FOR AAA, TRUSTCENTRAL PROVIDES A SOLUTION FOR AUTHORIZATION AND ACCOUNTING FOR IOT DEVICES THAT COLLABORATE IN HOSTILE ENVIRONMENTS.
- Authentication (device identity)
- Authorization (device privileges)
- Accounting (device usage, activity parameters, etc.)
FOR IOT DEVICES OPERATING IN HOSTILE ENVIRONMENTS
The IoT presents many challenges encompassing a wide spectrum of use cases. Many IoT devices need to support customized authorizations, permissions, and restrictions. These device-level requirements become challenging when devices must collaborate in hostile environments while also following business rules and logic installed at the device level. Internet access is never 100% requiring IoT devices to continuously operate under authorized control without internet access.
TRUSTED IOT TRANSACTIONS
Trust in the transactions provided by IoT devices is critical. TrustCentral incorporates proprietary technology to support trusted provenance (origin) in order to for there to be trusted data.
A DEVICE-LEVEL, CERTIFICATE-ENFORCED TECHNOLOGY
This starts with the creation of authenticated, persistent, Certificate-Enforced Relationships between paired endpoints. Each Enhanced Relationship is authorized and secured by a digital certificate incorporating rules and business logic of use for that Enhanced Relationship that in turn, whitelists relationships, and controls activities according to management’s preferences. Secure IoT Device Groups are also a vital component of this technology.
AUTHORIZATIONS AT THE DEVICE-LEVEL
IoT device authorization technology is put in place via certificates at the device-level and therefore builds from the bottom up. By building our technology on the world’s most depended upon security standard (X.509) ours is a highly scalable solution. This patented bottom up approach will be far easier to manage and expand than anything imagined so far.