Internet of things (“IoT”) multi-layered embedded handshake

作者: Kurian Manu

DOI:

关键词:

摘要: Methods for securing data transmission are provided. include utilizing a plurality of cross-connect tokens. receiving communication line validation at source device. powering first passive token located the The may draw power from communication. generate OTSC (“onetime security code”). transmit to second token. validate OTSC, and OTSC. third be on target transmit, upon validation, validated

参考文章(42)
Mohammed Ataur Rahman Shuman, Amit Goel, Ashutosh Aggarwal, Sandeep Sharma, Binita Gupta, Automatic IoT device social network expansion ,(2014)
Lewis T. Donzis, Peter W. Baron, Ryan M. Matelske, Earnest E. Hughes, Detecting if a secure link is alive ,(2000)
Leo Temoshenko, Xiaogang Wang, Earl Hardin Booth, Charles Steven Lingafelt, Phuong Thanh Nguyen, System and method to monitor and determine if an active IPSec tunnel has become disabled ,(2000)
Chris Matthieu, Geir Ramleth, Machine-to-machine instant messaging ,(2014)
Ryo Koyama, Michael J.S. Smith, Michael W. Johnson, Techniques for the deployment and management of network connected devices ,(2015)
Doron Zehavi, Lior Amarilio, Zeev Shusterman, On-boarding a device to a secure local network ,(2015)