Secure computer operations

In some implementations, a computing device includes an identifier that is embedded into a firmware of the computing device. The identifier uniquely identifies the computing device from other computing devices. The computing device may send a request to a server to provide credentials to enable the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Worsley Timothy Craig
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In some implementations, a computing device includes an identifier that is embedded into a firmware of the computing device. The identifier uniquely identifies the computing device from other computing devices. The computing device may send a request to a server to provide credentials to enable the computing device to access a secured resource, such as secured data or a secured system. The computing device may provide the server with the identifier to enable the server to determine whether the computing device is authorized to access the secured resource. If the server determines that the computing device is authorized, the server may provide the credentials to the computing device. If the server determines that the computing device is unauthorized, the server may cause the computing device to perform one or more actions to render the computing device inoperable and/or render the resource inaccessible.