SECURE DEVICE ONBOARDING TECHNIQUES
    2.
    发明申请

    公开(公告)号:US20200275273A1

    公开(公告)日:2020-08-27

    申请号:US16647403

    申请日:2018-09-28

    Abstract: Various systems and methods for establishing network connectivity and onboarding for Internet of Things (IoT) devices and trusted platforms, including in Open Connectivity Foundation (OCF) specification device deployments, are discussed. In an example, a zero touch owner transfer method includes operations of: receiving a first request from a new device for network access to begin an onboarding procedure with a network platform; transmitting credentials of a first network to the new device, the first network used to access a rendezvous server and obtain onboarding information associated with the network platform; receiving a second request from the new device for network access to continue the onboarding procedure; and transmitting credentials of a second network to the new device, as the new device uses the second network to access the onboarding server of the network platform and perform or complete the onboarding procedure with the network platform.

    ASSIGNING USER IDENTITY AWARENESS TO A CRYPTOGRAPHIC KEY

    公开(公告)号:US20180183586A1

    公开(公告)日:2018-06-28

    申请号:US15392205

    申请日:2016-12-28

    Abstract: Various systems and methods for performing cryptographic operations based on an authentication policy are discussed. In an example, an authentication policy for implementing a user authentication factor (or multiple factors) may be deployed at a client computing device to control generation and use of a cryptographic key. Operations for generating a cryptographic key in accordance with an authentication policy may include: receiving the authentication policy from a policy broker, generating the cryptographic key in response to receipt of the user authentication factor defined by the authentication policy, generating attestation data that indicates compliance with the authentication policy, and communicating the attestation data to the policy broker. Operations for using the cryptographic key in accordance with the authentication policy may include: receiving a request to access the cryptographic key, and accessing the cryptographic key in response to successful receipt of the user authentication factor defined by the authentication policy.

Patent Agency Ranking