Verifying a computing device after transport

One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage loc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zavertnik, Gregory J, Mahalingappa, Vishwajit Tumkur, Jagdale, Varsha, Thekkoot, Vimalraj Vasudevan, Jain, Soumya, Victor, Sampath Kumar, Nagarathinam, Karthikeyan
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!