Machine authentication
from whatis.com
from whatis.com
Machine
authentication is the authorization of an automated human-to-machine or
machine-to-machine (M2M)
communication through verification of a digital
certificate or digital credentials.
Digital
certificates used in machine authorization are like a form of digital passport
providing trusted identification for the purpose of securely exchanging
information over the Internet. Digital credentials are much like forms of
machine-provided ID and password.
Machine authentication
is used to authorize machine interactions on both wired and wireless networks
to enable computers and other machines to interact and exchange information
autonomously. The processes of machine authentication can be performed by
simple devices such as sensors and meters in infrastructure.
Common
applications of machine authentication include:
- Backup software updates and patches that must be conducted outside of business hours for optimal performance and reliability with minimal disruption.
- Telemedicine devices that enable doctors to monitor patients remotely.
- Smart grid technologies that allow components of the electric grid to both communicate.
M2M
communication enables automated remote monitoring, as well as the capacity to
trigger actions based on that monitoring. In product restocking, for example, a
networked vending machine might message the distributor when a particular item
is running low, automatically triggering an order. The technology is
central to warehouse management, remote
control, robotics,
traffic control, logistic services, supply chain management (SCM)
and fleet management.
Machine-to-machine
communication is also a fundamental technology for the Internet of Things (IoT),
in which almost any entity or object imaginable can be provided with a unique
identifier (UI) and the capacity to exchange data automatically over a
network. Internet of
Things security and privacy
are two crucial areas of concern in that scenario. Machine authentication is
integral to ensuring both.
Machine
authentication contrasts with user authentication, which is reliant upon the
presence of a human user.
---------------------------------------------------------------
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
===============================================
---------------------------------------------------------------
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
If you have not already done so, please view the trailer for my book below.
===============================================
No comments:
Post a Comment