Definition

machine authentication

Contributor(s): Matthew Haughn

Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.

Digital certificates used in machine authorization are like a form of digital passport providing trusted identification for the purpose of securely exchanging information over the Internet. Digital credentials are much like forms of machine-provided ID and password.

Machine authentication is used to authorize machine interactions on both wired and wireless networks to enable computers and other machines to interact and exchange information autonomously.  The processes of machine authentication can be performed by simple devices such as sensors and meters in infrastructure.

Common applications of machine authentication include:

  • Backup software updates and patches that must be conducted outside of business hours for optimal performance and reliability with minimal disruption.
  • Telemedicine devices that enable doctors to monitor patients remotely. 
  • Smart grid technologies that allow components of the electric grid to both communicate. 

M2M communication enables automated remote monitoring, as well as the capacity to trigger actions based on that monitoring. In product restocking, for example, a networked vending machine might message the distributor when a particular item is running low, automatically triggering an order. The technology is central to warehouse management, remote control, robotics, traffic control, logistic services, supply chain management (SCM) and fleet management. 

Machine-to-machine communication is also a fundamental technology for the Internet of Things (IoT), in which almost any entity or object imaginable can be provided with a unique identifier (UI) and the capacity to exchange data automatically over a network.  Internet of Things security and privacy are two crucial areas of concern in that scenario. Machine authentication is integral to ensuring both.

Machine authentication contrasts with user authentication, which is reliant upon the presence of a human user. 

This was last updated in December 2014

Continue Reading About machine authentication

Dig Deeper on Internet of Things (IoT) Security Strategy

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close