Key establishment for constrained resource devices
A constrained and equipment-based technology, applied in the field of key establishment, can solve the problem of inflexible access of trusted users and achieve low-cost effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Hereinafter, various embodiments of the present invention will be described in more detail with reference to the accompanying drawings. For purposes of explanation rather than limitation, specific details such as specific examples and techniques are set forth in order to provide a thorough understanding.
[0033] As mentioned above, restricting access to pre-provisioned trusted users is inflexible, since any client or user would have to be pre-provisioned in the constrained resource device in order for it to be able to access the constrained resource device. This is really a big flaw.
[0034] In order not to be limited to pre-specified trusted clients, a Trusted Third Party (TTP) is introduced in the process of granting access for new clients without re-provisioning constrained resource devices. A TTP representing the owner of the device naturally has a trust relationship with the constrained resource device. This trust relationship can be documented in the form of a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 