Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/bobvanluijt/ubiquitous-computing-platform-identification-scheme
Ubiquitous Computing Authentication Scheme
https://github.com/bobvanluijt/ubiquitous-computing-platform-identification-scheme
identification internet-of-things scheme ubiquitous-computing
Last synced: 6 days ago
JSON representation
Ubiquitous Computing Authentication Scheme
- Host: GitHub
- URL: https://github.com/bobvanluijt/ubiquitous-computing-platform-identification-scheme
- Owner: bobvanluijt
- Created: 2017-06-26T09:59:54.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2017-06-26T10:21:50.000Z (over 7 years ago)
- Last Synced: 2024-12-15T11:57:13.045Z (8 days ago)
- Topics: identification, internet-of-things, scheme, ubiquitous-computing
- Size: 1000 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Ubiquotes Computing and Internet of Things simple identification scheme.
The following scheme is a simple authentication tree scheme used for authenticating devices, objects, etcetera. It is created to understand relations between objects inside Ubiquitous Computing and Internet of Things platforms.
# Why this scheme?
The goal is to make communication as simple as possible. You can have multiple use-cases based on this scheme. For example: a branch of keys can represent location, time, individuals, etcetera.# Definition
1. There is one root key.
2. With every key, a child key can be generated.
3. A child key can have write, read, delete, and execution rights.
4. A parent has access to a child, a child its children, etcetera.
5. A child has no access to a parent.
6. A child can have an expiration timestamp which, when expired, all children expire too.
7. A child can inherit all values from a parent except for the actual key.# Miscellaneous
- An object can have multiple keys.
- If you want to have a parent that can't write, read, delete or execute on a child. You can set these values to `false` and within the child to `true`.
- This is _not_ and authentication but identification scheme.# Comments or suggestions
If you see opportunity to improve this scheme, please create an issue in this repo.