liu, System, Apparatus And Method For Key Provisioning Delegation ,(2016)