FOR IOT DEVICES OPERATING IN HOSTILE ENVIRONMENTS
The IoT presents many challenges encompassing a wide spectrum of use cases. Many IoT devices need to support customized authorizations, permissions, and restrictions. These device-level requirements become challenging when devices must collaborate in hostile environments while also following business rules and logic installed at the device level. Internet access is never 100% requiring IoT devices to continuously operate under authorized control without internet access.
TRUSTED IOT TRANSACTIONS
Trust in the transactions provided by IoT devices is critical. TrustCentral incorporates proprietary technology to support trusted provenance (origin) in order to for there to be trusted data.
A DEVICE-LEVEL, CERTIFICATE-ENFORCED TECHNOLOGY
This starts with the creation of authenticated, persistent, Secure Communication Lines between paired endpoints. Each Communication Line is authorized and secured by a digital certificate incorporating rules and business logic of use for that Communication Line that in turn, whitelists relationships, and controls activities according to management’s preferences. Secure IoT Device Groups are also a vital component of this technology.
AUTHORIZATIONS AT THE DEVICE-LEVEL
IoT device authorization technology is put in place via certificates at the device-level and therefore builds from the bottom up. By building our technology on the world’s most depended upon security standard (X.509) ours is a highly scalable solution. This patented bottom up approach will be far easier to manage and expand than anything imagined so far.
For AAA, TrustCentral provides a solution for AUTHORIZATION and ACCOUNTING for IoT devices that collaborate in hostile environments.
- Authentication(device identity)
- Authorization(device privileges)
- Accounting(device usage, activity parameters, etc.)
TrustCentral has patented the use of device-level certificates with communication lines to manage device-level authorization of endpoint interactions, rather than manage devices from a complex, top-down network approach. This provides a precise authorization technology that is vital in order to establish and manage privileges for limited-resource IoT devices that:
- Operate in hostile environments
- Need precise instructions as to the limited endpoints with which they may communicate
- Must operate within precise rules of authorization and privilege
- Must support their own security
- Need their data and activities accurately accounted for
NEEDS FOR AUTHENTICATION AND FOR AUTHORIZATION
The TrustCentral security ecosystem provides versatility and ease of use for solutions that don’t currently exist. Our patented technology enables operators to successfully solve diffcult challenges while also arming devices with tools for them to handle hacking and spoofing attacks. These robust IoT solutions provide metrics for data and device trustworthiness, as well as auditability of device activities.
TrustCentral’s target customers are solution providers, systems integrators and hardware vendors. These, in turn, will license and support integrated solutions for their specific end-customer use cases.
THE GENESIS OF CORE TRUSTCENTRAL TECHNOLOGY
Dr. David Kravitz (TrustCentral’s primary inventor) came up with an innovative approach: “let’s use X.509 in a different way from its traditional ‘central-point-to-endpoint’ point approach, but rather so that endpoints may authenticate and securely communicate with each other.” This innovative concept is the inception of what became Secure Communication Lines: a core component of TrustCentral’s intellectual property.