Implicit Certificates vs. Conventional Certificates
certificates conventional-certificates digital-certificates implicit-certificates
As devices proliferate and become more mobile, managing relationships between them is critical. Devices will move in and out of range of each other and can interact using wireless protocols and peer-to-peer connections, taking advantage of temporary or semi-permanent secure connections to share information and access services. There are many vertical applications for high level security using our technology that can be implemented efficiently, effectively and to conserve bandwidth. For example, applications using Near Field Communications (NFC), Smart Energy and Vehicle-to-Vehicle communications are well suited to our technology. The later example has the potential to require the largest Public-Key Infrastructure (PKI) every implemented. More will be said about this later in the article.