SlideShare a Scribd company logo
1 of 7
Download to read offline
Machine to Machine Authentication
Miri Systems machine to machine authentication technology can be tailored to
specific industries.
 Authentication occurs on demand and/or continuously between machines.
 Authentication can be one way or two way, both the controlling device
and the receiving device authenticate each other.
 Communication can also be encrypted.
Example Drone Diagram – Activation data is pushed to devices
VIA
User Control Station Drone
Cell Phone Computer Tablet Controller
The activation data can be pushed directly from the Institutions
cloud to the Drone and Control Station. Every account created on a
device acts as it own encoder/decoder.
Seed Data Seed Data
Example Drone Diagram – One Way Mission Control Authentication
VIA
User Control Station encoder Drone decoder
Control Station generates MiriID
Cell Phone Computer Tablet Controller
Control MiriID submitted
Control station transmits MiriID to validate and
authenticate mission instructions. Process can
occur continuously or at specified intervals.
Default to pre-determined protocol
No Yes
Mission continues
Example Drone Diagram – One Way Drone Authentication
VIA
User Control Station decoder Drone encoder
Drone generates MiriID
Cell Phone Computer Tablet Controller
Drone submits MiriID
MiriID is validating and verifying the data stream from the Drone and maintains the
chain of custody for the data.
Default to pre-determined protocol
Yes
Mission continues
No
Point A request connection to
point C and identifies and
authenticates itself through
MiriID. Point C makes a web
service call to the Command
Center for validation.
MiriID can validate millions of
transactions. Each transaction
verification is completed in 2 – 4
milliseconds.
Successful authentication and
authorization level for point A is
communicated to point C and
two way communication
between A and C is established.
Authentication
Command Center
Data
Point A
Data
Point B
Data
Point C
Data
Point D
Data
Point E
Encoder
Encoder
Encoder Encoder
Encoder
Decoder
*Each Data Point represents a machine device.
**Networks can include thousands of data points.
Two Way Device Authentication
Two Way Device Authentication
Point A request connection to
point C and attempts to identify
and authenticate itself through
MiriID. Point C makes a web
service call to the Command
Center for validation. Validation
is not granted.
Authentication
Command Center
Data
Point A
Data
Point B
Data
Point C
Data
Point D
Data
Point E
Encoder
Encoder
Encoder Encoder
Encoder
Decoder
*Each Data Point represents a machine device.
**Networks can include thousands of data points.
Contact Information:
Miri Systems, LLC
Corporate Address:
7804 Fairview Road, Suite 310
Charlotte, North Carolina 28226
Telephone: +1-704-837 0511
Fax: +1-617-977 0947
www.mirisystems.com

More Related Content

Similar to Machine to Machine Authentication Technology

Enabling supply chain flexibility and IoT scale with zero touch provisioning
Enabling supply chain flexibility and IoT scale with zero touch provisioningEnabling supply chain flexibility and IoT scale with zero touch provisioning
Enabling supply chain flexibility and IoT scale with zero touch provisioningEurotech
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsChas Yap
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
 
Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicjenie Emmons
 
Secure payments slick
Secure payments slick Secure payments slick
Secure payments slick gensoftpro
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce ApplicationMufaddal Nullwala
 
Cv0 001-q&a-demo-cert magic
Cv0 001-q&a-demo-cert magicCv0 001-q&a-demo-cert magic
Cv0 001-q&a-demo-cert magicjenie Emmons
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET Journal
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCloudIDSummit
 
Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)Aladdin Dandis
 

Similar to Machine to Machine Authentication Technology (20)

1. device onboarding
1. device onboarding1. device onboarding
1. device onboarding
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 
IoT Business Insights from Patents
IoT Business Insights from PatentsIoT Business Insights from Patents
IoT Business Insights from Patents
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 
Enabling supply chain flexibility and IoT scale with zero touch provisioning
Enabling supply chain flexibility and IoT scale with zero touch provisioningEnabling supply chain flexibility and IoT scale with zero touch provisioning
Enabling supply chain flexibility and IoT scale with zero touch provisioning
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magic
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Secure payments slick
Secure payments slick Secure payments slick
Secure payments slick
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
Cv0 001-q&a-demo-cert magic
Cv0 001-q&a-demo-cert magicCv0 001-q&a-demo-cert magic
Cv0 001-q&a-demo-cert magic
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)
 

Machine to Machine Authentication Technology

  • 1. Machine to Machine Authentication Miri Systems machine to machine authentication technology can be tailored to specific industries.  Authentication occurs on demand and/or continuously between machines.  Authentication can be one way or two way, both the controlling device and the receiving device authenticate each other.  Communication can also be encrypted.
  • 2. Example Drone Diagram – Activation data is pushed to devices VIA User Control Station Drone Cell Phone Computer Tablet Controller The activation data can be pushed directly from the Institutions cloud to the Drone and Control Station. Every account created on a device acts as it own encoder/decoder. Seed Data Seed Data
  • 3. Example Drone Diagram – One Way Mission Control Authentication VIA User Control Station encoder Drone decoder Control Station generates MiriID Cell Phone Computer Tablet Controller Control MiriID submitted Control station transmits MiriID to validate and authenticate mission instructions. Process can occur continuously or at specified intervals. Default to pre-determined protocol No Yes Mission continues
  • 4. Example Drone Diagram – One Way Drone Authentication VIA User Control Station decoder Drone encoder Drone generates MiriID Cell Phone Computer Tablet Controller Drone submits MiriID MiriID is validating and verifying the data stream from the Drone and maintains the chain of custody for the data. Default to pre-determined protocol Yes Mission continues No
  • 5. Point A request connection to point C and identifies and authenticates itself through MiriID. Point C makes a web service call to the Command Center for validation. MiriID can validate millions of transactions. Each transaction verification is completed in 2 – 4 milliseconds. Successful authentication and authorization level for point A is communicated to point C and two way communication between A and C is established. Authentication Command Center Data Point A Data Point B Data Point C Data Point D Data Point E Encoder Encoder Encoder Encoder Encoder Decoder *Each Data Point represents a machine device. **Networks can include thousands of data points. Two Way Device Authentication
  • 6. Two Way Device Authentication Point A request connection to point C and attempts to identify and authenticate itself through MiriID. Point C makes a web service call to the Command Center for validation. Validation is not granted. Authentication Command Center Data Point A Data Point B Data Point C Data Point D Data Point E Encoder Encoder Encoder Encoder Encoder Decoder *Each Data Point represents a machine device. **Networks can include thousands of data points.
  • 7. Contact Information: Miri Systems, LLC Corporate Address: 7804 Fairview Road, Suite 310 Charlotte, North Carolina 28226 Telephone: +1-704-837 0511 Fax: +1-617-977 0947 www.mirisystems.com