VERIFYING A COMPUTING DEVICE AFTER TRANSPORT
One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage loc...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | JAIN, Soumya ZAVERTNIK, Gregory J VICTOR, Sampath Kumar JAGDALE, Varsha MAHALINGAPPA, Vishwajit Tumkur NAGARATHINAM, Karthikeyan THEKKOOT, Vimalraj Vasudevan |
description | One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment.
L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_WO2020060609A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>WO2020060609A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_WO2020060609A13</originalsourceid><addsrcrecordid>eNrjZNAJcw3ydIv09HNXcFRw9vcNCA0BsV1cwzydXRUc3UJcgxRCghz9ggP8g0J4GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8uL-RgZGBgRkQWjoaGhOnCgA4WSYu</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><source>esp@cenet</source><creator>JAIN, Soumya ; ZAVERTNIK, Gregory J ; VICTOR, Sampath Kumar ; JAGDALE, Varsha ; MAHALINGAPPA, Vishwajit Tumkur ; NAGARATHINAM, Karthikeyan ; THEKKOOT, Vimalraj Vasudevan</creator><creatorcontrib>JAIN, Soumya ; ZAVERTNIK, Gregory J ; VICTOR, Sampath Kumar ; JAGDALE, Varsha ; MAHALINGAPPA, Vishwajit Tumkur ; NAGARATHINAM, Karthikeyan ; THEKKOOT, Vimalraj Vasudevan</creatorcontrib><description>One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment.
L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.</description><language>eng ; fre</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200326&DB=EPODOC&CC=WO&NR=2020060609A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200326&DB=EPODOC&CC=WO&NR=2020060609A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JAIN, Soumya</creatorcontrib><creatorcontrib>ZAVERTNIK, Gregory J</creatorcontrib><creatorcontrib>VICTOR, Sampath Kumar</creatorcontrib><creatorcontrib>JAGDALE, Varsha</creatorcontrib><creatorcontrib>MAHALINGAPPA, Vishwajit Tumkur</creatorcontrib><creatorcontrib>NAGARATHINAM, Karthikeyan</creatorcontrib><creatorcontrib>THEKKOOT, Vimalraj Vasudevan</creatorcontrib><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><description>One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment.
L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAJcw3ydIv09HNXcFRw9vcNCA0BsV1cwzydXRUc3UJcgxRCghz9ggP8g0J4GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8uL-RgZGBgRkQWjoaGhOnCgA4WSYu</recordid><startdate>20200326</startdate><enddate>20200326</enddate><creator>JAIN, Soumya</creator><creator>ZAVERTNIK, Gregory J</creator><creator>VICTOR, Sampath Kumar</creator><creator>JAGDALE, Varsha</creator><creator>MAHALINGAPPA, Vishwajit Tumkur</creator><creator>NAGARATHINAM, Karthikeyan</creator><creator>THEKKOOT, Vimalraj Vasudevan</creator><scope>EVB</scope></search><sort><creationdate>20200326</creationdate><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><author>JAIN, Soumya ; ZAVERTNIK, Gregory J ; VICTOR, Sampath Kumar ; JAGDALE, Varsha ; MAHALINGAPPA, Vishwajit Tumkur ; NAGARATHINAM, Karthikeyan ; THEKKOOT, Vimalraj Vasudevan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_WO2020060609A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>JAIN, Soumya</creatorcontrib><creatorcontrib>ZAVERTNIK, Gregory J</creatorcontrib><creatorcontrib>VICTOR, Sampath Kumar</creatorcontrib><creatorcontrib>JAGDALE, Varsha</creatorcontrib><creatorcontrib>MAHALINGAPPA, Vishwajit Tumkur</creatorcontrib><creatorcontrib>NAGARATHINAM, Karthikeyan</creatorcontrib><creatorcontrib>THEKKOOT, Vimalraj Vasudevan</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JAIN, Soumya</au><au>ZAVERTNIK, Gregory J</au><au>VICTOR, Sampath Kumar</au><au>JAGDALE, Varsha</au><au>MAHALINGAPPA, Vishwajit Tumkur</au><au>NAGARATHINAM, Karthikeyan</au><au>THEKKOOT, Vimalraj Vasudevan</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><date>2020-03-26</date><risdate>2020</risdate><abstract>One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment.
L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre |
recordid | cdi_epo_espacenet_WO2020060609A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | VERIFYING A COMPUTING DEVICE AFTER TRANSPORT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T19%3A03%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JAIN,%20Soumya&rft.date=2020-03-26&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EWO2020060609A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |