6SECURE DEVICE IDENTITY
For a long time, embedded systems ran anonymously in the shadows and didn’t care about remote access, digital business models, or sharing their data with other devices and cloud services. However, these days, those scenarios have changed fundamentally.
Suddenly, maintenance staff are now logging into devices remotely and can’t verify that they’re working with the correct device by looking at physical indicators. In addition, pay-per-use business models have become more and more popular in industrial scenarios, and devices write their own bills. Being able to prove the origin of usage data and mapping it to a specific customer ...
Get Engineering Secure Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.