Re: Use Cases | ACTION-13 Revisited

On Tue, Sep 4, 2012 at 4:38 PM, Mark Watson <watsonm@netflix.com> wrote:
>
> MW> The use of pre-provisioned symmetric keys to perform device authentication.

Can you further distill your use case to be "the use of shared
symmetric keys to perform authentication"?

It seems that the identity attached to a shared symmetric key does not
need to be an integral part of the Web Crypto API. The application can
manage the identity-to-symmetric key mapping.

Wan-Teh

Received on Wednesday, 5 September 2012 00:11:26 UTC