You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/introduction/index.md
+5-7Lines changed: 5 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ NodeX is building future where machines own their identity and exchange verifiab
11
11
NodeX is an open-source toolkit that enables any developers to connect all devices and clouds, using features of decentralized identifiers as a basis of security and privacy. At a high level, the core components in NodeX are as follows;
12
12
13
13
-**NodeX Agent**: An open-source Agent that integrates into devices.
14
-
-**NodeX Hub**: A cloud access security broker that acts as an intermediary between devices and clouds.
14
+
-**NodeX Studio**: An integrated monitoring tool that enables NodeX Agent to monitor integrated devices and aims to improve the efficiency of DevOps for IoT devices.
15
15
-**NodeX Network**: A distributed network that operates public key certificates (DID Documents) of Agents.
16
16
17
17
@@ -32,24 +32,22 @@ An open-source Rust library that is extensible into any type of devices. Current
32
32
-**Key Management with RoT**: This component supports generating key pairs within the device and protect private keys with hardware security module, such as TPM2.0, TrustZone, Secure Crypto Engine.
33
33
-**Automated Provisioning**: This component supports registering and operating public key certificate (DID Document) generation, resolve, renewal, and revocation on a decentralized PKI without any IdPs, CAs, and intermediators.
34
34
-**Policy Management**: This component allows security-relevant configuration changes through an authorized NodeX Hub. It has access policy file (IPs, DIDs, endpoints), security policy file (security parameter, pre-shared-key) and update policy (logging transmission frequency).
35
-
-**E2E Secure Socket**: This component supports establishing a mutual authenticated channel with the Hub to exchange end-to-end authcrypt messages with clouds.
36
35
-**RoT Extension**: This component can be applied to RoTs with proprietary specifications by implementing shared libraries according to the API specification.
37
36
-**Device Extension**: This library can be distributed as middleware for IPC communication with client applications or as a library to be integrated into client application.
37
+
-**Message Encryption/Decryption**: To enable encrypted messages to be sent and received between devices, NodeX Agent provides message encryption and decryption.
38
38
39
39
For more information, see <ahref="https://github.com/nodecross/nodex-agent"class="external"target="_blank"rel="noopener noreferrer">GitHub page</a>.
40
40
41
-
### NodeX Hub
41
+
### NodeX Studio
42
42
43
-
A cloud access security broker consists of access broker, access control engine, access policy, inventory for secure communications between all devices and clouds. The core components are as follows;
43
+
Integrated device monitoring tool that integrates NodeX Agent for device authentication, access policy management, Agent data logging and visualization.
44
44
45
45
-**Device IAM**: This component supports device authentication based on digital signature scheme (256-bit ECDSA) rather than username and password.
46
-
-**Device Authenticity**: This component supports verifying the device authenticity by message authentication code generated by the pre-shared secret between Agent and Hub.
46
+
-**Device Authenticity**: This component supports verifying the device authenticity by message authentication code generated by the pre-shared secret between Agent and Studio.
47
47
-**Inventory Management**: This component supports managing a configuration file which stores authorized device DIDs and attributions.
48
48
-**Device Knowledge Database**: This component supports storing and real-time tracking device communication logs for vital checks and threat detection.
49
-
-**E2E Message Routing**: This component supports relaying encrypted messages on a publish/subscribe model between Agents.
50
49
-**Data Loss Prevention**: This component prevents devices from sending data or receiving data from unauthorized clouds by enforcing access policies.
51
50
-**Dynamic Access Control**: This component supports dynamically changing access policies based on device's identity, location, and behavior to prevent spoofing and unauthorized access
52
-
-**NodeX Studio**: User interface for operating the Hub supports launching a project and managing access policies and logging data of Agents.
0 commit comments