Alice connects to Bob remotely using the internet. For example, Bob may run a commercial website from which Alice wants to purchase goods or services.
In Figure 3, Alice and Bob are both authentic and legitimate. Communication between them is safe.
Copyright © 2000-2016 Tridium Inc. All rights reserved.