VERIFYING A COMPUTING DEVICE AFTER TRANSPORT

One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage loc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: JAIN, Soumya, ZAVERTNIK, Gregory J, VICTOR, Sampath Kumar, JAGDALE, Varsha, MAHALINGAPPA, Vishwajit Tumkur, NAGARATHINAM, Karthikeyan, THEKKOOT, Vimalraj Vasudevan
Format: Patent
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator JAIN, Soumya
ZAVERTNIK, Gregory J
VICTOR, Sampath Kumar
JAGDALE, Varsha
MAHALINGAPPA, Vishwajit Tumkur
NAGARATHINAM, Karthikeyan
THEKKOOT, Vimalraj Vasudevan
description One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment. L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_WO2020060609A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>WO2020060609A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_WO2020060609A13</originalsourceid><addsrcrecordid>eNrjZNAJcw3ydIv09HNXcFRw9vcNCA0BsV1cwzydXRUc3UJcgxRCghz9ggP8g0J4GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8uL-RgZGBgRkQWjoaGhOnCgA4WSYu</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><source>esp@cenet</source><creator>JAIN, Soumya ; ZAVERTNIK, Gregory J ; VICTOR, Sampath Kumar ; JAGDALE, Varsha ; MAHALINGAPPA, Vishwajit Tumkur ; NAGARATHINAM, Karthikeyan ; THEKKOOT, Vimalraj Vasudevan</creator><creatorcontrib>JAIN, Soumya ; ZAVERTNIK, Gregory J ; VICTOR, Sampath Kumar ; JAGDALE, Varsha ; MAHALINGAPPA, Vishwajit Tumkur ; NAGARATHINAM, Karthikeyan ; THEKKOOT, Vimalraj Vasudevan</creatorcontrib><description>One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment. L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.</description><language>eng ; fre</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200326&amp;DB=EPODOC&amp;CC=WO&amp;NR=2020060609A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200326&amp;DB=EPODOC&amp;CC=WO&amp;NR=2020060609A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JAIN, Soumya</creatorcontrib><creatorcontrib>ZAVERTNIK, Gregory J</creatorcontrib><creatorcontrib>VICTOR, Sampath Kumar</creatorcontrib><creatorcontrib>JAGDALE, Varsha</creatorcontrib><creatorcontrib>MAHALINGAPPA, Vishwajit Tumkur</creatorcontrib><creatorcontrib>NAGARATHINAM, Karthikeyan</creatorcontrib><creatorcontrib>THEKKOOT, Vimalraj Vasudevan</creatorcontrib><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><description>One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment. L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAJcw3ydIv09HNXcFRw9vcNCA0BsV1cwzydXRUc3UJcgxRCghz9ggP8g0J4GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8uL-RgZGBgRkQWjoaGhOnCgA4WSYu</recordid><startdate>20200326</startdate><enddate>20200326</enddate><creator>JAIN, Soumya</creator><creator>ZAVERTNIK, Gregory J</creator><creator>VICTOR, Sampath Kumar</creator><creator>JAGDALE, Varsha</creator><creator>MAHALINGAPPA, Vishwajit Tumkur</creator><creator>NAGARATHINAM, Karthikeyan</creator><creator>THEKKOOT, Vimalraj Vasudevan</creator><scope>EVB</scope></search><sort><creationdate>20200326</creationdate><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><author>JAIN, Soumya ; ZAVERTNIK, Gregory J ; VICTOR, Sampath Kumar ; JAGDALE, Varsha ; MAHALINGAPPA, Vishwajit Tumkur ; NAGARATHINAM, Karthikeyan ; THEKKOOT, Vimalraj Vasudevan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_WO2020060609A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>JAIN, Soumya</creatorcontrib><creatorcontrib>ZAVERTNIK, Gregory J</creatorcontrib><creatorcontrib>VICTOR, Sampath Kumar</creatorcontrib><creatorcontrib>JAGDALE, Varsha</creatorcontrib><creatorcontrib>MAHALINGAPPA, Vishwajit Tumkur</creatorcontrib><creatorcontrib>NAGARATHINAM, Karthikeyan</creatorcontrib><creatorcontrib>THEKKOOT, Vimalraj Vasudevan</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JAIN, Soumya</au><au>ZAVERTNIK, Gregory J</au><au>VICTOR, Sampath Kumar</au><au>JAGDALE, Varsha</au><au>MAHALINGAPPA, Vishwajit Tumkur</au><au>NAGARATHINAM, Karthikeyan</au><au>THEKKOOT, Vimalraj Vasudevan</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>VERIFYING A COMPUTING DEVICE AFTER TRANSPORT</title><date>2020-03-26</date><risdate>2020</risdate><abstract>One example provides a method for authenticating a computing device received from a manufacturer, the method including establishing a secured connection with the computing device, receiving, from the computing device, a first set of security artifacts, and retrieving, from a secure cloud storage location, a second set of security artifacts, the second set of security artifacts including the EK public key and the PCR values for the computing device obtained during manufacturing. The method further comprises, when the first set of security artifacts matches the second set of security artifacts, then verifying the computing device as trusted and permitting communication between the computing device and a secured computing environment, and when the first set of security artifacts does not match the second set of security artifacts, then not verifying the computing device as trusted and not permitting communication between the computing device and the secured computing environment. L'invention concerne, dans un exemple, un procédé d'authentification d'un dispositif informatique reçu d'un fabricant, le procédé comprenant l'établissement d'une connexion sécurisée avec le dispositif informatique, la réception, à partir du dispositif informatique, d'un premier ensemble d'artefacts de sécurité, et la récupération, à partir d'un emplacement de stockage en nuage sécurisé, d'un second ensemble d'artefacts de sécurité, le second ensemble d'artefacts de sécurité comprenant la clé publique EK et les valeurs de PCR du dispositif informatique obtenues pendant la fabrication. Le procédé consiste en outre, lorsque le premier ensemble d'artefacts de sécurité correspond au second ensemble d'artefacts de sécurité, à considérer le dispositif informatique comme fiable et à autoriser la communication entre le dispositif informatique et un environnement informatique sécurisé, et lorsque le premier ensemble d'artefacts de sécurité ne correspond pas au second ensemble d'artefacts de sécurité, à ne pas considérer le dispositif informatique comme fiable et à ne pas autoriser la communication entre le dispositif informatique et l'environnement informatique sécurisé.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre
recordid cdi_epo_espacenet_WO2020060609A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title VERIFYING A COMPUTING DEVICE AFTER TRANSPORT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T19%3A03%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JAIN,%20Soumya&rft.date=2020-03-26&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EWO2020060609A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true