►
From YouTube: ACE and Internet of Things (IoT) at the IETF Hackathon
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
B
I'm
Eric
westrom
I
work
for
a
nexus
and
what
we're
trying
to
do
is
do
authentication
and
authorization
to
very
tiny
Internet
of
Things
devices
and
we're
working
on
a
door
lock
scenario,
so
we're
trying
to
reuse
a
lot
of
existing
technologies
that
already
exists,
so
this
phone
actually
tries
to
it
connects
to
server
and
authorization
server.
It
gets
DSM
web
tokens
and
what
we're
working
on
today
is
sending
these
tokens
over
ble
to
these
types
of
devices
and
I
just
web
token
can
then
be
verified
here
on
this
device
and
a
door
lock.
A
We
are
actually
reusing
a
number
of
IDF
technologies
that
have
been
working
on
in
different
groups.
First,
we
we
work
on
OS
use
ours
for
the
authorization,
as
Eric
said,
we
also
use
a
JSON
web
tokens
from
the
course
a
working
group,
but
we
also
tried
to
feed
work
back
into
the
ongoing
ADF
face
working
group
which,
which
I
co-chair
to
provide
feedback
about
the
feasibility
of
some
of
the
developed
mechanisms.
Here
are
a
few
example
devices
that
we
are
using
an
hour
in
our
death
set.
All
of
them
are
best
setup.
A
All
of
them
are
arm
cortex-m
processes
and
those
are
in
this
specific
case.
We
have
a
bluetooth,
smart
device
that
wait
for
incoming
connections.
Authorization
of
requests
was
a
door
lock
opening
requests,
and
then
the
scenario
assumes
that
you
are
basically
connecting
to
an
adjacent
device
to
have
that
interact
with
back-end
infrastructure
there.
We
again,
we
use
a
lot
of
existing
technology,
worked
on
in
the
IDF
core
working
group
to
do
the
device
management
such
as
co-op
on
DTLS
and
the
resource
directory,
and
so
on,
and.