TrustPoint Blog › conventional-certificates

Implicit Certificates vs. Conventional Certificates

certificates conventional-certificates digital-certificates implicit-certificates

Written by Scott Vanstone on October 24, 2022

As devices proliferate and become more mobile, managing relationships between them is critical. Devices will move in and out of range of each other and can interact using wireless protocols and peer-to-peer connections, taking advantage of temporary or semi-permanent secure connections to share information and access services. There are many vertical applications for high level security using our technology that can be implemented efficiently, effectively and to conserve bandwidth. For example, applications using Near Field Communications (NFC), Smart Energy and Vehicle-to-Vehicle communications are well suited to our technology. The later example has the potential to require the largest Public-Key Infrastructure (PKI) every implemented. More will be said about this later in the article.

Continue reading full post

About this Blog

The TrustPoint Blog covers security industry topics relating to ECC, Certificates, and machine-to-machine communcation.

More Categories