International Business Machines Corporation
DISTRIBUTED COMPUTING ON THE EDGE
Last updated:
Abstract:
A computer-implemented method includes: receiving, by a computing device, a request from a requester; determining, by the computing device, one or more delegates that are currently capable of handling the request; sending, by the computing device, a request package to each of the one or more delegates, the request package including an authentication challenge; receiving, by the computing device, a solution to the authentication challenge from a supplier, the solution being provided by a particular delegate of the one or more delegates; determining, by the computing device, the solution to the authentication challenge is valid; and instructing, by the computing device and in response to determining the solution to the authentication challenge is valid, the particular delegate to proceed with handling the request.
Utility
29 May 2020
2 Dec 2021